Information Security Technologies & Markets - by Lawrence Pingree

Get Started. It's Free
or sign up with your email address
Information Security Technologies & Markets - by Lawrence Pingree by Mind Map: Information Security Technologies & Markets - by Lawrence Pingree

1. Web Application Firewalls

1.1. Virtualized Appliances

1.1.1. A10 Networks

1.1.2. AlertLogic

1.1.3. Amazon AWS Riverbed

1.1.4. Barracuda Networks

1.1.5. BeeWare

1.1.6. DenyAll

1.1.7. Ergon Informatik AG

1.1.8. F5

1.1.9. Fortinet

1.1.10. Forum Systems

1.1.11. Imperva

1.1.12. PentaSecurity

1.1.13. Trustwave

1.1.14. Citrix Netscaler VPX

1.2. Physical Appliances

1.2.1. A10 Networks

1.2.2. AdNovum

1.2.3. AlertLogic

1.2.4. Anchiva

1.2.5. Barracuda Networks

1.2.6. BeeWare

1.2.7. BugSec

1.2.8. Citrix

1.2.9. DBAPPSecurity

1.2.10. DPtech

1.2.11. Dell Sonicwall

1.2.12. DenyAll

1.2.13. Ergon Informatik

1.2.14. F5

1.2.15. Fortinet

1.2.16. Forum Systems

1.2.17. HP

1.2.18. Imperva

1.2.19. NSFocus

1.2.20. PentaSecurity

1.2.21. Positive Technologies

1.2.22. RadWare

1.2.23. Trustwave


1.3. Software

1.3.1. Dedicated Software AdNovum Applicure DenyAll ERGON Informatik AG AIRLOCK Forum Systems Positive Security Riverbed Trustifier!overview WebScurity

1.3.2. Open Source IronBee Mod Security

1.3.3. Web Server Modules Microsoft IIS AQTRONIX Applicure BeyondTrust ThreatSentry Apache Applicure

1.4. Managed Services

1.4.1. Dell Secureworks

1.4.2. AT&T

1.4.3. Verizon Business

1.5. Software as a Service

1.5.1. Akamai Kona

1.5.2. AlertLogic

1.5.3. Anquanbao

1.5.4. ArmorLogic

1.5.5. BinarySec

1.5.6. CloudFlare

1.5.7. DenyAll

1.5.8. FireBlade

1.5.9. Imperva (Incapsula)

1.5.10. Incapsula

1.5.11. PowerCDN

1.5.12. Qualys

1.5.13. Securi

1.5.14. Signal Sciences

1.5.15. Soha

1.5.16. ZenEdge

2. Cloud Security

2.1. Cloud/Virtualized Firewalls

2.1.1. Agent-Based CloudPassage Drawbridge Networks Illumio

2.1.2. Cisco

2.1.3. Citrix Xen Hillstone Networks Huawei Fortinet Palo Alto Networks

2.1.4. Container-Based ShieldX

2.1.5. Hyper-V Fortinet

2.1.6. KVM Hillstone Networks Juniper Networks Palo Alto Networks

2.1.7. Openstack OpenFlow Fortinet Juniper Networks

2.1.8. Public Cloud Virtual Appliances Barracuda Brocade Catbird Networks Check Point Software Juniper Networks Palo Alto Networks PfSense Sophos vArmour API-Driven Dome9 Illumio AWS Check Point Software Fortinet Palo Alto Networks Microsoft Azure Check Point Software Fortinet Container-Based

2.1.9. VMware Environments API Integration Check Point Software Fortinet Palo Alto Networks NSX Fortinet Check Point Software VM Appliance Barracuda Brocade Catbird Networks Check Point Software Fortinet Hillstone Networks Juniper Networks Palo Alto Networks PfSense Sophos vArmour Huawei

3. Security Operations & Incident Response

3.1. Digital Forensics/eDiscovery

3.1.1. Content, File and Endpoint Forensics eDiscovery Clearwell Kazeon Guidance Software Access Data Autonomy kCura FTI Technology Barracuda Networks Mobile Devices BlackBagTech Cellebrite Compelson Labs Guidance Software MSAB NowSecure Oxygen Forensics Paraben Corporation Endpoint Computing Systems ADF Solutions Access Data ArxSys BlackBag Technologies CRU Inc Cyfir Guidance Software Magnet Forensics Nuix OSForensics Paraben Corporation WindowsScope X-Ways Forensics Email Examination Systools Software Nuix Forensic File & Data Analysis Tools Cellebrite Cyfir Intella Magnet Forensics Nuix Systools Software Digital Forensics Case Management D3 Security Digital Investigation Manager Guidance Software Intaforensiscs Sentinel Data Sirentech Wynyard Group Memory Forensics FireEye Guidance Software Volatility Framework WindowsScope

3.1.2. eDiscovery Services Robert Half Advanced Discovery

3.1.3. eDiscovery Software AccessData Guidance Software Nuix Symantec

3.2. Fraud Prevention/Web Malware Monitoring

3.2.1. Fraud/Bot/Webscrape Prevention Software IBM (Formerly Trusteer) Intellinx RSA (EMC) ShieldSquare Appliances Distil Networks Imperva RSA Shape Security White Ops Software as a Service Akamai BioCatch BotScout Distil Networks Guardian Analytics Kount MarkMonitor NuData Security Shape Security ShieldSquare ThreatMetrix White Ops X-Cart iovation Virtual Appliances Distil Networks Imperva

3.2.2. Website & Ad Malware Monitoring Ad-Juster Globalsign Leverages Hackalert Hackalert Intel Security Siteadvisor QualysGuard RiskIQ Sucuri The Media Trust

3.3. Incident Response Legal Services

3.3.1. Information Law Group

3.4. Security Information and Event Management (SIEM), Log Management & Analytics

3.4.1. Application Security Intelligence Engine SAP iT-Cube Systems

3.4.2. Log Management EventTracker IGLOO Security Intel Security McAfee Enterprise Log Manager Kiwi Syslog Server LogEntries LogRythm Logscape Open Source Elasticsearch (ELK Stack) SEC (Simple Event Correlator) OSSIM Syslog-NG Octopussy Sawmill Splunk Sumo Logic Tripwire XpoLog

3.4.3. SIEM AlienVault OSSIM CorreLog EventTracker Fortinet HP Arcsight Hexis Cyber Solutions Hawkeye AP IBM Q1Radar IGLOO Security Intel Security NitroSecurity LogPoint LogRythm Novell Sentinel RSA Envision Sensage Solarwinds Splunk Sqrrl Tibco Loglogic eIQnetworks

3.4.4. Security Analytics Anomaly Analytics Intel Theta Ray Prelert eMite User and Entity Behavior Analytics (UEBA) Bay Dynamics Darktrace Detex Systems Exabeam Fortscale Gurcul HP IBM Interset Microsoft Niara ObserveIT Palerra Platfora Reveelium Secureonix Veriato

