1. Web Application Firewalls
1.1. Virtualized Appliances
1.1.1. A10 Networks
1.1.2. AlertLogic
1.1.3. Amazon AWS
1.1.3.1. Riverbed
1.1.4. Barracuda Networks
1.1.5. BeeWare
1.1.6. DenyAll
1.1.7. Ergon Informatik AG
1.1.8. F5
1.1.9. Fortinet
1.1.10. Forum Systems
1.1.11. Imperva
1.1.12. PentaSecurity
1.1.13. Trustwave
1.1.14. Citrix
1.1.14.1. Netscaler VPX
1.1.14.1.1. https://www.citrix.com/products/netscaler-application-delivery-controller/platforms.html
1.2. Physical Appliances
1.2.1. A10 Networks
1.2.2. AdNovum
1.2.3. AlertLogic
1.2.4. Anchiva
1.2.5. Barracuda Networks
1.2.6. BeeWare
1.2.7. BugSec
1.2.8. Citrix
1.2.9. DBAPPSecurity
1.2.10. DPtech
1.2.11. Dell Sonicwall
1.2.12. DenyAll
1.2.13. Ergon Informatik
1.2.13.1. https://www.airlock.com/en/products/airlock-waf/
1.2.14. F5
1.2.15. Fortinet
1.2.16. Forum Systems
1.2.17. HP
1.2.18. Imperva
1.2.19. NSFocus
1.2.20. PentaSecurity
1.2.21. Positive Technologies
1.2.21.1. http://www.ptsecurity.com/products/af/
1.2.22. RadWare
1.2.23. Trustwave
1.2.24. WINS TECHNET LTD
1.2.24.1. http://www.wins21.co.kr/
1.3. Software
1.3.1. Dedicated Software
1.3.1.1. AdNovum
1.3.1.2. Applicure
1.3.1.2.1. http://www.applicure.com/Products/dotdefender
1.3.1.3. DenyAll
1.3.1.4. ERGON Informatik AG
1.3.1.4.1. AIRLOCK
1.3.1.5. Forum Systems
1.3.1.6. Positive Security
1.3.1.7. Riverbed
1.3.1.8. Trustifier
1.3.1.8.1. https://www.trustifier.com/f/#!overview
1.3.1.9. WebScurity
1.3.2. Open Source
1.3.2.1. IronBee
1.3.2.2. Mod Security
1.3.3. Web Server Modules
1.3.3.1. Microsoft IIS
1.3.3.1.1. AQTRONIX
1.3.3.1.2. Applicure
1.3.3.1.3. BeyondTrust
1.3.3.1.4. ThreatSentry
1.3.3.2. Apache
1.3.3.2.1. Applicure
1.4. Managed Services
1.4.1. Dell Secureworks
1.4.2. AT&T
1.4.3. Verizon Business
1.5. Software as a Service
1.5.1. Akamai
1.5.1.1. Kona
1.5.2. AlertLogic
1.5.3. Anquanbao
1.5.4. ArmorLogic
1.5.5. BinarySec
1.5.6. CloudFlare
1.5.7. DenyAll
1.5.7.1. http://www.denyall.com/products/web-application-firewall/
1.5.8. FireBlade
1.5.9. Imperva (Incapsula)
1.5.9.1. http://www.incapsula.com
1.5.10. Incapsula
1.5.11. PowerCDN
1.5.12. Qualys
1.5.13. Securi
1.5.14. Signal Sciences
1.5.15. Soha
1.5.15.1. http://soha.io/
1.5.16. ZenEdge
2. Cloud Security
2.1. Cloud/Virtualized Firewalls
2.1.1. Agent-Based
2.1.1.1. CloudPassage
2.1.1.2. Drawbridge Networks
2.1.1.3. Illumio
2.1.2. Cisco
2.1.3. Citrix Xen
2.1.3.1. Hillstone Networks
2.1.3.2. Huawei
2.1.3.3. Fortinet
2.1.3.4. Palo Alto Networks
2.1.4. Container-Based
2.1.4.1. ShieldX
2.1.5. Hyper-V
2.1.5.1. Fortinet
2.1.6. KVM
2.1.6.1. Hillstone Networks
2.1.6.2. Juniper Networks
2.1.6.3. Palo Alto Networks
2.1.7. Openstack
2.1.7.1. OpenFlow
2.1.7.1.1. Fortinet
2.1.7.2. Juniper Networks
2.1.8. Public Cloud
2.1.8.1. Virtual Appliances
2.1.8.1.1. Barracuda
2.1.8.1.2. Brocade
2.1.8.1.3. Catbird Networks
2.1.8.1.4. Check Point Software
2.1.8.1.5. Juniper Networks
2.1.8.1.6. Palo Alto Networks
2.1.8.1.7. PfSense
2.1.8.1.8. Sophos
2.1.8.1.9. vArmour
2.1.8.2. API-Driven
2.1.8.2.1. Dome9
2.1.8.2.2. Illumio
2.1.8.3. AWS
2.1.8.3.1. Check Point Software
2.1.8.3.2. Fortinet
2.1.8.3.3. Palo Alto Networks
2.1.8.4. Microsoft Azure
2.1.8.4.1. Check Point Software
2.1.8.4.2. Fortinet
2.1.8.5. Container-Based
2.1.9. VMware Environments
2.1.9.1. API Integration
2.1.9.1.1. Check Point Software
2.1.9.1.2. Fortinet
2.1.9.1.3. Palo Alto Networks
2.1.9.2. NSX
2.1.9.2.1. Fortinet
2.1.9.2.2. Check Point Software
2.1.9.3. VM Appliance
2.1.9.3.1. Barracuda
2.1.9.3.2. Brocade
2.1.9.3.3. Catbird Networks
2.1.9.3.4. Check Point Software
2.1.9.3.5. Fortinet
2.1.9.3.6. Hillstone Networks
2.1.9.3.7. Juniper Networks
2.1.9.3.8. Palo Alto Networks
2.1.9.3.9. PfSense
2.1.9.3.10. Sophos
2.1.9.3.11. vArmour
2.1.9.3.12. Huawei
3. Security Operations & Incident Response
3.1. Digital Forensics/eDiscovery
3.1.1. Content, File and Endpoint Forensics
3.1.1.1. eDiscovery
3.1.1.1.1. Clearwell
3.1.1.1.2. Kazeon
3.1.1.1.3. Guidance Software
3.1.1.1.4. Access Data
3.1.1.1.5. Autonomy
3.1.1.1.6. kCura
3.1.1.1.7. FTI Technology
3.1.1.1.8. Barracuda Networks
3.1.1.2. Mobile Devices
3.1.1.2.1. BlackBagTech
3.1.1.2.2. Cellebrite
3.1.1.2.3. Compelson Labs
3.1.1.2.4. Guidance Software
3.1.1.2.5. MSAB
3.1.1.2.6. NowSecure
3.1.1.2.7. Oxygen Forensics
3.1.1.2.8. Paraben Corporation
3.1.1.3. Endpoint Computing Systems
3.1.1.3.1. ADF Solutions
3.1.1.3.2. Access Data
3.1.1.3.3. ArxSys
3.1.1.3.4. BlackBag Technologies
3.1.1.3.5. CRU Inc
3.1.1.3.6. Cyfir
3.1.1.3.7. Guidance Software
3.1.1.3.8. Magnet Forensics
3.1.1.3.9. Nuix
3.1.1.3.10. OSForensics
3.1.1.3.11. Paraben Corporation
3.1.1.3.12. WindowsScope
3.1.1.3.13. X-Ways Forensics
3.1.1.4. Email Examination
3.1.1.4.1. Systools Software
3.1.1.4.2. Nuix
3.1.1.5. Forensic File & Data Analysis Tools
3.1.1.5.1. Cellebrite
3.1.1.5.2. Cyfir
3.1.1.5.3. Intella
3.1.1.5.4. Magnet Forensics
3.1.1.5.5. Nuix
3.1.1.5.6. Systools Software
3.1.1.6. Digital Forensics Case Management
3.1.1.6.1. D3 Security
3.1.1.6.2. Digital Investigation Manager
3.1.1.6.3. Guidance Software
3.1.1.6.4. Intaforensiscs
3.1.1.6.5. Sentinel Data
3.1.1.6.6. Sirentech
3.1.1.6.7. Wynyard Group
3.1.1.7. Memory Forensics
3.1.1.7.1. FireEye
3.1.1.7.2. Guidance Software
3.1.1.7.3. Volatility Framework
3.1.1.7.4. WindowsScope
3.1.2. eDiscovery Services
3.1.2.1. Robert Half
3.1.2.2. Advanced Discovery
3.1.3. eDiscovery Software
3.1.3.1. AccessData
3.1.3.2. Guidance Software
3.1.3.3. Nuix
3.1.3.4. Symantec
3.2. Fraud Prevention/Web Malware Monitoring
3.2.1. Fraud/Bot/Webscrape Prevention
3.2.1.1. Software
3.2.1.1.1. IBM (Formerly Trusteer)
3.2.1.1.2. Intellinx
3.2.1.1.3. RSA (EMC)
3.2.1.1.4. ShieldSquare
3.2.1.2. Appliances
3.2.1.2.1. Distil Networks
3.2.1.2.2. Imperva
3.2.1.2.3. RSA
3.2.1.2.4. Shape Security
3.2.1.2.5. White Ops
3.2.1.3. Software as a Service
3.2.1.3.1. Akamai
3.2.1.3.2. BioCatch
3.2.1.3.3. BotScout
3.2.1.3.4. Distil Networks
3.2.1.3.5. Guardian Analytics
3.2.1.3.6. Kount
3.2.1.3.7. MarkMonitor
3.2.1.3.8. NuData Security
3.2.1.3.9. Shape Security
3.2.1.3.10. ShieldSquare
3.2.1.3.11. ThreatMetrix
3.2.1.3.12. White Ops
3.2.1.3.13. X-Cart
3.2.1.3.14. iovation
3.2.1.4. Virtual Appliances
3.2.1.4.1. Distil Networks
3.2.1.4.2. Imperva
3.2.2. Website & Ad Malware Monitoring
3.2.2.1. Ad-Juster
3.2.2.2. Globalsign
3.2.2.2.1. Leverages Hackalert
3.2.2.3. Hackalert
3.2.2.4. Intel Security
3.2.2.4.1. Siteadvisor
3.2.2.5. QualysGuard
3.2.2.6. RiskIQ
3.2.2.7. Sucuri
3.2.2.8. The Media Trust
3.3. Incident Response Legal Services
3.3.1. Information Law Group
3.4. Security Information and Event Management (SIEM), Log Management & Analytics
3.4.1. Application Security Intelligence Engine
3.4.1.1. SAP
3.4.1.1.1. iT-Cube Systems
3.4.2. Log Management
3.4.2.1. EventTracker
3.4.2.2. IGLOO Security
3.4.2.3. Intel Security
3.4.2.3.1. McAfee Enterprise Log Manager
3.4.2.4. Kiwi Syslog Server
3.4.2.5. LogEntries
3.4.2.6. LogRythm
3.4.2.7. Logscape
3.4.2.8. Open Source
3.4.2.8.1. Elasticsearch (ELK Stack)
3.4.2.8.2. SEC (Simple Event Correlator)
3.4.2.8.3. OSSIM
3.4.2.8.4. Syslog-NG
3.4.2.8.5. Octopussy
3.4.2.9. Sawmill
3.4.2.10. Splunk
3.4.2.11. Sumo Logic
3.4.2.12. Tripwire
3.4.2.13. XpoLog
3.4.3. SIEM
3.4.3.1. AlienVault
3.4.3.1.1. OSSIM
3.4.3.2. CorreLog
3.4.3.3. EventTracker
3.4.3.4. Fortinet
3.4.3.5. HP
3.4.3.5.1. Arcsight
3.4.3.6. Hexis Cyber Solutions
3.4.3.6.1. Hawkeye AP
3.4.3.7. IBM
3.4.3.7.1. Q1Radar
3.4.3.8. IGLOO Security
3.4.3.9. Intel Security
3.4.3.9.1. NitroSecurity
3.4.3.10. LogPoint
3.4.3.10.1. http://www.logpoint.com/en/
3.4.3.11. LogRythm
3.4.3.12. Novell
3.4.3.12.1. Sentinel
3.4.3.13. RSA
3.4.3.13.1. Envision
3.4.3.14. Sensage
3.4.3.15. Solarwinds
3.4.3.16. Splunk
3.4.3.17. Sqrrl
3.4.3.18. Tibco
3.4.3.18.1. Loglogic
3.4.3.19. eIQnetworks
3.4.4. Security Analytics
3.4.4.1. Anomaly Analytics
3.4.4.1.1. Intel
3.4.4.1.2. Theta Ray
3.4.4.1.3. Prelert
3.4.4.1.4. eMite
3.4.4.2. User and Entity Behavior Analytics (UEBA)
3.4.4.2.1. Bay Dynamics
3.4.4.2.2. Darktrace
3.4.4.2.3. Detex Systems
3.4.4.2.4. Exabeam
3.4.4.2.5. Fortscale
3.4.4.2.6. Gurcul
3.4.4.2.7. HP
3.4.4.2.8. IBM
3.4.4.2.9. Interset
3.4.4.2.10. Microsoft
3.4.4.2.11. Niara
3.4.4.2.12. ObserveIT
3.4.4.2.13. Palerra
3.4.4.2.14. Platfora
3.4.4.2.15. Reveelium
3.4.4.2.16. Secureonix
3.4.4.2.17. Veriato
3.4.5. User and Entity Behavior Analytics (UEBA)
3.4.5.1. Bae Systems Applied Intelligence
3.4.5.2. Bay Dynamics
3.4.5.3. Caspida
3.4.5.4. Click Security
3.4.5.5. Exabeam
3.4.5.6. FICO
3.4.5.7. Fortscale
3.4.5.8. GuruCul
3.4.5.9. IBM
3.4.5.10. Intellinx
3.4.5.11. Lockheed Martin
3.4.5.12. Logtrust
3.4.5.13. Mobile System 7
3.4.5.14. Novetta Solutions
3.4.5.15. Oracle
3.4.5.16. Rapid7
3.4.5.17. Raytheon
3.4.5.18. SAS Institute
3.4.5.19. Secureonix
3.4.5.20. Splunk
3.5. Security Operations, Analytics and Reporting (SOAR)
3.5.1. Security Incident Response Platforms (SIRP)
3.5.1.1. Agiliance
3.5.1.2. DFLabs
3.5.1.3. Demisto
3.5.1.4. EMC(RSA)
3.5.1.5. Empow
3.5.1.6. Fido
3.5.1.7. Hexadite
3.5.1.8. ID Experts
3.5.1.9. Proofpoint
3.5.1.10. Resilient Systems
3.5.1.11. Siemplify
3.5.1.12. Syncurity
3.5.2. Threat and Vulnerability Management (TVM)
3.5.2.1. Acuity Risk Management
3.5.2.2. Agiliance
3.5.2.3. BeyondTrust
3.5.2.4. Core Security
3.5.2.5. Cybersponse
3.5.2.6. DFLabs
3.5.2.7. EMC(RSA)
3.5.2.8. Kenna Security
3.5.2.9. NopSec
3.5.2.10. RedSeal
3.5.2.11. RiskSense
3.5.2.12. Skybox Security
3.5.2.13. Swimlane
3.5.2.14. Siemplify
3.5.3. Security Operations Analytics
3.5.3.1. Ayehu
3.5.3.2. Cybersponse
3.5.3.3. DFLabs
3.5.3.4. EMC(RSA)
3.5.3.5. Hexadite
3.5.3.6. Proofpoint
3.5.3.7. Resilient Systems
3.5.3.8. Siemplify
3.5.3.9. Swimlane
3.5.4. Security Operations Automation Platforms (SOAPS)
3.5.4.1. Ayehu
3.5.4.2. Cyberbit
3.5.4.3. Cybersponse
3.5.4.4. DFLabs
3.5.4.5. Demisto
3.5.4.6. Fireye
3.5.4.7. Hexadite
3.5.4.8. IBM
3.5.4.9. Phantom Cyber
3.5.4.10. Swimlane
3.5.4.11. Syncurity
3.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)
3.6.1. Crowdsourced Application Security Testing Platforms
3.6.1.1. Hyver
3.6.1.2. Applause
3.6.1.3. Bugcrowd
3.6.1.4. BugFinders
3.6.1.5. Cobalt
3.6.1.6. Crowdtesters
3.6.1.7. HackerOne
3.6.2. Managed Penetration Testing Services
3.6.2.1. Cenzic
3.6.2.2. WhiteHatSecurity
3.6.3. Penetration Testing Software
3.6.3.1. Core Security
3.6.3.2. Rapid7
3.6.3.2.1. Metasploit Pro
3.6.3.2.2. Metasploit Express
3.6.3.3. Trustwave
3.6.4. Vulnerability Assessment
3.6.4.1. Software as a Service
3.6.4.1.1. Vulnerability Management
3.6.4.1.2. Phish Testing/Management
3.6.4.2. Network-Based Vulnerability Assessment (On Premise)
