Information Security Technologies & Markets

.Global software security vendors, providers

Get Started. It's Free
or sign up with your email address
Rocket clouds
Information Security Technologies & Markets by Mind Map: Information Security Technologies & Markets

1. Consulting

1.1. Application Security

1.1.1. Web

1.1.1.1. AppSec Consulting

1.1.1.2. Denim Group

1.1.2. Mobile

1.1.2.1. AppSec Consulting

1.1.2.2. Denim Group

1.2. Compliance

1.2.1. HIPAA

1.2.2. HITECH

1.2.3. ISO

1.2.4. PCI

1.2.4.1. WorldWide

1.2.4.1.1. Wipro

1.2.4.1.2. Dell Secureworks

1.2.4.1.3. Deloitte and Touche

1.2.4.1.4. EY

1.2.4.1.5. BT

1.2.4.1.6. PWC

1.2.4.2. Regional

1.2.4.2.1. North America

1.2.4.2.2. Latin America

1.2.4.2.3. EMEA

1.2.4.2.4. Asia Pacific

1.3. Governance

1.3.1. Accuvant

1.3.2. Fishnet Security

1.3.3. FOX-IT

1.4. Incident Response

1.4.1. Forensics

1.4.1.1. FOX-IT

1.4.1.2. PWC

1.4.1.3. Fishnet Security

1.4.1.4. EY

1.4.1.5. Deloitte

1.4.2. Digital Investigations

1.4.2.1. FOX-IT

1.4.2.2. Deloitte

1.4.2.3. EY

1.4.2.4. Fishnet Security

1.4.2.5. PWC

1.5. Penetration Testing

1.5.1. AppSec Consulting

1.5.2. Core Security

1.5.3. Element Digital Security

1.5.4. FOX-IT

1.5.5. Matasano Security

1.5.6. Rapid7

1.5.7. Secureworks

1.5.8. WhiteHat Security

1.6. Risk Management

1.6.1. Booz Allen Hamilton

1.6.2. Accuvant

1.6.3. Cloud Risks

1.6.4. On Premise Infrastructure

1.6.5. Business Risk

1.7. Security Program Development

1.7.1. Accuvant

1.7.2. Fishnet

1.7.3. FOX-IT

2. Encryption/Tokenization

2.1. Cloud/SAAS Encryption

2.1.1. Appliances

2.1.1.1. Office365

2.1.1.1.1. Vaultive

2.1.1.1.2. FiLink

2.1.1.2. Ciphercloud

2.1.1.3. Afore Solutions

2.1.1.3.1. CloudLink VSA

2.1.1.4. Perspecsys

2.1.2. Software

2.1.2.1. BoxCryptor

2.1.2.2. SafeNet

2.1.2.2.1. SafeMonk

2.1.2.3. PrivateCore

2.1.2.4. Trend Micro

2.1.2.4.1. SecureCloud

2.1.3. Software as a Service

2.1.3.1. Trend Micro

2.1.3.1.1. SecureCloud

2.2. Data masking

2.2.1. Oracle

2.3. Database

2.3.1. SafeNet

2.3.2. Dark Matter Labs

2.3.3. Vormetric

2.4. File/Folder

2.4.1. WinMagic

2.4.1.1. SecureDoc

2.4.2. Symantec (PGP)

2.4.3. IBM

2.4.3.1. Mainframe

2.4.3.1.1. z10

2.4.4. Sophos

2.4.4.1. SafeGuard Enterprise (Utimaco)

2.4.5. Vormetric

2.5. Mobile Storage/USB

2.5.1. IronKey

2.6. Tokenization

2.6.1. Protegrity

2.7. Whole Disk

2.7.1. McAfee

2.7.2. Symantec (PGP)

2.7.3. CheckPoint Software

2.7.4. Encryption Management

2.7.4.1. Wave Systems

2.7.5. WinMagic

2.7.5.1. SecureDoc

2.7.6. Microsoft

2.7.6.1. Bitlocker

2.7.7. Sophos

2.7.7.1. SafeGuard Enterprise (Utimaco)

2.7.8. Trustwave

2.7.8.1. DataControl

2.7.9. Vormetric

3. Governance, Risk and Compliance

3.1. Firewall Workflow,Modeling & Change Management

3.1.1. Firemon

3.1.2. Skybox

3.1.3. ManageEngine

3.1.4. Redseal Networks

3.1.5. Tufin

3.1.6. Checkpoint Software

3.2. eGRC

3.2.1. Software as a Service

3.2.1.1. Bwise

3.2.2. Software

3.2.2.1. Sword Achiever

3.2.2.2. BPS Resolver

3.2.2.3. Jade Software

3.2.2.4. Walters Kluwer Financial Services

3.2.2.5. SAI

3.2.2.6. Oracle

3.2.2.7. MetricStream

3.2.2.8. Nasdaq Bwise

3.2.2.9. SAP

3.2.2.10. RSA

3.2.2.10.1. Archer

3.2.2.11. OpenPages

3.2.2.12. MetricStream

3.2.2.13. IBM

3.2.2.13.1. Openpages

3.2.2.14. Thompson Reuters

3.2.2.15. Rsam

3.2.2.16. Mega

3.2.2.16.1. Mega Suite

3.2.2.17. Software AG

3.2.2.18. Protivity

3.2.2.19. CMO Compliance

3.2.2.20. Enablon

