Mobile app based threats

mobile app threat mind map

Comienza Ya. Es Gratis
ó regístrate con tu dirección de correo electrónico
Mobile app based threats por Mind Map: Mobile app based threats

1. OEMs & System Integrators

1.1. Appliance Integrators

1.1.1. Accton

1.1.1.1. http://www.accton.com/

1.1.2. Advantech

1.1.2.1. http://www.advantech.com/

1.1.3. Celestica

1.1.3.1. http://www.celestica.com/

1.1.4. Dan-el Technologies Ltd.

1.1.4.1. http://www.danel.co.il/

1.1.5. Flextronics

1.1.5.1. http://www.flextronics.com/

1.1.6. Plexus

1.1.6.1. http://www.plexus.com/

1.2. Base Appliances

1.2.1. Advantech

1.2.2. Amax

1.2.3. Cas Well

1.2.4. Iron Systems

1.2.5. Lanner

1.2.6. Portwell

1.2.7. Tilera

1.3. Cards

1.3.1. Netronome

1.3.2. Tilera

1.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection

1.4. Encryption Acceleration

1.4.1. Intel

1.4.1.1. VPRO

1.4.2. Gemalto

1.4.2.1. Luna PCI

1.5. MSSP Appliances

1.5.1. 443 Networks

1.6. Threat Intelligence

1.6.1. Anti-Phishing

1.6.1.1. Cyren

1.6.2. DNS DGA Feeds

1.6.2.1. Farsight Security

1.6.3. File Reputation

1.6.3.1. Findthatfile

1.6.3.2. Webroot

1.6.4. Fraud

1.6.4.1. Internet Fraud Alert

1.6.4.1.1. http://www.ifraudalert.org/default.aspx

1.6.4.2. National Cyber-Forensics and Training Alliance

1.6.4.2.1. http://www.ncfta.net/Index.aspx

1.6.5. IP Block Lists

1.6.5.1. WebRoot Brightcloud

1.6.5.2. Cyren

1.6.5.3. Malwarebytes

1.6.5.3.1. hpHosts

1.6.6. IP Reputation

1.6.6.1. Cyren

1.6.6.2. WebRoot Brightcloud

1.6.7. Indicators of Compromise

1.6.7.1. FireEye

1.6.7.2. Proofpoint

1.6.7.2.1. Emerging Threats

1.6.7.3. Wapack labs

1.6.7.3.1. https://cms.wapacklabs.com/

1.6.7.3.2. ThreatRecon

1.6.7.4. CIRCL

1.6.7.4.1. https://www.circl.lu/services/misp-malware-information-sharing-platform/

