
1. Cloud Security
1.1. Cloud/Virtualized Firewalls
1.1.1. Agent-Based
1.1.1.1. CloudPassage
1.1.1.2. Drawbridge Networks
1.1.1.3. Illumio
1.1.2. Cisco
1.1.3. Citrix Xen
1.1.3.1. Hillstone Networks
1.1.3.2. Huawei
1.1.3.3. Fortinet
1.1.3.4. Palo Alto Networks
1.1.4. Container-Based
1.1.4.1. ShieldX
1.1.5. Hyper-V
1.1.5.1. Fortinet
1.1.6. KVM
1.1.6.1. Hillstone Networks
1.1.6.2. Juniper Networks
1.1.6.3. Palo Alto Networks
1.1.7. Openstack
1.1.7.1. OpenFlow
1.1.7.1.1. Fortinet
1.1.7.2. Juniper Networks
1.1.8. Public Cloud
1.1.8.1. Virtual Appliances
1.1.8.1.1. Barracuda
1.1.8.1.2. Brocade
1.1.8.1.3. Catbird Networks
1.1.8.1.4. Check Point Software
1.1.8.1.5. Juniper Networks
1.1.8.1.6. Palo Alto Networks
1.1.8.1.7. PfSense
1.1.8.1.8. Sophos
1.1.8.1.9. vArmour
1.1.8.2. API-Driven
1.1.8.2.1. Dome9
1.1.8.2.2. Illumio
1.1.8.3. AWS
1.1.8.3.1. Check Point Software
1.1.8.3.2. Fortinet
1.1.8.3.3. Palo Alto Networks
1.1.8.4. Microsoft Azure
1.1.8.4.1. Check Point Software
1.1.8.4.2. Fortinet
1.1.8.5. Container-Based
1.1.9. VMware Environments
1.1.9.1. API Integration
1.1.9.1.1. Check Point Software
1.1.9.1.2. Fortinet
1.1.9.1.3. Palo Alto Networks
1.1.9.2. NSX
1.1.9.2.1. Fortinet
1.1.9.2.2. Check Point Software
1.1.9.3. VM Appliance
1.1.9.3.1. Barracuda
1.1.9.3.2. Brocade
1.1.9.3.3. Catbird Networks
1.1.9.3.4. Check Point Software
1.1.9.3.5. Fortinet
1.1.9.3.6. Hillstone Networks
1.1.9.3.7. Juniper Networks
1.1.9.3.8. Palo Alto Networks
1.1.9.3.9. PfSense
1.1.9.3.10. Sophos
1.1.9.3.11. vArmour
1.1.9.3.12. Huawei
2. Infrastructure Protection
2.1. Active Directory Defense
2.1.1. Aorato
2.1.1.1. http://www.aorato.com/
2.2. Cloud-Based Remote Access VPN
2.2.1. Check Point
2.2.1.1. Capsule Cloud
2.2.2. Pertino
2.2.3. Soha
2.3. DNS-based Threat Prevention/Detection
2.3.1. Standalone Appliances
2.3.1.1. Bluecat Networks
2.3.1.2. Efficient IP
2.3.1.3. Infoblox
2.3.2. Recursive DNS Services
2.3.2.1. Bluecat Networks
2.3.2.2. Cisco
2.3.2.2.1. OpenDNS
2.3.2.3. Comodo
2.3.2.4. CrowdStrike
2.3.2.5. Infoblox
2.3.2.6. Neustar
2.3.2.7. Nominum
2.3.2.8. Symantec
2.3.2.9. ThreatStop
2.3.2.10. Verisign
2.3.3. Firewalls
2.3.3.1. Palo Alto Networks
2.4. Denial of Service Protection
2.4.1. Appliances
2.4.1.1. Arbor Networks
2.4.1.1.1. Prevail APS
2.4.1.2. Check Point Software
2.4.1.2.1. DDos Protector
2.4.1.3. Corero
2.4.1.4. Fortinet
2.4.1.5. Genie Networks
2.4.1.5.1. ATM Appliances
2.4.1.6. NSFOCUS
2.4.1.7. Radware
2.4.1.8. WINS TECHNET LTD
2.4.1.8.1. http://www.wins21.co.kr/
2.4.2. Security as a Service
2.4.2.1. HTTP/HTTPS Only
2.4.2.1.1. DOSArrest
2.4.2.1.2. Cloudflare
2.4.2.2. MultiProtocol/Network
2.4.2.2.1. Akamai
2.4.2.2.2. Black Lotus
2.4.2.2.3. Cloud Flare
2.4.2.2.4. F5
2.4.2.2.5. Incapsula
2.4.2.2.6. Link11
2.4.2.2.7. Neustar
2.4.2.2.8. NexusGuard
2.4.2.2.9. Verisign Inc
2.4.3. Clean Pipe Services
2.4.3.1. AT&T
2.4.3.2. Verizon
2.5. Fraud Prevention/Web Malware Monitoring
2.5.1. Fraud/Bot/Webscrape Prevention
2.5.1.1. Software
2.5.1.1.1. RSA (EMC)
2.5.1.1.2. IBM (Formerly Trusteer)
2.5.1.1.3. Intellinx
2.5.1.2. Appliances
2.5.1.2.1. RSA
2.5.1.2.2. Distil Networks
2.5.1.2.3. White Ops
2.5.1.3. Software as a Service
2.5.1.3.1. Akamai
2.5.1.3.2. BioCatch
2.5.1.3.3. Distil Networks
2.5.1.3.4. Guardian Analytics
2.5.1.3.5. Kount
2.5.1.3.6. MarkMonitor
2.5.1.3.7. ShieldSquare
2.5.1.3.8. ThreatMetrix
2.5.1.3.9. White Ops
2.5.1.3.10. X-Cart
2.5.1.3.11. iovation
2.5.1.4. Virtual Appliances
2.5.1.4.1. Distil Networks
2.5.2. Website & Ad Malware Monitoring
2.5.2.1. Ad-Juster
2.5.2.2. Globalsign
2.5.2.2.1. Leverages Hackalert
2.5.2.3. Hackalert
2.5.2.4. Intel Security
2.5.2.4.1. Siteadvisor
2.5.2.5. QualysGuard
2.5.2.6. RiskIQ
2.5.2.7. Sucuri
2.6. Network Access Control (NAC)
2.6.1. Host Based
2.6.1.1. Extreme Networks
2.6.1.2. Genians
2.6.1.3. Intel Security
2.6.1.4. Symantec
2.6.1.5. Trustwave
2.6.2. Network Based
2.6.2.1. Aruba Networks
2.6.2.2. Bradford Networks
2.6.2.3. Cisco
2.6.2.4. Forescout
2.6.2.5. Juniper Networks
2.6.2.6. Milton Security Group
2.6.2.7. Portnox
2.7. Network Anonymization & Consumer VPN Services
2.7.1. AnchorFree Hotspot Shield
2.7.2. Anonymize.net
2.7.3. CyberGhost
2.7.4. Dispel
2.7.5. GoldenFrog
2.7.6. HMA ProVPN
2.7.6.1. TorVPN
2.7.7. Okayfreedom
2.7.8. OpenVPN Shield Exchange
2.7.9. Private Wifi
2.7.10. Tor
2.7.11. luminati.io
2.8. Network Firewalls
2.8.1. Carrier Firewalls
2.8.2. Enterprise Firewalls
2.8.2.1. Multifunction Enterprise Firewalls
2.8.2.1.1. Bluedon
2.8.2.1.2. Check Point Software
2.8.2.1.3. Cisco
2.8.2.1.4. Fortinet
2.8.2.1.5. Huawei
2.8.2.1.6. Palo Alto Networks
2.8.2.1.7. Sonicwall
2.8.2.1.8. Websense (Formerly Intel Security)
2.8.2.2. Stateful Inspection - Traditional Firewalls
2.8.2.2.1. Cisco
2.8.2.2.2. Huawei
2.8.2.2.3. Check Point Software
2.8.3. Multi-Funtion SMB Firewalls
2.8.3.1. 443 Networks
2.8.3.2. Bluedon
2.8.3.3. Check Point Software
2.8.3.4. CheckPoint
2.8.3.5. Cisco
2.8.3.6. Clavister
2.8.3.7. Endian
2.8.3.8. Fortinet
2.8.3.9. Hillstone Networks
2.8.3.10. Meraki
2.8.3.11. PineApp
2.8.3.11.1. http://www.pineapp.com/
2.8.3.12. Sangfor
2.8.3.13. Sonicwall
2.8.3.14. Sophos
2.8.3.15. Trustwave
2.8.3.16. Untangle
2.8.3.17. WINS TechNet LTD
2.8.3.17.1. http://www.wins21.co.kr/
2.8.3.18. WatchGuard
2.8.4. Open Source & Community
2.8.4.1. IPTables
2.8.4.2. IPchains
2.8.4.3. PFSense
2.8.4.4. Untangle
2.8.5. Router Firewalls
2.9. Network Intrusion Detection/Prevention
2.9.1. Predictive Modeling
2.9.1.1. Cyactive
2.9.1.2. Trustpipe
2.9.2. Signature Based
2.9.2.1. AlienVault
2.9.2.1.1. Snort
2.9.2.2. Bricata
2.9.2.3. CheckPoint
2.9.2.4. Cisco
2.9.2.4.1. Sourcefire
2.9.2.5. Enterasys
2.9.2.6. Fortinet
2.9.2.7. HP
2.9.2.7.1. TippingPoint
2.9.2.8. IBM
2.9.2.9. Intel Security
2.9.2.10. Open Source
2.9.2.10.1. Snort
2.9.2.11. Symantec
2.9.2.11.1. APT Network
2.9.2.12. WINS TECHNET LTD
2.9.2.12.1. http://www.wins21.co.kr/
2.9.3. SCADA
2.9.3.1. Radiflow
2.10. Network Packet Brokers
2.10.1. Adara
2.10.2. Apcon
2.10.3. Arista Networks
2.10.4. Cubro
2.10.5. Gigamon
2.10.6. IXIA
2.10.7. Interface Masters Technologies
2.10.8. JDSU
2.10.9. NetOptics
2.10.10. NetScout
2.10.11. VSS Monitoring
2.11. Network Traffic Analysis and Network Forensics
2.11.1. Flow Analysis/Metadata Extraction
2.11.1.1. Arbor Networks
2.11.1.2. Flowmon Networks
2.11.1.3. IBM
2.11.1.4. Intel Security NBA
2.11.1.5. Lancope
2.11.1.6. LogRythm
2.11.2. Forensic Capture with User Surveillance & Security Threat Analytics
2.11.2.1. Access Data
2.11.2.2. BlueCoat
2.11.2.3. Cisco
2.11.2.3.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html
2.11.2.4. EMC
2.11.2.5. FireEye
2.11.2.6. Fluke Networks
2.11.2.7. IBM
2.11.2.8. IP Fabrics
2.11.2.9. JDSU (Network Instruments)
2.11.2.10. LightCyber
2.11.2.11. NetAgent
2.11.2.12. NetResec
2.11.2.13. NetScout
2.11.2.14. Niksun
2.11.2.15. Novetta Solutions
2.11.2.16. Nuix
2.11.2.17. Packetsled
2.11.2.18. Riverbed
2.11.2.19. SS8
2.11.2.19.1. http://www.ss8.com/
2.11.2.20. nPulse Technologies
2.11.3. Network Forensics Tools
2.11.3.1. Alert Logic
2.11.3.1.1. Formerly Click Security
2.11.3.2. Corvil
2.11.3.3. Cybersift
2.11.3.3.1. http://www.cybersift.net/sifter10app.html
2.11.3.4. Decision Group INC
2.11.3.4.1. http://www.edecision4u.com/index.html
2.11.3.5. EMC
2.11.3.6. FireEye
2.11.3.7. IP Fabrics
2.11.3.8. IPCopper
2.11.3.9. Flowmon Networks
2.11.3.9.1. http://www.invealawfulinterception.com/
2.11.3.10. KLOS
2.11.3.10.1. http://www.klos.com/applications/lawful-intercept/
2.11.3.11. NEXT Computing
2.11.3.11.1. http://www.nextcomputing.com/products/packet-capture-systems
2.11.3.12. NetReSec
2.11.3.13. Niksun
2.11.3.14. Radisys
2.11.3.14.1. http://www.radisys.com/products/network-appliance/
2.11.3.15. Utimaco
2.11.3.15.1. https://lims.utimaco.com/utimaco-lims/
2.11.3.16. Vivavi Solutions
2.11.3.17. WildPackets
2.11.4. Network Forensics Tools as a Service (NFTaaS)
2.11.4.1. CloudShark
2.11.5. Network Taps
2.11.5.1. Optical
2.11.5.1.1. Apcon
2.11.5.1.2. DataCom Systems
2.11.5.1.3. FibreDyne
2.11.5.1.4. Gigamon
2.11.5.1.5. Glimmerglass
2.11.5.1.6. M2Optics
2.11.5.1.7. Netoptics
2.11.5.1.8. Network Instruments
2.11.5.1.9. VSS Monitoring
2.11.5.1.10. nTAP
2.11.6. Network Traffic Analysis (NTA)
2.11.6.1. Amgine Securus
2.11.6.2. Arbor Networks
2.11.6.3. Boeing
2.11.6.4. Cisco
2.11.6.4.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html
2.11.6.5. Core Security (Formerly Damballa)
2.11.6.6. Corvil
2.11.6.7. Cyber adAPT
2.11.6.8. Darktrace
2.11.6.9. Eastwind Networks
2.11.6.10. ExtraHop Networks
2.11.6.11. Fidelis Cybersecurity
2.11.6.12. Lancope
2.11.6.13. LightCyber
2.11.6.14. Novetta Solutions
2.11.6.15. PacketSled
2.11.6.16. Phirelight
2.11.6.17. Qihoo 360
2.11.6.17.1. SkyEye
2.11.6.18. RedJack
2.11.6.19. SlashNext
2.11.6.20. Splunk
2.11.6.21. Taasera
2.11.6.22. ThreatTrack
2.11.6.23. Trustport
2.11.6.23.1. Threat Intelligence
2.11.6.24. Vectra Networks
2.11.6.25. WireX
2.11.7. Raw Network Packet Capture
2.11.7.1. Apcon
2.11.7.1.1. Riverbed
2.11.7.1.2. Netfort
2.11.7.1.3. Wireshark
2.11.7.1.4. NTOP
2.11.7.2. Arbor Networks
2.11.7.3. Comworth
2.11.7.4. NTOP.org
2.11.7.5. Netfort
2.11.7.6. WireShark
2.12. Network-Based Advanced Threat Protection
2.12.1. Firewalls with Malware Sandbox Capabilities
2.12.1.1. Barracuda
2.12.1.2. Check Point Software
2.12.1.3. Cisco
2.12.1.4. Fortinet
2.12.1.5. Huawei
2.12.1.6. Juniper Networks
2.12.1.7. Palo Alto Networks
2.12.1.8. Sonicwall
2.12.1.9. Sophos
2.12.1.10. Watchguard
2.12.2. Appliance Based Malware Sandboxes
2.12.2.1. AMGINE SECURUS
2.12.2.1.1. http://www.amgine.co.kr/index.html
2.12.2.2. AhnLab
2.12.2.3. Bluecoat
2.12.2.4. Check Point Software
2.12.2.4.1. Emulator Blade
2.12.2.5. Cisco
2.12.2.5.1. ThreatGrid
2.12.2.6. ContentKeeper
2.12.2.7. Cyphort
2.12.2.8. Damballa
2.12.2.9. FireEye
2.12.2.10. Fortinet
2.12.2.10.1. FortiSandbox
2.12.2.11. General Dynamics
2.12.2.11.1. Fidelis Security Systems