3.2.2.21. Cura Technologies

3.3. itGRCM

3.3.1. Allgress

3.3.1.1. Vulnerability Manager

3.3.1.2. Risk Analysis

3.3.1.3. Security and Compliance Assessment

3.3.1.4. Incident Management

3.3.1.5. Policy and Proceedures

3.3.2. Symantec

3.3.2.1. Control Compliance Suite

3.3.3. Modulo

3.3.4. Rsam

3.3.5. Agiliance

3.3.6. Brinqa

3.3.7. Nasdaq Bwise

3.3.8. ControlCase

3.3.9. EMC-RSA

3.3.10. Lumension Security

3.3.11. Microsoft

3.3.12. Telos

3.3.13. Software as a Service

3.3.13.1. SureCloud

3.4. Operational Risk Analytics

3.4.1. RiskIO

3.4.2. Skybox

3.4.3. Firemon

3.4.4. Redseal Networks

3.4.5. Algosec

3.4.6. Tufin

3.4.7. Solarwinds

3.4.8. IBM

3.4.8.1. Q1Radar Risk Manager

4. Managed Security Services

4.1. Indirect Providers

4.1.1. Asia Pacific

4.1.1.1. Singapore

4.1.1.1.1. e-Cop

4.1.1.1.2. NTT Singapore

4.1.1.1.3. Singtel

4.1.1.1.4. NCS Group

4.1.1.2. China

4.1.1.2.1. Hong Kong

4.1.1.3. Australia

4.1.2. Europe

4.1.2.1. BT Global Services

4.1.2.2. Dell SecureWorks

4.1.2.3. Germany

4.1.2.3.1. Link11 GMBH

4.1.2.3.2. IPsoft

4.1.2.4. HP

4.1.2.5. Integralis

4.1.2.6. Open Systems

4.1.2.7. Open Systems

4.1.2.8. Orange Business Services

4.1.2.9. Symantec

4.1.2.10. T-Systems

4.1.2.11. Tata Communications

4.1.2.12. Telefonica

4.1.2.12.1. DDoS Protection Service

4.1.2.12.2. Email Encryption

4.1.2.12.3. Email Security Gateway

4.1.2.12.4. Firewall Management

4.1.2.12.5. IAM

4.1.2.12.6. Intrusion Detection

4.1.2.12.7. Intrusion Prevention

4.1.2.12.8. Log Management

4.1.2.12.9. SIEM

4.1.2.12.10. Vulnerability Assessment

4.1.2.12.11. Web Security Gateway

4.1.2.12.12. Anti-Fraud

4.1.2.13. Verizon Business

4.1.2.13.1. Anti-DDoS

4.1.2.13.2. Email Security

4.1.2.13.3. Endpoint Protection

4.1.2.13.4. Firewall Management

4.1.2.13.5. Intrusion Detection

4.1.2.13.6. Intrusion Prevention

4.1.2.13.7. SIEM

4.1.2.13.8. Vulnerability Assessment

4.1.2.13.9. Web Security

4.1.2.14. Wipro

4.1.2.14.1. Email Security Gateway

4.1.2.14.2. Endpoint Security

4.1.2.14.3. Firewall Management

4.1.2.14.4. Fraud Management/Anti-Money Laundering

4.1.2.14.5. GRC

4.1.2.14.6. IAM

4.1.2.14.7. Intrusion Detection

4.1.2.14.8. Intrusion Prevention

4.1.2.14.9. SIEM

4.1.2.14.10. User Access Management

4.1.2.14.11. Web Security Gateway

4.1.3. Global Providers

4.1.3.1. AT&T

4.1.3.1.1. DDos Protection

4.1.3.1.2. Email/Data Encryption Services

4.1.3.1.3. Endpoint Anti-Virus

4.1.3.1.4. Endpoint Patch Management

4.1.3.1.5. Endpoint Policy Compliance

4.1.3.1.6. Mobile Device Security

4.1.3.1.7. Secure Email Gateway

4.1.3.1.8. Security Device Management

4.1.3.1.9. Web Application Firewall

4.1.3.1.10. Web Gateway (URL & Malware Filtering)

4.1.3.2. BT

4.1.3.3. Dell Secureworks

4.1.3.3.1. Advanced Malware Protection

4.1.3.3.2. Email Security Gateway

4.1.3.3.3. Firewall Management

4.1.3.3.4. Host IPS

4.1.3.3.5. IDS/IPS

4.1.3.3.6. Log Management

4.1.3.3.7. Log Retention

4.1.3.3.8. SIEM

4.1.3.3.9. Threat Intelligence

4.1.3.3.10. Unified Threat Management

4.1.3.3.11. Vulnerability Assessment

4.1.3.3.12. Web Application Firewall

4.1.3.3.13. Web Application Vulnerability Assessment

4.1.3.4. Dimension Data

4.1.3.5. HP

4.1.3.5.1. Access Managment

4.1.3.5.2. Data Loss Prevention

4.1.3.5.3. Email Security Gateway

4.1.3.5.4. Endpoint Encryption

4.1.3.5.5. Endpoint Protection

4.1.3.5.6. Intrusion Detection

4.1.3.5.7. Intrusion Prevention

4.1.3.5.8. Managed Incident Response

