
Yaxa provides a user behavior-based data access solution that uses reinforced machine learning to monitor user traffic to critical web applications. It builds a unique behavioral profile for each user by analyzing live data packets and identity information from IAM servers. The solution operates on a 'trust but verify' approach with minimal IT intervention. It features four key steps: Behavioral Fingerprinting to establish user and application-specific access controls, Anomaly Detection using an ensemble of advanced ML algorithms to identify deviations from baseline behavior, Blocking Attacks through an automated incident response mechanism that triggers authentication requests for suspicious sessions, and Adaptive Learning that continuously refines behavioral models based on user feedback. Yaxa's product offers real-time incident response, goes beyond perimeter defenses to combat insider threats, is effective against zero-day vulnerabilities, supports flexible deployment in data centers or the cloud, monitors network traffic using Big Data analytics, and eliminates false alarms through automated corrective actions.

Yaxa provides a user behavior-based data access solution that uses reinforced machine learning to monitor user traffic to critical web applications. It builds a unique behavioral profile for each user by analyzing live data packets and identity information from IAM servers. The solution operates on a 'trust but verify' approach with minimal IT intervention. It features four key steps: Behavioral Fingerprinting to establish user and application-specific access controls, Anomaly Detection using an ensemble of advanced ML algorithms to identify deviations from baseline behavior, Blocking Attacks through an automated incident response mechanism that triggers authentication requests for suspicious sessions, and Adaptive Learning that continuously refines behavioral models based on user feedback. Yaxa's product offers real-time incident response, goes beyond perimeter defenses to combat insider threats, is effective against zero-day vulnerabilities, supports flexible deployment in data centers or the cloud, monitors network traffic using Big Data analytics, and eliminates false alarms through automated corrective actions.
Sector: Cybersecurity — real-time risk monitoring & threat remediation
Headquarters: Concord, Massachusetts, United States
Founders: Kalpesh Sheth; Ramesh Gupta
Product focus: Behavioral fingerprinting, anomaly detection, automated challenge responses
Enterprise detection and automated remediation of malicious or anomalous user behaviors in web applications and network traffic.
2015
Cybersecurity
Total Funding: 0.00