Emerging Security Markets & Technologies - by Lawrence Pingree

Map of Emerging Technology Markets

Get Started. It's Free
or sign up with your email address
Emerging Security Markets & Technologies - by Lawrence Pingree by Mind Map: Emerging Security Markets & Technologies - by Lawrence Pingree

1. Identification, Authentication, Access Control & IAM

1.1. Active Directory Defense

1.1.1. Acalvio

1.1.2. Crowdstrike

1.1.3. SentinelOne

1.1.4. Varonis

1.1.5. Semperis

1.2. Cloud Infrastructure Entitlement Management

1.2.1. Attivo Networks

1.2.2. Authomize

1.2.3. Britive

1.2.4. CyberArk

1.2.5. Ermetic

1.2.6. Horangi Cyber Security

1.2.7. Microsoft

1.2.8. Obsidian

1.2.9. Palo Alto Networks

1.2.10. SailPoint

1.2.11. Saviynt

1.2.12. Sonrai Security

1.2.13. Zscaler

1.3. Identity Threat Detection and Response (ITDR)

1.3.1. Authmind

1.3.2. Authomize

1.3.3. Cayosoft

1.3.4. CionSystems

1.3.5. Crowdstrike

1.3.6. Imanami

1.3.7. Lepide

1.3.8. ManageEngine

1.3.9. Microsoft (Defender for Cloud)

1.3.10. Netwrix

1.3.11. Oort

1.3.12. Plurilock

1.3.13. QOMPLX

1.3.14. Quest

1.3.15. Semperis

1.3.16. SentinelOne

1.3.17. Silverfort

1.3.18. Varonis

1.3.19. Varonis

1.3.20. Zohno

1.4. Zero Knowledge Proofs (ZKP)

1.4.1. Hardware Accelerators

1.4.1.1. ingonyama

1.4.2. ZKP Services

1.4.2.1. Nulink

2. Infrastructure Protection

2.1. Blockchain-Based Data Protection

2.1.1. Acronis

2.1.2. Via Science

2.2. Enterprise SIGINT

2.2.1. AirEye

2.2.2. Hawkeye360

2.2.3. Loch Technologies

2.2.4. xScape

2.3. Zero Trust Network Access (ZTNA)

2.3.1. Absolute Software

2.3.2. Akamai

2.3.3. Appgate

2.3.4. Banyan Security

2.3.5. Barracuda

2.3.6. Bitglass

2.3.7. Blackberry

2.3.8. Cato Networks

2.3.9. Check Point

2.3.10. Cisco

2.3.11. Cloudflare

2.3.12. Cyolo

2.3.13. Forcepoint

2.3.14. Fortinet

2.3.15. Instasafe

2.3.16. Ivanti

2.3.17. Netscope

2.3.18. Okta

2.3.19. Palo Alto Networks

2.3.20. Pulse Secure

2.3.21. Sophos

2.3.22. Symantec

2.3.23. Verizon

2.3.24. Versa Networks

2.3.25. Zscaler

3. Internet of Things (IoT/OT)

3.1. Access Control

3.1.1. Sensify Security

3.2. Anomaly Detection

3.2.1. InfluxData

3.3. Authentication

3.3.1. Device Authority

3.3.2. Sensify Security

3.3.3. Trusfort

3.4. Automotive

3.4.1. Argus Cyber Security

3.4.2. Karamba Security

3.4.3. ProvenCore

3.4.4. Security Innovation

3.5. Embedded Security

3.5.1. ProvenCore

3.5.2. Security Innovation

3.5.3. Sequitur Labs

3.6. Encryption

3.6.1. Rubicon

3.7. Gateways

3.7.1. Bayshore Networks

3.7.2. Xage Security

3.7.3. Huawei

3.8. Industrial Control Systems (ICS/SCADA)

3.8.1. Network Traffic Inspection

3.8.1.1. Claroty

3.8.1.2. CyberX

3.8.1.3. Dragos

3.8.1.4. Indegy

3.8.1.5. Nexdefense

3.8.1.6. Sentryo

3.8.2. Firewall

3.8.2.1. Check Point Software

3.8.2.2. Forcepoint

3.8.2.3. Fortinet

3.8.2.4. Radiflow

3.8.3. Remote Access

3.8.3.1. Claroty

3.9. Power Monitoring

3.9.1. PFP Cybersecurity

3.10. Radio

3.10.1. Bastille

3.10.2. Epiq

3.10.3. Distributed Spectrum

3.11. Risk and Compliance

3.11.1. VDOO

