Information Security Technologies & Markets

.Global software security vendors, providers

시작하기. 무료입니다
또는 회원 가입 e메일 주소
Information Security Technologies & Markets 저자: Mind Map: Information Security Technologies & Markets

1. Advanced Threat Detection/Prevention

1.1. Advanced Network Threat Protection

1.1.1. Runtime Emulation

1.1.1.1. ValidEDGE

1.1.1.2. General Dynamics

1.1.1.2.1. Fidelis Systems

1.1.1.3. Checkpoint Software

1.1.2. Advanced Threat Intelligence

1.1.2.1. LookingGlass

1.1.3. Virtual Execution Assessment

1.1.3.1. Cloud Based

1.1.3.1.1. Netwitness

1.1.3.1.2. CrowdStrike

1.1.4. Appliances

1.1.4.1. AhnLab

1.1.4.2. Damballa

1.1.4.3. FireEye

1.1.4.3.1. Malware Analysis Appliance

1.1.4.4. Lastline

1.1.4.5. ThreatTrack

1.1.5. Network Monitoring/Detection

1.1.5.1. Netwitness

1.1.5.2. Kindsight

1.1.5.3. Taasera

1.1.6. Exploit Technique Prevention Software

1.1.6.1. Cyvera

1.1.6.2. Microsoft

1.1.6.2.1. EMET

1.2. Appliance Based

1.2.1. AhnLab

1.2.2. CheckPoint Software

1.2.3. ContentKeeper

1.2.4. Cyphort

1.2.5. Damballa

1.2.6. FireEye

1.2.7. HBGary

1.2.8. LastLine

1.2.9. McAfee

1.2.10. Palo Alto Networks

1.2.11. RSA

1.2.11.1. Security Analytics (Formerly Netwitness)

1.2.11.1.1. Spectrum

1.2.12. Trend Micro

1.3. Malware Analysis

1.3.1. Malware Analysis as a Service

1.3.1.1. Free Services

1.3.1.1.1. Malwr

1.3.2. Software

1.3.2.1. Norman

1.3.2.1.1. Malware Analyzer G2

1.3.2.2. GFI

1.3.2.2.1. GFI Sandbox

1.3.2.3. Joesecurity

1.3.2.3.1. Joe Sandbox

1.3.3. Firewalls

1.3.3.1. Palo Alto Networks

1.3.3.2. CheckPoint Software

1.3.3.3. Fortinet

1.4. Endopoint Sandboxes and Virtualized Containers

1.4.1. Sandboxes

1.4.1.1. Panda

1.4.1.2. Norman

1.4.1.3. Sandboxie

1.4.1.4. Bitdefender

1.4.2. Virtualized Containers

1.4.2.1. Bromium

1.4.3. Type-0 Hypervisors

1.4.3.1. Lynxworks

1.4.3.2. Zirtu

1.5. Endpoint Threat Detection and Response

1.5.1. Access Data

1.5.1.1. CIRT

1.5.2. Carbon Black

1.5.3. Countertack

1.5.4. CrowdStrike

1.5.5. Cyvera

1.5.6. Guidance Software

1.5.6.1. Encase Cybersecurity

1.5.7. HBGary

1.5.8. Invincea

1.5.9. Mandiant

1.5.10. Triumfant

1.6. Network Behavior Analysis

1.6.1. Flow Analysis

1.6.1.1. Lancope

1.6.1.2. Arbor Networks

1.6.2. Network Traffic (Sniffers)

1.6.2.1. Arbor Networks

1.6.2.2. Lastline

1.6.2.3. Light Cyber

1.6.2.4. McAfee NBA

1.7. Security as a Service

1.7.1. Mail

1.7.1.1. Proofpoint

1.7.2. Malware Infection Monitoring Services

1.7.2.1. Lastline

1.7.2.1.1. Guardia

1.7.2.2. Qualys

1.7.2.3. Seculert

2. Data Loss Prevention (DLP)

2.1. Gateway

2.1.1. McAfee

2.1.2. Symantec

2.2. Host

2.2.1. McAfee

2.2.2. RSA

2.2.3. Symantec

2.2.4. Trustwave

2.3. Security as a Service

2.3.1. Consumer

2.3.1.1. Reputation.com

2.3.1.2. Social Fortress

2.3.1.3. PwnedList

2.3.2. Enterprise

2.3.2.1. Social Fortress

2.3.2.2. Google Apps

2.3.2.2.1. Cloudlock

3. Web/Email Protection

3.1. Secure Email Gateways

3.1.1. Bluecoat

3.1.2. Fortinet

3.1.3. McAfee

3.1.4. Sonicwall

3.1.5. Symantec

3.1.6. Trustwave

3.1.7. Websense

3.1.8. iBoss

3.2. Secure Web Gateways

3.2.1. Bluecoat

3.2.2. ContentKeeper

3.2.3. McAfee

3.2.4. Symantec

3.2.5. Trustwave

3.2.6. Websense

3.2.7. iBoss

3.3. Security as a Service

3.3.1. Web & Email SaaS

3.3.1.1. Appriver

3.3.1.2. Barracuda

3.3.1.3. Cisco

3.3.1.4. McAfee

3.3.1.5. Spamina

3.3.1.6. Symantec

3.3.1.7. Total Defense

3.3.1.8. Websense

3.3.1.9. Zscaler

3.3.2. Web Only

3.3.2.1. ContentKeeper