4.1.3.5.9. Remote Access Management

4.1.3.5.10. SIEM

4.1.3.5.11. Vulnerability Assessment

4.1.3.5.12. Web Application Vulnerability Assessment

4.1.3.5.13. Web Security Gateway

4.1.3.6. IBM

4.1.3.6.1. Email Security Gateway

4.1.3.6.2. Endpoint Patch Management

4.1.3.6.3. Endpoint Policy Management

4.1.3.6.4. Endpoint Protection

4.1.3.6.5. Firewall Management

4.1.3.6.6. IAM

4.1.3.6.7. Intrusion Detection

4.1.3.6.8. Intrusion Prevention

4.1.3.6.9. Log Management

4.1.3.6.10. Mobile Device Security

4.1.3.6.11. SIEM

4.1.3.6.12. Unified Threat Management

4.1.3.6.13. Vulnerability Assessment

4.1.3.6.14. Web Security Gateway

4.1.3.6.15. Web Vulnerability Assessment

4.1.3.7. Telstra

4.1.3.8. Verizon Business

4.1.3.8.1. Anti-DDoS

4.1.3.8.2. Email Security

4.1.3.8.3. Endpoint Protection

4.1.3.8.4. Firewall Management

4.1.3.8.5. Intrusion Detection

4.1.3.8.6. Intrusion Prevention

4.1.3.8.7. SIEM

4.1.3.8.8. Vulnerability Assessment

4.1.3.8.9. Web Security

4.1.4. Middle East and North Africa

4.1.4.1. Saudi Arabia

4.1.4.2. United Arab Emirates

4.1.4.2.1. Du Telecom

4.1.5. North America

4.1.5.1. Canada

4.1.5.1.1. Above Security

4.1.5.1.2. Bell Canada

4.1.5.1.3. OneStone (Formerly Seccuris)

4.1.5.1.4. EWA

4.1.5.1.5. SentryMetrics

4.1.5.1.6. Netpulse

4.1.5.2. United States

4.1.5.2.1. AT&T

4.1.5.2.2. Alert Logic

4.1.5.2.3. Allstream

4.1.5.2.4. CGI

4.1.5.2.5. CSC

4.1.5.2.6. CenturyLink- Savvis

4.1.5.2.7. Clone Systems

4.1.5.2.8. Compucom Systems

4.1.5.2.9. Dell Secureworks

4.1.5.2.10. HCL Technologies

4.1.5.2.11. HP

4.1.5.2.12. IBM

4.1.5.2.13. Megapath

4.1.5.2.14. Nuspire Networks

4.1.5.2.15. SAIC

4.1.5.2.16. Secure Designs

4.1.5.2.17. SilverSky (Formerly Stillsecure/Perimeter esecurity)

4.1.5.2.18. Solutionary

4.1.5.2.19. Sword and Shield

4.1.5.2.20. Symantec

4.1.5.2.21. Trustwave

4.1.5.2.22. Verizon Business

4.1.5.2.23. Wipro

4.2. Direct Tech Providers Managed Security

4.2.1. Asia Pacific

4.2.1.1. Australia

4.2.1.2. China

4.2.1.2.1. NSFOCUS

4.2.1.3. Singapore

4.2.2. Europe

4.2.3. Global Providers

4.2.4. Middle East and North Africa

4.2.4.1. Saudi Arabia

4.2.4.2. United Arab Emirates

4.2.5. North America

4.2.5.1. United States

4.2.5.1.1. NSFOCUS

4.2.5.1.2. Check Point Software

5. Database Security

5.1. Database Audit and Protection

5.1.1. Application Security, Inc

5.1.2. BeyondTrust

5.1.3. Fortinet

5.1.4. GreenSQL

5.1.5. IBM

5.1.6. Imperva

5.1.7. McAfee

5.1.8. Mentis Software

5.1.9. Oracle Corp

5.1.10. PentaSecurity

5.1.11. Warevalley

6. Network Security

6.1. Denial of Service Protection

6.1.1. Appliances

6.1.1.1. Arbor Networks

6.1.1.1.1. Prevail APS

6.1.1.2. Check Point Software

6.1.1.2.1. DDos Protector

6.1.1.3. Corero

6.1.1.4. Fortinet

6.1.1.5. Genie Networks

6.1.1.5.1. ATM Appliances

6.1.1.6. NSFOCUS

6.1.1.7. Radware

6.1.2. Security as a Service

6.1.2.1. Akamai

6.1.2.2. Black Lotus

6.1.2.3. Cloudflare

6.1.2.4. Incapsula

6.1.2.5. Link11

6.1.2.6. Prolexic

6.1.2.7. Neustar

6.1.2.8. Verisign

6.1.3. Clean Pipe Services

6.1.3.1. AT&T

6.1.3.2. Verizon

6.2. Network Access Control (NAC)

6.2.1. Host Based

6.2.1.1. Symantec

6.2.1.2. McAfee

6.2.2. Network Based

6.2.2.1. Forescout

6.2.2.2. Cisco

6.2.2.3. Bradford Networks

6.2.2.4. Milton Security Group

6.3. Network Firewalls

6.3.1. Enterprise Firewalls

6.3.1.1. Next Generation Firewalls

6.3.1.1.1. Fortinet

6.3.1.1.2. Palo Alto Networks

6.3.1.1.3. CheckPoint Software

