Information Security Technologies & Markets
by John Fortner 10/11/2013
Information Security Technologies & Markets
by John Fortner
1. Consulting
1.1. Application Security
1.1.1. Web
1.1.1.1. AppSec Consulting
1.1.1.2. Denim Group
1.1.2. Mobile
1.1.2.1. AppSec Consulting
1.1.2.2. Denim Group
1.2. Compliance
1.2.1. HIPAA
1.2.2. HITECH
1.2.3. ISO
1.2.4. PCI
1.2.4.1. WorldWide
1.2.4.1.1. Wipro
1.2.4.1.2. Dell Secureworks
1.2.4.1.3. Deloitte and Touche
1.2.4.1.4. EY
1.2.4.1.5. BT
1.2.4.1.6. PWC
1.2.4.2. Regional
1.2.4.2.1. North America
1.2.4.2.2. Latin America
1.2.4.2.3. EMEA
1.2.4.2.4. Asia Pacific
1.3. Governance
1.3.1. Accuvant
1.3.2. Fishnet Security
1.3.3. FOX-IT
1.4. Incident Response
1.4.1. Forensics
1.4.1.1. FOX-IT
1.4.1.2. PWC
1.4.1.3. Fishnet Security
1.4.1.4. EY
1.4.1.5. Deloitte
1.4.2. Digital Investigations
1.4.2.1. FOX-IT
1.4.2.2. Deloitte
1.4.2.3. EY
1.4.2.4. Fishnet Security
1.4.2.5. PWC
1.5. Penetration Testing
1.5.1. AppSec Consulting
1.5.2. Core Security
1.5.3. Element Digital Security
1.5.4. FOX-IT
1.5.5. Matasano Security
1.5.6. Rapid7
1.5.7. Secureworks
1.5.8. WhiteHat Security
1.6. Risk Management
1.6.1. Booz Allen Hamilton
1.6.2. Accuvant
1.6.3. Cloud Risks
1.6.4. On Premise Infrastructure
1.6.5. Business Risk
1.7. Security Program Development
1.7.1. Accuvant
1.7.2. Fishnet
1.7.3. FOX-IT
2. Encryption/Tokenization
2.1. Cloud/SAAS Encryption
2.1.1. Appliances
2.1.1.1. Office365
2.1.1.1.1. Vaultive
2.1.1.1.2. FiLink
2.1.1.2. Ciphercloud
2.1.1.3. Afore Solutions
2.1.1.3.1. CloudLink VSA
2.1.1.4. Perspecsys
2.1.2. Software
2.1.2.1. BoxCryptor
2.1.2.2. SafeNet
2.1.2.2.1. SafeMonk
2.1.2.3. PrivateCore
2.1.2.4. Trend Micro
2.1.2.4.1. SecureCloud
2.1.3. Software as a Service
2.1.3.1. Trend Micro
2.1.3.1.1. SecureCloud
2.2. Data masking
2.2.1. Oracle
2.3. Database
2.3.1. SafeNet
2.3.2. Dark Matter Labs
2.3.3. Vormetric
2.4. File/Folder
2.4.1. WinMagic
2.4.1.1. SecureDoc
2.4.2. Symantec (PGP)
2.4.3. IBM
2.4.3.1. Mainframe
2.4.3.1.1. z10
2.4.4. Sophos
2.4.4.1. SafeGuard Enterprise (Utimaco)
2.4.5. Vormetric
2.5. Mobile Storage/USB
2.5.1. IronKey
2.6. Tokenization
2.6.1. Protegrity
2.7. Whole Disk
2.7.1. McAfee
2.7.2. Symantec (PGP)
2.7.3. CheckPoint Software
2.7.4. Encryption Management
2.7.4.1. Wave Systems
2.7.5. WinMagic
2.7.5.1. SecureDoc
2.7.6. Microsoft
2.7.6.1. Bitlocker
2.7.7. Sophos
2.7.7.1. SafeGuard Enterprise (Utimaco)
2.7.8. Trustwave
2.7.8.1. DataControl
2.7.9. Vormetric
3. Governance, Risk and Compliance
3.1. Firewall Workflow,Modeling & Change Management
3.1.1. Firemon
3.1.2. Skybox
3.1.3. ManageEngine
3.1.4. Redseal Networks
3.1.5. Tufin
3.1.6. Checkpoint Software
3.2. eGRC
3.2.1. Software as a Service
3.2.1.1. Bwise
3.2.2. Software
3.2.2.1. Sword Achiever
3.2.2.2. BPS Resolver
3.2.2.3. Jade Software
3.2.2.4. Walters Kluwer Financial Services
3.2.2.5. SAI
3.2.2.6. Oracle
3.2.2.7. MetricStream
3.2.2.8. Nasdaq Bwise
3.2.2.9. SAP
3.2.2.10. RSA
3.2.2.10.1. Archer
3.2.2.11. OpenPages
3.2.2.12. MetricStream
3.2.2.13. IBM
3.2.2.13.1. Openpages
3.2.2.14. Thompson Reuters
3.2.2.15. Rsam
3.2.2.16. Mega
3.2.2.16.1. Mega Suite
3.2.2.17. Software AG
3.2.2.18. Protivity
3.2.2.19. CMO Compliance
3.2.2.20. Enablon
3.2.2.21. Cura Technologies
3.3. itGRCM
3.3.1. Allgress
3.3.1.1. Vulnerability Manager
3.3.1.2. Risk Analysis
3.3.1.3. Security and Compliance Assessment
