Information Security Technologies & Markets - by JR&LP

Get Started. It's Free
or sign up with your email address
Information Security Technologies & Markets - by JR&LP by Mind Map: Information Security Technologies & Markets - by JR&LP

1. Cloud Security

1.1. Cloud/Virtualized Firewalls

1.1.1. Agent-Based CloudPassage Drawbridge Networks Illumio

1.1.2. Cisco

1.1.3. Citrix Xen Hillstone Networks Huawei Fortinet Palo Alto Networks

1.1.4. Container-Based ShieldX

1.1.5. Hyper-V Fortinet

1.1.6. KVM Hillstone Networks Juniper Networks Palo Alto Networks

1.1.7. Openstack OpenFlow Fortinet Juniper Networks

1.1.8. Public Cloud Virtual Appliances Barracuda Brocade Catbird Networks Check Point Software Juniper Networks Palo Alto Networks PfSense Sophos vArmour API-Driven Dome9 Illumio AWS Check Point Software Fortinet Palo Alto Networks Microsoft Azure Check Point Software Fortinet Container-Based

1.1.9. VMware Environments API Integration Check Point Software Fortinet Palo Alto Networks NSX Fortinet Check Point Software VM Appliance Barracuda Brocade Catbird Networks Check Point Software Fortinet Hillstone Networks Juniper Networks Palo Alto Networks PfSense Sophos vArmour Huawei

2. Security Operations & Incident Response

2.1. Digital Forensics/eDiscovery

2.1.1. Content, File and Endpoint Forensics eDiscovery Clearwell Kazeon Guidance Software Access Data Autonomy kCura FTI Technology Barracuda Networks Mobile Devices BlackBagTech Cellebrite Compelson Labs Guidance Software MSAB NowSecure Oxygen Forensics Paraben Corporation Endpoint Computing Systems ADF Solutions Access Data ArxSys BlackBag Technologies CRU Inc Cyfir Guidance Software Magnet Forensics Nuix OSForensics Paraben Corporation WindowsScope X-Ways Forensics Email Examination Systools Software Nuix Forensic File & Data Analysis Tools Cellebrite Cyfir Intella Magnet Forensics Nuix Systools Software Digital Forensics Case Management D3 Security Digital Investigation Manager Guidance Software Intaforensiscs Sentinel Data Sirentech Wynyard Group Memory Forensics FireEye Guidance Software Volatility Framework WindowsScope

2.1.2. eDiscovery Services Robert Half Advanced Discovery

2.1.3. eDiscovery Software AccessData Guidance Software Nuix Symantec

2.2. Fraud Prevention/Web Malware Monitoring

2.2.1. Fraud/Bot/Webscrape Prevention Software IBM (Formerly Trusteer) Intellinx RSA (EMC) ShieldSquare Appliances Distil Networks Imperva RSA Shape Security White Ops Software as a Service Akamai BioCatch BotScout Distil Networks Guardian Analytics Kount MarkMonitor NuData Security Shape Security ShieldSquare ThreatMetrix White Ops X-Cart iovation Virtual Appliances Distil Networks Imperva

2.2.2. Website & Ad Malware Monitoring Ad-Juster Globalsign Leverages Hackalert Hackalert Intel Security Siteadvisor QualysGuard RiskIQ Sucuri The Media Trust

2.3. Incident Response Legal Services

2.3.1. Information Law Group

2.4. Security Information and Event Management (SIEM), Log Management & Analytics

2.4.1. Application Security Intelligence Engine SAP iT-Cube Systems

2.4.2. Log Management EventTracker IGLOO Security Intel Security McAfee Enterprise Log Manager Kiwi Syslog Server LogEntries LogRythm Logscape Open Source Elasticsearch (ELK Stack) SEC (Simple Event Correlator) OSSIM Syslog-NG Octopussy Sawmill Splunk Sumo Logic Tripwire XpoLog

2.4.3. SIEM AlienVault OSSIM CorreLog EventTracker Fortinet HP Arcsight Hexis Cyber Solutions Hawkeye AP IBM Q1Radar IGLOO Security Intel Security NitroSecurity LogPoint LogRythm Novell Sentinel RSA Envision Sensage Solarwinds Splunk Sqrrl Tibco Loglogic eIQnetworks

2.4.4. Security Analytics Anomaly Analytics Intel Theta Ray Prelert eMite Niddel User and Entity Behavior Analytics (UEBA) Bay Dynamics Darktrace Detex Systems Exabeam Fortscale Gurcul HP IBM Interset Microsoft Niara ObserveIT Palerra Platfora Reveelium Secureonix Veriato

2.4.5. User and Entity Behavior Analytics (UEBA) Bae Systems Applied Intelligence Bay Dynamics Caspida Click Security Exabeam FICO Fortscale GuruCul IBM Intellinx Lockheed Martin Logtrust Mobile System 7 Novetta Solutions Oracle Rapid7 Raytheon SAS Institute Secureonix Splunk

2.5. Security Operations, Analytics and Reporting (SOAR)

2.5.1. Security Incident Response Platforms (SIRP) Agiliance DFLabs Demisto EMC(RSA) Empow Fido Hexadite ID Experts Proofpoint Resilient Systems Siemplify Syncurity

2.5.2. Threat and Vulnerability Management (TVM) Acuity Risk Management Agiliance BeyondTrust Core Security Cybersponse DFLabs EMC(RSA) Kenna Security NopSec RedSeal RiskSense Skybox Security Swimlane Siemplify

2.5.3. Security Operations Analytics Ayehu Cybersponse DFLabs EMC(RSA) Hexadite Proofpoint Resilient Systems Siemplify Swimlane

2.5.4. Security Operations Automation Platforms (SOAPS) Ayehu Cyberbit Cybersponse DFLabs Demisto Empow Security Fireye Hexadite IBM Phantom Cyber Swimlane Syncurity

2.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

2.6.1. Crowdsourced Application Security Testing Platforms Hyver Applause Bugcrowd BugFinders Cobalt Crowdtesters HackerOne

2.6.2. Managed Penetration Testing Services Cenzic WhiteHatSecurity

2.6.3. Penetration Testing Software Core Security Rapid7 Metasploit Pro Metasploit Express Trustwave

2.6.4. Vulnerability Assessment Software as a Service Vulnerability Management Phish Testing/Management Network-Based Vulnerability Assessment (On Premise) Core Security Digital Defense Fortinet Intel Security NSAuditor Ncircle Netasq Outpost24 Qualys RandomStorm Rapid 7 Trustwave Agent-Based Vulnerability Assessment BeyondTrust Qualys Secunia Tenable Mainframe Vulnerability Assessment Key Resources Inc. (KRI)

2.6.5. Vulnerability Correlation Application Vulnerability Correlation Code DX Denim Group Kenna Security NopSec Network Vulnerability Correlation Cybric Kenna Security NopSec RiskSense Secure Decisions