3.12. Operating System

3.12.1. ProvenCore

4. ML and GenAI Security

4.1. AI and Data Science Consulting

4.1.1. 7EDGE

4.1.2. Addepto

4.1.3. Azati

4.1.4. Boston Consulting Group

4.1.5. Cambridge Consultants

4.1.6. Dataroot Labs

4.1.7. Datatech.ai

4.1.8. Deeper Insight

4.1.9. ExaWizards

4.1.10. EY

4.1.11. Fayrix

4.1.12. IBM

4.1.13. Infosys

4.1.14. Leeway Hertz

4.1.15. Markovate

4.1.16. Quantum Black

4.1.17. Sirius

4.1.18. Skienda

4.1.19. Telstra Purple

4.2. Model Ops

4.2.1. Aporia

4.2.2. Cnvrg.io

4.2.3. HPE

4.2.4. Iguazio

4.2.5. ModelOp

4.2.6. Modzy

4.2.7. Mona

4.2.8. One Data

4.2.9. tmryk

4.2.10. Valohai

4.2.11. Verta

4.2.12. AI Platforms

4.2.12.1. Ask Sage

4.2.12.1.1. Data Encryption

4.2.12.2. Aggregators, Edge & Decentralized Networks

4.2.12.2.1. Akash Network

4.2.12.2.2. OpenRouter

4.2.12.2.3. Vercel AI SDK/Gateway

4.2.12.2.4. Hyperbolic

4.2.12.2.5. Hugging Face

4.2.12.2.6. Cloudflare

4.2.12.3. Frontier & Proprietary Model Providers

4.2.12.3.1. Meta

4.2.12.3.2. Mistral AI

4.2.12.3.3. xAI

4.2.12.3.4. Anthropic

4.2.12.3.5. DeepSeek

4.2.12.3.6. Cohere

4.2.12.3.7. AI21 Labs

4.2.12.3.8. Upstage

4.2.12.4. High-Performance & Hardware-Optimized Providers

4.2.12.4.1. Groq

4.2.12.4.2. Cerebras Systems

4.2.12.4.3. Sambanova.ai

4.2.12.4.4. SiliconFlow

4.2.12.4.5. Graphcore Cloud

4.2.12.4.6. Intel

4.2.12.4.7. AMD

4.2.12.5. Enterprise Integrated Cloud Platforms

4.2.12.5.1. Amazon

4.2.12.5.2. Alibaba Cloud

4.2.12.5.3. Baidu

4.2.12.5.4. Databricks

4.2.12.5.5. Google

4.2.12.5.6. IBM

4.2.12.5.7. Microsoft

4.2.12.5.8. Oracle Cloud

4.2.12.5.9. Snowflake

4.2.12.5.10. Salesforce

4.2.12.6. GPU-as-a-Service & Orchestration

4.2.12.6.1. CoreWeave

4.2.12.6.2. DigitalOcean

4.2.12.6.3. LamdaLabs

4.2.12.6.4. Koyeb

4.2.12.6.5. Modal

4.2.12.6.6. Nebius AI

4.2.12.6.7. RunPod

4.2.12.6.8. Scaleway

4.2.12.7. Serverless Open-Model Hosting

4.2.12.7.1. Baseten

4.2.12.7.2. DeepInfra

4.2.12.7.3. Fireworks AI

4.2.12.7.4. Featherless AI

4.2.12.7.5. Novita AI

4.2.12.7.6. Lepton AI

4.2.12.7.7. OctoAI

4.2.12.7.8. Together AI

4.2.12.7.9. Replicate

4.3. AI Security Ecosystem

4.3.1. Unified Agentic Defense Platforms

4.3.1.1. Aim Security

4.3.1.2. BigID

4.3.1.3. Calypso AI

4.3.1.4. Check Point

4.3.1.5. Cyera

4.3.1.6. HiddenLayer

4.3.1.7. Knostic

4.3.1.8. Lumia Security

4.3.1.9. Microsoft

4.3.1.10. Noma Security

4.3.1.11. Palo Alto Networks

4.3.1.12. SentinelOne

4.3.1.13. Witness AI

4.3.2. AI Posture (AI-SPM)

4.3.2.1. Arthur AI

4.3.2.2. Cato Networks

4.3.2.3. Cadea AI

4.3.2.4. Cranium AI

4.3.2.5. Calypso AI

4.3.2.6. Cyata

4.3.2.7. Geordie

4.3.2.8. Defakto Security

4.3.2.9. DeepKeep

4.3.2.10. Noma Security

4.3.2.11. Neuraltrust

4.3.2.12. Pillar Security

4.3.2.13. Wallarm

4.3.2.14. Silverfort

4.3.2.15. Zenity

4.3.3. Adversarial Testing (Red Teaming)

4.3.3.1. Noma Security

4.3.3.2. Cyera

4.3.3.3. DeepKeep

4.3.3.4. Enkrypt AI

4.3.3.5. F5

4.3.3.6. Lasso Security

4.3.3.7. Palo Alto Networks

4.3.3.8. SentinelOne

4.3.3.9. ZioSec

4.3.4. Identity and Access

4.3.4.1. Teleport