6.3.1.2. Stateful Inspection - Traditional Firewalls

6.3.1.2.1. Cisco

6.3.1.2.2. Meraki

6.3.1.2.3. HP

6.3.1.2.4. Huawei

6.3.2. Open Source Based

6.3.2.1. IPchains

6.3.2.2. Untangle

6.3.3. Router Firewalls

6.4. Network Intrusion Prevention

6.4.1. CheckPoint

6.4.2. HP

6.4.2.1. TippingPoint

6.4.3. IBM

6.4.4. McAfee

6.4.5. Sourcefire

6.5. Unified Threat Management

6.5.1. CheckPoint

6.5.2. Cisco

6.5.3. Clavister

6.5.4. Fortinet

6.5.5. Hillstone Networks

6.5.6. Sonicwall

6.5.7. Sophos/Astaro

6.5.8. Trustwave

6.5.9. Untangle

6.5.10. WatchGuard

7. ValidEDGE

8. Web Application Firewalls (WAF)

8.1. Appliances

8.1.1. Virtualized Appliances

8.1.1.1. AlertLogic

8.1.1.2. Amazon AWS

8.1.1.2.1. Riverbed

8.1.1.3. Barracuda Networks

8.1.1.4. BeeWare

8.1.1.5. Imperva

8.1.1.6. PentaSecurity

8.1.2. Physical Appliances

8.1.2.1. AlertLogic

8.1.2.2. Barracuda Networks

8.1.2.3. BeeWare

8.1.2.4. Cisco

8.1.2.4.1. End of Life January 2011

8.1.2.5. Citrix

8.1.2.6. DPtech

8.1.2.7. DenyAll

8.1.2.8. F5

8.1.2.9. Imperva

8.1.2.10. NSFocus

8.1.2.11. PentaSecurity

8.1.2.12. Riverbed

8.1.2.13. Trustwave

8.2. Managed Services

8.2.1. Dell Secureworks

8.2.2. AT&T

8.2.3. Verizon Business

8.2.4. Cisco

8.3. Software

8.3.1. Apache

8.3.1.1. Applicure

8.3.1.1.1. dotDefender

8.3.2. DenyAll

8.3.3. ERGON Informatik AG

8.3.3.1. AIRLOCK

8.3.4. Juniper

8.3.4.1. Mykonos

8.3.5. Microsoft IIS

8.3.5.1. Applicure

8.3.5.1.1. dotDefender

8.3.5.2. BeyondTrust

8.3.5.3. ThreatSentry

8.3.6. Open Source

8.3.6.1. Mod Security

8.3.6.2. IronBee

8.3.7. Riverbed

8.4. Software as a Service

8.4.1. Akamai

8.4.1.1. Kona

8.4.2. AlertLogic

8.4.3. CloudFlare

8.4.4. Incapsula

8.4.5. Qualys

9. Web/Email Protection

9.1. Secure Email Gateways

9.1.1. Bluecoat

9.1.2. Fortinet

9.1.3. McAfee

9.1.4. Sonicwall

9.1.5. Symantec

9.1.6. Trustwave

9.1.7. Websense

9.1.8. iBoss

9.2. Secure Web Gateways

9.2.1. Bluecoat

9.2.2. ContentKeeper

9.2.3. McAfee

9.2.4. Symantec

9.2.5. Trustwave

9.2.6. Websense

9.2.7. iBoss

9.3. Security as a Service

9.3.1. Web & Email SaaS

9.3.1.1. Appriver

9.3.1.2. Barracuda

9.3.1.3. Cisco

9.3.1.4. McAfee

9.3.1.5. Spamina

9.3.1.6. Symantec

9.3.1.7. Total Defense

9.3.1.8. Websense

9.3.1.9. Zscaler

9.3.2. Web Only

9.3.2.1. ContentKeeper

10. Virtual Private Networking (VPN)

10.1. IPSec VPN

10.1.1. Cisco

10.1.2. CheckPoint Software

10.1.3. Certes Networks

10.2. Layer 2 Encryption

10.2.1. Certes Networks

10.3. Layer 4 Encryption

10.3.1. Certes Networks

10.4. SSL VPN

10.4.1. Juniper

10.4.2. Cisco

10.4.3. Sonicwall

10.4.4. Barracuda Networks

10.4.5. Stonesoft

10.4.6. F5 Networks

10.4.7. Citrix

10.4.8. WatchGuard

10.4.9. NetGear

10.4.10. Array Networks

11. Security Information and Event Management (SIEM) & Log Management

11.1. Log Management

11.1.1. McAfee

11.1.1.1. McAfee Enterprise Log Manager

11.1.2. Tripwire

11.1.3. Splunk

11.1.4. LogRythm

11.2. SIEM

11.2.1. AlienVault

11.2.1.1. OSSIM

11.2.2. HP

11.2.2.1. Arcsight

11.2.3. IBM

11.2.3.1. Q1Radar

11.2.4. LogRythm

11.2.5. McAfee

11.2.5.1. NitroSecurity

11.2.6. Novell

11.2.6.1. Sentinel

11.2.7. RSA

11.2.7.1. Envision

11.2.8. Sensage

11.2.9. Solarwinds

11.2.10. Splunk

11.2.11. Tibco

11.2.11.1. Loglogic

11.2.12. eIQnetworks

12. Endpoint Security Platforms (EPP)

12.1. Anti-Malware

12.1.1. North America

12.1.1.1. McAfee

12.1.1.2. MalwareBytes

12.1.1.3. Trend Micro

12.1.1.4. Symantec