3.4.5. User and Entity Behavior Analytics (UEBA) Bae Systems Applied Intelligence Bay Dynamics Caspida Click Security Exabeam FICO Fortscale GuruCul IBM Intellinx Lockheed Martin Logtrust Mobile System 7 Novetta Solutions Oracle Rapid7 Raytheon SAS Institute Secureonix Splunk

3.5. Security Operations, Analytics and Reporting (SOAR)

3.5.1. Security Incident Response Platforms (SIRP) Agiliance DFLabs Demisto EMC(RSA) Empow Fido Hexadite ID Experts Proofpoint Resilient Systems Siemplify Syncurity

3.5.2. Threat and Vulnerability Management (TVM) Acuity Risk Management Agiliance BeyondTrust Core Security Cybersponse DFLabs EMC(RSA) Kenna Security NopSec RedSeal RiskSense Skybox Security Swimlane Siemplify

3.5.3. Security Operations Analytics Ayehu Cybersponse DFLabs EMC(RSA) Hexadite Proofpoint Resilient Systems Siemplify Swimlane

3.5.4. Security Operations Automation Platforms (SOAPS) Ayehu Cyberbit Cybersponse DFLabs Demisto Fireye Hexadite IBM Phantom Cyber Swimlane Syncurity

3.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

3.6.1. Crowdsourced Application Security Testing Platforms Hyver Applause Bugcrowd BugFinders Cobalt Crowdtesters HackerOne

3.6.2. Managed Penetration Testing Services Cenzic WhiteHatSecurity

3.6.3. Penetration Testing Software Core Security Rapid7 Metasploit Pro Metasploit Express Trustwave

3.6.4. Vulnerability Assessment Software as a Service Vulnerability Management Phish Testing/Management Network-Based Vulnerability Assessment (On Premise) Core Security Digital Defense Fortinet Intel Security NSAuditor Ncircle Netasq Outpost24 Qualys RandomStorm Rapid 7 Trustwave Agent-Based Vulnerability Assessment BeyondTrust Qualys Secunia Tenable Mainframe Vulnerability Assessment Key Resources Inc. (KRI)

3.6.5. Vulnerability Correlation Application Vulnerability Correlation Code DX Denim Group Kenna Security NopSec Network Vulnerability Correlation Secure Decisions RiskSense NopSec Kenna Security Cybric

3.6.6. Vulnerability Research CSC HP DV Labs HotWAN Intel Security SecNiche Labs Sourcefire VRT Symantec VRLSec Vupen

4. Emerging Security Markets & Technologies

4.1. Application Security

4.1.1. Runtime Application Self-Protection (RASP) Arxan Checkmarx Contrast Security HP Immunio Metaforic OneASP Prevoty SecuPi Veracode Virsec Waratek whiteCryption

4.1.2. Enterprise App-Layer Protection SecuPI

4.1.3. AI-Based Applicaton Threat Defense Barricade Signal Sciences

4.2. Cloud Security

4.2.1. Cloud Protection Gateways CipherCloud Netskope Perspecsys Skyhigh Networks Vaultive

4.2.2. Cloud Access Security Brokers User Activity Monitoring Adallom Avanan Bitglass Elastica Imperva Netscope SkyHigh Networks Data Loss Prevention Integrated DLP Encryption Adallom Avanan Managed Methods SkyHigh Networks Identity and Access Management Centrify Cloudiway Okta Ping Access Control Adallom Avanan Bitglass Elastica FireLayers Managed Methods Netskope Skyfence

4.2.3. Cloud Application Discovery Ciphercloud Elastica Netskope Skyhigh

4.2.4. Cloud Compliance and Security Risk Platforms AlertLogic Cavirin Cloudcheckr Harvest AI

4.3. Cross Domain Solutions

4.3.1. Advenica ZoneGuard SecuriRam

4.3.2. General Dynamics TacGuard Crossing Guard NanoXD

4.3.3. LockHeed Martin Trusted Manager

4.3.4. Tresys XD Air XD Bridge XD Guardian

4.3.5. Owl Computing Owl OPDS-100 Owl OPDS-100D OCDS-SFF

4.4. Data Security

4.4.1. Network-Based Data Cleansing DataStealth

4.4.2. Big Data Security BlueTalon

4.5. Endpoint Security

4.5.1. Endpoint Detection and Response (EDR) Agent-Based Carbon Black Cisco Countertack CrowdStrike Cyberbit Cyberreason Cylance Deep Instinct Digital Guardian Dtex Systems Endgame Systems Fidelis Cybersecurity FireEye Forescout Guidance Software Hexis Cyber Solutions Invincea LogRhythm NexThink Panda Security RSA (EMC) SecDo SentinelOne Tanium Triumfant Verint Ziften Agentless BeyondTrust Cynet Fidelis ForeScout Hexadite Hexis Cyber Solutions InfoCyte LightCyber Outlier Security Promisec

4.5.2. Remote Browser-Isolation (remote dom) Amune Armor5 Authentic8 Dispel FireGlass Menlo Security Aurionpro Formerly Spikes Security

4.6. Identification, Authentication, Access Control & IAM

4.7. Internet of Things

4.7.1. Automotive Security Innovation

4.7.2. Embedded Security Security Innovation

4.8. Network & Infrastructure Security

4.8.1. Content Disarm and Reconstruction (CDR) Check Point Software Threat Extraction Glasswall Mimecast OPSWAT ODI Re-Sec Sasa-Software Solebit Labs Symantec DisArm TreSys Votiro

4.8.2. Malware Infection Analysis and Monitoring Services Lastline Guardia Cisco Formerly OpenDNS Qualys Seculert

4.8.3. Network Behavior and Analytics Industrial Control Systems (ICS) CyberX

4.8.4. Standalone Threat Intelligence Defense Solutions (STIDS) Bandura PoliWall Centripetal Networks Damballa Fidelis Cybersecurity FireEye Group IB Ixia LookingGlass Redsocks Redsocks Threat Defender ReversingLabs Symantec APT Network

4.8.5. Unauthorized Endpoint Connection Prevention (UECP) Ensilo Intel Security

4.8.6. Software Defined WAN (SDwan) CloudGenix Pertino Velocloud Viptela Versa Networks

4.8.7. Virtual Container Security Apcera Aqua Security Illumio StackRox TwistLock

4.8.8. Network Security as a Service Cato Networks MyDigitalShield Zscaler

4.9. Risk, Compliance and Security Management

4.9.1. Security Ratings & Insurance Security Ratings Bitsight Technologies Prevalent SecurityScoreCard QuadMetrics Cyber Risk Insurance Balsiger Insurance HSB Group Philadelphia Insurance Companies Tennant Risk Services The Hartford Travelers