3.6.4.2.1. Core Security
3.6.4.2.2. Digital Defense
3.6.4.2.3. Fortinet
3.6.4.2.4. Intel Security
3.6.4.2.5. NSAuditor
3.6.4.2.6. Ncircle
3.6.4.2.7. Netasq
3.6.4.2.8. Outpost24
3.6.4.2.9. Qualys
3.6.4.2.10. RandomStorm
3.6.4.2.11. Rapid 7
3.6.4.2.12. Trustwave
3.6.4.3. Agent-Based Vulnerability Assessment
3.6.4.3.1. BeyondTrust
3.6.4.3.2. Qualys
3.6.4.3.3. Secunia
3.6.4.3.4. Tenable
3.6.4.4. Mainframe Vulnerability Assessment
3.6.4.4.1. Key Resources Inc. (KRI)
3.6.5. Vulnerability Correlation
3.6.5.1. Application Vulnerability Correlation
3.6.5.1.1. Code DX
3.6.5.1.2. Denim Group
3.6.5.1.3. Kenna Security
3.6.5.1.4. NopSec
3.6.5.2. Network Vulnerability Correlation
3.6.5.2.1. Secure Decisions
3.6.5.2.2. RiskSense
3.6.5.2.3. NopSec
3.6.5.2.4. Kenna Security
3.6.5.2.5. Cybric
3.6.6. Vulnerability Research
3.6.6.1. CSC
3.6.6.2. HP
3.6.6.2.1. DV Labs
3.6.6.3. HotWAN
3.6.6.4. Intel Security
3.6.6.5. SecNiche Labs
3.6.6.6. Sourcefire VRT
3.6.6.7. Symantec
3.6.6.8. VRLSec
3.6.6.9. Vupen
4. Emerging Security Markets & Technologies
4.1. Application Security
4.1.1. Runtime Application Self-Protection (RASP)
4.1.1.1. Arxan
4.1.1.2. Checkmarx
4.1.1.3. Contrast Security
4.1.1.4. HP
4.1.1.5. Immunio
4.1.1.6. Metaforic
4.1.1.7. OneASP
4.1.1.8. Prevoty
4.1.1.9. SecuPi
4.1.1.10. Veracode
4.1.1.11. Virsec
4.1.1.12. Waratek
4.1.1.13. whiteCryption
4.1.2. Enterprise App-Layer Protection
4.1.2.1. SecuPI
4.1.3. AI-Based Applicaton Threat Defense
4.1.3.1. Barricade
4.1.3.2. Signal Sciences
4.2. Cloud Security
4.2.1. Cloud Protection Gateways
4.2.1.1. CipherCloud
4.2.1.2. Netskope
4.2.1.3. Perspecsys
4.2.1.4. Skyhigh Networks
4.2.1.5. Vaultive
4.2.2. Cloud Access Security Brokers
4.2.2.1. User Activity Monitoring
4.2.2.1.1. Adallom
4.2.2.1.2. Avanan
4.2.2.1.3. Bitglass
4.2.2.1.4. Elastica
4.2.2.1.5. Harvest.ai
4.2.2.1.6. Imperva
4.2.2.1.7. Netscope
4.2.2.1.8. SkyHigh Networks
4.2.2.2. Data Loss Prevention
4.2.2.2.1. Integrated DLP
4.2.2.2.2. Harvest.ai
4.2.2.3. Encryption
4.2.2.3.1. Adallom
4.2.2.3.2. Avanan
4.2.2.3.3. Managed Methods
4.2.2.3.4. SkyHigh Networks
4.2.2.4. Identity and Access Management
4.2.2.4.1. Centrify
4.2.2.4.2. Cloudiway
4.2.2.4.3. Okta
4.2.2.4.4. Ping
4.2.2.5. Access Control
4.2.2.5.1. Adallom
4.2.2.5.2. Avanan
4.2.2.5.3. Bitglass
4.2.2.5.4. Elastica
4.2.2.5.5. FireLayers
4.2.2.5.6. Managed Methods
4.2.2.5.7. Netskope
4.2.2.5.8. Skyfence
4.2.3. Cloud Application Discovery
4.2.3.1. Ciphercloud
4.2.3.2. Elastica
4.2.3.3. Netskope
4.2.3.4. Skyhigh
4.2.4. Cloud Compliance and Security Risk Platforms
4.2.4.1. AlertLogic
4.2.4.2. Cavirin
4.2.4.3. Cloudcheckr
4.2.4.4. Evident.io
4.2.4.5. Harvest AI
4.3. Cross Domain Solutions
4.3.1. Advenica
4.3.1.1. ZoneGuard
4.3.1.2. SecuriRam
4.3.2. General Dynamics
4.3.2.1. TacGuard
4.3.2.2. Crossing Guard
4.3.2.3. NanoXD
4.3.3. LockHeed Martin
4.3.3.1. Trusted Manager
4.3.4. Tresys
4.3.4.1. XD Air
4.3.4.2. XD Bridge
4.3.4.3. XD Guardian
4.3.5. Owl Computing
4.3.5.1. Owl OPDS-100
4.3.5.2. Owl OPDS-100D
4.3.5.3. OCDS-SFF
4.4. Data Security
4.4.1. Network-Based Data Cleansing
4.4.1.1. DataStealth
4.4.1.1.1. http://www.datexdatastealth.com/
4.4.2. Big Data Security
4.4.2.1. BlueTalon
4.5. Endpoint Security
4.5.1. Endpoint Detection and Response (EDR)
4.5.1.1. Agent-Based
4.5.1.1.1. Carbon Black
4.5.1.1.2. Cisco
4.5.1.1.3. Countertack
4.5.1.1.4. CrowdStrike
4.5.1.1.5. Cyberbit
4.5.1.1.6. Cyberreason
4.5.1.1.7. Cylance
4.5.1.1.8. Deep Instinct
4.5.1.1.9. Digital Guardian
4.5.1.1.10. Dtex Systems
4.5.1.1.11. Endgame Systems
4.5.1.1.12. Fidelis Cybersecurity
4.5.1.1.13. FireEye
4.5.1.1.14. Forescout
4.5.1.1.15. Guidance Software
4.5.1.1.16. Hexis Cyber Solutions
4.5.1.1.17. Invincea
4.5.1.1.18. LogRhythm
4.5.1.1.19. NexThink
4.5.1.1.20. Panda Security
4.5.1.1.21. RSA (EMC)
4.5.1.1.22. SecDo
4.5.1.1.23. SentinelOne
4.5.1.1.24. Tanium
4.5.1.1.25. Triumfant
4.5.1.1.26. Verint
4.5.1.1.27. Ziften
4.5.1.2. Agentless
4.5.1.2.1. BeyondTrust
4.5.1.2.2. Cynet
4.5.1.2.3. Fidelis
4.5.1.2.4. ForeScout
4.5.1.2.5. Hexadite
4.5.1.2.6. Hexis Cyber Solutions
4.5.1.2.7. InfoCyte
4.5.1.2.8. LightCyber
4.5.1.2.9. Outlier Security
4.5.1.2.10. Promisec
4.5.2. Remote Browser-Isolation (remote dom)
4.5.2.1. Amune
4.5.2.1.1. https://amune.org/security
4.5.2.2. Armor5
4.5.2.3. Authentic8
4.5.2.4. Dispel
4.5.2.5. FireGlass
4.5.2.6. Menlo Security
4.5.2.7. Aurionpro
4.5.2.7.1. Formerly Spikes Security
4.6. Identification, Authentication, Access Control & IAM
4.7. Internet of Things
4.7.1. Automotive
4.7.1.1. Security Innovation
4.7.2. Embedded Security
4.7.2.1. Security Innovation
4.8. Network & Infrastructure Security
4.8.1. Content Disarm and Reconstruction (CDR)
4.8.1.1. Check Point Software
4.8.1.1.1. Threat Extraction
4.8.1.2. Glasswall
4.8.1.2.1. http://www.glasswallsolutions.com/
4.8.1.3. Mimecast
4.8.1.3.1. https://www.mimecast.com/
4.8.1.4. OPSWAT
4.8.1.5. ODI
4.8.1.5.1. http://www.odi-x.com/
4.8.1.6. Re-Sec
4.8.1.6.1. http://www.re-sec.com/
4.8.1.7. Sasa-Software
4.8.1.7.1. http://www.sasa-software.com/
4.8.1.8. Solebit Labs
4.8.1.8.1. http://www.solebitlabs.com/
4.8.1.9. Symantec
4.8.1.9.1. DisArm
4.8.1.10. TreSys
4.8.1.10.1. http://www.tresys.com/
4.8.1.11. Votiro
4.8.1.11.1. http://www.votiro.com/
4.8.2. Malware Infection Analysis and Monitoring Services
4.8.2.1. Lastline
4.8.2.1.1. Guardia
4.8.2.2. Cisco
4.8.2.2.1. Formerly OpenDNS
4.8.2.3. Qualys
4.8.2.4. Seculert
4.8.3. Network Behavior and Analytics
4.8.3.1. Industrial Control Systems (ICS)
4.8.3.1.1. CyberX
4.8.4. Standalone Threat Intelligence Defense Solutions (STIDS)
4.8.4.1. Bandura
4.8.4.1.1. PoliWall
4.8.4.2. Centripetal Networks
4.8.4.3. Damballa
4.8.4.4. Fidelis Cybersecurity
4.8.4.5. FireEye
4.8.4.6. Group IB
4.8.4.6.1. http://tds.group-ib.com/
4.8.4.7. Ixia
4.8.4.7.1. http://www.ixiacom.com/info/ta
4.8.4.8. LookingGlass
4.8.4.8.1. https://lgscout.com/products/dns-defender/
4.8.4.9. Redsocks
4.8.4.9.1. Redsocks Threat Defender
4.8.4.10. ReversingLabs
4.8.4.11. Symantec
4.8.4.11.1. APT Network
4.8.5. Unauthorized Endpoint Connection Prevention (UECP)
4.8.5.1. Ensilo
4.8.5.2. Intel Security
4.8.6. Software Defined WAN (SDwan)
4.8.6.1. CloudGenix
4.8.6.2. Pertino
4.8.6.3. Velocloud
4.8.6.4. Viptela
4.8.6.5. Versa Networks
4.8.7. Virtual Container Security
4.8.7.1. Apcera
4.8.7.2. Aqua Security
4.8.7.3. Illumio
4.8.7.4. StackRox
4.8.7.5. TwistLock
4.8.8. Network Security as a Service
4.8.8.1. Cato Networks
4.8.8.2. MyDigitalShield
4.8.8.3. Zscaler
4.9. Risk, Compliance and Security Management
4.9.1. Security Ratings & Insurance
4.9.1.1. Security Ratings
4.9.1.1.1. Bitsight Technologies
4.9.1.1.2. Prevalent
4.9.1.1.3. SecurityScoreCard
4.9.1.1.4. QuadMetrics
4.9.1.2. Cyber Risk Insurance
4.9.1.2.1. Balsiger Insurance
4.9.1.2.2. HSB Group
4.9.1.2.3. Philadelphia Insurance Companies
4.9.1.2.4. Tennant Risk Services
4.9.1.2.5. The Hartford
4.9.1.2.6. Travelers
4.10. Security Operations, Incident Response
4.10.1. Intelligence/Data Feeds/Software & Services
4.10.1.1. Security Intelligence and Data Analysis Platforms
4.10.1.1.1. FireEye
4.10.1.2. Threat Intelligence Platforms (TIPs)
4.10.1.2.1. Anomali
4.10.1.2.2. BAE Systems
4.10.1.2.3. Buguroo
4.10.1.2.4. Codenomicon
4.10.1.2.5. Comilion
4.10.1.2.6. Confer
4.10.1.2.7. Eclectic IQ
4.10.1.2.8. Infoblox
4.10.1.2.9. Lockheed Martin
4.10.1.2.10. Lookingglass Cyber Solutions
4.10.1.2.11. Microsoft
4.10.1.2.12. Palentir
4.10.1.2.13. PierceMatrix
4.10.1.2.14. Service Now (Formerly Brightpoint)
4.10.1.2.15. Soltra
4.10.1.2.16. ThreatConnect
4.10.1.2.17. ThreatQuotient
4.10.1.2.18. TruStar
4.10.1.3. Threat Intelligence Services
4.10.1.3.1. Human Intelligence - HUMINT (Strategic)
4.10.1.3.2. Machine-Based (Tactical)
4.10.1.3.3. Vulnerabilities and Exploits
4.10.1.3.4. Data Loss Detection - External
4.10.1.4. Collaborative Threat Investigation Platforms
4.10.1.4.1. BAE System Detica
4.10.1.4.2. IKANow
4.10.1.4.3. Maltego
4.10.1.4.4. NC4
4.10.1.4.5. Palentir
4.10.2. Malware Analysis
4.10.2.1. Malware Analysis as a Service
4.10.2.1.1. Free Services
4.10.2.1.2. ReversingLabs
4.10.2.1.3. ThreatGrid
4.10.2.2. Sandbox Software
4.10.2.2.1. GFI
4.10.2.2.2. Joesecurity
4.10.2.2.3. Bluecoat
4.10.2.2.4. Payload Security
4.10.3. Threat Deception Technologies
4.10.3.1. Distributed Deception Platforms
4.10.3.1.1. Amgine Securus
4.10.3.1.2. Atomic Software Solutions
4.10.3.1.3. Attivo Networks
4.10.3.1.4. Cymmetria
4.10.3.1.5. GuardiCore
4.10.3.1.6. Illusive Networks
4.10.3.1.7. Javelin Networks
4.10.3.1.8. KeyFocus
4.10.3.1.9. SmokeScreen
4.10.3.1.10. Specter
4.10.3.1.11. TrapX
4.10.3.1.12. Vision Space Technologies
4.10.3.2. Network
4.10.3.2.1. ForeScout
4.10.3.2.2. Juniper Networks
4.10.3.2.3. Percipient Networks
4.10.3.2.4. Ridgeback Network Defense
4.10.3.2.5. Shadow Networks
4.10.3.3. Open Source
4.10.3.3.1. Honeypot
4.10.3.4. Web
4.10.3.4.1. Shape Security
4.10.3.4.2. Juniper Networks
4.10.3.4.3. CyberTrap
5. VARs, Distributors, Market Logistics & Supply Chain
5.1. Cloud Service Brokerages
5.1.1. Bitnami
5.1.2. Ensim
5.1.2.1. http://www.ensim.com/
5.1.3. Gravitant
5.1.4. Jamcracker
5.1.4.1. http://www.jamcracker.com/
5.1.5. StandingCloud
5.2. Distribution/Channel/VARs
5.2.1. VARs, Resellers
5.2.1.1. China
5.2.1.1.1. Mainland China
5.2.1.1.2. Hong Kong
5.2.1.1.3. Taiwan
5.2.1.2. Emerging Asia Pacific
5.2.1.2.1. India
5.2.1.2.2. Indonesia
5.2.1.2.3. Malasia
5.2.1.2.4. Thailand
5.2.1.2.5. Philippines
5.2.1.3. Eurasia
5.2.1.3.1. Russian Federation
5.2.1.3.2. Kazakhstan
5.2.1.3.3. Ukraine
5.2.1.4. Europe
5.2.1.4.1. Eastern Europe
5.2.1.4.2. Western Europe
5.2.1.5. Latin America
5.2.1.5.1. Brazil
5.2.1.5.2. Chile
5.2.1.5.3. Columbia
5.2.1.5.4. Costa Rica
5.2.1.5.5. Ecuador
5.2.1.5.6. Bolivia
5.2.1.5.7. Venezuela
5.2.1.5.8. Cuba
5.2.1.5.9. Argentina
5.2.1.5.10. Buenos Aires
5.2.1.5.11. Mexico
5.2.1.5.12. Peru
5.2.1.6. Mature Asia Pacific
5.2.1.6.1. Australia
5.2.1.6.2. Japan
5.2.1.6.3. Singapore
5.2.1.7. Middle East and North Africa
5.2.1.7.1. Turkey
5.2.1.7.2. Israel
5.2.1.7.3. Saudi Arabia
5.2.1.7.4. South Africa
5.2.1.7.5. India
5.2.1.7.6. United Arab Emirates
5.2.1.8. North America
5.2.1.8.1. United States
5.2.1.8.2. Canada
5.2.1.9. Sub-Sahara Africa
5.2.1.9.1. South Africa
5.2.1.10. WorldWide
5.2.1.10.1. AT&T
5.2.1.10.2. BT
5.2.1.10.3. Optiv
5.2.1.10.4. SHI
5.2.1.10.5. Secureworks
5.2.1.10.6. Verizon Business
5.2.2. Distributors
5.2.2.1. China
5.2.2.1.1. AVNet
5.2.2.1.2. B & Data Technology Co. Ltd.
5.2.2.1.3. Beijing Advazone Electronic Limited Comp
5.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.