12.1.1.5. Total Defense

12.1.2. China

12.1.2.1. Rising International Software

12.1.3. Russia

12.1.3.1. Kaspersky

12.1.4. United Kingdom

12.1.4.1. Sophos

12.1.5. Romania

12.1.5.1. Bitdefender

12.1.6. South Korean

12.1.6.1. BKAV

12.1.7. Czech Republic

12.1.7.1. Avast

12.1.8. Netherlands

12.1.8.1. AVG

12.2. Endpoint Intrusion Prevention

12.2.1. McAfee

12.2.2. Symantec

12.3. File Integrity Monitoring

12.3.1. Open Source

12.3.1.1. 1. AIDE

12.3.1.2. 2. Trend Micro

12.3.1.2.1. 1. OSSEC

12.3.1.3. 3. Samhain

12.3.1.4. 4. Osiris

12.3.1.5. 5. Integrit

12.3.1.6. 6. Tripwire

12.3.2. Commercial

12.3.2.1. Imperva

12.3.2.2. McAfee

12.3.2.3. Tripwire

12.4. Sandboxing/MicroVM

12.4.1. SandBoxie

12.4.2. Norman Sandbox

12.4.3. Bromium

13. Data Loss Prevention (DLP)

13.1. Gateway

13.1.1. McAfee

13.1.2. Symantec

13.2. Host

13.2.1. McAfee

13.2.2. RSA

13.2.3. Symantec

13.2.4. Trustwave

13.3. Security as a Service

13.3.1. Consumer

13.3.1.1. Reputation.com

13.3.1.2. Social Fortress

13.3.1.3. PwnedList

13.3.2. Enterprise

13.3.2.1. Social Fortress

13.3.2.2. Google Apps

13.3.2.2.1. Cloudlock

14. Chip Layer Security

14.1. AMD

14.1.1. TPM

14.2. Cavium

14.2.1. Multi-Core Processors

14.3. Flow Processors

14.3.1. Netronome

14.4. Intel

14.4.1. TPM

14.4.2. Data Execution Protection

15. Vulnerability Assessment/Management (VA/VM)

15.1. Managed Penetration Testing Services

15.1.1. WhiteHatSecurity

15.2. Penetration TestingSoftware

15.2.1. Core Security

15.2.2. Rapid7

15.2.2.1. Metasploit Pro

15.2.2.2. Metasploit Express

15.3. Software as a Service

15.3.1. Digital Defense

15.3.2. McAfee

15.3.3. Outpost24

15.3.4. Qualys

15.4. Network Vulnerability Assessment (On Premise)

15.4.1. Digital Defense

15.4.2. Fortinet

15.4.3. McAfee

15.4.3.1. McAfee Vulnerability Manager (Foundstone)

15.4.4. NSAuditor

15.4.5. Ncircle

15.4.6. Netasq

15.4.7. Outpost24

15.4.8. Qualys

15.4.9. Rapid 7

15.4.9.1. Nexspose

15.5. Web Application Security

15.5.1. Code Review Products

15.5.1.1. HP

15.5.1.2. IBM

15.5.2. Runtime Application Self Protection

15.5.2.1. Metaforic

15.5.2.2. Arxan

15.5.3. Scanning Services

15.5.3.1. High-Tech Bridge

15.5.3.2. McAfee Secure

15.5.3.3. WebSecurify

15.5.3.4. Qualys

15.5.3.5. WhiteHat

15.5.3.6. Controlscan

15.5.4. Scanning Software

15.5.4.1. Open Source

15.5.4.1.1. Arachni Scanner

15.5.4.1.2. Subgraph

15.5.4.1.3. W3af

15.5.4.1.4. Wapiti

15.5.4.1.5. Watcher

15.5.4.2. Commercial

15.5.4.2.1. Accunetix

15.5.4.2.2. BeyondTrust

15.5.4.2.3. Cenzic

15.5.4.2.4. HP

15.5.4.2.5. MavitunaSecurity

15.5.4.2.6. NTObjectives

15.5.4.2.7. Nstalker

15.5.4.2.8. Portswigger

15.5.4.2.9. Syhunt

15.6. Vulnerability Reporting/Tracking

15.6.1. Risk IO

15.7. Vulnerability Research

15.7.1. CSC

15.7.2. HP

15.7.2.1. DV Labs

15.7.3. HotWAN

15.7.4. McAfee

15.7.5. SecNiche Labs

15.7.6. Sourcefire VRT

15.7.7. Symantec

15.7.8. VRLSec

15.7.9. Vupen

16. End User Privilege Management

16.1. Viewfinity

17. Software as a Service

17.1. Google Apps

17.1.1. CloudLock

17.1.2. FiLink

18. Advanced Threat Detection/Prevention

18.1. Advanced Network Threat Protection

18.1.1. Runtime Emulation

18.1.1.1. ValidEDGE

18.1.1.2. General Dynamics

18.1.1.2.1. Fidelis Systems

18.1.1.3. Checkpoint Software

18.1.2. Advanced Threat Intelligence

18.1.2.1. LookingGlass

18.1.3. Virtual Execution Assessment

18.1.3.1. Cloud Based

18.1.3.1.1. Netwitness

18.1.3.1.2. CrowdStrike

