Security Operations & Incident Response

Get Started. It's Free
or sign up with your email address
Rocket clouds
Security Operations & Incident Response by Mind Map: Security Operations & Incident Response

1. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

1.1. Crowdsourced Application Security Testing Platforms

1.1.1. Hyver

1.1.2. Applause

1.1.3. Bugcrowd

1.1.4. BugFinders

1.1.5. Cobalt

1.1.6. Crowdtesters

1.1.7. HackerOne

1.2. Managed Penetration Testing Services

1.2.1. Cenzic

1.2.2. WhiteHatSecurity

1.3. Penetration Testing Software

1.3.1. Core Security

1.3.2. Rapid7

1.3.2.1. Metasploit Pro

1.3.2.2. Metasploit Express

1.3.3. Trustwave

1.4. Vulnerability Assessment

1.4.1. Software as a Service

1.4.1.1. Vulnerability Management

1.4.1.1.1. Infoblox

1.4.1.1.2. McAfee

1.4.1.1.3. Outpost24

1.4.1.1.4. Qualys

1.4.1.1.5. RandomStorm

1.4.1.1.6. Trustwave

1.4.1.2. Phish Testing/Management

1.4.1.2.1. Phishme

1.4.2. Network-Based Vulnerability Assessment (On Premise)

1.4.2.1. Core Security

1.4.2.2. CTILab

1.4.2.3. Cybonet

1.4.2.4. Digital Defense

1.4.2.5. Fortinet

1.4.2.6. McAfee

1.4.2.6.1. McAfee Vulnerability Manager (Foundstone)

1.4.2.7. Ncircle

1.4.2.8. Netasq

1.4.2.9. NSAuditor

1.4.2.10. Outpost24

1.4.2.11. Qualys

1.4.2.12. RandomStorm

1.4.2.13. Rapid 7

1.4.2.13.1. Nexspose

1.4.2.14. Trustwave

1.4.3. Mainframe Vulnerability Assessment

1.4.3.1. Key Resources Inc. (KRI)

1.4.3.1.1. http://keyinfosec.com/

1.4.4. Agent-Based Vulnerability Assessment

1.4.4.1. BeyondTrust

1.4.4.2. Qualys

1.4.4.3. Secunia

1.4.4.4. Tenable

1.5. Vulnerability Correlation

1.5.1. Application Vulnerability Correlation

1.5.1.1. Code DX

1.5.1.2. Denim Group

1.5.1.2.1. ThreadFix

1.5.1.3. Kenna Security

1.5.1.4. NopSec

1.5.2. Network Vulnerability Correlation

1.5.2.1. Core Security

1.5.2.2. Cybric

1.5.2.3. Kenna Security

1.5.2.4. NopSec

1.5.2.5. RiskSense

1.5.2.6. Secure Decisions

1.6. Vulnerability Research

1.6.1. CSC

1.6.2. HP

1.6.2.1. DV Labs

1.6.3. HotWAN

1.6.4. McAfee

1.6.5. SecNiche Labs

1.6.6. Sourcefire VRT

1.6.7. Symantec

1.6.8. VRLSec

1.6.9. Vupen

2. Fraud Prevention/Web Malware Monitoring

2.1. Fraud/Bot/Webscrape Prevention

2.1.1. Software

2.1.1.1. Digital Resolve

2.1.1.2. Elastic Beam

2.1.1.3. FeedZai

2.1.1.4. IBM (Formerly Trusteer)

2.1.1.5. Intellinx

2.1.1.6. RSA (EMC)

2.1.1.7. ShieldSquare

2.1.2. Appliances

2.1.2.1. Distil Networks

2.1.2.2. Elastic Beam

2.1.2.3. Imperva

2.1.2.4. RSA

2.1.2.5. Shape Security

2.1.2.6. White Ops

2.1.3. Software as a Service

2.1.3.1. Akamai

2.1.3.2. BioCatch

2.1.3.2.1. http://www.biocatch.com/

2.1.3.3. BotScout

2.1.3.4. Digital Resolve

2.1.3.5. Distil Networks

2.1.3.6. FeedZai

2.1.3.7. Guardian Analytics

2.1.3.7.1. ACH/Wire Transaction Monitoring

2.1.3.8. iovation

2.1.3.9. Kount

2.1.3.10. MarkMonitor

2.1.3.11. namogoo

2.1.3.12. NuData Security

2.1.3.13. Shape Security

2.1.3.14. ShieldSquare

2.1.3.15. Signifyd

2.1.3.16. ThreatMetrix

2.1.3.17. White Ops

2.1.3.18. X-Cart

2.1.3.19. Zenedge

2.1.4. Virtual Appliances

2.1.4.1. Distil Networks

2.1.4.2. Elastic Beam

2.1.4.3. Imperva

2.1.4.4. ShieldSquare

2.2. Website & Ad Malware Monitoring

2.2.1. Ad-Juster