5.2.2.1.5. Digital China Technology LTD.
5.2.2.1.6. Ecs China
5.2.2.1.7. Edvance Technology (China) Limited
5.2.2.1.8. Huagai
5.2.2.1.9. M.Tech (Shanghai) Co., Ltd.
5.2.2.1.10. Shanghai S-I Information Tech. Ltd
5.2.2.1.11. Sinogrid Information Technology Ltd.
5.2.2.1.12. Sky Faith International Enterprise
5.2.2.2. Emerging Asia Pacific
5.2.2.2.1. India
5.2.2.2.2. Indonesia
5.2.2.2.3. Thailand
5.2.2.3. Eurasia
5.2.2.3.1. Russian Federation
5.2.2.3.2. Kazakhstan
5.2.2.4. Mature Asia Pacific
5.2.2.4.1. Singapore
5.2.2.4.2. Japan
5.2.2.4.3. South Korea
5.2.2.4.4. Australia
5.2.2.5. Middle East and South Africa
5.2.2.5.1. United Arab Emirates
5.2.2.5.2. South Africa
5.2.2.6. North America
5.2.2.6.1. Canada
5.2.2.6.2. United States
5.2.2.7. Sub-Sahara Africa
5.2.2.7.1. South Africa
5.2.2.8. Western Europe
5.2.2.8.1. United Kingdom
5.2.2.8.2. Germany
5.2.2.9. Worldwide
5.2.2.9.1. AVNet
5.2.2.9.2. Ingram Micro
5.2.2.9.3. LifeBoat Distribution
5.2.2.9.4. Tech Data
5.2.2.9.5. Westcon
5.2.2.10. Latin America
5.2.2.10.1. Mexico
5.2.2.10.2. Brazil
5.2.3. Reseller Programs
5.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm
5.2.4. Logistics/Deal Registration
5.2.4.1. Connectwise
5.3. Government Cyberwarrior (Personnel Estimates)
5.3.1. United States
5.3.1.1. NSA
5.3.1.1.1. Cyberwarrior Stats
5.3.1.2. Department of Defense
5.3.1.2.1. US Airforce
5.3.1.2.2. US Navy
5.3.1.2.3. DISA
5.3.2. Iran
5.3.2.1. 4500
5.3.3. Israel
5.3.3.1. Unit 8200
5.3.3.1.1. 5000
5.3.4. North Korea
5.3.4.1. 1000
5.4. Hardware and Chip Security
5.4.1. AMD
5.4.1.1. TPM
5.4.2. Cavium
5.4.2.1. Multi-Core Processors
5.4.3. Flow Processors
5.4.3.1. Netronome
5.4.4. Intel
5.4.4.1. TPM
5.4.4.2. Data Execution Protection
5.4.5. Systems
5.4.5.1. Janus Technologies
5.4.5.1.1. http://www.janustech.com/janus_secure_computer.html
5.5. Investment
5.5.1. ETFs
5.5.1.1. PureFunds
5.5.1.1.1. SYM:HACK
5.5.2. Venture Capitalists
5.5.2.1. Trident Capital
5.5.2.2. Andreesen Horowitz
5.6. Managed Service Enablement
5.6.1. Chartec
5.6.2. Jamcracker
5.7. Marketing/PR/AR
5.7.1. Analyst & Public Relations
5.7.1.1. Focused Image
5.7.1.1.1. http://www.focusedimage.com/
5.7.1.2. KTCpr
5.7.1.2.1. http://www.kahn-travel.com/
5.7.1.3. Madison Alexander PR
5.7.1.3.1. http://www.madisonalexanderpr.com/
5.7.1.4. Marc Gendron PR
5.7.1.4.1. http://www.mgpr.info/
5.7.1.5. Schwartz Communications
5.7.1.5.1. http://www.schwartzmsl.com/
5.7.1.6. Spalding Communications
5.7.1.7. Text 100
5.7.1.7.1. http://www.text100.com/
5.7.2. Campaign/Engagement
5.7.2.1. WCG World
5.7.2.1.1. http://wcgworld.com/
5.7.3. Creative/Design Services
5.7.3.1. Duarte
5.7.3.1.1. http://www.duarte.com/
5.7.3.2. Gig Productions
5.7.3.2.1. http://www.gigpros.com/index.php
5.7.3.3. Initiate Marketing
5.7.3.3.1. http://www.getinitiated.ca/
5.7.3.4. MN8Studio
5.7.3.4.1. http://www.mn8studio.com/
5.7.3.5. Text 100
5.7.3.5.1. http://www.text100.com/
5.7.4. Web Site Design
5.7.4.1. Baytech Web Design
5.7.4.1.1. http://www.baytechwebdesign.com/
5.7.4.2. EU Design Studios
5.7.4.2.1. http://eudesignstudio.com/
5.7.4.3. Pro Logic Web Services
5.7.4.3.1. http://www.prologicsoft.com/
5.7.5. Market Destinations (Sites)
5.7.5.1. CRN
5.7.5.2. Hak5
5.7.5.3. MSPMentor
5.7.5.4. Madison Logic
5.7.5.5. SCmagazine
5.7.5.6. TheVarGuy
5.7.6. Marketing Videos
5.7.6.1. Epipheo
5.7.6.1.1. http://www.epipheo.com/
5.7.7. Marketing/Branding Agencies
5.7.7.1. Focused Image
5.7.7.1.1. http://www.focusedimage.com/branding/
5.7.7.2. Hill and Knowlton
5.7.7.2.1. http://www.hkstrategies.com/
5.7.7.3. MetaDesign
5.7.7.3.1. http://www.metadesign.com/san-francisco
5.7.7.4. Ogilvy & Mather
5.7.7.5. Tailfin Marketing Communications
5.7.7.6. Toolbox Studios
5.8. OEMs & System Integrators
5.8.1. Appliance Integrators
5.8.1.1. Accton
5.8.1.1.1. http://www.accton.com/
5.8.1.2. Advantech
5.8.1.2.1. http://www.advantech.com/
5.8.1.3. Celestica
5.8.1.3.1. http://www.celestica.com/
5.8.1.4. Dan-el Technologies Ltd.
5.8.1.4.1. http://www.danel.co.il/
5.8.1.5. Flextronics
5.8.1.5.1. http://www.flextronics.com/
5.8.1.6. Plexus
5.8.1.6.1. http://www.plexus.com/
5.8.2. Base Appliances
5.8.2.1. Advantech
5.8.2.2. Amax
5.8.2.3. Cas Well
5.8.2.4. Iron Systems
5.8.2.5. Lanner
5.8.2.6. Portwell
5.8.2.7. Tilera
5.8.3. Cards
5.8.3.1. Netronome
5.8.3.2. Tilera
5.8.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection
5.8.4. Encryption Acceleration
5.8.4.1. Intel
5.8.4.1.1. VPRO
5.8.4.2. Gemalto
5.8.4.2.1. Luna PCI
5.8.5. MSSP Appliances
5.8.5.1. 443 Networks
5.8.6. Threat Intelligence
5.8.6.1. Anti-Phishing
5.8.6.1.1. Cyren
5.8.6.2. DNS DGA Feeds
5.8.6.2.1. Farsight Security
5.8.6.3. File Reputation
5.8.6.3.1. Findthatfile
5.8.6.3.2. Webroot
5.8.6.4. Fraud
5.8.6.4.1. Internet Fraud Alert
5.8.6.4.2. National Cyber-Forensics and Training Alliance
5.8.6.5. IP Block Lists
5.8.6.5.1. WebRoot Brightcloud
5.8.6.5.2. Cyren
5.8.6.5.3. Malwarebytes
5.8.6.6. IP Reputation
5.8.6.6.1. Cyren
5.8.6.6.2. WebRoot Brightcloud
5.8.6.7. Indicators of Compromise
5.8.6.7.1. FireEye
5.8.6.7.2. Proofpoint
5.8.6.7.3. Wapack labs
5.8.6.7.4. CIRCL
5.8.6.8. Malicious URL
5.8.6.8.1. Cyren
5.8.6.8.2. Findthatfile
5.8.6.8.3. Webroot
5.8.6.9. Predictive
5.8.6.9.1. Seclytics
5.8.6.10. Vulnerability Research
5.8.6.10.1. Telus Security Labs
5.8.6.10.2. Vupen
5.8.7. Security Related Chips & CPUs
5.8.7.1. Broadcom
5.8.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection
5.8.7.2. Cavium
5.8.7.2.1. http://www.cavium.com
5.8.7.3. Lionic
5.8.7.3.1. http://www.lionic.com/
5.8.7.4. Netronome
5.8.7.4.1. http://www.netronome.com
5.8.7.5. Tilera
5.8.7.5.1. http://www.tilera.com/products/processors
5.8.7.6. Intel
5.8.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH
5.8.8. Software
5.8.8.1. Advanced Content Disarming and Reconstruction
5.8.8.1.1. OPSWAT
5.8.8.1.2. Votiro
5.8.8.2. Advanced Threat Protection - Virtual Execution Engines
5.8.8.2.1. ContentKeeper
5.8.8.2.2. Threat Track Security
5.8.8.3. Analytics/Graphing/Reporting
5.8.8.3.1. Logi Analytics
5.8.8.3.2. D3Plus
5.8.8.3.3. D3js
5.8.8.4. Anti-Spam/Phishing
5.8.8.4.1. APWG
5.8.8.4.2. BrandProtect
5.8.8.4.3. Cyren
5.8.8.4.4. Ikarus
5.8.8.4.5. Internet Fraud Alert
5.8.8.4.6. ReturnPath
5.8.8.4.7. WebRoot Brightcloud
5.8.8.5. AntiMalware
5.8.8.5.1. Antiy
5.8.8.5.2. Avira
5.8.8.5.3. Bitdefender
5.8.8.5.4. Cyren
5.8.8.5.5. ESet
5.8.8.5.6. Fortinet
5.8.8.5.7. GFI
5.8.8.5.8. Ikarus
5.8.8.5.9. Intel Security
5.8.8.5.10. Kaspersky
5.8.8.5.11. Norman
5.8.8.5.12. OPSWAT
5.8.8.5.13. QuickHeal
5.8.8.5.14. ThreatTrack
5.8.8.5.15. Zillya
5.8.8.5.16. ZonerAntiVirus
5.8.8.6. Content Extraction & Search
5.8.8.6.1. Oracle
5.8.8.7. Encryption
5.8.8.7.1. Transport
5.8.8.8. Endpoint Security and Management
5.8.8.8.1. OPSWAT
5.8.8.9. File Content Decoding/Analysis/Fingerprinting
5.8.8.9.1. HP Autonomy
5.8.8.9.2. Attivio
5.8.8.9.3. GTB Technologies
5.8.8.10. IT Service Management
5.8.8.10.1. ITRP
5.8.8.11. Image Recognition
5.8.8.11.1. Image Analyzer
5.8.8.12. Intrusion Detection/Prevention Signatures
5.8.8.12.1. Proofpoint
5.8.8.13. Network Stack
5.8.8.13.1. IPV4/6
5.8.8.13.2. Deep Packet Inspection
5.8.8.13.3. SDN
5.8.8.14. Optical Character Recognition
5.8.8.14.1. Abbyy
5.8.8.15. Social Network Content Control
5.8.8.15.1. NetboxBlue
5.8.8.16. URL Categorization
5.8.8.16.1. Cyren
5.8.8.16.2. Ikarus
5.8.8.16.3. Malware
5.8.8.16.4. Webroot Brightcloud
5.8.8.16.5. Zvelo
5.8.8.17. Voice Recognition
5.8.8.17.1. STC
5.8.8.17.2. Nuance
5.8.9. Managed Security OEMs
5.8.9.1. Digital Hands
5.9. Product Testing
5.9.1. Generic Product Testing, Certification and Accreditation
5.9.1.1. Certifications
5.9.1.1.1. North America
5.9.1.1.2. European Union
5.9.1.2. Testing
5.9.1.2.1. United Kingdom
5.9.1.2.2. North America
5.9.1.2.3. Singapore
5.9.1.3. Accreditation
5.9.1.3.1. DOD
5.9.1.3.2. NSA
5.9.2. Anti-Malware Testing
5.9.2.1. AMTSO
5.9.2.2. AV-Test
5.9.2.3. Av-Comparatives
5.9.2.4. MRG Effitas
5.9.2.5. VirusBTN
5.9.3. Sponsored Product Review/Testing
5.9.3.1. Delta Testing LTD
5.9.3.2. Dennis Labs
5.9.3.3. Miercom
5.9.3.4. NSS Labs
5.9.3.5. Network Testing Labs
5.9.3.6. Tolly Group
5.9.3.7. West Coast Labs
5.9.4. Antimalware Standards Bodies
5.9.4.1. AMTSO
5.9.4.1.1. http://www.amtso.org/
5.10. Cloud Service Brokerages
5.11. Security Conferences
5.11.1. North America
5.11.1.1. United States
5.11.1.1.1. RSA
5.11.1.1.2. Gartner
5.11.1.1.3. Cornerstones of Trust
5.11.1.1.4. Annual Security Conference
5.11.1.1.5. SecurityBsides
5.11.1.1.6. ShmooCon
5.11.2. Europe
5.11.2.1. United Kingdom
5.11.2.1.1. RSA Conference
5.11.2.1.2. Gartner
5.11.2.2. Russia
5.11.2.2.1. Infosecurity Russia
5.11.3. Emerging Asia Pacific
5.11.4. Mature Asia Pacific
5.11.4.1. Australia
5.11.4.1.1. Gartner
5.11.4.2. Singapore
5.11.4.2.1. RSA
5.12. Staffing/Recruiting/Executive Search
5.12.1. Millard Group
5.12.2. Lynch Bowie Group
5.12.3. Robert Half
5.13. User Interface Design