1.6.8. Malicious URL

1.6.8.1. Cyren

1.6.8.2. Findthatfile

1.6.8.3. Webroot

1.6.9. Predictive

1.6.9.1. Seclytics

1.6.10. Vulnerability Research

1.6.10.1. Telus Security Labs

1.6.10.1.1. http://telussecuritylabs.com/signatures/attack_detection

1.6.10.2. Vupen

1.6.10.2.1. http://www.vupen.com/english/services/tpp-index.php

1.7. Security Related Chips & CPUs

1.7.1. Broadcom

1.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection

1.7.2. Cavium

1.7.2.1. http://www.cavium.com

1.7.3. Lionic

1.7.3.1. http://www.lionic.com/

1.7.4. Netronome

1.7.4.1. http://www.netronome.com

1.7.5. Tilera

1.7.5.1. http://www.tilera.com/products/processors

1.7.6. Intel

1.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH

1.8. Software

1.8.1. Advanced Content Disarming and Reconstruction

1.8.1.1. OPSWAT

1.8.1.1.1. https://www.opswat.com/products/metascan/

1.8.1.2. Votiro

1.8.2. Advanced Threat Protection - Virtual Execution Engines

1.8.2.1. ContentKeeper

1.8.2.2. Threat Track Security

1.8.2.2.1. http://www.threattracksecurity.com/oem.aspx

1.8.3. Analytics/Graphing/Reporting

1.8.3.1. Logi Analytics

1.8.3.1.1. https://www.logianalytics.com/

1.8.3.2. D3Plus

1.8.3.2.1. https://d3plus.org/

1.8.3.3. D3js

1.8.4. Anti-Spam/Phishing

1.8.4.1. APWG

1.8.4.2. BrandProtect

1.8.4.3. Cyren

1.8.4.4. Ikarus

1.8.4.4.1. http://www.ikarussecurity.com/products/oem/solutions-for-oem-partner/

1.8.4.5. Internet Fraud Alert

1.8.4.5.1. http://www.ifraudalert.org/default.aspx

1.8.4.6. ReturnPath

1.8.4.7. WebRoot Brightcloud

1.8.5. AntiMalware

1.8.5.1. Antiy

1.8.5.1.1. http://www.antiy.net/

1.8.5.2. Avira

1.8.5.3. Bitdefender

1.8.5.4. Cyren

1.8.5.5. ESet

1.8.5.6. Fortinet

1.8.5.7. GFI

1.8.5.8. Ikarus

1.8.5.8.1. http://www.ikarussecurity.com/products/oem/solutions-for-oem-partner/

1.8.5.9. Intel Security

1.8.5.10. Kaspersky

1.8.5.11. Norman

1.8.5.12. OPSWAT

1.8.5.13. QuickHeal

1.8.5.14. ThreatTrack

1.8.5.15. Zillya

1.8.5.16. ZonerAntiVirus

1.8.6. Content Extraction & Search

1.8.6.1. Oracle

1.8.6.1.1. Stellent Viewer

1.8.7. Encryption

1.8.7.1. Transport

1.8.7.1.1. Rosberg Systems AS

1.8.7.1.2. SIPBiz

1.8.7.1.3. NCP-E

1.8.8. Endpoint Security and Management

1.8.8.1. OPSWAT

1.8.8.1.1. https://www.opswat.com/products/oesis-framework

1.8.9. File Content Decoding/Analysis/Fingerprinting

1.8.9.1. HP Autonomy

1.8.9.1.1. IDOL

1.8.9.1.2. KeyView

1.8.9.2. Attivio

1.8.9.3. GTB Technologies

1.8.9.3.1. Data Loss Prevention OEM SDK

1.8.10. IT Service Management

1.8.10.1. ITRP

1.8.11. Image Recognition

1.8.11.1. Image Analyzer

1.8.12. Intrusion Detection/Prevention Signatures

1.8.12.1. Proofpoint

1.8.12.1.1. Emerging Threats

1.8.13. Network Stack

1.8.13.1. IPV4/6

1.8.13.1.1. NetX

1.8.13.1.2. Network Data Plane

1.8.13.2. Deep Packet Inspection

1.8.13.2.1. Broadweb

1.8.13.2.2. Ipoque

1.8.13.2.3. Procera Networks

1.8.13.2.4. Qosmos

1.8.13.3. SDN

1.8.13.3.1. 6Wind

1.8.14. Optical Character Recognition

1.8.14.1. Abbyy

1.8.15. Social Network Content Control

1.8.15.1. NetboxBlue

1.8.16. URL Categorization

1.8.16.1. Cyren

1.8.16.1.1. http://www.cyren.com/embedded-url-filtering.html

1.8.16.2. Ikarus

1.8.16.2.1. http://www.ikarussecurity.com/products/oem/solutions-for-oem-partner/

