Information Security Technologies & Markets - by JR&LP

登録は簡単!. 無料です
または 登録 あなたのEメールアドレスで登録
Information Security Technologies & Markets - by JR&LP により Mind Map: Information Security Technologies & Markets - by JR&LP

1. Cloud Security

1.1. Cloud/Virtualized Firewalls

1.1.1. Agent-Based

1.1.1.1. CloudPassage

1.1.1.2. Drawbridge Networks

1.1.1.3. Illumio

1.1.2. Cisco

1.1.3. Citrix Xen

1.1.3.1. Hillstone Networks

1.1.3.2. Huawei

1.1.3.3. Fortinet

1.1.3.4. Palo Alto Networks

1.1.4. Container-Based

1.1.4.1. ShieldX

1.1.5. Hyper-V

1.1.5.1. Fortinet

1.1.6. KVM

1.1.6.1. Hillstone Networks

1.1.6.2. Juniper Networks

1.1.6.3. Palo Alto Networks

1.1.7. Openstack

1.1.7.1. OpenFlow

1.1.7.1.1. Fortinet

1.1.7.2. Juniper Networks

1.1.8. Public Cloud

1.1.8.1. Virtual Appliances

1.1.8.1.1. Barracuda

1.1.8.1.2. Brocade

1.1.8.1.3. Catbird Networks

1.1.8.1.4. Check Point Software

1.1.8.1.5. Juniper Networks

1.1.8.1.6. Palo Alto Networks

1.1.8.1.7. PfSense

1.1.8.1.8. Sophos

1.1.8.1.9. vArmour

1.1.8.2. API-Driven

1.1.8.2.1. Dome9

1.1.8.2.2. Illumio

1.1.8.3. AWS

1.1.8.3.1. Check Point Software

1.1.8.3.2. Fortinet

1.1.8.3.3. Palo Alto Networks

1.1.8.4. Microsoft Azure

1.1.8.4.1. Check Point Software

1.1.8.4.2. Fortinet

1.1.8.5. Container-Based

1.1.9. VMware Environments

1.1.9.1. API Integration

1.1.9.1.1. Check Point Software

1.1.9.1.2. Fortinet

1.1.9.1.3. Palo Alto Networks

1.1.9.2. NSX

1.1.9.2.1. Fortinet

1.1.9.2.2. Check Point Software

1.1.9.3. VM Appliance

1.1.9.3.1. Barracuda

1.1.9.3.2. Brocade

1.1.9.3.3. Catbird Networks

1.1.9.3.4. Check Point Software

1.1.9.3.5. Fortinet

1.1.9.3.6. Hillstone Networks

1.1.9.3.7. Juniper Networks

1.1.9.3.8. Palo Alto Networks

1.1.9.3.9. PfSense

1.1.9.3.10. Sophos

1.1.9.3.11. vArmour

1.1.9.3.12. Huawei

2. Infrastructure Protection

2.1. Active Directory Defense

2.1.1. Aorato

2.1.1.1. http://www.aorato.com/

2.2. Cloud-Based Remote Access VPN

2.2.1. Check Point

2.2.1.1. Capsule Cloud

2.2.2. Pertino

2.2.3. Soha

2.3. DNS-based Threat Prevention/Detection

2.3.1. Standalone Appliances

2.3.1.1. Bluecat Networks

2.3.1.2. Efficient IP

2.3.1.3. Infoblox

2.3.2. Recursive DNS  Services

2.3.2.1. Bluecat Networks

2.3.2.2. Cisco

2.3.2.2.1. OpenDNS

2.3.2.3. Comodo

2.3.2.4. CrowdStrike

2.3.2.5. Infoblox

2.3.2.6. Neustar

2.3.2.7. Nominum

2.3.2.8. Symantec

2.3.2.9. ThreatStop

2.3.2.10. Verisign

2.3.3. Firewalls

2.3.3.1. Palo Alto Networks

2.4. Denial of Service Protection

2.4.1. Appliances

2.4.1.1. Arbor Networks

2.4.1.1.1. Prevail APS

2.4.1.2. Check Point Software

2.4.1.2.1. DDos Protector

2.4.1.3. Corero

2.4.1.4. Fortinet

2.4.1.5. Genie Networks

2.4.1.5.1. ATM Appliances

2.4.1.6. NSFOCUS

2.4.1.7. Radware

2.4.1.8. WINS TECHNET LTD

2.4.1.8.1. http://www.wins21.co.kr/

2.4.2. Security as a Service

2.4.2.1. HTTP/HTTPS Only

2.4.2.1.1. DOSArrest

2.4.2.1.2. Cloudflare

2.4.2.2. MultiProtocol/Network

2.4.2.2.1. Akamai

2.4.2.2.2. Black Lotus

2.4.2.2.3. Cloud Flare

2.4.2.2.4. F5

2.4.2.2.5. Incapsula

2.4.2.2.6. Link11

2.4.2.2.7. Neustar

2.4.2.2.8. NexusGuard

2.4.2.2.9. Verisign Inc

2.4.3. Clean Pipe Services

2.4.3.1. AT&T

2.4.3.2. Verizon

2.5. Fraud Prevention/Web Malware Monitoring

2.5.1. Fraud/Bot/Webscrape Prevention

2.5.1.1. Software

2.5.1.1.1. RSA (EMC)

2.5.1.1.2. IBM (Formerly Trusteer)

2.5.1.1.3. Intellinx

2.5.1.2. Appliances

2.5.1.2.1. RSA

2.5.1.2.2. Distil Networks

2.5.1.2.3. White Ops

2.5.1.3. Software as a Service

2.5.1.3.1. Akamai

2.5.1.3.2. BioCatch

2.5.1.3.3. Distil Networks

2.5.1.3.4. Guardian Analytics

2.5.1.3.5. Kount

2.5.1.3.6. MarkMonitor

2.5.1.3.7. ShieldSquare

2.5.1.3.8. ThreatMetrix

2.5.1.3.9. White Ops

2.5.1.3.10. X-Cart

2.5.1.3.11. iovation

2.5.1.4. Virtual Appliances

2.5.1.4.1. Distil Networks

2.5.2. Website & Ad Malware Monitoring

2.5.2.1. Ad-Juster

2.5.2.2. Globalsign

2.5.2.2.1. Leverages Hackalert

2.5.2.3. Hackalert

2.5.2.4. Intel Security

2.5.2.4.1. Siteadvisor

2.5.2.5. QualysGuard

2.5.2.6. RiskIQ

2.5.2.7. Sucuri

2.6. Network Access Control (NAC)

2.6.1. Host Based

2.6.1.1. Extreme Networks

2.6.1.2. Genians

2.6.1.3. Intel Security

2.6.1.4. Symantec

2.6.1.5. Trustwave

2.6.2. Network Based

2.6.2.1. Aruba Networks

2.6.2.2. Bradford Networks

2.6.2.3. Cisco

2.6.2.4. Forescout

2.6.2.5. Juniper Networks

2.6.2.6. Milton Security Group

2.6.2.7. Portnox

2.7. Network Anonymization & Consumer VPN Services

2.7.1. AnchorFree Hotspot Shield

2.7.2. Anonymize.net

2.7.3. CyberGhost

2.7.4. Dispel

2.7.5. GoldenFrog

2.7.6. HMA ProVPN

2.7.6.1. TorVPN

2.7.7. Okayfreedom

2.7.8. OpenVPN Shield Exchange

2.7.9. Private Wifi

2.7.10. Tor

2.7.11. luminati.io

2.8. Network Firewalls

2.8.1. Carrier Firewalls

2.8.2. Enterprise Firewalls

2.8.2.1. Multifunction Enterprise Firewalls

2.8.2.1.1. Bluedon

2.8.2.1.2. Check Point Software

2.8.2.1.3. Cisco

2.8.2.1.4. Fortinet

2.8.2.1.5. Huawei

2.8.2.1.6. Palo Alto Networks

2.8.2.1.7. Sonicwall

2.8.2.1.8. Websense (Formerly Intel Security)

2.8.2.2. Stateful Inspection - Traditional Firewalls

2.8.2.2.1. Cisco

2.8.2.2.2. Huawei

2.8.2.2.3. Check Point Software

2.8.3. Multi-Funtion SMB Firewalls

2.8.3.1. 443 Networks

2.8.3.2. Bluedon

2.8.3.3. Check Point Software

2.8.3.4. CheckPoint

2.8.3.5. Cisco

2.8.3.6. Clavister

2.8.3.7. Endian

2.8.3.8. Fortinet

2.8.3.9. Hillstone Networks

2.8.3.10. Meraki

2.8.3.11. PineApp

2.8.3.11.1. http://www.pineapp.com/

2.8.3.12. Sangfor

2.8.3.13. Sonicwall

2.8.3.14. Sophos

2.8.3.15. Trustwave

2.8.3.16. Untangle

2.8.3.17. WINS TechNet LTD

2.8.3.17.1. http://www.wins21.co.kr/

2.8.3.18. WatchGuard

2.8.4. Open Source & Community

2.8.4.1. IPTables

2.8.4.2. IPchains

2.8.4.3. PFSense

2.8.4.4. Untangle

2.8.5. Router Firewalls

2.9. Network Intrusion Detection/Prevention

2.9.1. Predictive Modeling

2.9.1.1. Cyactive

2.9.1.2. Trustpipe

2.9.2. Signature Based

2.9.2.1. AlienVault

2.9.2.1.1. Snort

2.9.2.2. Bricata

2.9.2.3. CheckPoint

2.9.2.4. Cisco

2.9.2.4.1. Sourcefire

2.9.2.5. Enterasys

2.9.2.6. Fortinet

2.9.2.7. HP

2.9.2.7.1. TippingPoint

2.9.2.8. IBM

2.9.2.9. Intel Security

2.9.2.10. Open Source

2.9.2.10.1. Snort

2.9.2.11. Symantec

2.9.2.11.1. APT Network

2.9.2.12. WINS TECHNET LTD

2.9.2.12.1. http://www.wins21.co.kr/

2.9.3. SCADA

2.9.3.1. Radiflow

2.10. Network Packet Brokers

2.10.1. Adara

2.10.2. Apcon

2.10.3. Arista Networks

2.10.4. Cubro

2.10.5. Gigamon

2.10.6. IXIA

2.10.7. Interface Masters Technologies

2.10.8. JDSU

2.10.9. NetOptics

2.10.10. NetScout

2.10.11. VSS Monitoring

2.11. Network Traffic Analysis and Network Forensics

2.11.1. Flow Analysis/Metadata Extraction

2.11.1.1. Arbor Networks

2.11.1.2. Flowmon Networks

2.11.1.3. IBM

2.11.1.4. Intel Security NBA

2.11.1.5. Lancope

2.11.1.6. LogRythm

2.11.2. Forensic Capture with User Surveillance & Security Threat Analytics

2.11.2.1. Access Data

2.11.2.2. BlueCoat

2.11.2.3. Cisco

2.11.2.3.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html

2.11.2.4. EMC

2.11.2.5. FireEye

2.11.2.6. Fluke Networks

2.11.2.7. IBM

2.11.2.8. IP Fabrics

2.11.2.9. JDSU (Network Instruments)

2.11.2.10. LightCyber

2.11.2.11. NetAgent

2.11.2.12. NetResec

2.11.2.13. NetScout

2.11.2.14. Niksun

2.11.2.15. Novetta Solutions

2.11.2.16. Nuix

2.11.2.17. Packetsled

2.11.2.18. Riverbed

2.11.2.19. SS8

2.11.2.19.1. http://www.ss8.com/

2.11.2.20. nPulse Technologies

2.11.3. Network Forensics Tools

2.11.3.1. Alert Logic

2.11.3.1.1. Formerly Click Security

2.11.3.2. Corvil

2.11.3.3. Cybersift

2.11.3.3.1. http://www.cybersift.net/sifter10app.html

2.11.3.4. Decision Group INC

2.11.3.4.1. http://www.edecision4u.com/index.html

2.11.3.5. EMC

2.11.3.6. FireEye

2.11.3.7. IP Fabrics

2.11.3.8. IPCopper

2.11.3.9. Flowmon Networks

2.11.3.9.1. http://www.invealawfulinterception.com/

2.11.3.10. KLOS

2.11.3.10.1. http://www.klos.com/applications/lawful-intercept/

2.11.3.11. NEXT Computing

2.11.3.11.1. http://www.nextcomputing.com/products/packet-capture-systems

2.11.3.12. NetReSec

2.11.3.13. Niksun

2.11.3.14. Radisys

2.11.3.14.1. http://www.radisys.com/products/network-appliance/

2.11.3.15. Utimaco

2.11.3.15.1. https://lims.utimaco.com/utimaco-lims/

2.11.3.16. Vivavi Solutions

2.11.3.17. WildPackets

2.11.4. Network Forensics Tools as a Service (NFTaaS)

2.11.4.1. CloudShark

2.11.5. Network Taps

2.11.5.1. Optical

2.11.5.1.1. Apcon

2.11.5.1.2. DataCom Systems

2.11.5.1.3. FibreDyne

2.11.5.1.4. Gigamon

2.11.5.1.5. Glimmerglass

2.11.5.1.6. M2Optics

2.11.5.1.7. Netoptics

2.11.5.1.8. Network Instruments

2.11.5.1.9. VSS Monitoring

2.11.5.1.10. nTAP

2.11.6. Network Traffic Analysis (NTA)

2.11.6.1. Amgine Securus

2.11.6.2. Arbor Networks

2.11.6.3. Boeing

2.11.6.4. Cisco

2.11.6.4.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html

2.11.6.5. Core Security (Formerly Damballa)

2.11.6.6. Corvil

2.11.6.7. Cyber adAPT

2.11.6.8. Darktrace

2.11.6.9. Eastwind Networks

2.11.6.10. ExtraHop Networks

2.11.6.11. Fidelis Cybersecurity

2.11.6.12. Lancope

2.11.6.13. LightCyber

2.11.6.14. Novetta Solutions

2.11.6.15. PacketSled

2.11.6.16. Phirelight

2.11.6.17. Qihoo 360

2.11.6.17.1. SkyEye

2.11.6.18. RedJack

2.11.6.19. SlashNext

2.11.6.20. Splunk

2.11.6.21. Taasera

2.11.6.22. ThreatTrack

2.11.6.23. Trustport

2.11.6.23.1. Threat Intelligence

2.11.6.24. Vectra Networks

2.11.6.25. WireX

2.11.7. Raw Network Packet Capture

2.11.7.1. Apcon

2.11.7.1.1. Riverbed

2.11.7.1.2. Netfort

2.11.7.1.3. Wireshark

2.11.7.1.4. NTOP

2.11.7.2. Arbor Networks

2.11.7.3. Comworth

2.11.7.4. NTOP.org

2.11.7.5. Netfort

2.11.7.6. WireShark

2.12. Network-Based Advanced Threat Protection

2.12.1. Firewalls with Malware Sandbox Capabilities

2.12.1.1. Barracuda

2.12.1.2. Check Point Software

2.12.1.3. Cisco

2.12.1.4. Fortinet

2.12.1.5. Huawei

2.12.1.6. Juniper Networks

2.12.1.7. Palo Alto Networks

2.12.1.8. Sonicwall

2.12.1.9. Sophos

2.12.1.10. Watchguard

2.12.2. Appliance Based Malware Sandboxes

2.12.2.1. AMGINE SECURUS

2.12.2.1.1. http://www.amgine.co.kr/index.html