2.6.6. Vulnerability Research CSC HP DV Labs HotWAN Intel Security SecNiche Labs Sourcefire VRT Symantec VRLSec Vupen

3. Emerging Security Markets & Technologies

3.1. Application Security

3.1.1. Runtime Application Self-Protection (RASP) Arxan BrixBits Contrast Security HP Hdiv Security Immunio Metaforic OneASP Prevoty Promon SecuPi Signal Sciences Veracode Virsec Waratek WhiteHat Security whiteCryption

3.1.2. Enterprise App-Layer Protection SecuPI

3.1.3. AI-Based Applicaton Threat Defense Sophos Formerly Barricade Signal Sciences Threat-X

3.2. Cloud Security

3.2.1. Cloud Protection Gateways CipherCloud Netskope Perspecsys Skyhigh Networks Vaultive

3.2.2. Cloud Access Security Brokers User Activity Monitoring Adallom Avanan Bitglass Elastica Imperva Netscope SkyHigh Networks Data Loss Prevention Integrated DLP Encryption Adallom Avanan Managed Methods SkyHigh Networks Identity and Access Management Centrify Cloudiway Okta Ping Access Control Adallom Avanan Bitglass Elastica FireLayers Managed Methods Netskope Skyfence

3.2.3. Cloud Application Discovery Ciphercloud Elastica Netskope Skyhigh

3.2.4. Cloud Compliance and Security Risk Platforms AlertLogic Cavirin Cloudcheckr Harvest AI

3.3. Cross Domain Solutions

3.3.1. Advenica ZoneGuard SecuriRam

3.3.2. General Dynamics TacGuard Crossing Guard NanoXD

3.3.3. LockHeed Martin Trusted Manager

3.3.4. Tresys XD Air XD Bridge XD Guardian

3.3.5. Owl Computing Owl OPDS-100 Owl OPDS-100D OCDS-SFF

3.4. Data Security

3.4.1. Network-Based Data Cleansing DataStealth

3.4.2. Big Data Security BlueTalon

3.5. Endpoint Security

3.5.1. Endpoint Detection and Response (EDR) Agent-Based Carbon Black Cisco Countertack CrowdStrike Cyberbit Cyberreason Cylance Digital Guardian Dtex Systems Endgame Systems Fidelis Cybersecurity FireEye Forescout Guidance Software Hexis Cyber Solutions Invincea LogRhythm NexThink Panda Security RSA (EMC) SecDo SentinelOne Tanium Triumfant Verint Ziften Agentless BeyondTrust Cynet Fidelis WatchGuard InfoCyte LightCyber Outlier Security Promisec

3.5.2. Remote Browser-Isolation (remote dom) Amune Armor5 Authentic8 Dispel FireGlass Menlo Security Aurionpro Formerly Spikes Security

3.6. Identification, Authentication, Access Control & IAM

3.7. Internet of Things

3.7.1. Automotive Security Innovation

3.7.2. Embedded Security Security Innovation

3.8. Network & Infrastructure Security

3.8.1. Content Disarm and Reconstruction (CDR) Check Point Software Threat Extraction Glasswall Mimecast OPSWAT ODI Re-Sec Sasa-Software Solebit Labs Symantec DisArm TreSys Votiro

3.8.2. Malware Infection Analysis and Monitoring Services Lastline Guardia Cisco Formerly OpenDNS Qualys Seculert

3.8.3. Network Behavior and Analytics Industrial Control Systems (ICS) CyberX

3.8.4. Standalone Threat Intelligence Defense Solutions (STIDS) Bandura PoliWall Centripetal Networks Damballa Fidelis Cybersecurity FireEye Group IB Ixia LookingGlass Redsocks Redsocks Threat Defender ReversingLabs RiskAnalytics INtellishun Symantec APT Network

3.8.5. Unauthorized Endpoint Connection Prevention (UECP) Ensilo Intel Security

3.8.6. Software Defined WAN (SDwan) CloudGenix Pertino Velocloud Viptela Versa Networks

3.8.7. Virtual Container Security Apcera Aqua Security Illumio StackRox TwistLock

3.8.8. Network Security as a Service Cato Networks MyDigitalShield Zscaler

3.8.9. Software Defined Micro-Perimeter BlackRidge Networks Certes Networks Cryptzone Tempered Networks Unisys Stealth Vidder Waverly Labs

3.9. Risk, Compliance and Security Management

3.9.1. Security Ratings & Insurance Security Ratings Bitsight Technologies Cyence Prevalent QuadMetrics SecurityScoreCard Cyber Risk Insurance Balsiger Insurance HSB Group Philadelphia Insurance Companies Tennant Risk Services The Hartford Travelers

3.10. Security Operations, Incident Response

3.10.1. Intelligence/Data Feeds/Software & Services Security Intelligence and Data Analysis Platforms FireEye Threat Intelligence Platforms (TIPs) Anomali BAE Systems Buguroo Codenomicon Comilion Confer Eclectic IQ Infoblox Lockheed Martin Lookingglass Cyber Solutions Microsoft Palentir PierceMatrix Service Now (Formerly Brightpoint) Soltra ThreatConnect ThreatQuotient TruStar Threat Intelligence Services Human Intelligence - HUMINT (Strategic) Machine-Based (Tactical) Vulnerabilities and Exploits Data Loss Detection - External Collaborative Threat Investigation Platforms BAE System Detica IKANow Maltego NC4 Palentir

3.10.2. Malware Analysis Malware Analysis as a Service Free Services ReversingLabs ThreatGrid Sandbox Software GFI Joesecurity Bluecoat Payload Security

3.10.3. Threat Deception Technologies Distributed Deception Platforms Amgine Securus Atomic Software Solutions Attivo Networks CounterCraft CyberTrap Cymmetria GuardiCore Illusive Networks Javelin Networks KeyFocus SmokeScreen Specter TrapX Vision Space Technologies Network ForeScout Juniper Networks Percipient Networks Ridgeback Network Defense Shadow Networks Open Source Honeypot Web Shape Security Juniper Networks CyberTrap Files Allure Security Technology WatchPoint

4. VARs, Distributors, Market Logistics & Supply Chain

4.1. Cloud Service Brokerages

4.1.1. Bitnami

4.1.2. Ensim

4.1.3. Gravitant

4.1.4. Jamcracker

4.1.5. StandingCloud

4.2. Distribution/Channel/VARs

4.2.1. VARs, Resellers China Mainland China Hong Kong Taiwan Emerging Asia Pacific India Indonesia Malasia Thailand Philippines Eurasia Russian Federation Kazakhstan Ukraine Europe Eastern Europe Western Europe Latin America Brazil Chile Columbia Costa Rica Ecuador Bolivia Venezuela Cuba Argentina Buenos Aires Mexico Peru Mature Asia Pacific Australia Japan Singapore Middle East and North Africa Turkey Israel Saudi Arabia South Africa India United Arab Emirates North America United States Canada Sub-Sahara Africa South Africa WorldWide AT&T BT Optiv SHI Secureworks Verizon Business

