Sera-Brynn moves up rankings

Published 9:51 pm Thursday, August 11, 2016

Suffolk-based cyber risk management company Sera-Brynn has moved up the Cybersecurity Ventures rankings of top cybersecurity firms in the world, reaching No. 10 globally and No. 7 in the U.S. while retaining its top position in Virginia, in a recent survey.

The Cybersecurity 500 list for the third quarter of 2016 tracks the hottest and most innovative cybersecurity firms in the world. The list was released earlier this month.

Sera-Brynn offers risk management cybersecurity services to a diverse group of clients.

Email newsletter signup

“We’re thrilled to be listed in the top 10 of the world’s most innovative cybersecurity solutions companies,” Sera-Brynn CEO Rob Hegedus said.

“Our firm is a recognized leader in creating innovative, inclusive, uniform and affordable cybersecurity compliance solutions for clients across a broad range of industry and government regulatory requirements. This announcement, I think, further validates our holistic approach to helping our customers meet their complex, and sometimes perplexing, compliance requirements in the simplest, most efficient and cost effective way possible.”

Cybersecurity Ventures CEO Steve Morgan said Sera-Brynn’s climb up the rankings is an example of a firm that’s operating from a position of power in a period of extraordinary growth in the cybersecurity services market.

“I’ve been watching Sera-Brynn, and I’m impressed with the leadership, the company’s performance and how they are ahead of the market for cybersecurity services,” Morgan said. “They see the future of cybersecurity and act on it. It’s a great story.

In Virginia, Sera-Brynn is ranked at the top of 41 firms doing business in the cybersecurity sector. Among the firms are IKANOW (No. 19 in the world), Northrop Grumman (No. 54 in the world), L-3 (No. 55 in the world) and Novetta (No. 79 in the world).

Headquartered in Suffolk, Sera-Brynn has an international client base. The company helps clients secure their computing environments — both before and after security breaches — and meet applicable mandatory industry and government compliance requirements.