Sharelock.ai

www.sharelock.ai

The Sharelock platform disrupts the Identity Threat Detection and Response activity based on the behavioral analysis of machines and users. Sharelock detects the unpredictable, learns, evolves, and adapts continuously. Sharelock provides its behavioral insights in three distinct domains: - User Behavioural Anomaly Detection. Detects all anomalous behavior indicative of signatureless and never-before-seen cyber attacks, identifies data breaches and contains insider threats and frauds, delivering complete visibility across your dynamic workforce. - Machine Behavioural Anomaly Detection. Detects behavioral anomalies of any entity or attribute not related to humans. Gain full coverage of your IT/OT infrastructure and any application attributes such as SAP TCodes, Sharepoint files/folders and web domains. - Compliance recommendations: based on actual user behaviours, aim to close the gap between the ‘should be’ state – described in Identity Management platforms – vs the ‘as-is‘. Sharelock is run by Identity Management veterans with previous successful startup experience(CrossIdeas, a leading IGA player, was acquired by IBM in 2014).

Read more

Reach decision makers at Sharelock.ai

Lusha Magic

Free credit every month!

The Sharelock platform disrupts the Identity Threat Detection and Response activity based on the behavioral analysis of machines and users. Sharelock detects the unpredictable, learns, evolves, and adapts continuously. Sharelock provides its behavioral insights in three distinct domains: - User Behavioural Anomaly Detection. Detects all anomalous behavior indicative of signatureless and never-before-seen cyber attacks, identifies data breaches and contains insider threats and frauds, delivering complete visibility across your dynamic workforce. - Machine Behavioural Anomaly Detection. Detects behavioral anomalies of any entity or attribute not related to humans. Gain full coverage of your IT/OT infrastructure and any application attributes such as SAP TCodes, Sharepoint files/folders and web domains. - Compliance recommendations: based on actual user behaviours, aim to close the gap between the ‘should be’ state – described in Identity Management platforms – vs the ‘as-is‘. Sharelock is run by Identity Management veterans with previous successful startup experience(CrossIdeas, a leading IGA player, was acquired by IBM in 2014).

Read more
icon

Country

icon

City (Headquarters)

Rome

icon

Employees

11-50

icon

Founded

2017

icon

Social

  • icon

Employees statistics

View all employees

Potential Decision Makers

  • Chief Data Officier and Co - Founder

    Email ****** @****.com
    Phone (***) ****-****
  • Chief Architect and Co - Founder Presso Sharelock

    Email ****** @****.com
    Phone (***) ****-****
  • Chief Executive Officer and Co - Founder

    Email ****** @****.com
    Phone (***) ****-****
  • Chief Technology Officer and Co - Founder

    Email ****** @****.com
    Phone (***) ****-****

Technologies

(1)

Reach decision makers at Sharelock.ai

Free credits every month!

My account

Sign up now to uncover all the contact details