4.2.2. Distributors China AVNet B & Data Technology Co. Ltd. Beijing Advazone Electronic Limited Comp Beijing HolyZone Technology Co.,Ltd. Digital China Technology LTD. Ecs China Edvance Technology (China) Limited Huagai M.Tech (Shanghai) Co., Ltd. Shanghai S-I Information Tech. Ltd Sinogrid Information Technology Ltd. Sky Faith International Enterprise Emerging Asia Pacific India Indonesia Thailand Eurasia Russian Federation Kazakhstan Mature Asia Pacific Singapore Japan South Korea Australia Middle East and South Africa United Arab Emirates South Africa North America Canada United States Sub-Sahara Africa South Africa Western Europe United Kingdom Germany Worldwide AVNet Ingram Micro LifeBoat Distribution Tech Data Westcon Latin America Mexico Brazil

4.2.3. Reseller Programs

4.2.4. Logistics/Deal Registration Connectwise

4.3. Government Cyberwarrior (Personnel Estimates)

4.3.1. United States NSA Cyberwarrior Stats Department of Defense US Airforce US Navy DISA

4.3.2. Iran 4500

4.3.3. Israel Unit 8200 5000

4.3.4. North Korea 1000

4.4. Hardware and Chip Security

4.4.1. AMD TPM

4.4.2. Cavium Multi-Core Processors

4.4.3. Flow Processors Netronome

4.4.4. Intel TPM Data Execution Protection

4.4.5. Systems Janus Technologies

4.5. Investment

4.5.1. ETFs PureFunds SYM:HACK

4.5.2. Venture Capitalists Trident Capital Andreesen Horowitz

4.6. Managed Service Enablement

4.6.1. Chartec

4.6.2. Jamcracker

4.7. Marketing/PR/AR

4.7.1. Analyst & Public Relations Focused Image KTCpr Madison Alexander PR Marc Gendron PR Schwartz Communications Spalding Communications Text 100

4.7.2. Campaign/Engagement Jivox WCG World

4.7.3. Creative/Design Services Creative Circle Duarte Gig Productions Initiate Marketing MN8Studio Text 100

4.7.4. Web Site Design Baytech Web Design EU Design Studios Pro Logic Web Services

4.7.5. Market Destinations (Sites) CRN Hak5 MSPMentor Madison Logic SCmagazine TheVarGuy

4.7.6. Marketing Videos Epipheo

4.7.7. Marketing/Branding Agencies Focused Image Hill and Knowlton MetaDesign Ogilvy & Mather Tailfin Marketing Communications Toolbox Studios

4.8. OEMs & System Integrators

4.8.1. Appliance Integrators Accton Advantech Celestica Dan-el Technologies Ltd. Flextronics Plexus Reservoir Labs

4.8.2. Base Appliances Advantech Amax Cas Well Iron Systems Lanner Portwell Tilera

4.8.3. Cards Netronome Tilera

4.8.4. Encryption Acceleration Intel VPRO Gemalto Luna PCI

4.8.5. MSSP Appliances 443 Networks

4.8.6. Managed Security OEMs Digital Hands

4.8.7. Security Related Chips & CPUs Broadcom Cavium Lionic Netronome Tilera Intel

4.8.8. Software Advanced Content Disarming and Reconstruction OPSWAT Votiro Advanced Threat Protection - Virtual Execution Engines ContentKeeper Threat Track Security Analytics/Graphing/Reporting OEMs Embedded Analytics Graphing/Reporting Anti-Spam/Phishing APWG BrandProtect Cyren Ikarus Internet Fraud Alert ReturnPath WebRoot Brightcloud AntiMalware Antiy Avira Bitdefender Cyren ESet Fortinet GFI Ikarus Intel Security Kaspersky Norman OPSWAT QuickHeal ThreatTrack Zillya ZonerAntiVirus Content Extraction & Search Oracle Encryption Transport Endpoint Security and Management OPSWAT File Content Decoding/Analysis/Fingerprinting HP Autonomy Attivio GTB Technologies IT Service Management ITRP Image Recognition Image Analyzer Intrusion Detection/Prevention Signatures Proofpoint Network Stack IPV4/6 Deep Packet Inspection SDN Optical Character Recognition Abbyy Social Network Content Control NetboxBlue URL Categorization Cyren Ikarus Malware Webroot Brightcloud Zvelo Voice Recognition STC Nuance

4.8.9. Threat Intelligence Anti-Phishing Cyren DNS DGA Feeds Farsight Security File Reputation Findthatfile Webroot Fraud Internet Fraud Alert National Cyber-Forensics and Training Alliance IP Block Lists WebRoot Brightcloud Cyren Malwarebytes IP Reputation Cyren WebRoot Brightcloud Indicators of Compromise FireEye Proofpoint Wapack labs CIRCL Malicious URL Cyren Findthatfile Webroot Predictive Intelligence Seclytics Vulnerability Research Telus Security Labs Vupen Malware Samples Virustotal VirusSign

4.9. Product Testing

4.9.1. Generic Product Testing, Certification and Accreditation Certifications North America European Union Testing United Kingdom North America Singapore Accreditation DOD NSA

4.9.2. Anti-Malware Testing AMTSO AV-Test Av-Comparatives MRG Effitas VirusBTN

4.9.3. Sponsored Product Review/Testing Delta Testing LTD Dennis Labs Miercom NSS Labs Network Testing Labs Tolly Group West Coast Labs

4.9.4. Antimalware Standards Bodies AMTSO

4.10. Security Conferences

4.10.1. North America United States RSA Gartner Cornerstones of Trust Annual Security Conference SecurityBsides ShmooCon

4.10.2. Europe United Kingdom RSA Conference Gartner Russia Infosecurity Russia

4.10.3. Emerging Asia Pacific

4.10.4. Mature Asia Pacific Australia Gartner Singapore RSA

4.11. Staffing/Recruiting/Executive Search

4.11.1. Millard Group

4.11.2. Lynch Bowie Group

4.11.3. Robert Half

4.12. User Interface Design

4.12.1. Consulting User Interface BlinkUX Sasa Technologies Dabapps Customer Survey Techvalidate

4.12.2. HTML5 Visualization Libraries Data-Driven Documents AngularJS

4.12.3. Icons IconExperience FlatIcon ModernUIicons Ui8

5. Infrastructure Protection

5.1. Active Directory Defense

5.1.1. Aorato

5.2. Cloud-Based Remote Access VPN

5.2.1. Check Point Capsule Cloud

5.2.2. Pertino

5.2.3. Soha

5.3. DNS-based Threat Prevention/Detection

5.3.1. Standalone Appliances Bluecat Networks Efficient IP Infoblox

5.3.2. Recursive DNS  Services Bluecat Networks Cisco OpenDNS Comodo CrowdStrike Infoblox Neustar Nominum Symantec ThreatStop Verisign