2.12.2.2. AhnLab

2.12.2.3. Bluecoat

2.12.2.4. Check Point Software

2.12.2.4.1. Emulator Blade

2.12.2.5. Cisco

2.12.2.5.1. ThreatGrid

2.12.2.6. ContentKeeper

2.12.2.7. Cyphort

2.12.2.8. Damballa

2.12.2.9. FireEye

2.12.2.10. Fortinet

2.12.2.10.1. FortiSandbox

2.12.2.11. General Dynamics

2.12.2.11.1. Fidelis Security Systems

2.12.2.12. Huawei

2.12.2.12.1. Firehunter

2.12.2.13. Intel Security

2.12.2.13.1. McAfee Advanced Threat Detection Appliance

2.12.2.14. LastLine

2.12.2.15. Palo Alto Networks

2.12.2.15.1. WildFire

2.12.2.16. Payload Security

2.12.2.17. Qihoo

2.12.2.17.1. SkyEye

2.12.2.18. Techguard Security

2.12.2.19. ThreatTrack

2.12.2.20. Trend Micro

2.12.2.20.1. Deep Discovery

2.12.2.21. VMRay

2.12.2.22. VeeDog

2.12.2.22.1. http://veedog.com/

2.12.2.23. WINS TECHNET LTD

2.12.2.23.1. http://www.wins21.co.kr/

2.12.3. Cloud-Based Malware Sandboxes

2.12.3.1. Cisco

2.12.3.1.1. ThreatGrid

2.12.3.2. Fortinet

2.12.3.3. Huawei

2.12.3.4. Joe Security

2.12.3.5. Lastline

2.12.3.6. Netwitness

2.12.3.6.1. Spectrum

2.12.3.7. Palo Alto Networks

2.12.3.7.1. WildFire

2.12.3.8. Qihoo

2.12.3.8.1. SkyEye

2.12.3.9. Sonicwall

2.13. SCADA/ICS

2.13.1. Monitoring

2.13.1.1. CRITIFENSE

2.13.1.2. Cyberbit

2.13.1.3. PFP Cybersecurity

2.13.2. SCADA Firewalls

2.13.2.1. BAE Systems

2.13.2.1.1. http://www.baesystems.com/en-us/product/scada-firewall

2.13.2.2. Bayshore Networks

2.13.2.2.1. https://www.bayshorenetworks.com/products/it-ot-gateway/

2.13.2.3. Check Point Software

2.13.2.3.1. https://www.checkpoint.com/products-solutions/critical-infrastructure/

2.13.2.4. Endian

2.13.2.4.1. http://www.endian.com/products/4i/

2.13.2.5. Fortinet

2.13.2.5.1. https://www.fortinet.com/solutions/industries/scada-industrial-control-systems.html

2.13.2.6. Tofino Security

2.13.2.6.1. https://www.tofinosecurity.com/products/Tofino-Firewall-LSM

2.14. SSL Inspection Appliances

2.14.1. A10 Networks

2.14.2. Bluecoat

2.14.3. ResolutionOne

2.14.4. VSS Monitoring

2.14.5. SourceFire

2.15. Software Defined Micro-Perimeter

2.15.1. BlackRidge Networks

2.15.2. Certes Networks

2.15.3. Cryptzone

2.15.4. Tempered Networks

2.15.5. Unisys Stealth

2.15.6. Vidder

2.15.7. Waverly Labs

2.16. Virtual Private Networking (VPN/SSL VPN)

2.16.1. IPSec VPN Concentrators

2.16.1.1. Certes Networks

2.16.1.2. CheckPoint Software

2.16.1.3. Cisco

2.16.1.4. Mako Networks

2.16.2. Layer 2 Encryption

2.16.2.1. Certes Networks

2.16.3. Layer 4 Encryption

2.16.3.1. Certes Networks

2.16.4. SSL VPN

2.16.4.1. AhnLab

2.16.4.2. Array Networks

2.16.4.3. Barracuda Networks

2.16.4.4. Check Point Software

2.16.4.5. Cisco

2.16.4.6. Citrix

2.16.4.7. F5 Networks

2.16.4.8. Fortinet

2.16.4.9. Hillstone Networks

2.16.4.10. Juniper

2.16.4.11. NetGear

2.16.4.12. Sonicwall

2.16.4.13. Stonesoft

2.16.4.14. WatchGuard

2.16.5. Multi-Path Dynamic VPN

2.16.5.1. Secret Double Octopus

2.16.5.2. Dispersive Networks

2.17. Web/Email Protection

2.17.1. Secure Email Gateways

2.17.1.1. Alt-N Technologies

2.17.1.2. Bluecoat

2.17.1.3. Fortinet

2.17.1.4. GWAVA

2.17.1.5. Intel Security

2.17.1.6. Proofpoint

2.17.1.7. Re-Sec

2.17.1.8. Sonicwall

2.17.1.9. Symantec

2.17.1.10. Trustwave

2.17.1.11. Voitiro

2.17.1.12. Websense

2.17.1.13. iBoss

2.17.2. Secure Web Gateways

2.17.2.1. Anchiva

2.17.2.2. Bluecoat

2.17.2.3. ContentKeeper

2.17.2.4. GWAVA

2.17.2.5. Intel Security

2.17.2.6. Re-Sec

2.17.2.7. Symantec

2.17.2.8. Trustwave

2.17.2.9. Websense

2.17.2.10. iBoss

2.17.3. Security as a Service

2.17.3.1. Web & Email SaaS

2.17.3.1.1. Appriver

2.17.3.1.2. Barracuda

2.17.3.1.3. Bitglass

2.17.3.1.4. Cisco

2.17.3.1.5. Intel Security

2.17.3.1.6. MailGuard

2.17.3.1.7. Spamina

2.17.3.1.8. Symantec

2.17.3.1.9. Total Defense

2.17.3.1.10. TotalDefense

2.17.3.1.11. Websense

2.17.3.1.12. Zscaler

2.17.3.2. Web Only

2.17.3.2.1. Bluecoat

2.17.3.2.2. ContentKeeper

2.17.3.2.3. OpenDNS

2.17.3.2.4. Websense

2.17.3.2.5. Zscaler

2.17.3.3. Secure Email Gateways

2.17.3.3.1. Agari

2.17.3.3.2. CloudMark

2.17.3.3.3. Proofpoint

2.17.3.3.4. Return Path

2.17.3.3.5. Spam Experts

2.17.3.3.6. Spam Titan

2.17.3.3.7. Spamina

2.17.3.3.8. ValiMail

2.17.3.4. Anti-Phishing

2.17.3.4.1. Amgine Securus

2.17.3.4.2. Area1 Security

2.17.3.4.3. CloudMark

2.17.3.4.4. Cymbel

2.17.3.4.5. Cyveillance

2.17.3.4.6. FireEye

2.17.3.4.7. MailGuard

2.17.3.4.8. MediaPro

2.17.3.4.9. Phishlabs

2.17.3.4.10. ThreatTrack

2.17.3.4.11. Votiro

2.17.3.4.12. Webroot

2.17.3.4.13. ZapFraud

3. Endpoint Security

3.1. Anti-Malware

3.1.1. Eastern Europe

3.1.1.1. Czech Republic

3.1.1.1.1. Avast

3.1.1.1.2. TrustPort

3.1.1.2. Denmark

3.1.1.2.1. BullGuard

3.1.1.3. Netherlands

3.1.1.3.1. AVG

3.1.1.4. Romania

3.1.1.4.1. Bitdefender

3.1.1.5. Slovakia

3.1.1.5.1. ESET

3.1.2. Emerging Asia/Pacific

3.1.2.1. India

3.1.2.1.1. eScan

3.1.2.1.2. K7 Computing

3.1.3. Latin America

3.1.3.1. Spain

3.1.3.1.1. Optenet

3.1.4. Mature Asia/Pacific

3.1.4.1. China

3.1.4.1.1. Qihoo

3.1.4.1.2. Rising International Software

3.1.4.2. South Korean

3.1.4.2.1. AhnLab

3.1.4.2.2. BKAV

3.1.4.2.3. ESTsoft

3.1.5. Middle East and Africa

3.1.5.1. Israel

3.1.5.1.1. Check Point Software

3.1.6. North America

3.1.6.1. Cyren

3.1.6.2. Fortinet

3.1.6.3. Intel Security

3.1.6.4. MalwareBytes

3.1.6.5. McAfee

3.1.6.6. Microsoft

3.1.6.7. PC Pitstop

3.1.6.8. Reason Core Security

3.1.6.9. Roboscan

3.1.6.10. Symantec

3.1.6.11. ThreatTrack

3.1.6.12. Total Defense

3.1.6.13. Trend Micro

3.1.7. Russia

3.1.7.1. Kaspersky

3.1.8. Western Europe

3.1.8.1. Austria

3.1.8.1.1. Ikarus Security

3.1.8.2. Finland

3.1.8.2.1. F-Secure

3.1.8.3. Germany

3.1.8.3.1. Avira

3.1.8.3.2. G-Data

3.1.8.3.3. Kromtech

3.1.8.4. Norway

3.1.8.4.1. Norman

3.1.8.5. United Kingdom

3.1.8.5.1. Sophos

3.1.8.6. Poland

3.1.8.6.1. Arcabit

3.2. Application Isolation

3.2.1. Blue Ridge Networks

3.2.1.1. http://www.blueridge.com/index.php/products/appguard/consumer

3.2.2. Bromium

3.2.3. Bufferzone

3.2.4. Invincea

3.2.4.1. SandBoxie

3.2.5. VMware

3.3. Endpoint Sandboxes and Virtualized Containers

3.3.1. Endpoint Sandboxes

3.3.1.1. Panda

3.3.1.1.1. www.panda.com

3.3.1.2. Sandboxie

3.3.1.2.1. http://www.sandboxie.com/

3.3.1.3. Bitdefender

3.3.1.3.1. www.bitdefender.com

3.3.2. Type-0 Hypervisors

3.3.2.1. Lynxworks

3.3.2.1.1. http://www.lynuxworks.com/

3.3.2.2. Zirtu

3.3.3. Process Isolation/Virtualization

3.3.3.1. Avectco

3.3.3.2. Bromium

3.3.3.3. Invincea

3.4. Endpoint Intrusion Prevention

3.4.1. Arkoon

3.4.1.1. StormShield

3.4.2. BeyondTrust

3.4.3. IBM

3.4.4. Landesk

3.4.5. McAfee

3.4.6. Safensoft

3.4.7. Symantec

3.5. Enterprise Mobility Mangement Suites

3.5.1. Absolute Software

3.5.2. AMware

3.5.2.1. Airwatch

3.5.3. Blackberry

3.5.4. Citrix

3.5.5. Globo

3.5.6. Good Technologies

3.5.7. IBM

3.5.8. Landesk

3.5.9. MobileIron

3.5.10. Mojave

3.5.10.1. https://www.mojave.net/

3.5.11. SAP

3.5.12. Sophos

3.5.13. Soti

3.5.14. Symantec

3.5.15. Tangoe

3.6. Application Control

3.6.1. AppSense

3.6.2. Avecto

3.6.3. Bit9

3.6.4. Landesk

3.6.5. Lumension

3.6.6. McAfee

3.6.7. Sophos

3.6.8. Symantec

3.6.9. Trend Micro

3.7. Exploit Technique Prevention Software

3.7.1. CyActive

3.7.2. CyBellum

3.7.3. Malwarebytes Anti-Exploit

3.7.4. Microsoft

3.7.4.1. Microsoft EMET - FREE

3.7.5. Morphisec

3.7.6. Palo Alto Networks

3.7.6.1. Endpoint

3.7.7. Sophos

3.7.7.1. Intercept X

3.7.8. Trend Micro

3.7.9. ViRobot APT Shield

3.8. File Integrity Monitoring

3.8.1. Open Source

3.8.1.1. 1. AIDE

3.8.1.2. 2. Trend Micro

3.8.1.2.1. 1. OSSEC

3.8.1.3. 3. Samhain

3.8.1.4. 4. Osiris

3.8.1.5. 5. Integrit

3.8.1.6. 6. Tripwire

3.8.2. Commercial

3.8.2.1. Imperva

3.8.2.2. Intel Security

3.8.2.3. Tripwire

3.9. Malware Analysis

3.9.1. Botnets

3.9.1.1. spyeyetracker.abuse.ch

3.9.2. Internet Identity

3.9.3. Malware Patrol

3.9.4. SpamHaus

3.9.5. Team Cymru

3.9.6. ThreatGrid

3.9.7. VirusTotal

3.9.8. zeustracker.abuse.ch

3.9.9. JoeSecurity

3.9.10. Shadowserver

3.10. Mobile Device Management

3.10.1. Absolute Software

3.10.2. Beachhead Security

3.10.3. Blackberry

3.10.4. Citrix

3.10.5. Globo

3.10.6. Good Technologies

3.10.7. IBM

3.10.8. Landesk

3.10.9. MobileIron

3.10.10. Mojave

3.10.10.1. https://www.mojave.net/

3.10.11. SAP

3.10.12. Sophos

3.10.13. Soti

3.10.14. Symantec

3.10.15. Tangoe

3.10.16. VMware

3.10.16.1. Airwatch

3.11. Policy Assessment and System Configuration Management

3.11.1. BMC

3.11.1.1. BMC Server Automation

3.11.2. Check Point Software

3.11.2.1. Endpoint Policy Management

3.11.3. IBM

3.11.3.1. IBM Endpoint Manager

3.11.4. Intel Security

3.11.4.1. Policy Auditor

3.11.5. RedHat

3.11.5.1. OpenSCAP

3.11.6. Saint

3.11.6.1. Saint Security

3.11.7. Tripwire

3.11.7.1. Tripwire Enterprise

4. Data & Collaboration Security

4.1. Data Governance and Classification

4.1.1. Expert Source

4.1.1.1. http://www.expertsource.in/index.php

4.1.2. HP

4.1.3. IBM

4.1.4. Informatica

4.1.5. Nuix

4.1.6. Somansa

4.1.7. Titus

4.1.8. boldonjames

4.2. Data Loss Prevention (DLP)

4.2.1. Endpoint

4.2.1.1. Data Classification and Tracking

4.2.1.1.1. Banyan Solutions

4.2.1.1.2. BoldonJames

4.2.1.1.3. Digital Guardian

4.2.1.1.4. HP

4.2.1.1.5. IBM

4.2.1.1.6. Identity Finder

4.2.1.1.7. Mach1 Development

4.2.1.1.8. Microsoft (Formerly Secure Islands)

4.2.1.1.9. MinerEye

4.2.1.1.10. Nuix

4.2.1.1.11. Smartlogic

4.2.1.1.12. Titus

4.2.1.1.13. Varonis

4.2.1.1.14. CoSoSys

4.2.1.2. Mobile

4.2.1.2.1. Symantec

4.2.1.2.2. Websense

4.2.1.2.3. Microsoft (Secure Islands)

4.2.1.3. Windows

4.2.1.3.1. Absolute Software

4.2.1.3.2. CA Technologies

4.2.1.3.3. Digital Guardian

4.2.1.3.4. GTB Technologies

4.2.1.3.5. Infowatch

4.2.1.3.6. Intel Security

4.2.1.3.7. RSA

4.2.1.3.8. Microsoft (Secure Islands)

4.2.1.3.9. Somansa

4.2.1.3.10. Symantec

4.2.1.3.11. Trustwave

4.2.1.3.12. Watchful Software

4.2.1.3.13. Raytheon-Websense

4.2.1.3.14. Zecurion

4.2.2. Network

4.2.2.1. Digital Guardian

4.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)