1.8.16.3. Malware

1.8.16.3.1. BrandProtect

1.8.16.4. Webroot Brightcloud

1.8.16.5. Zvelo

1.8.17. Voice Recognition

1.8.17.1. STC

1.8.17.2. Nuance

1.9. Managed Security OEMs

1.9.1. Digital Hands

2. • Broken Cryptography

2.1. Application Security

2.1.1. Runtime Application Self-Protection (RASP)

2.1.1.1. Arxan

2.1.1.2. Checkmarx

2.1.1.3. Contrast Security

2.1.1.4. HP

2.1.1.5. Immunio

2.1.1.6. Metaforic

2.1.1.7. OneASP

2.1.1.8. Prevoty

2.1.1.9. SecuPi

2.1.1.10. Veracode

2.1.1.11. Virsec

2.1.1.12. Waratek

2.1.1.13. whiteCryption

2.1.2. Enterprise App-Layer Protection

2.1.2.1. SecuPI

2.1.3. AI-Based Applicaton Threat Defense

2.1.3.1. Barricade

2.1.3.2. Signal Sciences

2.2. Cloud Security

2.2.1. Cloud Protection Gateways

2.2.1.1. CipherCloud

2.2.1.2. Netskope

2.2.1.3. Perspecsys

2.2.1.4. Skyhigh Networks

2.2.1.5. Vaultive

2.2.2. Cloud Access Security Brokers

2.2.2.1. User Activity Monitoring

2.2.2.1.1. Adallom

2.2.2.1.2. Avanan

2.2.2.1.3. Bitglass

2.2.2.1.4. Elastica

2.2.2.1.5. Harvest.ai

2.2.2.1.6. Imperva

2.2.2.1.7. Netscope

2.2.2.1.8. SkyHigh Networks

2.2.2.2. Data Loss Prevention

2.2.2.2.1. Integrated DLP

2.2.2.2.2. Harvest.ai

2.2.2.3. Encryption

2.2.2.3.1. Adallom

2.2.2.3.2. Avanan

2.2.2.3.3. Managed Methods

2.2.2.3.4. SkyHigh Networks

2.2.2.4. Identity and Access Management

2.2.2.4.1. Centrify

2.2.2.4.2. Cloudiway

2.2.2.4.3. Okta

2.2.2.4.4. Ping

2.2.2.5. Access Control

2.2.2.5.1. Adallom

2.2.2.5.2. Avanan

2.2.2.5.3. Bitglass

2.2.2.5.4. Elastica

2.2.2.5.5. FireLayers

2.2.2.5.6. Managed Methods

2.2.2.5.7. Netskope

2.2.2.5.8. Skyfence

2.2.3. Cloud Application Discovery

2.2.3.1. Ciphercloud

2.2.3.2. Elastica

2.2.3.3. Netskope

2.2.3.4. Skyhigh

2.2.4. Cloud Compliance and Security Risk Platforms

2.2.4.1. AlertLogic

2.2.4.2. Cavirin

2.2.4.3. Cloudcheckr

2.2.4.4. Evident.io

2.2.4.5. Harvest AI

2.3. Cross Domain Solutions

2.3.1. Advenica

2.3.1.1. ZoneGuard

2.3.1.2. SecuriRam

2.3.2. General Dynamics

2.3.2.1. TacGuard

2.3.2.2. Crossing Guard

2.3.2.3. NanoXD

2.3.3. LockHeed Martin

2.3.3.1. Trusted Manager

2.3.4. Tresys

2.3.4.1. XD Air

2.3.4.2. XD Bridge

2.3.4.3. XD Guardian

2.3.5. Owl Computing

2.3.5.1. Owl OPDS-100

2.3.5.2. Owl OPDS-100D

2.3.5.3. OCDS-SFF

2.4. Data Security

2.4.1. Network-Based Data Cleansing

2.4.1.1. DataStealth

2.4.1.1.1. http://www.datexdatastealth.com/

2.4.2. Big Data Security

2.4.2.1. BlueTalon

2.5. Endpoint Security

2.5.1. Endpoint Detection and Response (EDR)

2.5.1.1. Agent-Based

2.5.1.1.1. Carbon Black

2.5.1.1.2. Cisco

2.5.1.1.3. Countertack

2.5.1.1.4. CrowdStrike

2.5.1.1.5. Cyberbit

2.5.1.1.6. Cyberreason

2.5.1.1.7. Cylance

2.5.1.1.8. Deep Instinct

2.5.1.1.9. Digital Guardian

2.5.1.1.10. Dtex Systems