3.3.1.4. Incident Management
3.3.1.5. Policy and Proceedures
3.3.2. Symantec
3.3.2.1. Control Compliance Suite
3.3.3. Modulo
3.3.4. Rsam
3.3.5. Agiliance
3.3.6. Brinqa
3.3.7. Nasdaq Bwise
3.3.8. ControlCase
3.3.9. EMC-RSA
3.3.10. Lumension Security
3.3.11. Microsoft
3.3.12. Telos
3.3.13. Software as a Service
3.3.13.1. SureCloud
3.4. Operational Risk Analytics
3.4.1. RiskIO
3.4.2. Skybox
3.4.3. Firemon
3.4.4. Redseal Networks
3.4.5. Algosec
3.4.6. Tufin
3.4.7. Solarwinds
3.4.8. IBM
3.4.8.1. Q1Radar Risk Manager
4. Managed Security Services
4.1. Indirect Providers
4.1.1. Asia Pacific
4.1.1.1. Singapore
4.1.1.1.1. e-Cop
4.1.1.1.2. NTT Singapore
4.1.1.1.3. Singtel
4.1.1.1.4. NCS Group
4.1.1.2. China
4.1.1.2.1. Hong Kong
4.1.1.3. Australia
4.1.2. Europe
4.1.2.1. BT Global Services
4.1.2.2. Dell SecureWorks
4.1.2.3. Germany
4.1.2.3.1. Link11 GMBH
4.1.2.3.2. IPsoft
4.1.2.4. HP
4.1.2.5. Integralis
4.1.2.6. Open Systems
4.1.2.7. Open Systems
4.1.2.8. Orange Business Services
4.1.2.9. Symantec
4.1.2.10. T-Systems
4.1.2.11. Tata Communications
4.1.2.12. Telefonica
4.1.2.12.1. DDoS Protection Service
4.1.2.12.2. Email Encryption
4.1.2.12.3. Email Security Gateway
4.1.2.12.4. Firewall Management
4.1.2.12.5. IAM
4.1.2.12.6. Intrusion Detection
4.1.2.12.7. Intrusion Prevention
4.1.2.12.8. Log Management
4.1.2.12.9. SIEM
4.1.2.12.10. Vulnerability Assessment
4.1.2.12.11. Web Security Gateway
4.1.2.12.12. Anti-Fraud
4.1.2.13. Verizon Business
4.1.2.13.1. Anti-DDoS
4.1.2.13.2. Email Security
4.1.2.13.3. Endpoint Protection
4.1.2.13.4. Firewall Management
4.1.2.13.5. Intrusion Detection
4.1.2.13.6. Intrusion Prevention
4.1.2.13.7. SIEM
4.1.2.13.8. Vulnerability Assessment
4.1.2.13.9. Web Security
4.1.2.14. Wipro
4.1.2.14.1. Email Security Gateway
4.1.2.14.2. Endpoint Security
4.1.2.14.3. Firewall Management
4.1.2.14.4. Fraud Management/Anti-Money Laundering
4.1.2.14.5. GRC
4.1.2.14.6. IAM
4.1.2.14.7. Intrusion Detection
4.1.2.14.8. Intrusion Prevention
4.1.2.14.9. SIEM
4.1.2.14.10. User Access Management
4.1.2.14.11. Web Security Gateway
4.1.3. Global Providers
4.1.3.1. AT&T
4.1.3.1.1. DDos Protection
4.1.3.1.2. Email/Data Encryption Services
4.1.3.1.3. Endpoint Anti-Virus
4.1.3.1.4. Endpoint Patch Management
4.1.3.1.5. Endpoint Policy Compliance
4.1.3.1.6. Mobile Device Security
4.1.3.1.7. Secure Email Gateway
4.1.3.1.8. Security Device Management
4.1.3.1.9. Web Application Firewall
4.1.3.1.10. Web Gateway (URL & Malware Filtering)
4.1.3.2. BT
4.1.3.3. Dell Secureworks
4.1.3.3.1. Advanced Malware Protection
4.1.3.3.2. Email Security Gateway
4.1.3.3.3. Firewall Management
4.1.3.3.4. Host IPS
4.1.3.3.5. IDS/IPS
4.1.3.3.6. Log Management
4.1.3.3.7. Log Retention
4.1.3.3.8. SIEM
4.1.3.3.9. Threat Intelligence
4.1.3.3.10. Unified Threat Management
4.1.3.3.11. Vulnerability Assessment
4.1.3.3.12. Web Application Firewall
4.1.3.3.13. Web Application Vulnerability Assessment
4.1.3.4. Dimension Data
4.1.3.5. HP
4.1.3.5.1. Access Managment
4.1.3.5.2. Data Loss Prevention
4.1.3.5.3. Email Security Gateway
4.1.3.5.4. Endpoint Encryption
4.1.3.5.5. Endpoint Protection
4.1.3.5.6. Intrusion Detection
4.1.3.5.7. Intrusion Prevention
4.1.3.5.8. Managed Incident Response
4.1.3.5.9. Remote Access Management
4.1.3.5.10. SIEM
4.1.3.5.11. Vulnerability Assessment