2.12.2.12. Huawei
2.12.2.12.1. Firehunter
2.12.2.13. Intel Security
2.12.2.13.1. McAfee Advanced Threat Detection Appliance
2.12.2.14. LastLine
2.12.2.15. Palo Alto Networks
2.12.2.15.1. WildFire
2.12.2.16. Payload Security
2.12.2.17. Qihoo
2.12.2.17.1. SkyEye
2.12.2.18. Techguard Security
2.12.2.19. ThreatTrack
2.12.2.20. Trend Micro
2.12.2.20.1. Deep Discovery
2.12.2.21. VMRay
2.12.2.22. VeeDog
2.12.2.22.1. http://veedog.com/
2.12.2.23. WINS TECHNET LTD
2.12.2.23.1. http://www.wins21.co.kr/
2.12.3. Cloud-Based Malware Sandboxes
2.12.3.1. Cisco
2.12.3.1.1. ThreatGrid
2.12.3.2. Fortinet
2.12.3.3. Huawei
2.12.3.4. Joe Security
2.12.3.5. Lastline
2.12.3.6. Netwitness
2.12.3.6.1. Spectrum
2.12.3.7. Palo Alto Networks
2.12.3.7.1. WildFire
2.12.3.8. Qihoo
2.12.3.8.1. SkyEye
2.12.3.9. Sonicwall
2.13. SCADA/ICS
2.13.1. Monitoring
2.13.1.1. CRITIFENSE
2.13.1.2. Cyberbit
2.13.1.3. PFP Cybersecurity
2.13.2. SCADA Firewalls
2.13.2.1. BAE Systems
2.13.2.1.1. http://www.baesystems.com/en-us/product/scada-firewall
2.13.2.2. Bayshore Networks
2.13.2.2.1. https://www.bayshorenetworks.com/products/it-ot-gateway/
2.13.2.3. Check Point Software
2.13.2.3.1. https://www.checkpoint.com/products-solutions/critical-infrastructure/
2.13.2.4. Endian
2.13.2.4.1. http://www.endian.com/products/4i/
2.13.2.5. Fortinet
2.13.2.5.1. https://www.fortinet.com/solutions/industries/scada-industrial-control-systems.html
2.13.2.6. Tofino Security
2.13.2.6.1. https://www.tofinosecurity.com/products/Tofino-Firewall-LSM
2.14. SSL Inspection Appliances
2.14.1. A10 Networks
2.14.2. Bluecoat
2.14.3. ResolutionOne
2.14.4. VSS Monitoring
2.14.5. SourceFire
2.15. Software Defined Micro-Perimeter
2.15.1. BlackRidge Networks
2.15.2. Certes Networks
2.15.3. Cryptzone
2.15.4. Tempered Networks
2.15.5. Unisys Stealth
2.15.6. Vidder
2.15.7. Waverly Labs
2.16. Virtual Private Networking (VPN/SSL VPN)
2.16.1. IPSec VPN Concentrators
2.16.1.1. Certes Networks
2.16.1.2. CheckPoint Software
2.16.1.3. Cisco
2.16.1.4. Mako Networks
2.16.2. Layer 2 Encryption
2.16.2.1. Certes Networks
2.16.3. Layer 4 Encryption
2.16.3.1. Certes Networks
2.16.4. SSL VPN
2.16.4.1. AhnLab
2.16.4.2. Array Networks
2.16.4.3. Barracuda Networks
2.16.4.4. Check Point Software
2.16.4.5. Cisco
2.16.4.6. Citrix
2.16.4.7. F5 Networks
2.16.4.8. Fortinet
2.16.4.9. Hillstone Networks
2.16.4.10. Juniper
2.16.4.11. NetGear
2.16.4.12. Sonicwall
2.16.4.13. Stonesoft
2.16.4.14. WatchGuard
2.16.5. Multi-Path Dynamic VPN
2.16.5.1. Secret Double Octopus
2.16.5.2. Dispersive Networks
2.17. Web/Email Protection
2.17.1. Secure Email Gateways
2.17.1.1. Alt-N Technologies
2.17.1.2. Bluecoat
2.17.1.3. Fortinet
2.17.1.4. GWAVA
2.17.1.5. Intel Security
2.17.1.6. Proofpoint
2.17.1.7. Re-Sec
2.17.1.8. Sonicwall
2.17.1.9. Symantec
2.17.1.10. Trustwave
2.17.1.11. Voitiro
2.17.1.12. Websense
2.17.1.13. iBoss
2.17.2. Secure Web Gateways
2.17.2.1. Anchiva
2.17.2.2. Bluecoat
2.17.2.3. ContentKeeper
2.17.2.4. GWAVA
2.17.2.5. Intel Security
2.17.2.6. Re-Sec
2.17.2.7. Symantec
2.17.2.8. Trustwave
2.17.2.9. Websense
2.17.2.10. iBoss
2.17.3. Security as a Service
2.17.3.1. Web & Email SaaS
2.17.3.1.1. Appriver
2.17.3.1.2. Barracuda
2.17.3.1.3. Bitglass
2.17.3.1.4. Cisco
2.17.3.1.5. Intel Security
2.17.3.1.6. MailGuard
2.17.3.1.7. Spamina
2.17.3.1.8. Symantec
2.17.3.1.9. Total Defense
2.17.3.1.10. TotalDefense
2.17.3.1.11. Websense
2.17.3.1.12. Zscaler
2.17.3.2. Web Only
2.17.3.2.1. Bluecoat
2.17.3.2.2. ContentKeeper
2.17.3.2.3. OpenDNS
2.17.3.2.4. Websense
2.17.3.2.5. Zscaler
2.17.3.3. Secure Email Gateways
2.17.3.3.1. Agari
2.17.3.3.2. CloudMark
2.17.3.3.3. Proofpoint
2.17.3.3.4. Return Path
2.17.3.3.5. Spam Experts
2.17.3.3.6. Spam Titan
2.17.3.3.7. Spamina
2.17.3.3.8. ValiMail
2.17.3.4. Anti-Phishing
2.17.3.4.1. Amgine Securus
2.17.3.4.2. Area1 Security
2.17.3.4.3. CloudMark
2.17.3.4.4. Cymbel
2.17.3.4.5. Cyveillance
2.17.3.4.6. FireEye
2.17.3.4.7. MailGuard
2.17.3.4.8. MediaPro
2.17.3.4.9. Phishlabs
2.17.3.4.10. ThreatTrack
2.17.3.4.11. Votiro
2.17.3.4.12. Webroot
2.17.3.4.13. ZapFraud
3. Endpoint Security
3.1. Anti-Malware
3.1.1. Eastern Europe
3.1.1.1. Czech Republic
3.1.1.1.1. Avast
3.1.1.1.2. TrustPort
3.1.1.2. Denmark
3.1.1.2.1. BullGuard
3.1.1.3. Netherlands
3.1.1.3.1. AVG
3.1.1.4. Romania
3.1.1.4.1. Bitdefender
3.1.1.5. Slovakia
3.1.1.5.1. ESET
3.1.2. Emerging Asia/Pacific
3.1.2.1. India
3.1.2.1.1. eScan
3.1.2.1.2. K7 Computing
3.1.3. Latin America
3.1.3.1. Spain
3.1.3.1.1. Optenet
3.1.4. Mature Asia/Pacific
3.1.4.1. China
3.1.4.1.1. Qihoo
3.1.4.1.2. Rising International Software
3.1.4.2. South Korean
3.1.4.2.1. AhnLab
3.1.4.2.2. BKAV
3.1.4.2.3. ESTsoft
3.1.5. Middle East and Africa
3.1.5.1. Israel
3.1.5.1.1. Check Point Software
3.1.6. North America
3.1.6.1. Cyren
3.1.6.2. Fortinet
3.1.6.3. Intel Security
3.1.6.4. MalwareBytes
3.1.6.5. McAfee
3.1.6.6. Microsoft
3.1.6.7. PC Pitstop
3.1.6.8. Reason Core Security
3.1.6.9. Roboscan
3.1.6.10. Symantec
3.1.6.11. ThreatTrack
3.1.6.12. Total Defense
3.1.6.13. Trend Micro
3.1.7. Russia
3.1.7.1. Kaspersky
3.1.8. Western Europe
3.1.8.1. Austria
3.1.8.1.1. Ikarus Security
3.1.8.2. Finland
3.1.8.2.1. F-Secure
3.1.8.3. Germany
3.1.8.3.1. Avira
3.1.8.3.2. G-Data
3.1.8.3.3. Kromtech
3.1.8.4. Norway
3.1.8.4.1. Norman
3.1.8.5. United Kingdom
3.1.8.5.1. Sophos
3.1.8.6. Poland
3.1.8.6.1. Arcabit
3.2. Application Isolation
3.2.1. Blue Ridge Networks
3.2.1.1. http://www.blueridge.com/index.php/products/appguard/consumer
3.2.2. Bromium
3.2.3. Bufferzone
3.2.4. Invincea
3.2.4.1. SandBoxie
3.2.5. VMware
3.3. Endpoint Sandboxes and Virtualized Containers
3.3.1. Endpoint Sandboxes
3.3.1.1. Panda
3.3.1.1.1. www.panda.com
3.3.1.2. Sandboxie
3.3.1.2.1. http://www.sandboxie.com/
3.3.1.3. Bitdefender
3.3.1.3.1. www.bitdefender.com
3.3.2. Type-0 Hypervisors
3.3.2.1. Lynxworks
3.3.2.1.1. http://www.lynuxworks.com/
3.3.2.2. Zirtu
3.3.3. Process Isolation/Virtualization
3.3.3.1. Avectco
3.3.3.2. Bromium
3.3.3.3. Invincea
3.4. Endpoint Intrusion Prevention
3.4.1. Arkoon
3.4.1.1. StormShield
3.4.2. BeyondTrust
3.4.3. IBM
3.4.4. Landesk
3.4.5. McAfee
3.4.6. Safensoft
3.4.7. Symantec
3.5. Enterprise Mobility Mangement Suites
3.5.1. Absolute Software
3.5.2. AMware
3.5.2.1. Airwatch
3.5.3. Blackberry
3.5.4. Citrix
3.5.5. Globo
3.5.6. Good Technologies
3.5.7. IBM
3.5.8. Landesk
3.5.9. MobileIron
3.5.10. Mojave
3.5.10.1. https://www.mojave.net/
3.5.11. SAP
3.5.12. Sophos
3.5.13. Soti
3.5.14. Symantec
3.5.15. Tangoe
3.6. Application Control
3.6.1. AppSense
3.6.2. Avecto
3.6.3. Bit9
3.6.4. Landesk
3.6.5. Lumension
3.6.6. McAfee
3.6.7. Sophos
3.6.8. Symantec
3.6.9. Trend Micro
3.7. Exploit Technique Prevention Software
3.7.1. CyActive
3.7.2. CyBellum
3.7.3. Malwarebytes Anti-Exploit
3.7.4. Microsoft
3.7.4.1. Microsoft EMET - FREE
3.7.5. Morphisec
3.7.6. Palo Alto Networks
3.7.6.1. Endpoint
3.7.7. Sophos
3.7.7.1. Intercept X
3.7.8. Trend Micro
3.7.9. ViRobot APT Shield
3.8. File Integrity Monitoring
3.8.1. Open Source
3.8.1.1. 1. AIDE
3.8.1.2. 2. Trend Micro
3.8.1.2.1. 1. OSSEC
3.8.1.3. 3. Samhain
3.8.1.4. 4. Osiris
3.8.1.5. 5. Integrit
3.8.1.6. 6. Tripwire
3.8.2. Commercial
3.8.2.1. Imperva
3.8.2.2. Intel Security
3.8.2.3. Tripwire
3.9. Malware Analysis
3.9.1. Botnets
3.9.1.1. spyeyetracker.abuse.ch
3.9.2. Internet Identity
3.9.3. Malware Patrol
3.9.4. SpamHaus
3.9.5. Team Cymru
3.9.6. ThreatGrid
3.9.7. VirusTotal
3.9.8. zeustracker.abuse.ch
3.9.9. JoeSecurity
3.9.10. Shadowserver
3.10. Mobile Device Management
3.10.1. Absolute Software
3.10.2. Beachhead Security
3.10.3. Blackberry
3.10.4. Citrix
3.10.5. Globo
3.10.6. Good Technologies
3.10.7. IBM
3.10.8. Landesk
3.10.9. MobileIron
3.10.10. Mojave
3.10.10.1. https://www.mojave.net/
3.10.11. SAP
3.10.12. Sophos
3.10.13. Soti
3.10.14. Symantec
3.10.15. Tangoe
3.10.16. VMware
3.10.16.1. Airwatch
3.11. Policy Assessment and System Configuration Management
3.11.1. BMC
3.11.1.1. BMC Server Automation
3.11.2. Check Point Software
3.11.2.1. Endpoint Policy Management
3.11.3. IBM
3.11.3.1. IBM Endpoint Manager
3.11.4. Intel Security
3.11.4.1. Policy Auditor
3.11.5. RedHat
3.11.5.1. OpenSCAP
3.11.6. Saint
3.11.6.1. Saint Security
3.11.7. Tripwire
3.11.7.1. Tripwire Enterprise
4. Data & Collaboration Security
4.1. Data Governance and Classification
4.1.1. Expert Source
4.1.1.1. http://www.expertsource.in/index.php
4.1.2. HP
4.1.3. IBM
4.1.4. Informatica
4.1.5. Nuix
4.1.6. Somansa
4.1.7. Titus
4.1.8. boldonjames
4.2. Data Loss Prevention (DLP)
4.2.1. Endpoint
4.2.1.1. Data Classification and Tracking
4.2.1.1.1. Banyan Solutions
4.2.1.1.2. BoldonJames
4.2.1.1.3. Digital Guardian
4.2.1.1.4. HP
4.2.1.1.5. IBM
4.2.1.1.6. Identity Finder
4.2.1.1.7. Mach1 Development
4.2.1.1.8. Microsoft (Formerly Secure Islands)
4.2.1.1.9. MinerEye
4.2.1.1.10. Nuix
4.2.1.1.11. Smartlogic
4.2.1.1.12. Titus
4.2.1.1.13. Varonis
4.2.1.1.14. CoSoSys
4.2.1.2. Mobile
4.2.1.2.1. Symantec
4.2.1.2.2. Websense
4.2.1.2.3. Microsoft (Secure Islands)
4.2.1.3. Windows
4.2.1.3.1. Absolute Software
4.2.1.3.2. CA Technologies
4.2.1.3.3. Digital Guardian
4.2.1.3.4. GTB Technologies
4.2.1.3.5. Infowatch
4.2.1.3.6. Intel Security
4.2.1.3.7. RSA
4.2.1.3.8. Microsoft (Secure Islands)
4.2.1.3.9. Somansa
4.2.1.3.10. Symantec
4.2.1.3.11. Trustwave
4.2.1.3.12. Watchful Software
4.2.1.3.13. Raytheon-Websense
4.2.1.3.14. Zecurion
4.2.2. Network
4.2.2.1. Digital Guardian
4.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)
4.2.2.3. Symantec
4.2.2.4. InfoWatch
4.2.3. Secure Email Gateway
4.2.3.1. Cisco
4.2.3.2. Symantec
4.2.3.3. Intel Security
4.2.3.4. Somansa
4.2.4. Secure Web Gateway
4.2.4.1. Intel Security
4.2.4.2. Symantec
4.2.4.3. Somansa
4.2.5. Breached Data Detection
4.2.5.1. Consumer
4.2.5.1.1. PwnedList
4.2.5.1.2. haveibeenpwned.com
4.2.5.2. Enterprise
4.2.5.2.1. Infoarmor
4.2.5.2.2. Ionic
4.2.5.2.3. Hold Security
4.3. Database Security
