1. Cloud Security
1.1. Cloud/Virtualized Firewalls
1.1.1. Agent-Based
1.1.1.1. CloudPassage
1.1.1.2. Drawbridge Networks
1.1.1.3. Illumio
1.1.2. Cisco
1.1.3. Citrix Xen
1.1.3.1. Hillstone Networks
1.1.3.2. Huawei
1.1.3.3. Fortinet
1.1.3.4. Palo Alto Networks
1.1.4. Container-Based
1.1.4.1. ShieldX
1.1.5. Hyper-V
1.1.5.1. Fortinet
1.1.6. KVM
1.1.6.1. Hillstone Networks
1.1.6.2. Juniper Networks
1.1.6.3. Palo Alto Networks
1.1.7. Openstack
1.1.7.1. OpenFlow
1.1.7.1.1. Fortinet
1.1.7.2. Juniper Networks
1.1.8. Public Cloud
1.1.8.1. Virtual Appliances
1.1.8.1.1. Barracuda
1.1.8.1.2. Brocade
1.1.8.1.3. Catbird Networks
1.1.8.1.4. Check Point Software
1.1.8.1.5. Juniper Networks
1.1.8.1.6. Palo Alto Networks
1.1.8.1.7. PfSense
1.1.8.1.8. Sophos
1.1.8.1.9. vArmour
1.1.8.2. API-Driven
1.1.8.2.1. Dome9
1.1.8.2.2. Illumio
1.1.8.3. AWS
1.1.8.3.1. Check Point Software
1.1.8.3.2. Fortinet
1.1.8.3.3. Palo Alto Networks
1.1.8.4. Microsoft Azure
1.1.8.4.1. Check Point Software
1.1.8.4.2. Fortinet
1.1.8.5. Container-Based
1.1.9. VMware Environments
1.1.9.1. API Integration
1.1.9.1.1. Check Point Software
1.1.9.1.2. Fortinet
1.1.9.1.3. Palo Alto Networks
1.1.9.2. NSX
1.1.9.2.1. Fortinet
1.1.9.2.2. Check Point Software
1.1.9.3. VM Appliance
1.1.9.3.1. Barracuda
1.1.9.3.2. Brocade
1.1.9.3.3. Catbird Networks
1.1.9.3.4. Check Point Software
1.1.9.3.5. Fortinet
1.1.9.3.6. Hillstone Networks
1.1.9.3.7. Juniper Networks
1.1.9.3.8. Palo Alto Networks
1.1.9.3.9. PfSense
1.1.9.3.10. Sophos
1.1.9.3.11. vArmour
1.1.9.3.12. Huawei
2. Security Operations & Incident Response
2.1. Digital Forensics/eDiscovery
2.1.1. Content, File and Endpoint Forensics
2.1.1.1. eDiscovery
2.1.1.1.1. Clearwell
2.1.1.1.2. Kazeon
2.1.1.1.3. Guidance Software
2.1.1.1.4. Access Data
2.1.1.1.5. Autonomy
2.1.1.1.6. kCura
2.1.1.1.7. FTI Technology
2.1.1.1.8. Barracuda Networks
2.1.1.2. Mobile Devices
2.1.1.2.1. BlackBagTech
2.1.1.2.2. Cellebrite
2.1.1.2.3. Compelson Labs
2.1.1.2.4. Guidance Software
2.1.1.2.5. MSAB
2.1.1.2.6. NowSecure
2.1.1.2.7. Oxygen Forensics
2.1.1.2.8. Paraben Corporation
2.1.1.3. Endpoint Computing Systems
2.1.1.3.1. ADF Solutions
2.1.1.3.2. Access Data
2.1.1.3.3. ArxSys
2.1.1.3.4. BlackBag Technologies
2.1.1.3.5. CRU Inc
2.1.1.3.6. Cyfir
2.1.1.3.7. Guidance Software
2.1.1.3.8. Magnet Forensics
2.1.1.3.9. Nuix
2.1.1.3.10. OSForensics
2.1.1.3.11. Paraben Corporation
2.1.1.3.12. WindowsScope
2.1.1.3.13. X-Ways Forensics
2.1.1.4. Email Examination
2.1.1.4.1. Systools Software
2.1.1.4.2. Nuix
2.1.1.5. Forensic File & Data Analysis Tools
2.1.1.5.1. Cellebrite
2.1.1.5.2. Cyfir
2.1.1.5.3. Intella
2.1.1.5.4. Magnet Forensics
2.1.1.5.5. Nuix
2.1.1.5.6. Systools Software
2.1.1.6. Digital Forensics Case Management
2.1.1.6.1. D3 Security
2.1.1.6.2. Digital Investigation Manager
2.1.1.6.3. Guidance Software
2.1.1.6.4. Intaforensiscs
2.1.1.6.5. Sentinel Data
2.1.1.6.6. Sirentech
2.1.1.6.7. Wynyard Group
2.1.1.7. Memory Forensics
2.1.1.7.1. FireEye
2.1.1.7.2. Guidance Software
2.1.1.7.3. Volatility Framework
2.1.1.7.4. WindowsScope
2.1.2. eDiscovery Services
2.1.2.1. Robert Half
2.1.2.2. Advanced Discovery
2.1.3. eDiscovery Software
2.1.3.1. AccessData
2.1.3.2. Guidance Software
2.1.3.3. Nuix
2.1.3.4. Symantec
2.2. Fraud Prevention/Web Malware Monitoring
2.2.1. Fraud/Bot/Webscrape Prevention
2.2.1.1. Software
2.2.1.1.1. IBM (Formerly Trusteer)
2.2.1.1.2. Intellinx
2.2.1.1.3. RSA (EMC)
2.2.1.1.4. ShieldSquare
2.2.1.2. Appliances
2.2.1.2.1. Distil Networks
2.2.1.2.2. Imperva
2.2.1.2.3. RSA
2.2.1.2.4. Shape Security
2.2.1.2.5. White Ops
2.2.1.3. Software as a Service
2.2.1.3.1. Akamai
2.2.1.3.2. BioCatch
2.2.1.3.3. BotScout
2.2.1.3.4. Distil Networks
2.2.1.3.5. Guardian Analytics
2.2.1.3.6. Kount
2.2.1.3.7. MarkMonitor
2.2.1.3.8. NuData Security
2.2.1.3.9. Shape Security
2.2.1.3.10. ShieldSquare
2.2.1.3.11. ThreatMetrix
2.2.1.3.12. White Ops
2.2.1.3.13. X-Cart
2.2.1.3.14. iovation
2.2.1.4. Virtual Appliances
2.2.1.4.1. Distil Networks
2.2.1.4.2. Imperva
2.2.2. Website & Ad Malware Monitoring
2.2.2.1. Ad-Juster
2.2.2.2. Globalsign
2.2.2.2.1. Leverages Hackalert
2.2.2.3. Hackalert
2.2.2.4. Intel Security
2.2.2.4.1. Siteadvisor
2.2.2.5. QualysGuard
2.2.2.6. RiskIQ
2.2.2.7. Sucuri
2.2.2.8. The Media Trust
2.3. Incident Response Legal Services
2.3.1. Information Law Group
2.4. Security Information and Event Management (SIEM), Log Management & Analytics
2.4.1. Application Security Intelligence Engine
2.4.1.1. SAP
2.4.1.1.1. iT-Cube Systems
2.4.2. Log Management
2.4.2.1. EventTracker
2.4.2.2. IGLOO Security
2.4.2.3. Intel Security
2.4.2.3.1. McAfee Enterprise Log Manager
2.4.2.4. Kiwi Syslog Server
2.4.2.5. LogEntries
2.4.2.6. LogRythm
2.4.2.7. Logscape
2.4.2.8. Open Source
2.4.2.8.1. Elasticsearch (ELK Stack)
2.4.2.8.2. SEC (Simple Event Correlator)
2.4.2.8.3. OSSIM
2.4.2.8.4. Syslog-NG
2.4.2.8.5. Octopussy
2.4.2.9. Sawmill
2.4.2.10. Splunk
2.4.2.11. Sumo Logic
2.4.2.12. Tripwire
2.4.2.13. XpoLog
2.4.3. SIEM
2.4.3.1. AlienVault
2.4.3.1.1. OSSIM
2.4.3.2. CorreLog
2.4.3.3. EventTracker
2.4.3.4. Fortinet
2.4.3.5. HP
2.4.3.5.1. Arcsight
2.4.3.6. Hexis Cyber Solutions
2.4.3.6.1. Hawkeye AP
2.4.3.7. IBM
2.4.3.7.1. Q1Radar
2.4.3.8. IGLOO Security
2.4.3.9. Intel Security
2.4.3.9.1. NitroSecurity
2.4.3.10. LogPoint
2.4.3.10.1. http://www.logpoint.com/en/
2.4.3.11. LogRythm
2.4.3.12. Novell
2.4.3.12.1. Sentinel
2.4.3.13. RSA
2.4.3.13.1. Envision
2.4.3.14. Sensage
2.4.3.15. Solarwinds
2.4.3.16. Splunk
2.4.3.17. Sqrrl
2.4.3.18. Tibco
2.4.3.18.1. Loglogic
2.4.3.19. eIQnetworks
2.4.4. Security Analytics
2.4.4.1. Anomaly Analytics
2.4.4.1.1. Intel
2.4.4.1.2. Theta Ray
2.4.4.1.3. Prelert
2.4.4.1.4. eMite
2.4.4.1.5. Niddel
2.4.4.2. User and Entity Behavior Analytics (UEBA)
2.4.4.2.1. Bay Dynamics
2.4.4.2.2. Darktrace
2.4.4.2.3. Detex Systems
2.4.4.2.4. Exabeam
2.4.4.2.5. Fortscale
2.4.4.2.6. Gurcul
2.4.4.2.7. HP
2.4.4.2.8. IBM
2.4.4.2.9. Interset
2.4.4.2.10. Microsoft
2.4.4.2.11. Niara
2.4.4.2.12. ObserveIT
2.4.4.2.13. Palerra
2.4.4.2.14. Platfora
2.4.4.2.15. Reveelium
2.4.4.2.16. Secureonix
2.4.4.2.17. Veriato
2.4.5. User and Entity Behavior Analytics (UEBA)
2.4.5.1. Bae Systems Applied Intelligence
2.4.5.2. Bay Dynamics
2.4.5.3. Caspida
2.4.5.4. Click Security
2.4.5.5. Exabeam
2.4.5.6. FICO
2.4.5.7. Fortscale
2.4.5.8. GuruCul
2.4.5.9. IBM
2.4.5.10. Intellinx
2.4.5.11. Lockheed Martin
2.4.5.12. Logtrust
2.4.5.13. Mobile System 7
2.4.5.14. Novetta Solutions
2.4.5.15. Oracle
2.4.5.16. Rapid7
2.4.5.17. Raytheon
2.4.5.18. SAS Institute
2.4.5.19. Secureonix
2.4.5.20. Splunk
2.5. Security Operations, Analytics and Reporting (SOAR)
2.5.1. Security Incident Response Platforms (SIRP)
2.5.1.1. Agiliance
2.5.1.2. DFLabs
2.5.1.3. Demisto
2.5.1.4. EMC(RSA)
2.5.1.5. Empow
2.5.1.6. Fido
2.5.1.7. Hexadite
2.5.1.8. ID Experts
2.5.1.9. Proofpoint
2.5.1.10. Resilient Systems
2.5.1.11. Siemplify
2.5.1.12. Syncurity
2.5.2. Threat and Vulnerability Management (TVM)
2.5.2.1. Acuity Risk Management
2.5.2.2. Agiliance
2.5.2.3. BeyondTrust
2.5.2.4. Core Security
2.5.2.5. Cybersponse
2.5.2.6. DFLabs
2.5.2.7. EMC(RSA)
2.5.2.8. Kenna Security
2.5.2.9. NopSec
2.5.2.10. RedSeal
2.5.2.11. RiskSense
2.5.2.12. Skybox Security
2.5.2.13. Swimlane
2.5.2.14. Siemplify
2.5.3. Security Operations Analytics
2.5.3.1. Ayehu
2.5.3.2. Cybersponse
2.5.3.3. DFLabs
2.5.3.4. EMC(RSA)
2.5.3.5. Hexadite
2.5.3.6. Proofpoint
2.5.3.7. Resilient Systems
2.5.3.8. Siemplify
2.5.3.9. Swimlane
2.5.4. Security Operations Automation Platforms (SOAPS)
2.5.4.1. Ayehu
2.5.4.2. Cyberbit
2.5.4.3. Cybersponse
2.5.4.4. DFLabs
2.5.4.5. Demisto
2.5.4.6. Empow Security
2.5.4.7. Fireye
2.5.4.8. Hexadite
2.5.4.9. IBM
2.5.4.10. Phantom Cyber
2.5.4.11. Swimlane
2.5.4.12. Syncurity
2.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)