4.1.3.5.12. Web Application Vulnerability Assessment
4.1.3.5.13. Web Security Gateway
4.1.3.6. IBM
4.1.3.6.1. Email Security Gateway
4.1.3.6.2. Endpoint Patch Management
4.1.3.6.3. Endpoint Policy Management
4.1.3.6.4. Endpoint Protection
4.1.3.6.5. Firewall Management
4.1.3.6.6. IAM
4.1.3.6.7. Intrusion Detection
4.1.3.6.8. Intrusion Prevention
4.1.3.6.9. Log Management
4.1.3.6.10. Mobile Device Security
4.1.3.6.11. SIEM
4.1.3.6.12. Unified Threat Management
4.1.3.6.13. Vulnerability Assessment
4.1.3.6.14. Web Security Gateway
4.1.3.6.15. Web Vulnerability Assessment
4.1.3.7. Telstra
4.1.3.8. Verizon Business
4.1.3.8.1. Anti-DDoS
4.1.3.8.2. Email Security
4.1.3.8.3. Endpoint Protection
4.1.3.8.4. Firewall Management
4.1.3.8.5. Intrusion Detection
4.1.3.8.6. Intrusion Prevention
4.1.3.8.7. SIEM
4.1.3.8.8. Vulnerability Assessment
4.1.3.8.9. Web Security
4.1.4. Middle East and North Africa
4.1.4.1. Saudi Arabia
4.1.4.2. United Arab Emirates
4.1.4.2.1. Du Telecom
4.1.5. North America
4.1.5.1. Canada
4.1.5.1.1. Above Security
4.1.5.1.2. Bell Canada
4.1.5.1.3. OneStone (Formerly Seccuris)
4.1.5.1.4. EWA
4.1.5.1.5. SentryMetrics
4.1.5.1.6. Netpulse
4.1.5.2. United States
4.1.5.2.1. AT&T
4.1.5.2.2. Alert Logic
4.1.5.2.3. Allstream
4.1.5.2.4. CGI
4.1.5.2.5. CSC
4.1.5.2.6. CenturyLink- Savvis
4.1.5.2.7. Clone Systems
4.1.5.2.8. Compucom Systems
4.1.5.2.9. Dell Secureworks
4.1.5.2.10. HCL Technologies
4.1.5.2.11. HP
4.1.5.2.12. IBM
4.1.5.2.13. Megapath
4.1.5.2.14. Nuspire Networks
4.1.5.2.15. SAIC
4.1.5.2.16. Secure Designs
4.1.5.2.17. SilverSky (Formerly Stillsecure/Perimeter esecurity)
4.1.5.2.18. Solutionary
4.1.5.2.19. Sword and Shield
4.1.5.2.20. Symantec
4.1.5.2.21. Trustwave
4.1.5.2.22. Verizon Business
4.1.5.2.23. Wipro
4.2. Direct Tech Providers Managed Security
4.2.1. Asia Pacific
4.2.1.1. Australia
4.2.1.2. China
4.2.1.2.1. NSFOCUS
4.2.1.3. Singapore
4.2.2. Europe
4.2.3. Global Providers
4.2.4. Middle East and North Africa
4.2.4.1. Saudi Arabia
4.2.4.2. United Arab Emirates
4.2.5. North America
4.2.5.1. United States
4.2.5.1.1. NSFOCUS
4.2.5.1.2. Check Point Software
5. Database Security
5.1. Database Audit and Protection
5.1.1. Application Security, Inc
5.1.2. BeyondTrust
5.1.3. Fortinet
5.1.4. GreenSQL
5.1.5. IBM
5.1.6. Imperva
5.1.7. McAfee
5.1.8. Mentis Software
5.1.9. Oracle Corp
5.1.10. PentaSecurity
5.1.11. Warevalley
6. Network Security
6.1. Denial of Service Protection
6.1.1. Appliances
6.1.1.1. Arbor Networks
6.1.1.1.1. Prevail APS
6.1.1.2. Check Point Software
6.1.1.2.1. DDos Protector
6.1.1.3. Corero
6.1.1.4. Fortinet
6.1.1.5. Genie Networks
6.1.1.5.1. ATM Appliances
6.1.1.6. NSFOCUS
6.1.1.7. Radware
6.1.2. Security as a Service
6.1.2.1. Akamai
6.1.2.2. Black Lotus
6.1.2.3. Cloudflare
6.1.2.4. Incapsula
6.1.2.5. Link11
6.1.2.6. Prolexic
6.1.2.7. Neustar
6.1.2.8. Verisign
6.1.3. Clean Pipe Services
6.1.3.1. AT&T
6.1.3.2. Verizon
6.2. Network Access Control (NAC)
6.2.1. Host Based
6.2.1.1. Symantec
6.2.1.2. McAfee
6.2.2. Network Based
6.2.2.1. Forescout
6.2.2.2. Cisco
6.2.2.3. Bradford Networks
6.2.2.4. Milton Security Group
6.3. Network Firewalls
6.3.1. Enterprise Firewalls
6.3.1.1. Next Generation Firewalls
6.3.1.1.1. Fortinet
6.3.1.1.2. Palo Alto Networks
6.3.1.1.3. CheckPoint Software
6.3.1.2. Stateful Inspection - Traditional Firewalls
6.3.1.2.1. Cisco
6.3.1.2.2. Meraki