4. Database Security

4.1. Database Audit and Protection

4.1.1. Application Security, Inc

4.1.2. BeyondTrust

4.1.3. Fortinet

4.1.4. GreenSQL

4.1.5. IBM

4.1.6. Imperva

4.1.7. McAfee

4.1.8. Mentis Software

4.1.9. Oracle Corp

4.1.10. PentaSecurity

4.1.11. Warevalley

5. ValidEDGE

6. Network Security

6.1. Denial of Service Protection

6.1.1. Appliances

6.1.1.1. Arbor Networks

6.1.1.1.1. Prevail APS

6.1.1.2. Check Point Software

6.1.1.2.1. DDos Protector

6.1.1.3. Corero

6.1.1.4. Fortinet

6.1.1.5. Genie Networks

6.1.1.5.1. ATM Appliances

6.1.1.6. NSFOCUS

6.1.1.7. Radware

6.1.2. Security as a Service

6.1.2.1. Akamai

6.1.2.2. Black Lotus

6.1.2.3. Cloudflare

6.1.2.4. Incapsula

6.1.2.5. Link11

6.1.2.6. Prolexic

6.1.2.7. Neustar

6.1.2.8. Verisign

6.1.3. Clean Pipe Services

6.1.3.1. AT&T

6.1.3.2. Verizon

6.2. Network Access Control (NAC)

6.2.1. Host Based

6.2.1.1. Symantec

6.2.1.2. McAfee

6.2.2. Network Based

6.2.2.1. Forescout

6.2.2.2. Cisco

6.2.2.3. Bradford Networks

6.2.2.4. Milton Security Group

6.3. Network Firewalls

6.3.1. Enterprise Firewalls

6.3.1.1. Next Generation Firewalls

6.3.1.1.1. Fortinet

6.3.1.1.2. Palo Alto Networks

6.3.1.1.3. CheckPoint Software

6.3.1.2. Stateful Inspection - Traditional Firewalls

6.3.1.2.1. Cisco

6.3.1.2.2. Meraki

6.3.1.2.3. HP

6.3.1.2.4. Huawei

6.3.2. Open Source Based

6.3.2.1. IPchains

6.3.2.2. Untangle

6.3.3. Router Firewalls

6.4. Network Intrusion Prevention

6.4.1. CheckPoint

6.4.2. HP

6.4.2.1. TippingPoint

6.4.3. IBM

6.4.4. McAfee

6.4.5. Sourcefire

6.5. Unified Threat Management

6.5.1. CheckPoint

6.5.2. Cisco

6.5.3. Clavister

6.5.4. Fortinet

6.5.5. Hillstone Networks

6.5.6. Sonicwall

6.5.7. Sophos/Astaro

6.5.8. Trustwave

6.5.9. Untangle

6.5.10. WatchGuard

7. Forensics & eDiscovery

7.1. Forensic Products

7.1.1. eDiscovery

7.1.1.1. Clearwell

7.1.1.2. Kazeon

7.1.1.3. Guidance Software

7.1.1.4. Access Data

7.1.1.5. Autonomy

7.1.1.6. kCura

7.1.1.7. FTI Technology

7.1.1.8. Barracuda Networks

7.1.2. Mobile Devices

7.1.2.1. Cellebrite

7.1.2.2. Paraben

7.1.2.3. Oxygen

7.1.3. Computing Systems

7.1.3.1. Guidance Software

7.1.3.2. Access Data

7.1.3.3. BlackBag

7.1.3.4. OSForensics

7.1.3.5. Xways Forensics

7.1.3.6. Cylance

7.1.4. Network Forensics

7.1.4.1. Access Data

7.1.4.2. BlueCoat

7.1.4.3. Cybertap

7.1.4.4. Endace

7.1.4.5. Fluke Networks

7.1.4.6. NetAgent

7.1.4.7. NetResec

7.1.4.8. NetScout

7.1.4.9. Niksun

7.1.4.10. Packetsled

7.1.4.11. RSA (EMC)

7.1.4.12. Riverbed

7.1.4.13. WildPackets

7.2. Forensics as a Service (FaaS)

7.3. Incident Response Legal Services

7.3.1. Information Law Group

7.4. eDiscovery Services

7.4.1. Robert Half

7.4.2. Advanced Discovery

8. Chip Layer Security

8.1. AMD

8.1.1. TPM

8.2. Cavium

8.2.1. Multi-Core Processors

8.3. Flow Processors

8.3.1. Netronome

8.4. Intel

8.4.1. TPM

8.4.2. Data Execution Protection

9. Software as a Service

9.1. Google Apps

9.1.1. CloudLock

9.1.2. FiLink

10. Channel/Logistics/Supply Chain/OEMs/Product Testing/Marketing

10.1. Cloud Service Brokerages

10.1.1. Jamcracker

10.1.2. Gravitant

10.1.3. StandingCloud

10.1.4. Bitnami

10.2. Distribution/Channel

10.2.1. VARs, Resellers

10.2.1.1. China

10.2.1.1.1. Rainbow Tech

10.2.1.1.2. Broad Sky Innovation Technology

10.2.1.1.3. Qast Software Group

10.2.1.2. Eastern Europe

10.2.1.2.1. CZECH Republic

10.2.1.2.2. Poland

10.2.1.3. Emerging Asia Pacific

10.2.1.3.1. India

10.2.1.3.2. Indonesia