5.13.1. Consulting
5.13.1.1. User Interface
5.13.1.1.1. BlinkUX
5.13.1.1.2. Sasa Technologies
5.13.1.1.3. Dabapps
5.13.1.2. Customer Survey
5.13.1.2.1. Techvalidate
5.13.2. HTML5 Visualization Libraries
5.13.2.1. Data-Driven Documents
5.13.2.1.1. http://d3js.org/
5.13.2.2. AngularJS
5.13.2.2.1. https://angularjs.org/
5.13.3. Icons
5.13.3.1. IconExperience
5.13.3.1.1. https://www.iconexperience.com/
5.13.3.2. FlatIcon
5.13.3.2.1. http://www.flaticon.com/packs/general-ui
5.13.3.3. ModernUIicons
5.13.3.3.1. http://modernuiicons.com/
5.13.3.4. Ui8
5.13.3.4.1. https://ui8.net/categories/icons
6. Infrastructure Protection
6.1. Active Directory Defense
6.1.1. Aorato
6.1.1.1. http://www.aorato.com/
6.2. Cloud-Based Remote Access VPN
6.2.1. Check Point
6.2.1.1. Capsule Cloud
6.2.2. Pertino
6.2.3. Soha
6.3. DNS-based Threat Prevention/Detection
6.3.1. Standalone Appliances
6.3.1.1. Bluecat Networks
6.3.1.2. Efficient IP
6.3.1.3. Infoblox
6.3.2. Recursive DNS Services
6.3.2.1. Bluecat Networks
6.3.2.2. Cisco
6.3.2.2.1. OpenDNS
6.3.2.3. Comodo
6.3.2.4. CrowdStrike
6.3.2.5. Infoblox
6.3.2.6. Neustar
6.3.2.7. Nominum
6.3.2.8. Symantec
6.3.2.9. ThreatStop
6.3.2.10. Verisign
6.3.3. Firewalls
6.3.3.1. Palo Alto Networks
6.4. Denial of Service Protection
6.4.1. Appliances
6.4.1.1. Arbor Networks
6.4.1.1.1. Prevail APS
6.4.1.2. Check Point Software
6.4.1.2.1. DDos Protector
6.4.1.3. Corero
6.4.1.4. Fortinet
6.4.1.5. Genie Networks
6.4.1.5.1. ATM Appliances
6.4.1.6. NSFOCUS
6.4.1.7. Radware
6.4.1.8. WINS TECHNET LTD
6.4.1.8.1. http://www.wins21.co.kr/
6.4.2. Security as a Service
6.4.2.1. HTTP/HTTPS Only
6.4.2.1.1. DOSArrest
6.4.2.1.2. Cloudflare
6.4.2.2. MultiProtocol/Network
6.4.2.2.1. Akamai
6.4.2.2.2. Black Lotus
6.4.2.2.3. Cloud Flare
6.4.2.2.4. F5
6.4.2.2.5. Incapsula
6.4.2.2.6. Link11
6.4.2.2.7. Neustar
6.4.2.2.8. NexusGuard
6.4.2.2.9. Verisign Inc
6.4.3. Clean Pipe Services
6.4.3.1. AT&T
6.4.3.2. Verizon
6.5. Fraud Prevention/Web Malware Monitoring
6.5.1. Fraud/Bot/Webscrape Prevention
6.5.1.1. Software
6.5.1.1.1. RSA (EMC)
6.5.1.1.2. IBM (Formerly Trusteer)
6.5.1.1.3. Intellinx
6.5.1.2. Appliances
6.5.1.2.1. RSA
6.5.1.2.2. Distil Networks
6.5.1.2.3. White Ops
6.5.1.3. Software as a Service
6.5.1.3.1. Akamai
6.5.1.3.2. BioCatch
6.5.1.3.3. Distil Networks
6.5.1.3.4. Guardian Analytics
6.5.1.3.5. Kount
6.5.1.3.6. MarkMonitor
6.5.1.3.7. ShieldSquare
6.5.1.3.8. ThreatMetrix
6.5.1.3.9. White Ops
6.5.1.3.10. X-Cart
6.5.1.3.11. iovation
6.5.1.4. Virtual Appliances
6.5.1.4.1. Distil Networks
6.5.2. Website & Ad Malware Monitoring
6.5.2.1. Ad-Juster
6.5.2.2. Globalsign
6.5.2.2.1. Leverages Hackalert
6.5.2.3. Hackalert
6.5.2.4. Intel Security
6.5.2.4.1. Siteadvisor
6.5.2.5. QualysGuard
6.5.2.6. RiskIQ
6.5.2.7. Sucuri
6.6. Network Access Control (NAC)
6.6.1. Host Based
6.6.1.1. Symantec
6.6.1.2. Intel Security
6.6.2. Network Based
6.6.2.1. Aruba Networks
6.6.2.2. Bradford Networks
6.6.2.3. Cisco
6.6.2.4. Forescout
6.6.2.5. Milton Security Group
6.6.2.6. Portnox
6.7. Network Anonymization & Consumer VPN Services
6.7.1. AnchorFree Hotspot Shield
6.7.2. Anonymize.net
6.7.3. CyberGhost
6.7.4. Dispel
6.7.5. GoldenFrog
6.7.6. HMA ProVPN
6.7.6.1. TorVPN
6.7.7. Okayfreedom
6.7.8. OpenVPN Shield Exchange
6.7.9. Private Wifi
6.7.10. Tor
6.7.11. luminati.io
6.8. Network Firewalls
6.8.1. Carrier Firewalls
6.8.2. Enterprise Firewalls
6.8.2.1. Multifunction Enterprise Firewalls
6.8.2.1.1. Bluedon
6.8.2.1.2. Check Point Software
6.8.2.1.3. Cisco
6.8.2.1.4. Fortinet
6.8.2.1.5. Huawei
6.8.2.1.6. Palo Alto Networks
6.8.2.1.7. Sonicwall
6.8.2.1.8. Websense (Formerly Intel Security)
6.8.2.2. Stateful Inspection - Traditional Firewalls
6.8.2.2.1. Cisco
6.8.2.2.2. Huawei
6.8.2.2.3. Check Point Software
6.8.3. Multi-Funtion SMB Firewalls
6.8.3.1. 443 Networks
6.8.3.2. Bluedon
6.8.3.3. Check Point Software
6.8.3.4. CheckPoint
6.8.3.5. Cisco
6.8.3.6. Clavister
6.8.3.7. Endian
6.8.3.8. Fortinet
6.8.3.9. Hillstone Networks
6.8.3.10. Meraki
6.8.3.11. PineApp
6.8.3.11.1. http://www.pineapp.com/
6.8.3.12. Sangfor
6.8.3.13. Sonicwall
6.8.3.14. Sophos
6.8.3.15. Trustwave
6.8.3.16. Untangle
6.8.3.17. WINS TechNet LTD
6.8.3.17.1. http://www.wins21.co.kr/
6.8.3.18. WatchGuard
6.8.4. Open Source & Community
6.8.4.1. IPTables
6.8.4.2. IPchains
6.8.4.3. PFSense
6.8.4.4. Untangle
6.8.5. Router Firewalls
6.9. Network Intrusion Detection/Prevention
6.9.1. Predictive Modeling
6.9.1.1. Cyactive
6.9.1.2. Trustpipe
6.9.2. IBM
6.9.3. Signature Based
6.9.3.1. AlienVault
6.9.3.1.1. Snort
6.9.3.2. Bricata
6.9.3.3. CheckPoint
6.9.3.4. Cisco
6.9.3.4.1. Sourcefire
6.9.3.5. Enterasys
6.9.3.6. Fortinet
6.9.3.7. HP
6.9.3.7.1. TippingPoint
6.9.3.8. IBM
6.9.3.9. Intel Security
6.9.3.10. Open Source
6.9.3.10.1. Snort
6.9.3.11. Symantec
6.9.3.11.1. APT Network
6.9.3.12. WINS TECHNET LTD
6.9.3.12.1. http://www.wins21.co.kr/
6.9.4. SCADA
6.9.4.1. Radiflow
6.10. Network Packet Brokers
6.10.1. Adara
6.10.2. Apcon
6.10.3. Arista Networks
6.10.4. Cubro
6.10.5. Gigamon
6.10.6. IXIA
6.10.7. Interface Masters Technologies
6.10.8. JDSU
6.10.9. NetOptics
6.10.10. NetScout
6.10.11. VSS Monitoring
6.11. Network Traffic Analysis, Network Behavior Analysis and Network Forensics
6.11.1. Flow Analysis/Metadata Extraction
6.11.1.1. Arbor Networks
6.11.1.2. IBM
6.11.1.3. Lancope
6.11.1.4. LogRythm
6.11.1.5. Intel Security NBA
6.11.2. Forensic Capture with User Surveillance & Security Threat Analytics
6.11.2.1. Access Data
6.11.2.2. BlueCoat
6.11.2.3. Cisco
6.11.2.3.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html
6.11.2.4. EMC
6.11.2.5. FireEye
6.11.2.6. Fluke Networks
6.11.2.7. IBM
6.11.2.8. IP Fabrics
6.11.2.9. JDSU (Network Instruments)
6.11.2.10. LightCyber
6.11.2.11. NetAgent
6.11.2.12. NetResec
6.11.2.13. NetScout
6.11.2.14. Niksun
6.11.2.15. Novetta Solutions
6.11.2.16. Nuix
6.11.2.17. Packetsled
6.11.2.18. Riverbed
6.11.2.19. SS8
6.11.2.19.1. http://www.ss8.com/
6.11.2.20. nPulse Technologies
6.11.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring
6.11.3.1. Emulex
6.11.3.2. Packetsled
6.11.3.3. WildPackets
6.11.4. Network Forensics Tools
6.11.4.1. Alert Logic
6.11.4.1.1. Formerly Click Security
6.11.4.2. Corvil
6.11.4.3. Cybersift
6.11.4.3.1. http://www.cybersift.net/sifter10app.html
6.11.4.4. Decision Group INC
6.11.4.4.1. http://www.edecision4u.com/index.html
6.11.4.5. EMC
6.11.4.6. FireEye
6.11.4.7. Fluke Networks
6.11.4.8. IP Fabrics
6.11.4.9. IPCopper
6.11.4.10. InveaTech
6.11.4.10.1. https://www.invea.com/en/products-and-services/li-system
6.11.4.11. KLOS
6.11.4.11.1. http://www.klos.com/applications/lawful-intercept/
6.11.4.12. NEXT Computing
6.11.4.12.1. http://www.nextcomputing.com/products/packet-capture-systems
6.11.4.13. NetReSec
6.11.4.14. Niksun
6.11.4.15. Radisys
6.11.4.15.1. http://www.radisys.com/products/network-appliance/
6.11.4.16. Utimaco
6.11.4.16.1. https://lims.utimaco.com/utimaco-lims/
6.11.4.17. WildPackets
6.11.5. Network Forensics Tools as a Service (NFTaaS)
6.11.5.1. CloudShark
6.11.6. Network Taps
6.11.6.1. Optical
6.11.6.1.1. Apcon
6.11.6.1.2. DataCom Systems
6.11.6.1.3. FibreDyne
6.11.6.1.4. Gigamon
6.11.6.1.5. Glimmerglass
6.11.6.1.6. M2Optics
6.11.6.1.7. Netoptics
6.11.6.1.8. Network Instruments
6.11.6.1.9. VSS Monitoring
6.11.6.1.10. nTAP
6.11.7. Network Traffic Analysis
6.11.7.1. Amgine Securus
6.11.7.2. Arbor Networks
6.11.7.3. Boeing
6.11.7.4. Cisco
6.11.7.4.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html
6.11.7.5. Corvil
6.11.7.6. Cyber adAPT
6.11.7.7. Damballa
6.11.7.8. Darktrace
6.11.7.9. ExtraHop Networks
6.11.7.10. Fidelis Cybersecurity
6.11.7.11. Lancope
6.11.7.12. Light Cyber
6.11.7.13. Novetta Solutions
6.11.7.14. PacketSled
6.11.7.15. Phirelight
6.11.7.16. Qihoo 360
6.11.7.16.1. SkyEye
6.11.7.17. RedJack
6.11.7.18. SlashNext
6.11.7.19. Splunk
6.11.7.20. Taasera
6.11.7.21. ThreatTrack
6.11.7.22. Trustport
6.11.7.22.1. Threat Intelligence
6.11.7.23. Vectra Networks
6.11.7.24. WireX
6.11.8. Raw Network Packet Capture
6.11.8.1. Apcon
6.11.8.1.1. Riverbed
6.11.8.1.2. Netfort
6.11.8.1.3. Wireshark
6.11.8.1.4. NTOP
6.11.8.2. Arbor Networks
6.11.8.3. Comworth
6.11.8.4. NTOP.org
6.11.8.5. Netfort
6.11.8.6. WireShark
6.12. Network-Based Advanced Threat Protection
6.12.1. Firewalls with Malware Sandbox Capabilities
6.12.1.1. Barracuda
6.12.1.2. Check Point Software
6.12.1.3. Cisco
6.12.1.4. Fortinet
6.12.1.5. Huawei
6.12.1.6. Juniper Networks
6.12.1.7. Palo Alto Networks
6.12.1.8. Sonicwall
6.12.1.9. Sophos
6.12.1.10. Watchguard
6.12.2. Appliance Based Malware Sandboxes
6.12.2.1. AMGINE SECURUS
6.12.2.1.1. http://www.amgine.co.kr/index.html
6.12.2.2. AhnLab
6.12.2.3. Bluecoat
6.12.2.4. Check Point Software
6.12.2.4.1. Emulator Blade
6.12.2.5. Cisco
6.12.2.5.1. ThreatGrid
6.12.2.6. ContentKeeper
6.12.2.7. Cyphort
6.12.2.8. Damballa
6.12.2.9. FireEye
6.12.2.10. Fortinet