4.3.1. Database Audit and Protection (DAP)
4.3.1.1. Application Security, Inc
4.3.1.2. BeyondTrust
4.3.1.3. Big Data Platform DAP
4.3.1.3.1. BlueTalon
4.3.1.3.2. Cloudera
4.3.1.3.3. Hortonworks
4.3.1.3.4. IBM
4.3.1.3.5. Imperva
4.3.1.4. DataSunrise
4.3.1.5. Fortinet
4.3.1.6. GreenSQL
4.3.1.7. IBM
4.3.1.8. IRI
4.3.1.8.1. Oracle
4.3.1.8.2. SQL Server
4.3.1.9. Imperva
4.3.1.10. Intel Security
4.3.1.11. Mentis Software
4.3.1.12. Oracle Corp
4.3.1.13. PentaSecurity
4.3.1.14. Warevalley
4.3.2. Database Activity Monitoring
4.3.2.1. DB Networks
4.3.2.2. Somansa
4.4. Encryption/Tokenization
4.4.1. Big Data
4.4.1.1. Gazzang
4.4.1.2. Vormetric
4.4.2. Cloud/SAAS Encryption
4.4.2.1. Appliances
4.4.2.1.1. Office365
4.4.2.1.2. Ciphercloud
4.4.2.1.3. Afore Solutions
4.4.2.1.4. Perspecsys
4.4.2.2. Software
4.4.2.2.1. BoxCryptor
4.4.2.2.2. CloudMask
4.4.2.2.3. PrivateCore
4.4.2.2.4. Trend Micro
4.4.2.2.5. Viivo
4.4.2.2.6. Voltage Security
4.4.2.3. Software as a Service
4.4.2.3.1. Trend Micro
4.4.2.3.2. SooKasa
4.4.2.3.3. Gemalto
4.4.3. Cryptographic Providers
4.4.3.1. RSA
4.4.3.2. Quintessence
4.4.3.3. Microsoft
4.4.4. Data masking
4.4.4.1. Oracle
4.4.4.2. Dataguise
4.4.4.3. Informatica
4.4.4.4. IBM
4.4.4.5. Voltage Security
4.4.4.6. Green SQL
4.4.4.7. Mentis
4.4.4.8. Compuware
4.4.4.9. Axis
4.4.4.10. Privacy Analytics
4.4.4.11. Camouflage Software
4.4.4.12. Solix Technologies
4.4.4.13. Net 2000
4.4.5. Database
4.4.5.1. Gemalto
4.4.5.2. Dark Matter Labs
4.4.5.3. Vormetric
4.4.6. Email
4.4.6.1. ZixCorp
4.4.6.2. Encryptics
4.4.6.2.1. https://www.encryptics.com/default.aspx
4.4.7. Encrypted USB Storage
4.4.7.1. Apricorn
4.4.7.2. Datalocker
4.4.7.3. Integral Memory
4.4.7.4. IronKey
4.4.7.5. Kingston
4.4.7.6. Virbatim
4.4.8. File/Folder
4.4.8.1. Covertix
4.4.8.1.1. http://www.covertix.com/
4.4.8.2. IBM
4.4.8.2.1. Mainframe
4.4.8.3. SecureIslands
4.4.8.4. Sophos
4.4.8.4.1. SafeGuard Enterprise (Utimaco)
4.4.8.5. Symantec (PGP)
4.4.8.6. Vormetric
4.4.8.7. WinMagic
4.4.8.7.1. SecureDoc
4.4.9. Quantum Encryption
4.4.9.1. IDQ
4.4.9.2. Quintessence Labs
4.4.9.3. Whitewood Encryption
4.4.10. Tokenization
4.4.10.1. Protegrity
4.4.11. Whole Disk
4.4.11.1. Intel Security
4.4.11.2. Symantec (PGP)
4.4.11.3. CheckPoint Software
4.4.11.4. Encryption Management
4.4.11.4.1. Wave Systems
4.4.11.5. WinMagic
4.4.11.5.1. SecureDoc
4.4.11.6. Microsoft
4.4.11.6.1. Bitlocker
4.4.11.7. Sophos
4.4.11.7.1. SafeGuard Enterprise (Utimaco)
4.4.11.8. Trustwave
4.4.11.8.1. DataControl
4.4.11.9. Vormetric
4.5. File Analysis Software
4.5.1. Acaveo
4.5.2. Active Navigation
4.5.3. AvePoint
4.5.4. Beyond Recognition
4.5.5. Bloomberg
4.5.6. CommVault
4.5.7. Condrey
4.5.8. Covertix
4.5.9. DataGlobal
4.5.10. DataGravity
4.5.11. Equivio
4.5.12. HP
4.5.12.1. Control Point
4.5.13. HiSoftware
4.5.14. IBM
4.5.14.1. StoreIQ
4.5.15. Identifty Finder
4.5.16. Imperva
4.5.17. Index Engines
4.5.18. Kazoup
4.5.19. MailGuard
4.5.20. NTP Software
4.5.21. Novell
4.5.22. Nuix
4.5.23. Proofpoint
4.5.24. Stealthbits
4.5.25. Varonis
4.5.26. WatchDox
4.5.27. Whitebox Security
4.5.28. ZyLab
4.6. Hardware Security Modules (HSM)
4.6.1. Cloud HSM
4.6.1.1. Amazon
4.6.1.2. IBM
4.6.2. Hardware
4.6.2.1. FutureX
4.6.2.2. Gemalto
4.6.2.3. HPE
4.6.2.4. Safenet
4.6.2.5. Thales
4.7. Software Defined Storage Security
4.7.1. Dispersive Networks
4.7.1.1. https://dispersivetechnologies.com/
4.7.2. OceansBlue
4.7.2.1. http://www.oceansblue.net/index.html
4.8. eSignatures
4.8.1. Adobe eSign Services
4.8.2. Alphatrust
4.8.3. Docusign
4.8.4. Hellosign
4.8.5. Rightsignature
4.8.6. Sertifi
5. Identity and Access Management (IAM)
5.1. AD/Unix bridge
5.1.1. Centrify
5.2. Enterprise single sign-on (ESSO)
5.3. Externalized authorization management (EAM)
5.3.1. Axiomatics
5.3.2. Dell Quest (BitKoo)
5.4. IAM as a Service
5.4.1. Centrify
5.4.2. IBM (Formerly Lighthouse Security)
5.4.3. Identity Automation
5.4.4. Intel
5.4.5. Okta
5.4.6. Password Bank
5.4.7. Ping Identity
5.4.8. Sailpoint
5.4.9. Symplifyed
5.4.10. iWelcome
5.5. Identity governance and administration
5.5.1. CA Technologies
5.5.2. IBM Security
5.5.3. Oracle
5.5.4. RSA (Aveksa)
5.6. Privileged account management (PAM)
5.6.1. BeyondTrust
5.6.2. Lieberman Software
5.6.3. Cyber Ark
5.6.4. Dell
5.6.5. Centrify
5.7. Public Certificate Authorities
5.7.1. Comodo
5.7.2. Crosscert
5.7.3. Geotrust
5.7.4. Godaddy
5.7.5. Symantec (Formerly VeriSign)
5.8. User Authentication
5.8.1. Tokens
5.8.1.1. OOB authentication
5.8.1.1.1. SMS
5.8.1.1.2. Voice
5.8.1.1.3. Push
5.8.1.1.4. Email
5.8.1.1.5. Social media
5.8.1.2. OTP tokens
5.8.1.2.1. OTP hardware tokens
5.8.1.2.2. OTP software tokens for smart phones
5.8.1.3. X.509 tokens
5.8.1.4. Other tokens
5.8.1.4.1. ANECT AS - ALUCID
5.8.2. Contextual authentication
5.8.2.1. Google
5.8.2.1.1. Trust API
5.8.3. KBA
5.8.3.1. It's Me Security
5.8.3.1.1. http://www.itsmesecurity.com/
5.8.4. Biometrics
5.8.4.1. Behavioral
5.8.4.1.1. Typing rhythm/keystroke dynamics
5.8.4.1.2. Voice recognition
5.8.4.2. Biological
5.8.4.2.1. Face recognition
5.8.4.2.2. Fingerprint
5.8.5. Wide-focus vendors
5.8.5.1. Alladin-RD
5.8.5.2. CA Technologies
5.8.5.3. Entrust
5.8.5.4. HID Global
5.8.5.5. RSA
5.8.5.5.1. Adaptive Auth
5.8.5.6. Gemalto
5.8.5.7. Symantec
5.8.5.8. Technology Nexus
5.8.5.9. VASCO
5.9. User Privilege Management
5.9.1. Appsense
5.9.1.1. http://www.appsense.com/
5.9.2. Ariella
5.9.2.1. http://www.arellia.com/
5.9.3. Avectco
5.9.3.1. http://www.avecto.com/
5.9.4. BeyondTrust
5.9.4.1. http://www.beyondtrust.com/
5.9.5. Centrify
5.9.5.1. http://www.centrify.com/
5.9.6. CionSystems
5.9.7. CrossIdeas
5.9.7.1. http://www.crossideas.com/
5.9.8. Dell
5.9.8.1. http://www.quest.com/desktop-authority-management-suite/
5.9.9. Lieberman Software
5.9.9.1. http://www.liebsoft.com/
5.9.10. Viewfinity
5.9.10.1. http://www.viewfinity.com/
5.10. Identity Blockchain
5.10.1. 2Way.IO
5.10.2. Blockstack
5.10.2.1. Open Source
5.10.3. ID.me
5.10.4. KYC-Chain
5.10.5. Uport
5.10.6. airbitz
5.10.7. hypr
5.10.8. tradle.io
5.10.9. trunomi
5.10.10. uniquid
6. Application Security
6.1. Web Application Firewalls (WAF) & Application Security
6.1.1. Web Application Firewalls
6.1.1.1. Virtualized Appliances
6.1.1.1.1. A10 Networks
6.1.1.1.2. AlertLogic
6.1.1.1.3. Amazon AWS
6.1.1.1.4. Barracuda Networks
6.1.1.1.5. BeeWare
6.1.1.1.6. DenyAll
6.1.1.1.7. Ergon Informatik AG
6.1.1.1.8. F5
6.1.1.1.9. Fortinet
6.1.1.1.10. Forum Systems
6.1.1.1.11. Imperva
6.1.1.1.12. PentaSecurity
6.1.1.1.13. Trustwave
6.1.1.1.14. Citrix
6.1.1.2. Physical Appliances
6.1.1.2.1. A10 Networks
6.1.1.2.2. AdNovum
6.1.1.2.3. AlertLogic
6.1.1.2.4. Anchiva
6.1.1.2.5. Barracuda Networks
6.1.1.2.6. BeeWare
6.1.1.2.7. BugSec
6.1.1.2.8. Citrix
6.1.1.2.9. DBAPPSecurity
6.1.1.2.10. DPtech
6.1.1.2.11. Dell Sonicwall
6.1.1.2.12. DenyAll
6.1.1.2.13. Ergon Informatik
6.1.1.2.14. F5
6.1.1.2.15. Fortinet
6.1.1.2.16. Forum Systems
6.1.1.2.17. HP
6.1.1.2.18. Imperva
6.1.1.2.19. NSFocus
6.1.1.2.20. PentaSecurity
6.1.1.2.21. Positive Technologies
6.1.1.2.22. RadWare
6.1.1.2.23. Trustwave
6.1.1.2.24. WINS TECHNET LTD
6.1.1.3. Software
6.1.1.3.1. Dedicated Software
6.1.1.3.2. Open Source
6.1.1.3.3. Web Server Modules
6.1.1.4. Managed Services
6.1.1.4.1. Dell Secureworks
6.1.1.4.2. AT&T
6.1.1.4.3. Verizon Business
6.1.1.5. Software as a Service
6.1.1.5.1. Akamai
6.1.1.5.2. AlertLogic
6.1.1.5.3. Anquanbao
6.1.1.5.4. ArmorLogic
6.1.1.5.5. BinarySec
6.1.1.5.6. CloudFlare
6.1.1.5.7. DenyAll
6.1.1.5.8. FireBlade
6.1.1.5.9. Imperva (Incapsula)
6.1.1.5.10. Incapsula
6.1.1.5.11. PowerCDN
6.1.1.5.12. Qualys
6.1.1.5.13. Securi
6.1.1.5.14. Signal Sciences
6.1.1.5.15. Soha
6.1.1.5.16. ZenEdge
6.1.2. Web Threat Disruption Technology
6.1.2.1. Software
6.1.2.1.1. NuCaptcha
6.1.2.1.2. NuData
6.1.2.2. Appliances
6.1.2.2.1. Juniper
6.1.2.2.2. Shape Security
6.1.2.3. Open Source
6.1.2.3.1. Google Hack Honeypot
6.2. Web Application Security
6.2.1. Code Review Products
6.2.1.1. HP
6.2.1.2. IBM
6.2.2. Web Application Vulnerability Scanning Services
6.2.2.1. Cenzic
6.2.2.2. Controlscan
6.2.2.3. High-Tech Bridge
6.2.2.4. McAfee Secure
6.2.2.5. Qualys
6.2.2.6. Securi
6.2.2.7. Sitelock
6.2.2.8. Trustwave
6.2.2.9. WebSecurify
6.2.2.10. WhiteHat Security
6.2.3. Scanning Software
6.2.3.1. Open Source
6.2.3.1.1. Arachni Scanner
6.2.3.1.2. Subgraph
6.2.3.1.3. W3af
6.2.3.1.4. Wapiti
6.2.3.1.5. Watcher
6.2.3.2. Commercial
6.2.3.2.1. Accunetix
6.2.3.2.2. BeyondTrust
6.2.3.2.3. Cenzic
6.2.3.2.4. HP
6.2.3.2.5. MavitunaSecurity
6.2.3.2.6. NTObjectives
6.2.3.2.7. Nstalker
6.2.3.2.8. Portswigger
6.2.3.2.9. Syhunt
7. Random Knowledge
7.1. Detection Methods
7.1.1. File Analysis
7.1.1.1. Computed Hash
7.1.1.1.1. Uniqueness
7.1.1.2. Metadata Attributes
7.1.1.2.1. File Content Inspection
7.1.1.2.2. File Headers
7.1.1.2.3. Temporal Analysis
7.1.1.2.4. Temporal Analysis with Prevalence
7.1.1.2.5. Time/Date
7.1.1.2.6. Certificate and Signature Evaluation (PKI)
7.1.1.3. Packing Method
7.1.1.3.1. Multi-packing Analysis
7.1.2. Network Specific
7.1.2.1. Protocol/File/Session Decode & Analysis
7.1.2.1.1. File Extraction
7.1.2.1.2. Playback (Surveillance)
7.1.2.1.3. File/Session Viewing
7.1.2.1.4. Correlation
7.1.2.1.5. Machine Learning (AI)
7.1.2.2. Network Flow Analysis
7.1.2.2.1. Machine Learning (AI)
7.1.2.3. Application Layer Analysis
7.1.2.3.1. Classification, Correlation , Deviance from Baselines (Heuristics)
7.1.2.3.2. Deep Packet Inspection (DPI)
7.1.2.3.3. Application Command and Input Analysis
7.1.2.4. IP Layer Analysis
7.1.2.4.1. TCP/UDP Ports
7.1.2.4.2. IP Address
7.1.3. Malware Behavioral Evaluations
7.1.3.1. Persistence
7.1.3.1.1. Installs as System Service
7.1.3.1.2. Installs Registry Keys in Startup locations
7.1.3.1.3. Modifies filesystem in specific locations
7.1.3.2. Suspicious Behaviors Evaluated
7.1.3.2.1. Attempts to login to systems that a specific user credential is not normally used on
