Ridgeback Is Leading the Future of Cyber Defense
By engaging threats at first contact, before damage occurs.
We are Ridgeback Network Defense, a cybersecurity company based in Baltimore, MD and we understand we are in charge of our own destiny.
Cybersecurity is our job.
The world is in perpetual cyber-war and we understand people depend on us.
We are warriors.
We build and deploy tools to battle despicable criminals who would rob our families and hijack our hospitals.
We like hard challenges.
Most people like the easy life, but we think the easy life is boring.
We stand together.
Our team is our family and we will fight for them.
We value integrity.
We boldly say what we mean and we don’t try to hide the truth.
If you have a technical mind, enjoy working with other people, and want to be in charge of your destiny and make the world a safer place, you’ll fit in. 
Write to us.
Scott Fogarty CEO
Scott Fogarty
CEO
Thomas Phillips
Thomas Phillips
CTO, Co-Founder
Steve Rixse
Steve Rixse
VP, Co-Founder
Steve Oliphant
Steve Oliphant
Solutions Engineer
Samuel Kushner
Samuel Kushner
Solutions Engineer
Ridgeback's Expert Team of Advisors, Partners, and Allies
Scott Fogarty CEO
Tim Solie
SISO, Phase II
Previous roles:
  • Col. USA, ret.
  • Cyberspace Directorate
  • US Army Chief of Staff
  • USCENTCOM
Steve Rixse
Michael Wons
Founder & CEO, GovTech Strategy Advisors
Previous roles:
  • CTO, State of Illinois
  • Microsoft
  • Federal Signal
Jorge Antunez
David Sinnott
Owner, ProSecure
Steve Oliphant
Ross Osborne
CEO, Phase II
Previous roles:
  • Lt. Col. USA, ret.
  • ITT Defense/Exelis
  • Signal Officer, 101st Airborne Div.
Samuel Kushner
Greg Sisson
Founder CI-Discern
CISO, US-DOE
Previous roles:
  • Deputy Dir. Ops., Joint Force Headquarters-DoD Information Network
Samuel Kushner
John Taglieri
President, Mission Focused Consulting
Previous roles:
  • United States Air Force – 41 yrs., Communications, IT and cyber
Thomas Phillips
Thomas Phillips
Inventor, CTO
Ridgeback Network Defense, Inc
Automated attacks need an automated defense
-Tom Phillips, Founder & CTO

There are two parallel threads.

The first thread was learning how analysis breaks down. Scientists use analysis all the time to explain natural phenomena. This works out great because the laws of physics don’t change. (Not that we know of, at least.) Analysis techniques like signal detection and hypothesis testing worked so well in the physical sciences, people started applying them to other fields. Fields like natural language processing, hedge fund trading, and eventually cybersecurity. The problem was that the analysis techniques always depended on an underlying model… and the models changed. Fields of study that involve humans always seemed to have models that changed on a regular basis. People are unpredictable — go figure! So when we wonder why our security methods don’t work, it’s because our adversaries work very hard to break our models of security.

The second thread was military operations. I have a military background and learned fairly quickly that plans, while a good exercise for preparation, do not hold up under contact with the enemy. The funny thing — the enemy wants your plans to fail. Better yet, the enemy is constantly trying to trick you. Simple analysis, while a good tool, never is enough when facing a determined adversary.

Mixing these two threads together gives us an “interactive defense” that allows us to “change the battlefield,” “influence and expose malicious intent and intruder” and “expel malicious actors.”

That is, we can deploy information technology tools that actively deceive attackers. Things like this have been around for a while and have been used by experts in the field of cybersecurity. The problem is that these kinds of solutions are a lot of work to set up and maintain, and the solutions are usually very fragile.

I wanted a platform that would let me easily and quickly (in 5 minutes or less) deploy a massive armada of phantoms, and, I did not want to have to configure or maintain this stuff. I wanted to overwhelm any adversary with the push of a button. Ridgeback was the answer to my problem.