6.12.2.10.1. FortiSandbox
6.12.2.11. General Dynamics
6.12.2.11.1. Fidelis Security Systems
6.12.2.12. Huawei
6.12.2.12.1. Firehunter
6.12.2.13. Intel Security
6.12.2.13.1. McAfee Advanced Threat Detection Appliance
6.12.2.14. LastLine
6.12.2.15. Palo Alto Networks
6.12.2.15.1. WildFire
6.12.2.16. Payload Security
6.12.2.17. Qihoo
6.12.2.17.1. SkyEye
6.12.2.18. Techguard Security
6.12.2.19. ThreatTrack
6.12.2.20. Trend Micro
6.12.2.20.1. Deep Discovery
6.12.2.21. VMRay
6.12.2.22. VeeDog
6.12.2.22.1. http://veedog.com/
6.12.2.23. WINS TECHNET LTD
6.12.2.23.1. http://www.wins21.co.kr/
6.12.3. Cloud-Based Malware Sandboxes
6.12.3.1. Cisco
6.12.3.1.1. ThreatGrid
6.12.3.2. Fortinet
6.12.3.3. Huawei
6.12.3.4. Joe Security
6.12.3.5. Lastline
6.12.3.6. Netwitness
6.12.3.6.1. Spectrum
6.12.3.7. Palo Alto Networks
6.12.3.7.1. WildFire
6.12.3.8. Qihoo
6.12.3.8.1. SkyEye
6.12.3.9. Sonicwall
6.13. SCADA/ICS
6.13.1. Monitoring
6.13.1.1. CRITIFENSE
6.13.1.2. Cyberbit
6.13.1.3. PFP Cybersecurity
6.13.2. SCADA Firewalls
6.13.2.1. BAE Systems
6.13.2.1.1. http://www.baesystems.com/en-us/product/scada-firewall
6.13.2.2. Bayshore Networks
6.13.2.2.1. https://www.bayshorenetworks.com/products/it-ot-gateway/
6.13.2.3. Check Point Software
6.13.2.3.1. https://www.checkpoint.com/products-solutions/critical-infrastructure/
6.13.2.4. Endian
6.13.2.4.1. http://www.endian.com/products/4i/
6.13.2.5. Fortinet
6.13.2.5.1. https://www.fortinet.com/solutions/industries/scada-industrial-control-systems.html
6.13.2.6. Tofino Security
6.13.2.6.1. https://www.tofinosecurity.com/products/Tofino-Firewall-LSM
6.14. SSL Inspection Appliances
6.14.1. A10 Networks
6.14.2. Bluecoat
6.14.3. ResolutionOne
6.14.4. VSS Monitoring
6.14.5. SourceFire
6.15. Software Defined Perimeter
6.15.1. Certes Networks
6.15.2. Cryptzone
6.15.3. Tempered Networks
6.15.4. Unisys Stealth
6.15.5. Vidder
6.15.6. Waverly Labs
6.16. Virtual Private Networking (VPN/SSL VPN)
6.16.1. IPSec VPN Concentrators
6.16.1.1. Certes Networks
6.16.1.2. CheckPoint Software
6.16.1.3. Cisco
6.16.1.4. Mako Networks
6.16.2. Layer 2 Encryption
6.16.2.1. Certes Networks
6.16.3. Layer 4 Encryption
6.16.3.1. Certes Networks
6.16.4. SSL VPN
6.16.4.1. AhnLab
6.16.4.2. Array Networks
6.16.4.3. Barracuda Networks
6.16.4.4. Check Point Software
6.16.4.5. Cisco
6.16.4.6. Citrix
6.16.4.7. F5 Networks
6.16.4.8. Fortinet
6.16.4.9. Hillstone Networks
6.16.4.10. Juniper
6.16.4.11. NetGear
6.16.4.12. Sonicwall
6.16.4.13. Stonesoft
6.16.4.14. WatchGuard
6.16.5. Multi-Path Dynamic VPN
6.16.5.1. Secret Double Octopus
6.16.5.2. Dispersive Networks
6.17. Web/Email Protection
6.17.1. Secure Email Gateways
6.17.1.1. Alt-N Technologies
6.17.1.2. Bluecoat
6.17.1.3. Fortinet
6.17.1.4. GWAVA
6.17.1.5. Intel Security
6.17.1.6. Proofpoint
6.17.1.7. Re-Sec
6.17.1.8. Sonicwall
6.17.1.9. Symantec
6.17.1.10. Trustwave
6.17.1.11. Voitiro
6.17.1.12. Websense
6.17.1.13. iBoss
6.17.2. Secure Web Gateways
6.17.2.1. Anchiva
6.17.2.2. Bluecoat
6.17.2.3. ContentKeeper
6.17.2.4. GWAVA
6.17.2.5. Intel Security
6.17.2.6. Re-Sec
6.17.2.7. Symantec
6.17.2.8. Trustwave
6.17.2.9. Websense
6.17.2.10. iBoss
6.17.3. Security as a Service
6.17.3.1. Web & Email SaaS
6.17.3.1.1. Appriver
6.17.3.1.2. Barracuda
6.17.3.1.3. Bitglass
6.17.3.1.4. Cisco
6.17.3.1.5. Intel Security
6.17.3.1.6. MailGuard
6.17.3.1.7. Spamina
6.17.3.1.8. Symantec
6.17.3.1.9. Total Defense
6.17.3.1.10. TotalDefense
6.17.3.1.11. Websense
6.17.3.1.12. Zscaler
6.17.3.2. Web Only
6.17.3.2.1. Bluecoat
6.17.3.2.2. ContentKeeper
6.17.3.2.3. OpenDNS
6.17.3.2.4. Websense
6.17.3.2.5. Zscaler
6.17.3.3. Secure Email Gateways
6.17.3.3.1. Agari
6.17.3.3.2. CloudMark
6.17.3.3.3. Proofpoint
6.17.3.3.4. Return Path
6.17.3.3.5. Spam Experts
6.17.3.3.6. Spam Titan
6.17.3.3.7. Spamina
6.17.3.3.8. ValiMail
6.17.3.4. Anti-Phishing
6.17.3.4.1. Amgine Securus
6.17.3.4.2. Area1 Security
6.17.3.4.3. CloudMark
6.17.3.4.4. Cymbel
6.17.3.4.5. Cyveillance
6.17.3.4.6. FireEye
6.17.3.4.7. MailGuard
6.17.3.4.8. MediaPro
6.17.3.4.9. Phishlabs
6.17.3.4.10. ThreatTrack
6.17.3.4.11. Votiro
6.17.3.4.12. Webroot
6.17.3.4.13. ZapFraud
7. Security Consulting & Implementation
7.1. Forensics
7.1.1. Forensics
7.1.1.1. Incident Response
7.1.1.1.1. Crowdstrike
7.1.1.1.2. Cylance
7.1.1.1.3. Deloitte
7.1.1.1.4. Fidelis Cybersecurity
7.1.1.1.5. FireEye
7.1.1.1.6. Guidance Software
7.1.1.1.7. Maryman & Associates
7.1.1.1.8. NTT Coms Security
7.1.1.1.9. Nettitude
7.1.1.1.10. Optiv
7.1.1.1.11. Presecure
7.1.1.1.12. Secureworks
7.1.1.1.13. Verizon
7.1.1.2. E-Discovery & Computer Forensics
7.1.1.3. Endpoint Forensics
7.1.1.4. Network Forensics
7.2. Governance, Advisory, Assessment
7.2.1. Architecture and Design
7.2.2. Business Continuity
7.2.3. Compliance Review
7.2.4. Data Security Program
7.2.5. Governance, Compliance and Policy Design
7.2.5.1. Compliance Mandates
7.2.5.1.1. PCI
7.2.5.1.2. ISO
7.2.5.1.3. HITECH
7.2.5.1.4. HIPAA
7.2.6. People Centric Strategy
7.2.7. Policy Design
7.2.8. Program Assessment
7.2.9. Risk Assessment
7.2.10. Risk Management
7.2.10.1. Booz Allen Hamilton
7.2.10.2. Optiv
7.2.10.3. Cloud Risks
7.2.10.4. On Premise Infrastructure
7.2.10.5. Business Risk
7.2.11. Security Program Development
7.2.11.1. Optiv
7.2.11.2. FOX-IT
7.2.12. Strategy
7.2.13. Governance
7.2.13.1. Optiv
7.2.13.2. FOX-IT
7.2.13.3. Sec Consult
7.3. Operations
7.3.1. Application Security
7.3.1.1. Web
7.3.1.1.1. AppSec Consulting
7.3.1.1.2. Denim Group
7.3.1.1.3. Security Innovation
7.3.1.1.4. WhiteHat Security
7.3.1.1.5. Citigal
7.3.1.1.6. IOActive
7.3.1.2. Mobile
7.3.1.2.1. AppSec Consulting
7.3.1.2.2. Denim Group
7.3.1.3. Software Security Lifecycle (SDLC)
7.3.1.3.1. AppSecConsulting
7.3.1.3.2. Security Innovation
7.3.1.4. Custom Code
7.3.1.4.1. AppSec Consulting
7.3.1.4.2. Security Innovation
7.3.2. Application Security Vulnerability Assessement
7.3.3. Configuration Assessment
7.3.4. Device Security
7.3.5. Fraud, Identification and Privacy
7.3.6. Incident Response
7.3.6.1. Blackthorn Technologies
7.3.6.2. Crowdstrike
7.3.6.3. Dell SecureWorks
7.3.6.4. Deloitte
7.3.6.5. EY
7.3.6.6. FOX-IT
7.3.6.7. FireEye
7.3.6.8. High Tech Bridge
7.3.6.9. Ingalls Information Security
7.3.6.10. Intel Security
7.3.6.10.1. Foundstone
7.3.6.11. K2 Intelligence
7.3.6.12. Lares Consulting
7.3.6.13. Maryman
7.3.6.14. NTT Coms Security
7.3.6.15. Nettitude
7.3.6.16. Optiv
7.3.6.17. PWC
7.3.6.18. Presecure
7.3.6.19. Sec Consult
7.3.6.20. Stroz Friedberg
7.3.6.21. TrustMatta
7.3.7. Penetration Testing
7.3.7.1. AppSec Consulting
7.3.7.2. Core Security
7.3.7.3. Element Digital Security
7.3.7.3.1. http://www.edigitalsecurity.com/
7.3.7.4. FOX-IT
7.3.7.5. High Tech Bridge
7.3.7.6. Ingalls Information Security
7.3.7.7. K2 Intelligence
7.3.7.8. Matasano Security
7.3.7.9. NCC Group
7.3.7.10. Penetration Lab
7.3.7.11. Rapid7
7.3.7.12. Secureworks
7.3.7.13. TrustMatta
7.3.7.14. TrustedSec
7.3.7.15. WhiteHat Security
7.3.8. Remote Access
7.3.9. Secure Code Review
7.3.10. Threat Intelligence
7.3.11. Vulnerability Scan
7.4. Providers by Region
7.4.1. Latin America
7.4.2. Mature Asia/Pacific
7.4.3. Middle East and North Africa
7.4.3.1. Saudi Arabia
7.4.3.1.1. GBM
7.4.3.1.2. PGI
7.4.4. North America
7.4.4.1. A-G
7.4.4.1.1. AppsecConsulting
7.4.4.1.2. CSC
7.4.4.1.3. Control Case
7.4.4.1.4. CrowdStrike
7.4.4.1.5. Dell Secureworks
7.4.4.1.6. Deloitte
7.4.4.1.7. Denim Group
7.4.4.1.8. Ernst & Young
7.4.4.1.9. FireEye
7.4.4.1.10. ForSythe Solutions
7.4.4.1.11. Grant Thornton
7.4.4.2. H-L
7.4.4.2.1. HP
7.4.4.2.2. IBM
7.4.4.2.3. IOActive
7.4.4.2.4. Ingalls Information Security
7.4.4.2.5. Intel Security (Foundstone)
7.4.4.2.6. K2 Intelligence
7.4.4.2.7. Leidos
7.4.4.3. M-S
7.4.4.3.1. NTT Com Security
7.4.4.3.2. Neohapsis
7.4.4.3.3. Optiv
7.4.4.3.4. PWC
7.4.4.3.5. Paladion Networks
7.4.4.3.6. Perimeter eSecurity
7.4.4.3.7. Protivity
7.4.4.3.8. SISA
7.4.4.3.9. Solutionary
7.4.4.3.10. Stroz Friedberg
7.4.4.3.11. Sungard
7.4.4.3.12. Sword and Shield
7.4.4.3.13. Symantec
7.4.4.3.14. Syntegrity Networks
7.4.4.3.15. Sysnet Global Solutions
7.4.4.4. T-Z
7.4.4.4.1. Tevora Business Solutions
7.4.4.4.2. Trustwave
7.4.4.4.3. Verizon
7.4.4.4.4. WhiteHat Security
7.4.4.4.5. Zensar Technologies
7.4.5. Greater China
7.4.6. South Africa
7.4.6.1. Cyanre
7.4.6.1.1. http://www.cyanre.co.za/
7.4.7. Eurasia
7.4.7.1. Russia
7.4.8. Emerging Asia/Pacific
7.4.9. Canada
7.4.9.1. Conexsys
7.4.10. Europe
7.4.10.1. Eastern Europe
7.4.10.1.1. Poland
7.4.10.2. Western Europe
7.4.10.2.1. Italy
7.4.10.2.2. United Kingdom
8. Managed Security Services
8.1. Direct Tech Providers Managed Security
8.1.1. Asia Pacific
8.1.1.1. Australia
8.1.1.2. China
8.1.1.2.1. NSFOCUS
8.1.1.3. Singapore
8.1.2. Europe
8.1.2.1. GoGrid
8.1.2.1.1. Compliance Reporting (PCI, HIPAA)
8.1.2.1.2. Host IDS
8.1.2.1.3. Log Management
8.1.2.1.4. SIEM
8.1.2.1.5. Vulnerability Assessment
8.1.3. Global Providers