4.10. Security Operations, Incident Response

4.10.1. Intelligence/Data Feeds/Software & Services Security Intelligence and Data Analysis Platforms FireEye Threat Intelligence Platforms (TIPs) Anomali BAE Systems Buguroo Codenomicon Comilion Confer Eclectic IQ Infoblox Lockheed Martin Lookingglass Cyber Solutions Microsoft Palentir PierceMatrix Service Now (Formerly Brightpoint) Soltra ThreatConnect ThreatQuotient TruStar Threat Intelligence Services Human Intelligence - HUMINT (Strategic) Machine-Based (Tactical) Vulnerabilities and Exploits Data Loss Detection - External Collaborative Threat Investigation Platforms BAE System Detica IKANow Maltego NC4 Palentir

4.10.2. Malware Analysis Malware Analysis as a Service Free Services ReversingLabs ThreatGrid Sandbox Software GFI Joesecurity Bluecoat Payload Security

4.10.3. Threat Deception Technologies Distributed Deception Platforms Amgine Securus Atomic Software Solutions Attivo Networks Cymmetria GuardiCore Illusive Networks Javelin Networks KeyFocus SmokeScreen Specter TrapX Vision Space Technologies Network ForeScout Juniper Networks Percipient Networks Ridgeback Network Defense Shadow Networks Open Source Honeypot Web Shape Security Juniper Networks CyberTrap

5. VARs, Distributors, Market Logistics & Supply Chain

5.1. Cloud Service Brokerages

5.1.1. Bitnami

5.1.2. Ensim

5.1.3. Gravitant

5.1.4. Jamcracker

5.1.5. StandingCloud

5.2. Distribution/Channel/VARs

5.2.1. VARs, Resellers China Mainland China Hong Kong Taiwan Emerging Asia Pacific India Indonesia Malasia Thailand Philippines Eurasia Russian Federation Kazakhstan Ukraine Europe Eastern Europe Western Europe Latin America Brazil Chile Columbia Costa Rica Ecuador Bolivia Venezuela Cuba Argentina Buenos Aires Mexico Peru Mature Asia Pacific Australia Japan Singapore Middle East and North Africa Turkey Israel Saudi Arabia South Africa India United Arab Emirates North America United States Canada Sub-Sahara Africa South Africa WorldWide AT&T BT Optiv SHI Secureworks Verizon Business

5.2.2. Distributors China AVNet B & Data Technology Co. Ltd. Beijing Advazone Electronic Limited Comp Beijing HolyZone Technology Co.,Ltd. Digital China Technology LTD. Ecs China Edvance Technology (China) Limited Huagai M.Tech (Shanghai) Co., Ltd. Shanghai S-I Information Tech. Ltd Sinogrid Information Technology Ltd. Sky Faith International Enterprise Emerging Asia Pacific India Indonesia Thailand Eurasia Russian Federation Kazakhstan Mature Asia Pacific Singapore Japan South Korea Australia Middle East and South Africa United Arab Emirates South Africa North America Canada United States Sub-Sahara Africa South Africa Western Europe United Kingdom Germany Worldwide AVNet Ingram Micro LifeBoat Distribution Tech Data Westcon Latin America Mexico Brazil

5.2.3. Reseller Programs

5.2.4. Logistics/Deal Registration Connectwise

5.3. Government Cyberwarrior (Personnel Estimates)

5.3.1. United States NSA Cyberwarrior Stats Department of Defense US Airforce US Navy DISA

5.3.2. Iran 4500

5.3.3. Israel Unit 8200 5000

5.3.4. North Korea 1000

5.4. Hardware and Chip Security

5.4.1. AMD TPM

5.4.2. Cavium Multi-Core Processors

5.4.3. Flow Processors Netronome

5.4.4. Intel TPM Data Execution Protection

5.4.5. Systems Janus Technologies

5.5. Investment

5.5.1. ETFs PureFunds SYM:HACK

5.5.2. Venture Capitalists Trident Capital Andreesen Horowitz

5.6. Managed Service Enablement

5.6.1. Chartec

5.6.2. Jamcracker

5.7. Marketing/PR/AR

5.7.1. Analyst & Public Relations Focused Image KTCpr Madison Alexander PR Marc Gendron PR Schwartz Communications Spalding Communications Text 100

5.7.2. Campaign/Engagement WCG World

5.7.3. Creative/Design Services Duarte Gig Productions Initiate Marketing MN8Studio Text 100

5.7.4. Web Site Design Baytech Web Design EU Design Studios Pro Logic Web Services

5.7.5. Market Destinations (Sites) CRN Hak5 MSPMentor Madison Logic SCmagazine TheVarGuy

5.7.6. Marketing Videos Epipheo

5.7.7. Marketing/Branding Agencies Focused Image Hill and Knowlton MetaDesign Ogilvy & Mather Tailfin Marketing Communications Toolbox Studios

5.8. OEMs & System Integrators

5.8.1. Appliance Integrators Accton Advantech Celestica Dan-el Technologies Ltd. Flextronics Plexus

5.8.2. Base Appliances Advantech Amax Cas Well Iron Systems Lanner Portwell Tilera

5.8.3. Cards Netronome Tilera

5.8.4. Encryption Acceleration Intel VPRO Gemalto Luna PCI

5.8.5. MSSP Appliances 443 Networks

5.8.6. Threat Intelligence Anti-Phishing Cyren DNS DGA Feeds Farsight Security File Reputation Findthatfile Webroot Fraud Internet Fraud Alert National Cyber-Forensics and Training Alliance IP Block Lists WebRoot Brightcloud Cyren Malwarebytes IP Reputation Cyren WebRoot Brightcloud Indicators of Compromise FireEye Proofpoint Wapack labs CIRCL Malicious URL Cyren Findthatfile Webroot Predictive Seclytics Vulnerability Research Telus Security Labs Vupen

5.8.7. Security Related Chips & CPUs Broadcom Cavium Lionic Netronome Tilera Intel

5.8.8. Software Advanced Content Disarming and Reconstruction OPSWAT Votiro Advanced Threat Protection - Virtual Execution Engines ContentKeeper Threat Track Security Analytics/Graphing/Reporting Logi Analytics D3Plus D3js Anti-Spam/Phishing APWG BrandProtect Cyren Ikarus Internet Fraud Alert ReturnPath WebRoot Brightcloud AntiMalware Antiy Avira Bitdefender Cyren ESet Fortinet GFI Ikarus Intel Security Kaspersky Norman OPSWAT QuickHeal ThreatTrack Zillya ZonerAntiVirus Content Extraction & Search Oracle Encryption Transport Endpoint Security and Management OPSWAT File Content Decoding/Analysis/Fingerprinting HP Autonomy Attivio GTB Technologies IT Service Management ITRP Image Recognition Image Analyzer Intrusion Detection/Prevention Signatures Proofpoint Network Stack IPV4/6 Deep Packet Inspection SDN Optical Character Recognition Abbyy Social Network Content Control NetboxBlue URL Categorization Cyren Ikarus Malware Webroot Brightcloud Zvelo Voice Recognition STC Nuance