5.3.3. Firewalls Palo Alto Networks

5.4. Denial of Service Protection

5.4.1. Appliances Arbor Networks Prevail APS Check Point Software DDos Protector Corero Fortinet Genie Networks ATM Appliances NSFOCUS Radware WINS TECHNET LTD

5.4.2. Security as a Service HTTP/HTTPS Only DOSArrest Cloudflare MultiProtocol/Network Akamai Black Lotus Cloud Flare F5 Incapsula Link11 Neustar NexusGuard Verisign Inc

5.4.3. Clean Pipe Services AT&T Verizon

5.5. Fraud Prevention/Web Malware Monitoring

5.5.1. Fraud/Bot/Webscrape Prevention Software RSA (EMC) IBM (Formerly Trusteer) Intellinx Appliances RSA Distil Networks White Ops Software as a Service Akamai BioCatch Distil Networks Guardian Analytics Kount MarkMonitor ShieldSquare ThreatMetrix White Ops X-Cart iovation Virtual Appliances Distil Networks

5.5.2. Website & Ad Malware Monitoring Ad-Juster Globalsign Leverages Hackalert Hackalert Intel Security Siteadvisor QualysGuard RiskIQ Sucuri

5.6. Network Access Control (NAC)

5.6.1. Host Based Extreme Networks Genians Intel Security Symantec Trustwave

5.6.2. Network Based Aruba Networks Bradford Networks Cisco Forescout Juniper Networks Milton Security Group Portnox

5.7. Network Anonymization & Consumer VPN Services

5.7.1. AnchorFree Hotspot Shield


5.7.3. CyberGhost

5.7.4. Dispel

5.7.5. GoldenFrog

5.7.6. HMA ProVPN TorVPN

5.7.7. Okayfreedom

5.7.8. OpenVPN Shield Exchange

5.7.9. Private Wifi

5.7.10. Tor


5.8. Network Firewalls

5.8.1. Carrier Firewalls

5.8.2. Enterprise Firewalls Multifunction Enterprise Firewalls Bluedon Check Point Software Cisco Fortinet Huawei Palo Alto Networks Sonicwall Websense (Formerly Intel Security) Stateful Inspection - Traditional Firewalls Cisco Huawei Check Point Software

5.8.3. Multi-Funtion SMB Firewalls 443 Networks Bluedon Check Point Software CheckPoint Cisco Clavister Endian Fortinet Hillstone Networks Meraki PineApp Sangfor Sonicwall Sophos Trustwave Untangle WINS TechNet LTD WatchGuard

5.8.4. Open Source & Community IPTables IPchains PFSense Untangle

5.8.5. Router Firewalls

5.9. Network Intrusion Detection/Prevention

5.9.1. Predictive Modeling Cyactive Trustpipe

5.9.2. Signature Based AlienVault Snort Bricata CheckPoint Cisco Sourcefire Enterasys Fortinet HP TippingPoint IBM Intel Security Open Source Snort Symantec APT Network WINS TECHNET LTD

5.9.3. SCADA Radiflow

5.10. Network Packet Brokers

5.10.1. Adara

5.10.2. Apcon

5.10.3. Arista Networks

5.10.4. Cubro

5.10.5. Gigamon

5.10.6. IXIA

5.10.7. Interface Masters Technologies

5.10.8. JDSU

5.10.9. NetOptics

5.10.10. NetScout

5.10.11. VSS Monitoring

5.11. Network Traffic Analysis and Network Forensics

5.11.1. Flow Analysis/Metadata Extraction Arbor Networks Flowmon Networks IBM Intel Security NBA Lancope LogRythm

5.11.2. Forensic Capture with User Surveillance & Security Threat Analytics Access Data BlueCoat Cisco EMC FireEye Fluke Networks IBM IP Fabrics JDSU (Network Instruments) LightCyber NetAgent NetResec NetScout Niksun Novetta Solutions Nuix Packetsled Riverbed SS8 nPulse Technologies

5.11.3. Network Forensics Tools Alert Logic Formerly Click Security Corvil Cybersift Decision Group INC EMC FireEye IP Fabrics IPCopper Flowmon Networks KLOS NEXT Computing NetReSec Niksun Radisys Utimaco Vivavi Solutions WildPackets

5.11.4. Network Forensics Tools as a Service (NFTaaS) CloudShark

5.11.5. Network Taps Optical Apcon DataCom Systems FibreDyne Gigamon Glimmerglass M2Optics Netoptics Network Instruments VSS Monitoring nTAP

5.11.6. Network Traffic Analysis (NTA) Amgine Securus Arbor Networks Boeing Cisco Core Security (Formerly Damballa) Corvil Cyber adAPT Darktrace Eastwind Networks ExtraHop Networks Fidelis Cybersecurity Lancope LightCyber Novetta Solutions PacketSled Phirelight Qihoo 360 SkyEye RedJack SlashNext Splunk Taasera ThreatTrack Trustport Threat Intelligence Vectra Networks WireX

5.11.7. Raw Network Packet Capture Apcon Riverbed Netfort Wireshark NTOP Arbor Networks Comworth Netfort WireShark

5.12. Network-Based Advanced Threat Protection

5.12.1. Firewalls with Malware Sandbox Capabilities Barracuda Check Point Software Cisco Fortinet Huawei Juniper Networks Palo Alto Networks Sonicwall Sophos Watchguard

5.12.2. Appliance Based Malware Sandboxes AMGINE SECURUS AhnLab Bluecoat Check Point Software Emulator Blade Cisco ThreatGrid ContentKeeper Cyphort Damballa FireEye Fortinet FortiSandbox General Dynamics Fidelis Security Systems Huawei Firehunter Intel Security McAfee Advanced Threat Detection Appliance LastLine Palo Alto Networks WildFire Payload Security Qihoo SkyEye Techguard Security ThreatTrack Trend Micro Deep Discovery VMRay VeeDog WINS TECHNET LTD

5.12.3. Cloud-Based Malware Sandboxes Cisco ThreatGrid Fortinet Huawei Joe Security Lastline Netwitness Spectrum Palo Alto Networks WildFire Qihoo SkyEye Sonicwall


