Emerging Security Markets & Technologies

Get Started. It's Free
or sign up with your email address
Rocket clouds
Emerging Security Markets & Technologies by Mind Map: Emerging Security Markets & Technologies

1. Application Security

1.1. Runtime Application Self-Protection (RASP)

1.1.1. Arxan

1.1.2. BrixBits

1.1.3. Contrast Security

1.1.4. Hdiv Security

1.1.5. HP

1.1.6. Immunio

1.1.7. Inside Secure

1.1.8. LayeredInsight

1.1.9. OneASP

1.1.10. Prevoty

1.1.11. Promon

1.1.12. SecuPi

1.1.13. Signal Sciences

1.1.14. Tcell

1.1.15. Veracode

1.1.16. Virsec

1.1.17. Waratek

1.1.18. whiteCryption

1.1.19. WhiteHat Security

1.2. Enterprise App-Layer Protection

1.2.1. SecuPI

1.3. AI-Based Applicaton Threat Defense

1.3.1. CyKick Labs

1.3.2. Elastic Beam

1.3.3. LastWall

1.3.4. Signal Sciences

1.3.5. Spherical Defence

1.3.6. TemplarBit

1.3.7. Threat-X

1.3.8. WallArm

2. Data & Collaboration Security

2.1. Big Data Security

2.1.1. BlueTalon

2.2. Enclave-based Key Storage

2.2.1. Fortanix

2.3. Network-Based Data Cleansing

2.3.1. DataStealth

2.3.1.1. http://www.datexdatastealth.com/

2.4. PII Discovery

2.4.1. BigID

3. Identification, Authentication, Access Control & IAM

3.1. User Authentication

3.1.1. Behavioral Authentication

3.1.1.1. Behaviosec

3.1.1.2. BioCatch

3.1.1.3. Google

3.1.1.3.1. Trust API

3.1.1.4. ThreatMetrix

3.1.1.5. Trusona

4. Infrastructure Protection

4.1. Cloud Security

4.1.1. Hyperscale Container-based Firewalls

4.1.1.1. Juniper Networks

4.1.1.2. ShieldX

4.1.1.3. Public Cloud

4.1.1.3.1. Risk and Security Orchestration

4.1.2. Microsegmentation

4.1.2.1. Bracket Computing

4.1.2.2. Check Point

4.1.2.3. Cloud Passage

4.1.2.4. Edgewise Networks

4.1.2.5. Fortinet

4.1.2.6. Illumio

4.1.2.7. Solarflare

4.1.2.8. vArmour

4.2. Online Fraud Prevention

4.2.1. SheerID

4.3. Secure Web Gateways

4.3.1. Remote Browser-Isolation (remote dom)

4.3.1.1. Amune

4.3.1.1.1. https://amune.org/security

4.3.1.2. Apozy

4.3.1.3. Aurionpro

4.3.1.4. Authentic8

4.3.1.5. DigitalGuardian

4.3.1.6. Dispel

4.3.1.7. Ericom

4.3.1.8. LightPoint Security

4.3.1.9. Menlo Security

4.3.1.10. Randed

4.3.1.11. Symantec

4.3.1.11.1. Formerly Fireglass

4.3.1.12. Weblife

4.4. Software Defined Perimeter (SDP)

4.4.1. BlackRidge Networks

4.4.2. Block Armour

4.4.3. Certes Networks

4.4.4. Cyxtera

4.4.5. Instasafe

4.4.6. Meta Networks

4.4.7. SAFE-T

4.4.8. Saife Inc!

4.4.9. Tempered Networks

4.4.10. Unisys Stealth

4.4.11. Vidder

4.4.12. Waverly Labs

4.4.13. Zscaler

5. BlockChain

5.1. Asset Integrity

5.1.1. Guardtime

5.2. Authentication

5.2.1. NuID

5.3. Encryption

5.3.1. REMME

5.4. Hardware Wallets

5.4.1. Ledger

5.5. Software Defined Perimeter

5.5.1. Block Armour

6. Internet of Things (IoT/OT)

6.1. Access Control

6.1.1. Sensify Security

6.2. Anomaly Detection

6.2.1. InfluxData

6.3. Authentication

6.3.1. Device Authority

6.3.2. Device Authority

6.3.3. Sensify Security

6.3.4. Trusfort

6.4. Automotive

6.4.1. Argus Cyber Security