10.2.1.3.3. Malasia

10.2.1.3.4. Thailand

10.2.1.3.5. Philippines

10.2.1.4. Eurasia

10.2.1.4.1. Russian Federation

10.2.1.4.2. Kazakhstan

10.2.1.4.3. Ukraine

10.2.1.5. Latin America

10.2.1.5.1. Brazil

10.2.1.5.2. Chile

10.2.1.5.3. Columbia

10.2.1.5.4. Costa Rica

10.2.1.5.5. Ecuador

10.2.1.5.6. Bolivia

10.2.1.5.7. Venezuela

10.2.1.5.8. Cuba

10.2.1.5.9. Argentina

10.2.1.5.10. Buenos Aires

10.2.1.5.11. Mexico

10.2.1.5.12. Peru

10.2.1.6. Mature Asia Pacific

10.2.1.6.1. Australia

10.2.1.6.2. Japan

10.2.1.6.3. Singapore

10.2.1.7. Middle East and North Africa

10.2.1.7.1. Turkey

10.2.1.7.2. Israel

10.2.1.7.3. Saudi Arabia

10.2.1.7.4. South Africa

10.2.1.7.5. India

10.2.1.7.6. United Arab Emirates

10.2.1.8. North America

10.2.1.8.1. United States

10.2.1.8.2. Canada

10.2.1.9. Sub-Sahara Africa

10.2.1.9.1. South Africa

10.2.1.10. Western Europe

10.2.1.10.1. France

10.2.1.10.2. Germany

10.2.1.10.3. Italy

10.2.1.10.4. Netherlands

10.2.1.10.5. Spain

10.2.1.10.6. United Kingdom

10.2.1.11. WorldWide

10.2.1.11.1. AT&T

10.2.1.11.2. Verizon Business

10.2.2. Distributors

10.2.2.1. China

10.2.2.1.1. Huagai

10.2.2.1.2. Ecschina

10.2.2.1.3. B & Data Technology Co. Ltd.

10.2.2.1.4. Beijing Advazone Electronic Limited Comp

10.2.2.1.5. Beijing HolyZone Technology Co.,Ltd.

10.2.2.1.6. Digital China Technology LTD.

10.2.2.1.7. M.Tech (Shanghai) Co., Ltd.

10.2.2.1.8. Sky Faith International Enterprise

10.2.2.2. Emerging Asia Pacific

10.2.2.2.1. India

10.2.2.2.2. Indonesia

10.2.2.3. Eurasia

10.2.2.3.1. Russian Federation

10.2.2.3.2. Kazakhstan

10.2.2.4. Mature Asia Pacific

10.2.2.4.1. Singapore

10.2.2.4.2. Japan

10.2.2.4.3. South Korea

10.2.2.5. Middle East and South Africa

10.2.2.5.1. United Arab Emirates

10.2.2.6. North America

10.2.2.6.1. Canada

10.2.2.6.2. United States

10.2.2.7. Sub-Sahara Africa

10.2.2.7.1. South Africa

10.2.2.8. Worldwide

10.2.2.8.1. Ingram Micro

10.2.2.8.2. Tech Data

10.2.2.8.3. Westcon

10.3. Managed Service Enablement

10.3.1. Chartec

10.3.2. Jamcracker

10.4. OEM Manufacturers/Integrators

10.4.1. Appliances

10.4.1.1. Netronome

10.4.1.2. Lanner

10.4.1.3. Caswell

10.4.1.4. Portwell

10.4.2. Appliance Integrators

10.4.2.1. Dan-el Technologies Ltd.

10.4.2.2. Advantech

10.4.3. Chips

10.4.3.1. Cavium

10.4.3.2. Netronome

10.4.4. Cards

10.4.4.1. Netronome

10.4.5. Encryption Acceleration

10.4.5.1. Intel

10.4.5.1.1. VPRO

10.4.5.2. Safenet

10.4.5.2.1. Luna PCI

10.4.6. Software

10.4.6.1. Social Network Content Control

10.4.6.1.1. NetboxBlue

10.4.6.2. URL Categorization

10.4.6.2.1. Zvelo

10.4.6.3. Advanced Threat Protection - Virtual Execution Engines

10.4.6.3.1. ContentKeeper

10.4.6.4. Image Recognition

10.4.6.4.1. Image Analyzer

10.4.6.5. AntiMalware

10.4.6.5.1. Commtouch

10.4.6.6. Encryption

10.4.6.6.1. Transport

10.5. Product Testing

10.5.1. United Kingdom

10.5.1.1. Dennis Technology Labs

10.5.2. Generic Product Testing

10.5.2.1. North America

10.5.2.1.1. NIST

10.5.2.1.2. ICSA Labs (Division of Verizon)

10.5.2.1.3. NSS Labs

10.5.2.1.4. CGI

10.5.3. Sponsored Product Review/Testing

10.5.3.1. Network Testing Labs

10.5.3.2. West Coast Labs

10.5.3.3. Miercom

10.5.3.4. NSS Labs

10.5.4. Cryptographic Testing

10.5.4.1. NIST

10.5.4.1.1. FIPS 140-2

10.5.5. Anti-Malware Testing

10.5.5.1. VirusBTN

10.5.5.2. Av-Comparatives

10.5.5.3. AV-Test

10.6. Security Product Testing/Evaluation

10.6.1. Product Certification/Assurance