4.2.2.3. Symantec

4.2.2.4. InfoWatch

4.2.3. Secure Email Gateway

4.2.3.1. Cisco

4.2.3.2. Symantec

4.2.3.3. Intel Security

4.2.3.4. Somansa

4.2.4. Secure Web Gateway

4.2.4.1. Intel Security

4.2.4.2. Symantec

4.2.4.3. Somansa

4.2.5. Breached Data Detection

4.2.5.1. Consumer

4.2.5.1.1. PwnedList

4.2.5.1.2. haveibeenpwned.com

4.2.5.2. Enterprise

4.2.5.2.1. Infoarmor

4.2.5.2.2. Ionic

4.2.5.2.3. Hold Security

4.3. Database Security

4.3.1. Database Audit and Protection (DAP)

4.3.1.1. Application Security, Inc

4.3.1.2. BeyondTrust

4.3.1.3. Big Data Platform DAP

4.3.1.3.1. BlueTalon

4.3.1.3.2. Cloudera

4.3.1.3.3. Hortonworks

4.3.1.3.4. IBM

4.3.1.3.5. Imperva

4.3.1.4. DataSunrise

4.3.1.5. Fortinet

4.3.1.6. GreenSQL

4.3.1.7. IBM

4.3.1.8. IRI

4.3.1.8.1. Oracle

4.3.1.8.2. SQL Server

4.3.1.9. Imperva

4.3.1.10. Intel Security

4.3.1.11. Mentis Software

4.3.1.12. Oracle Corp

4.3.1.13. PentaSecurity

4.3.1.14. Warevalley

4.3.2. Database Activity Monitoring

4.3.2.1. DB Networks

4.3.2.2. Somansa

4.4. Encryption/Tokenization

4.4.1. Big Data

4.4.1.1. Gazzang

4.4.1.2. Vormetric

4.4.2. Cloud/SAAS Encryption

4.4.2.1. Appliances

4.4.2.1.1. Office365

4.4.2.1.2. Ciphercloud

4.4.2.1.3. Afore Solutions

4.4.2.1.4. Perspecsys

4.4.2.2. Software

4.4.2.2.1. BoxCryptor

4.4.2.2.2. CloudMask

4.4.2.2.3. PrivateCore

4.4.2.2.4. Trend Micro

4.4.2.2.5. Viivo

4.4.2.2.6. Voltage Security

4.4.2.3. Software as a Service

4.4.2.3.1. Trend Micro

4.4.2.3.2. SooKasa

4.4.2.3.3. Gemalto

4.4.3. Cryptographic Providers

4.4.3.1. RSA

4.4.3.2. Quintessence

4.4.3.3. Microsoft

4.4.4. Data masking

4.4.4.1. Oracle

4.4.4.2. Dataguise

4.4.4.3. Informatica

4.4.4.4. IBM

4.4.4.5. Voltage Security

4.4.4.6. Green SQL

4.4.4.7. Mentis

4.4.4.8. Compuware

4.4.4.9. Axis

4.4.4.10. Privacy Analytics

4.4.4.11. Camouflage Software

4.4.4.12. Solix Technologies

4.4.4.13. Net 2000

4.4.5. Database

4.4.5.1. Gemalto

4.4.5.2. Dark Matter Labs

4.4.5.3. Vormetric

4.4.6. Email

4.4.6.1. ZixCorp

4.4.6.2. Encryptics

4.4.6.2.1. https://www.encryptics.com/default.aspx

4.4.7. Encrypted USB Storage

4.4.7.1. Apricorn

4.4.7.2. Datalocker

4.4.7.3. Integral Memory

4.4.7.4. IronKey

4.4.7.5. Kingston

4.4.7.6. Virbatim

4.4.8. File/Folder

4.4.8.1. Covertix

4.4.8.1.1. http://www.covertix.com/

4.4.8.2. IBM

4.4.8.2.1. Mainframe

4.4.8.3. SecureIslands

4.4.8.4. Sophos

4.4.8.4.1. SafeGuard Enterprise (Utimaco)

4.4.8.5. Symantec (PGP)

4.4.8.6. Vormetric

4.4.8.7. WinMagic

4.4.8.7.1. SecureDoc

4.4.9. Quantum Encryption

4.4.9.1. IDQ

4.4.9.2. Quintessence Labs

4.4.9.3. Whitewood Encryption

4.4.10. Tokenization

4.4.10.1. Protegrity

4.4.11. Whole Disk

4.4.11.1. Intel Security

4.4.11.2. Symantec (PGP)

4.4.11.3. CheckPoint Software

4.4.11.4. Encryption Management

4.4.11.4.1. Wave Systems

4.4.11.5. WinMagic

4.4.11.5.1. SecureDoc

4.4.11.6. Microsoft

4.4.11.6.1. Bitlocker

4.4.11.7. Sophos

4.4.11.7.1. SafeGuard Enterprise (Utimaco)

4.4.11.8. Trustwave

4.4.11.8.1. DataControl

4.4.11.9. Vormetric

4.5. File Analysis Software

4.5.1. Acaveo

4.5.2. Active Navigation

4.5.3. AvePoint

4.5.4. Beyond Recognition

4.5.5. Bloomberg

4.5.6. CommVault

4.5.7. Condrey

4.5.8. Covertix

4.5.9. DataGlobal

4.5.10. DataGravity

4.5.11. Equivio

4.5.12. HP

4.5.12.1. Control Point

4.5.13. HiSoftware

4.5.14. IBM

4.5.14.1. StoreIQ

4.5.15. Identifty Finder

4.5.16. Imperva

4.5.17. Index Engines

4.5.18. Kazoup

4.5.19. MailGuard

4.5.20. NTP Software

4.5.21. Novell

4.5.22. Nuix

4.5.23. Proofpoint

4.5.24. Stealthbits

4.5.25. Varonis

4.5.26. WatchDox

4.5.27. Whitebox Security

4.5.28. ZyLab

4.6. Hardware Security Modules (HSM)

4.6.1. Cloud HSM

4.6.1.1. Amazon

4.6.1.2. IBM

4.6.2. Hardware

4.6.2.1. FutureX

4.6.2.2. Gemalto

4.6.2.3. HPE

4.6.2.4. Safenet

4.6.2.5. Thales

4.7. Software Defined Storage Security

4.7.1. Dispersive Networks

4.7.1.1. https://dispersivetechnologies.com/

4.7.2. OceansBlue

4.7.2.1. http://www.oceansblue.net/index.html

4.8. eSignatures

4.8.1. Adobe eSign Services

4.8.2. Alphatrust

4.8.3. Docusign

4.8.4. Hellosign

4.8.5. Rightsignature

4.8.6. Sertifi

5. Identity and Access Management (IAM)

5.1. AD/Unix bridge

5.1.1. Centrify

5.2. Enterprise single sign-on (ESSO)

5.3. Externalized authorization management (EAM)

5.3.1. Axiomatics

5.3.2. Dell Quest (BitKoo)

5.4. IAM as a Service

5.4.1. Centrify

5.4.2. IBM (Formerly Lighthouse Security)

5.4.3. Identity Automation

5.4.4. Intel

5.4.5. Okta

5.4.6. Password Bank

5.4.7. Ping Identity

5.4.8. Sailpoint

5.4.9. Symplifyed

5.4.10. iWelcome

5.5. Identity governance and administration

5.5.1. CA Technologies

5.5.2. IBM Security

5.5.3. Oracle

5.5.4. RSA (Aveksa)

5.6. Privileged account management (PAM)

5.6.1. BeyondTrust

5.6.2. Lieberman Software

5.6.3. Cyber Ark

5.6.4. Dell

5.6.5. Centrify

5.7. Public Certificate Authorities

5.7.1. Comodo

5.7.2. Crosscert

5.7.3. Geotrust

5.7.4. Godaddy

5.7.5. Symantec (Formerly VeriSign)

5.8. User Authentication

5.8.1. Tokens

5.8.1.1. OOB authentication

5.8.1.1.1. SMS

5.8.1.1.2. Voice

5.8.1.1.3. Push

5.8.1.1.4. Email

5.8.1.1.5. Social media

5.8.1.2. OTP tokens

5.8.1.2.1. OTP hardware tokens

5.8.1.2.2. OTP software tokens for smart phones

5.8.1.3. X.509 tokens

5.8.1.4. Other tokens

5.8.1.4.1. ANECT AS - ALUCID

5.8.2. Contextual authentication

5.8.2.1. Google

5.8.2.1.1. Trust API

5.8.3. KBA

5.8.3.1. It's Me Security

5.8.3.1.1. http://www.itsmesecurity.com/

5.8.4. Biometrics

5.8.4.1. Behavioral

5.8.4.1.1. Typing rhythm/keystroke dynamics

5.8.4.1.2. Voice recognition

5.8.4.2. Biological

5.8.4.2.1. Face recognition

5.8.4.2.2. Fingerprint

5.8.5. Wide-focus vendors

5.8.5.1. Alladin-RD

5.8.5.2. CA Technologies

5.8.5.3. Entrust

5.8.5.4. HID Global

5.8.5.5. RSA

5.8.5.5.1. Adaptive Auth

5.8.5.6. Gemalto

5.8.5.7. Symantec

5.8.5.8. Technology Nexus

5.8.5.9. VASCO

5.9. User Privilege Management

5.9.1. Appsense

5.9.1.1. http://www.appsense.com/

5.9.2. Ariella

5.9.2.1. http://www.arellia.com/

5.9.3. Avectco

5.9.3.1. http://www.avecto.com/

5.9.4. BeyondTrust

5.9.4.1. http://www.beyondtrust.com/

5.9.5. Centrify

5.9.5.1. http://www.centrify.com/

5.9.6. CionSystems

5.9.7. CrossIdeas

5.9.7.1. http://www.crossideas.com/

5.9.8. Dell

5.9.8.1. http://www.quest.com/desktop-authority-management-suite/

5.9.9. Lieberman Software

5.9.9.1. http://www.liebsoft.com/

5.9.10. Viewfinity

5.9.10.1. http://www.viewfinity.com/

5.10. Identity Blockchain

5.10.1. 2Way.IO

5.10.2. Blockstack

5.10.2.1. Open Source

5.10.3. ID.me

5.10.4. KYC-Chain

5.10.5. Uport

5.10.6. airbitz

5.10.7. hypr

5.10.8. tradle.io

5.10.9. trunomi

5.10.10. uniquid

6. Application Security

6.1. Web Application Firewalls (WAF) & Application Security

6.1.1. Web Application Firewalls

6.1.1.1. Virtualized Appliances

6.1.1.1.1. A10 Networks

6.1.1.1.2. AlertLogic

6.1.1.1.3. Amazon AWS

6.1.1.1.4. Barracuda Networks

6.1.1.1.5. BeeWare

6.1.1.1.6. DenyAll

6.1.1.1.7. Ergon Informatik AG

6.1.1.1.8. F5

6.1.1.1.9. Fortinet

6.1.1.1.10. Forum Systems

6.1.1.1.11. Imperva

6.1.1.1.12. PentaSecurity

6.1.1.1.13. Trustwave

6.1.1.1.14. Citrix

6.1.1.2. Physical Appliances

6.1.1.2.1. A10 Networks

6.1.1.2.2. AdNovum

6.1.1.2.3. AlertLogic

6.1.1.2.4. Anchiva

6.1.1.2.5. Barracuda Networks

6.1.1.2.6. BeeWare

6.1.1.2.7. BugSec

6.1.1.2.8. Citrix

6.1.1.2.9. DBAPPSecurity

6.1.1.2.10. DPtech

6.1.1.2.11. Dell Sonicwall

6.1.1.2.12. DenyAll

6.1.1.2.13. Ergon Informatik

6.1.1.2.14. F5

6.1.1.2.15. Fortinet

6.1.1.2.16. Forum Systems

6.1.1.2.17. HP

6.1.1.2.18. Imperva

6.1.1.2.19. NSFocus

6.1.1.2.20. PentaSecurity

6.1.1.2.21. Positive Technologies

6.1.1.2.22. RadWare

6.1.1.2.23. Trustwave

6.1.1.2.24. WINS TECHNET LTD

6.1.1.3. Software

6.1.1.3.1. Dedicated Software

6.1.1.3.2. Open Source

6.1.1.3.3. Web Server Modules

6.1.1.4. Managed Services

6.1.1.4.1. Dell Secureworks

6.1.1.4.2. AT&T

6.1.1.4.3. Verizon Business

6.1.1.5. Software as a Service

6.1.1.5.1. Akamai

6.1.1.5.2. AlertLogic

6.1.1.5.3. Anquanbao

6.1.1.5.4. ArmorLogic

6.1.1.5.5. BinarySec

6.1.1.5.6. CloudFlare

6.1.1.5.7. DenyAll

6.1.1.5.8. FireBlade

6.1.1.5.9. Imperva (Incapsula)

6.1.1.5.10. Incapsula

6.1.1.5.11. PowerCDN

6.1.1.5.12. Qualys

6.1.1.5.13. Securi

6.1.1.5.14. Signal Sciences

6.1.1.5.15. Soha

6.1.1.5.16. ZenEdge

6.1.2. Web Threat Disruption Technology

6.1.2.1. Software

6.1.2.1.1. NuCaptcha

6.1.2.1.2. NuData

6.1.2.2. Appliances

6.1.2.2.1. Juniper

6.1.2.2.2. Shape Security

6.1.2.3. Open Source

6.1.2.3.1. Google Hack Honeypot

6.2. Web Application Security

6.2.1. Code Review Products

6.2.1.1. HP

6.2.1.2. IBM

6.2.2. Web Application Vulnerability Scanning Services

6.2.2.1. Cenzic

6.2.2.2. Controlscan

6.2.2.3. High-Tech Bridge

6.2.2.4. McAfee Secure

6.2.2.5. Qualys

6.2.2.6. Securi

6.2.2.7. Sitelock

6.2.2.8. Trustwave

6.2.2.9. WebSecurify

6.2.2.10. WhiteHat Security

6.2.3. Scanning Software

6.2.3.1. Open Source

6.2.3.1.1. Arachni Scanner

6.2.3.1.2. Subgraph

6.2.3.1.3. W3af

6.2.3.1.4. Wapiti

6.2.3.1.5. Watcher

6.2.3.2. Commercial

6.2.3.2.1. Accunetix

6.2.3.2.2. BeyondTrust

6.2.3.2.3. Cenzic

6.2.3.2.4. HP

6.2.3.2.5. MavitunaSecurity

6.2.3.2.6. NTObjectives

6.2.3.2.7. Nstalker

6.2.3.2.8. Portswigger

6.2.3.2.9. Syhunt

7. Random Knowledge

7.1. Detection Methods

7.1.1. File Analysis

7.1.1.1. Computed Hash

7.1.1.1.1. Uniqueness

7.1.1.2. Metadata Attributes

7.1.1.2.1. File Content Inspection

7.1.1.2.2. File Headers

7.1.1.2.3. Temporal Analysis

7.1.1.2.4. Temporal Analysis with Prevalence

7.1.1.2.5. Time/Date

7.1.1.2.6. Certificate and Signature Evaluation (PKI)

7.1.1.3. Packing Method

7.1.1.3.1. Multi-packing Analysis

7.1.2. Network Specific

7.1.2.1. Protocol/File/Session Decode & Analysis

7.1.2.1.1. File Extraction

7.1.2.1.2. Playback (Surveillance)

7.1.2.1.3. File/Session Viewing

7.1.2.1.4. Correlation

7.1.2.1.5. Machine Learning (AI)

7.1.2.2. Network Flow Analysis

7.1.2.2.1. Machine Learning (AI)

7.1.2.3. Application Layer Analysis

7.1.2.3.1. Classification, Correlation , Deviance from Baselines (Heuristics)

7.1.2.3.2. Deep Packet Inspection (DPI)

7.1.2.3.3. Application Command and Input Analysis

7.1.2.4. IP Layer Analysis

7.1.2.4.1. TCP/UDP Ports

7.1.2.4.2. IP Address

7.1.3. Malware Behavioral Evaluations

7.1.3.1. Persistence

7.1.3.1.1. Installs as System Service

7.1.3.1.2. Installs Registry Keys in Startup locations

7.1.3.1.3. Modifies filesystem in specific locations

7.1.3.2. Suspicious Behaviors Evaluated

7.1.3.2.1. Attempts to login to systems that a specific user credential is not normally used on

7.1.3.2.2. Becomes another user on the system

7.1.3.2.3. CPU of Processes Spawned is high

7.1.3.2.4. Connects with a known bad URL or IP Address

7.1.3.2.5. Escalates privileges

7.1.3.2.6. Examines the Documents Folder or User Document Folders

7.1.3.2.7. File Isn't widely prevalent in user population

7.1.3.2.8. Injects data into memory of another running process

7.1.3.2.9. Modifies memory of another process

7.1.3.2.10. Opens TCP/IP Connections to other hosts

7.1.3.2.11. Performs a network port sweep

7.1.3.2.12. Process executes net use DOS command inside command.exe

7.1.3.2.13. Process spawns command.exe

7.1.3.2.14. Removes logs/events of application logs or operating system

7.1.3.2.15. Self Delete of files

7.1.3.2.16. Self-copy of files

7.1.3.2.17. Starts to repeatedly call the crypt function (ransom sign)

7.1.3.2.18. Time of execution is not normal in context of historical analysis

7.1.4. User

7.1.4.1. Activity on system when user's employment is in termination status

7.1.4.2. Deviates from past user behavior

7.1.4.3. Device not historically associated to user

7.1.4.4. Login time anamoly

7.1.4.5. Login time outside user's home timezone

7.1.4.6. Privileged data accessed

7.1.4.6.1. Volumetric analysis

7.1.4.6.2. Deviation from baseline

7.1.4.6.3. Cut-paste function used

7.1.4.7. Remote access and time of day abnormal from baselines

7.1.4.8. User authentication failure

7.1.4.9. User's browser or viewer is not the same as the baseline

7.1.4.10. User is logging into system remotely and locally simultaneously

7.1.4.11. User is logging into system remotely  (not expected)

7.1.4.12. User is logging into system remotely at an abnormal time

7.1.4.13. User is abnormally leveraging applications that are administrative in nature (Control Panel, Command.exe, Group Policy Editor, etc)