6.3.1.2.3. HP
6.3.1.2.4. Huawei
6.3.2. Open Source Based
6.3.2.1. IPchains
6.3.2.2. Untangle
6.3.3. Router Firewalls
6.4. Network Intrusion Prevention
6.4.1. CheckPoint
6.4.2. HP
6.4.2.1. TippingPoint
6.4.3. IBM
6.4.4. McAfee
6.4.5. Sourcefire
6.5. Unified Threat Management
6.5.1. CheckPoint
6.5.2. Cisco
6.5.3. Clavister
6.5.4. Fortinet
6.5.5. Hillstone Networks
6.5.6. Sonicwall
6.5.7. Sophos/Astaro
6.5.8. Trustwave
6.5.9. Untangle
6.5.10. WatchGuard
7. ValidEDGE
8. Web Application Firewalls (WAF)
8.1. Appliances
8.1.1. Virtualized Appliances
8.1.1.1. AlertLogic
8.1.1.2. Amazon AWS
8.1.1.2.1. Riverbed
8.1.1.3. Barracuda Networks
8.1.1.4. BeeWare
8.1.1.5. Imperva
8.1.1.6. PentaSecurity
8.1.2. Physical Appliances
8.1.2.1. AlertLogic
8.1.2.2. Barracuda Networks
8.1.2.3. BeeWare
8.1.2.4. Cisco
8.1.2.4.1. End of Life January 2011
8.1.2.5. Citrix
8.1.2.6. DPtech
8.1.2.7. DenyAll
8.1.2.8. F5
8.1.2.9. Imperva
8.1.2.10. NSFocus
8.1.2.11. PentaSecurity
8.1.2.12. Riverbed
8.1.2.13. Trustwave
8.2. Managed Services
8.2.1. Dell Secureworks
8.2.2. AT&T
8.2.3. Verizon Business
8.2.4. Cisco
8.3. Software
8.3.1. Apache
8.3.1.1. Applicure
8.3.1.1.1. dotDefender
8.3.2. DenyAll
8.3.3. ERGON Informatik AG
8.3.3.1. AIRLOCK
8.3.4. Juniper
8.3.4.1. Mykonos
8.3.5. Microsoft IIS
8.3.5.1. Applicure
8.3.5.1.1. dotDefender
8.3.5.2. BeyondTrust
8.3.5.3. ThreatSentry
8.3.6. Open Source
8.3.6.1. Mod Security
8.3.6.2. IronBee
8.3.7. Riverbed
8.4. Software as a Service
8.4.1. Akamai
8.4.1.1. Kona
8.4.2. AlertLogic
8.4.3. CloudFlare
8.4.4. Incapsula
8.4.5. Qualys
9. Web/Email Protection
9.1. Secure Email Gateways
9.1.1. Bluecoat
9.1.2. Fortinet
9.1.3. McAfee
9.1.4. Sonicwall
9.1.5. Symantec
9.1.6. Trustwave
9.1.7. Websense
9.1.8. iBoss
9.2. Secure Web Gateways
9.2.1. Bluecoat
9.2.2. ContentKeeper
9.2.3. McAfee
9.2.4. Symantec
9.2.5. Trustwave
9.2.6. Websense
9.2.7. iBoss
9.3. Security as a Service
9.3.1. Web & Email SaaS
9.3.1.1. Appriver
9.3.1.2. Barracuda
9.3.1.3. Cisco
9.3.1.4. McAfee
9.3.1.5. Spamina
9.3.1.6. Symantec
9.3.1.7. Total Defense
9.3.1.8. Websense
9.3.1.9. Zscaler
9.3.2. Web Only
9.3.2.1. ContentKeeper
10. Virtual Private Networking (VPN)
10.1. IPSec VPN
10.1.1. Cisco
10.1.2. CheckPoint Software
10.1.3. Certes Networks
10.2. Layer 2 Encryption
10.2.1. Certes Networks
10.3. Layer 4 Encryption
10.3.1. Certes Networks
10.4. SSL VPN
10.4.1. Juniper
10.4.2. Cisco
10.4.3. Sonicwall
10.4.4. Barracuda Networks
10.4.5. Stonesoft
10.4.6. F5 Networks
10.4.7. Citrix
10.4.8. WatchGuard
10.4.9. NetGear
10.4.10. Array Networks
11. Security Information and Event Management (SIEM) & Log Management
11.1. Log Management
11.1.1. McAfee
11.1.1.1. McAfee Enterprise Log Manager
11.1.2. Tripwire
11.1.3. Splunk
11.1.4. LogRythm
11.2. SIEM
11.2.1. AlienVault
11.2.1.1. OSSIM
11.2.2. HP
11.2.2.1. Arcsight
11.2.3. IBM
11.2.3.1. Q1Radar
11.2.4. LogRythm
11.2.5. McAfee
11.2.5.1. NitroSecurity
11.2.6. Novell
11.2.6.1. Sentinel
11.2.7. RSA
11.2.7.1. Envision
11.2.8. Sensage
11.2.9. Solarwinds
11.2.10. Splunk
11.2.11. Tibco
11.2.11.1. Loglogic
11.2.12. eIQnetworks
12. Endpoint Security Platforms (EPP)
12.1. Anti-Malware
12.1.1. North America
12.1.1.1. McAfee
12.1.1.2. MalwareBytes
12.1.1.3. Trend Micro
12.1.1.4. Symantec
12.1.1.5. Total Defense
12.1.2. China
12.1.2.1. Rising International Software
12.1.3. Russia