10.6.1.1. ICSA Labs

10.6.1.2. Common Criteria for Information Technology Security Evaluation (CCITSE)

10.6.1.2.1. EAL1 through EAL7

10.7. User Interface Consulting/Development

10.7.1. BlinkUX

10.7.2. Marketing

10.7.2.1. Agencies

10.7.2.1.1. Toolbox Studios

10.7.2.2. Market Destinations (Sites)

10.7.2.2.1. SCmagazine

10.7.2.2.2. Hak5

10.7.2.2.3. CRN

11. Identity and Access Management (IAM)

11.1. Certificates

11.1.1. Symantec (Formerly VeriSign)

11.2. AD/Unix bridge

11.2.1. Centrify

11.3. Privileged account management (PAM)

11.3.1. BeyondTrust

11.3.2. Lieberman Software

11.3.3. Cyber Ark

11.4. Identity governance and administration

11.4.1. CA Technologies

11.4.2. IBM Security

11.4.3. Oracle

11.4.4. RSA (Aveksa)

11.5. Security as a Service

11.5.1. Identity and Access Management (IDaaS)

11.5.1.1. Symplifyed

11.5.1.2. Ping Identity

11.6. Secure USB dongles

11.6.1. IronKey

11.7. User Authentication

11.7.1. Tokens

11.7.1.1. OOB authentication

11.7.1.1.1. SMS

11.7.1.1.2. Voice

11.7.1.1.3. Push

11.7.1.1.4. Email

11.7.1.1.5. Social media

11.7.1.2. OTP tokens

11.7.1.2.1. OTP hardware tokens

11.7.1.2.2. OTP software tokens for smart phones

11.7.1.3. X.509 tokens

11.7.1.4. Other tokens

11.7.1.4.1. ANECT AS - ALUCID

11.7.2. Contextual authentication

11.7.3. KBA

11.7.4. Biometrics

11.7.4.1. Behavioral

11.7.4.1.1. Typing rhythm/keystroke dynamics

11.7.4.1.2. Voice recognition

11.7.4.2. Biological

11.7.4.2.1. Face recognition

11.7.4.2.2. Fingerprint

11.7.5. Wide-focus vendors

11.7.5.1. RSA

11.7.5.2. SafeNet

11.7.5.3. VASCO

11.7.5.4. CA Technologies

11.7.5.5. HID Global

11.7.5.6. Technology Nexus

11.7.5.7. Symantec

11.7.5.8. Entrust

11.8. Enterprise single sign-on (ESSO)

11.9. Web access management (WAM)

11.10. Federated SSO

11.11. Externalized authorization management (EAM)

11.11.1. Axiomatics

11.11.2. Dell Quest (BitKoo)

11.12. Access Management

11.12.1. CionSystems

12. Encryption/Tokenization

12.1. Cloud/SAAS Encryption

12.1.1. Appliances

12.1.1.1. Office365

12.1.1.1.1. Vaultive

12.1.1.1.2. FiLink

12.1.1.2. Ciphercloud

12.1.1.3. Afore Solutions

12.1.1.3.1. CloudLink VSA

12.1.1.4. Perspecsys

12.1.2. Software

12.1.2.1. BoxCryptor

12.1.2.2. SafeNet

12.1.2.2.1. SafeMonk

12.1.2.3. PrivateCore

12.1.2.4. Trend Micro

12.1.2.4.1. SecureCloud

12.1.3. Software as a Service

12.1.3.1. Trend Micro

12.1.3.1.1. SecureCloud

12.2. Data masking

12.2.1. Oracle

12.3. Database

12.3.1. SafeNet

12.3.2. Dark Matter Labs

12.3.3. Vormetric

12.4. File/Folder

12.4.1. WinMagic

12.4.1.1. SecureDoc

12.4.2. Symantec (PGP)

12.4.3. IBM

12.4.3.1. Mainframe

12.4.3.1.1. z10

12.4.4. Sophos

12.4.4.1. SafeGuard Enterprise (Utimaco)

12.4.5. Vormetric

12.5. Mobile Storage/USB

12.5.1. IronKey

12.6. Tokenization

12.6.1. Protegrity

12.7. Whole Disk

12.7.1. McAfee

12.7.2. Symantec (PGP)

12.7.3. CheckPoint Software

12.7.4. Encryption Management

12.7.4.1. Wave Systems

12.7.5. WinMagic

12.7.5.1. SecureDoc

12.7.6. Microsoft

12.7.6.1. Bitlocker

12.7.7. Sophos

12.7.7.1. SafeGuard Enterprise (Utimaco)

12.7.8. Trustwave

12.7.8.1. DataControl

12.7.9. Vormetric

13. Managed Security Services

13.1. Indirect Providers

13.1.1. Asia Pacific

13.1.1.1. Singapore

13.1.1.1.1. e-Cop

13.1.1.1.2. NTT Singapore

13.1.1.1.3. Singtel

13.1.1.1.4. NCS Group

13.1.1.2. China

13.1.1.2.1. Hong Kong

13.1.1.3. Australia

13.1.2. Europe

13.1.2.1. BT Global Services

13.1.2.2. Dell SecureWorks

13.1.2.3. Germany

