ABOUT THE PLATFORM

  • our data Our Data

    Learn what to expect from our database and how our insights can impact your growth

  • Integrations Integrations

    Software that’s built to fit snugly in your company’s technology ecosystem

  • Pricing Pricing

    Read more about our features and plans that are tailor-made for your company’s needs

SOLUTIONS

  • Slintel for Sales Slintel for Sales

    Unleashing your sales team’s true potential is just one software away

  • Slintel for Marketing Slintel for Marketing

    Marketing your product and generating leads shouldn’t be this easy, but it is

  • Technographic Insights Technographic Insights

    Explore a list of 25k+ technologies and get contextual insights on software of your interest

  • Company Insights Company Insights

    Rich, up-to-date information on over 15 million companies, all in one place

  • Technographic Analysis Technographic Analysis

    Compare the common technologies used by up to 251 companies of your choice

  • Compare Technographic Compare Technologies

    See how two software products in the same category compare against each other

  • Resources Center Resource Center

    Ebooks, case studies, and videos to help improve your company revenue

  • Blog Blog

    The Slintelegraph: Stories and content around SalesTech, prospecting, lead gen, and more

  • Guides Guides

    In-depth, long-form content on bleeding edge SalesTech topics

    Buyer Intent right arrow
    Sales Intelligence right arrow
    Technographics right arrow
    Sales Enablement right arrow
NEW EBOOK
Home Home breadcrumbs arrow Company breadcrumbs arrow Unveillance (Acquired by Mandiant)

Unveillance (Acquired by Mandiant)

Unveillance has developed the first zero false-positive approach at analyzing the malware infection and botnet participation status of organizational networks. Unveillance is able to develop this intelligence completely passively without the use of any hardware or locally installed software. Focusing on the indisputable proof of data egressing a corporate or governmental network, Unveillance is able to produce critical actionable intelligence on the exact moment the data exited the private network to the command & control server, the port, the protocol, the type of infection that facilitated the theft and in special cases the content of the payload. Combining multiple parameters that include the size of a given network, the scope and scale of the infection, the severity of the threats and the entity’s score in relation to the rest of the world, Unveillance has developed the industries first Data Leak Intelligence (DLI) score. This score is used for a variety of purposes including security and compliance validation, sector trending, investor assurance and remediation confirmation.

  • Data Leak Intelligence
  • Botnet Intelligence
  • Malware Analysis
  • Cyber Security
  • Headquarters

    Wilmington, Delaware, United States

  • Contact

    (800) 540-8478

    unveillance.com

  • Company Size

    11-50 Employees

  • Stock Symbol

    NA

  Update my profile

Find 11-50 leads for Unveillance (Acquired by Mandiant), chat with us today

View on a Computer for a better experience (and more details)
  • Tech Stack
  • Employees
  • Jobs
  • News & Media

Technology Stack of Unveillance (Acquired by Mandiant)

Find 6 technologies across 4 categories used by Unveillance (Acquired by Mandiant)

Wordpress

WordPress is a website and blog creation and publishing platform with tools for aesthetic ...


jQuery

jQuery is a cross-platform JavaScript library designed to simplify the client-side scripti...


JavaScript

JavaScript is the programming language of HTML and the Web.


PHP

PHP: Hypertext Preprocessor is a server-side scripting language designed for Web developme...


Google Ads

Google AdWords lets create ads that appear in Google search results for certain keywords ...


Facebook Comments

Facebooks mission is to give people the power to build community and bring the world close...


Find all the technology stack and renewals of Unveillance (Acquired by Mandiant)

Employees at Unveillance (Acquired by Mandiant)

Find rich insights on prospects from Unveillance (Acquired by Mandiant) including contact information, interests,skills and more

J

Jody Spivey

Jody Spivey is Business Development Manager at Unveillance (Acquired by Mandiant) at Delaware United States...

M

Mischeal Hayes

Mischeal Hayes is Inspector at Unveillance (Acquired by Mandiant) at Delaware United States...

Connect with Unveillance (Acquired by Mandiant) top decision maker

Jobs at Unveillance (Acquired by Mandiant)

Find recent and open job postings from Unveillance (Acquired by Mandiant)

We don't have enough content for Unveillance (Acquired by Mandiant) jobs.

Company News and Alerts

Get news, alerts, and updates about Unveillance (Acquired by Mandiant)

We don't have enough content for Unveillance (Acquired by Mandiant) company news and alerts.

FAQs

What is Unveillance (Acquired by Mandiant) official website?

The official website of Unveillance (Acquired by Mandiant) is http://www.unveillance.com/.

What is Unveillance (Acquired by Mandiant) phone number?

The phone number for Unveillance (Acquired by Mandiant) is (800) 540-8478.

How many employees are working at Unveillance (Acquired by Mandiant)?

Slintel keeps track of 11-50 employees who are working at Unveillance (Acquired by Mandiant).

What industry is Unveillance (Acquired by Mandiant) in?

Unveillance (Acquired by Mandiant) is in the industry of Computer & Network Security.

What is Unveillance (Acquired by Mandiant)'s tech stack?

The top technologies used by Unveillance (Acquired by Mandiant) are :- Wordpress jQuery JavaScript Google Ads Facebook Comments Google Ads .

Where are Unveillance (Acquired by Mandiant)'s headquarters?

Unveillance (Acquired by Mandiant) headquarters are at Wilmington, Delaware, United States.

What are Unveillance (Acquired by Mandiant)'s products and services ?

Unveillance (Acquired by Mandiant)'s product and services are Data Leak Intelligence Botnet Intelligence Malware Analysis Cyber Security .