Jask Labs jask.ai


Public list: cybersecurity (2774) Artificial Intelligence ( AI ) (3109) Smart Money VCs (6327) 2018 Cyber Defenders (29)

JASK empowers security analysts with AI, using advanced algorithms to deliver end-to-end network monitoring -- surfacing and triaging the most relevant attacks while providing a clear picture of the attack surface. Deployed in hours and continuously updated through the cloud, JASK injects an agile sensing and investigation layer into existing technologies that empowers security analysts to make informed decisions faster and with more precision. By accelerating discovery, analysis, and triage, JA...Show all

JASK empowers security analysts with AI, using advanced algorithms to deliver end-to-end network monitoring -- surfacing and triaging the most relevant attacks while providing a clear picture of the attack surface. Deployed in hours and continuously ...Show all

Company (Alive / Active)

Phone: 415-604-0202

Fax:

875 Howard Street
Suite 310
San Francisco, 94103
California, United States

Latest News

See more competitors data Competitors
Total Funding Date of Last Funding
Jask Labs $39.2M Jun 28, 2018

Web Traffic

Rank

Show (-10)

Engagement (PVPU)

Show (+1%)

Domain Authority Score
Show
Page Views Per Million (PVPM)
Show
Reach Per Million
Show

SEO Statistics

Domain Authority Score Show
Page Authority Score Show
No. External Links Show
No. Links Show

Web Traffic Statistics - Growth

Per Week Per Month Per 6 Months Per Year
Rank Login to see details
Page Views Per Million Login to see details
Page Views Per User Login to see details
Reach Per Million Login to see details

Related Jask Labs Jobs

jobs by Indeed job
						search

Investors

Investor Investor Type Location Participating Rounds
See all 8 investors
There is no Competitors data available for this company. Please select another tab.

Patents

Title Application Date Patent Date Status
(Patent / Application)
Method for predicting security risks of assets on a computer network Oct 31, 2017 Application
Method for detecting a cyber attack Jun 20, 2017 Application
Method for predicting and characterizing cyber attacks Jun 20, 2017 Application