8. Security Operations & Incident Response

8.1. Digital Forensics/eDiscovery

8.1.1. Content, File and Endpoint Forensics

8.1.1.1. eDiscovery

8.1.1.1.1. Clearwell

8.1.1.1.2. Kazeon

8.1.1.1.3. Guidance Software

8.1.1.1.4. Access Data

8.1.1.1.5. Autonomy

8.1.1.1.6. kCura

8.1.1.1.7. FTI Technology

8.1.1.1.8. Barracuda Networks

8.1.1.2. Mobile Devices

8.1.1.2.1. BlackBagTech

8.1.1.2.2. Cellebrite

8.1.1.2.3. Compelson Labs

8.1.1.2.4. Guidance Software

8.1.1.2.5. MSAB

8.1.1.2.6. NowSecure

8.1.1.2.7. Oxygen Forensics

8.1.1.2.8. Paraben Corporation

8.1.1.3. Endpoint Computing Systems

8.1.1.3.1. ADF Solutions

8.1.1.3.2. Access Data

8.1.1.3.3. ArxSys

8.1.1.3.4. BlackBag Technologies

8.1.1.3.5. CRU Inc

8.1.1.3.6. Cyfir

8.1.1.3.7. Guidance Software

8.1.1.3.8. Magnet Forensics

8.1.1.3.9. Nuix

8.1.1.3.10. OSForensics

8.1.1.3.11. Paraben Corporation

8.1.1.3.12. WindowsScope

8.1.1.3.13. X-Ways Forensics

8.1.1.4. Email Examination

8.1.1.4.1. Systools Software

8.1.1.4.2. Nuix

8.1.1.5. Forensic File & Data Analysis Tools

8.1.1.5.1. Cellebrite

8.1.1.5.2. Cyfir

8.1.1.5.3. Intella

8.1.1.5.4. Magnet Forensics

8.1.1.5.5. Nuix

8.1.1.5.6. Systools Software

8.1.1.6. Digital Forensics Case Management

8.1.1.6.1. D3 Security

8.1.1.6.2. Digital Investigation Manager

8.1.1.6.3. Guidance Software

8.1.1.6.4. Intaforensiscs

8.1.1.6.5. Sentinel Data

8.1.1.6.6. Sirentech

8.1.1.6.7. Wynyard Group

8.1.1.7. Memory Forensics

8.1.1.7.1. FireEye

8.1.1.7.2. Guidance Software

8.1.1.7.3. Volatility Framework

8.1.1.7.4. WindowsScope

8.1.2. eDiscovery Services

8.1.2.1. Robert Half

8.1.2.2. Advanced Discovery

8.1.3. eDiscovery Software

8.1.3.1. AccessData

8.1.3.2. Guidance Software

8.1.3.3. Nuix

8.1.3.4. Symantec

8.2. Fraud Prevention/Web Malware Monitoring

8.2.1. Fraud/Bot/Webscrape Prevention

8.2.1.1. Software

8.2.1.1.1. IBM (Formerly Trusteer)

8.2.1.1.2. Intellinx

8.2.1.1.3. RSA (EMC)

8.2.1.1.4. ShieldSquare

8.2.1.2. Appliances

8.2.1.2.1. Distil Networks

8.2.1.2.2. Imperva

8.2.1.2.3. RSA

8.2.1.2.4. Shape Security

8.2.1.2.5. White Ops

8.2.1.3. Software as a Service

8.2.1.3.1. Akamai

8.2.1.3.2. BioCatch

8.2.1.3.3. BotScout

8.2.1.3.4. Distil Networks

8.2.1.3.5. Guardian Analytics

8.2.1.3.6. Kount

8.2.1.3.7. MarkMonitor

8.2.1.3.8. NuData Security

8.2.1.3.9. Shape Security

8.2.1.3.10. ShieldSquare

8.2.1.3.11. ThreatMetrix

8.2.1.3.12. White Ops

8.2.1.3.13. X-Cart

8.2.1.3.14. iovation

8.2.1.4. Virtual Appliances

8.2.1.4.1. Distil Networks

8.2.1.4.2. Imperva

8.2.2. Website & Ad Malware Monitoring

8.2.2.1. Ad-Juster

8.2.2.2. Globalsign

8.2.2.2.1. Leverages Hackalert

8.2.2.3. Hackalert

8.2.2.4. Intel Security

8.2.2.4.1. Siteadvisor

8.2.2.5. QualysGuard

8.2.2.6. RiskIQ

8.2.2.7. Sucuri

8.2.2.8. The Media Trust

8.3. Incident Response Legal Services

8.3.1. Information Law Group

8.4. Security Information and Event Management (SIEM), Log Management & Analytics

8.4.1. Application Security Intelligence Engine

8.4.1.1. SAP

8.4.1.1.1. iT-Cube Systems

8.4.2. Log Management

8.4.2.1. EventTracker

8.4.2.2. IGLOO Security

8.4.2.3. Intel Security

8.4.2.3.1. McAfee Enterprise Log Manager

8.4.2.4. Kiwi Syslog Server

8.4.2.5. LogEntries

8.4.2.6. LogRythm

8.4.2.7. Logscape

8.4.2.8. Open Source

8.4.2.8.1. Elasticsearch (ELK Stack)

8.4.2.8.2. SEC (Simple Event Correlator)

8.4.2.8.3. OSSIM

8.4.2.8.4. Syslog-NG

8.4.2.8.5. Octopussy

8.4.2.9. Sawmill

8.4.2.10. Splunk

8.4.2.11. Sumo Logic

8.4.2.12. Tripwire

8.4.2.13. XpoLog

8.4.3. SIEM

8.4.3.1. AlienVault

8.4.3.1.1. OSSIM

8.4.3.2. CorreLog

8.4.3.3. EventTracker

8.4.3.4. Fortinet

8.4.3.5. HP

8.4.3.5.1. Arcsight

8.4.3.6. Hexis Cyber Solutions

8.4.3.6.1. Hawkeye AP

8.4.3.7. IBM

8.4.3.7.1. Q1Radar

8.4.3.8. IGLOO Security

8.4.3.9. Intel Security

8.4.3.9.1. NitroSecurity

8.4.3.10. LogPoint

8.4.3.10.1. http://www.logpoint.com/en/

8.4.3.11. LogRythm

8.4.3.12. Novell

8.4.3.12.1. Sentinel

8.4.3.13. RSA

8.4.3.13.1. Envision

8.4.3.14. Sensage

8.4.3.15. Solarwinds

8.4.3.16. Splunk

8.4.3.17. Sqrrl

8.4.3.18. Tibco

8.4.3.18.1. Loglogic

8.4.3.19. eIQnetworks

8.4.4. Security Analytics

8.4.4.1. Anomaly Analytics

8.4.4.1.1. Intel

8.4.4.1.2. Theta Ray

8.4.4.1.3. Prelert

8.4.4.1.4. eMite

8.4.4.1.5. Niddel

8.4.4.2. User and Entity Behavior Analytics (UEBA)

8.4.4.2.1. Bay Dynamics

8.4.4.2.2. Darktrace

8.4.4.2.3. Detex Systems

8.4.4.2.4. Exabeam

8.4.4.2.5. Fortscale

8.4.4.2.6. Gurcul

8.4.4.2.7. HP

8.4.4.2.8. IBM

8.4.4.2.9. Interset

8.4.4.2.10. Microsoft

8.4.4.2.11. Niara

8.4.4.2.12. ObserveIT

8.4.4.2.13. Palerra

8.4.4.2.14. Platfora

8.4.4.2.15. Reveelium

8.4.4.2.16. Secureonix

8.4.4.2.17. Veriato

8.4.5. User and Entity Behavior Analytics (UEBA)

8.4.5.1. Bae Systems Applied Intelligence

8.4.5.2. Bay Dynamics

8.4.5.3. Caspida

8.4.5.4. Click Security

8.4.5.5. Exabeam

8.4.5.6. FICO

8.4.5.7. Fortscale

8.4.5.8. GuruCul

8.4.5.9. IBM

8.4.5.10. Intellinx

8.4.5.11. Lockheed Martin

8.4.5.12. Logtrust

8.4.5.13. Mobile System 7

8.4.5.14. Novetta Solutions

8.4.5.15. Oracle

8.4.5.16. Rapid7

8.4.5.17. Raytheon

8.4.5.18. SAS Institute

8.4.5.19. Secureonix

8.4.5.20. Splunk

8.5. Security Operations, Analytics and Reporting (SOAR)

8.5.1. Security Incident Response Platforms (SIRP)

8.5.1.1. Agiliance

8.5.1.2. DFLabs

8.5.1.3. Demisto

8.5.1.4. EMC(RSA)

8.5.1.5. Empow

8.5.1.6. Fido

8.5.1.7. Hexadite

8.5.1.8. ID Experts

8.5.1.9. Proofpoint

8.5.1.10. Resilient Systems

8.5.1.11. Siemplify

8.5.1.12. Syncurity

8.5.2. Threat and Vulnerability Management (TVM)

8.5.2.1. Acuity Risk Management

8.5.2.2. Agiliance

8.5.2.3. BeyondTrust

8.5.2.4. Core Security

8.5.2.5. Cybersponse

8.5.2.6. DFLabs

8.5.2.7. EMC(RSA)

8.5.2.8. Kenna Security

8.5.2.9. NopSec

8.5.2.10. RedSeal

8.5.2.11. RiskSense

8.5.2.12. Skybox Security

8.5.2.13. Swimlane

8.5.2.14. Siemplify

8.5.3. Security Operations Analytics

8.5.3.1. Ayehu

8.5.3.2. Cybersponse

8.5.3.3. DFLabs

8.5.3.4. EMC(RSA)

8.5.3.5. Hexadite

8.5.3.6. Proofpoint

8.5.3.7. Resilient Systems

8.5.3.8. Siemplify

8.5.3.9. Swimlane

8.5.4. Security Operations Automation Platforms (SOAPS)

8.5.4.1. Ayehu

8.5.4.2. Cyberbit

8.5.4.3. Cybersponse

8.5.4.4. DFLabs

8.5.4.5. Demisto

8.5.4.6. Empow Security

8.5.4.7. Fireye

8.5.4.8. Hexadite

8.5.4.9. IBM

8.5.4.10. Phantom Cyber

8.5.4.11. Swimlane

8.5.4.12. Syncurity

8.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

8.6.1. Crowdsourced Application Security Testing Platforms

8.6.1.1. Hyver

8.6.1.2. Applause

8.6.1.3. Bugcrowd

8.6.1.4. BugFinders

8.6.1.5. Cobalt

8.6.1.6. Crowdtesters

8.6.1.7. HackerOne

8.6.2. Managed Penetration Testing Services

8.6.2.1. Cenzic

8.6.2.2. WhiteHatSecurity

8.6.3. Penetration Testing Software

8.6.3.1. Core Security

8.6.3.2. Rapid7

8.6.3.2.1. Metasploit Pro

8.6.3.2.2. Metasploit Express

8.6.3.3. Trustwave

8.6.4. Vulnerability Assessment

8.6.4.1. Software as a Service

8.6.4.1.1. Vulnerability Management

8.6.4.1.2. Phish Testing/Management

8.6.4.2. Network-Based Vulnerability Assessment (On Premise)

8.6.4.2.1. Core Security

8.6.4.2.2. Digital Defense

8.6.4.2.3. Fortinet

8.6.4.2.4. Intel Security

8.6.4.2.5. NSAuditor

8.6.4.2.6. Ncircle

8.6.4.2.7. Netasq

8.6.4.2.8. Outpost24

8.6.4.2.9. Qualys

8.6.4.2.10. RandomStorm

8.6.4.2.11. Rapid 7

8.6.4.2.12. Trustwave

8.6.4.3. Agent-Based Vulnerability Assessment

8.6.4.3.1. BeyondTrust

8.6.4.3.2. Qualys

8.6.4.3.3. Secunia

8.6.4.3.4. Tenable

8.6.4.4. Mainframe Vulnerability Assessment

8.6.4.4.1. Key Resources Inc. (KRI)

8.6.5. Vulnerability Correlation

8.6.5.1. Application Vulnerability Correlation

8.6.5.1.1. Code DX

8.6.5.1.2. Denim Group

8.6.5.1.3. Kenna Security

8.6.5.1.4. NopSec

8.6.5.2. Network Vulnerability Correlation

8.6.5.2.1. Cybric

8.6.5.2.2. Kenna Security

8.6.5.2.3. NopSec

8.6.5.2.4. RiskSense

8.6.5.2.5. Secure Decisions

8.6.6. Vulnerability Research

8.6.6.1. CSC

8.6.6.2. HP

8.6.6.2.1. DV Labs

8.6.6.3. HotWAN

8.6.6.4. Intel Security

8.6.6.5. SecNiche Labs

8.6.6.6. Sourcefire VRT

8.6.6.7. Symantec

8.6.6.8. VRLSec

8.6.6.9. Vupen

9. Emerging Security Markets & Technologies

9.1. Application Security

9.1.1. Runtime Application Self-Protection (RASP)

9.1.1.1. Arxan

9.1.1.2. BrixBits

9.1.1.3. Contrast Security

9.1.1.4. HP

9.1.1.5. Hdiv Security

9.1.1.6. Immunio

9.1.1.7. Metaforic

9.1.1.8. OneASP

9.1.1.9. Prevoty

9.1.1.10. Promon

9.1.1.11. SecuPi

9.1.1.12. Signal Sciences

9.1.1.13. Veracode

9.1.1.14. Virsec

9.1.1.15. Waratek

9.1.1.16. WhiteHat Security

9.1.1.17. whiteCryption

9.1.2. Enterprise App-Layer Protection

9.1.2.1. SecuPI

9.1.3. AI-Based Applicaton Threat Defense

9.1.3.1. Sophos

9.1.3.1.1. Formerly Barricade

9.1.3.2. Signal Sciences

9.1.3.3. Threat-X

9.2. Cloud Security

9.2.1. Cloud Protection Gateways

9.2.1.1. CipherCloud

9.2.1.2. Netskope

9.2.1.3. Perspecsys

9.2.1.4. Skyhigh Networks

9.2.1.5. Vaultive

9.2.2. Cloud Access Security Brokers

9.2.2.1. User Activity Monitoring

9.2.2.1.1. Adallom

9.2.2.1.2. Avanan

9.2.2.1.3. Bitglass

9.2.2.1.4. Elastica

9.2.2.1.5. Harvest.ai

9.2.2.1.6. Imperva

9.2.2.1.7. Netscope

9.2.2.1.8. SkyHigh Networks

9.2.2.2. Data Loss Prevention

9.2.2.2.1. Integrated DLP