5.8.9. Managed Security OEMs Digital Hands

5.9. Product Testing

5.9.1. Generic Product Testing, Certification and Accreditation Certifications North America European Union Testing United Kingdom North America Singapore Accreditation DOD NSA

5.9.2. Anti-Malware Testing AMTSO AV-Test Av-Comparatives MRG Effitas VirusBTN

5.9.3. Sponsored Product Review/Testing Delta Testing LTD Dennis Labs Miercom NSS Labs Network Testing Labs Tolly Group West Coast Labs

5.9.4. Antimalware Standards Bodies AMTSO

5.10. Cloud Service Brokerages

5.11. Security Conferences

5.11.1. North America United States RSA Gartner Cornerstones of Trust Annual Security Conference SecurityBsides ShmooCon

5.11.2. Europe United Kingdom RSA Conference Gartner Russia Infosecurity Russia

5.11.3. Emerging Asia Pacific

5.11.4. Mature Asia Pacific Australia Gartner Singapore RSA

5.12. Staffing/Recruiting/Executive Search

5.12.1. Millard Group

5.12.2. Lynch Bowie Group

5.12.3. Robert Half

5.13. User Interface Design

5.13.1. Consulting User Interface BlinkUX Sasa Technologies Dabapps Customer Survey Techvalidate

5.13.2. HTML5 Visualization Libraries Data-Driven Documents AngularJS

5.13.3. Icons IconExperience FlatIcon ModernUIicons Ui8

6. Infrastructure Protection

6.1. Active Directory Defense

6.1.1. Aorato

6.2. Cloud-Based Remote Access VPN

6.2.1. Check Point Capsule Cloud

6.2.2. Pertino

6.2.3. Soha

6.3. DNS-based Threat Prevention/Detection

6.3.1. Standalone Appliances Bluecat Networks Efficient IP Infoblox

6.3.2. Recursive DNS  Services Bluecat Networks Cisco OpenDNS Comodo CrowdStrike Infoblox Neustar Nominum Symantec ThreatStop Verisign

6.3.3. Firewalls Palo Alto Networks

6.4. Denial of Service Protection

6.4.1. Appliances Arbor Networks Prevail APS Check Point Software DDos Protector Corero Fortinet Genie Networks ATM Appliances NSFOCUS Radware WINS TECHNET LTD

6.4.2. Security as a Service HTTP/HTTPS Only DOSArrest Cloudflare MultiProtocol/Network Akamai Black Lotus Cloud Flare F5 Incapsula Link11 Neustar NexusGuard Verisign Inc

6.4.3. Clean Pipe Services AT&T Verizon

6.5. Fraud Prevention/Web Malware Monitoring

6.5.1. Fraud/Bot/Webscrape Prevention Software RSA (EMC) IBM (Formerly Trusteer) Intellinx Appliances RSA Distil Networks White Ops Software as a Service Akamai BioCatch Distil Networks Guardian Analytics Kount MarkMonitor ShieldSquare ThreatMetrix White Ops X-Cart iovation Virtual Appliances Distil Networks

6.5.2. Website & Ad Malware Monitoring Ad-Juster Globalsign Leverages Hackalert Hackalert Intel Security Siteadvisor QualysGuard RiskIQ Sucuri

6.6. Network Access Control (NAC)

6.6.1. Host Based Symantec Intel Security

6.6.2. Network Based Aruba Networks Bradford Networks Cisco Forescout Milton Security Group Portnox

6.7. Network Anonymization & Consumer VPN Services

6.7.1. AnchorFree Hotspot Shield


6.7.3. CyberGhost

6.7.4. Dispel

6.7.5. GoldenFrog

6.7.6. HMA ProVPN TorVPN

6.7.7. Okayfreedom

6.7.8. OpenVPN Shield Exchange

6.7.9. Private Wifi

6.7.10. Tor


6.8. Network Firewalls

6.8.1. Carrier Firewalls

6.8.2. Enterprise Firewalls Multifunction Enterprise Firewalls Bluedon Check Point Software Cisco Fortinet Huawei Palo Alto Networks Sonicwall Websense (Formerly Intel Security) Stateful Inspection - Traditional Firewalls Cisco Huawei Check Point Software

6.8.3. Multi-Funtion SMB Firewalls 443 Networks Bluedon Check Point Software CheckPoint Cisco Clavister Endian Fortinet Hillstone Networks Meraki PineApp Sangfor Sonicwall Sophos Trustwave Untangle WINS TechNet LTD WatchGuard

6.8.4. Open Source & Community IPTables IPchains PFSense Untangle

6.8.5. Router Firewalls

6.9. Network Intrusion Detection/Prevention

6.9.1. Predictive Modeling Cyactive Trustpipe

6.9.2. IBM

6.9.3. Signature Based AlienVault Snort Bricata CheckPoint Cisco Sourcefire Enterasys Fortinet HP TippingPoint IBM Intel Security Open Source Snort Symantec APT Network WINS TECHNET LTD

6.9.4. SCADA Radiflow

6.10. Network Packet Brokers

6.10.1. Adara

6.10.2. Apcon

6.10.3. Arista Networks

6.10.4. Cubro

6.10.5. Gigamon

6.10.6. IXIA

6.10.7. Interface Masters Technologies

6.10.8. JDSU

6.10.9. NetOptics

6.10.10. NetScout

6.10.11. VSS Monitoring

6.11. Network Traffic Analysis, Network Behavior Analysis and Network Forensics

6.11.1. Flow Analysis/Metadata Extraction Arbor Networks IBM Lancope LogRythm Intel Security NBA

6.11.2. Forensic Capture with User Surveillance & Security Threat Analytics Access Data BlueCoat Cisco EMC FireEye Fluke Networks IBM IP Fabrics JDSU (Network Instruments) LightCyber NetAgent NetResec NetScout Niksun Novetta Solutions Nuix Packetsled Riverbed SS8 nPulse Technologies

6.11.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring Emulex Packetsled WildPackets

6.11.4. Network Forensics Tools Alert Logic Formerly Click Security Corvil Cybersift Decision Group INC EMC FireEye Fluke Networks IP Fabrics IPCopper InveaTech KLOS NEXT Computing NetReSec Niksun Radisys Utimaco WildPackets

6.11.5. Network Forensics Tools as a Service (NFTaaS) CloudShark

6.11.6. Network Taps Optical Apcon DataCom Systems FibreDyne Gigamon Glimmerglass M2Optics Netoptics Network Instruments VSS Monitoring nTAP

6.11.7. Network Traffic Analysis Amgine Securus Arbor Networks Boeing Cisco Corvil Cyber adAPT Damballa Darktrace ExtraHop Networks Fidelis Cybersecurity Lancope Light Cyber Novetta Solutions PacketSled Phirelight Qihoo 360 SkyEye RedJack SlashNext Splunk Taasera ThreatTrack Trustport Threat Intelligence Vectra Networks WireX