12.1.3.1. Kaspersky
12.1.4. United Kingdom
12.1.4.1. Sophos
12.1.5. Romania
12.1.5.1. Bitdefender
12.1.6. South Korean
12.1.6.1. BKAV
12.1.7. Czech Republic
12.1.7.1. Avast
12.1.8. Netherlands
12.1.8.1. AVG
12.2. Endpoint Intrusion Prevention
12.2.1. McAfee
12.2.2. Symantec
12.3. File Integrity Monitoring
12.3.1. Open Source
12.3.1.1. 1. AIDE
12.3.1.2. 2. Trend Micro
12.3.1.2.1. 1. OSSEC
12.3.1.3. 3. Samhain
12.3.1.4. 4. Osiris
12.3.1.5. 5. Integrit
12.3.1.6. 6. Tripwire
12.3.2. Commercial
12.3.2.1. Imperva
12.3.2.2. McAfee
12.3.2.3. Tripwire
12.4. Sandboxing/MicroVM
12.4.1. SandBoxie
12.4.2. Norman Sandbox
12.4.3. Bromium
13. Data Loss Prevention (DLP)
13.1. Gateway
13.1.1. McAfee
13.1.2. Symantec
13.2. Host
13.2.1. McAfee
13.2.2. RSA
13.2.3. Symantec
13.2.4. Trustwave
13.3. Security as a Service
13.3.1. Consumer
13.3.1.1. Reputation.com
13.3.1.2. Social Fortress
13.3.1.3. PwnedList
13.3.2. Enterprise
13.3.2.1. Social Fortress
13.3.2.2. Google Apps
13.3.2.2.1. Cloudlock
14. Chip Layer Security
14.1. AMD
14.1.1. TPM
14.2. Cavium
14.2.1. Multi-Core Processors
14.3. Flow Processors
14.3.1. Netronome
14.4. Intel
14.4.1. TPM
14.4.2. Data Execution Protection
15. Vulnerability Assessment/Management (VA/VM)
15.1. Managed Penetration Testing Services
15.1.1. WhiteHatSecurity
15.2. Penetration TestingSoftware
15.2.1. Core Security
15.2.2. Rapid7
15.2.2.1. Metasploit Pro
15.2.2.2. Metasploit Express
15.3. Software as a Service
15.3.1. Digital Defense
15.3.2. McAfee
15.3.3. Outpost24
15.3.4. Qualys
15.4. Network Vulnerability Assessment (On Premise)
15.4.1. Digital Defense
15.4.2. Fortinet
15.4.3. McAfee
15.4.3.1. McAfee Vulnerability Manager (Foundstone)
15.4.4. NSAuditor
15.4.5. Ncircle
15.4.6. Netasq
15.4.7. Outpost24
15.4.8. Qualys
15.4.9. Rapid 7
15.4.9.1. Nexspose
15.5. Web Application Security
15.5.1. Code Review Products
15.5.1.1. HP
15.5.1.2. IBM
15.5.2. Runtime Application Self Protection
15.5.2.1. Metaforic
15.5.2.2. Arxan
15.5.3. Scanning Services
15.5.3.1. High-Tech Bridge
15.5.3.2. McAfee Secure
15.5.3.3. WebSecurify
15.5.3.4. Qualys
15.5.3.5. WhiteHat
15.5.3.6. Controlscan
15.5.4. Scanning Software
15.5.4.1. Open Source
15.5.4.1.1. Arachni Scanner
15.5.4.1.2. Subgraph
15.5.4.1.3. W3af
15.5.4.1.4. Wapiti
15.5.4.1.5. Watcher
15.5.4.2. Commercial
15.5.4.2.1. Accunetix
15.5.4.2.2. BeyondTrust
15.5.4.2.3. Cenzic
15.5.4.2.4. HP
15.5.4.2.5. MavitunaSecurity
15.5.4.2.6. NTObjectives
15.5.4.2.7. Nstalker
15.5.4.2.8. Portswigger
15.5.4.2.9. Syhunt
15.6. Vulnerability Reporting/Tracking
15.6.1. Risk IO
15.7. Vulnerability Research
15.7.1. CSC
15.7.2. HP
15.7.2.1. DV Labs
15.7.3. HotWAN
15.7.4. McAfee
15.7.5. SecNiche Labs
15.7.6. Sourcefire VRT
15.7.7. Symantec
15.7.8. VRLSec
15.7.9. Vupen
16. End User Privilege Management
16.1. Viewfinity
17. Software as a Service
17.1. Google Apps
17.1.1. CloudLock
17.1.2. FiLink
18. Advanced Threat Detection/Prevention
18.1. Advanced Network Threat Protection
18.1.1. Runtime Emulation
18.1.1.1. ValidEDGE
18.1.1.2. General Dynamics
18.1.1.2.1. Fidelis Systems
18.1.1.3. Checkpoint Software
18.1.2. Advanced Threat Intelligence
18.1.2.1. LookingGlass
18.1.3. Virtual Execution Assessment
18.1.3.1. Cloud Based
18.1.3.1.1. Netwitness
18.1.3.1.2. CrowdStrike
18.1.4. Appliances
18.1.4.1. AhnLab
18.1.4.2. Damballa
18.1.4.3. FireEye