7.1.3.2.2. Becomes another user on the system
7.1.3.2.3. CPU of Processes Spawned is high
7.1.3.2.4. Connects with a known bad URL or IP Address
7.1.3.2.5. Escalates privileges
7.1.3.2.6. Examines the Documents Folder or User Document Folders
7.1.3.2.7. File Isn't widely prevalent in user population
7.1.3.2.8. Injects data into memory of another running process
7.1.3.2.9. Modifies memory of another process
7.1.3.2.10. Opens TCP/IP Connections to other hosts
7.1.3.2.11. Performs a network port sweep
7.1.3.2.12. Process executes net use DOS command inside command.exe
7.1.3.2.13. Process spawns command.exe
7.1.3.2.14. Removes logs/events of application logs or operating system
7.1.3.2.15. Self Delete of files
7.1.3.2.16. Self-copy of files
7.1.3.2.17. Starts to repeatedly call the crypt function (ransom sign)
7.1.3.2.18. Time of execution is not normal in context of historical analysis
7.1.4. User
7.1.4.1. Activity on system when user's employment is in termination status
7.1.4.2. Deviates from past user behavior
7.1.4.3. Device not historically associated to user
7.1.4.4. Login time anamoly
7.1.4.5. Login time outside user's home timezone
7.1.4.6. Privileged data accessed
7.1.4.6.1. Volumetric analysis
7.1.4.6.2. Deviation from baseline
7.1.4.6.3. Cut-paste function used
7.1.4.7. Remote access and time of day abnormal from baselines
7.1.4.8. User authentication failure
7.1.4.9. User's browser or viewer is not the same as the baseline
7.1.4.10. User is logging into system remotely and locally simultaneously
7.1.4.11. User is logging into system remotely (not expected)
7.1.4.12. User is logging into system remotely at an abnormal time
7.1.4.13. User is abnormally leveraging applications that are administrative in nature (Control Panel, Command.exe, Group Policy Editor, etc)
8. Security Operations & Incident Response
8.1. Digital Forensics/eDiscovery
8.1.1. Content, File and Endpoint Forensics
8.1.1.1. eDiscovery
8.1.1.1.1. Clearwell
8.1.1.1.2. Kazeon
8.1.1.1.3. Guidance Software
8.1.1.1.4. Access Data
8.1.1.1.5. Autonomy
8.1.1.1.6. kCura
8.1.1.1.7. FTI Technology
8.1.1.1.8. Barracuda Networks
8.1.1.2. Mobile Devices
8.1.1.2.1. BlackBagTech
8.1.1.2.2. Cellebrite
8.1.1.2.3. Compelson Labs
8.1.1.2.4. Guidance Software
8.1.1.2.5. MSAB
8.1.1.2.6. NowSecure
8.1.1.2.7. Oxygen Forensics
8.1.1.2.8. Paraben Corporation
8.1.1.3. Endpoint Computing Systems
8.1.1.3.1. ADF Solutions
8.1.1.3.2. Access Data
8.1.1.3.3. ArxSys
8.1.1.3.4. BlackBag Technologies
8.1.1.3.5. CRU Inc
8.1.1.3.6. Cyfir
8.1.1.3.7. Guidance Software
8.1.1.3.8. Magnet Forensics
8.1.1.3.9. Nuix
8.1.1.3.10. OSForensics
8.1.1.3.11. Paraben Corporation
8.1.1.3.12. WindowsScope
8.1.1.3.13. X-Ways Forensics
8.1.1.4. Email Examination
8.1.1.4.1. Systools Software
8.1.1.4.2. Nuix
8.1.1.5. Forensic File & Data Analysis Tools
8.1.1.5.1. Cellebrite
8.1.1.5.2. Cyfir
8.1.1.5.3. Intella
8.1.1.5.4. Magnet Forensics
8.1.1.5.5. Nuix
8.1.1.5.6. Systools Software
8.1.1.6. Digital Forensics Case Management
8.1.1.6.1. D3 Security
8.1.1.6.2. Digital Investigation Manager
8.1.1.6.3. Guidance Software
8.1.1.6.4. Intaforensiscs
8.1.1.6.5. Sentinel Data
8.1.1.6.6. Sirentech
8.1.1.6.7. Wynyard Group
8.1.1.7. Memory Forensics
8.1.1.7.1. FireEye
8.1.1.7.2. Guidance Software
8.1.1.7.3. Volatility Framework
8.1.1.7.4. WindowsScope
8.1.2. eDiscovery Services
8.1.2.1. Robert Half
8.1.2.2. Advanced Discovery
8.1.3. eDiscovery Software
8.1.3.1. AccessData
8.1.3.2. Guidance Software
8.1.3.3. Nuix
8.1.3.4. Symantec
8.2. Fraud Prevention/Web Malware Monitoring
8.2.1. Fraud/Bot/Webscrape Prevention
8.2.1.1. Software
8.2.1.1.1. IBM (Formerly Trusteer)
8.2.1.1.2. Intellinx
8.2.1.1.3. RSA (EMC)
8.2.1.1.4. ShieldSquare
8.2.1.2. Appliances
8.2.1.2.1. Distil Networks
8.2.1.2.2. Imperva
8.2.1.2.3. RSA
8.2.1.2.4. Shape Security
8.2.1.2.5. White Ops
8.2.1.3. Software as a Service
8.2.1.3.1. Akamai
8.2.1.3.2. BioCatch
8.2.1.3.3. BotScout
8.2.1.3.4. Distil Networks
8.2.1.3.5. Guardian Analytics
8.2.1.3.6. Kount
8.2.1.3.7. MarkMonitor
8.2.1.3.8. NuData Security
8.2.1.3.9. Shape Security
8.2.1.3.10. ShieldSquare
8.2.1.3.11. ThreatMetrix
8.2.1.3.12. White Ops
8.2.1.3.13. X-Cart
8.2.1.3.14. iovation
8.2.1.4. Virtual Appliances
8.2.1.4.1. Distil Networks
8.2.1.4.2. Imperva
8.2.2. Website & Ad Malware Monitoring
8.2.2.1. Ad-Juster
8.2.2.2. Globalsign
8.2.2.2.1. Leverages Hackalert
8.2.2.3. Hackalert
8.2.2.4. Intel Security
8.2.2.4.1. Siteadvisor
8.2.2.5. QualysGuard
8.2.2.6. RiskIQ
8.2.2.7. Sucuri
8.2.2.8. The Media Trust
8.3. Incident Response Legal Services
8.3.1. Information Law Group
8.4. Security Information and Event Management (SIEM), Log Management & Analytics
8.4.1. Application Security Intelligence Engine
8.4.1.1. SAP
8.4.1.1.1. iT-Cube Systems
8.4.2. Log Management
8.4.2.1. EventTracker
8.4.2.2. IGLOO Security
8.4.2.3. Intel Security
8.4.2.3.1. McAfee Enterprise Log Manager
8.4.2.4. Kiwi Syslog Server
8.4.2.5. LogEntries
8.4.2.6. LogRythm
8.4.2.7. Logscape
8.4.2.8. Open Source
8.4.2.8.1. Elasticsearch (ELK Stack)
8.4.2.8.2. SEC (Simple Event Correlator)
8.4.2.8.3. OSSIM
8.4.2.8.4. Syslog-NG
8.4.2.8.5. Octopussy
8.4.2.9. Sawmill
8.4.2.10. Splunk
8.4.2.11. Sumo Logic
8.4.2.12. Tripwire
8.4.2.13. XpoLog
8.4.3. SIEM
8.4.3.1. AlienVault
8.4.3.1.1. OSSIM
8.4.3.2. CorreLog
8.4.3.3. EventTracker
8.4.3.4. Fortinet
8.4.3.5. HP
8.4.3.5.1. Arcsight
8.4.3.6. Hexis Cyber Solutions
8.4.3.6.1. Hawkeye AP
8.4.3.7. IBM
8.4.3.7.1. Q1Radar
8.4.3.8. IGLOO Security
8.4.3.9. Intel Security
8.4.3.9.1. NitroSecurity
8.4.3.10. LogPoint
8.4.3.10.1. http://www.logpoint.com/en/
8.4.3.11. LogRythm
8.4.3.12. Novell
8.4.3.12.1. Sentinel
8.4.3.13. RSA
8.4.3.13.1. Envision
8.4.3.14. Sensage
8.4.3.15. Solarwinds
8.4.3.16. Splunk
8.4.3.17. Sqrrl
8.4.3.18. Tibco
8.4.3.18.1. Loglogic
8.4.3.19. eIQnetworks
8.4.4. Security Analytics
8.4.4.1. Anomaly Analytics
8.4.4.1.1. Intel
8.4.4.1.2. Theta Ray
8.4.4.1.3. Prelert
8.4.4.1.4. eMite
8.4.4.1.5. Niddel
8.4.4.2. User and Entity Behavior Analytics (UEBA)
8.4.4.2.1. Bay Dynamics
8.4.4.2.2. Darktrace
8.4.4.2.3. Detex Systems
8.4.4.2.4. Exabeam
8.4.4.2.5. Fortscale
8.4.4.2.6. Gurcul
8.4.4.2.7. HP
8.4.4.2.8. IBM
8.4.4.2.9. Interset
8.4.4.2.10. Microsoft
8.4.4.2.11. Niara
8.4.4.2.12. ObserveIT
8.4.4.2.13. Palerra
8.4.4.2.14. Platfora
8.4.4.2.15. Reveelium
8.4.4.2.16. Secureonix
8.4.4.2.17. Veriato
8.4.5. User and Entity Behavior Analytics (UEBA)
8.4.5.1. Bae Systems Applied Intelligence
8.4.5.2. Bay Dynamics
8.4.5.3. Caspida
8.4.5.4. Click Security
8.4.5.5. Exabeam
8.4.5.6. FICO
8.4.5.7. Fortscale
8.4.5.8. GuruCul
8.4.5.9. IBM
8.4.5.10. Intellinx
8.4.5.11. Lockheed Martin
8.4.5.12. Logtrust
8.4.5.13. Mobile System 7
8.4.5.14. Novetta Solutions
8.4.5.15. Oracle
8.4.5.16. Rapid7
8.4.5.17. Raytheon
8.4.5.18. SAS Institute
8.4.5.19. Secureonix
8.4.5.20. Splunk
8.5. Security Operations, Analytics and Reporting (SOAR)
8.5.1. Security Incident Response Platforms (SIRP)
8.5.1.1. Agiliance
8.5.1.2. DFLabs
8.5.1.3. Demisto
8.5.1.4. EMC(RSA)
8.5.1.5. Empow
8.5.1.6. Fido
8.5.1.7. Hexadite
8.5.1.8. ID Experts
8.5.1.9. Proofpoint
8.5.1.10. Resilient Systems
8.5.1.11. Siemplify
8.5.1.12. Syncurity
8.5.2. Threat and Vulnerability Management (TVM)
8.5.2.1. Acuity Risk Management
8.5.2.2. Agiliance
8.5.2.3. BeyondTrust
8.5.2.4. Core Security
8.5.2.5. Cybersponse
8.5.2.6. DFLabs
8.5.2.7. EMC(RSA)
8.5.2.8. Kenna Security
8.5.2.9. NopSec
8.5.2.10. RedSeal
8.5.2.11. RiskSense
8.5.2.12. Skybox Security
8.5.2.13. Swimlane
8.5.2.14. Siemplify
8.5.3. Security Operations Analytics
8.5.3.1. Ayehu
8.5.3.2. Cybersponse
8.5.3.3. DFLabs
8.5.3.4. EMC(RSA)
8.5.3.5. Hexadite
8.5.3.6. Proofpoint
8.5.3.7. Resilient Systems
8.5.3.8. Siemplify
8.5.3.9. Swimlane
8.5.4. Security Operations Automation Platforms (SOAPS)
8.5.4.1. Ayehu
8.5.4.2. Cyberbit
8.5.4.3. Cybersponse
8.5.4.4. DFLabs
8.5.4.5. Demisto
8.5.4.6. Empow Security
8.5.4.7. Fireye
8.5.4.8. Hexadite
8.5.4.9. IBM
8.5.4.10. Phantom Cyber
8.5.4.11. Swimlane
8.5.4.12. Syncurity
8.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)
8.6.1. Crowdsourced Application Security Testing Platforms
8.6.1.1. Hyver
8.6.1.2. Applause
8.6.1.3. Bugcrowd
8.6.1.4. BugFinders
8.6.1.5. Cobalt
8.6.1.6. Crowdtesters
8.6.1.7. HackerOne
8.6.2. Managed Penetration Testing Services
8.6.2.1. Cenzic
8.6.2.2. WhiteHatSecurity
8.6.3. Penetration Testing Software
8.6.3.1. Core Security
8.6.3.2. Rapid7
8.6.3.2.1. Metasploit Pro
8.6.3.2.2. Metasploit Express
8.6.3.3. Trustwave
8.6.4. Vulnerability Assessment
8.6.4.1. Software as a Service
8.6.4.1.1. Vulnerability Management
8.6.4.1.2. Phish Testing/Management
8.6.4.2. Network-Based Vulnerability Assessment (On Premise)
8.6.4.2.1. Core Security
8.6.4.2.2. Digital Defense
8.6.4.2.3. Fortinet
8.6.4.2.4. Intel Security
8.6.4.2.5. NSAuditor
8.6.4.2.6. Ncircle
8.6.4.2.7. Netasq
8.6.4.2.8. Outpost24
8.6.4.2.9. Qualys
8.6.4.2.10. RandomStorm
8.6.4.2.11. Rapid 7
8.6.4.2.12. Trustwave
8.6.4.3. Agent-Based Vulnerability Assessment
8.6.4.3.1. BeyondTrust
8.6.4.3.2. Qualys
8.6.4.3.3. Secunia
8.6.4.3.4. Tenable
8.6.4.4. Mainframe Vulnerability Assessment
8.6.4.4.1. Key Resources Inc. (KRI)
8.6.5. Vulnerability Correlation
8.6.5.1. Application Vulnerability Correlation
8.6.5.1.1. Code DX
8.6.5.1.2. Denim Group
8.6.5.1.3. Kenna Security
8.6.5.1.4. NopSec
8.6.5.2. Network Vulnerability Correlation
8.6.5.2.1. Cybric
8.6.5.2.2. Kenna Security
8.6.5.2.3. NopSec
8.6.5.2.4. RiskSense
8.6.5.2.5. Secure Decisions
8.6.6. Vulnerability Research
8.6.6.1. CSC
8.6.6.2. HP
8.6.6.2.1. DV Labs
8.6.6.3. HotWAN
8.6.6.4. Intel Security
8.6.6.5. SecNiche Labs
8.6.6.6. Sourcefire VRT
8.6.6.7. Symantec
8.6.6.8. VRLSec
8.6.6.9. Vupen
9. Emerging Security Markets & Technologies
9.1. Application Security
9.1.1. Runtime Application Self-Protection (RASP)
9.1.1.1. Arxan
9.1.1.2. BrixBits
9.1.1.3. Contrast Security
9.1.1.4. HP