4.3.4.2. Oasis Security

4.3.4.3. Defakto Security

4.3.4.4. Astrix Security

4.3.4.5. Cyberark

4.3.4.6. Silverfort

4.3.5. Model Governance & Monitoring

4.3.5.1. ActiveFence

4.3.5.2. Apex

4.3.5.3. Aim Security

4.3.5.4. airia

4.3.5.5. AI Shield

4.3.5.6. CalypsoAI

4.3.5.7. Check Poiint (Lakera)

4.3.5.8. Databricks

4.3.5.9. Enkrypt AI

4.3.5.10. Hidden Layer

4.3.5.11. IBM

4.3.5.12. Knostic

4.3.5.13. Lasso Security

4.3.5.14. Palo Alto Networks (Prompt)

4.3.5.15. Pillar Security

4.3.5.16. PointGuardAI

4.3.6. Model Monitoring

4.3.6.1. Abzu

4.3.6.2. Amruta Inc

4.3.6.3. Arize AI

4.3.6.4. ArthurAI

4.3.6.5. DreamQuark

4.3.6.6. Fairly.ai

4.3.6.7. Fiddler

4.3.6.8. Giskard

4.3.6.9. Kyndi

4.3.6.10. Robust Intelligence

4.3.6.11. Seldon Technologies

4.3.6.12. SolasAI

4.3.6.13. Superwise

4.3.6.14. TMRYK

4.3.6.15. TrojAI

4.3.6.16. Truera

4.3.7. Privacy & Data Security

4.3.7.1. Anonos

4.3.7.2. DivePlane

4.3.7.3. Ederlabs

4.3.7.4. Enveil

4.3.7.5. Gretel

4.3.7.6. Hazy

4.3.7.7. LLMShield

4.3.7.8. Mostly AI

4.3.7.9. Plurilock

4.3.7.10. Private AI

4.3.7.11. Protopia AI

4.3.7.12. Securiti

4.3.8. Runtime (prompt firewall)

4.3.8.1. ArthurAI

4.3.8.2. Akto

4.3.8.3. Aim Security

4.3.8.4. Bosch AI Shield

4.3.8.5. Calypso.ai

4.3.8.6. Cisco

4.3.8.7. Cranium

4.3.8.8. CredoAI

4.3.8.9. Cloudflare

4.3.8.10. Collibra

4.3.8.11. F5

4.3.8.12. Enkrpyt AI

4.3.8.13. Jazz Security

4.3.8.14. lunar.dev

4.3.8.15. Lasso Security

4.3.8.16. Microsoft

4.3.8.17. Mindguard

4.3.8.18. NeuralTrustAI

4.3.8.19. Pillar Security

4.3.8.20. PointGuardAI

4.3.8.21. Robust Intelligence

4.3.8.22. TrojAI

4.3.8.23. Tumeryk

4.3.8.24. Veeam (Securiti)

4.3.8.25. WitnessAI

4.3.8.26. Zenity

4.3.8.27. Zerotrusted.ai

4.3.8.28. Zscaler

4.3.9. Secure Code Copilots

4.3.9.1. Alphacode

4.3.9.2. Amazon Codewhisperer

4.3.9.3. Ask Codi

4.3.9.4. Aim Security

4.3.9.5. Bito

4.3.9.6. Black Duck Assist

4.3.9.7. Captain Stack

4.3.9.8. CodeGeex

4.3.9.9. Codeium

4.3.9.10. Cycode

4.3.9.11. Fortify Software

4.3.9.12. Fossa

4.3.9.13. Github

4.3.9.14. GPT-Code-Clippy (GPT-CC)

4.3.9.15. IntelliCode

4.3.9.16. Legit Security

4.3.9.17. Ox Security

4.3.9.18. Pillar Security

4.3.9.19. Replit

4.3.9.20. Snyk

4.3.9.21. Tabnine

4.3.9.22. YouCompleteMe

4.3.10. AI Security (Enterprise browser)

4.3.10.1. Magic Mirror Security

4.3.10.2. Lasso Security

4.3.10.3. Island Security

4.3.10.4. Crowdstrike

4.4. Assessment Frameworks

4.4.1. NIST AI Risk Management Framework (AI RMF 1.0 & 2.0)

4.4.1.1. Organizations needing a flexible, non-certifiable roadmap.

4.4.2. ISO/IEC 42001 (AIMS)

4.4.2.1. Regulated industries needing formal certification.

4.4.3. MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems)

4.4.3.1. Red teams and security analysts mapping active threats.

4.4.4. OWASP Top 10 for LLM Applications

4.4.4.1. Developers building LLM-integrated softwar

4.4.5. Microsoft AI Red Teaming Framework

4.4.5.1. Guide for conducting "red team" exercises on AI systems to identify security, safety, and ethical failures before deployment.