18.1.4.3.1. Malware Analysis Appliance
18.1.4.4. Lastline
18.1.4.5. ThreatTrack
18.1.5. Network Monitoring/Detection
18.1.5.1. Netwitness
18.1.5.2. Kindsight
18.1.5.3. Taasera
18.1.6. Exploit Technique Prevention Software
18.1.6.1. Cyvera
18.1.6.2. Microsoft
18.1.6.2.1. EMET
18.2. Appliance Based
18.2.1. AhnLab
18.2.2. CheckPoint Software
18.2.3. ContentKeeper
18.2.4. Cyphort
18.2.5. Damballa
18.2.6. FireEye
18.2.7. HBGary
18.2.8. LastLine
18.2.9. McAfee
18.2.10. Palo Alto Networks
18.2.11. RSA
18.2.11.1. Security Analytics (Formerly Netwitness)
18.2.11.1.1. Spectrum
18.2.12. Trend Micro
18.3. Malware Analysis
18.3.1. Malware Analysis as a Service
18.3.1.1. Free Services
18.3.1.1.1. Malwr
18.3.2. Software
18.3.2.1. Norman
18.3.2.1.1. Malware Analyzer G2
18.3.2.2. GFI
18.3.2.2.1. GFI Sandbox
18.3.2.3. Joesecurity
18.3.2.3.1. Joe Sandbox
18.3.3. Firewalls
18.3.3.1. Palo Alto Networks
18.3.3.2. CheckPoint Software
18.3.3.3. Fortinet
18.4. Endopoint Sandboxes and Virtualized Containers
18.4.1. Sandboxes
18.4.1.1. Panda
18.4.1.2. Norman
18.4.1.3. Sandboxie
18.4.1.4. Bitdefender
18.4.2. Virtualized Containers
18.4.2.1. Bromium
18.4.3. Type-0 Hypervisors
18.4.3.1. Lynxworks
18.4.3.2. Zirtu
18.5. Endpoint Threat Detection and Response
18.5.1. Access Data
18.5.1.1. CIRT
18.5.2. Carbon Black
18.5.3. Countertack
18.5.4. CrowdStrike
18.5.5. Cyvera
18.5.6. Guidance Software
18.5.6.1. Encase Cybersecurity
18.5.7. HBGary
18.5.8. Invincea
18.5.9. Mandiant
18.5.10. Triumfant
18.6. Network Behavior Analysis
18.6.1. Flow Analysis
18.6.1.1. Lancope
18.6.1.2. Arbor Networks
18.6.2. Network Traffic (Sniffers)
18.6.2.1. Arbor Networks
18.6.2.2. Lastline
18.6.2.3. Light Cyber
18.6.2.4. McAfee NBA
18.7. Security as a Service
18.7.1. Mail
18.7.1.1. Proofpoint
18.7.2. Malware Infection Monitoring Services
18.7.2.1. Lastline
18.7.2.1.1. Guardia
18.7.2.2. Qualys
18.7.2.3. Seculert
19. Fraud Prevention
19.1. Appliances
19.1.1. Silvertail Systems
19.2. Software
19.2.1. RSA (EMC)
19.2.2. Cisco (Formerly Trusteer)
19.3. Software as a Service
19.3.1. ThreatMetrix
19.3.2. X-Cart
19.3.3. MarkMonitor
19.3.4. iovation
20. Intelligence Services/Data Feeds
20.1. Anti-Spam
20.1.1. www.au.sorbs.net
20.2. IP Blacklists
20.2.1. SpamHaus
20.2.2. Team Cymru
20.2.3. Dshield
20.2.4. hosts-file.net
20.3. Malware Analysis/Blocklists
20.3.1. Malware Patrol
20.3.2. hosts-file.net
20.3.3. zeustracker.abuse.ch
20.3.4. websecurityguard.com
20.3.5. SpamHaus
20.3.6. Botnets
20.3.6.1. spyeyetracker.abuse.ch
20.3.7. MalwareDomainList.com
20.3.8. ThreatGrid
20.3.9. VirusTotal
20.3.10. emergingthreats.net
20.3.11. www.malwareblacklist.com/
20.3.12. www.malware.com.br/lists.shtml
20.3.13. Team Cymru
20.4. Reputation Feeds
20.4.1. Symantec
20.4.1.1. Reputation Insight
20.4.2. McAfee
20.4.2.1. Global Threat Intelligence (GTI)
20.4.3. Trend Micro
20.4.3.1. Smart Protection Network
20.5. Threat Intelligence Services
20.5.1. CrowdStrike
20.5.2. Dell
20.5.2.1. Counter Threat Unit - CTU
20.5.3. FOX-IT
20.5.4. Lookingglass Cyber Solutions
20.5.5. McAfee
20.5.6. Proofpoint
20.5.7. Security Starfish
20.5.8. Team Cymru
20.5.9. Verisign
20.6. URL Lists
20.6.1. Shallalist
20.6.2. hosts-file.net
20.6.3. zvelo
20.6.4. http://malc0de.com/database/
20.7. Web Malware Monitoring
20.7.1. evuln.com
20.7.2. Qualys
21. Forensics & eDiscovery