2.5.1.1.11. Endgame Systems

2.5.1.1.12. Fidelis Cybersecurity

2.5.1.1.13. FireEye

2.5.1.1.14. Forescout

2.5.1.1.15. Guidance Software

2.5.1.1.16. Hexis Cyber Solutions

2.5.1.1.17. Invincea

2.5.1.1.18. LogRhythm

2.5.1.1.19. NexThink

2.5.1.1.20. Panda Security

2.5.1.1.21. RSA (EMC)

2.5.1.1.22. SecDo

2.5.1.1.23. SentinelOne

2.5.1.1.24. Tanium

2.5.1.1.25. Triumfant

2.5.1.1.26. Verint

2.5.1.1.27. Ziften

2.5.1.2. Agentless

2.5.1.2.1. BeyondTrust

2.5.1.2.2. Cynet

2.5.1.2.3. Fidelis

2.5.1.2.4. ForeScout

2.5.1.2.5. Hexadite

2.5.1.2.6. Hexis Cyber Solutions

2.5.1.2.7. InfoCyte

2.5.1.2.8. LightCyber

2.5.1.2.9. Outlier Security

2.5.1.2.10. Promisec

2.5.2. Remote Browser-Isolation (remote dom)

2.5.2.1. Amune

2.5.2.1.1. https://amune.org/security

2.5.2.2. Armor5

2.5.2.3. Authentic8

2.5.2.4. Dispel

2.5.2.5. FireGlass

2.5.2.6. Menlo Security

2.5.2.7. Aurionpro

2.5.2.7.1. Formerly Spikes Security

2.6. Identification, Authentication, Access Control & IAM

2.7. Internet of Things

2.7.1. Automotive

2.7.1.1. Security Innovation

2.7.2. Embedded Security

2.7.2.1. Security Innovation

2.8. Network & Infrastructure Security

2.8.1. Content Disarm and Reconstruction (CDR)

2.8.1.1. Check Point Software

2.8.1.1.1. Threat Extraction

2.8.1.2. Glasswall

2.8.1.2.1. http://www.glasswallsolutions.com/

2.8.1.3. Mimecast

2.8.1.3.1. https://www.mimecast.com/

2.8.1.4. OPSWAT

2.8.1.5. ODI

2.8.1.5.1. http://www.odi-x.com/

2.8.1.6. Re-Sec

2.8.1.6.1. http://www.re-sec.com/

2.8.1.7. Sasa-Software

2.8.1.7.1. http://www.sasa-software.com/

2.8.1.8. Solebit Labs

2.8.1.8.1. http://www.solebitlabs.com/

2.8.1.9. Symantec

2.8.1.9.1. DisArm

2.8.1.10. TreSys

2.8.1.10.1. http://www.tresys.com/

2.8.1.11. Votiro

2.8.1.11.1. http://www.votiro.com/

2.8.2. Malware Infection Analysis and Monitoring Services

2.8.2.1. Lastline

2.8.2.1.1. Guardia

2.8.2.2. Cisco

2.8.2.2.1. Formerly OpenDNS

2.8.2.3. Qualys

2.8.2.4. Seculert

2.8.3. Network Behavior and Analytics

2.8.3.1. Industrial Control Systems (ICS)

2.8.3.1.1. CyberX

2.8.4. Standalone Threat Intelligence Defense Solutions (STIDS)

2.8.4.1. Bandura

2.8.4.1.1. PoliWall

2.8.4.2. Centripetal Networks

2.8.4.3. Damballa

2.8.4.4. Fidelis Cybersecurity

2.8.4.5. FireEye

2.8.4.6. Group IB

2.8.4.6.1. http://tds.group-ib.com/

2.8.4.7. Ixia

2.8.4.7.1. http://www.ixiacom.com/info/ta

2.8.4.8. LookingGlass

2.8.4.8.1. https://lgscout.com/products/dns-defender/

2.8.4.9. Redsocks

2.8.4.9.1. Redsocks Threat Defender

2.8.4.10. ReversingLabs

2.8.4.11. Symantec

2.8.4.11.1. APT Network

2.8.5. Unauthorized Endpoint Connection Prevention (UECP)

2.8.5.1. Ensilo

2.8.5.2. Intel Security

2.8.6. Software Defined WAN (SDwan)

2.8.6.1. CloudGenix

2.8.6.2. Pertino