6.11.8. Raw Network Packet Capture Apcon Riverbed Netfort Wireshark NTOP Arbor Networks Comworth Netfort WireShark

6.12. Network-Based Advanced Threat Protection

6.12.1. Firewalls with Malware Sandbox Capabilities Barracuda Check Point Software Cisco Fortinet Huawei Juniper Networks Palo Alto Networks Sonicwall Sophos Watchguard

6.12.2. Appliance Based Malware Sandboxes AMGINE SECURUS AhnLab Bluecoat Check Point Software Emulator Blade Cisco ThreatGrid ContentKeeper Cyphort Damballa FireEye Fortinet FortiSandbox General Dynamics Fidelis Security Systems Huawei Firehunter Intel Security McAfee Advanced Threat Detection Appliance LastLine Palo Alto Networks WildFire Payload Security Qihoo SkyEye Techguard Security ThreatTrack Trend Micro Deep Discovery VMRay VeeDog WINS TECHNET LTD

6.12.3. Cloud-Based Malware Sandboxes Cisco ThreatGrid Fortinet Huawei Joe Security Lastline Netwitness Spectrum Palo Alto Networks WildFire Qihoo SkyEye Sonicwall


6.13.1. Monitoring CRITIFENSE Cyberbit PFP Cybersecurity

6.13.2. SCADA Firewalls BAE Systems Bayshore Networks Check Point Software Endian Fortinet Tofino Security

6.14. SSL Inspection Appliances

6.14.1. A10 Networks

6.14.2. Bluecoat

6.14.3. ResolutionOne

6.14.4. VSS Monitoring

6.14.5. SourceFire

6.15. Software Defined Perimeter

6.15.1. Certes Networks

6.15.2. Cryptzone

6.15.3. Tempered Networks

6.15.4. Unisys Stealth

6.15.5. Vidder

6.15.6. Waverly Labs

6.16. Virtual Private Networking (VPN/SSL VPN)

6.16.1. IPSec VPN Concentrators Certes Networks CheckPoint Software Cisco Mako Networks

6.16.2. Layer 2 Encryption Certes Networks

6.16.3. Layer 4 Encryption Certes Networks

6.16.4. SSL VPN AhnLab Array Networks Barracuda Networks Check Point Software Cisco Citrix F5 Networks Fortinet Hillstone Networks Juniper NetGear Sonicwall Stonesoft WatchGuard

6.16.5. Multi-Path Dynamic VPN Secret Double Octopus Dispersive Networks

6.17. Web/Email Protection

6.17.1. Secure Email Gateways Alt-N Technologies Bluecoat Fortinet GWAVA Intel Security Proofpoint Re-Sec Sonicwall Symantec Trustwave Voitiro Websense iBoss

6.17.2. Secure Web Gateways Anchiva Bluecoat ContentKeeper GWAVA Intel Security Re-Sec Symantec Trustwave Websense iBoss

6.17.3. Security as a Service Web & Email SaaS Appriver Barracuda Bitglass Cisco Intel Security MailGuard Spamina Symantec Total Defense TotalDefense Websense Zscaler Web Only Bluecoat ContentKeeper OpenDNS Websense Zscaler Secure Email Gateways Agari CloudMark Proofpoint Return Path Spam Experts Spam Titan Spamina ValiMail Anti-Phishing Amgine Securus Area1 Security CloudMark Cymbel Cyveillance FireEye MailGuard MediaPro Phishlabs ThreatTrack Votiro Webroot ZapFraud

7. Security Consulting & Implementation

7.1. Forensics

7.1.1. Forensics Incident Response Crowdstrike Cylance Deloitte Fidelis Cybersecurity FireEye Guidance Software Maryman & Associates NTT Coms Security Nettitude Optiv Presecure Secureworks Verizon E-Discovery & Computer Forensics Endpoint Forensics Network Forensics

7.2. Governance, Advisory, Assessment

7.2.1. Architecture and Design

7.2.2. Business Continuity

7.2.3. Compliance Review

7.2.4. Data Security Program

7.2.5. Governance, Compliance and Policy Design Compliance Mandates PCI ISO HITECH HIPAA

7.2.6. People Centric Strategy

7.2.7. Policy Design

7.2.8. Program Assessment

7.2.9. Risk Assessment

7.2.10. Risk Management Booz Allen Hamilton Optiv Cloud Risks On Premise Infrastructure Business Risk

7.2.11. Security Program Development Optiv FOX-IT

7.2.12. Strategy

7.2.13. Governance Optiv FOX-IT Sec Consult

7.3. Operations

7.3.1. Application Security Web AppSec Consulting Denim Group Security Innovation WhiteHat Security Citigal IOActive Mobile AppSec Consulting Denim Group Software Security Lifecycle (SDLC) AppSecConsulting Security Innovation Custom Code AppSec Consulting Security Innovation

7.3.2. Application Security Vulnerability Assessement

7.3.3. Configuration Assessment

7.3.4. Device Security

7.3.5. Fraud, Identification and Privacy

7.3.6. Incident Response Blackthorn Technologies Crowdstrike Dell SecureWorks Deloitte EY FOX-IT FireEye High Tech Bridge Ingalls Information Security Intel Security Foundstone K2 Intelligence Lares Consulting Maryman NTT Coms Security Nettitude Optiv PWC Presecure Sec Consult Stroz Friedberg TrustMatta

7.3.7. Penetration Testing AppSec Consulting Core Security Element Digital Security FOX-IT High Tech Bridge Ingalls Information Security K2 Intelligence Matasano Security NCC Group Penetration Lab Rapid7 Secureworks TrustMatta TrustedSec WhiteHat Security

7.3.8. Remote Access

7.3.9. Secure Code Review

7.3.10. Threat Intelligence

7.3.11. Vulnerability Scan

7.4. Providers by Region

7.4.1. Latin America

7.4.2. Mature Asia/Pacific

7.4.3. Middle East and North Africa Saudi Arabia GBM PGI

7.4.4. North America A-G AppsecConsulting CSC Control Case CrowdStrike Dell Secureworks Deloitte Denim Group Ernst & Young FireEye ForSythe Solutions Grant Thornton H-L HP IBM IOActive Ingalls Information Security Intel Security (Foundstone) K2 Intelligence Leidos M-S NTT Com Security Neohapsis Optiv PWC Paladion Networks Perimeter eSecurity Protivity SISA Solutionary Stroz Friedberg Sungard Sword and Shield Symantec Syntegrity Networks Sysnet Global Solutions T-Z Tevora Business Solutions Trustwave Verizon WhiteHat Security Zensar Technologies