5.13.1. Monitoring CRITIFENSE Cyberbit PFP Cybersecurity

5.13.2. SCADA Firewalls BAE Systems Bayshore Networks Check Point Software Endian Fortinet Tofino Security

5.14. SSL Inspection Appliances

5.14.1. A10 Networks

5.14.2. Bluecoat

5.14.3. ResolutionOne

5.14.4. VSS Monitoring

5.14.5. SourceFire

5.15. Software Defined Micro-Perimeter

5.15.1. BlackRidge Networks

5.15.2. Certes Networks

5.15.3. Cryptzone

5.15.4. Tempered Networks

5.15.5. Unisys Stealth

5.15.6. Vidder

5.15.7. Waverly Labs

5.16. Virtual Private Networking (VPN/SSL VPN)

5.16.1. IPSec VPN Concentrators Certes Networks CheckPoint Software Cisco Mako Networks

5.16.2. Layer 2 Encryption Certes Networks

5.16.3. Layer 4 Encryption Certes Networks

5.16.4. SSL VPN AhnLab Array Networks Barracuda Networks Check Point Software Cisco Citrix F5 Networks Fortinet Hillstone Networks Juniper NetGear Sonicwall Stonesoft WatchGuard

5.16.5. Multi-Path Dynamic VPN Secret Double Octopus Dispersive Networks

5.17. Web/Email Protection

5.17.1. Secure Email Gateways Alt-N Technologies Bluecoat Fortinet GWAVA Intel Security Proofpoint Re-Sec Sonicwall Symantec Trustwave Voitiro Websense iBoss

5.17.2. Secure Web Gateways Anchiva Bluecoat ContentKeeper GWAVA Intel Security Re-Sec Symantec Trustwave Websense iBoss

5.17.3. Security as a Service Web & Email SaaS Appriver Barracuda Bitglass Cisco Intel Security MailGuard Spamina Symantec Total Defense TotalDefense Websense Zscaler Web Only Bluecoat ContentKeeper OpenDNS Websense Zscaler Secure Email Gateways Agari CloudMark Proofpoint Return Path Spam Experts Spam Titan Spamina ValiMail Anti-Phishing Amgine Securus Area1 Security CloudMark Cymbel Cyveillance FireEye MailGuard MediaPro Phishlabs ThreatTrack Votiro Webroot ZapFraud

6. Security Consulting & Implementation

6.1. Forensics

6.1.1. Forensics Incident Response Crowdstrike Cylance Deloitte Fidelis Cybersecurity FireEye Guidance Software Maryman & Associates NTT Coms Security Nettitude Optiv Presecure Secureworks Verizon E-Discovery & Computer Forensics Endpoint Forensics Network Forensics

6.2. Governance, Advisory, Assessment

6.2.1. Architecture and Design

6.2.2. Business Continuity

6.2.3. Compliance Review

6.2.4. Data Security Program

6.2.5. Governance, Compliance and Policy Design Compliance Mandates PCI ISO HITECH HIPAA

6.2.6. People Centric Strategy

6.2.7. Policy Design

6.2.8. Program Assessment

6.2.9. Risk Assessment

6.2.10. Risk Management Booz Allen Hamilton Optiv Cloud Risks On Premise Infrastructure Business Risk

6.2.11. Security Program Development Optiv FOX-IT

6.2.12. Strategy

6.2.13. Governance Optiv FOX-IT Sec Consult

6.3. Operations

6.3.1. Application Security Web AppSec Consulting Denim Group Security Innovation WhiteHat Security Citigal IOActive Mobile AppSec Consulting Denim Group Software Security Lifecycle (SDLC) AppSecConsulting Security Innovation Custom Code AppSec Consulting Security Innovation

6.3.2. Application Security Vulnerability Assessement

6.3.3. Configuration Assessment

6.3.4. Device Security

6.3.5. Fraud, Identification and Privacy

6.3.6. Incident Response Blackthorn Technologies Crowdstrike Dell SecureWorks Deloitte EY FOX-IT FireEye High Tech Bridge Ingalls Information Security Intel Security Foundstone K2 Intelligence Lares Consulting Maryman NTT Coms Security Nettitude Optiv PWC Presecure Sec Consult Stroz Friedberg TrustMatta

6.3.7. Penetration Testing AppSec Consulting Core Security Element Digital Security FOX-IT High Tech Bridge Ingalls Information Security K2 Intelligence Matasano Security NCC Group Penetration Lab Rapid7 Secureworks TrustMatta TrustedSec WhiteHat Security

6.3.8. Remote Access

6.3.9. Secure Code Review

6.3.10. Threat Intelligence

6.3.11. Vulnerability Scan

6.4. Providers by Region

6.4.1. Latin America

6.4.2. Mature Asia/Pacific

6.4.3. Middle East and North Africa Saudi Arabia GBM PGI

6.4.4. North America A-G AppsecConsulting CSC Control Case CrowdStrike Dell Secureworks Deloitte Denim Group Ernst & Young FireEye ForSythe Solutions Grant Thornton H-L HP IBM IOActive Ingalls Information Security Intel Security (Foundstone) K2 Intelligence Leidos M-S NTT Com Security Neohapsis Optiv PWC Paladion Networks Perimeter eSecurity Protivity SISA Solutionary Stroz Friedberg Sungard Sword and Shield Symantec Syntegrity Networks Sysnet Global Solutions T-Z Tevora Business Solutions Trustwave Verizon WhiteHat Security Zensar Technologies

6.4.5. Greater China

6.4.6. South Africa Cyanre

6.4.7. Eurasia Russia

6.4.8. Emerging Asia/Pacific

6.4.9. Canada Conexsys

6.4.10. Europe Eastern Europe Poland Western Europe Italy United Kingdom

7. Managed Security Services

7.1. Direct Tech Providers Managed Security

7.1.1. Asia Pacific Australia China NSFOCUS Singapore

7.1.2. Europe GoGrid Compliance Reporting (PCI, HIPAA) Host IDS Log Management SIEM Vulnerability Assessment

7.1.3. Global Providers

7.1.4. Middle East and North Africa Saudi Arabia United Arab Emirates

7.1.5. North America United States NSFOCUS Check Point Software Network Box GoGrid FireEye Rapid7

7.2. Indirect Providers

7.2.1. Emerging Asia Pacific India CSS Corp PVT Happiest Minds SunGard Availability Services Ecomnets India PVT. LTD

7.2.2. Europe BT Global Services Dell SecureWorks Germany Link11 GMBH IPsoft HP Happiest Minds Advanced Malware Protection Application Activity Monitoring Compliance Reporting Database Activity Monitoring File Integrity Monitoring Log Management Managed DLP Network Forensics SIEM Unified Threat Management Vulnerability Assessment Integralis Navisite Mobile Device Management Open Systems Open Systems Orange Business Services SecureData Firewall IDS/IPS SIEM Data Loss Prevention Secure Web Gateway Secure Email Gateway VPN/Remote Access SunGard Availability Services Firewalls IAM Intrusion Prevention SIEM Unified Threat Management VPN Web Application Firewall Symantec T-Systems Tata Communications Telefonica DDoS Protection Service Email Encryption Email Security Gateway Firewall Management IAM Intrusion Detection Intrusion Prevention Log Management SIEM Vulnerability Assessment Web Security Gateway Anti-Fraud Verizon Business Anti-DDoS Email Security Endpoint Protection Firewall Management Intrusion Detection Intrusion Prevention SIEM Vulnerability Assessment Web Security Wipro Email Security Gateway Endpoint Security Firewall Management Fraud Management/Anti-Money Laundering GRC IAM Intrusion Detection Intrusion Prevention SIEM User Access Management Web Security Gateway

