?? Cheers to an Amazing Innovation Happy Hour! ?? A huge thank you to Derrick Honea and Phalynx for hosting a fantastic Innovation Happy Hour in Atlanta! Bringing together cybersecurity leaders in such a unique and engaging setting was the perfect way to spark great conversations and new ideas. We’re grateful to be part of such a vibrant community, and we’re already looking forward to the next opportunity to connect and collaborate. #CyberSecurity #InnovationHappyHour #Phalanx #Community #ReachSecurity
Reach Security
计算机和网络安全
San Francisco,CA 2,660 位关注者
Purpose-built AI powering enterprise security at scale.
关于我们
Security operators have access to thousands of tools and are tasked with deploying and operating the best combination of capabilities across their security estate. As it turns out, this is incredibly difficult for humans to do at scale. Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale. The product integrates with the existing security stack and provides insights and operational value in minutes. As threats, products, and workforce risk evolve, Reach continuously adapts the customer deployment to ensure the best possible configurations are in place. The company was founded in 2020 in the midst of a global pandemic that changed the way people work and how organizations thought about protecting their workforce. Built by security veterans from Palo Alto Networks and Proofpoint who have built products used by tens of thousands of organizations, Reach has taken those experiences and continues to partner with some of the world’s best security teams and world-class venture and angel investors to realize a more secure world.
- 网站
-
https://reach.security
Reach Security的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 11-50 人
- 总部
- San Francisco,CA
- 类型
- 私人持股
- 创立
- 2021
地点
-
主要
US,CA,San Francisco
Reach Security员工
-
Yousuf Khan
Partner @ Ridge Ventures | Investor, Board Member, Advisor, former CIO and ciso
-
CP Morey
Cybersecurity Marketing Executive | 4 exits including Phantom/Splunk, Sourcefire/Cisco, ISS/IBM
-
Geoff Belknap
Microsoft | Former LinkedIn, Slack, Palantir
-
Charles Courchaine
Experienced Software Engineer | Innovator | Driving Results in Software Development & Delivery
动态
-
?? Introducing Compliance View: Bridging the Gap Between Security and GRC ?? We’re excited to launch the new Compliance View within Reach! Now you can: => Map your security product controls to frameworks like ISO 27001, NIST CSF, SOC 2, and more. => Drill down into sub-categories to understand how Reach recommendations support compliance. => Track compliance maturity and streamline collaboration with security teams. With Compliance View, we’re making it easier to connect security configurations to compliance frameworks and provide verifiable proof of compliance efforts. ?? Learn more about Compliance View: https://lnkd.in/dxyiHj-3 #CyberSecurity #Compliance #Governance #RiskManagement #GRC #ReachSecurity #ISO27001 #NIST #SOC2
-
? Building Community on the Greens with Tevora ? We were honored to join Tevora at their inaugural Veterans Day Security on the Greens golf event. Bringing together an incredible group to honor veterans, strengthen connections, and enjoy a great day on the course. Thank you to Tevora for hosting such a fantastic event and to everyone who participated. Here’s to more opportunities to connect and grow together! #CyberSecurity #SecurityOnTheGreens #Community #Partnerships #Tevora #ReachSecurity
-
??? A Security Outcome Focus on Demo Day ??? Our CEO, Garrett Hamilton, recently joined Trey Ford and Robert Hansen for an unforgettable Demo Day session on The RSnake Show —one that, in RSnake’s words, “blew back what little hair he has left!” ?? During the session, Garrett showcased how Reach is capability aware (based on tools and resources available), user aware (based on behaviors and attacker activity), making it threat responsive (mapped against identified attacker interest) and compliance aware, but not compliance centric.. wow that's alot! ?? https://lnkd.in/dZ8dy7EV #CyberSecurity #DemoDay #RiskManagement #ReachSecurity #Leadership
Demo Day - Reach Security
https://www.youtube.com/
-