18.1.4. Appliances

18.1.4.1. AhnLab

18.1.4.2. Damballa

18.1.4.3. FireEye

18.1.4.3.1. Malware Analysis Appliance

18.1.4.4. Lastline

18.1.4.5. ThreatTrack

18.1.5. Network Monitoring/Detection

18.1.5.1. Netwitness

18.1.5.2. Kindsight

18.1.5.3. Taasera

18.1.6. Exploit Technique Prevention Software

18.1.6.1. Cyvera

18.1.6.2. Microsoft

18.1.6.2.1. EMET

18.2. Appliance Based

18.2.1. AhnLab

18.2.2. CheckPoint Software

18.2.3. ContentKeeper

18.2.4. Cyphort

18.2.5. Damballa

18.2.6. FireEye

18.2.7. HBGary

18.2.8. LastLine

18.2.9. McAfee

18.2.10. Palo Alto Networks

18.2.11. RSA

18.2.11.1. Security Analytics (Formerly Netwitness)

18.2.11.1.1. Spectrum

18.2.12. Trend Micro

18.3. Malware Analysis

18.3.1. Malware Analysis as a Service

18.3.1.1. Free Services

18.3.1.1.1. Malwr

18.3.2. Software

18.3.2.1. Norman

18.3.2.1.1. Malware Analyzer G2

18.3.2.2. GFI

18.3.2.2.1. GFI Sandbox

18.3.2.3. Joesecurity

18.3.2.3.1. Joe Sandbox

18.3.3. Firewalls

18.3.3.1. Palo Alto Networks

18.3.3.2. CheckPoint Software

18.3.3.3. Fortinet

18.4. Endopoint Sandboxes and Virtualized Containers

18.4.1. Sandboxes

18.4.1.1. Panda

18.4.1.2. Norman

18.4.1.3. Sandboxie

18.4.1.4. Bitdefender

18.4.2. Virtualized Containers

18.4.2.1. Bromium

18.4.3. Type-0 Hypervisors

18.4.3.1. Lynxworks

18.4.3.2. Zirtu

18.5. Endpoint Threat Detection and Response

18.5.1. Access Data

18.5.1.1. CIRT

18.5.2. Carbon Black

18.5.3. Countertack

18.5.4. CrowdStrike

18.5.5. Cyvera

18.5.6. Guidance Software

18.5.6.1. Encase Cybersecurity

18.5.7. HBGary

18.5.8. Invincea

18.5.9. Mandiant

18.5.10. Triumfant

18.6. Network Behavior Analysis

18.6.1. Flow Analysis

18.6.1.1. Lancope

18.6.1.2. Arbor Networks

18.6.2. Network Traffic (Sniffers)

18.6.2.1. Arbor Networks

18.6.2.2. Lastline

18.6.2.3. Light Cyber

18.6.2.4. McAfee NBA

18.7. Security as a Service

18.7.1. Mail

18.7.1.1. Proofpoint

18.7.2. Malware Infection Monitoring Services

18.7.2.1. Lastline

18.7.2.1.1. Guardia

18.7.2.2. Qualys

18.7.2.3. Seculert

19. Fraud Prevention

19.1. Appliances

19.1.1. Silvertail Systems

19.2. Software

19.2.1. RSA (EMC)

19.2.2. Cisco (Formerly Trusteer)

19.3. Software as a Service

19.3.1. ThreatMetrix

19.3.2. X-Cart

19.3.3. MarkMonitor

19.3.4. iovation

20. Intelligence Services/Data Feeds

20.1. Anti-Spam

20.1.1. www.au.sorbs.net

20.2. IP Blacklists

20.2.1. SpamHaus

20.2.2. Team Cymru

20.2.3. Dshield

20.2.4. hosts-file.net

20.3. Malware Analysis/Blocklists

20.3.1. Malware Patrol

20.3.2. hosts-file.net

20.3.3. zeustracker.abuse.ch

20.3.4. websecurityguard.com

20.3.5. SpamHaus

20.3.6. Botnets

20.3.6.1. spyeyetracker.abuse.ch

20.3.7. MalwareDomainList.com

20.3.8. ThreatGrid

20.3.9. VirusTotal

20.3.10. emergingthreats.net

20.3.11. www.malwareblacklist.com/

20.3.12. www.malware.com.br/lists.shtml

20.3.13. Team Cymru

20.4. Reputation Feeds

20.4.1. Symantec

20.4.1.1. Reputation Insight

20.4.2. McAfee

20.4.2.1. Global Threat Intelligence (GTI)

20.4.3. Trend Micro

20.4.3.1. Smart Protection Network

20.5. Threat Intelligence Services

20.5.1. CrowdStrike

20.5.2. Dell

20.5.2.1. Counter Threat Unit - CTU

20.5.3. FOX-IT

20.5.4. Lookingglass Cyber Solutions

20.5.5. McAfee

20.5.6. Proofpoint

20.5.7. Security Starfish

20.5.8. Team Cymru

20.5.9. Verisign

20.6. URL Lists

20.6.1. Shallalist

20.6.2. hosts-file.net

20.6.3. zvelo

20.6.4. http://malc0de.com/database/

20.7. Web Malware Monitoring

20.7.1. evuln.com