7.2.3. Global Providers AT&T DDos Protection Email/Data Encryption Services Endpoint Anti-Virus Endpoint Patch Management Endpoint Policy Compliance Mobile Device Security Secure Email Gateway Security Device Management Web Application Firewall Web Gateway (URL & Malware Filtering) BEW Global Data Loss Prevention Web Security Gateway Email Security Gateway SIEM Vulnerability Assessment BT Dell Secureworks Advanced Malware Protection Email Security Gateway Firewall Management Host IPS IDS/IPS Log Management Log Retention SIEM Threat Intelligence Unified Threat Management Vulnerability Assessment Web Application Firewall Web Application Vulnerability Assessment Dimension Data HP Access Managment Data Loss Prevention Email Security Gateway Endpoint Encryption Endpoint Protection Intrusion Detection Intrusion Prevention Managed Incident Response Remote Access Management SIEM Vulnerability Assessment Web Application Vulnerability Assessment Web Security Gateway IBM Email Security Gateway Endpoint Patch Management Endpoint Policy Management Endpoint Protection Firewall Management IAM Intrusion Detection Intrusion Prevention Log Management Mobile Device Security SIEM Unified Threat Management Vulnerability Assessment Web Security Gateway Web Vulnerability Assessment Proficio Email Security Firewall Management Incident Response Log Management Privileged Account Management Regulatory and Polcy Compliance SIEM SOC Services Vulnerability Assessment Web Security Tech Mahindra Email Security Endpoint Protection Firewall Management Identity and Access Management Intrusion Detection Intrusion Prevention Log Management SIEM SOC Services Vulnerability Assessment Web Security Telstra Verizon Business Anti-DDoS Email Security Endpoint Protection Firewall Management Intrusion Detection Intrusion Prevention SIEM Vulnerability Assessment Web Security

7.2.4. Greater China Hong Kong Network Box Netswitch BEW Global Data Loss Prevention Web Security Gateway Email Security Gateway SIEM Vulnerability Assessment Beijing Netswitch Shanghai Shanghai Data Solution Co., Ltd

7.2.5. Latin America Brazil Arcon Netcentrics RealProtect UOL Diveo

7.2.6. Mature Asia Pacific Australia Tesserent Verizon Singapore Quann NTT Singapore Happiest Minds Singtel NCS Group

7.2.7. Middle East and North Africa Saudi Arabia United Arab Emirates Du Telecom Tata Communications Dell Secureworks Dimension Data

7.2.8. North America Canada Above Security Bell Canada EWA Happiest Minds Netpulse OneStone (Formerly Seccuris) SecureData SentryMetrics SunGard Availability Services Virtual Guardian United States AT&T Above Security Alert Logic Allstream CGI CSC CSS Corp CentraComm CenturyLink- Savvis Clone Systems Compucom Systems Cosentry Dell Secureworks Earthlink Esentire HCL Technologies HP Happiest Minds IBM Intelisecure Leidos LunarLine Masergy Communications Megapath Morphick My Digital Shield NCA - Network Computing Architects Navisite Netfortris Netswitch Nuspire Networks Rook Security Secure Designs SilverSky (Formerly Stillsecure/Perimeter esecurity) Solutionary SunGard Availability Services Sword and Shield Symantec Symantec Syntegrity Networks Tesserent Trustwave Verizon Business Wipro

7.2.9. Sub-Sahara Africa AccessKenya Firewall Endpoint Protection Secure Web Gateway

8. Endpoint Security

8.1. Anti-Malware

8.1.1. Eastern Europe Czech Republic Avast TrustPort Denmark BullGuard Netherlands AVG Romania Bitdefender Slovakia ESET

8.1.2. Emerging Asia/Pacific India eScan K7 Computing

8.1.3. Latin America Spain Optenet

8.1.4. Mature Asia/Pacific China Qihoo Rising International Software South Korean AhnLab BKAV ESTsoft

8.1.5. Middle East and Africa Israel Check Point Software

8.1.6. North America Cyren Fortinet Intel Security MalwareBytes McAfee Microsoft PC Pitstop Reason Core Security Roboscan Symantec ThreatTrack Total Defense Trend Micro

8.1.7. Russia Kaspersky

8.1.8. Western Europe Austria Ikarus Security Finland F-Secure Germany Avira G-Data Kromtech Norway Norman United Kingdom Sophos Poland Arcabit