4.4.6. Google SAIF

4.4.6.1. Enterprises looking for operational best practices

4.4.7. BSI (Germany) AI Cloud Service Compliance Criteria Catalogue (AIC4)

4.4.7.1. Focuses on the security of AI models specifically when deployed in cloud environments.

5. Managed Attribution

5.1. Authentic8

5.2. Dispel.io

5.3. nTrepid

5.4. Replica

5.5. Zero Point Security

5.6. Dispersive.io

6. Risk, Compliance and Security Management

6.1. Security Ratings & Insurance

6.1.1. Security Ratings

6.1.1.1. Bitsight Technologies

6.1.1.2. FICO

6.1.1.3. Gooann

6.1.1.4. Guidewire Software

6.1.1.5. Prevalent

6.1.1.6. SecurityScoreCard

6.1.2. Cyber Risk Insurance

6.1.2.1. Balsiger Insurance

6.1.2.2. CyberWrite

6.1.2.3. HSB Group

6.1.2.4. Philadelphia Insurance Companies

6.1.2.5. Tennant Risk Services

6.1.2.6. The Hartford

6.1.2.7. Travelers

6.2. Digital Risk Protection Services

6.2.1. BlueVoyant

6.2.2. CybelAngel

6.2.3. CyberInt

6.2.4. Digital Shadows

6.2.5. IntSights

6.2.6. PhishLabs

6.2.7. Recorded Future

6.2.8. RiskIQ

6.2.9. SafeGuard Cyber

6.2.10. ZeroFOX

7. Security Operations & Incident Response

7.1. AI-SOC

7.1.1. BlinkOps

7.1.2. Bricklayer.ai

7.1.3. Cotool

7.1.4. Dropzone.ai

7.1.5. Method Security

7.1.6. Microsoft

7.1.7. SalemCyber

7.1.8. SevenAI

7.1.9. StrikeReady

7.1.10. Wraithwatch

7.1.11. Vincilogic

7.2. Cloud Incident Response Automation (CIRA)

7.2.1. Binalyze

7.2.2. Cado Security

7.2.3. Cado Security, Binalyze, F-Response, Mitiga, Magnet Forensics, Paraben

7.2.4. F-Response

7.2.5. Magnet Forensics

7.2.6. Mitiga

7.2.7. Paraben

7.3. Continuous Threat and Exposure Management

7.3.1. Cyber Asset Attack Surface Management

7.3.1.1. AirTrack Software

7.3.1.2. AppNovi

7.3.1.3. Armis

7.3.1.4. Axonius

7.3.1.5. Balbix

7.3.1.6. Brinqa

7.3.1.7. CoalFire

7.3.1.8. Cyberpion

7.3.1.9. CyCognito

7.3.1.10. DigitalShadows

7.3.1.11. Dragonfly Cyber

7.3.1.12. FireCompass

7.3.1.13. HackerOne

7.3.1.14. JupiterOne

7.3.1.15. LookingGlass Cyber

7.3.1.16. Microsoft

7.3.1.17. Netspi

7.3.1.18. New Push

7.3.1.19. Noetic Cyber

7.3.1.20. NorthStar.io

7.3.1.21. Palo Alto Networks

7.3.1.22. Panaseer

7.3.1.23. Pentera

7.3.1.24. Performata

7.3.1.25. Randori

7.3.1.26. RunZero

7.3.1.27. Sevco Security

7.3.1.28. TemplarBit

7.3.2. External ASM (EASM)

7.3.2.1. Assetnote

7.3.2.2. Censys

7.3.2.3. Crowdstrike

7.3.2.4. CyCognito

7.3.2.5. Darktrace

7.3.2.6. FireCompass

7.3.2.7. IBM (Formerly Randori)

7.3.2.8. Immuniweb

7.3.2.9. LookingGlass Cyber

7.3.2.10. Mandiant

7.3.2.11. Palo Alto Networks

7.3.2.12. Performata

7.3.2.13. Recorded Future

7.3.2.14. Reflectiz

7.3.2.15. Team Cymru

7.3.2.16. Upguard

7.4. Cyber Defense Program Optimization (CDPO)

7.4.1. Bluelava

7.4.2. Cardinal Ops

7.4.3. Enveedo

7.4.4. Holisticyber

7.4.5. Onyxia

7.4.6. Posturity

7.4.7. Rivial

7.4.8. SeeMetrics

7.4.9. Trustmapp

7.4.10. Veriti

7.4.11. XM Cyber

7.5. Cyber Ranges

7.5.1. Cloud Range

7.5.2. CYBER RANGES

7.5.3. Cyberbit

7.5.4. Cyrin

7.5.5. IBM

7.5.6. Immersive Labs

7.5.7. Keysight

7.5.8. RangeForce

7.5.9. Simspace

7.6. Intelligence/Data Feeds/Software & Services

7.6.1. Collaborative Threat Investigation Platforms

7.6.1.1. BAE Systems Detica

7.6.1.1.1. Cybereveal