13.1.2.3.1. Link11 GMBH

13.1.2.3.2. IPsoft

13.1.2.4. HP

13.1.2.5. Integralis

13.1.2.6. Open Systems

13.1.2.7. Open Systems

13.1.2.8. Orange Business Services

13.1.2.9. Symantec

13.1.2.10. T-Systems

13.1.2.11. Tata Communications

13.1.2.12. Telefonica

13.1.2.12.1. DDoS Protection Service

13.1.2.12.2. Email Encryption

13.1.2.12.3. Email Security Gateway

13.1.2.12.4. Firewall Management

13.1.2.12.5. IAM

13.1.2.12.6. Intrusion Detection

13.1.2.12.7. Intrusion Prevention

13.1.2.12.8. Log Management

13.1.2.12.9. SIEM

13.1.2.12.10. Vulnerability Assessment

13.1.2.12.11. Web Security Gateway

13.1.2.12.12. Anti-Fraud

13.1.2.13. Verizon Business

13.1.2.13.1. Anti-DDoS

13.1.2.13.2. Email Security

13.1.2.13.3. Endpoint Protection

13.1.2.13.4. Firewall Management

13.1.2.13.5. Intrusion Detection

13.1.2.13.6. Intrusion Prevention

13.1.2.13.7. SIEM

13.1.2.13.8. Vulnerability Assessment

13.1.2.13.9. Web Security

13.1.2.14. Wipro

13.1.2.14.1. Email Security Gateway

13.1.2.14.2. Endpoint Security

13.1.2.14.3. Firewall Management

13.1.2.14.4. Fraud Management/Anti-Money Laundering

13.1.2.14.5. GRC

13.1.2.14.6. IAM

13.1.2.14.7. Intrusion Detection

13.1.2.14.8. Intrusion Prevention

13.1.2.14.9. SIEM

13.1.2.14.10. User Access Management

13.1.2.14.11. Web Security Gateway

13.1.3. Global Providers

13.1.3.1. AT&T

13.1.3.1.1. DDos Protection

13.1.3.1.2. Email/Data Encryption Services

13.1.3.1.3. Endpoint Anti-Virus

13.1.3.1.4. Endpoint Patch Management

13.1.3.1.5. Endpoint Policy Compliance

13.1.3.1.6. Mobile Device Security

13.1.3.1.7. Secure Email Gateway

13.1.3.1.8. Security Device Management

13.1.3.1.9. Web Application Firewall

13.1.3.1.10. Web Gateway (URL & Malware Filtering)

13.1.3.2. BT

13.1.3.3. Dell Secureworks

13.1.3.3.1. Advanced Malware Protection

13.1.3.3.2. Email Security Gateway

13.1.3.3.3. Firewall Management

13.1.3.3.4. Host IPS

13.1.3.3.5. IDS/IPS

13.1.3.3.6. Log Management

13.1.3.3.7. Log Retention

13.1.3.3.8. SIEM

13.1.3.3.9. Threat Intelligence

13.1.3.3.10. Unified Threat Management

13.1.3.3.11. Vulnerability Assessment

13.1.3.3.12. Web Application Firewall

13.1.3.3.13. Web Application Vulnerability Assessment

13.1.3.4. Dimension Data

13.1.3.5. HP

13.1.3.5.1. Access Managment

13.1.3.5.2. Data Loss Prevention

13.1.3.5.3. Email Security Gateway

13.1.3.5.4. Endpoint Encryption

13.1.3.5.5. Endpoint Protection

13.1.3.5.6. Intrusion Detection

13.1.3.5.7. Intrusion Prevention

13.1.3.5.8. Managed Incident Response

13.1.3.5.9. Remote Access Management

13.1.3.5.10. SIEM

13.1.3.5.11. Vulnerability Assessment

13.1.3.5.12. Web Application Vulnerability Assessment

13.1.3.5.13. Web Security Gateway

13.1.3.6. IBM

13.1.3.6.1. Email Security Gateway

13.1.3.6.2. Endpoint Patch Management

13.1.3.6.3. Endpoint Policy Management

13.1.3.6.4. Endpoint Protection

13.1.3.6.5. Firewall Management

13.1.3.6.6. IAM

13.1.3.6.7. Intrusion Detection

13.1.3.6.8. Intrusion Prevention

13.1.3.6.9. Log Management

13.1.3.6.10. Mobile Device Security

13.1.3.6.11. SIEM

13.1.3.6.12. Unified Threat Management

13.1.3.6.13. Vulnerability Assessment

13.1.3.6.14. Web Security Gateway

13.1.3.6.15. Web Vulnerability Assessment

13.1.3.7. Telstra

13.1.3.8. Verizon Business

13.1.3.8.1. Anti-DDoS

13.1.3.8.2. Email Security

13.1.3.8.3. Endpoint Protection

13.1.3.8.4. Firewall Management

13.1.3.8.5. Intrusion Detection

13.1.3.8.6. Intrusion Prevention

13.1.3.8.7. SIEM

13.1.3.8.8. Vulnerability Assessment

