Cydarm Logo

Cydarm

Cyber incident response management platform for security operations teams

Product
Security Operations
Security Operations
GRC
API

450+ Data Points Per Product and Company

Track competitive landscapes, evaluate vendor risk for investments, or find the right security stack for your clients.

Request Access

Cydarm Description

Cydarm provides a cyber response management platform designed to help security operations teams manage and coordinate incident response activities. The platform addresses integration challenges by connecting with existing security tools and technologies to centralize response workflows. The system supports attribute-based access control (ABAC) for granular permissions management, enabling secure collaboration across teams handling privacy-sensitive cases, insider threats, and other sensitive security incidents. The platform implements enterprise-grade security features including single sign-on integration with major identity providers like Microsoft Entra ID, Okta, Google, and AWS without additional SSO fees. It uses Vault storage for encrypting integration keys, implements TLS 1.2 or higher for secure communications, and includes security headers like Content Security Policy and HTTP Strict Transport Security. The system supports multi-factor authentication natively for deployment in isolated network environments. Cydarm was founded by Vaughan Shanks, who has a PhD in Computer Science and previously worked at Palantir and the Department of Defense, and Ben Waters, a cybersecurity professional with 15 years of experience who was involved in growing Hivint before its acquisition by Optus Trustwave. The company's advisory board includes professionals with backgrounds in security operations, digital forensics, incident response, and enterprise security from organizations including UKG, Uptycs, and SANS Institute. The platform is built with security-first principles including daily encrypted backups, 24x7 security monitoring, vulnerability management processes, and annual penetration testing. It serves organizations requiring coordinated incident response capabilities across their security operations teams.