2.2.2. Globalsign

2.2.2.1. Leverages Hackalert

2.2.3. Hackalert

2.2.4. McAfee

2.2.4.1. Siteadvisor

2.2.5. QualysGuard

2.2.6. RiskIQ

2.2.7. Sucuri

2.2.8. The Media Trust

3. Incident Response Legal Services

3.1. Information Law Group

4. Security Information and Event Management (SIEM), Log Management & Analytics

4.1. Application Security Intelligence Engine

4.1.1. SAP

4.1.1.1. iT-Cube Systems

4.2. Log Management

4.2.1. EventTracker

4.2.2. IGLOO Security

4.2.3. Intel Security

4.2.3.1. McAfee Enterprise Log Manager

4.2.4. Kiwi Syslog Server

4.2.5. LogEntries

4.2.6. LogRythm

4.2.7. LogZilla

4.2.8. Logscape

4.2.9. Open Source

4.2.9.1. Elasticsearch (ELK Stack)

4.2.9.2. SEC (Simple Event Correlator)

4.2.9.3. OSSIM

4.2.9.3.1. http://trac.osgeo.org/ossim/

4.2.9.4. Syslog-NG

4.2.9.5. Octopussy

4.2.9.5.1. http://www.octopussy.pm/

4.2.10. Sawmill

4.2.11. Splunk

4.2.12. Sumo Logic

4.2.13. Tripwire

4.2.14. XpoLog

4.3. SIEM

4.3.1. AlienVault

4.3.1.1. OSSIM

4.3.2. CorreLog

4.3.3. Cybonet

4.3.4. EventTracker

4.3.5. Fortinet

4.3.6. HP

4.3.6.1. Arcsight

4.3.7. Hexis Cyber Solutions

4.3.7.1. Hawkeye AP

4.3.8. IBM

4.3.8.1. Q1Radar

4.3.9. IGLOO Security

4.3.10. LogPoint

4.3.10.1. http://www.logpoint.com/en/

4.3.11. LogRythm

4.3.12. LogZilla

4.3.13. McAfee

4.3.13.1. NitroSecurity

4.3.14. Novell

4.3.14.1. Sentinel

4.3.15. RSA

4.3.15.1. Envision

4.3.16. Sensage

4.3.17. Solarwinds

4.3.18. Splunk

4.3.19. Sqrrl

4.3.20. Tibco

4.3.20.1. Loglogic

4.3.21. eIQnetworks

4.4. Security Analytics

4.4.1. Anomaly Analytics

4.4.1.1. CTILab

4.4.1.2. eMite

4.4.1.3. Intel

4.4.1.4. Niddel

4.4.1.5. Prelert

4.4.1.6. Theta Ray

4.4.1.7. Versive

4.4.2. User and Entity Behavior Analytics (UEBA)

4.4.2.1. Bae Systems Applied Intelligence

4.4.2.2. Bay Dynamics

4.4.2.3. Caspida

4.4.2.4. Click Security

4.4.2.5. CTILab

4.4.2.6. Darktrace

4.4.2.7. Detex Systems

4.4.2.8. Exabeam

4.4.2.9. FICO

4.4.2.10. Fortscale

4.4.2.11. GuruCul

4.4.2.12. HPE

4.4.2.12.1. Formerly Niara

4.4.2.12.2. HAVEn

4.4.2.13. IBM

4.4.2.13.1. Infosphere BIG Insights

4.4.2.14. Intellinx

4.4.2.15. Interset

4.4.2.16. Lockheed Martin

4.4.2.17. Logtrust

4.4.2.18. Microsoft

4.4.2.18.1. Acquired Aorato

4.4.2.19. Mobile System 7

4.4.2.20. Novetta Solutions

4.4.2.21. Oracle

4.4.2.22. Palerra

4.4.2.23. Platfora

4.4.2.24. Rapid7

4.4.2.25. Raytheon

4.4.2.26. Reveelium

4.4.2.27. SAS Institute

4.4.2.28. Secureonix

4.4.2.29. Splunk

4.4.2.30. Veriato

4.4.2.31. ZoneFox

4.4.3. Agent-Based User Activity Monitoring

4.4.3.1. Dtex Systems

4.4.3.2. Forcepoint

4.4.3.3. Lacework

4.4.3.4. ObserveIT

4.4.3.5. Teramind

4.4.3.6. Varonis

4.4.3.7. Veriato

4.4.3.8. ZoneFox

5. Security Operations, Analytics and Reporting

5.1. Security Incident Response Platforms (SIRP)

5.1.1. Agiliance

5.1.2. DFLabs

5.1.3. Demisto

5.1.4. EMC(RSA)

5.1.5. Empow

5.1.6. Fido

5.1.7. Microsoft

5.1.7.1. Formerly Hexadite

5.1.8. ID Experts

5.1.9. Proofpoint

5.1.10. ServiceNow

5.1.11. Siemplify

5.1.12. Syncurity

5.1.13. IBM Resilient

5.1.13.1. Formerly Resilient Systems

5.2. Threat and Vulnerability Management (TVM)

5.2.1. Acuity Risk Management

5.2.2. Agiliance

5.2.3. BeyondTrust

5.2.4. Core Security