9.2.2.2.2. Harvest.ai

9.2.2.3. Encryption

9.2.2.3.1. Adallom

9.2.2.3.2. Avanan

9.2.2.3.3. Managed Methods

9.2.2.3.4. SkyHigh Networks

9.2.2.4. Identity and Access Management

9.2.2.4.1. Centrify

9.2.2.4.2. Cloudiway

9.2.2.4.3. Okta

9.2.2.4.4. Ping

9.2.2.5. Access Control

9.2.2.5.1. Adallom

9.2.2.5.2. Avanan

9.2.2.5.3. Bitglass

9.2.2.5.4. Elastica

9.2.2.5.5. FireLayers

9.2.2.5.6. Managed Methods

9.2.2.5.7. Netskope

9.2.2.5.8. Skyfence

9.2.3. Cloud Application Discovery

9.2.3.1. Ciphercloud

9.2.3.2. Elastica

9.2.3.3. Netskope

9.2.3.4. Skyhigh

9.2.4. Cloud Compliance and Security Risk Platforms

9.2.4.1. AlertLogic

9.2.4.2. Cavirin

9.2.4.3. Cloudcheckr

9.2.4.4. Evident.io

9.2.4.5. Harvest AI

9.3. Cross Domain Solutions

9.3.1. Advenica

9.3.1.1. ZoneGuard

9.3.1.2. SecuriRam

9.3.2. General Dynamics

9.3.2.1. TacGuard

9.3.2.2. Crossing Guard

9.3.2.3. NanoXD

9.3.3. LockHeed Martin

9.3.3.1. Trusted Manager

9.3.4. Tresys

9.3.4.1. XD Air

9.3.4.2. XD Bridge

9.3.4.3. XD Guardian

9.3.5. Owl Computing

9.3.5.1. Owl OPDS-100

9.3.5.2. Owl OPDS-100D

9.3.5.3. OCDS-SFF

9.4. Data Security

9.4.1. Network-Based Data Cleansing

9.4.1.1. DataStealth

9.4.1.1.1. http://www.datexdatastealth.com/

9.4.2. Big Data Security

9.4.2.1. BlueTalon

9.5. Endpoint Security

9.5.1. Endpoint Detection and Response (EDR)

9.5.1.1. Agent-Based

9.5.1.1.1. Carbon Black

9.5.1.1.2. Cisco

9.5.1.1.3. Countertack

9.5.1.1.4. CrowdStrike

9.5.1.1.5. Cyberbit

9.5.1.1.6. Cyberreason

9.5.1.1.7. Cylance

9.5.1.1.8. Digital Guardian

9.5.1.1.9. Dtex Systems

9.5.1.1.10. Endgame Systems

9.5.1.1.11. Fidelis Cybersecurity

9.5.1.1.12. FireEye

9.5.1.1.13. Forescout

9.5.1.1.14. Guidance Software

9.5.1.1.15. Hexis Cyber Solutions

9.5.1.1.16. Invincea

9.5.1.1.17. LogRhythm

9.5.1.1.18. NexThink

9.5.1.1.19. Panda Security

9.5.1.1.20. RSA (EMC)

9.5.1.1.21. SecDo

9.5.1.1.22. SentinelOne

9.5.1.1.23. Tanium

9.5.1.1.24. Triumfant

9.5.1.1.25. Verint

9.5.1.1.26. Ziften

9.5.1.2. Agentless

9.5.1.2.1. BeyondTrust

9.5.1.2.2. Cynet

9.5.1.2.3. Fidelis

9.5.1.2.4. WatchGuard

9.5.1.2.5. InfoCyte

9.5.1.2.6. LightCyber

9.5.1.2.7. Outlier Security

9.5.1.2.8. Promisec

9.5.2. Remote Browser-Isolation (remote dom)

9.5.2.1. Amune

9.5.2.1.1. https://amune.org/security

9.5.2.2. Armor5

9.5.2.3. Authentic8

9.5.2.4. Dispel

9.5.2.5. FireGlass

9.5.2.6. Menlo Security

9.5.2.7. Aurionpro

9.5.2.7.1. Formerly Spikes Security

9.6. Identification, Authentication, Access Control & IAM

9.7. Internet of Things

9.7.1. Automotive

9.7.1.1. Security Innovation

9.7.2. Embedded Security

9.7.2.1. Security Innovation

9.8. Network & Infrastructure Security

9.8.1. Content Disarm and Reconstruction (CDR)

9.8.1.1. Check Point Software

9.8.1.1.1. Threat Extraction

9.8.1.2. Glasswall

9.8.1.2.1. http://www.glasswallsolutions.com/

9.8.1.3. Mimecast

9.8.1.3.1. https://www.mimecast.com/

9.8.1.4. OPSWAT

9.8.1.5. ODI

9.8.1.5.1. http://www.odi-x.com/

9.8.1.6. Re-Sec

9.8.1.6.1. http://www.re-sec.com/

9.8.1.7. Sasa-Software

9.8.1.7.1. http://www.sasa-software.com/

9.8.1.8. Solebit Labs

9.8.1.8.1. http://www.solebitlabs.com/

9.8.1.9. Symantec

9.8.1.9.1. DisArm

9.8.1.10. TreSys

9.8.1.10.1. http://www.tresys.com/

9.8.1.11. Votiro

9.8.1.11.1. http://www.votiro.com/

9.8.2. Malware Infection Analysis and Monitoring Services

9.8.2.1. Lastline

9.8.2.1.1. Guardia

9.8.2.2. Cisco

9.8.2.2.1. Formerly OpenDNS

9.8.2.3. Qualys

9.8.2.4. Seculert

9.8.3. Network Behavior and Analytics

9.8.3.1. Industrial Control Systems (ICS)

9.8.3.1.1. CyberX

9.8.4. Standalone Threat Intelligence Defense Solutions (STIDS)

9.8.4.1. Bandura

9.8.4.1.1. PoliWall

9.8.4.2. Centripetal Networks

9.8.4.3. Damballa

9.8.4.4. Fidelis Cybersecurity

9.8.4.5. FireEye

9.8.4.6. Group IB

9.8.4.6.1. http://tds.group-ib.com/

9.8.4.7. Ixia

9.8.4.7.1. http://www.ixiacom.com/info/ta

9.8.4.8. LookingGlass

9.8.4.8.1. https://lgscout.com/products/dns-defender/

9.8.4.9. Redsocks

9.8.4.9.1. Redsocks Threat Defender

9.8.4.10. ReversingLabs

9.8.4.11. RiskAnalytics

9.8.4.11.1. INtellishun

9.8.4.12. Symantec

9.8.4.12.1. APT Network

9.8.5. Unauthorized Endpoint Connection Prevention (UECP)

9.8.5.1. Ensilo

9.8.5.2. Intel Security

9.8.6. Software Defined WAN (SDwan)

9.8.6.1. CloudGenix

9.8.6.2. Pertino

9.8.6.3. Velocloud

9.8.6.4. Viptela

9.8.6.5. Versa Networks

9.8.7. Virtual Container Security

9.8.7.1. Apcera

9.8.7.2. Aqua Security

9.8.7.3. Illumio

9.8.7.4. StackRox

9.8.7.5. TwistLock

9.8.8. Network Security as a Service

9.8.8.1. Cato Networks

9.8.8.2. MyDigitalShield

9.8.8.3. Zscaler

9.8.9. Software Defined Micro-Perimeter

9.8.9.1. BlackRidge Networks

9.8.9.2. Certes Networks

9.8.9.3. Cryptzone

9.8.9.4. Tempered Networks

9.8.9.5. Unisys Stealth

9.8.9.6. Vidder

9.8.9.7. Waverly Labs

9.9. Risk, Compliance and Security Management

9.9.1. Security Ratings & Insurance

9.9.1.1. Security Ratings

9.9.1.1.1. Bitsight Technologies

9.9.1.1.2. Cyence

9.9.1.1.3. Prevalent

9.9.1.1.4. QuadMetrics

9.9.1.1.5. SecurityScoreCard

9.9.1.2. Cyber Risk Insurance

9.9.1.2.1. Balsiger Insurance

9.9.1.2.2. HSB Group

9.9.1.2.3. Philadelphia Insurance Companies

9.9.1.2.4. Tennant Risk Services

9.9.1.2.5. The Hartford

9.9.1.2.6. Travelers

9.10. Security Operations, Incident Response

9.10.1. Intelligence/Data Feeds/Software & Services

9.10.1.1. Security Intelligence and Data Analysis Platforms

9.10.1.1.1. FireEye

9.10.1.2. Threat Intelligence Platforms (TIPs)

9.10.1.2.1. Anomali

9.10.1.2.2. BAE Systems

9.10.1.2.3. Buguroo

9.10.1.2.4. Codenomicon

9.10.1.2.5. Comilion

9.10.1.2.6. Confer

9.10.1.2.7. Eclectic IQ

9.10.1.2.8. Infoblox

9.10.1.2.9. Lockheed Martin

9.10.1.2.10. Lookingglass Cyber Solutions

9.10.1.2.11. Microsoft

9.10.1.2.12. Palentir

9.10.1.2.13. PierceMatrix

9.10.1.2.14. Service Now (Formerly Brightpoint)

9.10.1.2.15. Soltra

9.10.1.2.16. ThreatConnect

9.10.1.2.17. ThreatQuotient

9.10.1.2.18. TruStar

9.10.1.3. Threat Intelligence Services

9.10.1.3.1. Human Intelligence - HUMINT (Strategic)

9.10.1.3.2. Machine-Based (Tactical)

9.10.1.3.3. Vulnerabilities and Exploits

9.10.1.3.4. Data Loss Detection - External

9.10.1.4. Collaborative Threat Investigation Platforms

9.10.1.4.1. BAE System Detica

9.10.1.4.2. IKANow

9.10.1.4.3. Maltego

9.10.1.4.4. NC4

9.10.1.4.5. Palentir

9.10.2. Malware Analysis

9.10.2.1. Malware Analysis as a Service

9.10.2.1.1. Free Services

9.10.2.1.2. ReversingLabs

9.10.2.1.3. ThreatGrid

9.10.2.2. Sandbox Software

9.10.2.2.1. GFI

9.10.2.2.2. Joesecurity

9.10.2.2.3. Bluecoat

9.10.2.2.4. Payload Security

9.10.3. Threat Deception Technologies

9.10.3.1. Distributed Deception Platforms

9.10.3.1.1. Amgine Securus

9.10.3.1.2. Atomic Software Solutions

9.10.3.1.3. Attivo Networks

9.10.3.1.4. CounterCraft

9.10.3.1.5. CyberTrap

9.10.3.1.6. Cymmetria

9.10.3.1.7. GuardiCore

9.10.3.1.8. Illusive Networks

9.10.3.1.9. Javelin Networks

9.10.3.1.10. KeyFocus

9.10.3.1.11. SmokeScreen

9.10.3.1.12. Specter

9.10.3.1.13. TrapX

9.10.3.1.14. Vision Space Technologies

9.10.3.2. Network

9.10.3.2.1. ForeScout

9.10.3.2.2. Juniper Networks

9.10.3.2.3. Percipient Networks

9.10.3.2.4. Ridgeback Network Defense

9.10.3.2.5. Shadow Networks

9.10.3.3. Open Source

9.10.3.3.1. Honeypot

9.10.3.4. Web

9.10.3.4.1. Shape Security

9.10.3.4.2. Juniper Networks

9.10.3.4.3. CyberTrap

9.10.3.5. Files

9.10.3.5.1. Allure Security Technology

9.10.3.5.2. WatchPoint

10. VARs, Distributors, Market Logistics & Supply Chain

10.1. Cloud Service Brokerages

10.1.1. Bitnami

10.1.2. Ensim

10.1.2.1. http://www.ensim.com/

10.1.3. Gravitant

10.1.4. Jamcracker

10.1.4.1. http://www.jamcracker.com/

10.1.5. StandingCloud

10.2. Distribution/Channel/VARs

10.2.1. VARs, Resellers

10.2.1.1. China

10.2.1.1.1. Mainland China

10.2.1.1.2. Hong Kong

10.2.1.1.3. Taiwan

10.2.1.2. Emerging Asia Pacific

10.2.1.2.1. India

10.2.1.2.2. Indonesia

10.2.1.2.3. Malasia

10.2.1.2.4. Thailand

10.2.1.2.5. Philippines

10.2.1.3. Eurasia

10.2.1.3.1. Russian Federation

10.2.1.3.2. Kazakhstan

10.2.1.3.3. Ukraine

10.2.1.4. Europe

10.2.1.4.1. Eastern Europe

10.2.1.4.2. Western Europe

10.2.1.5. Latin America

10.2.1.5.1. Brazil

10.2.1.5.2. Chile

10.2.1.5.3. Columbia

10.2.1.5.4. Costa Rica

10.2.1.5.5. Ecuador

10.2.1.5.6. Bolivia

10.2.1.5.7. Venezuela

10.2.1.5.8. Cuba

10.2.1.5.9. Argentina

10.2.1.5.10. Buenos Aires

10.2.1.5.11. Mexico

10.2.1.5.12. Peru

10.2.1.6. Mature Asia Pacific

10.2.1.6.1. Australia

10.2.1.6.2. Japan

10.2.1.6.3. Singapore

10.2.1.7. Middle East and North Africa

10.2.1.7.1. Turkey

10.2.1.7.2. Israel

10.2.1.7.3. Saudi Arabia

10.2.1.7.4. South Africa

10.2.1.7.5. India

10.2.1.7.6. United Arab Emirates

10.2.1.8. North America

10.2.1.8.1. United States

10.2.1.8.2. Canada

10.2.1.9. Sub-Sahara Africa

10.2.1.9.1. South Africa

10.2.1.10. WorldWide

10.2.1.10.1. AT&T

10.2.1.10.2. BT

10.2.1.10.3. Optiv

10.2.1.10.4. SHI

10.2.1.10.5. Secureworks

10.2.1.10.6. Verizon Business

10.2.2. Distributors

10.2.2.1. China

10.2.2.1.1. AVNet

10.2.2.1.2. B & Data Technology Co. Ltd.

10.2.2.1.3. Beijing Advazone Electronic Limited Comp

10.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.