8.1.4. Middle East and North Africa
8.1.4.1. Saudi Arabia
8.1.4.2. United Arab Emirates
8.1.5. North America
8.1.5.1. United States
8.1.5.1.1. NSFOCUS
8.1.5.1.2. Check Point Software
8.1.5.1.3. Network Box
8.1.5.1.4. GoGrid
8.1.5.1.5. FireEye
8.1.5.1.6. Rapid7
8.2. Indirect Providers
8.2.1. Emerging Asia Pacific
8.2.1.1. India
8.2.1.1.1. CSS Corp PVT
8.2.1.1.2. Happiest Minds
8.2.1.1.3. SunGard Availability Services
8.2.1.1.4. Ecomnets India PVT. LTD
8.2.2. Europe
8.2.2.1. BT Global Services
8.2.2.2. Dell SecureWorks
8.2.2.3. Germany
8.2.2.3.1. Link11 GMBH
8.2.2.3.2. IPsoft
8.2.2.4. HP
8.2.2.5. Happiest Minds
8.2.2.5.1. Advanced Malware Protection
8.2.2.5.2. Application Activity Monitoring
8.2.2.5.3. Compliance Reporting
8.2.2.5.4. Database Activity Monitoring
8.2.2.5.5. File Integrity Monitoring
8.2.2.5.6. Log Management
8.2.2.5.7. Managed DLP
8.2.2.5.8. Network Forensics
8.2.2.5.9. SIEM
8.2.2.5.10. Unified Threat Management
8.2.2.5.11. Vulnerability Assessment
8.2.2.6. Integralis
8.2.2.7. Navisite
8.2.2.7.1. Mobile Device Management
8.2.2.8. Open Systems
8.2.2.9. Open Systems
8.2.2.10. Orange Business Services
8.2.2.11. SecureData
8.2.2.11.1. Firewall
8.2.2.11.2. IDS/IPS
8.2.2.11.3. SIEM
8.2.2.11.4. Data Loss Prevention
8.2.2.11.5. Secure Web Gateway
8.2.2.11.6. Secure Email Gateway
8.2.2.11.7. VPN/Remote Access
8.2.2.12. SunGard Availability Services
8.2.2.12.1. Firewalls
8.2.2.12.2. IAM
8.2.2.12.3. Intrusion Prevention
8.2.2.12.4. SIEM
8.2.2.12.5. Unified Threat Management
8.2.2.12.6. VPN
8.2.2.12.7. Web Application Firewall
8.2.2.13. Symantec
8.2.2.14. T-Systems
8.2.2.15. Tata Communications
8.2.2.16. Telefonica
8.2.2.16.1. DDoS Protection Service
8.2.2.16.2. Email Encryption
8.2.2.16.3. Email Security Gateway
8.2.2.16.4. Firewall Management
8.2.2.16.5. IAM
8.2.2.16.6. Intrusion Detection
8.2.2.16.7. Intrusion Prevention
8.2.2.16.8. Log Management
8.2.2.16.9. SIEM
8.2.2.16.10. Vulnerability Assessment
8.2.2.16.11. Web Security Gateway
8.2.2.16.12. Anti-Fraud
8.2.2.17. Verizon Business
8.2.2.17.1. Anti-DDoS
8.2.2.17.2. Email Security
8.2.2.17.3. Endpoint Protection
8.2.2.17.4. Firewall Management
8.2.2.17.5. Intrusion Detection
8.2.2.17.6. Intrusion Prevention
8.2.2.17.7. SIEM
8.2.2.17.8. Vulnerability Assessment
8.2.2.17.9. Web Security
8.2.2.18. Wipro
8.2.2.18.1. Email Security Gateway
8.2.2.18.2. Endpoint Security
8.2.2.18.3. Firewall Management
8.2.2.18.4. Fraud Management/Anti-Money Laundering
8.2.2.18.5. GRC
8.2.2.18.6. IAM
8.2.2.18.7. Intrusion Detection
8.2.2.18.8. Intrusion Prevention
8.2.2.18.9. SIEM
8.2.2.18.10. User Access Management
8.2.2.18.11. Web Security Gateway
8.2.3. Global Providers
8.2.3.1. AT&T
8.2.3.1.1. DDos Protection
8.2.3.1.2. Email/Data Encryption Services
8.2.3.1.3. Endpoint Anti-Virus
8.2.3.1.4. Endpoint Patch Management
8.2.3.1.5. Endpoint Policy Compliance
8.2.3.1.6. Mobile Device Security
8.2.3.1.7. Secure Email Gateway
8.2.3.1.8. Security Device Management
8.2.3.1.9. Web Application Firewall
8.2.3.1.10. Web Gateway (URL & Malware Filtering)
8.2.3.2. BEW Global
8.2.3.2.1. Data Loss Prevention
8.2.3.2.2. Web Security Gateway
8.2.3.2.3. Email Security Gateway
8.2.3.2.4. SIEM
8.2.3.2.5. Vulnerability Assessment
8.2.3.3. BT
8.2.3.4. Dell Secureworks
8.2.3.4.1. Advanced Malware Protection
8.2.3.4.2. Email Security Gateway
8.2.3.4.3. Firewall Management
8.2.3.4.4. Host IPS
8.2.3.4.5. IDS/IPS
8.2.3.4.6. Log Management
8.2.3.4.7. Log Retention
8.2.3.4.8. SIEM
8.2.3.4.9. Threat Intelligence
8.2.3.4.10. Unified Threat Management
8.2.3.4.11. Vulnerability Assessment
8.2.3.4.12. Web Application Firewall
8.2.3.4.13. Web Application Vulnerability Assessment
8.2.3.5. Dimension Data
8.2.3.6. HP
8.2.3.6.1. Access Managment
8.2.3.6.2. Data Loss Prevention
8.2.3.6.3. Email Security Gateway
8.2.3.6.4. Endpoint Encryption
8.2.3.6.5. Endpoint Protection
8.2.3.6.6. Intrusion Detection
8.2.3.6.7. Intrusion Prevention
8.2.3.6.8. Managed Incident Response
8.2.3.6.9. Remote Access Management
8.2.3.6.10. SIEM
8.2.3.6.11. Vulnerability Assessment
8.2.3.6.12. Web Application Vulnerability Assessment
8.2.3.6.13. Web Security Gateway
8.2.3.7. IBM
8.2.3.7.1. Email Security Gateway
8.2.3.7.2. Endpoint Patch Management
8.2.3.7.3. Endpoint Policy Management
8.2.3.7.4. Endpoint Protection
8.2.3.7.5. Firewall Management
8.2.3.7.6. IAM
8.2.3.7.7. Intrusion Detection
8.2.3.7.8. Intrusion Prevention
8.2.3.7.9. Log Management
8.2.3.7.10. Mobile Device Security
8.2.3.7.11. SIEM
8.2.3.7.12. Unified Threat Management
8.2.3.7.13. Vulnerability Assessment
8.2.3.7.14. Web Security Gateway
8.2.3.7.15. Web Vulnerability Assessment
8.2.3.8. Proficio
8.2.3.8.1. Email Security
8.2.3.8.2. Firewall Management
8.2.3.8.3. Incident Response
8.2.3.8.4. Log Management
8.2.3.8.5. Privileged Account Management
8.2.3.8.6. Regulatory and Polcy Compliance
8.2.3.8.7. SIEM
8.2.3.8.8. SOC Services
8.2.3.8.9. Vulnerability Assessment
8.2.3.8.10. Web Security
8.2.3.9. Tech Mahindra
8.2.3.9.1. Email Security
8.2.3.9.2. Endpoint Protection
8.2.3.9.3. Firewall Management
8.2.3.9.4. Identity and Access Management
8.2.3.9.5. Intrusion Detection
8.2.3.9.6. Intrusion Prevention
8.2.3.9.7. Log Management
8.2.3.9.8. SIEM
8.2.3.9.9. SOC Services
8.2.3.9.10. Vulnerability Assessment
8.2.3.9.11. Web Security
8.2.3.10. Telstra
8.2.3.11. Verizon Business
8.2.3.11.1. Anti-DDoS
8.2.3.11.2. Email Security
8.2.3.11.3. Endpoint Protection
8.2.3.11.4. Firewall Management
8.2.3.11.5. Intrusion Detection
8.2.3.11.6. Intrusion Prevention
8.2.3.11.7. SIEM
8.2.3.11.8. Vulnerability Assessment
8.2.3.11.9. Web Security
8.2.4. Greater China
8.2.4.1. Hong Kong
8.2.4.1.1. Network Box
8.2.4.1.2. Netswitch
8.2.4.2. BEW Global
8.2.4.2.1. Data Loss Prevention
8.2.4.2.2. Web Security Gateway
8.2.4.2.3. Email Security Gateway
8.2.4.2.4. SIEM
8.2.4.2.5. Vulnerability Assessment
8.2.4.3. Beijing
8.2.4.3.1. Netswitch
8.2.4.4. Shanghai
8.2.4.4.1. Shanghai Data Solution Co., Ltd
8.2.5. Latin America
8.2.5.1. Brazil
8.2.5.1.1. Arcon
8.2.5.1.2. Netcentrics
8.2.5.1.3. RealProtect
8.2.5.1.4. UOL Diveo
8.2.6. Mature Asia Pacific
8.2.6.1. Australia
8.2.6.1.1. Tesserent
8.2.6.1.2. Verizon
8.2.6.2. Singapore
8.2.6.2.1. Quann
8.2.6.2.2. NTT Singapore
8.2.6.2.3. Happiest Minds
8.2.6.2.4. Singtel
8.2.6.2.5. NCS Group
8.2.7. Middle East and North Africa
8.2.7.1. Saudi Arabia
8.2.7.2. United Arab Emirates
8.2.7.2.1. Du Telecom
8.2.7.2.2. Tata Communications
8.2.7.2.3. Dell Secureworks
8.2.7.2.4. Dimension Data
8.2.8. North America
8.2.8.1. Canada
8.2.8.1.1. Above Security
8.2.8.1.2. Bell Canada
8.2.8.1.3. EWA
8.2.8.1.4. Happiest Minds
8.2.8.1.5. Netpulse
8.2.8.1.6. OneStone (Formerly Seccuris)
8.2.8.1.7. SecureData
8.2.8.1.8. SentryMetrics
8.2.8.1.9. SunGard Availability Services
8.2.8.1.10. Virtual Guardian
8.2.8.2. United States
8.2.8.2.1. AT&T
8.2.8.2.2. Above Security
8.2.8.2.3. Alert Logic
8.2.8.2.4. Allstream
8.2.8.2.5. CGI
8.2.8.2.6. CSC
8.2.8.2.7. CSS Corp
8.2.8.2.8. CentraComm
8.2.8.2.9. CenturyLink- Savvis
8.2.8.2.10. Clone Systems
8.2.8.2.11. Compucom Systems
8.2.8.2.12. Cosentry
8.2.8.2.13. Dell Secureworks
8.2.8.2.14. Earthlink
8.2.8.2.15. Esentire
8.2.8.2.16. HCL Technologies
8.2.8.2.17. HP
8.2.8.2.18. Happiest Minds
8.2.8.2.19. IBM
8.2.8.2.20. Intelisecure
8.2.8.2.21. Leidos
8.2.8.2.22. LunarLine
8.2.8.2.23. Masergy Communications
8.2.8.2.24. Megapath
8.2.8.2.25. Morphick
8.2.8.2.26. My Digital Shield
8.2.8.2.27. NCA - Network Computing Architects
8.2.8.2.28. Navisite
8.2.8.2.29. Netfortris
8.2.8.2.30. Netswitch
8.2.8.2.31. Nuspire Networks
8.2.8.2.32. Rook Security
8.2.8.2.33. Secure Designs
8.2.8.2.34. SilverSky (Formerly Stillsecure/Perimeter esecurity)
8.2.8.2.35. Solutionary
8.2.8.2.36. SunGard Availability Services
8.2.8.2.37. Sword and Shield
8.2.8.2.38. Symantec
8.2.8.2.39. Symantec
8.2.8.2.40. Syntegrity Networks
8.2.8.2.41. Tesserent
8.2.8.2.42. Trustwave
8.2.8.2.43. Verizon Business
8.2.8.2.44. Wipro
8.2.9. Sub-Sahara Africa
8.2.9.1. AccessKenya
8.2.9.1.1. Firewall
8.2.9.1.2. Endpoint Protection
8.2.9.1.3. Secure Web Gateway
9. Endpoint Security
9.1. Anti-Malware
9.1.1. Eastern Europe
9.1.1.1. Czech Republic
9.1.1.1.1. Avast
9.1.1.1.2. TrustPort
9.1.1.2. Denmark
9.1.1.2.1. BullGuard
9.1.1.3. Netherlands
9.1.1.3.1. AVG
9.1.1.4. Romania
9.1.1.4.1. Bitdefender
9.1.1.5. Slovakia
9.1.1.5.1. ESET
9.1.2. Emerging Asia/Pacific
9.1.2.1. India
9.1.2.1.1. eScan
9.1.2.1.2. K7 Computing
9.1.3. Latin America
9.1.3.1. Spain
9.1.3.1.1. Optenet
9.1.4. Mature Asia/Pacific
9.1.4.1. China
9.1.4.1.1. Qihoo
9.1.4.1.2. Rising International Software
9.1.4.2. South Korean
9.1.4.2.1. AhnLab
9.1.4.2.2. BKAV
9.1.4.2.3. ESTsoft
9.1.5. Middle East and Africa
9.1.5.1. Israel
9.1.5.1.1. Check Point Software
9.1.6. North America
9.1.6.1. Cyren
9.1.6.2. Fortinet
9.1.6.3. Intel Security
9.1.6.4. MalwareBytes
9.1.6.5. McAfee
9.1.6.6. Microsoft
9.1.6.7. PC Pitstop