7.6.1.2. Maltego

7.6.1.3. NC4

7.6.1.4. Palentir

7.6.1.4.1. Cyber

7.6.2. Open Source Threat & Data Mining

7.6.2.1. ThreatCrowd.org

7.6.2.2. ThreatMiner.org

7.6.3. Security Intelligence and Data Analysis Platforms

7.6.3.1. Trellix

7.6.3.1.1. Security Orchestrator

7.6.3.2. Palentir

7.6.4. Threat Intelligence Platforms (TIPs)

7.6.4.1. Anomali

7.6.4.2. BAE Systems

7.6.4.3. Comilion

7.6.4.4. CTILab

7.6.4.5. Cyjax

7.6.4.6. Eclectic IQ

7.6.4.7. Infoblox

7.6.4.8. Lockheed Martin

7.6.4.9. Lookingglass Cyber Solutions

7.6.4.10. Microsoft

7.6.4.10.1. Interflow

7.6.4.11. NC4

7.6.4.11.1. Soltra

7.6.4.12. Pulsedive

7.6.4.13. Service Now (Formerly Brightpoint)

7.6.4.14. Synopsys

7.6.4.15. ThreatConnect

7.6.4.16. ThreatQuotient

7.6.4.17. TruStar

7.6.4.18. Zeneth

7.6.5. Threat Intelligence Services

7.6.5.1. Human Intelligence - HUMINT (Strategic)

7.6.5.1.1. Attacker Tactics, Techniques and Procedures

7.6.5.1.2. Brand & Attack Target Monitoring

7.6.5.1.3. Credential Theft

7.6.5.1.4. Cybersquatting

7.6.5.1.5. External Data Loss & Risk Monitoring

7.6.5.1.6. Social Media, User Forum and External Threat Monitoring

7.6.5.2. Machine-Based (Tactical)

7.6.5.2.1. Anti-Phishing

7.6.5.2.2. Anti-Spam

7.6.5.2.3. Domain Name Monitoring/DGA Feeds

7.6.5.2.4. File Reputation

7.6.5.2.5. Indicators of Compromise (Feeds)

7.6.5.2.6. IP Blacklists

7.6.5.2.7. IP Reputation Feeds

7.6.5.2.8. Malicious Hashes

7.6.5.2.9. TI Feed Aggregation

7.6.5.2.10. Vulnerabilities and Exploits

7.6.5.2.11. Web Malware

7.7. Penetration Testing as a Service (PTaaS)

7.7.1. BreachLock

7.7.2. Cobalt.io

7.7.3. CyberTest

7.7.4. Edgescan

7.7.5. Guidepoint

7.7.6. Hackerone

7.7.7. strobes.co

7.7.8. TrollEye Security

7.7.9. NetSpi

7.8. Security Search

7.8.1. Cyclops Security

8. Preemptive Cyber Defense (PCD)

8.1. Applications

8.1.1. General Apps

8.1.1.1. Polyverse

8.1.1.2. RunSafe Security

8.1.1.3. Jscrambler

8.1.1.4. RunSafe Security

8.1.2. Mobile Apps

8.1.2.1. Everspin Global

8.1.3. APIs

8.1.3.1. HOPR

8.1.4. Application Mesh

8.1.4.1. Hopr.co

8.1.4.2. Cloudflare

8.1.5. Mobile Apps

8.1.5.1. Everspin Global

8.2. Data Security

8.2.1. Nexitech

8.2.2. Hypersphere

8.3. Deception

8.3.1. Active Directory

8.3.1.1. Acalvio

8.3.1.2. Proofpoint

8.3.1.3. SentinelOne

8.3.2. Distributed Deception Platforms

8.3.2.1. Acalvio

8.3.2.2. Blumira

8.3.2.3. CommVault

8.3.2.4. CounterCraft

8.3.2.5. Cybersense.ai

8.3.2.6. Cynet

8.3.2.7. Defensys

8.3.2.8. Fidelis Cybersecurity

8.3.2.9. Fortinet

8.3.2.10. Labyrinth.tech

8.3.2.11. PacketViper

8.3.2.12. Rapid7

8.3.2.13. Seedata.io

8.3.2.14. SentinelOne

8.3.2.15. Thinkst Canary

8.3.2.16. Zscaler

8.3.3. Endpoint

8.3.3.1. Cybertrap

8.3.3.2. DeceptiveBytes

8.3.3.3. Minerva Labs

8.4. Kubernetes

8.4.1. R6 Security

8.5. Memory

8.5.1. Anjuna

8.5.2. Arms Cyber Defense

8.5.3. Intel

8.5.4. Morphisec

8.6. Network

8.6.1. CryptoniteNXT

8.6.2. Dispel.io

8.6.3. Dispersive.io

8.6.4. scatr.it

8.7. Operating Systems

8.7.1. Runsafe Security

8.8. Secure Computation

8.8.1. Agita Labs

8.8.2. Kameleon Security

8.8.3. Polyverse

8.9. Predictive Intelligence

8.9.1. Seclytics

8.9.2. BforeAI

9. Application Security

9.1. API Defense