5.2.5. CTILab

5.2.6. Cybersponse

5.2.7. DFLabs

5.2.8. EMC(RSA)

5.2.9. Kenna Security

5.2.10. Kornic Glory

5.2.11. NopSec

5.2.12. RedSeal

5.2.13. RiskSense

5.2.14. Siemplify

5.2.15. Skybox Security

5.2.16. Swimlane

5.3. Security Orchestration, Automation and Response (SOAR)

5.3.1. Anomali

5.3.2. Ayehu

5.3.3. Cyber Observer

5.3.4. Cybersponse

5.3.5. Demisto

5.3.6. DFLabs

5.3.7. EclecticIQ

5.3.8. EMC(RSA)

5.3.9. IBM

5.3.10. Microsoft

5.3.11. Phantom

5.3.12. Proofpoint

5.3.13. Resolve Systems

5.3.14. ServiceNow

5.3.15. Siemplify

5.3.16. Swimlane

5.3.17. Syncurity

5.3.18. ThreatConnect

5.3.19. ThreatQuotient

5.4. Security Operations Automation Platforms (SOAPS)

5.4.1. Ayehu

5.4.2. Cyberbit

5.4.3. Cybersponse

5.4.4. Demisto

5.4.5. DFLabs

5.4.6. empow security

5.4.7. Fireye

5.4.8. Microsoft

5.4.9. IBM

5.4.10. Komand

5.4.11. LogicHub

5.4.12. Phantom Cyber

5.4.13. Siemplify

5.4.14. Swimlane

5.4.15. Syncurity

6. Digital Forensics/eDiscovery

6.1. Content, File and Endpoint Forensics

6.1.1. eDiscovery

6.1.1.1. Clearwell

6.1.1.2. Kazeon

6.1.1.3. Guidance Software

6.1.1.4. Access Data

6.1.1.5. Autonomy

6.1.1.6. kCura

6.1.1.7. FTI Technology

6.1.1.8. Barracuda Networks

6.1.2. Mobile Devices

6.1.2.1. BlackBagTech

6.1.2.2. Cellebrite

6.1.2.3. Compelson Labs

6.1.2.4. Guidance Software

6.1.2.5. MSAB

6.1.2.6. NowSecure

6.1.2.7. Oxygen Forensics

6.1.2.8. Paraben Corporation

6.1.3. Endpoint Computing Systems

6.1.3.1. ADF Solutions

6.1.3.1.1. http://www.adfsolutions.com/

6.1.3.2. Access Data

6.1.3.3. ArxSys

6.1.3.4. BlackBag Technologies

6.1.3.5. CRU Inc

6.1.3.5.1. Ditto Forensic FieldStation

6.1.3.6. Cyfir

6.1.3.7. Guidance Software

6.1.3.8. Magnet Forensics

6.1.3.8.1. http://www.magnetforensics.com/

6.1.3.9. Nuix

6.1.3.10. OSForensics

6.1.3.11. Paraben Corporation

6.1.3.12. WindowsScope

6.1.3.13. X-Ways Forensics

6.1.4. Email Examination

6.1.4.1. Systools Software

6.1.4.1.1. MailXaminer

6.1.4.2. Nuix

6.1.5. Digital Forensics Case Management

6.1.5.1. Axxera

6.1.5.1.1. http://www.axxera4n6.com/index.html

6.1.5.2. D3 Security

6.1.5.2.1. https://www.d3security.com/products/it-forensics-software/

6.1.5.3. Digital Investigation Manager

6.1.5.3.1. http://digitalinvestigationmanager.com/

6.1.5.4. Guidance Software

6.1.5.4.1. https://www2.guidancesoftware.com/products/Pages/encase-enterprise/case-management.aspx

6.1.5.5. Intaforensiscs

6.1.5.5.1. http://www.intaforensics.com/software/lima-product-suite/

6.1.5.6. Sentinel Data

6.1.5.6.1. http://sentineldata.com/atlas-digital-forensic-case-management/

6.1.5.7. Sirentech

6.1.5.7.1. http://www.sirentec.com/

6.1.5.8. Wynyard Group

6.1.5.8.1. https://www.wynyardgroup.com/us/solutions/digital-evidence-investigator/

6.1.6. Memory Forensics

6.1.6.1. FireEye

6.1.6.2. Guidance Software

6.1.6.3. Volatility Framework

6.1.6.4. WindowsScope

6.2. Forensic File & Data Analysis Tools

6.2.1. Cellebrite

6.2.2. Cyfir

6.2.3. Intella

6.2.4. Magnet Forensics

6.2.5. Nuix

6.2.6. Systools Software

6.3. eDiscovery Services

6.3.1. Robert Half

6.3.2. Advanced Discovery

6.4. eDiscovery Software

6.4.1. AccessData

6.4.2. Guidance Software

6.4.3. Nuix

6.4.4. Symantec