2.6.1. Crowdsourced Application Security Testing Platforms
2.6.1.1. Hyver
2.6.1.2. Applause
2.6.1.3. Bugcrowd
2.6.1.4. BugFinders
2.6.1.5. Cobalt
2.6.1.6. Crowdtesters
2.6.1.7. HackerOne
2.6.2. Managed Penetration Testing Services
2.6.2.1. Cenzic
2.6.2.2. WhiteHatSecurity
2.6.3. Penetration Testing Software
2.6.3.1. Core Security
2.6.3.2. Rapid7
2.6.3.2.1. Metasploit Pro
2.6.3.2.2. Metasploit Express
2.6.3.3. Trustwave
2.6.4. Vulnerability Assessment
2.6.4.1. Software as a Service
2.6.4.1.1. Vulnerability Management
2.6.4.1.2. Phish Testing/Management
2.6.4.2. Network-Based Vulnerability Assessment (On Premise)
2.6.4.2.1. Core Security
2.6.4.2.2. Digital Defense
2.6.4.2.3. Fortinet
2.6.4.2.4. Intel Security
2.6.4.2.5. NSAuditor
2.6.4.2.6. Ncircle
2.6.4.2.7. Netasq
2.6.4.2.8. Outpost24
2.6.4.2.9. Qualys
2.6.4.2.10. RandomStorm
2.6.4.2.11. Rapid 7
2.6.4.2.12. Trustwave
2.6.4.3. Agent-Based Vulnerability Assessment
2.6.4.3.1. BeyondTrust
2.6.4.3.2. Qualys
2.6.4.3.3. Secunia
2.6.4.3.4. Tenable
2.6.4.4. Mainframe Vulnerability Assessment
2.6.4.4.1. Key Resources Inc. (KRI)
2.6.5. Vulnerability Correlation
2.6.5.1. Application Vulnerability Correlation
2.6.5.1.1. Code DX
2.6.5.1.2. Denim Group
2.6.5.1.3. Kenna Security
2.6.5.1.4. NopSec
2.6.5.2. Network Vulnerability Correlation
2.6.5.2.1. Cybric
2.6.5.2.2. Kenna Security
2.6.5.2.3. NopSec
2.6.5.2.4. RiskSense
2.6.5.2.5. Secure Decisions
2.6.6. Vulnerability Research
2.6.6.1. CSC
2.6.6.2. HP
2.6.6.2.1. DV Labs
2.6.6.3. HotWAN
2.6.6.4. Intel Security
2.6.6.5. SecNiche Labs
2.6.6.6. Sourcefire VRT
2.6.6.7. Symantec
2.6.6.8. VRLSec
2.6.6.9. Vupen
3. Emerging Security Markets & Technologies
3.1. Application Security
3.1.1. Runtime Application Self-Protection (RASP)
3.1.1.1. Arxan
3.1.1.2. BrixBits
3.1.1.3. Contrast Security
3.1.1.4. HP
3.1.1.5. Hdiv Security
3.1.1.6. Immunio
3.1.1.7. Metaforic
3.1.1.8. OneASP
3.1.1.9. Prevoty
3.1.1.10. Promon
3.1.1.11. SecuPi
3.1.1.12. Signal Sciences
3.1.1.13. Veracode
3.1.1.14. Virsec
3.1.1.15. Waratek
3.1.1.16. WhiteHat Security
3.1.1.17. whiteCryption
3.1.2. Enterprise App-Layer Protection
3.1.2.1. SecuPI
3.1.3. AI-Based Applicaton Threat Defense
3.1.3.1. Sophos
3.1.3.1.1. Formerly Barricade
3.1.3.2. Signal Sciences
3.1.3.3. Threat-X
3.2. Cloud Security
3.2.1. Cloud Protection Gateways
3.2.1.1. CipherCloud
3.2.1.2. Netskope
3.2.1.3. Perspecsys
3.2.1.4. Skyhigh Networks
3.2.1.5. Vaultive
3.2.2. Cloud Access Security Brokers
3.2.2.1. User Activity Monitoring
3.2.2.1.1. Adallom
3.2.2.1.2. Avanan
3.2.2.1.3. Bitglass
3.2.2.1.4. Elastica
3.2.2.1.5. Harvest.ai
3.2.2.1.6. Imperva
3.2.2.1.7. Netscope
3.2.2.1.8. SkyHigh Networks
3.2.2.2. Data Loss Prevention
3.2.2.2.1. Integrated DLP
3.2.2.2.2. Harvest.ai
3.2.2.3. Encryption
3.2.2.3.1. Adallom
3.2.2.3.2. Avanan
3.2.2.3.3. Managed Methods
3.2.2.3.4. SkyHigh Networks
3.2.2.4. Identity and Access Management
3.2.2.4.1. Centrify
3.2.2.4.2. Cloudiway
3.2.2.4.3. Okta
3.2.2.4.4. Ping
3.2.2.5. Access Control
3.2.2.5.1. Adallom
3.2.2.5.2. Avanan
3.2.2.5.3. Bitglass
3.2.2.5.4. Elastica
3.2.2.5.5. FireLayers
3.2.2.5.6. Managed Methods
3.2.2.5.7. Netskope
3.2.2.5.8. Skyfence
3.2.3. Cloud Application Discovery
3.2.3.1. Ciphercloud
3.2.3.2. Elastica
3.2.3.3. Netskope
3.2.3.4. Skyhigh
3.2.4. Cloud Compliance and Security Risk Platforms
3.2.4.1. AlertLogic
3.2.4.2. Cavirin
3.2.4.3. Cloudcheckr
3.2.4.4. Evident.io
3.2.4.5. Harvest AI
3.3. Cross Domain Solutions
3.3.1. Advenica
3.3.1.1. ZoneGuard
3.3.1.2. SecuriRam
3.3.2. General Dynamics
3.3.2.1. TacGuard
3.3.2.2. Crossing Guard
3.3.2.3. NanoXD
3.3.3. LockHeed Martin
3.3.3.1. Trusted Manager
3.3.4. Tresys
3.3.4.1. XD Air
3.3.4.2. XD Bridge
3.3.4.3. XD Guardian
3.3.5. Owl Computing
3.3.5.1. Owl OPDS-100
3.3.5.2. Owl OPDS-100D
3.3.5.3. OCDS-SFF
3.4. Data Security
3.4.1. Network-Based Data Cleansing
3.4.1.1. DataStealth
3.4.1.1.1. http://www.datexdatastealth.com/
3.4.2. Big Data Security
3.4.2.1. BlueTalon
3.5. Endpoint Security
3.5.1. Endpoint Detection and Response (EDR)
3.5.1.1. Agent-Based
3.5.1.1.1. Carbon Black
3.5.1.1.2. Cisco
3.5.1.1.3. Countertack
3.5.1.1.4. CrowdStrike
3.5.1.1.5. Cyberbit
3.5.1.1.6. Cyberreason
3.5.1.1.7. Cylance
3.5.1.1.8. Digital Guardian
3.5.1.1.9. Dtex Systems
3.5.1.1.10. Endgame Systems
3.5.1.1.11. Fidelis Cybersecurity
3.5.1.1.12. FireEye
3.5.1.1.13. Forescout
3.5.1.1.14. Guidance Software
3.5.1.1.15. Hexis Cyber Solutions
3.5.1.1.16. Invincea
3.5.1.1.17. LogRhythm
3.5.1.1.18. NexThink
3.5.1.1.19. Panda Security
3.5.1.1.20. RSA (EMC)
3.5.1.1.21. SecDo
3.5.1.1.22. SentinelOne
3.5.1.1.23. Tanium
3.5.1.1.24. Triumfant
3.5.1.1.25. Verint
3.5.1.1.26. Ziften
3.5.1.2. Agentless
3.5.1.2.1. BeyondTrust
3.5.1.2.2. Cynet
3.5.1.2.3. Fidelis
3.5.1.2.4. WatchGuard
3.5.1.2.5. InfoCyte
3.5.1.2.6. LightCyber
3.5.1.2.7. Outlier Security
3.5.1.2.8. Promisec
3.5.2. Remote Browser-Isolation (remote dom)
3.5.2.1. Amune
3.5.2.1.1. https://amune.org/security
3.5.2.2. Armor5
3.5.2.3. Authentic8
3.5.2.4. Dispel
3.5.2.5. FireGlass
3.5.2.6. Menlo Security
3.5.2.7. Aurionpro
3.5.2.7.1. Formerly Spikes Security
3.6. Identification, Authentication, Access Control & IAM
3.7. Internet of Things
3.7.1. Automotive
3.7.1.1. Security Innovation
3.7.2. Embedded Security
3.7.2.1. Security Innovation
3.8. Network & Infrastructure Security
3.8.1. Content Disarm and Reconstruction (CDR)
3.8.1.1. Check Point Software
3.8.1.1.1. Threat Extraction
3.8.1.2. Glasswall
3.8.1.2.1. http://www.glasswallsolutions.com/
3.8.1.3. Mimecast
3.8.1.3.1. https://www.mimecast.com/
3.8.1.4. OPSWAT
3.8.1.5. ODI
3.8.1.5.1. http://www.odi-x.com/
3.8.1.6. Re-Sec
3.8.1.6.1. http://www.re-sec.com/
3.8.1.7. Sasa-Software
3.8.1.7.1. http://www.sasa-software.com/
3.8.1.8. Solebit Labs
3.8.1.8.1. http://www.solebitlabs.com/
3.8.1.9. Symantec
3.8.1.9.1. DisArm
3.8.1.10. TreSys
3.8.1.10.1. http://www.tresys.com/
3.8.1.11. Votiro
3.8.1.11.1. http://www.votiro.com/
3.8.2. Malware Infection Analysis and Monitoring Services
3.8.2.1. Lastline
3.8.2.1.1. Guardia
3.8.2.2. Cisco
3.8.2.2.1. Formerly OpenDNS
3.8.2.3. Qualys
3.8.2.4. Seculert
3.8.3. Network Behavior and Analytics
3.8.3.1. Industrial Control Systems (ICS)
3.8.3.1.1. CyberX
3.8.4. Standalone Threat Intelligence Defense Solutions (STIDS)
3.8.4.1. Bandura
3.8.4.1.1. PoliWall
3.8.4.2. Centripetal Networks
3.8.4.3. Damballa
3.8.4.4. Fidelis Cybersecurity
3.8.4.5. FireEye
3.8.4.6. Group IB
3.8.4.6.1. http://tds.group-ib.com/
3.8.4.7. Ixia
3.8.4.7.1. http://www.ixiacom.com/info/ta
3.8.4.8. LookingGlass
3.8.4.8.1. https://lgscout.com/products/dns-defender/
3.8.4.9. Redsocks
3.8.4.9.1. Redsocks Threat Defender
3.8.4.10. ReversingLabs
3.8.4.11. RiskAnalytics
3.8.4.11.1. INtellishun
3.8.4.12. Symantec
3.8.4.12.1. APT Network
3.8.5. Unauthorized Endpoint Connection Prevention (UECP)
3.8.5.1. Ensilo
3.8.5.2. Intel Security
3.8.6. Software Defined WAN (SDwan)
3.8.6.1. CloudGenix
3.8.6.2. Pertino
3.8.6.3. Velocloud
3.8.6.4. Viptela
3.8.6.5. Versa Networks
3.8.7. Virtual Container Security
3.8.7.1. Apcera
3.8.7.2. Aqua Security
3.8.7.3. Illumio
3.8.7.4. StackRox
3.8.7.5. TwistLock
3.8.8. Network Security as a Service
3.8.8.1. Cato Networks
3.8.8.2. MyDigitalShield
3.8.8.3. Zscaler
3.8.9. Software Defined Micro-Perimeter
3.8.9.1. BlackRidge Networks
3.8.9.2. Certes Networks
3.8.9.3. Cryptzone
3.8.9.4. Tempered Networks
3.8.9.5. Unisys Stealth
3.8.9.6. Vidder
3.8.9.7. Waverly Labs
3.9. Risk, Compliance and Security Management
3.9.1. Security Ratings & Insurance
3.9.1.1. Security Ratings
3.9.1.1.1. Bitsight Technologies
3.9.1.1.2. Cyence
3.9.1.1.3. Prevalent
3.9.1.1.4. QuadMetrics
3.9.1.1.5. SecurityScoreCard
3.9.1.2. Cyber Risk Insurance
3.9.1.2.1. Balsiger Insurance
3.9.1.2.2. HSB Group
3.9.1.2.3. Philadelphia Insurance Companies
3.9.1.2.4. Tennant Risk Services
3.9.1.2.5. The Hartford
3.9.1.2.6. Travelers
3.10. Security Operations, Incident Response
3.10.1. Intelligence/Data Feeds/Software & Services
3.10.1.1. Security Intelligence and Data Analysis Platforms
3.10.1.1.1. FireEye
3.10.1.2. Threat Intelligence Platforms (TIPs)
3.10.1.2.1. Anomali
3.10.1.2.2. BAE Systems
3.10.1.2.3. Buguroo
3.10.1.2.4. Codenomicon
3.10.1.2.5. Comilion
3.10.1.2.6. Confer
3.10.1.2.7. Eclectic IQ
3.10.1.2.8. Infoblox
3.10.1.2.9. Lockheed Martin
3.10.1.2.10. Lookingglass Cyber Solutions
3.10.1.2.11. Microsoft
3.10.1.2.12. Palentir
3.10.1.2.13. PierceMatrix
3.10.1.2.14. Service Now (Formerly Brightpoint)
3.10.1.2.15. Soltra
3.10.1.2.16. ThreatConnect
3.10.1.2.17. ThreatQuotient
3.10.1.2.18. TruStar
3.10.1.3. Threat Intelligence Services
3.10.1.3.1. Human Intelligence - HUMINT (Strategic)
3.10.1.3.2. Machine-Based (Tactical)
3.10.1.3.3. Vulnerabilities and Exploits
3.10.1.3.4. Data Loss Detection - External
3.10.1.4. Collaborative Threat Investigation Platforms
3.10.1.4.1. BAE System Detica
3.10.1.4.2. IKANow
3.10.1.4.3. Maltego
3.10.1.4.4. NC4
3.10.1.4.5. Palentir
3.10.2. Malware Analysis
3.10.2.1. Malware Analysis as a Service
3.10.2.1.1. Free Services
3.10.2.1.2. ReversingLabs
3.10.2.1.3. ThreatGrid
3.10.2.2. Sandbox Software
3.10.2.2.1. GFI
3.10.2.2.2. Joesecurity
3.10.2.2.3. Bluecoat
3.10.2.2.4. Payload Security
3.10.3. Threat Deception Technologies
3.10.3.1. Distributed Deception Platforms
3.10.3.1.1. Amgine Securus
3.10.3.1.2. Atomic Software Solutions
3.10.3.1.3. Attivo Networks
3.10.3.1.4. CounterCraft
3.10.3.1.5. CyberTrap
3.10.3.1.6. Cymmetria
3.10.3.1.7. GuardiCore
3.10.3.1.8. Illusive Networks
3.10.3.1.9. Javelin Networks
3.10.3.1.10. KeyFocus
3.10.3.1.11. SmokeScreen