9.1.1. Cequence Security

9.1.2. Google Cloud

9.1.3. Imperva

9.1.4. L7Defense

9.1.5. Mulesoft

9.1.6. Noname Security

9.1.7. Salt.Security

9.1.8. Signal Sciences

9.1.9. SignalSciences

9.1.10. Spherical Defence

9.1.11. Spherical Defense

9.1.12. WallArm

9.1.13. Securelayer7

9.1.14. Impart Security

9.1.15. Equixly

9.2. API Security Scanners

9.2.1. Acunetix

9.2.2. Akto

9.2.3. Aptori.dev

9.2.4. Astra

9.2.5. Brightsec

9.2.6. Checkmarx

9.2.7. Contrast Security

9.2.8. Firetail.io

9.2.9. HostedScan

9.2.10. Intruder.io

9.2.11. Levo.ai

9.2.12. Portswigger

9.2.13. Probely

9.2.14. Rapid7

9.2.15. Securelayer7

9.2.16. Wallarm

9.3. Application Security Posture Management (ASPM)

9.3.1. Apiiro

9.3.2. ArmorCode

9.3.3. Bionic

9.3.4. Brinqa

9.3.5. Data Theorum

9.3.6. Dazz

9.3.7. Enso Security

9.3.8. Kenna Security

9.3.9. Kondukto

9.3.10. Maverix

9.3.11. Nucleus

9.3.12. Ox Security

9.3.13. Oxeye

9.3.14. Rezilion

9.3.15. Synopsys (Code Dx)

9.3.16. Tromzo

9.3.17. Wabbi

9.4. Automated Moving Target Defense

9.4.1. Applications

9.4.1.1. Application Mesh

9.4.1.1.1. Hopr.co

9.4.1.1.2. Cloudflare

9.4.1.2. General Apps

9.4.1.2.1. RunSafe Security

9.4.1.2.2. Jscrambler

9.4.1.3. Mobile Apps

9.4.1.3.1. Everspin Global

9.5. Composable Security APIs

9.5.1. Abuse.ch (URLHAUS)

9.5.2. Alienvault

9.5.3. Amazon

9.5.4. Avira

9.5.5. Bitdefender

9.5.6. BrightCloud (OpenText)

9.5.7. CISA (Automated Intelligence Sharing - AIS)

9.5.8. Domaintools

9.5.9. Fingerbank

9.5.10. Flare

9.5.11. Google (Virustotal)

9.5.12. Infraguard

9.5.13. Intel 471

9.5.14. MISP

9.5.15. Okta

9.5.16. OpenPhish

9.5.17. Pangea Security

9.5.18. Ping Identity

9.5.19. Proofpoint (Emerging Threats)

9.5.20. ReversingLabs

9.5.21. Sophos

9.5.22. Spamhaus

9.5.23. Stairwell

9.5.24. VMray

9.6. Open Source Vulnerability Management

9.6.1. Seal.Security

9.6.2. Tidelift

9.7. AI Application Security

9.7.1. Bug Fix/Vulnerability Remediation

9.7.1.1. AppSecure AI

9.7.1.2. Clover Security

9.7.1.3. Casco

9.7.1.4. Corgea

9.7.1.5. Gecko Security

9.7.1.6. MindFort

9.7.1.7. ProjectDiscovery

9.7.1.8. Prime Security

9.7.1.9. Pixee

9.7.1.10. Qwiet AI

9.7.1.11. Seal Security

9.7.1.12. Theorem

9.7.1.13. Winfunc

9.7.2. Autonomous Vulnerability Correlation

9.7.2.1. Mobb

9.7.3. App Detection and Response

9.7.3.1. Miggo

9.7.4. Bot Defense

9.7.4.1. Arcjet

9.7.5. Security Policy Guardrailing

9.7.5.1. Koi AI

10. Enterprise Browser Security

10.1. Browser Extensions for Security

10.1.1. Conceal.io

10.1.2. Ermes

10.1.3. Grip Security

10.1.4. Guard.io

10.1.5. Hackasecurity

10.1.6. HP

10.1.7. Inky

10.1.8. Keep Aware

10.1.9. Lasso Security

10.1.10. LayerX

10.1.11. Manage Engine

10.1.12. Perception Point

10.1.13. Red Access

10.1.14. Seraphic

10.1.15. Seraphic

10.1.16. Session Guardian

10.1.17. Slashnext

10.1.18. Trend Micro

10.2. Secure Enterprise Browsers

10.2.1. Brave for Enterprises

10.2.2. Crowdstrike

10.2.2.1. Seraphic Security

10.2.3. Firefox Enterprise

10.2.4. Google Enterprise Browser

10.2.5. Island.io

10.2.6. LayerX Security

10.2.7. Microsoft Edge

10.2.8. Palo Alto Networks

10.2.8.1. Prisma Access Enterprise Browser

10.2.9. Surf Security

10.2.10. Venn