8.2. Application Isolation

8.2.1. Blue Ridge Networks

8.2.2. Bromium

8.2.3. Bufferzone

8.2.4. Invincea SandBoxie

8.2.5. VMware

8.3. Endpoint Sandboxes and Virtualized Containers

8.3.1. Endpoint Sandboxes Panda Sandboxie Bitdefender

8.3.2. Type-0 Hypervisors Lynxworks Zirtu

8.3.3. Process Isolation/Virtualization Avectco Bromium Invincea

8.4. Endpoint Intrusion Prevention

8.4.1. Arkoon StormShield

8.4.2. BeyondTrust

8.4.3. IBM

8.4.4. Landesk

8.4.5. McAfee

8.4.6. Safensoft

8.4.7. Symantec

8.5. Enterprise Mobility Mangement Suites

8.5.1. Absolute Software

8.5.2. AMware Airwatch

8.5.3. Blackberry

8.5.4. Citrix

8.5.5. Globo

8.5.6. Good Technologies

8.5.7. IBM

8.5.8. Landesk

8.5.9. MobileIron

8.5.10. Mojave

8.5.11. SAP

8.5.12. Sophos

8.5.13. Soti

8.5.14. Symantec

8.5.15. Tangoe

8.6. Application Control

8.6.1. AppSense

8.6.2. Avecto

8.6.3. Bit9

8.6.4. Landesk

8.6.5. Lumension

8.6.6. McAfee

8.6.7. Sophos

8.6.8. Symantec

8.6.9. Trend Micro

8.7. Exploit Technique Prevention Software

8.7.1. CyActive

8.7.2. CyBellum

8.7.3. Malwarebytes Anti-Exploit

8.7.4. Microsoft Microsoft EMET - FREE

8.7.5. Morphisec

8.7.6. Palo Alto Networks Endpoint

8.7.7. Sophos Intercept X

8.7.8. Trend Micro

8.7.9. ViRobot APT Shield

8.8. File Integrity Monitoring

8.8.1. Open Source 1. AIDE 2. Trend Micro 1. OSSEC 3. Samhain 4. Osiris 5. Integrit 6. Tripwire

8.8.2. Commercial Imperva Intel Security Tripwire

8.9. Malware Analysis

8.9.1. Botnets

8.9.2. Internet Identity

8.9.3. Malware Patrol

8.9.4. SpamHaus

8.9.5. Team Cymru

8.9.6. ThreatGrid

8.9.7. VirusTotal


8.9.9. JoeSecurity

8.9.10. Shadowserver

8.10. Mobile Device Management

8.10.1. Absolute Software

8.10.2. Beachhead Security

8.10.3. Blackberry

8.10.4. Citrix

8.10.5. Globo

8.10.6. Good Technologies

8.10.7. IBM

8.10.8. Landesk

8.10.9. MobileIron

8.10.10. Mojave

8.10.11. SAP

8.10.12. Sophos

8.10.13. Soti

8.10.14. Symantec

8.10.15. Tangoe

8.10.16. VMware Airwatch

8.11. Policy Assessment and System Configuration Management

8.11.1. BMC BMC Server Automation

8.11.2. Check Point Software Endpoint Policy Management

8.11.3. IBM IBM Endpoint Manager

8.11.4. Intel Security Policy Auditor

8.11.5. RedHat OpenSCAP

8.11.6. Saint Saint Security

8.11.7. Tripwire Tripwire Enterprise

9. Data & Collaboration Security

9.1. Data Governance and Classification

9.1.1. Expert Source

9.1.2. HP

9.1.3. IBM

9.1.4. Informatica

9.1.5. Nuix

9.1.6. Somansa

9.1.7. Titus

9.1.8. boldonjames

9.2. Data Loss Prevention (DLP)

9.2.1. Endpoint Data Classification and Tracking Banyan Solutions BoldonJames Digital Guardian HP IBM Identity Finder Mach1 Development Microsoft (Formerly Secure Islands) MinerEye Nuix Smartlogic Titus Varonis CoSoSys Mobile Symantec Websense Microsoft (Secure Islands) Windows Absolute Software CA Technologies Digital Guardian GTB Technologies Infowatch Intel Security RSA Microsoft (Secure Islands) Somansa Symantec Trustwave Watchful Software Raytheon-Websense Zecurion

9.2.2. Network Digital Guardian Fidelis Security Systems (Subsidiary of General Dynamics) Symantec InfoWatch

9.2.3. Secure Email Gateway Cisco Symantec Intel Security Somansa

9.2.4. Secure Web Gateway Intel Security Symantec Somansa

9.2.5. Breached Data Detection Consumer PwnedList Enterprise Infoarmor Ionic Hold Security

9.3. Database Security

9.3.1. Database Audit and Protection (DAP) Application Security, Inc BeyondTrust Big Data Platform DAP BlueTalon Cloudera Hortonworks IBM Imperva DataSunrise Fortinet GreenSQL IBM IRI Oracle SQL Server Imperva Intel Security Mentis Software Oracle Corp PentaSecurity Warevalley

9.3.2. Database Activity Monitoring DB Networks Somansa

9.4. Encryption/Tokenization

9.4.1. Big Data Gazzang Vormetric

9.4.2. Cloud/SAAS Encryption Appliances Office365 Ciphercloud Afore Solutions Perspecsys Software BoxCryptor CloudMask PrivateCore Trend Micro Viivo Voltage Security Software as a Service Trend Micro SooKasa Gemalto

9.4.3. Cryptographic Providers RSA Quintessence Microsoft

9.4.4. Data masking Oracle Dataguise Informatica IBM Voltage Security Green SQL Mentis Compuware Axis Privacy Analytics Camouflage Software Solix Technologies Net 2000

9.4.5. Database Gemalto Dark Matter Labs Vormetric

9.4.6. Email ZixCorp Encryptics

9.4.7. Encrypted USB Storage Apricorn Datalocker Integral Memory IronKey Kingston Virbatim

9.4.8. File/Folder Covertix IBM Mainframe SecureIslands Sophos SafeGuard Enterprise (Utimaco) Symantec (PGP) Vormetric WinMagic SecureDoc

9.4.9. Quantum Encryption IDQ Quintessence Labs Whitewood Encryption

9.4.10. Tokenization Protegrity

9.4.11. Whole Disk Intel Security Symantec (PGP) CheckPoint Software Encryption Management Wave Systems WinMagic SecureDoc Microsoft Bitlocker Sophos SafeGuard Enterprise (Utimaco) Trustwave DataControl Vormetric

9.5. File Analysis Software

9.5.1. Acaveo

9.5.2. Active Navigation

9.5.3. AvePoint

9.5.4. Beyond Recognition

9.5.5. Bloomberg

9.5.6. CommVault

9.5.7. Condrey

9.5.8. Covertix

9.5.9. DataGlobal

9.5.10. DataGravity

9.5.11. Equivio

9.5.12. HP Control Point

9.5.13. HiSoftware

9.5.14. IBM StoreIQ

9.5.15. Identifty Finder

9.5.16. Imperva

9.5.17. Index Engines

9.5.18. Kazoup

9.5.19. MailGuard

9.5.20. NTP Software

9.5.21. Novell

9.5.22. Nuix

9.5.23. Proofpoint

9.5.24. Stealthbits

9.5.25. Varonis

9.5.26. WatchDox

9.5.27. Whitebox Security

9.5.28. ZyLab

9.6. Hardware Security Modules (HSM)

9.6.1. Cloud HSM Amazon IBM

9.6.2. Hardware FutureX Gemalto HPE Safenet Thales

9.7. Software Defined Storage Security

9.7.1. Dispersive Networks

9.7.2. OceansBlue

9.8. eSignatures

9.8.1. Adobe eSign Services

9.8.2. Alphatrust

9.8.3. Docusign

9.8.4. Hellosign

9.8.5. Rightsignature

9.8.6. Sertifi

10. Identity and Access Management (IAM)

10.1. AD/Unix bridge

10.1.1. Centrify

10.2. Enterprise single sign-on (ESSO)

10.3. Externalized authorization management (EAM)

10.3.1. Axiomatics

10.3.2. Dell Quest (BitKoo)

10.4. IAM as a Service

10.4.1. Centrify

10.4.2. IBM (Formerly Lighthouse Security)

10.4.3. Identity Automation

10.4.4. Intel

10.4.5. Okta

10.4.6. Password Bank

10.4.7. Ping Identity

10.4.8. Sailpoint

10.4.9. Symplifyed

10.4.10. iWelcome

10.5. Identity governance and administration

10.5.1. CA Technologies

10.5.2. IBM Security

10.5.3. Oracle

10.5.4. RSA (Aveksa)

10.6. Privileged account management (PAM)

10.6.1. BeyondTrust

10.6.2. Lieberman Software

10.6.3. Cyber Ark

10.6.4. Dell

10.6.5. Centrify

10.7. Public Certificate Authorities

10.7.1. Comodo

10.7.2. Crosscert

10.7.3. Geotrust

10.7.4. Godaddy

10.7.5. Symantec (Formerly VeriSign)

10.8. User Authentication

10.8.1. Tokens OOB authentication SMS Voice Push Email Social media OTP tokens OTP hardware tokens OTP software tokens for smart phones X.509 tokens Other tokens ANECT AS - ALUCID

