CloudSEK | Company Profile - Revenue, Headcount, Tech Stack, Contacts
Contact Information
Industry & Market
Company Metrics
Funding Information
Headcount Distribution
By Department
Department Breakdown
Technology Stack
Analytics & Tracking
Social & Marketing
Video & Media
Email & Communication
Keywords & Focus Areas
CloudSEK
Overview
CloudSEK is an AI-driven cybersecurity company founded in 2015 and headquartered in Bengaluru, India. The company specializes in predictive threat intelligence and digital risk management, offering platforms that monitor and mitigate online threats across various web layers, including the surface web, deep web, and dark web. Its core product, XVigil, is a fully automated platform for external threat monitoring and digital risk assessment, designed to provide actionable insights without requiring coding skills.
In addition to XVigil, the organization has developed BeVigil, the world's first security search engine for mobile apps, enabling users to perform one-click security posture checks. Serving clients across sectors such as financial services, healthcare, government, and manufacturing, the company is focused on enhancing cybersecurity through advanced AI solutions.
Basic Information
| Industry | computer & network security |
|---|---|
| Founded | 2015 |
| Revenue | 10M |
| Headquarters | 151 Chin Swee Rd, #07-12 Manhattan House, Singapore, Singapore 16, SG |
| Languages | English |
| Alexa Ranking | 419456 |
Contact Details
- Phone: +65 6778 2633
- Website: cloudsek.com
- LinkedIn: linkedin.com/company/cloudsek
Key Focus Areas & Initiatives
- Information security & machine learning
- Threat detection platform
- Software supply chain security
- Automation
- Cybersecurity threat detection
- Threat detection automation
- Automated threat remediation
- Software development
- Supply chain security
- Cybersecurity platform
- Attack surface mapping
- Dark web threat intelligence
- Threat intelligence platform customization
- Threat analytics
- AI threat detection
- Government
- Incident response automation
- Cybersecurity scalability
- Threat intelligence integration
- Threat hunting
- Initial attack vector detection
- Threat detection system
- Cybersecurity
- Threat intelligence reports
- Threat intelligence feeds
- Dark web monitoring
- Cyber threat landscape
- Cyber risk analytics
- Threat actor tracking
- Digital risk protection
- Cybersecurity threat feeds
- B2B
- Attack surface blueprinting
- Vulnerability management
- AI cybersecurity
- AI-driven threat detection
- Incident response tools
- Vulnerability monitoring
- Cybersecurity threat intelligence
- Vulnerability assessment
- Services
- Cyber threat intelligence research
- Cyber attack early warning
- AI threat hunting
- Supply chain risk management
- Automated threat response
- Cybersecurity automation
- Attack surface management
- Deep web monitoring
- Dark web threat monitoring tools
- Cybersecurity analytics
- Attack surface risk assessment
- Cyber threat hunting automation
- Vulnerability assessment tools
- Cyber threat intelligence feeds
- Predictive threat intelligence
- Cyber risk management
- Cyber threat intelligence
- Automated vulnerability management
- Enterprise threat management
- Cybersecurity threat analysis
- Attack surface monitoring tools
- Attack surface monitoring
- Attack surface visualization
- Cybersecurity threat modeling
- Enterprise threat intelligence
- Cybersecurity threat hunting
- Threat actor analysis
- Threat actor database
- Cybersecurity integration
- Predictive analytics
- Predictive cybersecurity
- Threat detection
- Threat intelligence APIs
- Attack surface visualization tools
- Cybersecurity innovation
- Supply chain attack monitoring
- Threat detection solutions
- Threat intelligence automation
- Dark web data leaks
- Dark web intelligence
- No-code security platform
- Cybersecurity monitoring
- Cyber threat prediction
- Risk assessment
- Vulnerability prioritization
- Threat intelligence services
- Cyber threat analytics
- Cybersecurity services
- Cybersecurity threat intelligence tools
- Attack surface discovery
- Cyber threat prediction models
- Enterprise cybersecurity
- Threat actor profiling
- Information technology and services
- Computer systems design and related services
- Threat intelligence sharing
- Threat intelligence integration APIs
- Cybersecurity solutions
- Cybersecurity trust
- Threat mitigation
- Consulting
- Cyber attack prevention
- Dark web monitoring tools
- Threat landscape analysis
- Cyber threat feeds
- Threat intelligence platform integration
- Incident response
- Brand monitoring
- Brand protection
- Vulnerability scanning
- Threat actor directory
- Cyber risk quantification
- Cyber attack simulation
- Cybersecurity research
- Threat intelligence platform
- Infrastructure monitoring
- Deepfake detection
- Data leak prevention
- Phishing protection
- Takedown services
- API security monitoring
- Cybersecurity awareness
- Threat reporting
- Malware scanning
- Breach detection
- Intelligence gathering
- OSINT
- Credential monitoring
- Third party risk management
- Software supply chain risk
- Web application security
- Social media threat monitoring
- Risk analysis
- Automation in security
- Contextualized alerts
- Continuous monitoring
- External asset management
- Identity theft protection
- Ransomware prevention
- Secure application development
- Employee cybersecurity training
- Data breach alerts
- Real-time threat intelligence
- Proactive threat mitigation
- Shadow IT discovery
- Compliance and regulation monitoring
- Digital brand protection
- Mobile application security
- Infrastructure vulnerability scanning
- IP and domain monitoring
- Cyber defense strategy
- Healthcare
- Finance
- Information technology & services
- Enterprise software
- Enterprises
- Computer software
- Health care
- Health, wellness & fitness
- Hospital & health care
- Financial services
Technologies Used
- AI
- AWS Application Load Balancer
- AWS SDK for JavaScript
- AWS Trusted Advisor
- AddThis
- Airflow
- Android
- Apache Kafka
- Apollo
- Bing
- CAPTCHA
- CloudFlare
- CloudFlare Hosting
- Cloudflare DNS
- CookieYes
- Cornerstone On Demand
- Docker
- DoubleClick
- DoubleClick Conversion
- Eventbrite
- Facebook Login (Connect)
- Gmail
- Google Analytics
- Google Apps
- Google Cloud Machine Learning Engine
- Google Dynamic Remarketing
- Google Font API
- Google Play
- Google Tag Manager
- Google Workspace
- Greenhouse.io
- Hubspot
- Kenexa
- LinkedIn Sales Navigator
- Linkedin Marketing Solutions
- Lusha
- Microsoft Advertising
- Microsoft Clarity
- Mixpanel
- Mobile Friendly
- MongoDB
- Neogov HRMS
- NetSuite
- New Relic
- Paczkomaty
- Phoenix
- Pipedrive
- PostgreSQL
- PySpark
- Python
- Reddit for business
- Remote
- Salesforce
- SendInBlue
- Slack
- Taleo
- TypeScript
- Webex
- Webflow
- Webmail
- WordPress.org
- Wordpress.com
- Workday Recruit
- YouTube
- dynaTrace
- go+
- reCAPTCHA