3.10.3.1.12. Specter
3.10.3.1.13. TrapX
3.10.3.1.14. Vision Space Technologies
3.10.3.2. Network
3.10.3.2.1. ForeScout
3.10.3.2.2. Juniper Networks
3.10.3.2.3. Percipient Networks
3.10.3.2.4. Ridgeback Network Defense
3.10.3.2.5. Shadow Networks
3.10.3.3. Open Source
3.10.3.3.1. Honeypot
3.10.3.4. Web
3.10.3.4.1. Shape Security
3.10.3.4.2. Juniper Networks
3.10.3.4.3. CyberTrap
3.10.3.5. Files
3.10.3.5.1. Allure Security Technology
3.10.3.5.2. WatchPoint
4. VARs, Distributors, Market Logistics & Supply Chain
4.1. Cloud Service Brokerages
4.1.1. Bitnami
4.1.2. Ensim
4.1.2.1. http://www.ensim.com/
4.1.3. Gravitant
4.1.4. Jamcracker
4.1.4.1. http://www.jamcracker.com/
4.1.5. StandingCloud
4.2. Distribution/Channel/VARs
4.2.1. VARs, Resellers
4.2.1.1. China
4.2.1.1.1. Mainland China
4.2.1.1.2. Hong Kong
4.2.1.1.3. Taiwan
4.2.1.2. Emerging Asia Pacific
4.2.1.2.1. India
4.2.1.2.2. Indonesia
4.2.1.2.3. Malasia
4.2.1.2.4. Thailand
4.2.1.2.5. Philippines
4.2.1.3. Eurasia
4.2.1.3.1. Russian Federation
4.2.1.3.2. Kazakhstan
4.2.1.3.3. Ukraine
4.2.1.4. Europe
4.2.1.4.1. Eastern Europe
4.2.1.4.2. Western Europe
4.2.1.5. Latin America
4.2.1.5.1. Brazil
4.2.1.5.2. Chile
4.2.1.5.3. Columbia
4.2.1.5.4. Costa Rica
4.2.1.5.5. Ecuador
4.2.1.5.6. Bolivia
4.2.1.5.7. Venezuela
4.2.1.5.8. Cuba
4.2.1.5.9. Argentina
4.2.1.5.10. Buenos Aires
4.2.1.5.11. Mexico
4.2.1.5.12. Peru
4.2.1.6. Mature Asia Pacific
4.2.1.6.1. Australia
4.2.1.6.2. Japan
4.2.1.6.3. Singapore
4.2.1.7. Middle East and North Africa
4.2.1.7.1. Turkey
4.2.1.7.2. Israel
4.2.1.7.3. Saudi Arabia
4.2.1.7.4. South Africa
4.2.1.7.5. India
4.2.1.7.6. United Arab Emirates
4.2.1.8. North America
4.2.1.8.1. United States
4.2.1.8.2. Canada
4.2.1.9. Sub-Sahara Africa
4.2.1.9.1. South Africa
4.2.1.10. WorldWide
4.2.1.10.1. AT&T
4.2.1.10.2. BT
4.2.1.10.3. Optiv
4.2.1.10.4. SHI
4.2.1.10.5. Secureworks
4.2.1.10.6. Verizon Business
4.2.2. Distributors
4.2.2.1. China
4.2.2.1.1. AVNet
4.2.2.1.2. B & Data Technology Co. Ltd.
4.2.2.1.3. Beijing Advazone Electronic Limited Comp
4.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.
4.2.2.1.5. Digital China Technology LTD.
4.2.2.1.6. Ecs China
4.2.2.1.7. Edvance Technology (China) Limited
4.2.2.1.8. Huagai
4.2.2.1.9. M.Tech (Shanghai) Co., Ltd.
4.2.2.1.10. Shanghai S-I Information Tech. Ltd
4.2.2.1.11. Sinogrid Information Technology Ltd.
4.2.2.1.12. Sky Faith International Enterprise
4.2.2.2. Emerging Asia Pacific
4.2.2.2.1. India
4.2.2.2.2. Indonesia
4.2.2.2.3. Thailand
4.2.2.3. Eurasia
4.2.2.3.1. Russian Federation
4.2.2.3.2. Kazakhstan
4.2.2.4. Mature Asia Pacific
4.2.2.4.1. Singapore
4.2.2.4.2. Japan
4.2.2.4.3. South Korea
4.2.2.4.4. Australia
4.2.2.5. Middle East and South Africa
4.2.2.5.1. United Arab Emirates
4.2.2.5.2. South Africa
4.2.2.6. North America
4.2.2.6.1. Canada
4.2.2.6.2. United States
4.2.2.7. Sub-Sahara Africa
4.2.2.7.1. South Africa
4.2.2.8. Western Europe
4.2.2.8.1. United Kingdom
4.2.2.8.2. Germany
4.2.2.9. Worldwide
4.2.2.9.1. AVNet
4.2.2.9.2. Ingram Micro
4.2.2.9.3. LifeBoat Distribution
4.2.2.9.4. Tech Data
4.2.2.9.5. Westcon
4.2.2.10. Latin America
4.2.2.10.1. Mexico
4.2.2.10.2. Brazil
4.2.3. Reseller Programs
4.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm
4.2.4. Logistics/Deal Registration
4.2.4.1. Connectwise
4.3. Government Cyberwarrior (Personnel Estimates)
4.3.1. United States
4.3.1.1. NSA
4.3.1.1.1. Cyberwarrior Stats
4.3.1.2. Department of Defense
4.3.1.2.1. US Airforce
4.3.1.2.2. US Navy
4.3.1.2.3. DISA
4.3.2. Iran
4.3.2.1. 4500
4.3.3. Israel
4.3.3.1. Unit 8200
4.3.3.1.1. 5000
4.3.4. North Korea
4.3.4.1. 1000
4.4. Hardware and Chip Security
4.4.1. AMD
4.4.1.1. TPM
4.4.2. Cavium
4.4.2.1. Multi-Core Processors
4.4.3. Flow Processors
4.4.3.1. Netronome
4.4.4. Intel
4.4.4.1. TPM
4.4.4.2. Data Execution Protection
4.4.5. Systems
4.4.5.1. Janus Technologies
4.4.5.1.1. http://www.janustech.com/janus_secure_computer.html
4.5. Investment
4.5.1. ETFs
4.5.1.1. PureFunds
4.5.1.1.1. SYM:HACK
4.5.2. Venture Capitalists
4.5.2.1. Trident Capital
4.5.2.2. Andreesen Horowitz
4.6. Managed Service Enablement
4.6.1. Chartec
4.6.2. Jamcracker
4.7. Marketing/PR/AR
4.7.1. Analyst & Public Relations
4.7.1.1. Focused Image
4.7.1.1.1. http://www.focusedimage.com/
4.7.1.2. KTCpr
4.7.1.2.1. http://www.kahn-travel.com/
4.7.1.3. Madison Alexander PR
4.7.1.3.1. http://www.madisonalexanderpr.com/
4.7.1.4. Marc Gendron PR
4.7.1.4.1. http://www.mgpr.info/
4.7.1.5. Schwartz Communications
4.7.1.5.1. http://www.schwartzmsl.com/
4.7.1.6. Spalding Communications
4.7.1.7. Text 100
4.7.1.7.1. http://www.text100.com/
4.7.2. Campaign/Engagement
4.7.2.1. Jivox
4.7.2.2. WCG World
4.7.3. Creative/Design Services
4.7.3.1. Creative Circle
4.7.3.1.1. https://www.creativecircle.com/
4.7.3.2. Duarte
4.7.3.2.1. http://www.duarte.com/
4.7.3.3. Gig Productions
4.7.3.3.1. http://www.gigpros.com/index.php
4.7.3.4. Initiate Marketing
4.7.3.4.1. http://www.getinitiated.ca/
4.7.3.5. MN8Studio
4.7.3.5.1. http://www.mn8studio.com/
4.7.3.6. Text 100
4.7.3.6.1. http://www.text100.com/
4.7.4. Web Site Design
4.7.4.1. Baytech Web Design
4.7.4.1.1. http://www.baytechwebdesign.com/
4.7.4.2. EU Design Studios
4.7.4.2.1. http://eudesignstudio.com/
4.7.4.3. Pro Logic Web Services
4.7.4.3.1. http://www.prologicsoft.com/
4.7.5. Market Destinations (Sites)
4.7.5.1. CRN
4.7.5.2. Hak5
4.7.5.3. MSPMentor
4.7.5.4. Madison Logic
4.7.5.5. SCmagazine
4.7.5.6. TheVarGuy
4.7.6. Marketing Videos
4.7.6.1. Epipheo
4.7.6.1.1. http://www.epipheo.com/
4.7.7. Marketing/Branding Agencies
4.7.7.1. Focused Image
4.7.7.1.1. http://www.focusedimage.com/branding/
4.7.7.2. Hill and Knowlton
4.7.7.2.1. http://www.hkstrategies.com/
4.7.7.3. MetaDesign
4.7.7.3.1. http://www.metadesign.com/san-francisco
4.7.7.4. Ogilvy & Mather
4.7.7.5. Tailfin Marketing Communications
4.7.7.6. Toolbox Studios
4.8. OEMs & System Integrators
4.8.1. Appliance Integrators
4.8.1.1. Accton
4.8.1.1.1. http://www.accton.com/
4.8.1.2. Advantech
4.8.1.2.1. http://www.advantech.com/
4.8.1.3. Celestica
4.8.1.3.1. http://www.celestica.com/
4.8.1.4. Dan-el Technologies Ltd.
4.8.1.4.1. http://www.danel.co.il/
4.8.1.5. Flextronics
4.8.1.5.1. http://www.flextronics.com/
4.8.1.6. Plexus
4.8.1.6.1. http://www.plexus.com/
4.8.1.7. Reservoir Labs
4.8.1.7.1. https://www.reservoir.com/
4.8.2. Base Appliances
4.8.2.1. Advantech
4.8.2.2. Amax
4.8.2.3. Cas Well
4.8.2.4. Iron Systems
4.8.2.5. Lanner
4.8.2.6. Portwell
4.8.2.7. Tilera
4.8.3. Cards
4.8.3.1. Netronome
4.8.3.2. Tilera
4.8.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection
4.8.4. Encryption Acceleration
4.8.4.1. Intel
4.8.4.1.1. VPRO
4.8.4.2. Gemalto
4.8.4.2.1. Luna PCI
4.8.5. MSSP Appliances
4.8.5.1. 443 Networks
4.8.6. Managed Security OEMs
4.8.6.1. Digital Hands
4.8.7. Security Related Chips & CPUs
4.8.7.1. Broadcom
4.8.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection
4.8.7.2. Cavium
4.8.7.2.1. http://www.cavium.com
4.8.7.3. Lionic
4.8.7.3.1. http://www.lionic.com/
4.8.7.4. Netronome
4.8.7.4.1. http://www.netronome.com
4.8.7.5. Tilera
4.8.7.5.1. http://www.tilera.com/products/processors
4.8.7.6. Intel
4.8.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH
4.8.8. Software
4.8.8.1. Advanced Content Disarming and Reconstruction
4.8.8.1.1. OPSWAT
4.8.8.1.2. Votiro
4.8.8.2. Advanced Threat Protection - Virtual Execution Engines
4.8.8.2.1. ContentKeeper
4.8.8.2.2. Threat Track Security
4.8.8.3. Analytics/Graphing/Reporting OEMs
4.8.8.3.1. Embedded Analytics
4.8.8.3.2. Graphing/Reporting
4.8.8.4. Anti-Spam/Phishing
4.8.8.4.1. APWG
4.8.8.4.2. BrandProtect
4.8.8.4.3. Cyren
4.8.8.4.4. Ikarus
4.8.8.4.5. Internet Fraud Alert
4.8.8.4.6. ReturnPath
4.8.8.4.7. WebRoot Brightcloud
4.8.8.5. AntiMalware
4.8.8.5.1. Antiy
4.8.8.5.2. Avira
4.8.8.5.3. Bitdefender
4.8.8.5.4. Cyren
4.8.8.5.5. ESet
4.8.8.5.6. Fortinet
4.8.8.5.7. GFI
4.8.8.5.8. Ikarus
4.8.8.5.9. Intel Security
4.8.8.5.10. Kaspersky
4.8.8.5.11. Norman
4.8.8.5.12. OPSWAT
4.8.8.5.13. QuickHeal
4.8.8.5.14. ThreatTrack
4.8.8.5.15. Zillya
4.8.8.5.16. ZonerAntiVirus
4.8.8.6. Content Extraction & Search
4.8.8.6.1. Oracle
4.8.8.7. Encryption
4.8.8.7.1. Transport
4.8.8.8. Endpoint Security and Management
4.8.8.8.1. OPSWAT
4.8.8.9. File Content Decoding/Analysis/Fingerprinting
4.8.8.9.1. HP Autonomy
4.8.8.9.2. Attivio
4.8.8.9.3. GTB Technologies
4.8.8.10. IT Service Management
4.8.8.10.1. ITRP
4.8.8.11. Image Recognition
4.8.8.11.1. Image Analyzer
4.8.8.12. Intrusion Detection/Prevention Signatures
4.8.8.12.1. Proofpoint
4.8.8.13. Network Stack
4.8.8.13.1. IPV4/6
4.8.8.13.2. Deep Packet Inspection
4.8.8.13.3. SDN
4.8.8.14. Optical Character Recognition
4.8.8.14.1. Abbyy
4.8.8.15. Social Network Content Control
4.8.8.15.1. NetboxBlue
4.8.8.16. URL Categorization
4.8.8.16.1. Cyren
4.8.8.16.2. Ikarus
4.8.8.16.3. Malware
4.8.8.16.4. Webroot Brightcloud
4.8.8.16.5. Zvelo
4.8.8.17. Voice Recognition
4.8.8.17.1. STC
4.8.8.17.2. Nuance
4.8.9. Threat Intelligence
4.8.9.1. Anti-Phishing
4.8.9.1.1. Cyren
4.8.9.2. DNS DGA Feeds
4.8.9.2.1. Farsight Security
4.8.9.3. File Reputation
4.8.9.3.1. Findthatfile
4.8.9.3.2. Webroot
4.8.9.4. Fraud
4.8.9.4.1. Internet Fraud Alert
4.8.9.4.2. National Cyber-Forensics and Training Alliance
4.8.9.5. IP Block Lists
4.8.9.5.1. WebRoot Brightcloud
4.8.9.5.2. Cyren
4.8.9.5.3. Malwarebytes
4.8.9.6. IP Reputation
4.8.9.6.1. Cyren
4.8.9.6.2. WebRoot Brightcloud
4.8.9.7. Indicators of Compromise
4.8.9.7.1. FireEye
4.8.9.7.2. Proofpoint
4.8.9.7.3. Wapack labs
4.8.9.7.4. CIRCL