9.1.6.8. Reason Core Security
9.1.6.9. Roboscan
9.1.6.10. Symantec
9.1.6.11. ThreatTrack
9.1.6.12. Total Defense
9.1.6.13. Trend Micro
9.1.7. Russia
9.1.7.1. Kaspersky
9.1.8. Western Europe
9.1.8.1. Austria
9.1.8.1.1. Ikarus Security
9.1.8.2. Finland
9.1.8.2.1. F-Secure
9.1.8.3. Germany
9.1.8.3.1. Avira
9.1.8.3.2. G-Data
9.1.8.3.3. Kromtech
9.1.8.4. Norway
9.1.8.4.1. Norman
9.1.8.5. United Kingdom
9.1.8.5.1. Sophos
9.1.8.6. Poland
9.1.8.6.1. Arcabit
9.2. Application Isolation
9.2.1. Blue Ridge Networks
9.2.1.1. http://www.blueridge.com/index.php/products/appguard/consumer
9.2.2. Bromium
9.2.3. Bufferzone
9.2.4. Invincea
9.2.4.1. SandBoxie
9.2.5. VMware
9.3. Endpoint Sandboxes and Virtualized Containers
9.3.1. Endpoint Sandboxes
9.3.1.1. Panda
9.3.1.1.1. www.panda.com
9.3.1.2. Sandboxie
9.3.1.2.1. http://www.sandboxie.com/
9.3.1.3. Bitdefender
9.3.1.3.1. www.bitdefender.com
9.3.2. Type-0 Hypervisors
9.3.2.1. Lynxworks
9.3.2.1.1. http://www.lynuxworks.com/
9.3.2.2. Zirtu
9.3.3. Process Isolation/Virtualization
9.3.3.1. Avectco
9.3.3.2. Bromium
9.3.3.3. Invincea
9.4. Endpoint Intrusion Prevention
9.4.1. Arkoon
9.4.1.1. StormShield
9.4.2. BeyondTrust
9.4.3. IBM
9.4.4. Landesk
9.4.5. McAfee
9.4.6. Safensoft
9.4.7. Symantec
9.5. Enterprise Mobility Mangement Suites
9.5.1. Absolute Software
9.5.2. AMware
9.5.2.1. Airwatch
9.5.3. Blackberry
9.5.4. Citrix
9.5.5. Globo
9.5.6. Good Technologies
9.5.7. IBM
9.5.8. Landesk
9.5.9. MobileIron
9.5.10. Mojave
9.5.10.1. https://www.mojave.net/
9.5.11. SAP
9.5.12. Sophos
9.5.13. Soti
9.5.14. Symantec
9.5.15. Tangoe
9.6. Application Control
9.6.1. AppSense
9.6.2. Avecto
9.6.3. Bit9
9.6.4. Landesk
9.6.5. Lumension
9.6.6. McAfee
9.6.7. Sophos
9.6.8. Symantec
9.6.9. Trend Micro
9.7. Exploit Technique Prevention Software
9.7.1. CyActive
9.7.2. CyBellum
9.7.3. Malwarebytes Anti-Exploit
9.7.4. Microsoft
9.7.4.1. Microsoft EMET - FREE
9.7.5. Morphisec
9.7.6. Palo Alto Networks
9.7.6.1. Endpoint
9.7.7. Sophos
9.7.7.1. Intercept X
9.7.8. Trend Micro
9.7.9. ViRobot APT Shield
9.8. File Integrity Monitoring
9.8.1. Open Source
9.8.1.1. 1. AIDE
9.8.1.2. 2. Trend Micro
9.8.1.2.1. 1. OSSEC
9.8.1.3. 3. Samhain
9.8.1.4. 4. Osiris
9.8.1.5. 5. Integrit
9.8.1.6. 6. Tripwire
9.8.2. Commercial
9.8.2.1. Imperva
9.8.2.2. Intel Security
9.8.2.3. Tripwire
9.9. Malware Analysis
9.9.1. Botnets
9.9.1.1. spyeyetracker.abuse.ch
9.9.2. Internet Identity
9.9.3. Malware Patrol
9.9.4. SpamHaus
9.9.5. Team Cymru
9.9.6. ThreatGrid
9.9.7. VirusTotal
9.9.8. zeustracker.abuse.ch
9.9.9. JoeSecurity
9.9.10. Shadowserver
9.10. Mobile Device Management
9.10.1. Absolute Software
9.10.2. Beachhead Security
9.10.3. Blackberry
9.10.4. Citrix
9.10.5. Globo
9.10.6. Good Technologies
9.10.7. IBM
9.10.8. Landesk
9.10.9. MobileIron
9.10.10. Mojave
9.10.10.1. https://www.mojave.net/
9.10.11. SAP
9.10.12. Sophos
9.10.13. Soti
9.10.14. Symantec
9.10.15. Tangoe
9.10.16. VMware
9.10.16.1. Airwatch
9.11. Policy Assessment and System Configuration Management
9.11.1. BMC
9.11.1.1. BMC Server Automation
9.11.2. Check Point Software
9.11.2.1. Endpoint Policy Management
9.11.3. IBM
9.11.3.1. IBM Endpoint Manager
9.11.4. Intel Security
9.11.4.1. Policy Auditor
9.11.5. RedHat
9.11.5.1. OpenSCAP
9.11.6. Saint
9.11.6.1. Saint Security
9.11.7. Tripwire
9.11.7.1. Tripwire Enterprise
10. Data & Collaboration Security
10.1. Data Governance and Classification
10.1.1. Expert Source
10.1.1.1. http://www.expertsource.in/index.php
10.1.2. HP
10.1.3. IBM
10.1.4. Informatica
10.1.5. Nuix
10.1.6. Somansa
10.1.7. Titus
10.1.8. boldonjames
10.2. Data Loss Prevention (DLP)
10.2.1. Endpoint
10.2.1.1. Data Classification and Tracking
10.2.1.1.1. Banyan Solutions
10.2.1.1.2. BoldonJames
10.2.1.1.3. Digital Guardian
10.2.1.1.4. HP
10.2.1.1.5. IBM
10.2.1.1.6. Identity Finder
10.2.1.1.7. Mach1 Development
10.2.1.1.8. Microsoft (Formerly Secure Islands)
10.2.1.1.9. MinerEye
10.2.1.1.10. Nuix
10.2.1.1.11. Smartlogic
10.2.1.1.12. Titus
10.2.1.1.13. Varonis
10.2.1.1.14. CoSoSys
10.2.1.2. Mobile
10.2.1.2.1. Symantec
10.2.1.2.2. Websense
10.2.1.2.3. Microsoft (Secure Islands)
10.2.1.3. Windows
10.2.1.3.1. Absolute Software
10.2.1.3.2. CA Technologies
10.2.1.3.3. Digital Guardian
10.2.1.3.4. GTB Technologies
10.2.1.3.5. Infowatch
10.2.1.3.6. Intel Security
10.2.1.3.7. RSA
10.2.1.3.8. Microsoft (Secure Islands)
10.2.1.3.9. Somansa
10.2.1.3.10. Symantec
10.2.1.3.11. Trustwave
10.2.1.3.12. Watchful Software
10.2.1.3.13. Raytheon-Websense
10.2.1.3.14. Zecurion
10.2.2. Network
10.2.2.1. Digital Guardian
10.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)
10.2.2.3. Symantec
10.2.2.4. InfoWatch
10.2.3. Secure Email Gateway
10.2.3.1. Cisco
10.2.3.2. Symantec
10.2.3.3. Intel Security
10.2.3.4. Somansa
10.2.4. Secure Web Gateway
10.2.4.1. Intel Security
10.2.4.2. Symantec
10.2.4.3. Somansa
10.2.5. Security as a Service
10.2.5.1. Consumer
10.2.5.1.1. Reputation.com
10.2.5.1.2. Social Fortress
10.2.5.1.3. PwnedList
10.2.5.2. Enterprise
10.2.5.2.1. Social Fortress
10.2.5.2.2. Google Apps
10.2.5.2.3. ZixCorp
10.3. Database Security
10.3.1. Database Audit and Protection (DAP)
10.3.1.1. Application Security, Inc
10.3.1.2. BeyondTrust
10.3.1.3. Big Data Platform DAP
10.3.1.3.1. BlueTalon
10.3.1.3.2. Cloudera
10.3.1.3.3. Hortonworks
10.3.1.3.4. IBM
10.3.1.3.5. Imperva
10.3.1.4. DataSunrise
10.3.1.5. Fortinet
10.3.1.6. GreenSQL
10.3.1.7. IBM
10.3.1.8. IRI
10.3.1.8.1. Oracle
10.3.1.8.2. SQL Server
10.3.1.9. Imperva
10.3.1.10. Intel Security
10.3.1.11. Mentis Software
10.3.1.12. Oracle Corp
10.3.1.13. PentaSecurity
10.3.1.14. Warevalley
10.3.2. Database Activity Monitoring
10.3.2.1. DB Networks
10.3.2.2. Somansa
10.4. Encryption/Tokenization
10.4.1. Big Data
10.4.1.1. Gazzang
10.4.1.2. Vormetric
10.4.2. Cloud/SAAS Encryption
10.4.2.1. Appliances
10.4.2.1.1. Office365
10.4.2.1.2. Ciphercloud
10.4.2.1.3. Afore Solutions
10.4.2.1.4. Perspecsys
10.4.2.2. Software
10.4.2.2.1. BoxCryptor
10.4.2.2.2. CloudMask
10.4.2.2.3. PrivateCore
10.4.2.2.4. Trend Micro
10.4.2.2.5. Viivo
10.4.2.2.6. Voltage Security
10.4.2.3. Software as a Service
10.4.2.3.1. Trend Micro
10.4.2.3.2. SooKasa
10.4.2.3.3. Gemalto
10.4.3. Cryptographic Providers
10.4.3.1. RSA
10.4.3.2. Quintessence
10.4.3.3. Microsoft
10.4.4. Data masking
10.4.4.1. Oracle
10.4.4.2. Dataguise
10.4.4.3. Informatica
10.4.4.4. IBM
10.4.4.5. Voltage Security
10.4.4.6. Green SQL
10.4.4.7. Mentis
10.4.4.8. Compuware
10.4.4.9. Axis
10.4.4.10. Privacy Analytics
10.4.4.11. Camouflage Software
10.4.4.12. Solix Technologies
10.4.4.13. Net 2000
10.4.5. Database
10.4.5.1. Gemalto
10.4.5.2. Dark Matter Labs
10.4.5.3. Vormetric
10.4.6. Email
10.4.6.1. ZixCorp
10.4.6.2. Encryptics
10.4.6.2.1. https://www.encryptics.com/default.aspx
10.4.7. Encrypted USB Storage
10.4.7.1. Apricorn
10.4.7.2. Datalocker
10.4.7.3. Integral Memory
10.4.7.4. IronKey
10.4.7.5. Kingston
10.4.7.6. Virbatim
10.4.8. File/Folder
10.4.8.1. Covertix
10.4.8.1.1. http://www.covertix.com/
10.4.8.2. IBM
10.4.8.2.1. Mainframe
10.4.8.3. SecureIslands
10.4.8.4. Sophos
10.4.8.4.1. SafeGuard Enterprise (Utimaco)
10.4.8.5. Symantec (PGP)
10.4.8.6. Vormetric
10.4.8.7. WinMagic
10.4.8.7.1. SecureDoc
10.4.9. Quantum Encryption
10.4.9.1. IDQ
10.4.9.2. Quintessence Labs
10.4.9.3. Whitewood Encryption
10.4.10. Tokenization
10.4.10.1. Protegrity
10.4.11. Whole Disk
10.4.11.1. Intel Security
10.4.11.2. Symantec (PGP)
10.4.11.3. CheckPoint Software
10.4.11.4. Encryption Management
10.4.11.4.1. Wave Systems
10.4.11.5. WinMagic
10.4.11.5.1. SecureDoc
10.4.11.6. Microsoft
10.4.11.6.1. Bitlocker
10.4.11.7. Sophos
10.4.11.7.1. SafeGuard Enterprise (Utimaco)
10.4.11.8. Trustwave
10.4.11.8.1. DataControl
10.4.11.9. Vormetric
10.5. File Analysis Software
10.5.1. Acaveo
10.5.2. Active Navigation
10.5.3. AvePoint
10.5.4. Beyond Recognition
10.5.5. Bloomberg
10.5.6. CommVault
10.5.7. Condrey
10.5.8. Covertix
10.5.9. DataGlobal
10.5.10. DataGravity
10.5.11. Equivio
10.5.12. HP
10.5.12.1. Control Point
10.5.13. HiSoftware
10.5.14. IBM
10.5.14.1. StoreIQ
10.5.15. Identifty Finder
10.5.16. Imperva
10.5.17. Index Engines
10.5.18. Kazoup
10.5.19. MailGuard
10.5.20. NTP Software
10.5.21. Novell
10.5.22. Nuix
10.5.23. Proofpoint
10.5.24. Stealthbits
10.5.25. Varonis
10.5.26. WatchDox
10.5.27. Whitebox Security
10.5.28. ZyLab
10.6. Hardware Security Modules (HSM)
10.6.1. Cloud HSM
10.6.1.1. Amazon
10.6.1.2. IBM
10.6.2. Hardware
10.6.2.1. FutureX
10.6.2.2. Gemalto
10.6.2.3. HPE
10.6.2.4. Safenet
10.6.2.5. Thales
10.7. Software Defined Storage Security
10.7.1. Dispersive Networks
10.7.1.1. https://dispersivetechnologies.com/
10.7.2. OceansBlue
10.7.2.1. http://www.oceansblue.net/index.html
10.8. eSignatures
10.8.1. Adobe eSign Services
10.8.2. Alphatrust
10.8.3. Docusign
10.8.4. Hellosign
10.8.5. Rightsignature
10.8.6. Sertifi
11. Identity and Access Management (IAM)
11.1. AD/Unix bridge