13.1.3.8.9. Web Security

13.1.4. Middle East and North Africa

13.1.4.1. Saudi Arabia

13.1.4.2. United Arab Emirates

13.1.4.2.1. Du Telecom

13.1.5. North America

13.1.5.1. Canada

13.1.5.1.1. Above Security

13.1.5.1.2. Bell Canada

13.1.5.1.3. OneStone (Formerly Seccuris)

13.1.5.1.4. EWA

13.1.5.1.5. SentryMetrics

13.1.5.1.6. Netpulse

13.1.5.2. United States

13.1.5.2.1. AT&T

13.1.5.2.2. Alert Logic

13.1.5.2.3. Allstream

13.1.5.2.4. CGI

13.1.5.2.5. CSC

13.1.5.2.6. CenturyLink- Savvis

13.1.5.2.7. Clone Systems

13.1.5.2.8. Compucom Systems

13.1.5.2.9. Dell Secureworks

13.1.5.2.10. HCL Technologies

13.1.5.2.11. HP

13.1.5.2.12. IBM

13.1.5.2.13. Megapath

13.1.5.2.14. Nuspire Networks

13.1.5.2.15. SAIC

13.1.5.2.16. Secure Designs

13.1.5.2.17. SilverSky (Formerly Stillsecure/Perimeter esecurity)

13.1.5.2.18. Solutionary

13.1.5.2.19. Sword and Shield

13.1.5.2.20. Symantec

13.1.5.2.21. Trustwave

13.1.5.2.22. Verizon Business

13.1.5.2.23. Wipro

13.2. Direct Tech Providers Managed Security

13.2.1. Asia Pacific

13.2.1.1. Australia

13.2.1.2. China

13.2.1.2.1. NSFOCUS

13.2.1.3. Singapore

13.2.2. Europe

13.2.3. Global Providers

13.2.4. Middle East and North Africa

13.2.4.1. Saudi Arabia

13.2.4.2. United Arab Emirates

13.2.5. North America

13.2.5.1. United States

13.2.5.1.1. NSFOCUS

13.2.5.1.2. Check Point Software

14. Virtual Private Networking (VPN)

14.1. IPSec VPN

14.1.1. Cisco

14.1.2. CheckPoint Software

14.1.3. Certes Networks

14.2. Layer 2 Encryption

14.2.1. Certes Networks

14.3. Layer 4 Encryption

14.3.1. Certes Networks

14.4. SSL VPN

14.4.1. Juniper

14.4.2. Cisco

14.4.3. Sonicwall

14.4.4. Barracuda Networks

14.4.5. Stonesoft

14.4.6. F5 Networks

14.4.7. Citrix

14.4.8. WatchGuard

14.4.9. NetGear

14.4.10. Array Networks

15. Vulnerability Assessment/Management (VA/VM)

15.1. Managed Penetration Testing Services

15.1.1. WhiteHatSecurity

15.2. Penetration TestingSoftware

15.2.1. Core Security

15.2.2. Rapid7

15.2.2.1. Metasploit Pro

15.2.2.2. Metasploit Express

15.3. Software as a Service

15.3.1. Digital Defense

15.3.2. McAfee

15.3.3. Outpost24

15.3.4. Qualys

15.4. Network Vulnerability Assessment (On Premise)

15.4.1. Digital Defense

15.4.2. Fortinet

15.4.3. McAfee

15.4.3.1. McAfee Vulnerability Manager (Foundstone)

15.4.4. NSAuditor

15.4.5. Ncircle

15.4.6. Netasq

15.4.7. Outpost24

15.4.8. Qualys

15.4.9. Rapid 7

15.4.9.1. Nexspose

15.5. Web Application Security

15.5.1. Code Review Products

15.5.1.1. HP

15.5.1.2. IBM

15.5.2. Runtime Application Self Protection

15.5.2.1. Metaforic

15.5.2.2. Arxan

15.5.3. Scanning Services

15.5.3.1. High-Tech Bridge

15.5.3.2. McAfee Secure

15.5.3.3. WebSecurify

15.5.3.4. Qualys

15.5.3.5. WhiteHat

15.5.3.6. Controlscan

15.5.4. Scanning Software

15.5.4.1. Open Source

15.5.4.1.1. Arachni Scanner

15.5.4.1.2. Subgraph

15.5.4.1.3. W3af

15.5.4.1.4. Wapiti

15.5.4.1.5. Watcher

15.5.4.2. Commercial

15.5.4.2.1. Accunetix

15.5.4.2.2. BeyondTrust

15.5.4.2.3. Cenzic

15.5.4.2.4. HP

15.5.4.2.5. MavitunaSecurity

15.5.4.2.6. NTObjectives

15.5.4.2.7. Nstalker

15.5.4.2.8. Portswigger

15.5.4.2.9. Syhunt

15.6. Vulnerability Reporting/Tracking

15.6.1. Risk IO

15.7. Vulnerability Research

15.7.1. CSC

15.7.2. HP

15.7.2.1. DV Labs

15.7.3. HotWAN

15.7.4. McAfee

15.7.5. SecNiche Labs

15.7.6. Sourcefire VRT

15.7.7. Symantec

15.7.8. VRLSec

15.7.9. Vupen

16. End User Privilege Management

16.1. Viewfinity