4.8.9.8. Malicious URL
4.8.9.8.1. Cyren
4.8.9.8.2. Findthatfile
4.8.9.8.3. Webroot
4.8.9.9. Predictive Intelligence
4.8.9.9.1. Seclytics
4.8.9.10. Vulnerability Research
4.8.9.10.1. Telus Security Labs
4.8.9.10.2. Vupen
4.8.9.11. Malware Samples
4.8.9.11.1. Virustotal
4.8.9.11.2. VirusSign
4.9. Product Testing
4.9.1. Generic Product Testing, Certification and Accreditation
4.9.1.1. Certifications
4.9.1.1.1. North America
4.9.1.1.2. European Union
4.9.1.2. Testing
4.9.1.2.1. United Kingdom
4.9.1.2.2. North America
4.9.1.2.3. Singapore
4.9.1.3. Accreditation
4.9.1.3.1. DOD
4.9.1.3.2. NSA
4.9.2. Anti-Malware Testing
4.9.2.1. AMTSO
4.9.2.2. AV-Test
4.9.2.3. Av-Comparatives
4.9.2.4. MRG Effitas
4.9.2.5. VirusBTN
4.9.3. Sponsored Product Review/Testing
4.9.3.1. Delta Testing LTD
4.9.3.2. Dennis Labs
4.9.3.3. Miercom
4.9.3.4. NSS Labs
4.9.3.5. Network Testing Labs
4.9.3.6. Tolly Group
4.9.3.7. West Coast Labs
4.9.4. Antimalware Standards Bodies
4.9.4.1. AMTSO
4.9.4.1.1. http://www.amtso.org/
4.10. Security Conferences
4.10.1. North America
4.10.1.1. United States
4.10.1.1.1. RSA
4.10.1.1.2. Gartner
4.10.1.1.3. Cornerstones of Trust
4.10.1.1.4. Annual Security Conference
4.10.1.1.5. SecurityBsides
4.10.1.1.6. ShmooCon
4.10.2. Europe
4.10.2.1. United Kingdom
4.10.2.1.1. RSA Conference
4.10.2.1.2. Gartner
4.10.2.2. Russia
4.10.2.2.1. Infosecurity Russia
4.10.3. Emerging Asia Pacific
4.10.4. Mature Asia Pacific
4.10.4.1. Australia
4.10.4.1.1. Gartner
4.10.4.2. Singapore
4.10.4.2.1. RSA
4.11. Staffing/Recruiting/Executive Search
4.11.1. Millard Group
4.11.2. Lynch Bowie Group
4.11.3. Robert Half
4.12. User Interface Design
4.12.1. Consulting
4.12.1.1. User Interface
4.12.1.1.1. BlinkUX
4.12.1.1.2. Sasa Technologies
4.12.1.1.3. Dabapps
4.12.1.2. Customer Survey
4.12.1.2.1. Techvalidate
4.12.2. HTML5 Visualization Libraries
4.12.2.1. Data-Driven Documents
4.12.2.1.1. http://d3js.org/
4.12.2.2. AngularJS
4.12.2.2.1. https://angularjs.org/
4.12.3. Icons
4.12.3.1. IconExperience
4.12.3.1.1. https://www.iconexperience.com/
4.12.3.2. FlatIcon
4.12.3.2.1. http://www.flaticon.com/packs/general-ui
4.12.3.3. ModernUIicons
4.12.3.3.1. http://modernuiicons.com/
4.12.3.4. Ui8
4.12.3.4.1. https://ui8.net/categories/icons
5. Infrastructure Protection
5.1. Active Directory Defense
5.1.1. Aorato
5.1.1.1. http://www.aorato.com/
5.2. Cloud-Based Remote Access VPN
5.2.1. Check Point
5.2.1.1. Capsule Cloud
5.2.2. Pertino
5.2.3. Soha
5.3. DNS-based Threat Prevention/Detection
5.3.1. Standalone Appliances
5.3.1.1. Bluecat Networks
5.3.1.2. Efficient IP
5.3.1.3. Infoblox
5.3.2. Recursive DNS Services
5.3.2.1. Bluecat Networks
5.3.2.2. Cisco
5.3.2.2.1. OpenDNS
5.3.2.3. Comodo
5.3.2.4. CrowdStrike
5.3.2.5. Infoblox
5.3.2.6. Neustar
5.3.2.7. Nominum
5.3.2.8. Symantec
5.3.2.9. ThreatStop
5.3.2.10. Verisign
5.3.3. Firewalls
5.3.3.1. Palo Alto Networks
5.4. Denial of Service Protection
5.4.1. Appliances
5.4.1.1. Arbor Networks
5.4.1.1.1. Prevail APS
5.4.1.2. Check Point Software
5.4.1.2.1. DDos Protector
5.4.1.3. Corero
5.4.1.4. Fortinet
5.4.1.5. Genie Networks
5.4.1.5.1. ATM Appliances
5.4.1.6. NSFOCUS
5.4.1.7. Radware
5.4.1.8. WINS TECHNET LTD
5.4.1.8.1. http://www.wins21.co.kr/
5.4.2. Security as a Service
5.4.2.1. HTTP/HTTPS Only
5.4.2.1.1. DOSArrest
5.4.2.1.2. Cloudflare
5.4.2.2. MultiProtocol/Network
5.4.2.2.1. Akamai
5.4.2.2.2. Black Lotus
5.4.2.2.3. Cloud Flare
5.4.2.2.4. F5
5.4.2.2.5. Incapsula
5.4.2.2.6. Link11
5.4.2.2.7. Neustar
5.4.2.2.8. NexusGuard
5.4.2.2.9. Verisign Inc
5.4.3. Clean Pipe Services
5.4.3.1. AT&T
5.4.3.2. Verizon
5.5. Fraud Prevention/Web Malware Monitoring
5.5.1. Fraud/Bot/Webscrape Prevention
5.5.1.1. Software
5.5.1.1.1. RSA (EMC)
5.5.1.1.2. IBM (Formerly Trusteer)
5.5.1.1.3. Intellinx
5.5.1.2. Appliances
5.5.1.2.1. RSA
5.5.1.2.2. Distil Networks
5.5.1.2.3. White Ops
5.5.1.3. Software as a Service
5.5.1.3.1. Akamai
5.5.1.3.2. BioCatch
5.5.1.3.3. Distil Networks
5.5.1.3.4. Guardian Analytics
5.5.1.3.5. Kount
5.5.1.3.6. MarkMonitor
5.5.1.3.7. ShieldSquare
5.5.1.3.8. ThreatMetrix
5.5.1.3.9. White Ops
5.5.1.3.10. X-Cart
5.5.1.3.11. iovation
5.5.1.4. Virtual Appliances
5.5.1.4.1. Distil Networks
5.5.2. Website & Ad Malware Monitoring
5.5.2.1. Ad-Juster
5.5.2.2. Globalsign
5.5.2.2.1. Leverages Hackalert
5.5.2.3. Hackalert
5.5.2.4. Intel Security
5.5.2.4.1. Siteadvisor
5.5.2.5. QualysGuard
5.5.2.6. RiskIQ
5.5.2.7. Sucuri
5.6. Network Access Control (NAC)
5.6.1. Host Based
5.6.1.1. Extreme Networks
5.6.1.2. Genians
5.6.1.3. Intel Security
5.6.1.4. Symantec
5.6.1.5. Trustwave
5.6.2. Network Based
5.6.2.1. Aruba Networks
5.6.2.2. Bradford Networks
5.6.2.3. Cisco
5.6.2.4. Forescout
5.6.2.5. Juniper Networks
5.6.2.6. Milton Security Group
5.6.2.7. Portnox
5.7. Network Anonymization & Consumer VPN Services
5.7.1. AnchorFree Hotspot Shield
5.7.2. Anonymize.net
5.7.3. CyberGhost
5.7.4. Dispel
5.7.5. GoldenFrog
5.7.6. HMA ProVPN
5.7.6.1. TorVPN
5.7.7. Okayfreedom
5.7.8. OpenVPN Shield Exchange
5.7.9. Private Wifi
5.7.10. Tor
5.7.11. luminati.io
5.8. Network Firewalls
5.8.1. Carrier Firewalls
5.8.2. Enterprise Firewalls
5.8.2.1. Multifunction Enterprise Firewalls
5.8.2.1.1. Bluedon
5.8.2.1.2. Check Point Software
5.8.2.1.3. Cisco
5.8.2.1.4. Fortinet
5.8.2.1.5. Huawei
5.8.2.1.6. Palo Alto Networks
5.8.2.1.7. Sonicwall
5.8.2.1.8. Websense (Formerly Intel Security)
5.8.2.2. Stateful Inspection - Traditional Firewalls
5.8.2.2.1. Cisco
5.8.2.2.2. Huawei
5.8.2.2.3. Check Point Software
5.8.3. Multi-Funtion SMB Firewalls
5.8.3.1. 443 Networks
5.8.3.2. Bluedon
5.8.3.3. Check Point Software
5.8.3.4. CheckPoint
5.8.3.5. Cisco
5.8.3.6. Clavister
5.8.3.7. Endian
5.8.3.8. Fortinet
5.8.3.9. Hillstone Networks
5.8.3.10. Meraki
5.8.3.11. PineApp
5.8.3.11.1. http://www.pineapp.com/
5.8.3.12. Sangfor
5.8.3.13. Sonicwall
5.8.3.14. Sophos
5.8.3.15. Trustwave
5.8.3.16. Untangle
5.8.3.17. WINS TechNet LTD
5.8.3.17.1. http://www.wins21.co.kr/
5.8.3.18. WatchGuard
5.8.4. Open Source & Community
5.8.4.1. IPTables
5.8.4.2. IPchains
5.8.4.3. PFSense
5.8.4.4. Untangle
5.8.5. Router Firewalls
5.9. Network Intrusion Detection/Prevention
5.9.1. Predictive Modeling
5.9.1.1. Cyactive
5.9.1.2. Trustpipe
5.9.2. Signature Based
5.9.2.1. AlienVault
5.9.2.1.1. Snort
5.9.2.2. Bricata
5.9.2.3. CheckPoint
5.9.2.4. Cisco
5.9.2.4.1. Sourcefire
5.9.2.5. Enterasys
5.9.2.6. Fortinet
5.9.2.7. HP
5.9.2.7.1. TippingPoint
5.9.2.8. IBM
5.9.2.9. Intel Security
5.9.2.10. Open Source
5.9.2.10.1. Snort
5.9.2.11. Symantec
5.9.2.11.1. APT Network
5.9.2.12. WINS TECHNET LTD
5.9.2.12.1. http://www.wins21.co.kr/
5.9.3. SCADA
5.9.3.1. Radiflow
5.10. Network Packet Brokers
5.10.1. Adara
5.10.2. Apcon
5.10.3. Arista Networks
5.10.4. Cubro
5.10.5. Gigamon
5.10.6. IXIA
5.10.7. Interface Masters Technologies
5.10.8. JDSU
5.10.9. NetOptics
5.10.10. NetScout
5.10.11. VSS Monitoring
5.11. Network Traffic Analysis and Network Forensics
5.11.1. Flow Analysis/Metadata Extraction
5.11.1.1. Arbor Networks
5.11.1.2. Flowmon Networks
5.11.1.3. IBM
5.11.1.4. Intel Security NBA
5.11.1.5. Lancope
5.11.1.6. LogRythm
5.11.2. Forensic Capture with User Surveillance & Security Threat Analytics
5.11.2.1. Access Data
5.11.2.2. BlueCoat
5.11.2.3. Cisco
5.11.2.3.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html
5.11.2.4. EMC
5.11.2.5. FireEye
5.11.2.6. Fluke Networks
5.11.2.7. IBM
5.11.2.8. IP Fabrics
5.11.2.9. JDSU (Network Instruments)
5.11.2.10. LightCyber
5.11.2.11. NetAgent
5.11.2.12. NetResec
5.11.2.13. NetScout
5.11.2.14. Niksun
5.11.2.15. Novetta Solutions
5.11.2.16. Nuix
5.11.2.17. Packetsled
5.11.2.18. Riverbed
5.11.2.19. SS8
5.11.2.19.1. http://www.ss8.com/
5.11.2.20. nPulse Technologies
5.11.3. Network Forensics Tools
5.11.3.1. Alert Logic
5.11.3.1.1. Formerly Click Security
5.11.3.2. Corvil
5.11.3.3. Cybersift
5.11.3.3.1. http://www.cybersift.net/sifter10app.html
5.11.3.4. Decision Group INC
5.11.3.4.1. http://www.edecision4u.com/index.html
5.11.3.5. EMC
5.11.3.6. FireEye
5.11.3.7. IP Fabrics
5.11.3.8. IPCopper
5.11.3.9. Flowmon Networks
5.11.3.9.1. http://www.invealawfulinterception.com/
5.11.3.10. KLOS
5.11.3.10.1. http://www.klos.com/applications/lawful-intercept/
5.11.3.11. NEXT Computing
5.11.3.11.1. http://www.nextcomputing.com/products/packet-capture-systems
5.11.3.12. NetReSec
5.11.3.13. Niksun
5.11.3.14. Radisys
5.11.3.14.1. http://www.radisys.com/products/network-appliance/
5.11.3.15. Utimaco
5.11.3.15.1. https://lims.utimaco.com/utimaco-lims/
5.11.3.16. Vivavi Solutions
5.11.3.17. WildPackets
5.11.4. Network Forensics Tools as a Service (NFTaaS)
5.11.4.1. CloudShark
5.11.5. Network Taps
5.11.5.1. Optical
5.11.5.1.1. Apcon
5.11.5.1.2. DataCom Systems
5.11.5.1.3. FibreDyne
5.11.5.1.4. Gigamon
5.11.5.1.5. Glimmerglass
5.11.5.1.6. M2Optics
5.11.5.1.7. Netoptics
5.11.5.1.8. Network Instruments
5.11.5.1.9. VSS Monitoring
5.11.5.1.10. nTAP
5.11.6. Network Traffic Analysis (NTA)
5.11.6.1. Amgine Securus
5.11.6.2. Arbor Networks
5.11.6.3. Boeing
5.11.6.4. Cisco
5.11.6.4.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html
5.11.6.5. Core Security (Formerly Damballa)
5.11.6.6. Corvil
5.11.6.7. Cyber adAPT
5.11.6.8. Darktrace
5.11.6.9. Eastwind Networks
5.11.6.10. ExtraHop Networks
5.11.6.11. Fidelis Cybersecurity
5.11.6.12. Lancope
5.11.6.13. LightCyber
5.11.6.14. Novetta Solutions
5.11.6.15. PacketSled
5.11.6.16. Phirelight
5.11.6.17. Qihoo 360
5.11.6.17.1. SkyEye
5.11.6.18. RedJack
5.11.6.19. SlashNext
5.11.6.20. Splunk
5.11.6.21. Taasera
5.11.6.22. ThreatTrack
5.11.6.23. Trustport