2.8.6.3. Velocloud

2.8.6.4. Viptela

2.8.6.5. Versa Networks

2.8.7. Virtual Container Security

2.8.7.1. Apcera

2.8.7.2. Aqua Security

2.8.7.3. Illumio

2.8.7.4. StackRox

2.8.7.5. TwistLock

2.8.8. Network Security as a Service

2.8.8.1. Cato Networks

2.8.8.2. MyDigitalShield

2.8.8.3. Zscaler

2.9. Security Operations, Incident Response

2.9.1. Intelligence/Data Feeds/Software & Services

2.9.1.1. Security Intelligence and Data Analysis Platforms

2.9.1.1.1. FireEye

2.9.1.2. Threat Intelligence Platforms (TIPs)

2.9.1.2.1. Anomali

2.9.1.2.2. BAE Systems

2.9.1.2.3. Buguroo

2.9.1.2.4. Codenomicon

2.9.1.2.5. Comilion

2.9.1.2.6. Confer

2.9.1.2.7. Eclectic IQ

2.9.1.2.8. Infoblox

2.9.1.2.9. Lockheed Martin

2.9.1.2.10. Lookingglass Cyber Solutions

2.9.1.2.11. Microsoft

2.9.1.2.12. Palentir

2.9.1.2.13. PierceMatrix

2.9.1.2.14. Service Now (Formerly Brightpoint)

2.9.1.2.15. Soltra

2.9.1.2.16. ThreatConnect

2.9.1.2.17. ThreatQuotient

2.9.1.2.18. TruStar

2.9.1.3. Threat Intelligence Services

2.9.1.3.1. Human Intelligence - HUMINT (Strategic)

2.9.1.3.2. Machine-Based (Tactical)

2.9.1.3.3. Vulnerabilities and Exploits

2.9.1.3.4. Data Loss Detection - External

2.9.1.4. Collaborative Threat Investigation Platforms

2.9.1.4.1. BAE System Detica

2.9.1.4.2. IKANow

2.9.1.4.3. Maltego

2.9.1.4.4. NC4

2.9.1.4.5. Palentir

2.9.2. Malware Analysis

2.9.2.1. Malware Analysis as a Service

2.9.2.1.1. Free Services

2.9.2.1.2. ReversingLabs

2.9.2.1.3. ThreatGrid

2.9.2.2. Sandbox Software

2.9.2.2.1. GFI

2.9.2.2.2. Joesecurity

2.9.2.2.3. Bluecoat

2.9.2.2.4. Payload Security

2.9.3. Threat Deception Technologies

2.9.3.1. Distributed Deception Platforms

2.9.3.1.1. Amgine Securus

2.9.3.1.2. Atomic Software Solutions

2.9.3.1.3. Attivo Networks

2.9.3.1.4. Cymmetria

2.9.3.1.5. GuardiCore

2.9.3.1.6. Illusive Networks

2.9.3.1.7. Javelin Networks

2.9.3.1.8. KeyFocus

2.9.3.1.9. SmokeScreen

2.9.3.1.10. Specter

2.9.3.1.11. TrapX

2.9.3.1.12. Vision Space Technologies

2.9.3.2. Network

2.9.3.2.1. ForeScout

2.9.3.2.2. Juniper Networks

2.9.3.2.3. Percipient Networks

2.9.3.2.4. Ridgeback Network Defense

2.9.3.2.5. Shadow Networks

2.9.3.3. Open Source

2.9.3.3.1. Honeypot

2.9.3.4. Web

2.9.3.4.1. Shape Security

2.9.3.4.2. Juniper Networks

2.9.3.4.3. CyberTrap

3. • Phishing attacks

3.1. Virtualized Appliances

3.1.1. A10 Networks

3.1.2. AlertLogic

3.1.3. Amazon AWS

3.1.3.1. Riverbed

3.1.4. Barracuda Networks

3.1.5. BeeWare

3.1.6. DenyAll

3.1.7. Ergon Informatik AG

3.1.8. F5

3.1.9. Fortinet

3.1.10. Forum Systems

3.1.11. Imperva

3.1.12. PentaSecurity

3.1.13. Trustwave

3.1.14. Citrix

3.1.14.1. Netscaler VPX

3.1.14.1.1. https://www.citrix.com/products/netscaler-application-delivery-controller/platforms.html