Ridgeback is a unique and innovative Enterprise Security Platform, allows me to deploy any sort of interactive defense at an incredibly large scale. I can now completely overwhelm even the most sophisticated adversary by simply typing “start-ridgeback.” Better still, I can even run it on my laptop.


What Practitioners See When Ridgeback Is Turned On: Customer Perspectives from the Field

Ridgeback transforms cybersecurity from interpretation to evidence, from alerts to consequences, and from reaction to control. These testimonials make clear, once organizations see the ground truth of their own networks, the decision to deploy Ridgeback often becomes very easy.


Customer Perspectives:

“Much of the time the customer does not believe what Ridgeback is showing… but in every instance, after analysis, Ridgeback is always shown to be correct.”

Traditional tools rely on inference: logs, heuristics, and delayed analysis. Ridgeback presents direct observation of network behavior as it occurs. When the data challenges long-held assumptions, Ridgeback consistently proves accurate because it is not guessing, it is watching the network operate in real time.

This is the difference between analytics and evidence.


“We saw traffic from segments that we should not have seen… a switch configuration error that allowed traffic to bypass our firewall.”

Security failures are often not the result of malware, but of invisible architectural flaws. In this case, Ridgeback revealed an unintended trust path that allowed firewall bypass, something no log-based tool detected.

The discovery was material enough to drive an immediate purchasing decision, underscoring Ridgeback’s value not as a theoretical control, but as a decision-forcing instrument.


“A software tool capable of providing visibility and protection on Layer 2 segments… where the only current option is NAC.”

NAC is complex, brittle, and fundamentally permissive. Once a device is admitted, NAC largely stops protecting the environment. Ridgeback operates differently: it continuously monitors and defends Layer 2 segments after access is granted, where most lateral movement occurs.

This fills a structural gap present in virtually every modern network.


“In protect mode it is impossible for any hostile user or program exploring the network to do so unobserved.”

Ridgeback’s Phantom-based architecture ensures that reconnaissance, enumeration, and mapping cannot occur quietly. Any attempt to explore the network triggers immediate engagement. This is not detection after the fact, it is interruption at first contact.

The attacker is denied freedom of maneuver from the outset.


“Ridgeback immediately responds to the intruder… providing time to make decisions based on facts, not analysis.”

Most security tools generate alerts and wait for humans to respond. Ridgeback acts immediately, disrupting adversary activity while defenders assess the situation using real, verified data. This compresses dwell time, reduces panic, and replaces guesswork with certainty.

It is automated defense that buys decision-quality time.


“The software is simple to install and simple to use.”

Operational friction kills security initiatives. Ridgeback’s ease of deployment enables teams to move quickly from visibility, to cleanup, to policy enforcement, all without lengthy tuning cycles or fragile dependencies.

Simplicity here is not cosmetic; it is operational leverage.


“One of the best technologies I have seen in decades. Nobody else does anything like this.”

This endorsement comes from decades of hands-on experience, not marketing theory. Ridgeback is not another AI-driven analytics engine, it is a fundamentally different defensive approach based on direct observation, interaction, and consequence.


“When customers combine Ridgeback fact-based detections with AI-based analysis it becomes a truly winning combination.”

Ridgeback is not positioned as a replacement for AI-driven tools, but as the truth layer they lack. By feeding AI systems with verified, high-fidelity signals instead of noisy inference, organizations dramatically improve defensive outcomes.

AI is strongest when facts are available to evaluate it.


“Going from zero visibility in our Layer 2 networks to full visibility is always very eye opening.”

Most organizations assume they understand their internal network behavior because they have firewalls, NAC, EDR, or SIEM. But realistically, those do not provide continuous, real-time visibility into Layer 2 activity—where unmanaged devices, misconfigurations, and lateral movement happen. Ridgeback exposes the ground truth of what is actually happening on every VLAN, instantly.

This transition from assumed visibility to factual visibility is often the moment when hidden risk becomes identifiable and therefore addressable.

Commercial
Infomercial-style Ad
Talk to an Expert
[email protected]