10.2.2.1.5. Digital China Technology LTD.

10.2.2.1.6. Ecs China

10.2.2.1.7. Edvance Technology (China) Limited

10.2.2.1.8. Huagai

10.2.2.1.9. M.Tech (Shanghai) Co., Ltd.

10.2.2.1.10. Shanghai S-I Information Tech. Ltd

10.2.2.1.11. Sinogrid Information Technology Ltd.

10.2.2.1.12. Sky Faith International Enterprise

10.2.2.2. Emerging Asia Pacific

10.2.2.2.1. India

10.2.2.2.2. Indonesia

10.2.2.2.3. Thailand

10.2.2.3. Eurasia

10.2.2.3.1. Russian Federation

10.2.2.3.2. Kazakhstan

10.2.2.4. Mature Asia Pacific

10.2.2.4.1. Singapore

10.2.2.4.2. Japan

10.2.2.4.3. South Korea

10.2.2.4.4. Australia

10.2.2.5. Middle East and South Africa

10.2.2.5.1. United Arab Emirates

10.2.2.5.2. South Africa

10.2.2.6. North America

10.2.2.6.1. Canada

10.2.2.6.2. United States

10.2.2.7. Sub-Sahara Africa

10.2.2.7.1. South Africa

10.2.2.8. Western Europe

10.2.2.8.1. United Kingdom

10.2.2.8.2. Germany

10.2.2.9. Worldwide

10.2.2.9.1. AVNet

10.2.2.9.2. Ingram Micro

10.2.2.9.3. LifeBoat Distribution

10.2.2.9.4. Tech Data

10.2.2.9.5. Westcon

10.2.2.10. Latin America

10.2.2.10.1. Mexico

10.2.2.10.2. Brazil

10.2.3. Reseller Programs

10.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm

10.2.4. Logistics/Deal Registration

10.2.4.1. Connectwise

10.3. Government Cyberwarrior (Personnel Estimates)

10.3.1. United States

10.3.1.1. NSA

10.3.1.1.1. Cyberwarrior Stats

10.3.1.2. Department of Defense

10.3.1.2.1. US Airforce

10.3.1.2.2. US Navy

10.3.1.2.3. DISA

10.3.2. Iran

10.3.2.1. 4500

10.3.3. Israel

10.3.3.1. Unit 8200

10.3.3.1.1. 5000

10.3.4. North Korea

10.3.4.1. 1000

10.4. Hardware and Chip Security

10.4.1. AMD

10.4.1.1. TPM

10.4.2. Cavium

10.4.2.1. Multi-Core Processors

10.4.3. Flow Processors

10.4.3.1. Netronome

10.4.4. Intel

10.4.4.1. TPM

10.4.4.2. Data Execution Protection

10.4.5. Systems

10.4.5.1. Janus Technologies

10.4.5.1.1. http://www.janustech.com/janus_secure_computer.html

10.5. Investment

10.5.1. ETFs

10.5.1.1. PureFunds

10.5.1.1.1. SYM:HACK

10.5.2. Venture Capitalists

10.5.2.1. Trident Capital

10.5.2.2. Andreesen Horowitz

10.6. Managed Service Enablement

10.6.1. Chartec

10.6.2. Jamcracker

10.7. Marketing/PR/AR

10.7.1. Analyst & Public Relations

10.7.1.1. Focused Image

10.7.1.1.1. http://www.focusedimage.com/

10.7.1.2. KTCpr

10.7.1.2.1. http://www.kahn-travel.com/

10.7.1.3. Madison Alexander PR

10.7.1.3.1. http://www.madisonalexanderpr.com/

10.7.1.4. Marc Gendron PR

10.7.1.4.1. http://www.mgpr.info/

10.7.1.5. Schwartz Communications

10.7.1.5.1. http://www.schwartzmsl.com/

10.7.1.6. Spalding Communications

10.7.1.7. Text 100

10.7.1.7.1. http://www.text100.com/

10.7.2. Campaign/Engagement

10.7.2.1. Jivox

10.7.2.2. WCG World

10.7.3. Creative/Design Services

10.7.3.1. Creative Circle

10.7.3.1.1. https://www.creativecircle.com/

10.7.3.2. Duarte

10.7.3.2.1. http://www.duarte.com/

10.7.3.3. Gig Productions

10.7.3.3.1. http://www.gigpros.com/index.php

10.7.3.4. Initiate Marketing

10.7.3.4.1. http://www.getinitiated.ca/

10.7.3.5. MN8Studio

10.7.3.5.1. http://www.mn8studio.com/

10.7.3.6. Text 100

10.7.3.6.1. http://www.text100.com/

10.7.4. Web Site Design

10.7.4.1. Baytech Web Design

10.7.4.1.1. http://www.baytechwebdesign.com/

10.7.4.2. EU Design Studios

10.7.4.2.1. http://eudesignstudio.com/

10.7.4.3. Pro Logic Web Services

10.7.4.3.1. http://www.prologicsoft.com/

10.7.5. Market Destinations (Sites)

10.7.5.1. CRN

10.7.5.2. Hak5

10.7.5.3. MSPMentor

10.7.5.4. Madison Logic

10.7.5.5. SCmagazine

10.7.5.6. TheVarGuy

10.7.6. Marketing Videos

10.7.6.1. Epipheo

10.7.6.1.1. http://www.epipheo.com/

10.7.7. Marketing/Branding Agencies

10.7.7.1. Focused Image

10.7.7.1.1. http://www.focusedimage.com/branding/

10.7.7.2. Hill and Knowlton

10.7.7.2.1. http://www.hkstrategies.com/

10.7.7.3. MetaDesign

10.7.7.3.1. http://www.metadesign.com/san-francisco

10.7.7.4. Ogilvy & Mather

10.7.7.5. Tailfin Marketing Communications

10.7.7.6. Toolbox Studios

10.8. OEMs & System Integrators

10.8.1. Appliance Integrators

10.8.1.1. Accton

10.8.1.1.1. http://www.accton.com/

10.8.1.2. Advantech

10.8.1.2.1. http://www.advantech.com/

10.8.1.3. Celestica

10.8.1.3.1. http://www.celestica.com/

10.8.1.4. Dan-el Technologies Ltd.

10.8.1.4.1. http://www.danel.co.il/

10.8.1.5. Flextronics

10.8.1.5.1. http://www.flextronics.com/

10.8.1.6. Plexus

10.8.1.6.1. http://www.plexus.com/

10.8.1.7. Reservoir Labs

10.8.1.7.1. https://www.reservoir.com/

10.8.2. Base Appliances

10.8.2.1. Advantech

10.8.2.2. Amax

10.8.2.3. Cas Well

10.8.2.4. Iron Systems

10.8.2.5. Lanner

10.8.2.6. Portwell

10.8.2.7. Tilera

10.8.3. Cards

10.8.3.1. Netronome

10.8.3.2. Tilera

10.8.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection

10.8.4. Encryption Acceleration

10.8.4.1. Intel

10.8.4.1.1. VPRO

10.8.4.2. Gemalto

10.8.4.2.1. Luna PCI

10.8.5. MSSP Appliances

10.8.5.1. 443 Networks

10.8.6. Managed Security OEMs

10.8.6.1. Digital Hands

10.8.7. Security Related Chips & CPUs

10.8.7.1. Broadcom

10.8.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection

10.8.7.2. Cavium

10.8.7.2.1. http://www.cavium.com

10.8.7.3. Lionic

10.8.7.3.1. http://www.lionic.com/

10.8.7.4. Netronome

10.8.7.4.1. http://www.netronome.com

10.8.7.5. Tilera

10.8.7.5.1. http://www.tilera.com/products/processors

10.8.7.6. Intel

10.8.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH

10.8.8. Software

10.8.8.1. Advanced Content Disarming and Reconstruction

10.8.8.1.1. OPSWAT

10.8.8.1.2. Votiro

10.8.8.2. Advanced Threat Protection - Virtual Execution Engines

10.8.8.2.1. ContentKeeper

10.8.8.2.2. Threat Track Security

10.8.8.3. Analytics/Graphing/Reporting OEMs

10.8.8.3.1. Embedded Analytics

10.8.8.3.2. Graphing/Reporting

10.8.8.4. Anti-Spam/Phishing

10.8.8.4.1. APWG

10.8.8.4.2. BrandProtect

10.8.8.4.3. Cyren

10.8.8.4.4. Ikarus

10.8.8.4.5. Internet Fraud Alert

10.8.8.4.6. ReturnPath

10.8.8.4.7. WebRoot Brightcloud

10.8.8.5. AntiMalware

10.8.8.5.1. Antiy

10.8.8.5.2. Avira

10.8.8.5.3. Bitdefender

10.8.8.5.4. Cyren

10.8.8.5.5. ESet

10.8.8.5.6. Fortinet

10.8.8.5.7. GFI

10.8.8.5.8. Ikarus

10.8.8.5.9. Intel Security

10.8.8.5.10. Kaspersky

10.8.8.5.11. Norman

10.8.8.5.12. OPSWAT

10.8.8.5.13. QuickHeal

10.8.8.5.14. ThreatTrack

10.8.8.5.15. Zillya

10.8.8.5.16. ZonerAntiVirus

10.8.8.6. Content Extraction & Search

10.8.8.6.1. Oracle

10.8.8.7. Encryption

10.8.8.7.1. Transport

10.8.8.8. Endpoint Security and Management

10.8.8.8.1. OPSWAT

10.8.8.9. File Content Decoding/Analysis/Fingerprinting

10.8.8.9.1. HP Autonomy

10.8.8.9.2. Attivio

10.8.8.9.3. GTB Technologies

10.8.8.10. IT Service Management

10.8.8.10.1. ITRP

10.8.8.11. Image Recognition

10.8.8.11.1. Image Analyzer

10.8.8.12. Intrusion Detection/Prevention Signatures

10.8.8.12.1. Proofpoint

10.8.8.13. Network Stack

10.8.8.13.1. IPV4/6

10.8.8.13.2. Deep Packet Inspection

10.8.8.13.3. SDN

10.8.8.14. Optical Character Recognition

10.8.8.14.1. Abbyy

10.8.8.15. Social Network Content Control

10.8.8.15.1. NetboxBlue

10.8.8.16. URL Categorization

10.8.8.16.1. Cyren

10.8.8.16.2. Ikarus

10.8.8.16.3. Malware

10.8.8.16.4. Webroot Brightcloud

10.8.8.16.5. Zvelo

10.8.8.17. Voice Recognition

10.8.8.17.1. STC

10.8.8.17.2. Nuance

10.8.9. Threat Intelligence

10.8.9.1. Anti-Phishing

10.8.9.1.1. Cyren

10.8.9.2. DNS DGA Feeds

10.8.9.2.1. Farsight Security

10.8.9.3. File Reputation

10.8.9.3.1. Findthatfile

10.8.9.3.2. Webroot

10.8.9.4. Fraud

10.8.9.4.1. Internet Fraud Alert

10.8.9.4.2. National Cyber-Forensics and Training Alliance

10.8.9.5. IP Block Lists

10.8.9.5.1. WebRoot Brightcloud

10.8.9.5.2. Cyren

10.8.9.5.3. Malwarebytes

10.8.9.6. IP Reputation

10.8.9.6.1. Cyren

10.8.9.6.2. WebRoot Brightcloud

10.8.9.7. Indicators of Compromise

10.8.9.7.1. FireEye

10.8.9.7.2. Proofpoint

10.8.9.7.3. Wapack labs

10.8.9.7.4. CIRCL

10.8.9.8. Malicious URL

10.8.9.8.1. Cyren

10.8.9.8.2. Findthatfile

10.8.9.8.3. Webroot

10.8.9.9. Predictive Intelligence

10.8.9.9.1. Seclytics

10.8.9.10. Vulnerability Research

10.8.9.10.1. Telus Security Labs

10.8.9.10.2. Vupen

10.8.9.11. Malware Samples

10.8.9.11.1. Virustotal

10.8.9.11.2. VirusSign

10.9. Product Testing

10.9.1. Generic Product Testing, Certification and Accreditation

10.9.1.1. Certifications

10.9.1.1.1. North America

10.9.1.1.2. European Union

10.9.1.2. Testing

10.9.1.2.1. United Kingdom

10.9.1.2.2. North America

10.9.1.2.3. Singapore

10.9.1.3. Accreditation

10.9.1.3.1. DOD

10.9.1.3.2. NSA

10.9.2. Anti-Malware Testing

10.9.2.1. AMTSO

10.9.2.2. AV-Test

10.9.2.3. Av-Comparatives

10.9.2.4. MRG Effitas

10.9.2.5. VirusBTN

10.9.3. Sponsored Product Review/Testing

10.9.3.1. Delta Testing LTD

10.9.3.2. Dennis Labs

10.9.3.3. Miercom