3.2. Physical Appliances

3.2.1. A10 Networks

3.2.2. AdNovum

3.2.3. AlertLogic

3.2.4. Anchiva

3.2.5. Barracuda Networks

3.2.6. BeeWare

3.2.7. BugSec

3.2.8. Citrix

3.2.9. DBAPPSecurity

3.2.10. DPtech

3.2.11. Dell Sonicwall

3.2.12. DenyAll

3.2.13. Ergon Informatik

3.2.13.1. https://www.airlock.com/en/products/airlock-waf/

3.2.14. F5

3.2.15. Fortinet

3.2.16. Forum Systems

3.2.17. HP

3.2.18. Imperva

3.2.19. NSFocus

3.2.20. PentaSecurity

3.2.21. Positive Technologies

3.2.21.1. http://www.ptsecurity.com/products/af/

3.2.22. RadWare

3.2.23. Trustwave

3.2.24. WINS TECHNET LTD

3.2.24.1. http://www.wins21.co.kr/

3.3. Software

3.3.1. Dedicated Software

3.3.1.1. AdNovum

3.3.1.2. Applicure

3.3.1.2.1. http://www.applicure.com/Products/dotdefender

3.3.1.3. DenyAll

3.3.1.4. ERGON Informatik AG

3.3.1.4.1. AIRLOCK

3.3.1.5. Forum Systems

3.3.1.6. Positive Security

3.3.1.7. Riverbed

3.3.1.8. Trustifier

3.3.1.8.1. https://www.trustifier.com/f/#!overview

3.3.1.9. WebScurity

3.3.2. Open Source

3.3.2.1. IronBee

3.3.2.2. Mod Security

3.3.3. Web Server Modules

3.3.3.1. Microsoft IIS

3.3.3.1.1. AQTRONIX

3.3.3.1.2. Applicure

3.3.3.1.3. BeyondTrust

3.3.3.1.4. ThreatSentry

3.3.3.2. Apache

3.3.3.2.1. Applicure

3.4. Managed Services

3.4.1. Dell Secureworks

3.4.2. AT&T

3.4.3. Verizon Business

3.5. Software as a Service

3.5.1. Akamai

3.5.1.1. Kona

3.5.2. AlertLogic

3.5.3. Anquanbao

3.5.4. ArmorLogic

3.5.5. BinarySec

3.5.6. CloudFlare

3.5.7. DenyAll

3.5.7.1. http://www.denyall.com/products/web-application-firewall/

3.5.8. FireBlade

3.5.9. Imperva (Incapsula)

3.5.9.1. http://www.incapsula.com

3.5.10. Incapsula

3.5.11. PowerCDN

3.5.12. Qualys

3.5.13. Securi

3.5.14. Signal Sciences

3.5.15. Soha

3.5.15.1. http://soha.io/

3.5.16. ZenEdge

4. • Broken Cryptography

4.1. Cloud/Virtualized Firewalls

4.1.1. Agent-Based

4.1.1.1. CloudPassage

4.1.1.2. Drawbridge Networks

4.1.1.3. Illumio

4.1.2. Cisco

4.1.3. Citrix Xen

4.1.3.1. Hillstone Networks

4.1.3.2. Huawei

4.1.3.3. Fortinet

4.1.3.4. Palo Alto Networks

4.1.4. Container-Based

4.1.4.1. ShieldX

4.1.5. Hyper-V

4.1.5.1. Fortinet

4.1.6. KVM

4.1.6.1. Hillstone Networks

4.1.6.2. Juniper Networks

4.1.6.3. Palo Alto Networks

4.1.7. Openstack

4.1.7.1. OpenFlow

4.1.7.1.1. Fortinet

4.1.7.2. Juniper Networks

4.1.8. Public Cloud

4.1.8.1. Virtual Appliances

4.1.8.1.1. Barracuda

4.1.8.1.2. Brocade

4.1.8.1.3. Catbird Networks

4.1.8.1.4. Check Point Software

4.1.8.1.5. Juniper Networks

4.1.8.1.6. Palo Alto Networks

4.1.8.1.7. PfSense

4.1.8.1.8. Sophos

4.1.8.1.9. vArmour

4.1.8.2. API-Driven

4.1.8.2.1. Dome9

4.1.8.2.2. Illumio

4.1.8.3. AWS

4.1.8.3.1. Check Point Software

4.1.8.3.2. Fortinet

4.1.8.3.3. Palo Alto Networks

4.1.8.4. Microsoft Azure

4.1.8.4.1. Check Point Software

4.1.8.4.2. Fortinet

4.1.8.5. Container-Based

4.1.9. VMware Environments

4.1.9.1. API Integration

4.1.9.1.1. Check Point Software

4.1.9.1.2. Fortinet

4.1.9.1.3. Palo Alto Networks

4.1.9.2. NSX

4.1.9.2.1. Fortinet