?? The Overlooked Importance of Identifying Your Riskiest Users ?? Our CEO, Garrett Hamilton, shares insights in his latest Dark Reading article on a fresh approach to managing cybersecurity’s weakest link—your riskiest users. Inspired by healthcare’s “see one, teach one, do one” model, Garrett explores how cybersecurity teams can empower high-risk users to better understand and mitigate the unique threats they face. In this piece, he breaks down: => Why 3-5% of users account for up to 90% of threats ?? => The power of targeted education to turn high-risk users into advocates for security => How a focused approach can reduce tool sprawl and cut down on unnecessary complexity ?? Read the full article in Dark Reading: https://lnkd.in/dUUsR3su #CyberSecurity #DarkReading #RiskManagement #HighRiskUsers #ReachSecurity #HumanCenteredSecurity
-
?? Top 10 Security Misconfigurations You Might Be Missing ?? Misconfigurations may seem small, but they can have a huge impact on security. In our latest blog, Nick R. breaks down the Top 10 Security Misconfigurations we frequently encounter—and how addressing them can strengthen your defenses. Key highlights include: =>Attachment Blocking for lesser-known file types, helping reduce spear-phishing risks =>Underutilized Custom Detections to improve visibility into attacker behavior =>Blocking Abused Networks to reduce unnecessary logs and alerts From max session limits to network visibility, we’re sharing insights to help security teams address overlooked gaps and enhance their overall resilience. ?? Read the full blog post https://lnkd.in/dwe__m8R #CyberSecurity #Top10Misconfigurations #SecurityGaps #ReachSecurity #RiskReduction
-
?? Demo Day Tomorrow: Top 10 Misconfigurations in Cybersecurity ?? We’re excited to have Chloe Potsklan and Nick R. team up for tomorrow's Demo Day! Together, they’ll tackle the Top 10 Misconfigurations that often slip through the cracks but can have a huge impact on your security. In this live, interactive session, Chloe and Nick will cover: => The most common misconfigurations attackers target => Practical fixes you can implement with Reach => Real-world insights to help you strengthen your security posture Don’t miss this chance to learn from our team and take control of the top misconfigurations lurking in your environment! ?? Date: Nov 13 @ noon ET ?? Save your spot: https://lnkd.in/dBuFBgXV #CyberSecurity #DemoDay #Top10Misconfigurations #ReachSecurity #Webinar #SecurityBestPractices
-
?? Get Ready for Our Next Demo Day: Top 10 Misconfigurations in Cybersecurity ?? We’re excited to have Chloe Potsklan and Nick R. team up as presenters for our upcoming Demo Day! Together, they’ll tackle the Top 10 Misconfigurations that often slip through the cracks but can have a huge impact on your security. In this live, interactive session, Chloe and Nick will cover: => The most common misconfigurations attackers target => Practical fixes you can implement with Reach => Real-world insights to help you strengthen your security posture Don’t miss this chance to learn from our team and take control of the top misconfigurations lurking in your environment! ?? Date: Nov 13 @ noon ET ?? Save your spot: https://lnkd.in/dBuFBgXV #CyberSecurity #DemoDay #Top10Misconfigurations #ReachSecurity #Webinar #SecurityBestPractices
-
?? Microsoft E3 vs. E5: Which License is Right for Your Security Needs? Upgrading Microsoft licenses can open up new possibilities, but understanding the full impact of E3 versus E5 security is not a decision to take lightly. In our latest blog, Zach Marks dives into how Reach can help you make confident, data-driven decisions. Key takeaways: => Leverage existing E3 capabilities to their full extent before deciding on E5. => Identify high-risk users and deploy targeted E5 features to mitigate specific threats. => Use Reach’s platform to assess how features like Conditional Access in Entra ID P2 can provide measurable value. Stop guessing and start making licensing decisions with data that supports your security goals. ?? Read the full blog post: https://lnkd.in/dsmTEjNP #CyberSecurity #MicrosoftE3 #MicrosoftE5 #RiskManagement #DataDriven #ReachSecurity #ConditionalAccess
-
?? Top 10 Misconfigurations Putting Your Security at Risk ?? Join Nick R. on our next Demo Day as we dive into the Top 10 Misconfigurations that often fly under the radar but can have a huge impact on your security posture. In this live session, we’ll show you: => Real examples of the most common misconfigurations ?? => How attackers exploit these gaps to gain access ?? => Practical steps to fix and prevent them with Reach No slides, no theory—just hands-on insights to help you tighten up your security stack. ?? Date: Nov 13 @ noon ET ?? Save your spot: https://lnkd.in/dBuFBgXV #CyberSecurity #DemoDay #Top10Misconfigurations #ReachSecurity #ConfigurationManagement #RiskReduction