10.9.3.4. NSS Labs

10.9.3.5. Network Testing Labs

10.9.3.6. Tolly Group

10.9.3.7. West Coast Labs

10.9.4. Antimalware Standards Bodies

10.9.4.1. AMTSO

10.9.4.1.1. http://www.amtso.org/

10.10. Security Conferences

10.10.1. North America

10.10.1.1. United States

10.10.1.1.1. RSA

10.10.1.1.2. Gartner

10.10.1.1.3. Cornerstones of Trust

10.10.1.1.4. Annual Security Conference

10.10.1.1.5. SecurityBsides

10.10.1.1.6. ShmooCon

10.10.2. Europe

10.10.2.1. United Kingdom

10.10.2.1.1. RSA Conference

10.10.2.1.2. Gartner

10.10.2.2. Russia

10.10.2.2.1. Infosecurity Russia

10.10.3. Emerging Asia Pacific

10.10.4. Mature Asia Pacific

10.10.4.1. Australia

10.10.4.1.1. Gartner

10.10.4.2. Singapore

10.10.4.2.1. RSA

10.11. Staffing/Recruiting/Executive Search

10.11.1. Millard Group

10.11.2. Lynch Bowie Group

10.11.3. Robert Half

10.12. User Interface Design

10.12.1. Consulting

10.12.1.1. User Interface

10.12.1.1.1. BlinkUX

10.12.1.1.2. Sasa Technologies

10.12.1.1.3. Dabapps

10.12.1.2. Customer Survey

10.12.1.2.1. Techvalidate

10.12.2. HTML5 Visualization Libraries

10.12.2.1. Data-Driven Documents

10.12.2.1.1. http://d3js.org/

10.12.2.2. AngularJS

10.12.2.2.1. https://angularjs.org/

10.12.3. Icons

10.12.3.1. IconExperience

10.12.3.1.1. https://www.iconexperience.com/

10.12.3.2. FlatIcon

10.12.3.2.1. http://www.flaticon.com/packs/general-ui

10.12.3.3. ModernUIicons

10.12.3.3.1. http://modernuiicons.com/

10.12.3.4. Ui8

10.12.3.4.1. https://ui8.net/categories/icons

11. Security Consulting & Implementation

11.1. Forensics

11.1.1. Forensics

11.1.1.1. Incident Response

11.1.1.1.1. Crowdstrike

11.1.1.1.2. Cylance

11.1.1.1.3. Deloitte

11.1.1.1.4. Fidelis Cybersecurity

11.1.1.1.5. FireEye

11.1.1.1.6. Guidance Software

11.1.1.1.7. Maryman & Associates

11.1.1.1.8. NTT Coms Security

11.1.1.1.9. Nettitude

11.1.1.1.10. Optiv

11.1.1.1.11. Presecure

11.1.1.1.12. Secureworks

11.1.1.1.13. Verizon

11.1.1.2. E-Discovery & Computer Forensics

11.1.1.3. Endpoint Forensics

11.1.1.4. Network Forensics

11.2. Governance, Advisory, Assessment

11.2.1. Architecture and Design

11.2.2. Business Continuity

11.2.3. Compliance Review

11.2.4. Data Security Program

11.2.5. Governance, Compliance and Policy Design

11.2.5.1. Compliance Mandates

11.2.5.1.1. PCI

11.2.5.1.2. ISO

11.2.5.1.3. HITECH

11.2.5.1.4. HIPAA

11.2.6. People Centric Strategy

11.2.7. Policy Design

11.2.8. Program Assessment

11.2.9. Risk Assessment

11.2.10. Risk Management

11.2.10.1. Booz Allen Hamilton

11.2.10.2. Optiv

11.2.10.3. Cloud Risks

11.2.10.4. On Premise Infrastructure

11.2.10.5. Business Risk

11.2.11. Security Program Development

11.2.11.1. Optiv

11.2.11.2. FOX-IT

11.2.12. Strategy

11.2.13. Governance

11.2.13.1. Optiv

11.2.13.2. FOX-IT

11.2.13.3. Sec Consult

11.3. Operations

11.3.1. Application Security

11.3.1.1. Web

11.3.1.1.1. AppSec Consulting

11.3.1.1.2. Denim Group

11.3.1.1.3. Security Innovation

11.3.1.1.4. WhiteHat Security

11.3.1.1.5. Citigal

11.3.1.1.6. IOActive

11.3.1.2. Mobile

11.3.1.2.1. AppSec Consulting

11.3.1.2.2. Denim Group

11.3.1.3. Software Security Lifecycle (SDLC)

11.3.1.3.1. AppSecConsulting

11.3.1.3.2. Security Innovation

11.3.1.4. Custom Code

11.3.1.4.1. AppSec Consulting

11.3.1.4.2. Security Innovation

11.3.2. Application Security Vulnerability Assessement

11.3.3. Configuration Assessment

11.3.4. Device Security

11.3.5. Fraud, Identification and Privacy

11.3.6. Incident Response

11.3.6.1. Blackthorn Technologies

11.3.6.2. Crowdstrike

11.3.6.3. Dell SecureWorks

11.3.6.4. Deloitte

11.3.6.5. EY

11.3.6.6. FOX-IT

11.3.6.7. FireEye

11.3.6.8. High Tech Bridge

11.3.6.9. Ingalls Information Security

11.3.6.10. Intel Security

11.3.6.10.1. Foundstone

11.3.6.11. K2 Intelligence

11.3.6.12. Lares Consulting

11.3.6.13. Maryman

11.3.6.14. NTT Coms Security

11.3.6.15. Nettitude

11.3.6.16. Optiv

11.3.6.17. PWC

11.3.6.18. Presecure

11.3.6.19. Sec Consult

11.3.6.20. Stroz Friedberg

11.3.6.21. TrustMatta

11.3.7. Penetration Testing

11.3.7.1. AppSec Consulting

11.3.7.2. Core Security

11.3.7.3. Element Digital Security

11.3.7.3.1. http://www.edigitalsecurity.com/

11.3.7.4. FOX-IT

11.3.7.5. High Tech Bridge

11.3.7.6. Ingalls Information Security

11.3.7.7. K2 Intelligence

11.3.7.8. Matasano Security

11.3.7.9. NCC Group

11.3.7.10. Penetration Lab

11.3.7.11. Rapid7

11.3.7.12. Secureworks

11.3.7.13. TrustMatta

11.3.7.14. TrustedSec

11.3.7.15. WhiteHat Security

11.3.8. Remote Access

11.3.9. Secure Code Review

11.3.10. Threat Intelligence

11.3.11. Vulnerability Scan

11.4. Providers by Region

11.4.1. Latin America

11.4.2. Mature Asia/Pacific

11.4.3. Middle East and North Africa

11.4.3.1. Saudi Arabia

11.4.3.1.1. GBM

11.4.3.1.2. PGI

11.4.4. North America

11.4.4.1. A-G

11.4.4.1.1. AppsecConsulting

11.4.4.1.2. CSC

11.4.4.1.3. Control Case

11.4.4.1.4. CrowdStrike

11.4.4.1.5. Dell Secureworks

11.4.4.1.6. Deloitte

11.4.4.1.7. Denim Group

11.4.4.1.8. Ernst & Young

11.4.4.1.9. FireEye

11.4.4.1.10. ForSythe Solutions

11.4.4.1.11. Grant Thornton

11.4.4.2. H-L

11.4.4.2.1. HP

11.4.4.2.2. IBM

11.4.4.2.3. IOActive

11.4.4.2.4. Ingalls Information Security

11.4.4.2.5. Intel Security (Foundstone)

11.4.4.2.6. K2 Intelligence

11.4.4.2.7. Leidos

11.4.4.3. M-S

11.4.4.3.1. NTT Com Security

11.4.4.3.2. Neohapsis

11.4.4.3.3. Optiv

11.4.4.3.4. PWC

11.4.4.3.5. Paladion Networks

11.4.4.3.6. Perimeter eSecurity

11.4.4.3.7. Protivity

11.4.4.3.8. SISA

11.4.4.3.9. Solutionary

11.4.4.3.10. Stroz Friedberg

11.4.4.3.11. Sungard

11.4.4.3.12. Sword and Shield

11.4.4.3.13. Symantec

11.4.4.3.14. Syntegrity Networks

11.4.4.3.15. Sysnet Global Solutions

11.4.4.4. T-Z

11.4.4.4.1. Tevora Business Solutions

11.4.4.4.2. Trustwave

11.4.4.4.3. Verizon

11.4.4.4.4. WhiteHat Security

11.4.4.4.5. Zensar Technologies

11.4.5. Greater China

11.4.6. South Africa

11.4.6.1. Cyanre

11.4.6.1.1. http://www.cyanre.co.za/

11.4.7. Eurasia

11.4.7.1. Russia

11.4.8. Emerging Asia/Pacific

11.4.9. Canada

11.4.9.1. Conexsys

11.4.10. Europe

11.4.10.1. Eastern Europe

11.4.10.1.1. Poland

11.4.10.2. Western Europe

11.4.10.2.1. Italy

11.4.10.2.2. United Kingdom

12. Managed Security Services

12.1. Direct Tech Providers Managed Security

12.1.1. Asia Pacific

12.1.1.1. Australia

12.1.1.2. China

12.1.1.2.1. NSFOCUS

12.1.1.3. Singapore

12.1.2. Europe

12.1.2.1. GoGrid

12.1.2.1.1. Compliance Reporting (PCI, HIPAA)

12.1.2.1.2. Host IDS

12.1.2.1.3. Log Management

12.1.2.1.4. SIEM

12.1.2.1.5. Vulnerability Assessment

12.1.3. Global Providers

12.1.4. Middle East and North Africa

12.1.4.1. Saudi Arabia

12.1.4.2. United Arab Emirates

12.1.5. North America

12.1.5.1. United States

12.1.5.1.1. NSFOCUS

12.1.5.1.2. Check Point Software

12.1.5.1.3. Network Box

12.1.5.1.4. GoGrid

12.1.5.1.5. FireEye

12.1.5.1.6. Rapid7

12.2. Indirect Providers

12.2.1. Emerging Asia Pacific

12.2.1.1. India

12.2.1.1.1. CSS Corp PVT

12.2.1.1.2. Happiest Minds

12.2.1.1.3. SunGard Availability Services

12.2.1.1.4. Ecomnets India PVT. LTD

12.2.2. Europe

12.2.2.1. BT Global Services

12.2.2.2. Dell SecureWorks

12.2.2.3. Germany

12.2.2.3.1. Link11 GMBH

12.2.2.3.2. IPsoft

12.2.2.4. HP

12.2.2.5. Happiest Minds

12.2.2.5.1. Advanced Malware Protection

12.2.2.5.2. Application Activity Monitoring

12.2.2.5.3. Compliance Reporting

12.2.2.5.4. Database Activity Monitoring

12.2.2.5.5. File Integrity Monitoring

12.2.2.5.6. Log Management

12.2.2.5.7. Managed DLP

12.2.2.5.8. Network Forensics

12.2.2.5.9. SIEM

12.2.2.5.10. Unified Threat Management

12.2.2.5.11. Vulnerability Assessment

12.2.2.6. Integralis

12.2.2.7. Navisite

12.2.2.7.1. Mobile Device Management

12.2.2.8. Open Systems

12.2.2.9. Open Systems

12.2.2.10. Orange Business Services

12.2.2.11. SecureData

12.2.2.11.1. Firewall

12.2.2.11.2. IDS/IPS

12.2.2.11.3. SIEM

12.2.2.11.4. Data Loss Prevention

12.2.2.11.5. Secure Web Gateway

12.2.2.11.6. Secure Email Gateway

12.2.2.11.7. VPN/Remote Access

12.2.2.12. SunGard Availability Services

12.2.2.12.1. Firewalls

12.2.2.12.2. IAM

12.2.2.12.3. Intrusion Prevention

12.2.2.12.4. SIEM

12.2.2.12.5. Unified Threat Management

12.2.2.12.6. VPN

12.2.2.12.7. Web Application Firewall

12.2.2.13. Symantec

12.2.2.14. T-Systems

12.2.2.15. Tata Communications

12.2.2.16. Telefonica

12.2.2.16.1. DDoS Protection Service

12.2.2.16.2. Email Encryption

12.2.2.16.3. Email Security Gateway

12.2.2.16.4. Firewall Management

12.2.2.16.5. IAM

12.2.2.16.6. Intrusion Detection

12.2.2.16.7. Intrusion Prevention

12.2.2.16.8. Log Management

12.2.2.16.9. SIEM

12.2.2.16.10. Vulnerability Assessment

12.2.2.16.11. Web Security Gateway

12.2.2.16.12. Anti-Fraud

12.2.2.17. Verizon Business

12.2.2.17.1. Anti-DDoS