17. Consulting

17.1. Application Security

17.1.1. Web

17.1.1.1. AppSec Consulting

17.1.1.2. Denim Group

17.1.2. Mobile

17.1.2.1. AppSec Consulting

17.1.2.2. Denim Group

17.2. Compliance

17.2.1. HIPAA

17.2.2. HITECH

17.2.3. ISO

17.2.4. PCI

17.2.4.1. WorldWide

17.2.4.1.1. Wipro

17.2.4.1.2. Dell Secureworks

17.2.4.1.3. Deloitte and Touche

17.2.4.1.4. EY

17.2.4.1.5. BT

17.2.4.1.6. PWC

17.2.4.2. Regional

17.2.4.2.1. North America

17.2.4.2.2. Latin America

17.2.4.2.3. EMEA

17.2.4.2.4. Asia Pacific

17.3. Governance

17.3.1. Accuvant

17.3.2. Fishnet Security

17.3.3. FOX-IT

17.4. Incident Response

17.4.1. Forensics

17.4.1.1. FOX-IT

17.4.1.2. PWC

17.4.1.3. Fishnet Security

17.4.1.4. EY

17.4.1.5. Deloitte

17.4.2. Digital Investigations

17.4.2.1. FOX-IT

17.4.2.2. Deloitte

17.4.2.3. EY

17.4.2.4. Fishnet Security

17.4.2.5. PWC

17.5. Penetration Testing

17.5.1. AppSec Consulting

17.5.2. Core Security

17.5.3. Element Digital Security

17.5.4. FOX-IT

17.5.5. Matasano Security

17.5.6. Rapid7

17.5.7. Secureworks

17.5.8. WhiteHat Security

17.6. Risk Management

17.6.1. Booz Allen Hamilton

17.6.2. Accuvant

17.6.3. Cloud Risks

17.6.4. On Premise Infrastructure

17.6.5. Business Risk

17.7. Security Program Development

17.7.1. Accuvant

17.7.2. Fishnet

17.7.3. FOX-IT

18. Fraud Prevention

18.1. Appliances

18.1.1. Silvertail Systems

18.2. Software

18.2.1. RSA (EMC)

18.2.2. Cisco (Formerly Trusteer)

18.3. Software as a Service

18.3.1. ThreatMetrix

18.3.2. X-Cart

18.3.3. MarkMonitor

18.3.4. iovation

19. Governance, Risk and Compliance

19.1. Firewall Workflow,Modeling & Change Management

19.1.1. Firemon

19.1.2. Skybox

19.1.3. ManageEngine

19.1.4. Redseal Networks

19.1.5. Tufin

19.1.6. Checkpoint Software

19.2. eGRC

19.2.1. Software as a Service

19.2.1.1. Bwise

19.2.2. Software

19.2.2.1. Sword Achiever

19.2.2.2. BPS Resolver

19.2.2.3. Jade Software

19.2.2.4. Walters Kluwer Financial Services

19.2.2.5. SAI

19.2.2.6. Oracle

19.2.2.7. MetricStream

19.2.2.8. Nasdaq Bwise

19.2.2.9. SAP

19.2.2.10. RSA

19.2.2.10.1. Archer

19.2.2.11. OpenPages

19.2.2.12. MetricStream

19.2.2.13. IBM

19.2.2.13.1. Openpages

19.2.2.14. Thompson Reuters

19.2.2.15. Rsam

19.2.2.16. Mega

19.2.2.16.1. Mega Suite

19.2.2.17. Software AG

19.2.2.18. Protivity

19.2.2.19. CMO Compliance

19.2.2.20. Enablon

19.2.2.21. Cura Technologies

19.3. itGRCM

19.3.1. Allgress

19.3.1.1. Vulnerability Manager

19.3.1.2. Risk Analysis

19.3.1.3. Security and Compliance Assessment

19.3.1.4. Incident Management

19.3.1.5. Policy and Proceedures

19.3.2. Symantec

19.3.2.1. Control Compliance Suite

19.3.3. Modulo

19.3.4. Rsam

19.3.5. Agiliance

19.3.6. Brinqa

19.3.7. Nasdaq Bwise

19.3.8. ControlCase

19.3.9. EMC-RSA

19.3.10. Lumension Security

19.3.11. Microsoft

19.3.12. Telos

19.3.13. Software as a Service

19.3.13.1. SureCloud

19.4. Operational Risk Analytics

19.4.1. RiskIO

19.4.2. Skybox

19.4.3. Firemon

19.4.4. Redseal Networks

19.4.5. Algosec

19.4.6. Tufin

19.4.7. Solarwinds

19.4.8. IBM

19.4.8.1. Q1Radar Risk Manager

20. Intelligence Services/Data Feeds

20.1. Anti-Spam

20.1.1. www.au.sorbs.net

20.2. IP Blacklists

20.2.1. SpamHaus

20.2.2. Team Cymru

20.2.3. Dshield

20.2.4. hosts-file.net

20.3. Malware Analysis/Blocklists

20.3.1. Malware Patrol

20.3.2. hosts-file.net

20.3.3. zeustracker.abuse.ch

20.3.4. websecurityguard.com

20.3.5. SpamHaus

20.3.6. Botnets

20.3.6.1. spyeyetracker.abuse.ch