9.1.1.5. Hdiv Security
9.1.1.6. Immunio
9.1.1.7. Metaforic
9.1.1.8. OneASP
9.1.1.9. Prevoty
9.1.1.10. Promon
9.1.1.11. SecuPi
9.1.1.12. Signal Sciences
9.1.1.13. Veracode
9.1.1.14. Virsec
9.1.1.15. Waratek
9.1.1.16. WhiteHat Security
9.1.1.17. whiteCryption
9.1.2. Enterprise App-Layer Protection
9.1.2.1. SecuPI
9.1.3. AI-Based Applicaton Threat Defense
9.1.3.1. Sophos
9.1.3.1.1. Formerly Barricade
9.1.3.2. Signal Sciences
9.1.3.3. Threat-X
9.2. Cloud Security
9.2.1. Cloud Protection Gateways
9.2.1.1. CipherCloud
9.2.1.2. Netskope
9.2.1.3. Perspecsys
9.2.1.4. Skyhigh Networks
9.2.1.5. Vaultive
9.2.2. Cloud Access Security Brokers
9.2.2.1. User Activity Monitoring
9.2.2.1.1. Adallom
9.2.2.1.2. Avanan
9.2.2.1.3. Bitglass
9.2.2.1.4. Elastica
9.2.2.1.5. Harvest.ai
9.2.2.1.6. Imperva
9.2.2.1.7. Netscope
9.2.2.1.8. SkyHigh Networks
9.2.2.2. Data Loss Prevention
9.2.2.2.1. Integrated DLP
9.2.2.2.2. Harvest.ai
9.2.2.3. Encryption
9.2.2.3.1. Adallom
9.2.2.3.2. Avanan
9.2.2.3.3. Managed Methods
9.2.2.3.4. SkyHigh Networks
9.2.2.4. Identity and Access Management
9.2.2.4.1. Centrify
9.2.2.4.2. Cloudiway
9.2.2.4.3. Okta
9.2.2.4.4. Ping
9.2.2.5. Access Control
9.2.2.5.1. Adallom
9.2.2.5.2. Avanan
9.2.2.5.3. Bitglass
9.2.2.5.4. Elastica
9.2.2.5.5. FireLayers
9.2.2.5.6. Managed Methods
9.2.2.5.7. Netskope
9.2.2.5.8. Skyfence
9.2.3. Cloud Application Discovery
9.2.3.1. Ciphercloud
9.2.3.2. Elastica
9.2.3.3. Netskope
9.2.3.4. Skyhigh
9.2.4. Cloud Compliance and Security Risk Platforms
9.2.4.1. AlertLogic
9.2.4.2. Cavirin
9.2.4.3. Cloudcheckr
9.2.4.4. Evident.io
9.2.4.5. Harvest AI
9.3. Cross Domain Solutions
9.3.1. Advenica
9.3.1.1. ZoneGuard
9.3.1.2. SecuriRam
9.3.2. General Dynamics
9.3.2.1. TacGuard
9.3.2.2. Crossing Guard
9.3.2.3. NanoXD
9.3.3. LockHeed Martin
9.3.3.1. Trusted Manager
9.3.4. Tresys
9.3.4.1. XD Air
9.3.4.2. XD Bridge
9.3.4.3. XD Guardian
9.3.5. Owl Computing
9.3.5.1. Owl OPDS-100
9.3.5.2. Owl OPDS-100D
9.3.5.3. OCDS-SFF
9.4. Data Security
9.4.1. Network-Based Data Cleansing
9.4.1.1. DataStealth
9.4.1.1.1. http://www.datexdatastealth.com/
9.4.2. Big Data Security
9.4.2.1. BlueTalon
9.5. Endpoint Security
9.5.1. Endpoint Detection and Response (EDR)
9.5.1.1. Agent-Based
9.5.1.1.1. Carbon Black
9.5.1.1.2. Cisco
9.5.1.1.3. Countertack
9.5.1.1.4. CrowdStrike
9.5.1.1.5. Cyberbit
9.5.1.1.6. Cyberreason
9.5.1.1.7. Cylance
9.5.1.1.8. Digital Guardian
9.5.1.1.9. Dtex Systems
9.5.1.1.10. Endgame Systems
9.5.1.1.11. Fidelis Cybersecurity
9.5.1.1.12. FireEye
9.5.1.1.13. Forescout
9.5.1.1.14. Guidance Software
9.5.1.1.15. Hexis Cyber Solutions
9.5.1.1.16. Invincea
9.5.1.1.17. LogRhythm
9.5.1.1.18. NexThink
9.5.1.1.19. Panda Security
9.5.1.1.20. RSA (EMC)
9.5.1.1.21. SecDo
9.5.1.1.22. SentinelOne
9.5.1.1.23. Tanium
9.5.1.1.24. Triumfant
9.5.1.1.25. Verint
9.5.1.1.26. Ziften
9.5.1.2. Agentless
9.5.1.2.1. BeyondTrust
9.5.1.2.2. Cynet
9.5.1.2.3. Fidelis
9.5.1.2.4. WatchGuard
9.5.1.2.5. InfoCyte
9.5.1.2.6. LightCyber
9.5.1.2.7. Outlier Security
9.5.1.2.8. Promisec
9.5.2. Remote Browser-Isolation (remote dom)
9.5.2.1. Amune
9.5.2.1.1. https://amune.org/security
9.5.2.2. Armor5
9.5.2.3. Authentic8
9.5.2.4. Dispel
9.5.2.5. FireGlass
9.5.2.6. Menlo Security
9.5.2.7. Aurionpro
9.5.2.7.1. Formerly Spikes Security
9.6. Identification, Authentication, Access Control & IAM
9.7. Internet of Things
9.7.1. Automotive
9.7.1.1. Security Innovation
9.7.2. Embedded Security
9.7.2.1. Security Innovation
9.8. Network & Infrastructure Security
9.8.1. Content Disarm and Reconstruction (CDR)
9.8.1.1. Check Point Software
9.8.1.1.1. Threat Extraction
9.8.1.2. Glasswall
9.8.1.2.1. http://www.glasswallsolutions.com/
9.8.1.3. Mimecast
9.8.1.3.1. https://www.mimecast.com/
9.8.1.4. OPSWAT
9.8.1.5. ODI
9.8.1.5.1. http://www.odi-x.com/
9.8.1.6. Re-Sec
9.8.1.6.1. http://www.re-sec.com/
9.8.1.7. Sasa-Software
9.8.1.7.1. http://www.sasa-software.com/
9.8.1.8. Solebit Labs
9.8.1.8.1. http://www.solebitlabs.com/
9.8.1.9. Symantec
9.8.1.9.1. DisArm
9.8.1.10. TreSys
9.8.1.10.1. http://www.tresys.com/
9.8.1.11. Votiro
9.8.1.11.1. http://www.votiro.com/
9.8.2. Malware Infection Analysis and Monitoring Services
9.8.2.1. Lastline
9.8.2.1.1. Guardia
9.8.2.2. Cisco
9.8.2.2.1. Formerly OpenDNS
9.8.2.3. Qualys
9.8.2.4. Seculert
9.8.3. Network Behavior and Analytics
9.8.3.1. Industrial Control Systems (ICS)
9.8.3.1.1. CyberX
9.8.4. Standalone Threat Intelligence Defense Solutions (STIDS)
9.8.4.1. Bandura
9.8.4.1.1. PoliWall
9.8.4.2. Centripetal Networks
9.8.4.3. Damballa
9.8.4.4. Fidelis Cybersecurity
9.8.4.5. FireEye
9.8.4.6. Group IB
9.8.4.6.1. http://tds.group-ib.com/
9.8.4.7. Ixia
9.8.4.7.1. http://www.ixiacom.com/info/ta
9.8.4.8. LookingGlass
9.8.4.8.1. https://lgscout.com/products/dns-defender/
9.8.4.9. Redsocks
9.8.4.9.1. Redsocks Threat Defender
9.8.4.10. ReversingLabs
9.8.4.11. RiskAnalytics
9.8.4.11.1. INtellishun
9.8.4.12. Symantec
9.8.4.12.1. APT Network
9.8.5. Unauthorized Endpoint Connection Prevention (UECP)
9.8.5.1. Ensilo
9.8.5.2. Intel Security
9.8.6. Software Defined WAN (SDwan)
9.8.6.1. CloudGenix
9.8.6.2. Pertino
9.8.6.3. Velocloud
9.8.6.4. Viptela
9.8.6.5. Versa Networks
9.8.7. Virtual Container Security
9.8.7.1. Apcera
9.8.7.2. Aqua Security
9.8.7.3. Illumio
9.8.7.4. StackRox
9.8.7.5. TwistLock
9.8.8. Network Security as a Service
9.8.8.1. Cato Networks
9.8.8.2. MyDigitalShield
9.8.8.3. Zscaler
9.8.9. Software Defined Micro-Perimeter
9.8.9.1. BlackRidge Networks
9.8.9.2. Certes Networks
9.8.9.3. Cryptzone
9.8.9.4. Tempered Networks
9.8.9.5. Unisys Stealth
9.8.9.6. Vidder
9.8.9.7. Waverly Labs
9.9. Risk, Compliance and Security Management
9.9.1. Security Ratings & Insurance
9.9.1.1. Security Ratings
9.9.1.1.1. Bitsight Technologies
9.9.1.1.2. Cyence
9.9.1.1.3. Prevalent
9.9.1.1.4. QuadMetrics
9.9.1.1.5. SecurityScoreCard
9.9.1.2. Cyber Risk Insurance
9.9.1.2.1. Balsiger Insurance
9.9.1.2.2. HSB Group
9.9.1.2.3. Philadelphia Insurance Companies
9.9.1.2.4. Tennant Risk Services
9.9.1.2.5. The Hartford
9.9.1.2.6. Travelers
9.10. Security Operations, Incident Response
9.10.1. Intelligence/Data Feeds/Software & Services
9.10.1.1. Security Intelligence and Data Analysis Platforms
9.10.1.1.1. FireEye
9.10.1.2. Threat Intelligence Platforms (TIPs)
9.10.1.2.1. Anomali
9.10.1.2.2. BAE Systems
9.10.1.2.3. Buguroo
9.10.1.2.4. Codenomicon
9.10.1.2.5. Comilion
9.10.1.2.6. Confer
9.10.1.2.7. Eclectic IQ
9.10.1.2.8. Infoblox
9.10.1.2.9. Lockheed Martin
9.10.1.2.10. Lookingglass Cyber Solutions
9.10.1.2.11. Microsoft
9.10.1.2.12. Palentir
9.10.1.2.13. PierceMatrix
9.10.1.2.14. Service Now (Formerly Brightpoint)
9.10.1.2.15. Soltra
9.10.1.2.16. ThreatConnect
9.10.1.2.17. ThreatQuotient
9.10.1.2.18. TruStar
9.10.1.3. Threat Intelligence Services
9.10.1.3.1. Human Intelligence - HUMINT (Strategic)
9.10.1.3.2. Machine-Based (Tactical)
9.10.1.3.3. Vulnerabilities and Exploits
9.10.1.3.4. Data Loss Detection - External
9.10.1.4. Collaborative Threat Investigation Platforms
9.10.1.4.1. BAE System Detica
9.10.1.4.2. IKANow
9.10.1.4.3. Maltego
9.10.1.4.4. NC4
9.10.1.4.5. Palentir
9.10.2. Malware Analysis
9.10.2.1. Malware Analysis as a Service
9.10.2.1.1. Free Services
9.10.2.1.2. ReversingLabs
9.10.2.1.3. ThreatGrid
9.10.2.2. Sandbox Software
9.10.2.2.1. GFI
9.10.2.2.2. Joesecurity
9.10.2.2.3. Bluecoat
9.10.2.2.4. Payload Security
9.10.3. Threat Deception Technologies
9.10.3.1. Distributed Deception Platforms
9.10.3.1.1. Amgine Securus
9.10.3.1.2. Atomic Software Solutions
9.10.3.1.3. Attivo Networks
9.10.3.1.4. CounterCraft
9.10.3.1.5. CyberTrap
9.10.3.1.6. Cymmetria
9.10.3.1.7. GuardiCore
9.10.3.1.8. Illusive Networks
9.10.3.1.9. Javelin Networks
9.10.3.1.10. KeyFocus
9.10.3.1.11. SmokeScreen
9.10.3.1.12. Specter
9.10.3.1.13. TrapX
9.10.3.1.14. Vision Space Technologies
9.10.3.2. Network
9.10.3.2.1. ForeScout
9.10.3.2.2. Juniper Networks
9.10.3.2.3. Percipient Networks
9.10.3.2.4. Ridgeback Network Defense
9.10.3.2.5. Shadow Networks
9.10.3.3. Open Source
9.10.3.3.1. Honeypot
9.10.3.4. Web
9.10.3.4.1. Shape Security
9.10.3.4.2. Juniper Networks
9.10.3.4.3. CyberTrap
9.10.3.5. Files
9.10.3.5.1. Allure Security Technology
9.10.3.5.2. WatchPoint
10. VARs, Distributors, Market Logistics & Supply Chain
10.1. Cloud Service Brokerages
10.1.1. Bitnami
10.1.2. Ensim
10.1.2.1. http://www.ensim.com/
10.1.3. Gravitant
10.1.4. Jamcracker
10.1.4.1. http://www.jamcracker.com/
10.1.5. StandingCloud
10.2. Distribution/Channel/VARs
10.2.1. VARs, Resellers
10.2.1.1. China
10.2.1.1.1. Mainland China
10.2.1.1.2. Hong Kong
10.2.1.1.3. Taiwan
10.2.1.2. Emerging Asia Pacific
10.2.1.2.1. India
10.2.1.2.2. Indonesia
10.2.1.2.3. Malasia
10.2.1.2.4. Thailand
10.2.1.2.5. Philippines
10.2.1.3. Eurasia
10.2.1.3.1. Russian Federation
10.2.1.3.2. Kazakhstan
10.2.1.3.3. Ukraine
10.2.1.4. Europe
10.2.1.4.1. Eastern Europe
10.2.1.4.2. Western Europe
10.2.1.5. Latin America
10.2.1.5.1. Brazil
10.2.1.5.2. Chile
10.2.1.5.3. Columbia
10.2.1.5.4. Costa Rica
10.2.1.5.5. Ecuador
10.2.1.5.6. Bolivia
10.2.1.5.7. Venezuela
10.2.1.5.8. Cuba
10.2.1.5.9. Argentina
10.2.1.5.10. Buenos Aires
10.2.1.5.11. Mexico
10.2.1.5.12. Peru
10.2.1.6. Mature Asia Pacific
10.2.1.6.1. Australia
10.2.1.6.2. Japan
10.2.1.6.3. Singapore
10.2.1.7. Middle East and North Africa
10.2.1.7.1. Turkey
10.2.1.7.2. Israel
10.2.1.7.3. Saudi Arabia
10.2.1.7.4. South Africa
10.2.1.7.5. India
10.2.1.7.6. United Arab Emirates
10.2.1.8. North America
10.2.1.8.1. United States
10.2.1.8.2. Canada
10.2.1.9. Sub-Sahara Africa
10.2.1.9.1. South Africa
10.2.1.10. WorldWide
10.2.1.10.1. AT&T
10.2.1.10.2. BT
10.2.1.10.3. Optiv
10.2.1.10.4. SHI
10.2.1.10.5. Secureworks
10.2.1.10.6. Verizon Business
10.2.2. Distributors
10.2.2.1. China
10.2.2.1.1. AVNet
10.2.2.1.2. B & Data Technology Co. Ltd.
10.2.2.1.3. Beijing Advazone Electronic Limited Comp
10.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.