12.2.2.17.2. Email Security

12.2.2.17.3. Endpoint Protection

12.2.2.17.4. Firewall Management

12.2.2.17.5. Intrusion Detection

12.2.2.17.6. Intrusion Prevention

12.2.2.17.7. SIEM

12.2.2.17.8. Vulnerability Assessment

12.2.2.17.9. Web Security

12.2.2.18. Wipro

12.2.2.18.1. Email Security Gateway

12.2.2.18.2. Endpoint Security

12.2.2.18.3. Firewall Management

12.2.2.18.4. Fraud Management/Anti-Money Laundering

12.2.2.18.5. GRC

12.2.2.18.6. IAM

12.2.2.18.7. Intrusion Detection

12.2.2.18.8. Intrusion Prevention

12.2.2.18.9. SIEM

12.2.2.18.10. User Access Management

12.2.2.18.11. Web Security Gateway

12.2.3. Global Providers

12.2.3.1. AT&T

12.2.3.1.1. DDos Protection

12.2.3.1.2. Email/Data Encryption Services

12.2.3.1.3. Endpoint Anti-Virus

12.2.3.1.4. Endpoint Patch Management

12.2.3.1.5. Endpoint Policy Compliance

12.2.3.1.6. Mobile Device Security

12.2.3.1.7. Secure Email Gateway

12.2.3.1.8. Security Device Management

12.2.3.1.9. Web Application Firewall

12.2.3.1.10. Web Gateway (URL & Malware Filtering)

12.2.3.2. BEW Global

12.2.3.2.1. Data Loss Prevention

12.2.3.2.2. Web Security Gateway

12.2.3.2.3. Email Security Gateway

12.2.3.2.4. SIEM

12.2.3.2.5. Vulnerability Assessment

12.2.3.3. BT

12.2.3.4. Dell Secureworks

12.2.3.4.1. Advanced Malware Protection

12.2.3.4.2. Email Security Gateway

12.2.3.4.3. Firewall Management

12.2.3.4.4. Host IPS

12.2.3.4.5. IDS/IPS

12.2.3.4.6. Log Management

12.2.3.4.7. Log Retention

12.2.3.4.8. SIEM

12.2.3.4.9. Threat Intelligence

12.2.3.4.10. Unified Threat Management

12.2.3.4.11. Vulnerability Assessment

12.2.3.4.12. Web Application Firewall

12.2.3.4.13. Web Application Vulnerability Assessment

12.2.3.5. Dimension Data

12.2.3.6. HP

12.2.3.6.1. Access Managment

12.2.3.6.2. Data Loss Prevention

12.2.3.6.3. Email Security Gateway

12.2.3.6.4. Endpoint Encryption

12.2.3.6.5. Endpoint Protection

12.2.3.6.6. Intrusion Detection

12.2.3.6.7. Intrusion Prevention

12.2.3.6.8. Managed Incident Response

12.2.3.6.9. Remote Access Management

12.2.3.6.10. SIEM

12.2.3.6.11. Vulnerability Assessment

12.2.3.6.12. Web Application Vulnerability Assessment

12.2.3.6.13. Web Security Gateway

12.2.3.7. IBM

12.2.3.7.1. Email Security Gateway

12.2.3.7.2. Endpoint Patch Management

12.2.3.7.3. Endpoint Policy Management

12.2.3.7.4. Endpoint Protection

12.2.3.7.5. Firewall Management

12.2.3.7.6. IAM

12.2.3.7.7. Intrusion Detection

12.2.3.7.8. Intrusion Prevention

12.2.3.7.9. Log Management

12.2.3.7.10. Mobile Device Security

12.2.3.7.11. SIEM

12.2.3.7.12. Unified Threat Management

12.2.3.7.13. Vulnerability Assessment

12.2.3.7.14. Web Security Gateway

12.2.3.7.15. Web Vulnerability Assessment

12.2.3.8. Proficio

12.2.3.8.1. Email Security

12.2.3.8.2. Firewall Management

12.2.3.8.3. Incident Response

12.2.3.8.4. Log Management

12.2.3.8.5. Privileged Account Management

12.2.3.8.6. Regulatory and Polcy Compliance

12.2.3.8.7. SIEM

12.2.3.8.8. SOC Services

12.2.3.8.9. Vulnerability Assessment

12.2.3.8.10. Web Security

12.2.3.9. Tech Mahindra

12.2.3.9.1. Email Security

12.2.3.9.2. Endpoint Protection

12.2.3.9.3. Firewall Management

12.2.3.9.4. Identity and Access Management

12.2.3.9.5. Intrusion Detection

12.2.3.9.6. Intrusion Prevention

12.2.3.9.7. Log Management

12.2.3.9.8. SIEM

12.2.3.9.9. SOC Services

12.2.3.9.10. Vulnerability Assessment

12.2.3.9.11. Web Security

12.2.3.10. Telstra

12.2.3.11. Verizon Business

12.2.3.11.1. Anti-DDoS

12.2.3.11.2. Email Security

12.2.3.11.3. Endpoint Protection

12.2.3.11.4. Firewall Management

12.2.3.11.5. Intrusion Detection

12.2.3.11.6. Intrusion Prevention

12.2.3.11.7. SIEM

12.2.3.11.8. Vulnerability Assessment

12.2.3.11.9. Web Security

12.2.4. Greater China

12.2.4.1. Hong Kong

12.2.4.1.1. Network Box

12.2.4.1.2. Netswitch

12.2.4.2. BEW Global

12.2.4.2.1. Data Loss Prevention

12.2.4.2.2. Web Security Gateway

12.2.4.2.3. Email Security Gateway

12.2.4.2.4. SIEM

12.2.4.2.5. Vulnerability Assessment

12.2.4.3. Beijing

12.2.4.3.1. Netswitch

12.2.4.4. Shanghai

12.2.4.4.1. Shanghai Data Solution Co., Ltd

12.2.5. Latin America

12.2.5.1. Brazil

12.2.5.1.1. Arcon

12.2.5.1.2. Netcentrics

12.2.5.1.3. RealProtect

12.2.5.1.4. UOL Diveo

12.2.6. Mature Asia Pacific

12.2.6.1. Australia

12.2.6.1.1. Tesserent

12.2.6.1.2. Verizon

12.2.6.2. Singapore

12.2.6.2.1. Quann

12.2.6.2.2. NTT Singapore

12.2.6.2.3. Happiest Minds

12.2.6.2.4. Singtel

12.2.6.2.5. NCS Group

12.2.7. Middle East and North Africa

12.2.7.1. Saudi Arabia

12.2.7.2. United Arab Emirates

12.2.7.2.1. Du Telecom

12.2.7.2.2. Tata Communications

12.2.7.2.3. Dell Secureworks

12.2.7.2.4. Dimension Data

12.2.8. North America

12.2.8.1. Canada

12.2.8.1.1. Above Security

12.2.8.1.2. Bell Canada

12.2.8.1.3. EWA

12.2.8.1.4. Happiest Minds

12.2.8.1.5. Netpulse

12.2.8.1.6. OneStone (Formerly Seccuris)

12.2.8.1.7. SecureData

12.2.8.1.8. SentryMetrics

12.2.8.1.9. SunGard Availability Services

12.2.8.1.10. Virtual Guardian

12.2.8.2. United States

12.2.8.2.1. AT&T

12.2.8.2.2. Above Security

12.2.8.2.3. Alert Logic

12.2.8.2.4. Allstream

12.2.8.2.5. CGI

12.2.8.2.6. CSC

12.2.8.2.7. CSS Corp

12.2.8.2.8. CentraComm

12.2.8.2.9. CenturyLink- Savvis

12.2.8.2.10. Clone Systems

12.2.8.2.11. Compucom Systems

12.2.8.2.12. Cosentry

12.2.8.2.13. Dell Secureworks

12.2.8.2.14. Earthlink

12.2.8.2.15. Esentire

12.2.8.2.16. HCL Technologies

12.2.8.2.17. HP

12.2.8.2.18. Happiest Minds

12.2.8.2.19. IBM

12.2.8.2.20. Intelisecure

12.2.8.2.21. Leidos

12.2.8.2.22. LunarLine

12.2.8.2.23. Masergy Communications

12.2.8.2.24. Megapath

12.2.8.2.25. Morphick

12.2.8.2.26. My Digital Shield

12.2.8.2.27. NCA - Network Computing Architects

12.2.8.2.28. Navisite

12.2.8.2.29. Netfortris

12.2.8.2.30. Netswitch

12.2.8.2.31. Nuspire Networks

12.2.8.2.32. Rook Security

12.2.8.2.33. Secure Designs

12.2.8.2.34. SilverSky (Formerly Stillsecure/Perimeter esecurity)

12.2.8.2.35. Solutionary

12.2.8.2.36. SunGard Availability Services

12.2.8.2.37. Sword and Shield

12.2.8.2.38. Symantec

12.2.8.2.39. Symantec

12.2.8.2.40. Syntegrity Networks

12.2.8.2.41. Tesserent

12.2.8.2.42. Trustwave

12.2.8.2.43. Verizon Business

12.2.8.2.44. Wipro

12.2.9. Sub-Sahara Africa

12.2.9.1. AccessKenya

12.2.9.1.1. Firewall

12.2.9.1.2. Endpoint Protection

12.2.9.1.3. Secure Web Gateway

13. Risk, Compliance and Security Management

13.1. Firewall Workflow,Modeling & Change Management

13.1.1. Checkpoint Software

13.1.2. Firemon

13.1.3. ManageEngine

13.1.4. Redseal Networks

13.1.5. Skybox

13.1.6. Tufin

13.1.7. Veriflow

13.2. Legal and regulatory information governance

13.3. Privacy

13.4. Regulations, Awareness and Training

13.4.1. Computer Based Training

13.4.1.1. Aujas

13.4.1.2. BeOne Development

13.4.1.3. Digital Defense

13.4.1.4. Fishnet Security

13.4.1.5. Inspired eLearning

13.4.1.6. Junglemap

13.4.1.7. KnowBe4

13.4.1.8. MediaPro

13.4.1.9. PhishMe

13.4.1.10. Phishline

13.4.1.11. Popcorn Training

13.4.1.12. Sans Institute

13.4.1.13. Scipp International

13.4.1.14. Secure Mentem

13.4.1.15. Security Innovation

13.4.1.16. Security Mentor

13.4.1.17. The Security Awareness Company

13.4.1.18. ThreatSim

13.4.1.19. Wombat Security Technologies

13.4.2. Educational, Awareness & News Outlets

13.4.2.1. Government Led

13.4.2.1.1. Information Sharing and Analysis Centers (ISACs)

13.4.2.2. Periodicals & Target Roles

13.4.2.2.1. Channel

13.4.2.2.2. CISO/CSO

13.4.2.2.3. Security Engineers/Analysts

13.4.3. Industry Standards/Groups

13.4.3.1. Standards

13.4.3.1.1. Technical

13.4.3.2. Industry Groups

13.4.3.2.1. Audit

13.4.3.2.2. General Security

13.4.3.2.3. Forensics

13.4.4. Regulations, Public Standards and Contractual Mandates

13.4.4.1. Global

13.4.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)

13.4.4.1.2. NIST

13.4.4.2. Country/Region Specific

13.4.4.2.1. China

13.4.4.2.2. Singapore

13.4.4.2.3. European Union

13.4.4.2.4. United States

13.5. Security Policy and Response Orchaestration Platforms

13.5.1. FireEye

13.5.2. Phantom

13.5.2.1. https://www.phantom.us/

13.5.3. Proofpoint

13.6. Security Program and Governance

13.6.1. Governance, Risk and Compliance

13.6.1.1. eGRC

13.6.1.1.1. Software as a Service

13.6.1.1.2. Software

13.6.1.2. Compliance Oriented Private Cloud Hosting (COPCH)

13.6.1.2.1. Note: This list is not an attestation of compliance

13.6.1.3. Operational Risk Analytics

13.6.1.3.1. Algosec

13.6.1.3.2. Cyber Observer

13.6.1.3.3. Cytegic

13.6.1.3.4. Firemon

13.6.1.3.5. IBM

13.6.1.3.6. Redseal Networks

13.6.1.3.7. Kenna Security

13.6.1.3.8. Skybox

13.6.1.3.9. Software Development Lifecycle

13.6.1.3.10. Solarwinds

13.6.1.3.11. Tufin

13.6.1.4. Cloud & Container Compliance Assessment

13.6.1.4.1. Cavirin