10.2.10.1. Blue Border

10.2.11. Zoho

10.2.11.1. Ulaa

11. Collaboration Security

11.1. Abnormal Security

11.2. Check Point Software

11.3. Microsoft

11.4. SafeGuard Cyber

11.5. Slashnext

11.6. Trellix

11.7. Trend Micro

11.8. WithSecure

12. Disinformation Security

12.1. Deepfake Detection

12.1.1. Clarity.ai

12.1.2. Daon

12.1.3. Deepware

12.1.4. Duckduckgoose

12.1.5. Google SynthID

12.1.6. Illuminarty.ai

12.1.7. Intel (Fakecatcher)

12.1.8. Paravision

12.1.9. Reality Defender

12.1.10. Resemble.ai

12.1.11. Sensity.ai

12.1.12. Thehive.ai

12.1.13. Thesentinel.ai

12.1.14. Weverify.eu

12.2. Misinformation Detection

12.2.1. Blackbird.AI

12.2.2. Cyabra

12.2.3. FiveBlocks

12.2.4. Graphika

12.2.5. Logically.ai

12.2.6. NewsGuardtech

12.2.7. Recorded Future

12.2.8. OSavul

13. Cyber Physical

13.1. Video and Surveillance

13.1.1. saliencesecurity.ai

14. BlockChain

14.1. Asset Integrity

14.1.1. Guardtime

14.2. Authentication

14.2.1. NuID

14.3. Blockchain Security Monitoring

14.3.1. Hypernative.io

14.4. BlockChain Surveillence and Analytics

14.4.1. Ankrscan

14.4.2. Bitquery

14.4.3. Chainalysis

14.4.4. CipherTrace

14.4.5. Coinmetrics

14.4.6. Cyvers.ai

14.4.7. Elementus

14.4.8. elliptic.co

14.4.9. Lukka

14.4.10. Messari.io

14.4.11. Trmlabs

14.5. Encryption

14.5.1. REMME

14.6. Fraud Prevention

14.6.1. Cube3.ai

14.6.2. Blockaid

14.7. Hardware Wallets

14.7.1. CoolWallet

14.7.2. Ellipal

14.7.3. KeepKey

14.7.4. Ledger

14.7.5. PrivacyPros

14.7.6. SafePal

14.7.7. ShiftCrypto

14.7.8. Trezor.io

14.8. Software Defined Perimeter

14.8.1. Block Armour

14.9. Web3 Security

14.9.1. Blockaid

14.9.2. Cyvers.ai

14.9.3. Dedge Security

14.9.4. Hexagate

14.9.5. Hypernative

14.9.6. Metatrust Labs

14.9.7. OpenZeppelin

14.9.8. SolidarityScan

15. Cloud and SaaS Security

15.1. Cloud and SaaS Native Application Protection (CSNAP)

15.1.1. Cloud Infrastructure Entitlement Management (CIEM)

15.1.1.1. ARCON

15.1.1.2. Authomize

15.1.1.3. Britive

15.1.1.4. CyberArk

15.1.1.5. Ermetic

15.1.1.6. Horangi Cyber Security

15.1.1.7. Microsoft (CloudKnox Security)

15.1.1.8. Orca Security

15.1.1.9. Palo Alto Networks

15.1.1.10. SailPoint

15.1.1.11. Saviynt

15.1.1.12. SentinelOne (Attivo Networks)

15.1.1.13. Sonrai Security

15.1.1.14. Sysdig

15.1.1.15. Uptycs

15.1.1.16. Wiz

15.1.1.17. Zscaler

15.1.2. Cloud Management

15.1.2.1. Amazon AWS

15.1.2.2. Azure

15.1.2.3. Cyclops

15.1.2.4. DevSpace

15.1.2.5. Exoscale

15.1.2.6. Google GCP

15.1.2.7. Kubevious

15.1.2.8. Platform9

15.1.2.9. Qovery

15.1.2.10. Rancher

15.1.3. Cloud Security Posture Management (CSPM)

15.1.3.1. Alert Logic

15.1.3.2. AlienV

15.1.3.3. Carbon Black

15.1.3.4. Check Point

15.1.3.5. Cisco

15.1.3.6. F-Secure

15.1.3.7. FireEye

15.1.3.8. IBM Security

15.1.3.9. Kaspersky

15.1.3.10. LogRhythm

15.1.3.11. McAfee

15.1.3.12. Palo Alto Networks

15.1.3.13. Qualys

15.1.3.14. Rapid7

15.1.3.15. Sophos

15.1.3.16. Splunk

15.1.3.17. Symantec

15.1.3.18. Tenable

15.1.3.19. Trend Micro

15.1.3.20. Wiz

15.1.4. Cloud Workload Protection (CWP)

15.1.4.1. Aqua Security

15.1.4.2. Bionic

15.1.4.3. BMC (Helix Cloud Security)

15.1.4.4. Caveonix

15.1.4.5. Check Point Software

15.1.4.6. Cyberark