21.1. Forensic Products
21.1.1. eDiscovery
21.1.1.1. Clearwell
21.1.1.2. Kazeon
21.1.1.3. Guidance Software
21.1.1.4. Access Data
21.1.1.5. Autonomy
21.1.1.6. kCura
21.1.1.7. FTI Technology
21.1.1.8. Barracuda Networks
21.1.2. Mobile Devices
21.1.2.1. Cellebrite
21.1.2.2. Paraben
21.1.2.3. Oxygen
21.1.3. Computing Systems
21.1.3.1. Guidance Software
21.1.3.2. Access Data
21.1.3.3. BlackBag
21.1.3.4. OSForensics
21.1.3.5. Xways Forensics
21.1.3.6. Cylance
21.1.4. Network Forensics
21.1.4.1. Access Data
21.1.4.2. BlueCoat
21.1.4.3. Cybertap
21.1.4.4. Endace
21.1.4.5. Fluke Networks
21.1.4.6. NetAgent
21.1.4.7. NetResec
21.1.4.8. NetScout
21.1.4.9. Niksun
21.1.4.10. Packetsled
21.1.4.11. RSA (EMC)
21.1.4.12. Riverbed
21.1.4.13. WildPackets
21.2. Forensics as a Service (FaaS)
21.3. Incident Response Legal Services
21.3.1. Information Law Group
21.4. eDiscovery Services
21.4.1. Robert Half
21.4.2. Advanced Discovery
22. Identity and Access Management (IAM)
22.1. Certificates
22.1.1. Symantec (Formerly VeriSign)
22.2. AD/Unix bridge
22.2.1. Centrify
22.3. Privileged account management (PAM)
22.3.1. BeyondTrust
22.3.2. Lieberman Software
22.3.3. Cyber Ark
22.4. Identity governance and administration
22.4.1. CA Technologies
22.4.2. IBM Security
22.4.3. Oracle
22.4.4. RSA (Aveksa)
22.5. Security as a Service
22.5.1. Identity and Access Management (IDaaS)
22.5.1.1. Symplifyed
22.5.1.2. Ping Identity
22.6. Secure USB dongles
22.6.1. IronKey
22.7. User Authentication
22.7.1. Tokens
22.7.1.1. OOB authentication
22.7.1.1.1. SMS
22.7.1.1.2. Voice
22.7.1.1.3. Push
22.7.1.1.4. Email
22.7.1.1.5. Social media
22.7.1.2. OTP tokens
22.7.1.2.1. OTP hardware tokens
22.7.1.2.2. OTP software tokens for smart phones
22.7.1.3. X.509 tokens
22.7.1.4. Other tokens
22.7.1.4.1. ANECT AS - ALUCID
22.7.2. Contextual authentication
22.7.3. KBA
22.7.4. Biometrics
22.7.4.1. Behavioral
22.7.4.1.1. Typing rhythm/keystroke dynamics
22.7.4.1.2. Voice recognition
22.7.4.2. Biological
22.7.4.2.1. Face recognition
22.7.4.2.2. Fingerprint
22.7.5. Wide-focus vendors
22.7.5.1. RSA
22.7.5.2. SafeNet
22.7.5.3. VASCO
22.7.5.4. CA Technologies
22.7.5.5. HID Global
22.7.5.6. Technology Nexus
22.7.5.7. Symantec
22.7.5.8. Entrust
22.8. Enterprise single sign-on (ESSO)
22.9. Web access management (WAM)
22.10. Federated SSO
22.11. Externalized authorization management (EAM)
22.11.1. Axiomatics
22.11.2. Dell Quest (BitKoo)
22.12. Access Management
22.12.1. CionSystems
23. Channel/Logistics/Supply Chain/OEMs/Product Testing/Marketing
23.1. Cloud Service Brokerages
23.1.1. Jamcracker
23.1.2. Gravitant
23.1.3. StandingCloud
23.1.4. Bitnami
23.2. Distribution/Channel
23.2.1. VARs, Resellers
23.2.1.1. China
23.2.1.1.1. Rainbow Tech
23.2.1.1.2. Broad Sky Innovation Technology
23.2.1.1.3. Qast Software Group
23.2.1.2. Eastern Europe
23.2.1.2.1. CZECH Republic
23.2.1.2.2. Poland
23.2.1.3. Emerging Asia Pacific
23.2.1.3.1. India
23.2.1.3.2. Indonesia
23.2.1.3.3. Malasia
23.2.1.3.4. Thailand
23.2.1.3.5. Philippines
23.2.1.4. Eurasia
23.2.1.4.1. Russian Federation
23.2.1.4.2. Kazakhstan
23.2.1.4.3. Ukraine
23.2.1.5. Latin America
23.2.1.5.1. Brazil
23.2.1.5.2. Chile
23.2.1.5.3. Columbia
23.2.1.5.4. Costa Rica
23.2.1.5.5. Ecuador
23.2.1.5.6. Bolivia
23.2.1.5.7. Venezuela
23.2.1.5.8. Cuba
23.2.1.5.9. Argentina
23.2.1.5.10. Buenos Aires