10.8.2. Contextual authentication Google Trust API

10.8.3. KBA It's Me Security

10.8.4. Biometrics Behavioral Typing rhythm/keystroke dynamics Voice recognition Biological Face recognition Fingerprint

10.8.5. Wide-focus vendors Alladin-RD CA Technologies Entrust HID Global RSA Adaptive Auth Gemalto Symantec Technology Nexus VASCO

10.9. User Privilege Management

10.9.1. Appsense

10.9.2. Ariella

10.9.3. Avectco

10.9.4. BeyondTrust

10.9.5. Centrify

10.9.6. CionSystems

10.9.7. CrossIdeas

10.9.8. Dell

10.9.9. Lieberman Software

10.9.10. Viewfinity

10.10. Identity Blockchain

10.10.1. 2Way.IO

10.10.2. Blockstack Open Source


10.10.4. KYC-Chain

10.10.5. Uport

10.10.6. airbitz

10.10.7. hypr


10.10.9. trunomi

10.10.10. uniquid

11. Application Security

11.1. Web Application Firewalls (WAF) & Application Security

11.1.1. Web Application Firewalls Virtualized Appliances A10 Networks AlertLogic Amazon AWS Barracuda Networks BeeWare DenyAll Ergon Informatik AG F5 Fortinet Forum Systems Imperva PentaSecurity Trustwave Citrix Physical Appliances A10 Networks AdNovum AlertLogic Anchiva Barracuda Networks BeeWare BugSec Citrix DBAPPSecurity DPtech Dell Sonicwall DenyAll Ergon Informatik F5 Fortinet Forum Systems HP Imperva NSFocus PentaSecurity Positive Technologies RadWare Trustwave WINS TECHNET LTD Software Dedicated Software Open Source Web Server Modules Managed Services Dell Secureworks AT&T Verizon Business Software as a Service Akamai AlertLogic Anquanbao ArmorLogic BinarySec CloudFlare DenyAll FireBlade Imperva (Incapsula) Incapsula PowerCDN Qualys Securi Signal Sciences Soha ZenEdge

11.1.2. Web Threat Disruption Technology Software NuCaptcha NuData Appliances Juniper Shape Security Open Source Google Hack Honeypot

11.2. Web Application Security

11.2.1. Code Review Products HP IBM

11.2.2. Web Application Vulnerability Scanning Services Cenzic Controlscan High-Tech Bridge McAfee Secure Qualys Securi Sitelock Trustwave WebSecurify WhiteHat Security

11.2.3. Scanning Software Open Source Arachni Scanner Subgraph W3af Wapiti Watcher Commercial Accunetix BeyondTrust Cenzic HP MavitunaSecurity NTObjectives Nstalker Portswigger Syhunt

12. Risk, Compliance and Security Management

12.1. Firewall Workflow,Modeling & Change Management

12.1.1. Checkpoint Software

12.1.2. Firemon

12.1.3. ManageEngine

12.1.4. Redseal Networks

12.1.5. Skybox

12.1.6. Tufin

12.1.7. Veriflow

12.2. Legal and regulatory information governance

12.3. Privacy

12.4. Regulations, Awareness and Training

12.4.1. Computer Based Training Aujas BeOne Development Digital Defense Fishnet Security Inspired eLearning Junglemap KnowBe4 MediaPro PhishMe Phishline Popcorn Training Sans Institute Scipp International Secure Mentem Security Innovation Security Mentor The Security Awareness Company ThreatSim Wombat Security Technologies

12.4.2. Educational, Awareness & News Outlets Government Led Information Sharing and Analysis Centers (ISACs) Periodicals & Target Roles Channel CISO/CSO Security Engineers/Analysts

12.4.3. Industry Standards/Groups Standards Technical Industry Groups Audit General Security Forensics

12.4.4. Regulations, Public Standards and Contractual Mandates Global Payment Card Industry Data Security Standards (PCIDSS) NIST Country/Region Specific China Singapore European Union United States

12.5. Security Policy and Response Orchaestration Platforms

12.5.1. FireEye

12.5.2. Phantom

12.5.3. Proofpoint

12.6. Security Program and Governance

12.6.1. Governance, Risk and Compliance eGRC Software as a Service Software Compliance Oriented Private Cloud Hosting (COPCH) Note: This list is not an attestation of compliance Operational Risk Analytics Algosec Cyber Observer Cytegic Firemon IBM Redseal Networks Kenna Security Skybox Software Development Lifecycle Solarwinds Tufin Cloud & Container Compliance Assessment Cavirin

13. Random Knowledge

13.1. Detection Methods

13.1.1. File Analysis Computed Hash Uniqueness Metadata Attributes File Content Inspection File Headers Temporal Analysis Temporal Analysis with Prevalence Time/Date Certificate and Signature Evaluation (PKI) Packing Method Multi-packing Analysis

13.1.2. Network Specific Protocol/File/Session Decode & Analysis File Extraction Playback (Surveillance) File/Session Viewing Correlation Machine Learning (AI) Network Flow Analysis Machine Learning (AI) Application Layer Analysis Classification, Correlation , Deviance from Baselines (Heuristics) Deep Packet Inspection (DPI) Application Command and Input Analysis IP Layer Analysis TCP/UDP Ports IP Address

13.1.3. Malware Behavioral Evaluations Persistence Installs as System Service Installs Registry Keys in Startup locations Modifies filesystem in specific locations Suspicious Behaviors Evaluated Attempts to login to systems that a specific user credential is not normally used on Becomes another user on the system CPU of Processes Spawned is high Connects with a known bad URL or IP Address Escalates privileges Examines the Documents Folder or User Document Folders File Isn't widely prevalent in user population Injects data into memory of another running process Modifies memory of another process Opens TCP/IP Connections to other hosts Performs a network port sweep Process executes net use DOS command inside command.exe Process spawns command.exe Removes logs/events of application logs or operating system Self Delete of files Self-copy of files Starts to repeatedly call the crypt function (ransom sign) Time of execution is not normal in context of historical analysis

13.1.4. User Activity on system when user's employment is in termination status Deviates from past user behavior Device not historically associated to user Login time anamoly Login time outside user's home timezone Privileged data accessed Volumetric analysis Deviation from baseline Cut-paste function used Remote access and time of day abnormal from baselines User authentication failure User's browser or viewer is not the same as the baseline User is logging into system remotely and locally simultaneously User is logging into system remotely  (not expected) User is logging into system remotely at an abnormal time User is abnormally leveraging applications that are administrative in nature (Control Panel, Command.exe, Group Policy Editor, etc)