15.1.4.7. Ermetic

15.1.4.8. F5

15.1.4.9. Fugue

15.1.4.10. Lacework

15.1.4.11. Microsoft (Defender for Cloud)

15.1.4.12. NetApp (Formerly CloudCheckr

15.1.4.13. nOps

15.1.4.14. Orca

15.1.4.15. Palo Alto Networks (Prisma Cloud)

15.1.4.16. Rapid7

15.1.4.17. RuneCast

15.1.4.18. Skyhigh Security

15.1.4.19. Sophos Cloud Optix

15.1.4.20. Sysdig

15.1.4.21. Tenable

15.1.4.22. Tenacity

15.1.4.23. Threat Stack

15.1.4.24. Trellix

15.1.4.25. Trend Micro

15.1.4.26. Turbot

15.1.4.27. Wiz

15.1.5. Data Provenance/Lineage

15.1.5.1. RKVST

15.1.5.2. Alation

15.1.5.3. Informatica

15.1.5.4. Octopai

15.1.6. Data Security

15.1.6.1. Data Security Posture Management

15.1.6.1.1. Concentric AI

15.1.6.1.2. Cyera

15.1.6.1.3. DIG Security

15.1.6.1.4. Flow Security

15.1.6.1.5. Laminar

15.1.6.1.6. Orca Security

15.1.6.1.7. Polar Security

15.1.6.1.8. Satori

15.1.6.1.9. Securiti.AI

15.1.6.1.10. Sentra

15.1.6.1.11. Symmetry Systems

15.1.6.1.12. Varonis

15.1.6.2. Isolation and Vaulting

15.1.6.2.1. Acronis

15.1.6.2.2. Cohesity

15.1.6.2.3. Commvault

15.1.6.2.4. Dell

15.1.6.2.5. Elastio

15.1.6.2.6. Rubric

15.1.6.2.7. Veeam

15.1.6.2.8. Veritas Technologies

15.1.6.3. Data Security Platforms

15.1.6.3.1. Cyera

15.1.6.3.2. IBM

15.1.6.3.3. Immuta

15.1.6.3.4. Okera

15.1.6.3.5. OneTrust

15.1.6.3.6. Prime Factors

15.1.6.3.7. Privacera

15.1.6.3.8. Privitar

15.1.6.3.9. Protegrity

15.1.6.3.10. Satori

15.1.6.3.11. SecuPi

15.1.6.3.12. TrustArc

15.1.6.3.13. Varonis

15.1.7. Kubernetes Security

15.1.7.1. Kubernetes Security Posture Management (KSPM)

15.1.7.1.1. Aqua Security

15.1.7.1.2. Armo Security

15.1.7.1.3. Buildpiper

15.1.7.1.4. Check Point Software

15.1.7.1.5. Orca Security

15.1.7.1.6. Runecast

15.1.7.1.7. Sysdig

15.1.7.2. Cloud Workload Protection (CWP)

15.1.7.2.1. Aqua Security

15.1.7.2.2. Crowdstrike

15.1.7.2.3. Microsoft

15.1.7.2.4. Palo Alto Networks

15.1.7.2.5. Redhat ACS

15.1.7.2.6. SentinelOne

15.1.7.2.7. Sophos (Capsule8)

15.1.7.2.8. SUSE (Neuvector)

15.1.7.2.9. Tigera

15.1.7.2.10. Trend Micro

15.1.7.2.11. Uptycs

15.1.7.2.12. Wiz

15.1.7.3. Kubernetes Runtime Security

15.1.7.3.1. Aqua Security

15.1.7.3.2. Araali Networks

15.1.7.3.3. Crowdstrike

15.1.7.3.4. DeepFactor

15.1.7.3.5. Kodem Security

15.1.7.3.6. KSOC

15.1.7.3.7. LightSpin Security

15.1.7.3.8. Operant.ai

15.1.7.3.9. Palo Alto Networks

15.1.7.3.10. Snyk

15.1.7.3.11. Sweet Security

15.1.7.3.12. Sysdig

15.1.7.3.13. ThreatX

15.1.7.3.14. Upwind Security

15.1.7.3.15. Wiz

15.1.7.4. API Defense

15.1.7.4.1. Microsoft Azure Firewall

15.1.7.4.2. Prophaze

15.1.7.4.3. Tigera

15.1.7.4.4. Wallarm

15.1.8. SaaS Management Platforms

15.1.8.1. Augmentt

15.1.8.2. Auvik

15.1.8.3. Beamy

15.1.8.4. Bettercloud

15.1.8.5. LeanIx

15.1.8.6. Lumos

15.1.8.7. Oomnitza

15.1.8.8. Productiv

15.1.8.9. Torii

15.1.8.10. Trelica

15.1.8.11. Zluri

15.1.8.12. Zylo

15.1.9. SaaS Security Posture Management (SSPM)

15.1.9.1. Adaptive Shield

15.1.9.2. Appomni

15.1.9.3. Asterisk Security

15.1.9.4. Atmosec

15.1.9.5. Axonius

15.1.9.6. DoControl

15.1.9.7. Obsidian Security

15.1.9.8. Privya

15.1.9.9. Reco.ai

15.1.9.10. Reveal Security

15.1.9.11. Valence Security

15.1.9.12. Wing Security