6.4.2. Karamba Security

6.4.3. ProvenCore

6.4.4. Security Innovation

6.5. Embedded Security

6.5.1. ProvenCore

6.5.2. Security Innovation

6.6. Encryption

6.6.1. Rubicon

6.7. Gateways

6.7.1. Bayshore Networks

6.7.2. Xage Security

6.7.3. Huawei

6.8. Industrial Control Systems (ICS/SCADA)

6.8.1. Network Traffic Inspection

6.8.1.1. Claroty

6.8.1.2. CyberX

6.8.1.3. Dragos

6.8.1.4. Indegy

6.8.1.5. Nexdefense

6.8.1.6. Sentryo

6.8.2. Firewall

6.8.2.1. Check Point Software

6.8.2.2. Forcepoint

6.8.2.3. Fortinet

6.8.2.4. Radiflow

6.8.3. Remote Access

6.8.3.1. Claroty

6.9. Power Monitoring

6.9.1. PFP Cybersecurity

6.10. Radio

6.10.1. Bastille

6.11. Risk and Compliance

6.11.1. VDOO

6.12. Operating System

6.12.1. ProvenCore

7. Risk, Compliance and Security Management

7.1. Cloud Compliance and Security Risk Platforms

7.1.1. AlertLogic

7.1.2. Bracket Computing

7.1.3. Cavirin

7.1.4. Check Point Software

7.1.5. Cloudcheckr

7.1.6. Harvest AI

7.1.7. Palo Alto Networks

7.1.8. RedLock

7.1.9. SiftSecurity

7.1.10. Threat Stack

7.1.11. Trend Micro

7.2. Security Ratings & Insurance

7.2.1. Security Ratings

7.2.1.1. Bitsight Technologies

7.2.1.2. FICO

7.2.1.3. Gooann

7.2.1.4. Guidewire Software

7.2.1.5. Prevalent

7.2.1.6. SecurityScoreCard

7.2.2. Cyber Risk Insurance

7.2.2.1. Balsiger Insurance

7.2.2.2. CyberWrite

7.2.2.3. HSB Group

7.2.2.4. Philadelphia Insurance Companies

7.2.2.5. Tennant Risk Services

7.2.2.6. The Hartford

7.2.2.7. Travelers

8. Security Operations & Incident Response

8.1. Application Security Event Analytics

8.1.1. IDECSI

8.2. Attack Path Modeling, Breach and Attack Simulation

8.2.1. AttackIQ

8.2.2. Attivo Networks

8.2.3. Balbix

8.2.4. Core Security

8.2.5. Cymulate

8.2.6. Illusive Networks

8.2.7. RedSeal

8.2.8. SafeBreach

8.2.9. Skybox

8.2.10. Verodin

8.2.11. XM Cyber

8.3. Intelligence/Data Feeds/Software & Services

8.3.1. Collaborative Threat Investigation Platforms

8.3.1.1. BAE System Detica

8.3.1.1.1. Cybereveal

8.3.1.2. IKANow

8.3.1.3. Maltego

8.3.1.4. NC4

8.3.1.5. Palentir

8.3.1.5.1. Cyber

8.3.2. Open Source Threat & Data Mining

8.3.2.1. ThreatCrowd.org

8.3.2.2. ThreatMiner.org

8.3.3. Security Intelligence and Data Analysis Platforms

8.3.3.1. FireEye

8.3.3.1.1. Security Orchestrator

8.3.3.2. Palentir

8.3.4. Threat Intelligence Platforms (TIPs)

8.3.4.1. Anomali

8.3.4.2. BAE Systems

8.3.4.3. Comilion

8.3.4.4. CTILab

8.3.4.5. Cyjax

8.3.4.6. Eclectic IQ

8.3.4.7. Infoblox

8.3.4.8. Lockheed Martin

8.3.4.9. Lookingglass Cyber Solutions

8.3.4.10. Microsoft

8.3.4.10.1. Interflow

8.3.4.11. NC4

8.3.4.11.1. Soltra

8.3.4.12. Pulsedive

8.3.4.13. Service Now (Formerly Brightpoint)

8.3.4.14. Synopsys

8.3.4.15. ThreatConnect

8.3.4.16. ThreatQuotient

8.3.4.17. TruStar

8.3.4.18. Zeneth

8.3.5. Threat Intelligence Services

8.3.5.1. Human Intelligence - HUMINT (Strategic)

8.3.5.1.1. Attacker Tactics, Techniques and Procedures

8.3.5.1.2. Brand & Attack Target Monitoring

8.3.5.1.3. Credential Theft

