Fremont, CA 94538
+1 (510) 982-1003


Created with Sketch.

Data Science
Artificial Intelligence Analytic Decision Support

With decades of experience in networking, security, big data, and analytics, BroadBridge Networks’ founders have discovered how to leverage Artificial Intelligence (AI) and telemetry automation to enrich your organization’s security posture, and speed the discovery & mitigation of security gaps.


More Than Just Power, Intelligence

HUMAN error effectively allows 95% of successful security breaches to occur. Misconfigured, missing, and-out of-date infrastructure policy, insufficiently trained staff, and limited security budgets all conspire to perpetuate this reality.

Today’s security tools simply cannot keep pace with the explosive growth in data volumes on increasingly diverse, distributed, on-prem, private, and public cloud infrastructure. This contributes to an ever-expanding attack surface.

Broadbridge has solved these problems by combining an in-memory unified data pipeline with an all new GPU based hardware architecture that improves performance at scale by orders of magnitude.  Our distributed Legion Cybersecurity Platform combines artificial intelligence and data science with advanced visualization.  Utilizing this unique, unified end-to-end data pipeline, we streamline compute workloads across enrichment, inference, and analytics, whether real-time, or forensic.

Artificial intelligence is used to highlight probable threats and vulnerabilties in real-time, so analysts can then investigate as vulnerabilities emerge.  This is fundamentally different from competing ‘black-box’ AI solutions, which remove accountability.

BroadBridge LegionTM can be integrated into corporate vpc’s on both public and private clouds, on-prem, or in a hybrid deployment, depending on your security requirements.

Legion’sTM revolutionary Analyst WorkbenchTM then presents whole network risk analysis, a common operating picture, delivering insights in a way even non-data scientists understand. 

This allows key decision makers to more easily interpret, and apply analytic insights to the network security posture and, mitigate against threats accordingly.