5.11.6.23.1. Threat Intelligence
5.11.6.24. Vectra Networks
5.11.6.25. WireX
5.11.7. Raw Network Packet Capture
5.11.7.1. Apcon
5.11.7.1.1. Riverbed
5.11.7.1.2. Netfort
5.11.7.1.3. Wireshark
5.11.7.1.4. NTOP
5.11.7.2. Arbor Networks
5.11.7.3. Comworth
5.11.7.4. NTOP.org
5.11.7.5. Netfort
5.11.7.6. WireShark
5.12. Network-Based Advanced Threat Protection
5.12.1. Firewalls with Malware Sandbox Capabilities
5.12.1.1. Barracuda
5.12.1.2. Check Point Software
5.12.1.3. Cisco
5.12.1.4. Fortinet
5.12.1.5. Huawei
5.12.1.6. Juniper Networks
5.12.1.7. Palo Alto Networks
5.12.1.8. Sonicwall
5.12.1.9. Sophos
5.12.1.10. Watchguard
5.12.2. Appliance Based Malware Sandboxes
5.12.2.1. AMGINE SECURUS
5.12.2.1.1. http://www.amgine.co.kr/index.html
5.12.2.2. AhnLab
5.12.2.3. Bluecoat
5.12.2.4. Check Point Software
5.12.2.4.1. Emulator Blade
5.12.2.5. Cisco
5.12.2.5.1. ThreatGrid
5.12.2.6. ContentKeeper
5.12.2.7. Cyphort
5.12.2.8. Damballa
5.12.2.9. FireEye
5.12.2.10. Fortinet
5.12.2.10.1. FortiSandbox
5.12.2.11. General Dynamics
5.12.2.11.1. Fidelis Security Systems
5.12.2.12. Huawei
5.12.2.12.1. Firehunter
5.12.2.13. Intel Security
5.12.2.13.1. McAfee Advanced Threat Detection Appliance
5.12.2.14. LastLine
5.12.2.15. Palo Alto Networks
5.12.2.15.1. WildFire
5.12.2.16. Payload Security
5.12.2.17. Qihoo
5.12.2.17.1. SkyEye
5.12.2.18. Techguard Security
5.12.2.19. ThreatTrack
5.12.2.20. Trend Micro
5.12.2.20.1. Deep Discovery
5.12.2.21. VMRay
5.12.2.22. VeeDog
5.12.2.22.1. http://veedog.com/
5.12.2.23. WINS TECHNET LTD
5.12.2.23.1. http://www.wins21.co.kr/
5.12.3. Cloud-Based Malware Sandboxes
5.12.3.1. Cisco
5.12.3.1.1. ThreatGrid
5.12.3.2. Fortinet
5.12.3.3. Huawei
5.12.3.4. Joe Security
5.12.3.5. Lastline
5.12.3.6. Netwitness
5.12.3.6.1. Spectrum
5.12.3.7. Palo Alto Networks
5.12.3.7.1. WildFire
5.12.3.8. Qihoo
5.12.3.8.1. SkyEye
5.12.3.9. Sonicwall
5.13. SCADA/ICS
5.13.1. Monitoring
5.13.1.1. CRITIFENSE
5.13.1.2. Cyberbit
5.13.1.3. PFP Cybersecurity
5.13.2. SCADA Firewalls
5.13.2.1. BAE Systems
5.13.2.1.1. http://www.baesystems.com/en-us/product/scada-firewall
5.13.2.2. Bayshore Networks
5.13.2.2.1. https://www.bayshorenetworks.com/products/it-ot-gateway/
5.13.2.3. Check Point Software
5.13.2.3.1. https://www.checkpoint.com/products-solutions/critical-infrastructure/
5.13.2.4. Endian
5.13.2.4.1. http://www.endian.com/products/4i/
5.13.2.5. Fortinet
5.13.2.5.1. https://www.fortinet.com/solutions/industries/scada-industrial-control-systems.html
5.13.2.6. Tofino Security
5.13.2.6.1. https://www.tofinosecurity.com/products/Tofino-Firewall-LSM
5.14. SSL Inspection Appliances
5.14.1. A10 Networks
5.14.2. Bluecoat
5.14.3. ResolutionOne
5.14.4. VSS Monitoring
5.14.5. SourceFire
5.15. Software Defined Micro-Perimeter
5.15.1. BlackRidge Networks
5.15.2. Certes Networks
5.15.3. Cryptzone
5.15.4. Tempered Networks
5.15.5. Unisys Stealth
5.15.6. Vidder
5.15.7. Waverly Labs
5.16. Virtual Private Networking (VPN/SSL VPN)
5.16.1. IPSec VPN Concentrators
5.16.1.1. Certes Networks
5.16.1.2. CheckPoint Software
5.16.1.3. Cisco
5.16.1.4. Mako Networks
5.16.2. Layer 2 Encryption
5.16.2.1. Certes Networks
5.16.3. Layer 4 Encryption
5.16.3.1. Certes Networks
5.16.4. SSL VPN
5.16.4.1. AhnLab
5.16.4.2. Array Networks
5.16.4.3. Barracuda Networks
5.16.4.4. Check Point Software
5.16.4.5. Cisco
5.16.4.6. Citrix
5.16.4.7. F5 Networks
5.16.4.8. Fortinet
5.16.4.9. Hillstone Networks
5.16.4.10. Juniper
5.16.4.11. NetGear
5.16.4.12. Sonicwall
5.16.4.13. Stonesoft
5.16.4.14. WatchGuard
5.16.5. Multi-Path Dynamic VPN
5.16.5.1. Secret Double Octopus
5.16.5.2. Dispersive Networks
5.17. Web/Email Protection
5.17.1. Secure Email Gateways
5.17.1.1. Alt-N Technologies
5.17.1.2. Bluecoat
5.17.1.3. Fortinet
5.17.1.4. GWAVA
5.17.1.5. Intel Security
5.17.1.6. Proofpoint
5.17.1.7. Re-Sec
5.17.1.8. Sonicwall
5.17.1.9. Symantec
5.17.1.10. Trustwave
5.17.1.11. Voitiro
5.17.1.12. Websense
5.17.1.13. iBoss
5.17.2. Secure Web Gateways
5.17.2.1. Anchiva
5.17.2.2. Bluecoat
5.17.2.3. ContentKeeper
5.17.2.4. GWAVA
5.17.2.5. Intel Security
5.17.2.6. Re-Sec
5.17.2.7. Symantec
5.17.2.8. Trustwave
5.17.2.9. Websense
5.17.2.10. iBoss
5.17.3. Security as a Service
5.17.3.1. Web & Email SaaS
5.17.3.1.1. Appriver
5.17.3.1.2. Barracuda
5.17.3.1.3. Bitglass
5.17.3.1.4. Cisco
5.17.3.1.5. Intel Security
5.17.3.1.6. MailGuard
5.17.3.1.7. Spamina
5.17.3.1.8. Symantec
5.17.3.1.9. Total Defense
5.17.3.1.10. TotalDefense
5.17.3.1.11. Websense
5.17.3.1.12. Zscaler
5.17.3.2. Web Only
5.17.3.2.1. Bluecoat
5.17.3.2.2. ContentKeeper
5.17.3.2.3. OpenDNS
5.17.3.2.4. Websense
5.17.3.2.5. Zscaler
5.17.3.3. Secure Email Gateways
5.17.3.3.1. Agari
5.17.3.3.2. CloudMark
5.17.3.3.3. Proofpoint
5.17.3.3.4. Return Path
5.17.3.3.5. Spam Experts
5.17.3.3.6. Spam Titan
5.17.3.3.7. Spamina
5.17.3.3.8. ValiMail
5.17.3.4. Anti-Phishing
5.17.3.4.1. Amgine Securus
5.17.3.4.2. Area1 Security
5.17.3.4.3. CloudMark
5.17.3.4.4. Cymbel
5.17.3.4.5. Cyveillance
5.17.3.4.6. FireEye
5.17.3.4.7. MailGuard
5.17.3.4.8. MediaPro
5.17.3.4.9. Phishlabs
5.17.3.4.10. ThreatTrack
5.17.3.4.11. Votiro
5.17.3.4.12. Webroot
5.17.3.4.13. ZapFraud
6. Security Consulting & Implementation
6.1. Forensics
6.1.1. Forensics
6.1.1.1. Incident Response
6.1.1.1.1. Crowdstrike
6.1.1.1.2. Cylance
6.1.1.1.3. Deloitte
6.1.1.1.4. Fidelis Cybersecurity
6.1.1.1.5. FireEye
6.1.1.1.6. Guidance Software
6.1.1.1.7. Maryman & Associates
6.1.1.1.8. NTT Coms Security
6.1.1.1.9. Nettitude
6.1.1.1.10. Optiv
6.1.1.1.11. Presecure
6.1.1.1.12. Secureworks
6.1.1.1.13. Verizon
6.1.1.2. E-Discovery & Computer Forensics
6.1.1.3. Endpoint Forensics
6.1.1.4. Network Forensics
6.2. Governance, Advisory, Assessment
6.2.1. Architecture and Design
6.2.2. Business Continuity
6.2.3. Compliance Review
6.2.4. Data Security Program
6.2.5. Governance, Compliance and Policy Design
6.2.5.1. Compliance Mandates
6.2.5.1.1. PCI
6.2.5.1.2. ISO
6.2.5.1.3. HITECH
6.2.5.1.4. HIPAA
6.2.6. People Centric Strategy
6.2.7. Policy Design
6.2.8. Program Assessment
6.2.9. Risk Assessment
6.2.10. Risk Management
6.2.10.1. Booz Allen Hamilton
6.2.10.2. Optiv
6.2.10.3. Cloud Risks
6.2.10.4. On Premise Infrastructure
6.2.10.5. Business Risk
6.2.11. Security Program Development
6.2.11.1. Optiv
6.2.11.2. FOX-IT
6.2.12. Strategy
6.2.13. Governance
6.2.13.1. Optiv
6.2.13.2. FOX-IT
6.2.13.3. Sec Consult
6.3. Operations
6.3.1. Application Security
6.3.1.1. Web
6.3.1.1.1. AppSec Consulting
6.3.1.1.2. Denim Group
6.3.1.1.3. Security Innovation
6.3.1.1.4. WhiteHat Security
6.3.1.1.5. Citigal
6.3.1.1.6. IOActive
6.3.1.2. Mobile
6.3.1.2.1. AppSec Consulting
6.3.1.2.2. Denim Group
6.3.1.3. Software Security Lifecycle (SDLC)
6.3.1.3.1. AppSecConsulting
6.3.1.3.2. Security Innovation
6.3.1.4. Custom Code
6.3.1.4.1. AppSec Consulting
6.3.1.4.2. Security Innovation
6.3.2. Application Security Vulnerability Assessement
6.3.3. Configuration Assessment
6.3.4. Device Security
6.3.5. Fraud, Identification and Privacy
6.3.6. Incident Response
6.3.6.1. Blackthorn Technologies
6.3.6.2. Crowdstrike
6.3.6.3. Dell SecureWorks
6.3.6.4. Deloitte
6.3.6.5. EY
6.3.6.6. FOX-IT
6.3.6.7. FireEye
6.3.6.8. High Tech Bridge
6.3.6.9. Ingalls Information Security
6.3.6.10. Intel Security
6.3.6.10.1. Foundstone
6.3.6.11. K2 Intelligence
6.3.6.12. Lares Consulting
6.3.6.13. Maryman
6.3.6.14. NTT Coms Security
6.3.6.15. Nettitude
6.3.6.16. Optiv
6.3.6.17. PWC
6.3.6.18. Presecure
6.3.6.19. Sec Consult
6.3.6.20. Stroz Friedberg
6.3.6.21. TrustMatta
6.3.7. Penetration Testing
6.3.7.1. AppSec Consulting
6.3.7.2. Core Security
6.3.7.3. Element Digital Security
6.3.7.3.1. http://www.edigitalsecurity.com/
6.3.7.4. FOX-IT
6.3.7.5. High Tech Bridge
6.3.7.6. Ingalls Information Security
6.3.7.7. K2 Intelligence
6.3.7.8. Matasano Security
6.3.7.9. NCC Group
6.3.7.10. Penetration Lab
6.3.7.11. Rapid7
6.3.7.12. Secureworks
6.3.7.13. TrustMatta
6.3.7.14. TrustedSec
6.3.7.15. WhiteHat Security
6.3.8. Remote Access
6.3.9. Secure Code Review
6.3.10. Threat Intelligence
6.3.11. Vulnerability Scan
6.4. Providers by Region
6.4.1. Latin America
6.4.2. Mature Asia/Pacific
6.4.3. Middle East and North Africa
6.4.3.1. Saudi Arabia
6.4.3.1.1. GBM
6.4.3.1.2. PGI
6.4.4. North America
6.4.4.1. A-G
6.4.4.1.1. AppsecConsulting
6.4.4.1.2. CSC
6.4.4.1.3. Control Case
6.4.4.1.4. CrowdStrike
6.4.4.1.5. Dell Secureworks
6.4.4.1.6. Deloitte
6.4.4.1.7. Denim Group
6.4.4.1.8. Ernst & Young
6.4.4.1.9. FireEye
6.4.4.1.10. ForSythe Solutions
6.4.4.1.11. Grant Thornton
6.4.4.2. H-L
6.4.4.2.1. HP
6.4.4.2.2. IBM
6.4.4.2.3. IOActive
6.4.4.2.4. Ingalls Information Security
6.4.4.2.5. Intel Security (Foundstone)
6.4.4.2.6. K2 Intelligence
6.4.4.2.7. Leidos
6.4.4.3. M-S
6.4.4.3.1. NTT Com Security
6.4.4.3.2. Neohapsis
6.4.4.3.3. Optiv
6.4.4.3.4. PWC
6.4.4.3.5. Paladion Networks
6.4.4.3.6. Perimeter eSecurity
6.4.4.3.7. Protivity
6.4.4.3.8. SISA
6.4.4.3.9. Solutionary
6.4.4.3.10. Stroz Friedberg
6.4.4.3.11. Sungard
6.4.4.3.12. Sword and Shield
6.4.4.3.13. Symantec
6.4.4.3.14. Syntegrity Networks
6.4.4.3.15. Sysnet Global Solutions
6.4.4.4. T-Z
6.4.4.4.1. Tevora Business Solutions
6.4.4.4.2. Trustwave
6.4.4.4.3. Verizon
6.4.4.4.4. WhiteHat Security
6.4.4.4.5. Zensar Technologies
6.4.5. Greater China
6.4.6. South Africa
6.4.6.1. Cyanre
6.4.6.1.1. http://www.cyanre.co.za/
6.4.7. Eurasia
6.4.7.1. Russia
6.4.8. Emerging Asia/Pacific
6.4.9. Canada
6.4.9.1. Conexsys
6.4.10. Europe
6.4.10.1. Eastern Europe
6.4.10.1.1. Poland
6.4.10.2. Western Europe
6.4.10.2.1. Italy
6.4.10.2.2. United Kingdom