20.7.2. Qualys

21. Forensics & eDiscovery

21.1. Forensic Products

21.1.1. eDiscovery

21.1.1.1. Clearwell

21.1.1.2. Kazeon

21.1.1.3. Guidance Software

21.1.1.4. Access Data

21.1.1.5. Autonomy

21.1.1.6. kCura

21.1.1.7. FTI Technology

21.1.1.8. Barracuda Networks

21.1.2. Mobile Devices

21.1.2.1. Cellebrite

21.1.2.2. Paraben

21.1.2.3. Oxygen

21.1.3. Computing Systems

21.1.3.1. Guidance Software

21.1.3.2. Access Data

21.1.3.3. BlackBag

21.1.3.4. OSForensics

21.1.3.5. Xways Forensics

21.1.3.6. Cylance

21.1.4. Network Forensics

21.1.4.1. Access Data

21.1.4.2. BlueCoat

21.1.4.3. Cybertap

21.1.4.4. Endace

21.1.4.5. Fluke Networks

21.1.4.6. NetAgent

21.1.4.7. NetResec

21.1.4.8. NetScout

21.1.4.9. Niksun

21.1.4.10. Packetsled

21.1.4.11. RSA (EMC)

21.1.4.12. Riverbed

21.1.4.13. WildPackets

21.2. Forensics as a Service (FaaS)

21.3. Incident Response Legal Services

21.3.1. Information Law Group

21.4. eDiscovery Services

21.4.1. Robert Half

21.4.2. Advanced Discovery

22. Identity and Access Management (IAM)

22.1. Certificates

22.1.1. Symantec (Formerly VeriSign)

22.2. AD/Unix bridge

22.2.1. Centrify

22.3. Privileged account management (PAM)

22.3.1. BeyondTrust

22.3.2. Lieberman Software

22.3.3. Cyber Ark

22.4. Identity governance and administration

22.4.1. CA Technologies

22.4.2. IBM Security

22.4.3. Oracle

22.4.4. RSA (Aveksa)

22.5. Security as a Service

22.5.1. Identity and Access Management (IDaaS)

22.5.1.1. Symplifyed

22.5.1.2. Ping Identity

22.6. Secure USB dongles

22.6.1. IronKey

22.7. User Authentication

22.7.1. Tokens

22.7.1.1. OOB authentication

22.7.1.1.1. SMS

22.7.1.1.2. Voice

22.7.1.1.3. Push

22.7.1.1.4. Email

22.7.1.1.5. Social media

22.7.1.2. OTP tokens

22.7.1.2.1. OTP hardware tokens

22.7.1.2.2. OTP software tokens for smart phones

22.7.1.3. X.509 tokens

22.7.1.4. Other tokens

22.7.1.4.1. ANECT AS - ALUCID

22.7.2. Contextual authentication

22.7.3. KBA

22.7.4. Biometrics

22.7.4.1. Behavioral

22.7.4.1.1. Typing rhythm/keystroke dynamics

22.7.4.1.2. Voice recognition

22.7.4.2. Biological

22.7.4.2.1. Face recognition

22.7.4.2.2. Fingerprint

22.7.5. Wide-focus vendors

22.7.5.1. RSA

22.7.5.2. SafeNet

22.7.5.3. VASCO

22.7.5.4. CA Technologies

22.7.5.5. HID Global

22.7.5.6. Technology Nexus

22.7.5.7. Symantec

22.7.5.8. Entrust

22.8. Enterprise single sign-on (ESSO)

22.9. Web access management (WAM)

22.10. Federated SSO

22.11. Externalized authorization management (EAM)

22.11.1. Axiomatics

22.11.2. Dell Quest (BitKoo)

22.12. Access Management

22.12.1. CionSystems

23. Channel/Logistics/Supply Chain/OEMs/Product Testing/Marketing

23.1. Cloud Service Brokerages

23.1.1. Jamcracker

23.1.2. Gravitant

23.1.3. StandingCloud

23.1.4. Bitnami

23.2. Distribution/Channel

23.2.1. VARs, Resellers

23.2.1.1. China

23.2.1.1.1. Rainbow Tech

23.2.1.1.2. Broad Sky Innovation Technology

23.2.1.1.3. Qast Software Group

23.2.1.2. Eastern Europe

23.2.1.2.1. CZECH Republic

23.2.1.2.2. Poland

23.2.1.3. Emerging Asia Pacific

23.2.1.3.1. India

23.2.1.3.2. Indonesia

23.2.1.3.3. Malasia

23.2.1.3.4. Thailand

23.2.1.3.5. Philippines

23.2.1.4. Eurasia

23.2.1.4.1. Russian Federation

23.2.1.4.2. Kazakhstan

23.2.1.4.3. Ukraine

23.2.1.5. Latin America

23.2.1.5.1. Brazil

23.2.1.5.2. Chile

23.2.1.5.3. Columbia

23.2.1.5.4. Costa Rica

23.2.1.5.5. Ecuador

23.2.1.5.6. Bolivia

23.2.1.5.7. Venezuela

23.2.1.5.8. Cuba

23.2.1.5.9. Argentina