7.4.5. Greater China

7.4.6. South Africa Cyanre

7.4.7. Eurasia Russia

7.4.8. Emerging Asia/Pacific

7.4.9. Canada Conexsys

7.4.10. Europe Eastern Europe Poland Western Europe Italy United Kingdom

8. Managed Security Services

8.1. Direct Tech Providers Managed Security

8.1.1. Asia Pacific Australia China NSFOCUS Singapore

8.1.2. Europe GoGrid Compliance Reporting (PCI, HIPAA) Host IDS Log Management SIEM Vulnerability Assessment

8.1.3. Global Providers

8.1.4. Middle East and North Africa Saudi Arabia United Arab Emirates

8.1.5. North America United States NSFOCUS Check Point Software Network Box GoGrid FireEye Rapid7

8.2. Indirect Providers

8.2.1. Emerging Asia Pacific India CSS Corp PVT Happiest Minds SunGard Availability Services Ecomnets India PVT. LTD

8.2.2. Europe BT Global Services Dell SecureWorks Germany Link11 GMBH IPsoft HP Happiest Minds Advanced Malware Protection Application Activity Monitoring Compliance Reporting Database Activity Monitoring File Integrity Monitoring Log Management Managed DLP Network Forensics SIEM Unified Threat Management Vulnerability Assessment Integralis Navisite Mobile Device Management Open Systems Open Systems Orange Business Services SecureData Firewall IDS/IPS SIEM Data Loss Prevention Secure Web Gateway Secure Email Gateway VPN/Remote Access SunGard Availability Services Firewalls IAM Intrusion Prevention SIEM Unified Threat Management VPN Web Application Firewall Symantec T-Systems Tata Communications Telefonica DDoS Protection Service Email Encryption Email Security Gateway Firewall Management IAM Intrusion Detection Intrusion Prevention Log Management SIEM Vulnerability Assessment Web Security Gateway Anti-Fraud Verizon Business Anti-DDoS Email Security Endpoint Protection Firewall Management Intrusion Detection Intrusion Prevention SIEM Vulnerability Assessment Web Security Wipro Email Security Gateway Endpoint Security Firewall Management Fraud Management/Anti-Money Laundering GRC IAM Intrusion Detection Intrusion Prevention SIEM User Access Management Web Security Gateway

8.2.3. Global Providers AT&T DDos Protection Email/Data Encryption Services Endpoint Anti-Virus Endpoint Patch Management Endpoint Policy Compliance Mobile Device Security Secure Email Gateway Security Device Management Web Application Firewall Web Gateway (URL & Malware Filtering) BEW Global Data Loss Prevention Web Security Gateway Email Security Gateway SIEM Vulnerability Assessment BT Dell Secureworks Advanced Malware Protection Email Security Gateway Firewall Management Host IPS IDS/IPS Log Management Log Retention SIEM Threat Intelligence Unified Threat Management Vulnerability Assessment Web Application Firewall Web Application Vulnerability Assessment Dimension Data HP Access Managment Data Loss Prevention Email Security Gateway Endpoint Encryption Endpoint Protection Intrusion Detection Intrusion Prevention Managed Incident Response Remote Access Management SIEM Vulnerability Assessment Web Application Vulnerability Assessment Web Security Gateway IBM Email Security Gateway Endpoint Patch Management Endpoint Policy Management Endpoint Protection Firewall Management IAM Intrusion Detection Intrusion Prevention Log Management Mobile Device Security SIEM Unified Threat Management Vulnerability Assessment Web Security Gateway Web Vulnerability Assessment Proficio Email Security Firewall Management Incident Response Log Management Privileged Account Management Regulatory and Polcy Compliance SIEM SOC Services Vulnerability Assessment Web Security Tech Mahindra Email Security Endpoint Protection Firewall Management Identity and Access Management Intrusion Detection Intrusion Prevention Log Management SIEM SOC Services Vulnerability Assessment Web Security Telstra Verizon Business Anti-DDoS Email Security Endpoint Protection Firewall Management Intrusion Detection Intrusion Prevention SIEM Vulnerability Assessment Web Security

8.2.4. Greater China Hong Kong Network Box Netswitch BEW Global Data Loss Prevention Web Security Gateway Email Security Gateway SIEM Vulnerability Assessment Beijing Netswitch Shanghai Shanghai Data Solution Co., Ltd

8.2.5. Latin America Brazil Arcon Netcentrics RealProtect UOL Diveo

8.2.6. Mature Asia Pacific Australia Tesserent Verizon Singapore Quann NTT Singapore Happiest Minds Singtel NCS Group

8.2.7. Middle East and North Africa Saudi Arabia United Arab Emirates Du Telecom Tata Communications Dell Secureworks Dimension Data

8.2.8. North America Canada Above Security Bell Canada EWA Happiest Minds Netpulse OneStone (Formerly Seccuris) SecureData SentryMetrics SunGard Availability Services Virtual Guardian United States AT&T Above Security Alert Logic Allstream CGI CSC CSS Corp CentraComm CenturyLink- Savvis Clone Systems Compucom Systems Cosentry Dell Secureworks Earthlink Esentire HCL Technologies HP Happiest Minds IBM Intelisecure Leidos LunarLine Masergy Communications Megapath Morphick My Digital Shield NCA - Network Computing Architects Navisite Netfortris Netswitch Nuspire Networks Rook Security Secure Designs SilverSky (Formerly Stillsecure/Perimeter esecurity) Solutionary SunGard Availability Services Sword and Shield Symantec Symantec Syntegrity Networks Tesserent Trustwave Verizon Business Wipro

8.2.9. Sub-Sahara Africa AccessKenya Firewall Endpoint Protection Secure Web Gateway

9. Endpoint Security

9.1. Anti-Malware

9.1.1. Eastern Europe Czech Republic Avast TrustPort Denmark BullGuard Netherlands AVG Romania Bitdefender Slovakia ESET

9.1.2. Emerging Asia/Pacific India eScan K7 Computing

9.1.3. Latin America Spain Optenet

9.1.4. Mature Asia/Pacific China Qihoo Rising International Software South Korean AhnLab BKAV ESTsoft

9.1.5. Middle East and Africa Israel Check Point Software

9.1.6. North America Cyren Fortinet Intel Security MalwareBytes McAfee Microsoft PC Pitstop Reason Core Security Roboscan Symantec ThreatTrack Total Defense Trend Micro

9.1.7. Russia Kaspersky

9.1.8. Western Europe Austria Ikarus Security Finland F-Secure Germany Avira G-Data Kromtech Norway Norman United Kingdom Sophos Poland Arcabit