7. Managed Security Services
7.1. Direct Tech Providers Managed Security
7.1.1. Asia Pacific
7.1.1.1. Australia
7.1.1.2. China
7.1.1.2.1. NSFOCUS
7.1.1.3. Singapore
7.1.2. Europe
7.1.2.1. GoGrid
7.1.2.1.1. Compliance Reporting (PCI, HIPAA)
7.1.2.1.2. Host IDS
7.1.2.1.3. Log Management
7.1.2.1.4. SIEM
7.1.2.1.5. Vulnerability Assessment
7.1.3. Global Providers
7.1.4. Middle East and North Africa
7.1.4.1. Saudi Arabia
7.1.4.2. United Arab Emirates
7.1.5. North America
7.1.5.1. United States
7.1.5.1.1. NSFOCUS
7.1.5.1.2. Check Point Software
7.1.5.1.3. Network Box
7.1.5.1.4. GoGrid
7.1.5.1.5. FireEye
7.1.5.1.6. Rapid7
7.2. Indirect Providers
7.2.1. Emerging Asia Pacific
7.2.1.1. India
7.2.1.1.1. CSS Corp PVT
7.2.1.1.2. Happiest Minds
7.2.1.1.3. SunGard Availability Services
7.2.1.1.4. Ecomnets India PVT. LTD
7.2.2. Europe
7.2.2.1. BT Global Services
7.2.2.2. Dell SecureWorks
7.2.2.3. Germany
7.2.2.3.1. Link11 GMBH
7.2.2.3.2. IPsoft
7.2.2.4. HP
7.2.2.5. Happiest Minds
7.2.2.5.1. Advanced Malware Protection
7.2.2.5.2. Application Activity Monitoring
7.2.2.5.3. Compliance Reporting
7.2.2.5.4. Database Activity Monitoring
7.2.2.5.5. File Integrity Monitoring
7.2.2.5.6. Log Management
7.2.2.5.7. Managed DLP
7.2.2.5.8. Network Forensics
7.2.2.5.9. SIEM
7.2.2.5.10. Unified Threat Management
7.2.2.5.11. Vulnerability Assessment
7.2.2.6. Integralis
7.2.2.7. Navisite
7.2.2.7.1. Mobile Device Management
7.2.2.8. Open Systems
7.2.2.9. Open Systems
7.2.2.10. Orange Business Services
7.2.2.11. SecureData
7.2.2.11.1. Firewall
7.2.2.11.2. IDS/IPS
7.2.2.11.3. SIEM
7.2.2.11.4. Data Loss Prevention
7.2.2.11.5. Secure Web Gateway
7.2.2.11.6. Secure Email Gateway
7.2.2.11.7. VPN/Remote Access
7.2.2.12. SunGard Availability Services
7.2.2.12.1. Firewalls
7.2.2.12.2. IAM
7.2.2.12.3. Intrusion Prevention
7.2.2.12.4. SIEM
7.2.2.12.5. Unified Threat Management
7.2.2.12.6. VPN
7.2.2.12.7. Web Application Firewall
7.2.2.13. Symantec
7.2.2.14. T-Systems
7.2.2.15. Tata Communications
7.2.2.16. Telefonica
7.2.2.16.1. DDoS Protection Service
7.2.2.16.2. Email Encryption
7.2.2.16.3. Email Security Gateway
7.2.2.16.4. Firewall Management
7.2.2.16.5. IAM
7.2.2.16.6. Intrusion Detection
7.2.2.16.7. Intrusion Prevention
7.2.2.16.8. Log Management
7.2.2.16.9. SIEM
7.2.2.16.10. Vulnerability Assessment
7.2.2.16.11. Web Security Gateway
7.2.2.16.12. Anti-Fraud
7.2.2.17. Verizon Business
7.2.2.17.1. Anti-DDoS
7.2.2.17.2. Email Security
7.2.2.17.3. Endpoint Protection
7.2.2.17.4. Firewall Management
7.2.2.17.5. Intrusion Detection
7.2.2.17.6. Intrusion Prevention
7.2.2.17.7. SIEM
7.2.2.17.8. Vulnerability Assessment
7.2.2.17.9. Web Security
7.2.2.18. Wipro
7.2.2.18.1. Email Security Gateway
7.2.2.18.2. Endpoint Security
7.2.2.18.3. Firewall Management
7.2.2.18.4. Fraud Management/Anti-Money Laundering
7.2.2.18.5. GRC
7.2.2.18.6. IAM
7.2.2.18.7. Intrusion Detection
7.2.2.18.8. Intrusion Prevention
7.2.2.18.9. SIEM
7.2.2.18.10. User Access Management
7.2.2.18.11. Web Security Gateway
7.2.3. Global Providers
7.2.3.1. AT&T
7.2.3.1.1. DDos Protection
7.2.3.1.2. Email/Data Encryption Services
7.2.3.1.3. Endpoint Anti-Virus
7.2.3.1.4. Endpoint Patch Management
7.2.3.1.5. Endpoint Policy Compliance
7.2.3.1.6. Mobile Device Security
7.2.3.1.7. Secure Email Gateway
7.2.3.1.8. Security Device Management
7.2.3.1.9. Web Application Firewall
7.2.3.1.10. Web Gateway (URL & Malware Filtering)
7.2.3.2. BEW Global
7.2.3.2.1. Data Loss Prevention
7.2.3.2.2. Web Security Gateway
7.2.3.2.3. Email Security Gateway
7.2.3.2.4. SIEM
7.2.3.2.5. Vulnerability Assessment
7.2.3.3. BT
7.2.3.4. Dell Secureworks
7.2.3.4.1. Advanced Malware Protection
7.2.3.4.2. Email Security Gateway
7.2.3.4.3. Firewall Management
7.2.3.4.4. Host IPS
7.2.3.4.5. IDS/IPS
7.2.3.4.6. Log Management
7.2.3.4.7. Log Retention
7.2.3.4.8. SIEM
7.2.3.4.9. Threat Intelligence
7.2.3.4.10. Unified Threat Management
7.2.3.4.11. Vulnerability Assessment
7.2.3.4.12. Web Application Firewall
7.2.3.4.13. Web Application Vulnerability Assessment
7.2.3.5. Dimension Data
7.2.3.6. HP
7.2.3.6.1. Access Managment
7.2.3.6.2. Data Loss Prevention
7.2.3.6.3. Email Security Gateway
7.2.3.6.4. Endpoint Encryption
7.2.3.6.5. Endpoint Protection
7.2.3.6.6. Intrusion Detection
7.2.3.6.7. Intrusion Prevention
7.2.3.6.8. Managed Incident Response
7.2.3.6.9. Remote Access Management
7.2.3.6.10. SIEM
7.2.3.6.11. Vulnerability Assessment
7.2.3.6.12. Web Application Vulnerability Assessment
7.2.3.6.13. Web Security Gateway
7.2.3.7. IBM
7.2.3.7.1. Email Security Gateway
7.2.3.7.2. Endpoint Patch Management
7.2.3.7.3. Endpoint Policy Management
7.2.3.7.4. Endpoint Protection
7.2.3.7.5. Firewall Management
7.2.3.7.6. IAM
7.2.3.7.7. Intrusion Detection
7.2.3.7.8. Intrusion Prevention
7.2.3.7.9. Log Management
7.2.3.7.10. Mobile Device Security
7.2.3.7.11. SIEM
7.2.3.7.12. Unified Threat Management
7.2.3.7.13. Vulnerability Assessment
7.2.3.7.14. Web Security Gateway
7.2.3.7.15. Web Vulnerability Assessment
7.2.3.8. Proficio
7.2.3.8.1. Email Security
7.2.3.8.2. Firewall Management
7.2.3.8.3. Incident Response
7.2.3.8.4. Log Management
7.2.3.8.5. Privileged Account Management
7.2.3.8.6. Regulatory and Polcy Compliance
7.2.3.8.7. SIEM
7.2.3.8.8. SOC Services
7.2.3.8.9. Vulnerability Assessment
7.2.3.8.10. Web Security
7.2.3.9. Tech Mahindra
7.2.3.9.1. Email Security
7.2.3.9.2. Endpoint Protection
7.2.3.9.3. Firewall Management
7.2.3.9.4. Identity and Access Management
7.2.3.9.5. Intrusion Detection
7.2.3.9.6. Intrusion Prevention
7.2.3.9.7. Log Management
7.2.3.9.8. SIEM
7.2.3.9.9. SOC Services
7.2.3.9.10. Vulnerability Assessment
7.2.3.9.11. Web Security
7.2.3.10. Telstra
7.2.3.11. Verizon Business
7.2.3.11.1. Anti-DDoS
7.2.3.11.2. Email Security
7.2.3.11.3. Endpoint Protection
7.2.3.11.4. Firewall Management
7.2.3.11.5. Intrusion Detection
7.2.3.11.6. Intrusion Prevention
7.2.3.11.7. SIEM
7.2.3.11.8. Vulnerability Assessment
7.2.3.11.9. Web Security
7.2.4. Greater China
7.2.4.1. Hong Kong
7.2.4.1.1. Network Box
7.2.4.1.2. Netswitch
7.2.4.2. BEW Global
7.2.4.2.1. Data Loss Prevention
7.2.4.2.2. Web Security Gateway
7.2.4.2.3. Email Security Gateway
7.2.4.2.4. SIEM
7.2.4.2.5. Vulnerability Assessment
7.2.4.3. Beijing
7.2.4.3.1. Netswitch
7.2.4.4. Shanghai
7.2.4.4.1. Shanghai Data Solution Co., Ltd
7.2.5. Latin America
7.2.5.1. Brazil
7.2.5.1.1. Arcon
7.2.5.1.2. Netcentrics
7.2.5.1.3. RealProtect
7.2.5.1.4. UOL Diveo
7.2.6. Mature Asia Pacific
7.2.6.1. Australia
7.2.6.1.1. Tesserent
7.2.6.1.2. Verizon
7.2.6.2. Singapore
7.2.6.2.1. Quann
7.2.6.2.2. NTT Singapore
7.2.6.2.3. Happiest Minds
7.2.6.2.4. Singtel
7.2.6.2.5. NCS Group
7.2.7. Middle East and North Africa
7.2.7.1. Saudi Arabia
7.2.7.2. United Arab Emirates
7.2.7.2.1. Du Telecom
7.2.7.2.2. Tata Communications
7.2.7.2.3. Dell Secureworks
7.2.7.2.4. Dimension Data
7.2.8. North America
7.2.8.1. Canada
7.2.8.1.1. Above Security
7.2.8.1.2. Bell Canada
7.2.8.1.3. EWA
7.2.8.1.4. Happiest Minds
7.2.8.1.5. Netpulse
7.2.8.1.6. OneStone (Formerly Seccuris)
7.2.8.1.7. SecureData
7.2.8.1.8. SentryMetrics
7.2.8.1.9. SunGard Availability Services
7.2.8.1.10. Virtual Guardian
7.2.8.2. United States
7.2.8.2.1. AT&T
7.2.8.2.2. Above Security
7.2.8.2.3. Alert Logic
7.2.8.2.4. Allstream
7.2.8.2.5. CGI
7.2.8.2.6. CSC
7.2.8.2.7. CSS Corp
7.2.8.2.8. CentraComm
7.2.8.2.9. CenturyLink- Savvis
7.2.8.2.10. Clone Systems
7.2.8.2.11. Compucom Systems
7.2.8.2.12. Cosentry
7.2.8.2.13. Dell Secureworks
7.2.8.2.14. Earthlink
7.2.8.2.15. Esentire
7.2.8.2.16. HCL Technologies
7.2.8.2.17. HP
7.2.8.2.18. Happiest Minds
7.2.8.2.19. IBM
7.2.8.2.20. Intelisecure
7.2.8.2.21. Leidos
7.2.8.2.22. LunarLine
7.2.8.2.23. Masergy Communications
7.2.8.2.24. Megapath
7.2.8.2.25. Morphick
7.2.8.2.26. My Digital Shield
7.2.8.2.27. NCA - Network Computing Architects
7.2.8.2.28. Navisite
7.2.8.2.29. Netfortris
7.2.8.2.30. Netswitch
7.2.8.2.31. Nuspire Networks
7.2.8.2.32. Rook Security
7.2.8.2.33. Secure Designs
7.2.8.2.34. SilverSky (Formerly Stillsecure/Perimeter esecurity)
7.2.8.2.35. Solutionary
7.2.8.2.36. SunGard Availability Services
7.2.8.2.37. Sword and Shield
7.2.8.2.38. Symantec
7.2.8.2.39. Symantec
7.2.8.2.40. Syntegrity Networks
7.2.8.2.41. Tesserent
7.2.8.2.42. Trustwave
7.2.8.2.43. Verizon Business
7.2.8.2.44. Wipro
7.2.9. Sub-Sahara Africa
7.2.9.1. AccessKenya
7.2.9.1.1. Firewall
7.2.9.1.2. Endpoint Protection
7.2.9.1.3. Secure Web Gateway
8. Endpoint Security
8.1. Anti-Malware
8.1.1. Eastern Europe
8.1.1.1. Czech Republic
8.1.1.1.1. Avast
8.1.1.1.2. TrustPort
8.1.1.2. Denmark
8.1.1.2.1. BullGuard
8.1.1.3. Netherlands
8.1.1.3.1. AVG
8.1.1.4. Romania
8.1.1.4.1. Bitdefender
8.1.1.5. Slovakia
8.1.1.5.1. ESET
8.1.2. Emerging Asia/Pacific
8.1.2.1. India
8.1.2.1.1. eScan
8.1.2.1.2. K7 Computing
8.1.3. Latin America
8.1.3.1. Spain
8.1.3.1.1. Optenet
8.1.4. Mature Asia/Pacific
8.1.4.1. China
8.1.4.1.1. Qihoo
8.1.4.1.2. Rising International Software
8.1.4.2. South Korean
8.1.4.2.1. AhnLab
8.1.4.2.2. BKAV
8.1.4.2.3. ESTsoft
8.1.5. Middle East and Africa
8.1.5.1. Israel
8.1.5.1.1. Check Point Software
8.1.6. North America
8.1.6.1. Cyren
8.1.6.2. Fortinet
8.1.6.3. Intel Security
8.1.6.4. MalwareBytes
8.1.6.5. McAfee
8.1.6.6. Microsoft
8.1.6.7. PC Pitstop
8.1.6.8. Reason Core Security
8.1.6.9. Roboscan
8.1.6.10. Symantec
8.1.6.11. ThreatTrack
8.1.6.12. Total Defense
8.1.6.13. Trend Micro
8.1.7. Russia
8.1.7.1. Kaspersky
8.1.8. Western Europe
8.1.8.1. Austria
8.1.8.1.1. Ikarus Security
8.1.8.2. Finland
8.1.8.2.1. F-Secure
8.1.8.3. Germany