4.1.9.2.2. Check Point Software

4.1.9.3. VM Appliance

4.1.9.3.1. Barracuda

4.1.9.3.2. Brocade

4.1.9.3.3. Catbird Networks

4.1.9.3.4. Check Point Software

4.1.9.3.5. Fortinet

4.1.9.3.6. Hillstone Networks

4.1.9.3.7. Juniper Networks

4.1.9.3.8. Palo Alto Networks

4.1.9.3.9. PfSense

4.1.9.3.10. Sophos

4.1.9.3.11. vArmour

4.1.9.3.12. Huawei

5. • Privacy Threats

5.1. Digital Forensics/eDiscovery

5.1.1. Content, File and Endpoint Forensics

5.1.1.1. eDiscovery

5.1.1.1.1. Clearwell

5.1.1.1.2. Kazeon

5.1.1.1.3. Guidance Software

5.1.1.1.4. Access Data

5.1.1.1.5. Autonomy

5.1.1.1.6. kCura

5.1.1.1.7. FTI Technology

5.1.1.1.8. Barracuda Networks

5.1.1.2. Mobile Devices

5.1.1.2.1. BlackBagTech

5.1.1.2.2. Cellebrite

5.1.1.2.3. Compelson Labs

5.1.1.2.4. Guidance Software

5.1.1.2.5. MSAB

5.1.1.2.6. NowSecure

5.1.1.2.7. Oxygen Forensics

5.1.1.2.8. Paraben Corporation

5.1.1.3. Endpoint Computing Systems

5.1.1.3.1. ADF Solutions

5.1.1.3.2. Access Data

5.1.1.3.3. ArxSys

5.1.1.3.4. BlackBag Technologies

5.1.1.3.5. CRU Inc

5.1.1.3.6. Cyfir

5.1.1.3.7. Guidance Software

5.1.1.3.8. Magnet Forensics

5.1.1.3.9. Nuix

5.1.1.3.10. OSForensics

5.1.1.3.11. Paraben Corporation

5.1.1.3.12. WindowsScope

5.1.1.3.13. X-Ways Forensics

5.1.1.4. Email Examination

5.1.1.4.1. Systools Software

5.1.1.4.2. Nuix

5.1.1.5. Forensic File & Data Analysis Tools

5.1.1.5.1. Cellebrite

5.1.1.5.2. Cyfir

5.1.1.5.3. Intella

5.1.1.5.4. Magnet Forensics

5.1.1.5.5. Nuix

5.1.1.5.6. Systools Software

5.1.1.6. Digital Forensics Case Management

5.1.1.6.1. D3 Security

5.1.1.6.2. Digital Investigation Manager

5.1.1.6.3. Guidance Software

5.1.1.6.4. Intaforensiscs

5.1.1.6.5. Sentinel Data

5.1.1.6.6. Sirentech

5.1.1.6.7. Wynyard Group

5.1.1.7. Memory Forensics

5.1.1.7.1. FireEye

5.1.1.7.2. Guidance Software

5.1.1.7.3. Volatility Framework

5.1.1.7.4. WindowsScope

5.1.2. eDiscovery Services

5.1.2.1. Robert Half

5.1.2.2. Advanced Discovery

5.1.3. eDiscovery Software

5.1.3.1. AccessData

5.1.3.2. Guidance Software

5.1.3.3. Nuix

5.1.3.4. Symantec

5.2. Fraud Prevention/Web Malware Monitoring

5.2.1. Fraud/Bot/Webscrape Prevention

5.2.1.1. Software

5.2.1.1.1. IBM (Formerly Trusteer)

5.2.1.1.2. Intellinx

5.2.1.1.3. RSA (EMC)

5.2.1.1.4. ShieldSquare

5.2.1.2. Appliances

5.2.1.2.1. Distil Networks

5.2.1.2.2. Imperva

5.2.1.2.3. RSA

5.2.1.2.4. Shape Security

5.2.1.2.5. White Ops

5.2.1.3. Software as a Service

5.2.1.3.1. Akamai

5.2.1.3.2. BioCatch

5.2.1.3.3. BotScout

5.2.1.3.4. Distil Networks

5.2.1.3.5. Guardian Analytics

5.2.1.3.6. Kount

5.2.1.3.7. MarkMonitor

5.2.1.3.8. NuData Security

5.2.1.3.9. Shape Security

5.2.1.3.10. ShieldSquare

5.2.1.3.11. ThreatMetrix

5.2.1.3.12. White Ops

5.2.1.3.13. X-Cart

5.2.1.3.14. iovation

5.2.1.4. Virtual Appliances

5.2.1.4.1. Distil Networks

5.2.1.4.2. Imperva

5.2.2. Website & Ad Malware Monitoring

5.2.2.1. Ad-Juster

5.2.2.2. Globalsign

5.2.2.2.1. Leverages Hackalert

5.2.2.3. Hackalert

5.2.2.4. Intel Security