11.1.1. Centrify
11.2. Enterprise single sign-on (ESSO)
11.3. Externalized authorization management (EAM)
11.3.1. Axiomatics
11.3.2. Dell Quest (BitKoo)
11.4. IAM as a Service
11.4.1. Centrify
11.4.2. IBM (Formerly Lighthouse Security)
11.4.3. Identity Automation
11.4.4. Intel
11.4.5. Okta
11.4.6. Password Bank
11.4.7. Ping Identity
11.4.8. Sailpoint
11.4.9. Symplifyed
11.4.10. iWelcome
11.5. Identity governance and administration
11.5.1. CA Technologies
11.5.2. IBM Security
11.5.3. Oracle
11.5.4. RSA (Aveksa)
11.6. Privileged account management (PAM)
11.6.1. BeyondTrust
11.6.2. Lieberman Software
11.6.3. Cyber Ark
11.6.4. Dell
11.6.5. Centrify
11.7. Public Certificate Authorities
11.7.1. Comodo
11.7.2. Geotrust
11.7.3. Godaddy
11.7.4. Symantec (Formerly VeriSign)
11.8. User Authentication
11.8.1. Tokens
11.8.1.1. OOB authentication
11.8.1.1.1. SMS
11.8.1.1.2. Voice
11.8.1.1.3. Push
11.8.1.1.4. Email
11.8.1.1.5. Social media
11.8.1.2. OTP tokens
11.8.1.2.1. OTP hardware tokens
11.8.1.2.2. OTP software tokens for smart phones
11.8.1.3. X.509 tokens
11.8.1.4. Other tokens
11.8.1.4.1. ANECT AS - ALUCID
11.8.2. Contextual authentication
11.8.2.1. Google
11.8.2.1.1. Trust API
11.8.3. KBA
11.8.3.1. It's Me Security
11.8.3.1.1. http://www.itsmesecurity.com/
11.8.4. Biometrics
11.8.4.1. Behavioral
11.8.4.1.1. Typing rhythm/keystroke dynamics
11.8.4.1.2. Voice recognition
11.8.4.2. Biological
11.8.4.2.1. Face recognition
11.8.4.2.2. Fingerprint
11.8.5. Wide-focus vendors
11.8.5.1. Alladin-RD
11.8.5.2. CA Technologies
11.8.5.3. Entrust
11.8.5.4. HID Global
11.8.5.5. RSA
11.8.5.5.1. Adaptive Auth
11.8.5.6. Gemalto
11.8.5.7. Symantec
11.8.5.8. Technology Nexus
11.8.5.9. VASCO
11.9. User Privilege Management
11.9.1. Appsense
11.9.1.1. http://www.appsense.com/
11.9.2. Ariella
11.9.2.1. http://www.arellia.com/
11.9.3. Avectco
11.9.3.1. http://www.avecto.com/
11.9.4. BeyondTrust
11.9.4.1. http://www.beyondtrust.com/
11.9.5. Centrify
11.9.5.1. http://www.centrify.com/
11.9.6. CionSystems
11.9.7. CrossIdeas
11.9.7.1. http://www.crossideas.com/
11.9.8. Dell
11.9.8.1. http://www.quest.com/desktop-authority-management-suite/
11.9.9. Lieberman Software
11.9.9.1. http://www.liebsoft.com/
11.9.10. Viewfinity
11.9.10.1. http://www.viewfinity.com/
12. Application Security
12.1. Web Application Firewalls (WAF) & Application Security
12.1.1. Web Threat Disruption Technology
12.1.1.1. Software
12.1.1.1.1. NuCaptcha
12.1.1.1.2. NuData
12.1.1.2. Appliances
12.1.1.2.1. Juniper
12.1.1.2.2. Shape Security
12.1.1.3. Open Source
12.1.1.3.1. Google Hack Honeypot
12.2. Web Application Security
12.2.1. Code Review Products
12.2.1.1. HP
12.2.1.2. IBM
12.2.2. Web Application Vulnerability Scanning Services
12.2.2.1. Cenzic
12.2.2.2. Controlscan
12.2.2.3. High-Tech Bridge
12.2.2.4. McAfee Secure
12.2.2.5. Qualys
12.2.2.6. Securi
12.2.2.7. Sitelock
12.2.2.8. Trustwave
12.2.2.9. WebSecurify
12.2.2.10. WhiteHat Security
12.2.3. Scanning Software
12.2.3.1. Open Source
12.2.3.1.1. Arachni Scanner
12.2.3.1.2. Subgraph
12.2.3.1.3. W3af
12.2.3.1.4. Wapiti
12.2.3.1.5. Watcher
12.2.3.2. Commercial
12.2.3.2.1. Accunetix
12.2.3.2.2. BeyondTrust
12.2.3.2.3. Cenzic
12.2.3.2.4. HP
12.2.3.2.5. MavitunaSecurity
12.2.3.2.6. NTObjectives
12.2.3.2.7. Nstalker
12.2.3.2.8. Portswigger
12.2.3.2.9. Syhunt
13. Risk, Compliance and Security Management
13.1. Firewall Workflow,Modeling & Change Management
13.1.1. Checkpoint Software
13.1.2. Firemon
13.1.3. ManageEngine
13.1.4. Redseal Networks
13.1.5. Skybox
13.1.6. Tufin
13.1.7. Veriflow
13.2. Legal and regulatory information governance
13.3. Privacy
13.4. Regulations, Awareness and Training
13.4.1. Computer Based Training
13.4.1.1. Aujas
13.4.1.2. BeOne Development
13.4.1.3. Digital Defense
13.4.1.4. Fishnet Security
13.4.1.5. Inspired eLearning
13.4.1.6. Junglemap
13.4.1.7. KnowBe4
13.4.1.8. MediaPro
13.4.1.9. PhishMe
13.4.1.10. Phishline
13.4.1.11. Popcorn Training
13.4.1.12. Sans Institute
13.4.1.13. Scipp International
13.4.1.14. Secure Mentem
13.4.1.15. Security Innovation
13.4.1.16. Security Mentor
13.4.1.17. The Security Awareness Company
13.4.1.18. ThreatSim
13.4.1.19. Wombat Security Technologies
13.4.2. Educational, Awareness & News Outlets
13.4.2.1. Government Led
13.4.2.1.1. Information Sharing and Analysis Centers (ISACs)
13.4.2.2. Periodicals & Target Roles
13.4.2.2.1. Channel
13.4.2.2.2. CISO/CSO
13.4.2.2.3. Security Engineers/Analysts
13.4.3. Industry Standards/Groups
13.4.3.1. Standards
13.4.3.1.1. Technical
13.4.3.2. Industry Groups
13.4.3.2.1. Audit
13.4.3.2.2. General Security
13.4.3.2.3. Forensics
13.4.4. Regulations, Public Standards and Contractual Mandates
13.4.4.1. Global
13.4.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)
13.4.4.1.2. NIST
13.4.4.2. Country/Region Specific
13.4.4.2.1. China
13.4.4.2.2. Singapore
13.4.4.2.3. European Union
13.4.4.2.4. United States
13.5. Security Policy and Response Orchaestration Platforms
13.5.1. FireEye
13.5.2. Phantom
13.5.2.1. https://www.phantom.us/
13.5.3. Proofpoint
13.6. Security Program and Governance
13.6.1. Governance, Risk and Compliance
13.6.1.1. eGRC
13.6.1.1.1. Software as a Service
13.6.1.1.2. Software
13.6.1.2. Compliance Oriented Private Cloud Hosting (COPCH)
13.6.1.2.1. Note: This list is not an attestation of compliance
13.6.1.3. Operational Risk Analytics
13.6.1.3.1. Algosec
13.6.1.3.2. Cyber Observer
13.6.1.3.3. Cytegic
13.6.1.3.4. Firemon
13.6.1.3.5. IBM
13.6.1.3.6. Redseal Networks
13.6.1.3.7. RiskIO
13.6.1.3.8. Skybox
13.6.1.3.9. Software Development Lifecycle
13.6.1.3.10. Solarwinds
13.6.1.3.11. Tufin
13.6.1.4. Cloud & Container Compliance Assessment
13.6.1.4.1. Cavirin
14. Random Knowledge
14.1. Detection Methods
14.1.1. File Analysis
14.1.1.1. Computed Hash
14.1.1.1.1. Uniqueness
14.1.1.2. Metadata Attributes
14.1.1.2.1. File Content Inspection
14.1.1.2.2. File Headers
14.1.1.2.3. Temporal Analysis
14.1.1.2.4. Temporal Analysis with Prevalence
14.1.1.2.5. Time/Date
14.1.1.2.6. Certificate and Signature Evaluation (PKI)
14.1.1.3. Packing Method
14.1.1.3.1. Multi-packing Analysis
14.1.2. Network Specific
14.1.2.1. Protocol/File/Session Decode & Analysis
14.1.2.1.1. File Extraction
14.1.2.1.2. Playback (Surveillance)
14.1.2.1.3. File/Session Viewing
14.1.2.1.4. Correlation
14.1.2.1.5. Machine Learning (AI)
14.1.2.2. Network Flow Analysis
14.1.2.2.1. Machine Learning (AI)
14.1.2.3. Application Layer Analysis
14.1.2.3.1. Classification, Correlation , Deviance from Baselines (Heuristics)
14.1.2.3.2. Deep Packet Inspection (DPI)
14.1.2.3.3. Application Command and Input Analysis
14.1.2.4. IP Layer Analysis
14.1.2.4.1. TCP/UDP Ports
14.1.2.4.2. IP Address
14.1.3. Malware Behavioral Evaluations
14.1.3.1. Persistence
14.1.3.1.1. Installs as System Service
14.1.3.1.2. Installs Registry Keys in Startup locations
14.1.3.1.3. Modifies filesystem in specific locations
14.1.3.2. Suspicious Behaviors Evaluated
14.1.3.2.1. Attempts to login to systems that a specific user credential is not normally used on
14.1.3.2.2. Becomes another user on the system
14.1.3.2.3. CPU of Processes Spawned is high
14.1.3.2.4. Connects with a known bad URL or IP Address
14.1.3.2.5. Escalates privileges
14.1.3.2.6. Examines the Documents Folder or User Document Folders
14.1.3.2.7. File Isn't widely prevalent in user population
14.1.3.2.8. Injects data into memory of another running process
14.1.3.2.9. Modifies memory of another process
14.1.3.2.10. Opens TCP/IP Connections to other hosts
14.1.3.2.11. Performs a network port sweep
14.1.3.2.12. Process executes net use DOS command inside command.exe
14.1.3.2.13. Process spawns command.exe
14.1.3.2.14. Removes logs/events of application logs or operating system
14.1.3.2.15. Self Delete of files
14.1.3.2.16. Self-copy of files
14.1.3.2.17. Starts to repeatedly call the crypt function (ransom sign)
14.1.3.2.18. Time of execution is not normal in context of historical analysis
14.1.4. User
14.1.4.1. Activity on system when user's employment is in termination status
14.1.4.2. Deviates from past user behavior
14.1.4.3. Device not historically associated to user
14.1.4.4. Login time anamoly
14.1.4.5. Login time outside user's home timezone
14.1.4.6. Privileged data accessed
14.1.4.6.1. Volumetric analysis
14.1.4.6.2. Deviation from baseline
14.1.4.6.3. Cut-paste function used
14.1.4.7. Remote access and time of day abnormal from baselines
14.1.4.8. User authentication failure
14.1.4.9. User's browser or viewer is not the same as the baseline
14.1.4.10. User is logging into system remotely and locally simultaneously
14.1.4.11. User is logging into system remotely (not expected)
14.1.4.12. User is logging into system remotely at an abnormal time
14.1.4.13. User is abnormally leveraging applications that are administrative in nature (Control Panel, Command.exe, Group Policy Editor, etc)