9.2. Application Isolation

9.2.1. Blue Ridge Networks

9.2.2. Bromium

9.2.3. Bufferzone

9.2.4. Invincea SandBoxie

9.2.5. VMware

9.3. Endpoint Sandboxes and Virtualized Containers

9.3.1. Endpoint Sandboxes Panda Sandboxie Bitdefender

9.3.2. Type-0 Hypervisors Lynxworks Zirtu

9.3.3. Process Isolation/Virtualization Avectco Bromium Invincea

9.4. Endpoint Intrusion Prevention

9.4.1. Arkoon StormShield

9.4.2. BeyondTrust

9.4.3. IBM

9.4.4. Landesk

9.4.5. McAfee

9.4.6. Safensoft

9.4.7. Symantec

9.5. Enterprise Mobility Mangement Suites

9.5.1. Absolute Software

9.5.2. AMware Airwatch

9.5.3. Blackberry

9.5.4. Citrix

9.5.5. Globo

9.5.6. Good Technologies

9.5.7. IBM

9.5.8. Landesk

9.5.9. MobileIron

9.5.10. Mojave

9.5.11. SAP

9.5.12. Sophos

9.5.13. Soti

9.5.14. Symantec

9.5.15. Tangoe

9.6. Application Control

9.6.1. AppSense

9.6.2. Avecto

9.6.3. Bit9

9.6.4. Landesk

9.6.5. Lumension

9.6.6. McAfee

9.6.7. Sophos

9.6.8. Symantec

9.6.9. Trend Micro

9.7. Exploit Technique Prevention Software

9.7.1. CyActive

9.7.2. CyBellum

9.7.3. Malwarebytes Anti-Exploit

9.7.4. Microsoft Microsoft EMET - FREE

9.7.5. Morphisec

9.7.6. Palo Alto Networks Endpoint

9.7.7. Sophos Intercept X

9.7.8. Trend Micro

9.7.9. ViRobot APT Shield

9.8. File Integrity Monitoring

9.8.1. Open Source 1. AIDE 2. Trend Micro 1. OSSEC 3. Samhain 4. Osiris 5. Integrit 6. Tripwire

9.8.2. Commercial Imperva Intel Security Tripwire

9.9. Malware Analysis

9.9.1. Botnets

9.9.2. Internet Identity

9.9.3. Malware Patrol

9.9.4. SpamHaus

9.9.5. Team Cymru

9.9.6. ThreatGrid

9.9.7. VirusTotal


9.9.9. JoeSecurity

9.9.10. Shadowserver

9.10. Mobile Device Management

9.10.1. Absolute Software

9.10.2. Beachhead Security

9.10.3. Blackberry

9.10.4. Citrix

9.10.5. Globo

9.10.6. Good Technologies

9.10.7. IBM

9.10.8. Landesk

9.10.9. MobileIron

9.10.10. Mojave

9.10.11. SAP

9.10.12. Sophos

9.10.13. Soti

9.10.14. Symantec

9.10.15. Tangoe

9.10.16. VMware Airwatch

9.11. Policy Assessment and System Configuration Management

9.11.1. BMC BMC Server Automation

9.11.2. Check Point Software Endpoint Policy Management

9.11.3. IBM IBM Endpoint Manager

9.11.4. Intel Security Policy Auditor

9.11.5. RedHat OpenSCAP

9.11.6. Saint Saint Security

9.11.7. Tripwire Tripwire Enterprise

10. Data & Collaboration Security

10.1. Data Governance and Classification

10.1.1. Expert Source

10.1.2. HP

10.1.3. IBM

10.1.4. Informatica

10.1.5. Nuix

10.1.6. Somansa

10.1.7. Titus

10.1.8. boldonjames

10.2. Data Loss Prevention (DLP)

10.2.1. Endpoint Data Classification and Tracking Banyan Solutions BoldonJames Digital Guardian HP IBM Identity Finder Mach1 Development Microsoft (Formerly Secure Islands) MinerEye Nuix Smartlogic Titus Varonis CoSoSys Mobile Symantec Websense Microsoft (Secure Islands) Windows Absolute Software CA Technologies Digital Guardian GTB Technologies Infowatch Intel Security RSA Microsoft (Secure Islands) Somansa Symantec Trustwave Watchful Software Raytheon-Websense Zecurion

10.2.2. Network Digital Guardian Fidelis Security Systems (Subsidiary of General Dynamics) Symantec InfoWatch

10.2.3. Secure Email Gateway Cisco Symantec Intel Security Somansa

10.2.4. Secure Web Gateway Intel Security Symantec Somansa

10.2.5. Security as a Service Consumer Social Fortress PwnedList Enterprise Social Fortress Google Apps ZixCorp

10.3. Database Security

10.3.1. Database Audit and Protection (DAP) Application Security, Inc BeyondTrust Big Data Platform DAP BlueTalon Cloudera Hortonworks IBM Imperva DataSunrise Fortinet GreenSQL IBM IRI Oracle SQL Server Imperva Intel Security Mentis Software Oracle Corp PentaSecurity Warevalley

10.3.2. Database Activity Monitoring DB Networks Somansa

10.4. Encryption/Tokenization

10.4.1. Big Data Gazzang Vormetric

10.4.2. Cloud/SAAS Encryption Appliances Office365 Ciphercloud Afore Solutions Perspecsys Software BoxCryptor CloudMask PrivateCore Trend Micro Viivo Voltage Security Software as a Service Trend Micro SooKasa Gemalto

10.4.3. Cryptographic Providers RSA Quintessence Microsoft

10.4.4. Data masking Oracle Dataguise Informatica IBM Voltage Security Green SQL Mentis Compuware Axis Privacy Analytics Camouflage Software Solix Technologies Net 2000

10.4.5. Database Gemalto Dark Matter Labs Vormetric

10.4.6. Email ZixCorp Encryptics

10.4.7. Encrypted USB Storage Apricorn Datalocker Integral Memory IronKey Kingston Virbatim

10.4.8. File/Folder Covertix IBM Mainframe SecureIslands Sophos SafeGuard Enterprise (Utimaco) Symantec (PGP) Vormetric WinMagic SecureDoc

10.4.9. Quantum Encryption IDQ Quintessence Labs Whitewood Encryption

10.4.10. Tokenization Protegrity

10.4.11. Whole Disk Intel Security Symantec (PGP) CheckPoint Software Encryption Management Wave Systems WinMagic SecureDoc Microsoft Bitlocker Sophos SafeGuard Enterprise (Utimaco) Trustwave DataControl Vormetric

