1. Data Classification and Tracking
1.1. Banyan Solutions
1.2. BoldonJames
1.3. Digital Guardian
1.4. HP
1.5. IBM
1.6. Identity Finder
1.7. Mach1 Development
1.8. Microsoft (Formerly Secure Islands)
1.9. MinerEye
1.10. Nuix
1.11. Smartlogic
1.12. Titus
1.13. Varonis
1.14. CoSoSys
2. Data Governance and Classification
2.1. Boldonjames
2.2. Expert Source
2.2.1. http://www.expertsource.in/index.php
2.3. HP
2.4. IBM
2.5. Informatica
2.6. Nuix
2.7. Somansa
2.8. Titus
2.9. ThinAir
3. Data Loss Prevention (DLP)
3.1. Endpoint
3.1.1. Mobile
3.1.1.1. Symantec
3.1.1.2. Websense
3.1.1.3. Microsoft (Secure Islands)
3.1.2. Windows
3.1.2.1. Absolute Software
3.1.2.2. CA Technologies
3.1.2.3. Digital Guardian
3.1.2.4. GTB Technologies
3.1.2.5. Infowatch
3.1.2.6. McAfee
3.1.2.7. RSA
3.1.2.8. Microsoft (Secure Islands)
3.1.2.9. Somansa
3.1.2.10. Symantec
3.1.2.11. Trustwave
3.1.2.12. Watchful Software
3.1.2.13. Raytheon-Websense
3.1.2.14. Zecurion
3.2. Network
3.2.1. Digital Guardian
3.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)
3.2.3. Symantec
3.2.4. InfoWatch
3.3. Secure Email Gateway
3.3.1. Cisco
3.3.2. Symantec
3.3.3. McAfee
3.3.4. Somansa
3.4. Secure Web Gateway
3.4.1. McAfee
3.4.2. Symantec
3.4.3. Somansa
3.5. Breached Data Detection
3.5.1. Consumer
3.5.1.1. haveibeenpwned.com
3.5.1.1.1. https://haveibeenpwned.com/
3.5.2. Enterprise
3.5.2.1. Hold Security
3.5.2.1.1. http://holdsecurity.com/
3.5.2.2. Infoarmor
3.5.2.2.1. https://www.infoarmor.com/
3.5.2.3. Ionic
3.5.2.3.1. https://www.ionic.com/
3.5.2.4. SpyCloud
3.5.2.4.1. https://spycloud.com/
4. Database Security
4.1. Database Audit and Protection (DAP)
4.1.1. Application Security, Inc
4.1.2. BeyondTrust
4.1.3. Big Data Platform DAP
4.1.3.1. BlueTalon
4.1.3.2. Cloudera
4.1.3.2.1. Sentry
4.1.3.3. Hortonworks
4.1.3.3.1. Ranger
4.1.3.4. IBM
4.1.3.5. Imperva
4.1.4. DataSunrise
4.1.5. Datiphy
4.1.6. Fortinet
4.1.7. Hexatier
4.1.8. IBM
4.1.9. Imperva
4.1.10. IRI
4.1.10.1. Oracle
4.1.10.2. SQL Server
4.1.11. McAfee
4.1.12. Mentis Software
4.1.13. Oracle Corp
4.1.14. PentaSecurity
4.1.15. Warevalley
4.2. Database Activity Monitoring
4.2.1. Cyral
4.2.2. Datiphy
4.2.3. IBM
4.2.4. Imperva
4.2.5. Satori
4.2.6. Somansa
4.2.7. Trellix
4.3. Data Lake Security
4.3.1. Satori
4.3.2. SISense
5. Encryption/Tokenization
5.1. Big Data
5.1.1. Gazzang
5.1.2. Vormetric
5.2. Cloud/SAAS Encryption
5.2.1. Appliances
5.2.1.1. Office365
5.2.1.1.1. Vaultive
5.2.1.1.2. FiLink
5.2.1.2. Ciphercloud
5.2.1.3. Afore Solutions
5.2.1.3.1. CloudLink VSA
5.2.1.4. Perspecsys
5.2.2. Software
5.2.2.1. BoxCryptor
5.2.2.2. CloudMask
5.2.2.3. PrivateCore
5.2.2.4. Trend Micro
5.2.2.4.1. SecureCloud
5.2.2.5. Viivo
5.2.2.6. Voltage Security
5.2.3. Software as a Service
5.2.3.1. Trend Micro
5.2.3.1.1. SecureCloud
5.2.3.2. SooKasa
5.2.3.3. Thales
5.2.3.3.1. SafeMonk