23.2.1.5.10. Buenos Aires

23.2.1.5.11. Mexico

23.2.1.5.12. Peru

23.2.1.6. Mature Asia Pacific

23.2.1.6.1. Australia

23.2.1.6.2. Japan

23.2.1.6.3. Singapore

23.2.1.7. Middle East and North Africa

23.2.1.7.1. Turkey

23.2.1.7.2. Israel

23.2.1.7.3. Saudi Arabia

23.2.1.7.4. South Africa

23.2.1.7.5. India

23.2.1.7.6. United Arab Emirates

23.2.1.8. North America

23.2.1.8.1. United States

23.2.1.8.2. Canada

23.2.1.9. Sub-Sahara Africa

23.2.1.9.1. South Africa

23.2.1.10. Western Europe

23.2.1.10.1. France

23.2.1.10.2. Germany

23.2.1.10.3. Italy

23.2.1.10.4. Netherlands

23.2.1.10.5. Spain

23.2.1.10.6. United Kingdom

23.2.1.11. WorldWide

23.2.1.11.1. AT&T

23.2.1.11.2. Verizon Business

23.2.2. Distributors

23.2.2.1. China

23.2.2.1.1. Huagai

23.2.2.1.2. Ecschina

23.2.2.1.3. B & Data Technology Co. Ltd.

23.2.2.1.4. Beijing Advazone Electronic Limited Comp

23.2.2.1.5. Beijing HolyZone Technology Co.,Ltd.

23.2.2.1.6. Digital China Technology LTD.

23.2.2.1.7. M.Tech (Shanghai) Co., Ltd.

23.2.2.1.8. Sky Faith International Enterprise

23.2.2.2. Emerging Asia Pacific

23.2.2.2.1. India

23.2.2.2.2. Indonesia

23.2.2.3. Eurasia

23.2.2.3.1. Russian Federation

23.2.2.3.2. Kazakhstan

23.2.2.4. Mature Asia Pacific

23.2.2.4.1. Singapore

23.2.2.4.2. Japan

23.2.2.4.3. South Korea

23.2.2.5. Middle East and South Africa

23.2.2.5.1. United Arab Emirates

23.2.2.6. North America

23.2.2.6.1. Canada

23.2.2.6.2. United States

23.2.2.7. Sub-Sahara Africa

23.2.2.7.1. South Africa

23.2.2.8. Worldwide

23.2.2.8.1. Ingram Micro

23.2.2.8.2. Tech Data

23.2.2.8.3. Westcon

23.3. Managed Service Enablement

23.3.1. Chartec

23.3.2. Jamcracker

23.4. OEM Manufacturers/Integrators

23.4.1. Appliances

23.4.1.1. Netronome

23.4.1.2. Lanner

23.4.1.3. Caswell

23.4.1.4. Portwell

23.4.2. Appliance Integrators

23.4.2.1. Dan-el Technologies Ltd.

23.4.2.2. Advantech

23.4.3. Chips

23.4.3.1. Cavium

23.4.3.2. Netronome

23.4.4. Cards

23.4.4.1. Netronome

23.4.5. Encryption Acceleration

23.4.5.1. Intel

23.4.5.1.1. VPRO

23.4.5.2. Safenet

23.4.5.2.1. Luna PCI

23.4.6. Software

23.4.6.1. Social Network Content Control

23.4.6.1.1. NetboxBlue

23.4.6.2. URL Categorization

23.4.6.2.1. Zvelo

23.4.6.3. Advanced Threat Protection - Virtual Execution Engines

23.4.6.3.1. ContentKeeper

23.4.6.4. Image Recognition

23.4.6.4.1. Image Analyzer

23.4.6.5. AntiMalware

23.4.6.5.1. Commtouch

23.4.6.6. Encryption

23.4.6.6.1. Transport

23.5. Product Testing

23.5.1. United Kingdom

23.5.1.1. Dennis Technology Labs

23.5.2. Generic Product Testing

23.5.2.1. North America

23.5.2.1.1. NIST

23.5.2.1.2. ICSA Labs (Division of Verizon)

23.5.2.1.3. NSS Labs

23.5.2.1.4. CGI

23.5.3. Sponsored Product Review/Testing

23.5.3.1. Network Testing Labs

23.5.3.2. West Coast Labs

23.5.3.3. Miercom

23.5.3.4. NSS Labs

23.5.4. Cryptographic Testing

23.5.4.1. NIST

23.5.4.1.1. FIPS 140-2

23.5.5. Anti-Malware Testing

23.5.5.1. VirusBTN

23.5.5.2. Av-Comparatives

23.5.5.3. AV-Test

23.6. Security Product Testing/Evaluation

23.6.1. Product Certification/Assurance

23.6.1.1. ICSA Labs

23.6.1.2. Common Criteria for Information Technology Security Evaluation (CCITSE)

23.6.1.2.1. EAL1 through EAL7

23.7. User Interface Consulting/Development

23.7.1. BlinkUX

23.7.2. Marketing

23.7.2.1. Agencies

23.7.2.1.1. Toolbox Studios

23.7.2.2. Market Destinations (Sites)

23.7.2.2.1. SCmagazine

23.7.2.2.2. Hak5

23.7.2.2.3. CRN