10.2.2.1.5. Digital China Technology LTD.
10.2.2.1.6. Ecs China
10.2.2.1.7. Edvance Technology (China) Limited
10.2.2.1.8. Huagai
10.2.2.1.9. M.Tech (Shanghai) Co., Ltd.
10.2.2.1.10. Shanghai S-I Information Tech. Ltd
10.2.2.1.11. Sinogrid Information Technology Ltd.
10.2.2.1.12. Sky Faith International Enterprise
10.2.2.2. Emerging Asia Pacific
10.2.2.2.1. India
10.2.2.2.2. Indonesia
10.2.2.2.3. Thailand
10.2.2.3. Eurasia
10.2.2.3.1. Russian Federation
10.2.2.3.2. Kazakhstan
10.2.2.4. Mature Asia Pacific
10.2.2.4.1. Singapore
10.2.2.4.2. Japan
10.2.2.4.3. South Korea
10.2.2.4.4. Australia
10.2.2.5. Middle East and South Africa
10.2.2.5.1. United Arab Emirates
10.2.2.5.2. South Africa
10.2.2.6. North America
10.2.2.6.1. Canada
10.2.2.6.2. United States
10.2.2.7. Sub-Sahara Africa
10.2.2.7.1. South Africa
10.2.2.8. Western Europe
10.2.2.8.1. United Kingdom
10.2.2.8.2. Germany
10.2.2.9. Worldwide
10.2.2.9.1. AVNet
10.2.2.9.2. Ingram Micro
10.2.2.9.3. LifeBoat Distribution
10.2.2.9.4. Tech Data
10.2.2.9.5. Westcon
10.2.2.10. Latin America
10.2.2.10.1. Mexico
10.2.2.10.2. Brazil
10.2.3. Reseller Programs
10.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm
10.2.4. Logistics/Deal Registration
10.2.4.1. Connectwise
10.3. Government Cyberwarrior (Personnel Estimates)
10.3.1. United States
10.3.1.1. NSA
10.3.1.1.1. Cyberwarrior Stats
10.3.1.2. Department of Defense
10.3.1.2.1. US Airforce
10.3.1.2.2. US Navy
10.3.1.2.3. DISA
10.3.2. Iran
10.3.2.1. 4500
10.3.3. Israel
10.3.3.1. Unit 8200
10.3.3.1.1. 5000
10.3.4. North Korea
10.3.4.1. 1000
10.4. Hardware and Chip Security
10.4.1. AMD
10.4.1.1. TPM
10.4.2. Cavium
10.4.2.1. Multi-Core Processors
10.4.3. Flow Processors
10.4.3.1. Netronome
10.4.4. Intel
10.4.4.1. TPM
10.4.4.2. Data Execution Protection
10.4.5. Systems
10.4.5.1. Janus Technologies
10.4.5.1.1. http://www.janustech.com/janus_secure_computer.html
10.5. Investment
10.5.1. ETFs
10.5.1.1. PureFunds
10.5.1.1.1. SYM:HACK
10.5.2. Venture Capitalists
10.5.2.1. Trident Capital
10.5.2.2. Andreesen Horowitz
10.6. Managed Service Enablement
10.6.1. Chartec
10.6.2. Jamcracker
10.7. Marketing/PR/AR
10.7.1. Analyst & Public Relations
10.7.1.1. Focused Image
10.7.1.1.1. http://www.focusedimage.com/
10.7.1.2. KTCpr
10.7.1.2.1. http://www.kahn-travel.com/
10.7.1.3. Madison Alexander PR
10.7.1.3.1. http://www.madisonalexanderpr.com/
10.7.1.4. Marc Gendron PR
10.7.1.4.1. http://www.mgpr.info/
10.7.1.5. Schwartz Communications
10.7.1.5.1. http://www.schwartzmsl.com/
10.7.1.6. Spalding Communications
10.7.1.7. Text 100
10.7.1.7.1. http://www.text100.com/
10.7.2. Campaign/Engagement
10.7.2.1. Jivox
10.7.2.2. WCG World
10.7.3. Creative/Design Services
10.7.3.1. Creative Circle
10.7.3.1.1. https://www.creativecircle.com/
10.7.3.2. Duarte
10.7.3.2.1. http://www.duarte.com/
10.7.3.3. Gig Productions
10.7.3.3.1. http://www.gigpros.com/index.php
10.7.3.4. Initiate Marketing
10.7.3.4.1. http://www.getinitiated.ca/
10.7.3.5. MN8Studio
10.7.3.5.1. http://www.mn8studio.com/
10.7.3.6. Text 100
10.7.3.6.1. http://www.text100.com/
10.7.4. Web Site Design
10.7.4.1. Baytech Web Design
10.7.4.1.1. http://www.baytechwebdesign.com/
10.7.4.2. EU Design Studios
10.7.4.2.1. http://eudesignstudio.com/
10.7.4.3. Pro Logic Web Services
10.7.4.3.1. http://www.prologicsoft.com/
10.7.5. Market Destinations (Sites)
10.7.5.1. CRN
10.7.5.2. Hak5
10.7.5.3. MSPMentor
10.7.5.4. Madison Logic
10.7.5.5. SCmagazine
10.7.5.6. TheVarGuy
10.7.6. Marketing Videos
10.7.6.1. Epipheo
10.7.6.1.1. http://www.epipheo.com/
10.7.7. Marketing/Branding Agencies
10.7.7.1. Focused Image
10.7.7.1.1. http://www.focusedimage.com/branding/
10.7.7.2. Hill and Knowlton
10.7.7.2.1. http://www.hkstrategies.com/
10.7.7.3. MetaDesign
10.7.7.3.1. http://www.metadesign.com/san-francisco
10.7.7.4. Ogilvy & Mather
10.7.7.5. Tailfin Marketing Communications
10.7.7.6. Toolbox Studios
10.8. OEMs & System Integrators
10.8.1. Appliance Integrators
10.8.1.1. Accton
10.8.1.1.1. http://www.accton.com/
10.8.1.2. Advantech
10.8.1.2.1. http://www.advantech.com/
10.8.1.3. Celestica
10.8.1.3.1. http://www.celestica.com/
10.8.1.4. Dan-el Technologies Ltd.
10.8.1.4.1. http://www.danel.co.il/
10.8.1.5. Flextronics
10.8.1.5.1. http://www.flextronics.com/
10.8.1.6. Plexus
10.8.1.6.1. http://www.plexus.com/
10.8.1.7. Reservoir Labs
10.8.1.7.1. https://www.reservoir.com/
10.8.2. Base Appliances
10.8.2.1. Advantech
10.8.2.2. Amax
10.8.2.3. Cas Well
10.8.2.4. Iron Systems
10.8.2.5. Lanner
10.8.2.6. Portwell
10.8.2.7. Tilera
10.8.3. Cards
10.8.3.1. Netronome
10.8.3.2. Tilera
10.8.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection
10.8.4. Encryption Acceleration
10.8.4.1. Intel
10.8.4.1.1. VPRO
10.8.4.2. Gemalto
10.8.4.2.1. Luna PCI
10.8.5. MSSP Appliances
10.8.5.1. 443 Networks
10.8.6. Managed Security OEMs
10.8.6.1. Digital Hands
10.8.7. Security Related Chips & CPUs
10.8.7.1. Broadcom
10.8.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection
10.8.7.2. Cavium
10.8.7.2.1. http://www.cavium.com
10.8.7.3. Lionic
10.8.7.3.1. http://www.lionic.com/
10.8.7.4. Netronome
10.8.7.4.1. http://www.netronome.com
10.8.7.5. Tilera
10.8.7.5.1. http://www.tilera.com/products/processors
10.8.7.6. Intel
10.8.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH
10.8.8. Software
10.8.8.1. Advanced Content Disarming and Reconstruction
10.8.8.1.1. OPSWAT
10.8.8.1.2. Votiro
10.8.8.2. Advanced Threat Protection - Virtual Execution Engines
10.8.8.2.1. ContentKeeper
10.8.8.2.2. Threat Track Security
10.8.8.3. Analytics/Graphing/Reporting OEMs
10.8.8.3.1. Embedded Analytics
10.8.8.3.2. Graphing/Reporting
10.8.8.4. Anti-Spam/Phishing
10.8.8.4.1. APWG
10.8.8.4.2. BrandProtect
10.8.8.4.3. Cyren
10.8.8.4.4. Ikarus
10.8.8.4.5. Internet Fraud Alert
10.8.8.4.6. ReturnPath
10.8.8.4.7. WebRoot Brightcloud
10.8.8.5. AntiMalware
10.8.8.5.1. Antiy
10.8.8.5.2. Avira
10.8.8.5.3. Bitdefender
10.8.8.5.4. Cyren
10.8.8.5.5. ESet
10.8.8.5.6. Fortinet
10.8.8.5.7. GFI
10.8.8.5.8. Ikarus
10.8.8.5.9. Intel Security
10.8.8.5.10. Kaspersky
10.8.8.5.11. Norman
10.8.8.5.12. OPSWAT
10.8.8.5.13. QuickHeal
10.8.8.5.14. ThreatTrack
10.8.8.5.15. Zillya
10.8.8.5.16. ZonerAntiVirus
10.8.8.6. Content Extraction & Search
10.8.8.6.1. Oracle
10.8.8.7. Encryption
10.8.8.7.1. Transport
10.8.8.8. Endpoint Security and Management
10.8.8.8.1. OPSWAT
10.8.8.9. File Content Decoding/Analysis/Fingerprinting
10.8.8.9.1. HP Autonomy
10.8.8.9.2. Attivio
10.8.8.9.3. GTB Technologies
10.8.8.10. IT Service Management
10.8.8.10.1. ITRP
10.8.8.11. Image Recognition
10.8.8.11.1. Image Analyzer
10.8.8.12. Intrusion Detection/Prevention Signatures
10.8.8.12.1. Proofpoint
10.8.8.13. Network Stack
10.8.8.13.1. IPV4/6
10.8.8.13.2. Deep Packet Inspection
10.8.8.13.3. SDN
10.8.8.14. Optical Character Recognition
10.8.8.14.1. Abbyy
10.8.8.15. Social Network Content Control
10.8.8.15.1. NetboxBlue
10.8.8.16. URL Categorization
10.8.8.16.1. Cyren
10.8.8.16.2. Ikarus
10.8.8.16.3. Malware
10.8.8.16.4. Webroot Brightcloud
10.8.8.16.5. Zvelo
10.8.8.17. Voice Recognition
10.8.8.17.1. STC
10.8.8.17.2. Nuance
10.8.9. Threat Intelligence
10.8.9.1. Anti-Phishing
10.8.9.1.1. Cyren
10.8.9.2. DNS DGA Feeds
10.8.9.2.1. Farsight Security
10.8.9.3. File Reputation
10.8.9.3.1. Findthatfile
10.8.9.3.2. Webroot
10.8.9.4. Fraud
10.8.9.4.1. Internet Fraud Alert
10.8.9.4.2. National Cyber-Forensics and Training Alliance
10.8.9.5. IP Block Lists
10.8.9.5.1. WebRoot Brightcloud
10.8.9.5.2. Cyren
10.8.9.5.3. Malwarebytes
10.8.9.6. IP Reputation
10.8.9.6.1. Cyren
10.8.9.6.2. WebRoot Brightcloud
10.8.9.7. Indicators of Compromise
10.8.9.7.1. FireEye
10.8.9.7.2. Proofpoint
10.8.9.7.3. Wapack labs
10.8.9.7.4. CIRCL
10.8.9.8. Malicious URL
10.8.9.8.1. Cyren
10.8.9.8.2. Findthatfile
10.8.9.8.3. Webroot
10.8.9.9. Predictive Intelligence
10.8.9.9.1. Seclytics
10.8.9.10. Vulnerability Research
10.8.9.10.1. Telus Security Labs
10.8.9.10.2. Vupen
10.8.9.11. Malware Samples
10.8.9.11.1. Virustotal
10.8.9.11.2. VirusSign
10.9. Product Testing
10.9.1. Generic Product Testing, Certification and Accreditation
10.9.1.1. Certifications
10.9.1.1.1. North America
10.9.1.1.2. European Union
10.9.1.2. Testing
10.9.1.2.1. United Kingdom
10.9.1.2.2. North America
10.9.1.2.3. Singapore
10.9.1.3. Accreditation
10.9.1.3.1. DOD
10.9.1.3.2. NSA
10.9.2. Anti-Malware Testing
10.9.2.1. AMTSO
10.9.2.2. AV-Test
10.9.2.3. Av-Comparatives
10.9.2.4. MRG Effitas
10.9.2.5. VirusBTN
10.9.3. Sponsored Product Review/Testing
10.9.3.1. Delta Testing LTD
10.9.3.2. Dennis Labs
10.9.3.3. Miercom
10.9.3.4. NSS Labs