20.3.7. MalwareDomainList.com

20.3.8. ThreatGrid

20.3.9. VirusTotal

20.3.10. emergingthreats.net

20.3.11. www.malwareblacklist.com/

20.3.12. www.malware.com.br/lists.shtml

20.3.13. Team Cymru

20.4. Reputation Feeds

20.4.1. Symantec

20.4.1.1. Reputation Insight

20.4.2. McAfee

20.4.2.1. Global Threat Intelligence (GTI)

20.4.3. Trend Micro

20.4.3.1. Smart Protection Network

20.5. Threat Intelligence Services

20.5.1. CrowdStrike

20.5.2. Dell

20.5.2.1. Counter Threat Unit - CTU

20.5.3. FOX-IT

20.5.4. Lookingglass Cyber Solutions

20.5.5. McAfee

20.5.6. Proofpoint

20.5.7. Security Starfish

20.5.8. Team Cymru

20.5.9. Verisign

20.6. URL Lists

20.6.1. Shallalist

20.6.2. hosts-file.net

20.6.3. zvelo

20.6.4. http://malc0de.com/database/

20.7. Web Malware Monitoring

20.7.1. evuln.com

20.7.2. Qualys

21. Endpoint Security Platforms (EPP)

21.1. Anti-Malware

21.1.1. North America

21.1.1.1. McAfee

21.1.1.2. MalwareBytes

21.1.1.3. Trend Micro

21.1.1.4. Symantec

21.1.1.5. Total Defense

21.1.2. China

21.1.2.1. Rising International Software

21.1.3. Russia

21.1.3.1. Kaspersky

21.1.4. United Kingdom

21.1.4.1. Sophos

21.1.5. Romania

21.1.5.1. Bitdefender

21.1.6. South Korean

21.1.6.1. BKAV

21.1.7. Czech Republic

21.1.7.1. Avast

21.1.8. Netherlands

21.1.8.1. AVG

21.2. Endpoint Intrusion Prevention

21.2.1. McAfee

21.2.2. Symantec

21.3. File Integrity Monitoring

21.3.1. Open Source

21.3.1.1. 1. AIDE

21.3.1.2. 2. Trend Micro

21.3.1.2.1. 1. OSSEC

21.3.1.3. 3. Samhain

21.3.1.4. 4. Osiris

21.3.1.5. 5. Integrit

21.3.1.6. 6. Tripwire

21.3.2. Commercial

21.3.2.1. Imperva

21.3.2.2. McAfee

21.3.2.3. Tripwire

21.4. Sandboxing/MicroVM

21.4.1. SandBoxie

21.4.2. Norman Sandbox

21.4.3. Bromium

22. Web Application Firewalls (WAF)

22.1. Appliances

22.1.1. Virtualized Appliances

22.1.1.1. AlertLogic

22.1.1.2. Amazon AWS

22.1.1.2.1. Riverbed

22.1.1.3. Barracuda Networks

22.1.1.4. BeeWare

22.1.1.5. Imperva

22.1.1.6. PentaSecurity

22.1.2. Physical Appliances

22.1.2.1. AlertLogic

22.1.2.2. Barracuda Networks

22.1.2.3. BeeWare

22.1.2.4. Cisco

22.1.2.4.1. End of Life January 2011

22.1.2.5. Citrix

22.1.2.6. DPtech

22.1.2.7. DenyAll

22.1.2.8. F5

22.1.2.9. Imperva

22.1.2.10. NSFocus

22.1.2.11. PentaSecurity

22.1.2.12. Riverbed

22.1.2.13. Trustwave

22.2. Managed Services

22.2.1. Dell Secureworks

22.2.2. AT&T

22.2.3. Verizon Business

22.2.4. Cisco

22.3. Software

22.3.1. Apache

22.3.1.1. Applicure

22.3.1.1.1. dotDefender

22.3.2. DenyAll

22.3.3. ERGON Informatik AG

22.3.3.1. AIRLOCK

22.3.4. Juniper

22.3.4.1. Mykonos

22.3.5. Microsoft IIS

22.3.5.1. Applicure

22.3.5.1.1. dotDefender

22.3.5.2. BeyondTrust

22.3.5.3. ThreatSentry

22.3.6. Open Source

22.3.6.1. Mod Security

22.3.6.2. IronBee

22.3.7. Riverbed

22.4. Software as a Service

22.4.1. Akamai

22.4.1.1. Kona

22.4.2. AlertLogic

22.4.3. CloudFlare

22.4.4. Incapsula

22.4.5. Qualys

23. Security Information and Event Management (SIEM) & Log Management

23.1. Log Management

23.1.1. McAfee

23.1.1.1. McAfee Enterprise Log Manager

23.1.2. Tripwire

23.1.3. Splunk

23.1.4. LogRythm

23.2. SIEM

23.2.1. AlienVault

23.2.1.1. OSSIM

23.2.2. HP

23.2.2.1. Arcsight

23.2.3. IBM

23.2.3.1. Q1Radar

23.2.4. LogRythm

23.2.5. McAfee

23.2.5.1. NitroSecurity

23.2.6. Novell

23.2.6.1. Sentinel

23.2.7. RSA

23.2.7.1. Envision

23.2.8. Sensage

23.2.9. Solarwinds

23.2.10. Splunk

23.2.11. Tibco

23.2.11.1. Loglogic

23.2.12. eIQnetworks