8.3.5.1.4. Cybersquatting

8.3.5.1.5. External Data Loss & Risk Monitoring

8.3.5.1.6. Social Media, User Forum and External Threat Monitoring

8.3.5.2. Machine-Based (Tactical)

8.3.5.2.1. Anti-Phishing

8.3.5.2.2. Anti-Spam

8.3.5.2.3. Domain Name Monitoring/DGA Feeds

8.3.5.2.4. File Reputation

8.3.5.2.5. Indicators of Compromise (Feeds)

8.3.5.2.6. IP Blacklists

8.3.5.2.7. IP Reputation Feeds

8.3.5.2.8. Malicious Hashes

8.3.5.2.9. TI Feed Aggregation

8.3.5.2.10. Vulnerabilities and Exploits

8.3.5.2.11. Web Malware

8.4. Malware Analysis

8.4.1. Malware Analysis as a Service

8.4.1.1. Free Services

8.4.1.1.1. Malwr

8.4.1.1.2. Virustotal

8.4.1.1.3. Jotti

8.4.1.2. ReversingLabs

8.4.1.3. ThreatGrid

8.4.2. Sandbox Software

8.4.2.1. GFI

8.4.2.1.1. GFI Sandbox

8.4.2.2. Joesecurity

8.4.2.2.1. Joe Sandbox

8.4.2.3. Payload Security

8.4.2.3.1. http://www.payload-security.com/products/vxstream-sandbox

9. Threat Deception Technologies

9.1. Distributed Deception Platforms

9.1.1. Amgine Securus

9.1.2. Atomic Software Solutions

9.1.2.1. HoneyBot

9.1.3. Attivo Networks

9.1.4. Chaitin

9.1.5. CounterCraft

9.1.6. CyberFog

9.1.7. CyberTrap

9.1.8. Cymmetria

9.1.9. Fidelis Cybersecurity

9.1.10. FormalTech

9.1.11. Illusive Networks

9.1.12. Javelin Networks

9.1.13. JeeSeen

9.1.14. KeyFocus

9.1.15. SmokeScreen

9.1.16. Thinkst Applied Research (Canary)

9.1.17. TrapX

9.1.18. Vision Space Technologies

9.2. Files

9.2.1. Allure Security Technology

9.2.2. WatchPoint

9.3. Malware Anti-Evasion

9.3.1. Minerva Labs

9.4. Network

9.4.1. Hillstone Networks

9.4.2. PacketViper

9.4.3. Percipient Networks

9.4.4. Ridgeback Network Defense

9.4.5. Shadow Networks

9.5. Open Source

9.5.1. Honeypots

9.5.1.1. Database Honeypots

9.5.1.1.1. Delilah

9.5.1.1.2. ESpot

9.5.1.1.3. Elastic Honey

9.5.1.1.4. MongoDB-HoneyProxy

9.5.1.1.5. NoSQLpot

9.5.1.1.6. mysql

9.5.1.2. ICS/Scada

9.5.1.2.1. Conpot

9.5.1.2.2. gridpot

9.5.1.2.3. scada-honeynet

9.5.1.2.4. GasPot

9.5.1.3. Web honeypots

9.5.1.3.1. Bukkit Honeypot

9.5.1.3.2. EoHoneypotBundle

9.5.1.3.3. Glastopf

9.5.1.3.4. Google Hack Honeypot

9.5.1.3.5. HonneyPotter

9.5.1.3.6. Laravel Application Honeypot

9.5.1.3.7. Nodepot

9.5.1.3.8. Servletpot

9.5.1.3.9. Shadow Daemon

9.5.1.3.10. basic-auth-pot

9.5.1.3.11. django-admin-honeypot

9.5.1.3.12. phpmyadmin_honeypot

9.5.1.3.13. servlet

9.5.1.3.14. shockpot

9.5.1.3.15. smart-Honeypot

9.5.1.3.16. stack-honeypot

9.5.1.3.17. wordpot

9.5.1.3.18. wp-smart-honeypot

9.5.1.4. Service honepots

9.5.1.4.1. Ensnare

9.5.1.4.2. Honeyprint

9.5.1.4.3. Honeypy

9.5.1.4.4. RDPy

9.5.1.4.5. Tom's Honeypot

9.5.1.4.6. honeyntp

9.5.1.4.7. honeypot-camera

9.6. Software

9.6.1. KeyFocus

9.6.1.1. http://www.keyfocus.net/kfsensor/

9.6.2. Specter

9.6.2.1. http://www.specter.com/

9.7. Web

9.7.1. Shape Security

9.7.1.1. ShapeShifter

9.7.2. Juniper Networks

9.7.2.1. WebAppSecure

9.7.3. CyberTrap

9.7.3.1. http://www.cybertrap.com/

9.8. Endpoint Agent

9.8.1. Minerva Labs

9.8.2. Symantec