10.9.3.5. Network Testing Labs
10.9.3.6. Tolly Group
10.9.3.7. West Coast Labs
10.9.4. Antimalware Standards Bodies
10.9.4.1. AMTSO
10.9.4.1.1. http://www.amtso.org/
10.10. Security Conferences
10.10.1. North America
10.10.1.1. United States
10.10.1.1.1. RSA
10.10.1.1.2. Gartner
10.10.1.1.3. Cornerstones of Trust
10.10.1.1.4. Annual Security Conference
10.10.1.1.5. SecurityBsides
10.10.1.1.6. ShmooCon
10.10.2. Europe
10.10.2.1. United Kingdom
10.10.2.1.1. RSA Conference
10.10.2.1.2. Gartner
10.10.2.2. Russia
10.10.2.2.1. Infosecurity Russia
10.10.3. Emerging Asia Pacific
10.10.4. Mature Asia Pacific
10.10.4.1. Australia
10.10.4.1.1. Gartner
10.10.4.2. Singapore
10.10.4.2.1. RSA
10.11. Staffing/Recruiting/Executive Search
10.11.1. Millard Group
10.11.2. Lynch Bowie Group
10.11.3. Robert Half
10.12. User Interface Design
10.12.1. Consulting
10.12.1.1. User Interface
10.12.1.1.1. BlinkUX
10.12.1.1.2. Sasa Technologies
10.12.1.1.3. Dabapps
10.12.1.2. Customer Survey
10.12.1.2.1. Techvalidate
10.12.2. HTML5 Visualization Libraries
10.12.2.1. Data-Driven Documents
10.12.2.1.1. http://d3js.org/
10.12.2.2. AngularJS
10.12.2.2.1. https://angularjs.org/
10.12.3. Icons
10.12.3.1. IconExperience
10.12.3.1.1. https://www.iconexperience.com/
10.12.3.2. FlatIcon
10.12.3.2.1. http://www.flaticon.com/packs/general-ui
10.12.3.3. ModernUIicons
10.12.3.3.1. http://modernuiicons.com/
10.12.3.4. Ui8
10.12.3.4.1. https://ui8.net/categories/icons
11. Security Consulting & Implementation
11.1. Forensics
11.1.1. Forensics
11.1.1.1. Incident Response
11.1.1.1.1. Crowdstrike
11.1.1.1.2. Cylance
11.1.1.1.3. Deloitte
11.1.1.1.4. Fidelis Cybersecurity
11.1.1.1.5. FireEye
11.1.1.1.6. Guidance Software
11.1.1.1.7. Maryman & Associates
11.1.1.1.8. NTT Coms Security
11.1.1.1.9. Nettitude
11.1.1.1.10. Optiv
11.1.1.1.11. Presecure
11.1.1.1.12. Secureworks
11.1.1.1.13. Verizon
11.1.1.2. E-Discovery & Computer Forensics
11.1.1.3. Endpoint Forensics
11.1.1.4. Network Forensics
11.2. Governance, Advisory, Assessment
11.2.1. Architecture and Design
11.2.2. Business Continuity
11.2.3. Compliance Review
11.2.4. Data Security Program
11.2.5. Governance, Compliance and Policy Design
11.2.5.1. Compliance Mandates
11.2.5.1.1. PCI
11.2.5.1.2. ISO
11.2.5.1.3. HITECH
11.2.5.1.4. HIPAA
11.2.6. People Centric Strategy
11.2.7. Policy Design
11.2.8. Program Assessment
11.2.9. Risk Assessment
11.2.10. Risk Management
11.2.10.1. Booz Allen Hamilton
11.2.10.2. Optiv
11.2.10.3. Cloud Risks
11.2.10.4. On Premise Infrastructure
11.2.10.5. Business Risk
11.2.11. Security Program Development
11.2.11.1. Optiv
11.2.11.2. FOX-IT
11.2.12. Strategy
11.2.13. Governance
11.2.13.1. Optiv
11.2.13.2. FOX-IT
11.2.13.3. Sec Consult
11.3. Operations
11.3.1. Application Security
11.3.1.1. Web
11.3.1.1.1. AppSec Consulting
11.3.1.1.2. Denim Group
11.3.1.1.3. Security Innovation
11.3.1.1.4. WhiteHat Security
11.3.1.1.5. Citigal
11.3.1.1.6. IOActive
11.3.1.2. Mobile
11.3.1.2.1. AppSec Consulting
11.3.1.2.2. Denim Group
11.3.1.3. Software Security Lifecycle (SDLC)
11.3.1.3.1. AppSecConsulting
11.3.1.3.2. Security Innovation
11.3.1.4. Custom Code
11.3.1.4.1. AppSec Consulting
11.3.1.4.2. Security Innovation
11.3.2. Application Security Vulnerability Assessement
11.3.3. Configuration Assessment
11.3.4. Device Security
11.3.5. Fraud, Identification and Privacy
11.3.6. Incident Response
11.3.6.1. Blackthorn Technologies
11.3.6.2. Crowdstrike
11.3.6.3. Dell SecureWorks
11.3.6.4. Deloitte
11.3.6.5. EY
11.3.6.6. FOX-IT
11.3.6.7. FireEye
11.3.6.8. High Tech Bridge
11.3.6.9. Ingalls Information Security
11.3.6.10. Intel Security
11.3.6.10.1. Foundstone
11.3.6.11. K2 Intelligence
11.3.6.12. Lares Consulting
11.3.6.13. Maryman
11.3.6.14. NTT Coms Security
11.3.6.15. Nettitude
11.3.6.16. Optiv
11.3.6.17. PWC
11.3.6.18. Presecure
11.3.6.19. Sec Consult
11.3.6.20. Stroz Friedberg
11.3.6.21. TrustMatta
11.3.7. Penetration Testing
11.3.7.1. AppSec Consulting
11.3.7.2. Core Security
11.3.7.3. Element Digital Security
11.3.7.3.1. http://www.edigitalsecurity.com/
11.3.7.4. FOX-IT
11.3.7.5. High Tech Bridge
11.3.7.6. Ingalls Information Security
11.3.7.7. K2 Intelligence
11.3.7.8. Matasano Security
11.3.7.9. NCC Group
11.3.7.10. Penetration Lab
11.3.7.11. Rapid7
11.3.7.12. Secureworks
11.3.7.13. TrustMatta
11.3.7.14. TrustedSec
11.3.7.15. WhiteHat Security
11.3.8. Remote Access
11.3.9. Secure Code Review
11.3.10. Threat Intelligence
11.3.11. Vulnerability Scan
11.4. Providers by Region
11.4.1. Latin America
11.4.2. Mature Asia/Pacific
11.4.3. Middle East and North Africa
11.4.3.1. Saudi Arabia
11.4.3.1.1. GBM
11.4.3.1.2. PGI
11.4.4. North America
11.4.4.1. A-G
11.4.4.1.1. AppsecConsulting
11.4.4.1.2. CSC
11.4.4.1.3. Control Case
11.4.4.1.4. CrowdStrike
11.4.4.1.5. Dell Secureworks
11.4.4.1.6. Deloitte
11.4.4.1.7. Denim Group
11.4.4.1.8. Ernst & Young
11.4.4.1.9. FireEye
11.4.4.1.10. ForSythe Solutions
11.4.4.1.11. Grant Thornton
11.4.4.2. H-L
11.4.4.2.1. HP
11.4.4.2.2. IBM
11.4.4.2.3. IOActive
11.4.4.2.4. Ingalls Information Security
11.4.4.2.5. Intel Security (Foundstone)
11.4.4.2.6. K2 Intelligence
11.4.4.2.7. Leidos
11.4.4.3. M-S
11.4.4.3.1. NTT Com Security
11.4.4.3.2. Neohapsis
11.4.4.3.3. Optiv
11.4.4.3.4. PWC
11.4.4.3.5. Paladion Networks
11.4.4.3.6. Perimeter eSecurity
11.4.4.3.7. Protivity
11.4.4.3.8. SISA
11.4.4.3.9. Solutionary
11.4.4.3.10. Stroz Friedberg
11.4.4.3.11. Sungard
11.4.4.3.12. Sword and Shield
11.4.4.3.13. Symantec
11.4.4.3.14. Syntegrity Networks
11.4.4.3.15. Sysnet Global Solutions
11.4.4.4. T-Z
11.4.4.4.1. Tevora Business Solutions
11.4.4.4.2. Trustwave
11.4.4.4.3. Verizon
11.4.4.4.4. WhiteHat Security
11.4.4.4.5. Zensar Technologies
11.4.5. Greater China
11.4.6. South Africa
11.4.6.1. Cyanre
11.4.6.1.1. http://www.cyanre.co.za/
11.4.7. Eurasia
11.4.7.1. Russia
11.4.8. Emerging Asia/Pacific
11.4.9. Canada
11.4.9.1. Conexsys
11.4.10. Europe
11.4.10.1. Eastern Europe
11.4.10.1.1. Poland
11.4.10.2. Western Europe
11.4.10.2.1. Italy
11.4.10.2.2. United Kingdom
12. Managed Security Services
12.1. Direct Tech Providers Managed Security
12.1.1. Asia Pacific
12.1.1.1. Australia
12.1.1.2. China
12.1.1.2.1. NSFOCUS
12.1.1.3. Singapore
12.1.2. Europe
12.1.2.1. GoGrid
12.1.2.1.1. Compliance Reporting (PCI, HIPAA)
12.1.2.1.2. Host IDS
12.1.2.1.3. Log Management
12.1.2.1.4. SIEM
12.1.2.1.5. Vulnerability Assessment
12.1.3. Global Providers
12.1.4. Middle East and North Africa
12.1.4.1. Saudi Arabia
12.1.4.2. United Arab Emirates
12.1.5. North America
12.1.5.1. United States
12.1.5.1.1. NSFOCUS
12.1.5.1.2. Check Point Software
12.1.5.1.3. Network Box
12.1.5.1.4. GoGrid
12.1.5.1.5. FireEye
12.1.5.1.6. Rapid7
12.2. Indirect Providers
12.2.1. Emerging Asia Pacific
12.2.1.1. India
12.2.1.1.1. CSS Corp PVT
12.2.1.1.2. Happiest Minds
12.2.1.1.3. SunGard Availability Services
12.2.1.1.4. Ecomnets India PVT. LTD
12.2.2. Europe
12.2.2.1. BT Global Services
12.2.2.2. Dell SecureWorks
12.2.2.3. Germany
12.2.2.3.1. Link11 GMBH
12.2.2.3.2. IPsoft
12.2.2.4. HP
12.2.2.5. Happiest Minds
12.2.2.5.1. Advanced Malware Protection
12.2.2.5.2. Application Activity Monitoring
12.2.2.5.3. Compliance Reporting
12.2.2.5.4. Database Activity Monitoring
12.2.2.5.5. File Integrity Monitoring
12.2.2.5.6. Log Management
12.2.2.5.7. Managed DLP
12.2.2.5.8. Network Forensics
12.2.2.5.9. SIEM
12.2.2.5.10. Unified Threat Management
12.2.2.5.11. Vulnerability Assessment
12.2.2.6. Integralis
12.2.2.7. Navisite
12.2.2.7.1. Mobile Device Management
12.2.2.8. Open Systems
12.2.2.9. Open Systems
12.2.2.10. Orange Business Services
12.2.2.11. SecureData
12.2.2.11.1. Firewall
12.2.2.11.2. IDS/IPS
12.2.2.11.3. SIEM
12.2.2.11.4. Data Loss Prevention
12.2.2.11.5. Secure Web Gateway
12.2.2.11.6. Secure Email Gateway
12.2.2.11.7. VPN/Remote Access
12.2.2.12. SunGard Availability Services
12.2.2.12.1. Firewalls
12.2.2.12.2. IAM
12.2.2.12.3. Intrusion Prevention
12.2.2.12.4. SIEM
12.2.2.12.5. Unified Threat Management
12.2.2.12.6. VPN
12.2.2.12.7. Web Application Firewall
12.2.2.13. Symantec
12.2.2.14. T-Systems
12.2.2.15. Tata Communications
12.2.2.16. Telefonica
12.2.2.16.1. DDoS Protection Service
12.2.2.16.2. Email Encryption
12.2.2.16.3. Email Security Gateway
12.2.2.16.4. Firewall Management
12.2.2.16.5. IAM
12.2.2.16.6. Intrusion Detection
12.2.2.16.7. Intrusion Prevention
12.2.2.16.8. Log Management
12.2.2.16.9. SIEM
12.2.2.16.10. Vulnerability Assessment
12.2.2.16.11. Web Security Gateway
12.2.2.16.12. Anti-Fraud
12.2.2.17. Verizon Business
12.2.2.17.1. Anti-DDoS
12.2.2.17.2. Email Security