8.1.8.3.1. Avira
8.1.8.3.2. G-Data
8.1.8.3.3. Kromtech
8.1.8.4. Norway
8.1.8.4.1. Norman
8.1.8.5. United Kingdom
8.1.8.5.1. Sophos
8.1.8.6. Poland
8.1.8.6.1. Arcabit
8.2. Application Isolation
8.2.1. Blue Ridge Networks
8.2.1.1. http://www.blueridge.com/index.php/products/appguard/consumer
8.2.2. Bromium
8.2.3. Bufferzone
8.2.4. Invincea
8.2.4.1. SandBoxie
8.2.5. VMware
8.3. Endpoint Sandboxes and Virtualized Containers
8.3.1. Endpoint Sandboxes
8.3.1.1. Panda
8.3.1.1.1. www.panda.com
8.3.1.2. Sandboxie
8.3.1.2.1. http://www.sandboxie.com/
8.3.1.3. Bitdefender
8.3.1.3.1. www.bitdefender.com
8.3.2. Type-0 Hypervisors
8.3.2.1. Lynxworks
8.3.2.1.1. http://www.lynuxworks.com/
8.3.2.2. Zirtu
8.3.3. Process Isolation/Virtualization
8.3.3.1. Avectco
8.3.3.2. Bromium
8.3.3.3. Invincea
8.4. Endpoint Intrusion Prevention
8.4.1. Arkoon
8.4.1.1. StormShield
8.4.2. BeyondTrust
8.4.3. IBM
8.4.4. Landesk
8.4.5. McAfee
8.4.6. Safensoft
8.4.7. Symantec
8.5. Enterprise Mobility Mangement Suites
8.5.1. Absolute Software
8.5.2. AMware
8.5.2.1. Airwatch
8.5.3. Blackberry
8.5.4. Citrix
8.5.5. Globo
8.5.6. Good Technologies
8.5.7. IBM
8.5.8. Landesk
8.5.9. MobileIron
8.5.10. Mojave
8.5.10.1. https://www.mojave.net/
8.5.11. SAP
8.5.12. Sophos
8.5.13. Soti
8.5.14. Symantec
8.5.15. Tangoe
8.6. Application Control
8.6.1. AppSense
8.6.2. Avecto
8.6.3. Bit9
8.6.4. Landesk
8.6.5. Lumension
8.6.6. McAfee
8.6.7. Sophos
8.6.8. Symantec
8.6.9. Trend Micro
8.7. Exploit Technique Prevention Software
8.7.1. CyActive
8.7.2. CyBellum
8.7.3. Malwarebytes Anti-Exploit
8.7.4. Microsoft
8.7.4.1. Microsoft EMET - FREE
8.7.5. Morphisec
8.7.6. Palo Alto Networks
8.7.6.1. Endpoint
8.7.7. Sophos
8.7.7.1. Intercept X
8.7.8. Trend Micro
8.7.9. ViRobot APT Shield
8.8. File Integrity Monitoring
8.8.1. Open Source
8.8.1.1. 1. AIDE
8.8.1.2. 2. Trend Micro
8.8.1.2.1. 1. OSSEC
8.8.1.3. 3. Samhain
8.8.1.4. 4. Osiris
8.8.1.5. 5. Integrit
8.8.1.6. 6. Tripwire
8.8.2. Commercial
8.8.2.1. Imperva
8.8.2.2. Intel Security
8.8.2.3. Tripwire
8.9. Malware Analysis
8.9.1. Botnets
8.9.1.1. spyeyetracker.abuse.ch
8.9.2. Internet Identity
8.9.3. Malware Patrol
8.9.4. SpamHaus
8.9.5. Team Cymru
8.9.6. ThreatGrid
8.9.7. VirusTotal
8.9.8. zeustracker.abuse.ch
8.9.9. JoeSecurity
8.9.10. Shadowserver
8.10. Mobile Device Management
8.10.1. Absolute Software
8.10.2. Beachhead Security
8.10.3. Blackberry
8.10.4. Citrix
8.10.5. Globo
8.10.6. Good Technologies
8.10.7. IBM
8.10.8. Landesk
8.10.9. MobileIron
8.10.10. Mojave
8.10.10.1. https://www.mojave.net/
8.10.11. SAP
8.10.12. Sophos
8.10.13. Soti
8.10.14. Symantec
8.10.15. Tangoe
8.10.16. VMware
8.10.16.1. Airwatch
8.11. Policy Assessment and System Configuration Management
8.11.1. BMC
8.11.1.1. BMC Server Automation
8.11.2. Check Point Software
8.11.2.1. Endpoint Policy Management
8.11.3. IBM
8.11.3.1. IBM Endpoint Manager
8.11.4. Intel Security
8.11.4.1. Policy Auditor
8.11.5. RedHat
8.11.5.1. OpenSCAP
8.11.6. Saint
8.11.6.1. Saint Security
8.11.7. Tripwire
8.11.7.1. Tripwire Enterprise
9. Data & Collaboration Security
9.1. Data Governance and Classification
9.1.1. Expert Source
9.1.1.1. http://www.expertsource.in/index.php
9.1.2. HP
9.1.3. IBM
9.1.4. Informatica
9.1.5. Nuix
9.1.6. Somansa
9.1.7. Titus
9.1.8. boldonjames
9.2. Data Loss Prevention (DLP)
9.2.1. Endpoint
9.2.1.1. Data Classification and Tracking
9.2.1.1.1. Banyan Solutions
9.2.1.1.2. BoldonJames
9.2.1.1.3. Digital Guardian
9.2.1.1.4. HP
9.2.1.1.5. IBM
9.2.1.1.6. Identity Finder
9.2.1.1.7. Mach1 Development
9.2.1.1.8. Microsoft (Formerly Secure Islands)
9.2.1.1.9. MinerEye
9.2.1.1.10. Nuix
9.2.1.1.11. Smartlogic
9.2.1.1.12. Titus
9.2.1.1.13. Varonis
9.2.1.1.14. CoSoSys
9.2.1.2. Mobile
9.2.1.2.1. Symantec
9.2.1.2.2. Websense
9.2.1.2.3. Microsoft (Secure Islands)
9.2.1.3. Windows
9.2.1.3.1. Absolute Software
9.2.1.3.2. CA Technologies
9.2.1.3.3. Digital Guardian
9.2.1.3.4. GTB Technologies
9.2.1.3.5. Infowatch
9.2.1.3.6. Intel Security
9.2.1.3.7. RSA
9.2.1.3.8. Microsoft (Secure Islands)
9.2.1.3.9. Somansa
9.2.1.3.10. Symantec
9.2.1.3.11. Trustwave
9.2.1.3.12. Watchful Software
9.2.1.3.13. Raytheon-Websense
9.2.1.3.14. Zecurion
9.2.2. Network
9.2.2.1. Digital Guardian
9.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)
9.2.2.3. Symantec
9.2.2.4. InfoWatch
9.2.3. Secure Email Gateway
9.2.3.1. Cisco
9.2.3.2. Symantec
9.2.3.3. Intel Security
9.2.3.4. Somansa
9.2.4. Secure Web Gateway
9.2.4.1. Intel Security
9.2.4.2. Symantec
9.2.4.3. Somansa
9.2.5. Breached Data Detection
9.2.5.1. Consumer
9.2.5.1.1. PwnedList
9.2.5.1.2. haveibeenpwned.com
9.2.5.2. Enterprise
9.2.5.2.1. Infoarmor
9.2.5.2.2. Ionic
9.2.5.2.3. Hold Security
9.3. Database Security
9.3.1. Database Audit and Protection (DAP)
9.3.1.1. Application Security, Inc
9.3.1.2. BeyondTrust
9.3.1.3. Big Data Platform DAP
9.3.1.3.1. BlueTalon
9.3.1.3.2. Cloudera
9.3.1.3.3. Hortonworks
9.3.1.3.4. IBM
9.3.1.3.5. Imperva
9.3.1.4. DataSunrise
9.3.1.5. Fortinet
9.3.1.6. GreenSQL
9.3.1.7. IBM
9.3.1.8. IRI
9.3.1.8.1. Oracle
9.3.1.8.2. SQL Server
9.3.1.9. Imperva
9.3.1.10. Intel Security
9.3.1.11. Mentis Software
9.3.1.12. Oracle Corp
9.3.1.13. PentaSecurity
9.3.1.14. Warevalley
9.3.2. Database Activity Monitoring
9.3.2.1. DB Networks
9.3.2.2. Somansa
9.4. Encryption/Tokenization
9.4.1. Big Data
9.4.1.1. Gazzang
9.4.1.2. Vormetric
9.4.2. Cloud/SAAS Encryption
9.4.2.1. Appliances
9.4.2.1.1. Office365
9.4.2.1.2. Ciphercloud
9.4.2.1.3. Afore Solutions
9.4.2.1.4. Perspecsys
9.4.2.2. Software
9.4.2.2.1. BoxCryptor
9.4.2.2.2. CloudMask
9.4.2.2.3. PrivateCore
9.4.2.2.4. Trend Micro
9.4.2.2.5. Viivo
9.4.2.2.6. Voltage Security
9.4.2.3. Software as a Service
9.4.2.3.1. Trend Micro
9.4.2.3.2. SooKasa
9.4.2.3.3. Gemalto
9.4.3. Cryptographic Providers
9.4.3.1. RSA
9.4.3.2. Quintessence
9.4.3.3. Microsoft
9.4.4. Data masking
9.4.4.1. Oracle
9.4.4.2. Dataguise
9.4.4.3. Informatica
9.4.4.4. IBM
9.4.4.5. Voltage Security
9.4.4.6. Green SQL
9.4.4.7. Mentis
9.4.4.8. Compuware
9.4.4.9. Axis
9.4.4.10. Privacy Analytics
9.4.4.11. Camouflage Software
9.4.4.12. Solix Technologies
9.4.4.13. Net 2000
9.4.5. Database
9.4.5.1. Gemalto
9.4.5.2. Dark Matter Labs
9.4.5.3. Vormetric
9.4.6. Email
9.4.6.1. ZixCorp
9.4.6.2. Encryptics
9.4.6.2.1. https://www.encryptics.com/default.aspx
9.4.7. Encrypted USB Storage
9.4.7.1. Apricorn
9.4.7.2. Datalocker
9.4.7.3. Integral Memory
9.4.7.4. IronKey
9.4.7.5. Kingston
9.4.7.6. Virbatim
9.4.8. File/Folder
9.4.8.1. Covertix
9.4.8.1.1. http://www.covertix.com/
9.4.8.2. IBM
9.4.8.2.1. Mainframe
9.4.8.3. SecureIslands
9.4.8.4. Sophos
9.4.8.4.1. SafeGuard Enterprise (Utimaco)
9.4.8.5. Symantec (PGP)
9.4.8.6. Vormetric
9.4.8.7. WinMagic
9.4.8.7.1. SecureDoc
9.4.9. Quantum Encryption
9.4.9.1. IDQ
9.4.9.2. Quintessence Labs
9.4.9.3. Whitewood Encryption
9.4.10. Tokenization
9.4.10.1. Protegrity
9.4.11. Whole Disk
9.4.11.1. Intel Security
9.4.11.2. Symantec (PGP)
9.4.11.3. CheckPoint Software
9.4.11.4. Encryption Management
9.4.11.4.1. Wave Systems
9.4.11.5. WinMagic
9.4.11.5.1. SecureDoc
9.4.11.6. Microsoft
9.4.11.6.1. Bitlocker
9.4.11.7. Sophos
9.4.11.7.1. SafeGuard Enterprise (Utimaco)
9.4.11.8. Trustwave
9.4.11.8.1. DataControl
9.4.11.9. Vormetric
9.5. File Analysis Software
9.5.1. Acaveo
9.5.2. Active Navigation
9.5.3. AvePoint
9.5.4. Beyond Recognition
9.5.5. Bloomberg
9.5.6. CommVault
9.5.7. Condrey
9.5.8. Covertix
9.5.9. DataGlobal
9.5.10. DataGravity
9.5.11. Equivio
9.5.12. HP
9.5.12.1. Control Point
9.5.13. HiSoftware
9.5.14. IBM
9.5.14.1. StoreIQ
9.5.15. Identifty Finder
9.5.16. Imperva
9.5.17. Index Engines
9.5.18. Kazoup
9.5.19. MailGuard
9.5.20. NTP Software
9.5.21. Novell
9.5.22. Nuix
9.5.23. Proofpoint
9.5.24. Stealthbits
9.5.25. Varonis
9.5.26. WatchDox
9.5.27. Whitebox Security
9.5.28. ZyLab
9.6. Hardware Security Modules (HSM)
9.6.1. Cloud HSM
9.6.1.1. Amazon
9.6.1.2. IBM
9.6.2. Hardware
9.6.2.1. FutureX
9.6.2.2. Gemalto
9.6.2.3. HPE
9.6.2.4. Safenet
9.6.2.5. Thales
9.7. Software Defined Storage Security
9.7.1. Dispersive Networks
9.7.1.1. https://dispersivetechnologies.com/
9.7.2. OceansBlue
9.7.2.1. http://www.oceansblue.net/index.html
9.8. eSignatures
9.8.1. Adobe eSign Services
9.8.2. Alphatrust
9.8.3. Docusign
9.8.4. Hellosign
9.8.5. Rightsignature
9.8.6. Sertifi
10. Identity and Access Management (IAM)
10.1. AD/Unix bridge
10.1.1. Centrify
10.2. Enterprise single sign-on (ESSO)
10.3. Externalized authorization management (EAM)
10.3.1. Axiomatics
10.3.2. Dell Quest (BitKoo)
10.4. IAM as a Service
10.4.1. Centrify
10.4.2. IBM (Formerly Lighthouse Security)
10.4.3. Identity Automation
10.4.4. Intel
10.4.5. Okta
10.4.6. Password Bank
10.4.7. Ping Identity
10.4.8. Sailpoint
10.4.9. Symplifyed
10.4.10. iWelcome
10.5. Identity governance and administration
10.5.1. CA Technologies
10.5.2. IBM Security
10.5.3. Oracle
10.5.4. RSA (Aveksa)
10.6. Privileged account management (PAM)
10.6.1. BeyondTrust
10.6.2. Lieberman Software
10.6.3. Cyber Ark
10.6.4. Dell
10.6.5. Centrify
10.7. Public Certificate Authorities
10.7.1. Comodo
10.7.2. Crosscert
10.7.3. Geotrust
10.7.4. Godaddy
10.7.5. Symantec (Formerly VeriSign)
10.8. User Authentication
10.8.1. Tokens
10.8.1.1. OOB authentication
10.8.1.1.1. SMS
10.8.1.1.2. Voice
10.8.1.1.3. Push
10.8.1.1.4. Email
10.8.1.1.5. Social media
10.8.1.2. OTP tokens
10.8.1.2.1. OTP hardware tokens
10.8.1.2.2. OTP software tokens for smart phones
10.8.1.3. X.509 tokens
10.8.1.4. Other tokens
10.8.1.4.1. ANECT AS - ALUCID
10.8.2. Contextual authentication
10.8.2.1. Google