5.3. Cryptographic Providers
5.3.1. RSA
5.3.2. Quintessence
5.3.3. Microsoft
5.4. Data masking
5.4.1. Oracle
5.4.2. Dataguise
5.4.3. Informatica
5.4.4. IBM
5.4.5. Voltage Security
5.4.6. Green SQL
5.4.7. Mentis
5.4.8. Compuware
5.4.9. Axis
5.4.10. Privacy Analytics
5.4.11. Camouflage Software
5.4.12. Solix Technologies
5.4.13. Net 2000
5.5. Database
5.5.1. Thales
5.5.2. Dark Matter Labs
5.5.3. Vormetric
5.6. Email
5.6.1. ZixCorp
5.6.2. Encryptics
5.6.2.1. https://www.encryptics.com/default.aspx
5.7. Encrypted USB Storage
5.7.1. Apricorn
5.7.2. Datalocker
5.7.3. EgoSecure
5.7.4. Integral Memory
5.7.5. IronKey
5.7.6. Kingston
5.7.7. Virbatim
5.8. File/Folder
5.8.1. Covertix
5.8.1.1. http://www.covertix.com/
5.8.2. EgoSecure
5.8.3. IBM
5.8.3.1. Mainframe
5.8.3.1.1. z10
5.8.4. SecureIslands
5.8.5. Sophos
5.8.5.1. SafeGuard Enterprise (Utimaco)
5.8.6. Symantec (PGP)
5.8.7. Vormetric
5.8.8. WinMagic
5.8.8.1. SecureDoc
5.9. Quantum Encryption
5.9.1. IDQ
5.9.2. Quintessence Labs
5.9.3. Whitewood Encryption
5.10. Tokenization
5.10.1. Protegrity
5.11. Whole Disk
5.11.1. CheckPoint Software
5.11.2. EgoSecure
5.11.3. Encryption Management
5.11.3.1. Wave Systems
5.11.4. McAfee
5.11.5. Microsoft
5.11.5.1. Bitlocker
5.11.6. Sophos
5.11.6.1. SafeGuard Enterprise (Utimaco)
5.11.7. Symantec (PGP)
5.11.8. Trustwave
5.11.8.1. DataControl
5.11.9. Vormetric
5.11.10. WinMagic
5.11.10.1. SecureDoc
6. Enterprise File Syncronization and Share
6.1. Blackberry
6.2. Box
6.3. Citrix
6.4. Covata
6.5. Dropbox
6.6. Egnyte
6.7. Google
6.8. Huddle
6.9. Intralinks
6.10. Kiteworks
6.11. Microsoft
6.12. Syncplicity
6.13. Thru
6.14. Varonis
7. File Analysis Software
7.1. Acaveo
7.2. Active Navigation
7.3. AvePoint
7.4. Beyond Recognition
7.5. Bloomberg
7.6. CommVault
7.7. Condrey
7.8. Covertix
7.9. DataGlobal
7.10. DataGravity
7.11. Equivio
7.12. HP
7.12.1. Control Point
7.13. HiSoftware
7.14. IBM
7.14.1. StoreIQ
7.15. Identifty Finder
7.16. Imperva
7.17. Index Engines
7.18. Kazoup
7.19. MailGuard
7.20. NTP Software
7.21. Novell
7.22. Nuix
7.23. Proofpoint
7.24. Stealthbits
7.25. ThinAir
7.26. Varonis
7.27. WatchDox
7.28. Whitebox Security
7.29. ZyLab
8. Hardware Security Modules (HSM)
8.1. Cloud HSM
8.1.1. Amazon
8.1.2. Azure
8.1.3. Google
8.1.4. IBM
8.2. Hardware
8.2.1. Entrust
8.2.2. FutureX
8.2.3. Futurex
8.2.4. HPE
8.2.5. Keyfactor
8.2.6. PrimeKey
8.2.7. Thales
9. Software Defined Storage Security
9.1. Dispersive Networks
9.1.1. https://dispersivetechnologies.com/
9.2. OceansBlue
9.2.1. http://www.oceansblue.net/index.html
10. eSignatures
10.1. Adobe eSign Services
10.2. Alphatrust
10.3. Docusign
10.4. Hellosign
10.5. Rightsignature
10.6. Sertifi
11. Content Disarming and Reconstruction (CDR)
11.1. Forcepoint
11.2. Fortinet
11.3. Garrison Technology
11.4. Glasswall
11.5. OPSWAT
11.5.1. https://www.opswat.com/products/metascan/