12.2.2.17.3. Endpoint Protection
12.2.2.17.4. Firewall Management
12.2.2.17.5. Intrusion Detection
12.2.2.17.6. Intrusion Prevention
12.2.2.17.7. SIEM
12.2.2.17.8. Vulnerability Assessment
12.2.2.17.9. Web Security
12.2.2.18. Wipro
12.2.2.18.1. Email Security Gateway
12.2.2.18.2. Endpoint Security
12.2.2.18.3. Firewall Management
12.2.2.18.4. Fraud Management/Anti-Money Laundering
12.2.2.18.5. GRC
12.2.2.18.6. IAM
12.2.2.18.7. Intrusion Detection
12.2.2.18.8. Intrusion Prevention
12.2.2.18.9. SIEM
12.2.2.18.10. User Access Management
12.2.2.18.11. Web Security Gateway
12.2.3. Global Providers
12.2.3.1. AT&T
12.2.3.1.1. DDos Protection
12.2.3.1.2. Email/Data Encryption Services
12.2.3.1.3. Endpoint Anti-Virus
12.2.3.1.4. Endpoint Patch Management
12.2.3.1.5. Endpoint Policy Compliance
12.2.3.1.6. Mobile Device Security
12.2.3.1.7. Secure Email Gateway
12.2.3.1.8. Security Device Management
12.2.3.1.9. Web Application Firewall
12.2.3.1.10. Web Gateway (URL & Malware Filtering)
12.2.3.2. BEW Global
12.2.3.2.1. Data Loss Prevention
12.2.3.2.2. Web Security Gateway
12.2.3.2.3. Email Security Gateway
12.2.3.2.4. SIEM
12.2.3.2.5. Vulnerability Assessment
12.2.3.3. BT
12.2.3.4. Dell Secureworks
12.2.3.4.1. Advanced Malware Protection
12.2.3.4.2. Email Security Gateway
12.2.3.4.3. Firewall Management
12.2.3.4.4. Host IPS
12.2.3.4.5. IDS/IPS
12.2.3.4.6. Log Management
12.2.3.4.7. Log Retention
12.2.3.4.8. SIEM
12.2.3.4.9. Threat Intelligence
12.2.3.4.10. Unified Threat Management
12.2.3.4.11. Vulnerability Assessment
12.2.3.4.12. Web Application Firewall
12.2.3.4.13. Web Application Vulnerability Assessment
12.2.3.5. Dimension Data
12.2.3.6. HP
12.2.3.6.1. Access Managment
12.2.3.6.2. Data Loss Prevention
12.2.3.6.3. Email Security Gateway
12.2.3.6.4. Endpoint Encryption
12.2.3.6.5. Endpoint Protection
12.2.3.6.6. Intrusion Detection
12.2.3.6.7. Intrusion Prevention
12.2.3.6.8. Managed Incident Response
12.2.3.6.9. Remote Access Management
12.2.3.6.10. SIEM
12.2.3.6.11. Vulnerability Assessment
12.2.3.6.12. Web Application Vulnerability Assessment
12.2.3.6.13. Web Security Gateway
12.2.3.7. IBM
12.2.3.7.1. Email Security Gateway
12.2.3.7.2. Endpoint Patch Management
12.2.3.7.3. Endpoint Policy Management
12.2.3.7.4. Endpoint Protection
12.2.3.7.5. Firewall Management
12.2.3.7.6. IAM
12.2.3.7.7. Intrusion Detection
12.2.3.7.8. Intrusion Prevention
12.2.3.7.9. Log Management
12.2.3.7.10. Mobile Device Security
12.2.3.7.11. SIEM
12.2.3.7.12. Unified Threat Management
12.2.3.7.13. Vulnerability Assessment
12.2.3.7.14. Web Security Gateway
12.2.3.7.15. Web Vulnerability Assessment
12.2.3.8. Proficio
12.2.3.8.1. Email Security
12.2.3.8.2. Firewall Management
12.2.3.8.3. Incident Response
12.2.3.8.4. Log Management
12.2.3.8.5. Privileged Account Management
12.2.3.8.6. Regulatory and Polcy Compliance
12.2.3.8.7. SIEM
12.2.3.8.8. SOC Services
12.2.3.8.9. Vulnerability Assessment
12.2.3.8.10. Web Security
12.2.3.9. Tech Mahindra
12.2.3.9.1. Email Security
12.2.3.9.2. Endpoint Protection
12.2.3.9.3. Firewall Management
12.2.3.9.4. Identity and Access Management
12.2.3.9.5. Intrusion Detection
12.2.3.9.6. Intrusion Prevention
12.2.3.9.7. Log Management
12.2.3.9.8. SIEM
12.2.3.9.9. SOC Services
12.2.3.9.10. Vulnerability Assessment
12.2.3.9.11. Web Security
12.2.3.10. Telstra
12.2.3.11. Verizon Business
12.2.3.11.1. Anti-DDoS
12.2.3.11.2. Email Security
12.2.3.11.3. Endpoint Protection
12.2.3.11.4. Firewall Management
12.2.3.11.5. Intrusion Detection
12.2.3.11.6. Intrusion Prevention
12.2.3.11.7. SIEM
12.2.3.11.8. Vulnerability Assessment
12.2.3.11.9. Web Security
12.2.4. Greater China
12.2.4.1. Hong Kong
12.2.4.1.1. Network Box
12.2.4.1.2. Netswitch
12.2.4.2. BEW Global
12.2.4.2.1. Data Loss Prevention
12.2.4.2.2. Web Security Gateway
12.2.4.2.3. Email Security Gateway
12.2.4.2.4. SIEM
12.2.4.2.5. Vulnerability Assessment
12.2.4.3. Beijing
12.2.4.3.1. Netswitch
12.2.4.4. Shanghai
12.2.4.4.1. Shanghai Data Solution Co., Ltd
12.2.5. Latin America
12.2.5.1. Brazil
12.2.5.1.1. Arcon
12.2.5.1.2. Netcentrics
12.2.5.1.3. RealProtect
12.2.5.1.4. UOL Diveo
12.2.6. Mature Asia Pacific
12.2.6.1. Australia
12.2.6.1.1. Tesserent
12.2.6.1.2. Verizon
12.2.6.2. Singapore
12.2.6.2.1. Quann
12.2.6.2.2. NTT Singapore
12.2.6.2.3. Happiest Minds
12.2.6.2.4. Singtel
12.2.6.2.5. NCS Group
12.2.7. Middle East and North Africa
12.2.7.1. Saudi Arabia
12.2.7.2. United Arab Emirates
12.2.7.2.1. Du Telecom
12.2.7.2.2. Tata Communications
12.2.7.2.3. Dell Secureworks
12.2.7.2.4. Dimension Data
12.2.8. North America
12.2.8.1. Canada
12.2.8.1.1. Above Security
12.2.8.1.2. Bell Canada
12.2.8.1.3. EWA
12.2.8.1.4. Happiest Minds
12.2.8.1.5. Netpulse
12.2.8.1.6. OneStone (Formerly Seccuris)
12.2.8.1.7. SecureData
12.2.8.1.8. SentryMetrics
12.2.8.1.9. SunGard Availability Services
12.2.8.1.10. Virtual Guardian
12.2.8.2. United States
12.2.8.2.1. AT&T
12.2.8.2.2. Above Security
12.2.8.2.3. Alert Logic
12.2.8.2.4. Allstream
12.2.8.2.5. CGI
12.2.8.2.6. CSC
12.2.8.2.7. CSS Corp
12.2.8.2.8. CentraComm
12.2.8.2.9. CenturyLink- Savvis
12.2.8.2.10. Clone Systems
12.2.8.2.11. Compucom Systems
12.2.8.2.12. Cosentry
12.2.8.2.13. Dell Secureworks
12.2.8.2.14. Earthlink
12.2.8.2.15. Esentire
12.2.8.2.16. HCL Technologies
12.2.8.2.17. HP
12.2.8.2.18. Happiest Minds
12.2.8.2.19. IBM
12.2.8.2.20. Intelisecure
12.2.8.2.21. Leidos
12.2.8.2.22. LunarLine
12.2.8.2.23. Masergy Communications
12.2.8.2.24. Megapath
12.2.8.2.25. Morphick
12.2.8.2.26. My Digital Shield
12.2.8.2.27. NCA - Network Computing Architects
12.2.8.2.28. Navisite
12.2.8.2.29. Netfortris
12.2.8.2.30. Netswitch
12.2.8.2.31. Nuspire Networks
12.2.8.2.32. Rook Security
12.2.8.2.33. Secure Designs
12.2.8.2.34. SilverSky (Formerly Stillsecure/Perimeter esecurity)
12.2.8.2.35. Solutionary
12.2.8.2.36. SunGard Availability Services
12.2.8.2.37. Sword and Shield
12.2.8.2.38. Symantec
12.2.8.2.39. Symantec
12.2.8.2.40. Syntegrity Networks
12.2.8.2.41. Tesserent
12.2.8.2.42. Trustwave
12.2.8.2.43. Verizon Business
12.2.8.2.44. Wipro
12.2.9. Sub-Sahara Africa
12.2.9.1. AccessKenya
12.2.9.1.1. Firewall
12.2.9.1.2. Endpoint Protection
12.2.9.1.3. Secure Web Gateway
13. Risk, Compliance and Security Management
13.1. Firewall Workflow,Modeling & Change Management
13.1.1. Checkpoint Software
13.1.2. Firemon
13.1.3. ManageEngine
13.1.4. Redseal Networks
13.1.5. Skybox
13.1.6. Tufin
13.1.7. Veriflow
13.2. Legal and regulatory information governance
13.3. Privacy
13.4. Regulations, Awareness and Training
13.4.1. Computer Based Training
13.4.1.1. Aujas
13.4.1.2. BeOne Development
13.4.1.3. Digital Defense
13.4.1.4. Fishnet Security
13.4.1.5. Inspired eLearning
13.4.1.6. Junglemap
13.4.1.7. KnowBe4
13.4.1.8. MediaPro
13.4.1.9. PhishMe
13.4.1.10. Phishline
13.4.1.11. Popcorn Training
13.4.1.12. Sans Institute
13.4.1.13. Scipp International
13.4.1.14. Secure Mentem
13.4.1.15. Security Innovation
13.4.1.16. Security Mentor
13.4.1.17. The Security Awareness Company
13.4.1.18. ThreatSim
13.4.1.19. Wombat Security Technologies
13.4.2. Educational, Awareness & News Outlets
13.4.2.1. Government Led
13.4.2.1.1. Information Sharing and Analysis Centers (ISACs)
13.4.2.2. Periodicals & Target Roles
13.4.2.2.1. Channel
13.4.2.2.2. CISO/CSO
13.4.2.2.3. Security Engineers/Analysts
13.4.3. Industry Standards/Groups
13.4.3.1. Standards
13.4.3.1.1. Technical
13.4.3.2. Industry Groups
13.4.3.2.1. Audit
13.4.3.2.2. General Security
13.4.3.2.3. Forensics
13.4.4. Regulations, Public Standards and Contractual Mandates
13.4.4.1. Global
13.4.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)
13.4.4.1.2. NIST
13.4.4.2. Country/Region Specific
13.4.4.2.1. China
13.4.4.2.2. Singapore
13.4.4.2.3. European Union
13.4.4.2.4. United States
13.5. Security Policy and Response Orchaestration Platforms
13.5.1. FireEye
13.5.2. Phantom
13.5.2.1. https://www.phantom.us/
13.5.3. Proofpoint
13.6. Security Program and Governance
13.6.1. Governance, Risk and Compliance
13.6.1.1. eGRC
13.6.1.1.1. Software as a Service
13.6.1.1.2. Software
13.6.1.2. Compliance Oriented Private Cloud Hosting (COPCH)
13.6.1.2.1. Note: This list is not an attestation of compliance
13.6.1.3. Operational Risk Analytics
13.6.1.3.1. Algosec
13.6.1.3.2. Cyber Observer
13.6.1.3.3. Cytegic
13.6.1.3.4. Firemon
13.6.1.3.5. IBM
13.6.1.3.6. Redseal Networks
13.6.1.3.7. Kenna Security
13.6.1.3.8. Skybox
13.6.1.3.9. Software Development Lifecycle
13.6.1.3.10. Solarwinds
13.6.1.3.11. Tufin
13.6.1.4. Cloud & Container Compliance Assessment
13.6.1.4.1. Cavirin