10.5. File Analysis Software

10.5.1. Acaveo

10.5.2. Active Navigation

10.5.3. AvePoint

10.5.4. Beyond Recognition

10.5.5. Bloomberg

10.5.6. CommVault

10.5.7. Condrey

10.5.8. Covertix

10.5.9. DataGlobal

10.5.10. DataGravity

10.5.11. Equivio

10.5.12. HP Control Point

10.5.13. HiSoftware

10.5.14. IBM StoreIQ

10.5.15. Identifty Finder

10.5.16. Imperva

10.5.17. Index Engines

10.5.18. Kazoup

10.5.19. MailGuard

10.5.20. NTP Software

10.5.21. Novell

10.5.22. Nuix

10.5.23. Proofpoint

10.5.24. Stealthbits

10.5.25. Varonis

10.5.26. WatchDox

10.5.27. Whitebox Security

10.5.28. ZyLab

10.6. Hardware Security Modules (HSM)

10.6.1. Cloud HSM Amazon IBM

10.6.2. Hardware FutureX Gemalto HPE Safenet Thales

10.7. Software Defined Storage Security

10.7.1. Dispersive Networks

10.7.2. OceansBlue

10.8. eSignatures

10.8.1. Adobe eSign Services

10.8.2. Alphatrust

10.8.3. Docusign

10.8.4. Hellosign

10.8.5. Rightsignature

10.8.6. Sertifi

11. Identity and Access Management (IAM)

11.1. AD/Unix bridge

11.1.1. Centrify

11.2. Enterprise single sign-on (ESSO)

11.3. Externalized authorization management (EAM)

11.3.1. Axiomatics

11.3.2. Dell Quest (BitKoo)

11.4. IAM as a Service

11.4.1. Centrify

11.4.2. IBM (Formerly Lighthouse Security)

11.4.3. Identity Automation

11.4.4. Intel

11.4.5. Okta

11.4.6. Password Bank

11.4.7. Ping Identity

11.4.8. Sailpoint

11.4.9. Symplifyed

11.4.10. iWelcome

11.5. Identity governance and administration

11.5.1. CA Technologies

11.5.2. IBM Security

11.5.3. Oracle

11.5.4. RSA (Aveksa)

11.6. Privileged account management (PAM)

11.6.1. BeyondTrust

11.6.2. Lieberman Software

11.6.3. Cyber Ark

11.6.4. Dell

11.6.5. Centrify

11.7. Public Certificate Authorities

11.7.1. Comodo

11.7.2. Geotrust

11.7.3. Godaddy

11.7.4. Symantec (Formerly VeriSign)

11.8. User Authentication

11.8.1. Tokens OOB authentication SMS Voice Push Email Social media OTP tokens OTP hardware tokens OTP software tokens for smart phones X.509 tokens Other tokens ANECT AS - ALUCID

11.8.2. Contextual authentication Google Trust API

11.8.3. KBA It's Me Security

11.8.4. Biometrics Behavioral Typing rhythm/keystroke dynamics Voice recognition Biological Face recognition Fingerprint

11.8.5. Wide-focus vendors Alladin-RD CA Technologies Entrust HID Global RSA Adaptive Auth Gemalto Symantec Technology Nexus VASCO

11.9. User Privilege Management

11.9.1. Appsense

11.9.2. Ariella

11.9.3. Avectco

11.9.4. BeyondTrust

11.9.5. Centrify

11.9.6. CionSystems

11.9.7. CrossIdeas

11.9.8. Dell

11.9.9. Lieberman Software

11.9.10. Viewfinity

12. Application Security

12.1. Web Application Firewalls (WAF) & Application Security

12.1.1. Web Threat Disruption Technology Software NuCaptcha NuData Appliances Juniper Shape Security Open Source Google Hack Honeypot

12.2. Web Application Security

12.2.1. Code Review Products HP IBM

12.2.2. Web Application Vulnerability Scanning Services Cenzic Controlscan High-Tech Bridge McAfee Secure Qualys Securi Sitelock Trustwave WebSecurify WhiteHat Security

12.2.3. Scanning Software Open Source Arachni Scanner Subgraph W3af Wapiti Watcher Commercial Accunetix BeyondTrust Cenzic HP MavitunaSecurity NTObjectives Nstalker Portswigger Syhunt

13. Risk, Compliance and Security Management

13.1. Firewall Workflow,Modeling & Change Management

13.1.1. Checkpoint Software

13.1.2. Firemon

13.1.3. ManageEngine

13.1.4. Redseal Networks

13.1.5. Skybox

13.1.6. Tufin

13.1.7. Veriflow

13.2. Legal and regulatory information governance

13.3. Privacy

13.4. Regulations, Awareness and Training

13.4.1. Computer Based Training Aujas BeOne Development Digital Defense Fishnet Security Inspired eLearning Junglemap KnowBe4 MediaPro PhishMe Phishline Popcorn Training Sans Institute Scipp International Secure Mentem Security Innovation Security Mentor The Security Awareness Company ThreatSim Wombat Security Technologies

13.4.2. Educational, Awareness & News Outlets Government Led Information Sharing and Analysis Centers (ISACs) Periodicals & Target Roles Channel CISO/CSO Security Engineers/Analysts

13.4.3. Industry Standards/Groups Standards Technical Industry Groups Audit General Security Forensics

13.4.4. Regulations, Public Standards and Contractual Mandates Global Payment Card Industry Data Security Standards (PCIDSS) NIST Country/Region Specific China Singapore European Union United States

13.5. Security Policy and Response Orchaestration Platforms

13.5.1. FireEye

13.5.2. Phantom

13.5.3. Proofpoint

13.6. Security Program and Governance

13.6.1. Governance, Risk and Compliance eGRC Software as a Service Software Compliance Oriented Private Cloud Hosting (COPCH) Note: This list is not an attestation of compliance Operational Risk Analytics Algosec Cyber Observer Cytegic Firemon IBM Redseal Networks RiskIO Skybox Software Development Lifecycle Solarwinds Tufin Cloud & Container Compliance Assessment Cavirin

14. Random Knowledge

14.1. Detection Methods

14.1.1. File Analysis Computed Hash Uniqueness Metadata Attributes File Content Inspection File Headers Temporal Analysis Temporal Analysis with Prevalence Time/Date Certificate and Signature Evaluation (PKI) Packing Method Multi-packing Analysis

14.1.2. Network Specific Protocol/File/Session Decode & Analysis File Extraction Playback (Surveillance) File/Session Viewing Correlation Machine Learning (AI) Network Flow Analysis Machine Learning (AI) Application Layer Analysis Classification, Correlation , Deviance from Baselines (Heuristics) Deep Packet Inspection (DPI) Application Command and Input Analysis IP Layer Analysis TCP/UDP Ports IP Address

14.1.3. Malware Behavioral Evaluations Persistence Installs as System Service Installs Registry Keys in Startup locations Modifies filesystem in specific locations Suspicious Behaviors Evaluated Attempts to login to systems that a specific user credential is not normally used on Becomes another user on the system CPU of Processes Spawned is high Connects with a known bad URL or IP Address Escalates privileges Examines the Documents Folder or User Document Folders File Isn't widely prevalent in user population Injects data into memory of another running process Modifies memory of another process Opens TCP/IP Connections to other hosts Performs a network port sweep Process executes net use DOS command inside command.exe Process spawns command.exe Removes logs/events of application logs or operating system Self Delete of files Self-copy of files Starts to repeatedly call the crypt function (ransom sign) Time of execution is not normal in context of historical analysis

14.1.4. User Activity on system when user's employment is in termination status Deviates from past user behavior Device not historically associated to user Login time anamoly Login time outside user's home timezone Privileged data accessed Volumetric analysis Deviation from baseline Cut-paste function used Remote access and time of day abnormal from baselines User authentication failure User's browser or viewer is not the same as the baseline User is logging into system remotely and locally simultaneously User is logging into system remotely  (not expected) User is logging into system remotely at an abnormal time User is abnormally leveraging applications that are administrative in nature (Control Panel, Command.exe, Group Policy Editor, etc)