23.2.1.5.11. Mexico
23.2.1.5.12. Peru
23.2.1.6. Mature Asia Pacific
23.2.1.6.1. Australia
23.2.1.6.2. Japan
23.2.1.6.3. Singapore
23.2.1.7. Middle East and North Africa
23.2.1.7.1. Turkey
23.2.1.7.2. Israel
23.2.1.7.3. Saudi Arabia
23.2.1.7.4. South Africa
23.2.1.7.5. India
23.2.1.7.6. United Arab Emirates
23.2.1.8. North America
23.2.1.8.1. United States
23.2.1.8.2. Canada
23.2.1.9. Sub-Sahara Africa
23.2.1.9.1. South Africa
23.2.1.10. Western Europe
23.2.1.10.1. France
23.2.1.10.2. Germany
23.2.1.10.3. Italy
23.2.1.10.4. Netherlands
23.2.1.10.5. Spain
23.2.1.10.6. United Kingdom
23.2.1.11. WorldWide
23.2.1.11.1. AT&T
23.2.1.11.2. Verizon Business
23.2.2. Distributors
23.2.2.1. China
23.2.2.1.1. Huagai
23.2.2.1.2. Ecschina
23.2.2.1.3. B & Data Technology Co. Ltd.
23.2.2.1.4. Beijing Advazone Electronic Limited Comp
23.2.2.1.5. Beijing HolyZone Technology Co.,Ltd.
23.2.2.1.6. Digital China Technology LTD.
23.2.2.1.7. M.Tech (Shanghai) Co., Ltd.
23.2.2.1.8. Sky Faith International Enterprise
23.2.2.2. Emerging Asia Pacific
23.2.2.2.1. India
23.2.2.2.2. Indonesia
23.2.2.3. Eurasia
23.2.2.3.1. Russian Federation
23.2.2.3.2. Kazakhstan
23.2.2.4. Mature Asia Pacific
23.2.2.4.1. Singapore
23.2.2.4.2. Japan
23.2.2.4.3. South Korea
23.2.2.5. Middle East and South Africa
23.2.2.5.1. United Arab Emirates
23.2.2.6. North America
23.2.2.6.1. Canada
23.2.2.6.2. United States
23.2.2.7. Sub-Sahara Africa
23.2.2.7.1. South Africa
23.2.2.8. Worldwide
23.2.2.8.1. Ingram Micro
23.2.2.8.2. Tech Data
23.2.2.8.3. Westcon
23.3. Managed Service Enablement
23.3.1. Chartec
23.3.2. Jamcracker
23.4. OEM Manufacturers/Integrators
23.4.1. Appliances
23.4.1.1. Netronome
23.4.1.2. Lanner
23.4.1.3. Caswell
23.4.1.4. Portwell
23.4.2. Appliance Integrators
23.4.2.1. Dan-el Technologies Ltd.
23.4.2.2. Advantech
23.4.3. Chips
23.4.3.1. Cavium
23.4.3.2. Netronome
23.4.4. Cards
23.4.4.1. Netronome
23.4.5. Encryption Acceleration
23.4.5.1. Intel
23.4.5.1.1. VPRO
23.4.5.2. Safenet
23.4.5.2.1. Luna PCI
23.4.6. Software
23.4.6.1. Social Network Content Control
23.4.6.1.1. NetboxBlue
23.4.6.2. URL Categorization
23.4.6.2.1. Zvelo
23.4.6.3. Advanced Threat Protection - Virtual Execution Engines
23.4.6.3.1. ContentKeeper
23.4.6.4. Image Recognition
23.4.6.4.1. Image Analyzer
23.4.6.5. AntiMalware
23.4.6.5.1. Commtouch
23.4.6.6. Encryption
23.4.6.6.1. Transport
23.5. Product Testing
23.5.1. United Kingdom
23.5.1.1. Dennis Technology Labs
23.5.2. Generic Product Testing
23.5.2.1. North America
23.5.2.1.1. NIST
23.5.2.1.2. ICSA Labs (Division of Verizon)
23.5.2.1.3. NSS Labs
23.5.2.1.4. CGI
23.5.3. Sponsored Product Review/Testing
23.5.3.1. Network Testing Labs
23.5.3.2. West Coast Labs
23.5.3.3. Miercom
23.5.3.4. NSS Labs
23.5.4. Cryptographic Testing
23.5.4.1. NIST
23.5.4.1.1. FIPS 140-2
23.5.5. Anti-Malware Testing
23.5.5.1. VirusBTN
23.5.5.2. Av-Comparatives
23.5.5.3. AV-Test
23.6. Security Product Testing/Evaluation
23.6.1. Product Certification/Assurance
23.6.1.1. ICSA Labs
23.6.1.2. Common Criteria for Information Technology Security Evaluation (CCITSE)
23.6.1.2.1. EAL1 through EAL7
23.7. User Interface Consulting/Development
23.7.1. BlinkUX
23.7.2. Marketing
23.7.2.1. Agencies
23.7.2.1.1. Toolbox Studios
23.7.2.2. Market Destinations (Sites)
23.7.2.2.1. SCmagazine
23.7.2.2.2. Hak5
23.7.2.2.3. CRN