10.8.2.1.1. Trust API
10.8.3. KBA
10.8.3.1. It's Me Security
10.8.3.1.1. http://www.itsmesecurity.com/
10.8.4. Biometrics
10.8.4.1. Behavioral
10.8.4.1.1. Typing rhythm/keystroke dynamics
10.8.4.1.2. Voice recognition
10.8.4.2. Biological
10.8.4.2.1. Face recognition
10.8.4.2.2. Fingerprint
10.8.5. Wide-focus vendors
10.8.5.1. Alladin-RD
10.8.5.2. CA Technologies
10.8.5.3. Entrust
10.8.5.4. HID Global
10.8.5.5. RSA
10.8.5.5.1. Adaptive Auth
10.8.5.6. Gemalto
10.8.5.7. Symantec
10.8.5.8. Technology Nexus
10.8.5.9. VASCO
10.9. User Privilege Management
10.9.1. Appsense
10.9.1.1. http://www.appsense.com/
10.9.2. Ariella
10.9.2.1. http://www.arellia.com/
10.9.3. Avectco
10.9.3.1. http://www.avecto.com/
10.9.4. BeyondTrust
10.9.4.1. http://www.beyondtrust.com/
10.9.5. Centrify
10.9.5.1. http://www.centrify.com/
10.9.6. CionSystems
10.9.7. CrossIdeas
10.9.7.1. http://www.crossideas.com/
10.9.8. Dell
10.9.8.1. http://www.quest.com/desktop-authority-management-suite/
10.9.9. Lieberman Software
10.9.9.1. http://www.liebsoft.com/
10.9.10. Viewfinity
10.9.10.1. http://www.viewfinity.com/
10.10. Identity Blockchain
10.10.1. 2Way.IO
10.10.2. Blockstack
10.10.2.1. Open Source
10.10.3. ID.me
10.10.4. KYC-Chain
10.10.5. Uport
10.10.6. airbitz
10.10.7. hypr
10.10.8. tradle.io
10.10.9. trunomi
10.10.10. uniquid
11. Application Security
11.1. Web Application Firewalls (WAF) & Application Security
11.1.1. Web Application Firewalls
11.1.1.1. Virtualized Appliances
11.1.1.1.1. A10 Networks
11.1.1.1.2. AlertLogic
11.1.1.1.3. Amazon AWS
11.1.1.1.4. Barracuda Networks
11.1.1.1.5. BeeWare
11.1.1.1.6. DenyAll
11.1.1.1.7. Ergon Informatik AG
11.1.1.1.8. F5
11.1.1.1.9. Fortinet
11.1.1.1.10. Forum Systems
11.1.1.1.11. Imperva
11.1.1.1.12. PentaSecurity
11.1.1.1.13. Trustwave
11.1.1.1.14. Citrix
11.1.1.2. Physical Appliances
11.1.1.2.1. A10 Networks
11.1.1.2.2. AdNovum
11.1.1.2.3. AlertLogic
11.1.1.2.4. Anchiva
11.1.1.2.5. Barracuda Networks
11.1.1.2.6. BeeWare
11.1.1.2.7. BugSec
11.1.1.2.8. Citrix
11.1.1.2.9. DBAPPSecurity
11.1.1.2.10. DPtech
11.1.1.2.11. Dell Sonicwall
11.1.1.2.12. DenyAll
11.1.1.2.13. Ergon Informatik
11.1.1.2.14. F5
11.1.1.2.15. Fortinet
11.1.1.2.16. Forum Systems
11.1.1.2.17. HP
11.1.1.2.18. Imperva
11.1.1.2.19. NSFocus
11.1.1.2.20. PentaSecurity
11.1.1.2.21. Positive Technologies
11.1.1.2.22. RadWare
11.1.1.2.23. Trustwave
11.1.1.2.24. WINS TECHNET LTD
11.1.1.3. Software
11.1.1.3.1. Dedicated Software
11.1.1.3.2. Open Source
11.1.1.3.3. Web Server Modules
11.1.1.4. Managed Services
11.1.1.4.1. Dell Secureworks
11.1.1.4.2. AT&T
11.1.1.4.3. Verizon Business
11.1.1.5. Software as a Service
11.1.1.5.1. Akamai
11.1.1.5.2. AlertLogic
11.1.1.5.3. Anquanbao
11.1.1.5.4. ArmorLogic
11.1.1.5.5. BinarySec
11.1.1.5.6. CloudFlare
11.1.1.5.7. DenyAll
11.1.1.5.8. FireBlade
11.1.1.5.9. Imperva (Incapsula)
11.1.1.5.10. Incapsula
11.1.1.5.11. PowerCDN
11.1.1.5.12. Qualys
11.1.1.5.13. Securi
11.1.1.5.14. Signal Sciences
11.1.1.5.15. Soha
11.1.1.5.16. ZenEdge
11.1.2. Web Threat Disruption Technology
11.1.2.1. Software
11.1.2.1.1. NuCaptcha
11.1.2.1.2. NuData
11.1.2.2. Appliances
11.1.2.2.1. Juniper
11.1.2.2.2. Shape Security
11.1.2.3. Open Source
11.1.2.3.1. Google Hack Honeypot
11.2. Web Application Security
11.2.1. Code Review Products
11.2.1.1. HP
11.2.1.2. IBM
11.2.2. Web Application Vulnerability Scanning Services
11.2.2.1. Cenzic
11.2.2.2. Controlscan
11.2.2.3. High-Tech Bridge
11.2.2.4. McAfee Secure
11.2.2.5. Qualys
11.2.2.6. Securi
11.2.2.7. Sitelock
11.2.2.8. Trustwave
11.2.2.9. WebSecurify
11.2.2.10. WhiteHat Security
11.2.3. Scanning Software
11.2.3.1. Open Source
11.2.3.1.1. Arachni Scanner
11.2.3.1.2. Subgraph
11.2.3.1.3. W3af
11.2.3.1.4. Wapiti
11.2.3.1.5. Watcher
11.2.3.2. Commercial
11.2.3.2.1. Accunetix
11.2.3.2.2. BeyondTrust
11.2.3.2.3. Cenzic
11.2.3.2.4. HP
11.2.3.2.5. MavitunaSecurity
11.2.3.2.6. NTObjectives
11.2.3.2.7. Nstalker
11.2.3.2.8. Portswigger
11.2.3.2.9. Syhunt
12. Risk, Compliance and Security Management
12.1. Firewall Workflow,Modeling & Change Management
12.1.1. Checkpoint Software
12.1.2. Firemon
12.1.3. ManageEngine
12.1.4. Redseal Networks
12.1.5. Skybox
12.1.6. Tufin
12.1.7. Veriflow
12.2. Legal and regulatory information governance
12.3. Privacy
12.4. Regulations, Awareness and Training
12.4.1. Computer Based Training
12.4.1.1. Aujas
12.4.1.2. BeOne Development
12.4.1.3. Digital Defense
12.4.1.4. Fishnet Security
12.4.1.5. Inspired eLearning
12.4.1.6. Junglemap
12.4.1.7. KnowBe4
12.4.1.8. MediaPro
12.4.1.9. PhishMe
12.4.1.10. Phishline
12.4.1.11. Popcorn Training
12.4.1.12. Sans Institute
12.4.1.13. Scipp International
12.4.1.14. Secure Mentem
12.4.1.15. Security Innovation
12.4.1.16. Security Mentor
12.4.1.17. The Security Awareness Company
12.4.1.18. ThreatSim
12.4.1.19. Wombat Security Technologies
12.4.2. Educational, Awareness & News Outlets
12.4.2.1. Government Led
12.4.2.1.1. Information Sharing and Analysis Centers (ISACs)
12.4.2.2. Periodicals & Target Roles
12.4.2.2.1. Channel
12.4.2.2.2. CISO/CSO
12.4.2.2.3. Security Engineers/Analysts
12.4.3. Industry Standards/Groups
12.4.3.1. Standards
12.4.3.1.1. Technical
12.4.3.2. Industry Groups
12.4.3.2.1. Audit
12.4.3.2.2. General Security
12.4.3.2.3. Forensics
12.4.4. Regulations, Public Standards and Contractual Mandates
12.4.4.1. Global
12.4.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)
12.4.4.1.2. NIST
12.4.4.2. Country/Region Specific
12.4.4.2.1. China
12.4.4.2.2. Singapore
12.4.4.2.3. European Union
12.4.4.2.4. United States
12.5. Security Policy and Response Orchaestration Platforms
12.5.1. FireEye
12.5.2. Phantom
12.5.2.1. https://www.phantom.us/
12.5.3. Proofpoint
12.6. Security Program and Governance
12.6.1. Governance, Risk and Compliance
12.6.1.1. eGRC
12.6.1.1.1. Software as a Service
12.6.1.1.2. Software
12.6.1.2. Compliance Oriented Private Cloud Hosting (COPCH)
12.6.1.2.1. Note: This list is not an attestation of compliance
12.6.1.3. Operational Risk Analytics
12.6.1.3.1. Algosec
12.6.1.3.2. Cyber Observer
12.6.1.3.3. Cytegic
12.6.1.3.4. Firemon
12.6.1.3.5. IBM
12.6.1.3.6. Redseal Networks
12.6.1.3.7. Kenna Security
12.6.1.3.8. Skybox
12.6.1.3.9. Software Development Lifecycle
12.6.1.3.10. Solarwinds
12.6.1.3.11. Tufin
12.6.1.4. Cloud & Container Compliance Assessment
12.6.1.4.1. Cavirin
13. Random Knowledge
13.1. Detection Methods
13.1.1. File Analysis
13.1.1.1. Computed Hash
13.1.1.1.1. Uniqueness
13.1.1.2. Metadata Attributes
13.1.1.2.1. File Content Inspection
13.1.1.2.2. File Headers
13.1.1.2.3. Temporal Analysis
13.1.1.2.4. Temporal Analysis with Prevalence
13.1.1.2.5. Time/Date
13.1.1.2.6. Certificate and Signature Evaluation (PKI)
13.1.1.3. Packing Method
13.1.1.3.1. Multi-packing Analysis
13.1.2. Network Specific
13.1.2.1. Protocol/File/Session Decode & Analysis
13.1.2.1.1. File Extraction
13.1.2.1.2. Playback (Surveillance)
13.1.2.1.3. File/Session Viewing
13.1.2.1.4. Correlation
13.1.2.1.5. Machine Learning (AI)
13.1.2.2. Network Flow Analysis
13.1.2.2.1. Machine Learning (AI)
13.1.2.3. Application Layer Analysis
13.1.2.3.1. Classification, Correlation , Deviance from Baselines (Heuristics)
13.1.2.3.2. Deep Packet Inspection (DPI)
13.1.2.3.3. Application Command and Input Analysis
13.1.2.4. IP Layer Analysis
13.1.2.4.1. TCP/UDP Ports
13.1.2.4.2. IP Address
13.1.3. Malware Behavioral Evaluations
13.1.3.1. Persistence
13.1.3.1.1. Installs as System Service
13.1.3.1.2. Installs Registry Keys in Startup locations
13.1.3.1.3. Modifies filesystem in specific locations
13.1.3.2. Suspicious Behaviors Evaluated
13.1.3.2.1. Attempts to login to systems that a specific user credential is not normally used on
13.1.3.2.2. Becomes another user on the system
13.1.3.2.3. CPU of Processes Spawned is high
13.1.3.2.4. Connects with a known bad URL or IP Address
13.1.3.2.5. Escalates privileges
13.1.3.2.6. Examines the Documents Folder or User Document Folders
13.1.3.2.7. File Isn't widely prevalent in user population
13.1.3.2.8. Injects data into memory of another running process
13.1.3.2.9. Modifies memory of another process
13.1.3.2.10. Opens TCP/IP Connections to other hosts
13.1.3.2.11. Performs a network port sweep
13.1.3.2.12. Process executes net use DOS command inside command.exe
13.1.3.2.13. Process spawns command.exe
13.1.3.2.14. Removes logs/events of application logs or operating system
13.1.3.2.15. Self Delete of files
13.1.3.2.16. Self-copy of files
13.1.3.2.17. Starts to repeatedly call the crypt function (ransom sign)
13.1.3.2.18. Time of execution is not normal in context of historical analysis
13.1.4. User
13.1.4.1. Activity on system when user's employment is in termination status
13.1.4.2. Deviates from past user behavior
13.1.4.3. Device not historically associated to user
13.1.4.4. Login time anamoly
13.1.4.5. Login time outside user's home timezone
13.1.4.6. Privileged data accessed
13.1.4.6.1. Volumetric analysis
13.1.4.6.2. Deviation from baseline
13.1.4.6.3. Cut-paste function used
13.1.4.7. Remote access and time of day abnormal from baselines
13.1.4.8. User authentication failure
13.1.4.9. User's browser or viewer is not the same as the baseline
13.1.4.10. User is logging into system remotely and locally simultaneously
13.1.4.11. User is logging into system remotely (not expected)
13.1.4.12. User is logging into system remotely at an abnormal time
13.1.4.13. User is abnormally leveraging applications that are administrative in nature (Control Panel, Command.exe, Group Policy Editor, etc)