5.2.2.4.1. Siteadvisor

5.2.2.5. QualysGuard

5.2.2.6. RiskIQ

5.2.2.7. Sucuri

5.2.2.8. The Media Trust

5.3. Incident Response Legal Services

5.3.1. Information Law Group

5.4. Security Information and Event Management (SIEM), Log Management & Analytics

5.4.1. Application Security Intelligence Engine

5.4.1.1. SAP

5.4.1.1.1. iT-Cube Systems

5.4.2. Log Management

5.4.2.1. EventTracker

5.4.2.2. IGLOO Security

5.4.2.3. Intel Security

5.4.2.3.1. McAfee Enterprise Log Manager

5.4.2.4. Kiwi Syslog Server

5.4.2.5. LogEntries

5.4.2.6. LogRythm

5.4.2.7. Logscape

5.4.2.8. Open Source

5.4.2.8.1. Elasticsearch (ELK Stack)

5.4.2.8.2. SEC (Simple Event Correlator)

5.4.2.8.3. OSSIM

5.4.2.8.4. Syslog-NG

5.4.2.8.5. Octopussy

5.4.2.9. Sawmill

5.4.2.10. Splunk

5.4.2.11. Sumo Logic

5.4.2.12. Tripwire

5.4.2.13. XpoLog

5.4.3. SIEM

5.4.3.1. AlienVault

5.4.3.1.1. OSSIM

5.4.3.2. CorreLog

5.4.3.3. EventTracker

5.4.3.4. Fortinet

5.4.3.5. HP

5.4.3.5.1. Arcsight

5.4.3.6. Hexis Cyber Solutions

5.4.3.6.1. Hawkeye AP

5.4.3.7. IBM

5.4.3.7.1. Q1Radar

5.4.3.8. IGLOO Security

5.4.3.9. Intel Security

5.4.3.9.1. NitroSecurity

5.4.3.10. LogPoint

5.4.3.10.1. http://www.logpoint.com/en/

5.4.3.11. LogRythm

5.4.3.12. Novell

5.4.3.12.1. Sentinel

5.4.3.13. RSA

5.4.3.13.1. Envision

5.4.3.14. Sensage

5.4.3.15. Solarwinds

5.4.3.16. Splunk

5.4.3.17. Sqrrl

5.4.3.18. Tibco

5.4.3.18.1. Loglogic

5.4.3.19. eIQnetworks

5.4.4. Security Analytics

5.4.4.1. Anomaly Analytics

5.4.4.1.1. Intel

5.4.4.1.2. Theta Ray

5.4.4.1.3. Prelert

5.4.4.1.4. eMite

5.4.4.2. User and Entity Behavior Analytics (UEBA)

5.4.4.2.1. Bay Dynamics

5.4.4.2.2. Darktrace

5.4.4.2.3. Detex Systems

5.4.4.2.4. Exabeam

5.4.4.2.5. Fortscale

5.4.4.2.6. Gurcul

5.4.4.2.7. HP

5.4.4.2.8. IBM

5.4.4.2.9. Interset

5.4.4.2.10. Microsoft

5.4.4.2.11. Niara

5.4.4.2.12. ObserveIT

5.4.4.2.13. Palerra

5.4.4.2.14. Platfora

5.4.4.2.15. Reveelium

5.4.4.2.16. Secureonix

5.4.4.2.17. Veriato

5.4.5. User and Entity Behavior Analytics (UEBA)

5.4.5.1. Bae Systems Applied Intelligence

5.4.5.2. Bay Dynamics

5.4.5.3. Caspida

5.4.5.4. Click Security

5.4.5.5. Exabeam

5.4.5.6. FICO

5.4.5.7. Fortscale

5.4.5.8. GuruCul

5.4.5.9. IBM

5.4.5.10. Intellinx

5.4.5.11. Lockheed Martin

5.4.5.12. Logtrust

5.4.5.13. Mobile System 7

5.4.5.14. Novetta Solutions

5.4.5.15. Oracle

5.4.5.16. Rapid7

5.4.5.17. Raytheon

5.4.5.18. SAS Institute

5.4.5.19. Secureonix

5.4.5.20. Splunk

5.5. Security Operations, Analytics and Reporting (SOAR)

5.5.1. Security Incident Response Platforms (SIRP)

5.5.1.1. Agiliance

5.5.1.2. DFLabs

5.5.1.3. Demisto

5.5.1.4. EMC(RSA)

5.5.1.5. Empow

5.5.1.6. Fido

5.5.1.7. Hexadite

5.5.1.8. ID Experts

5.5.1.9. Proofpoint

5.5.1.10. Resilient Systems

5.5.1.11. Siemplify

5.5.1.12. Syncurity

5.5.2. Threat and Vulnerability Management (TVM)

5.5.2.1. Acuity Risk Management

5.5.2.2. Agiliance

5.5.2.3. BeyondTrust

5.5.2.4. Core Security

5.5.2.5. Cybersponse

5.5.2.6. DFLabs

5.5.2.7. EMC(RSA)

5.5.2.8. Kenna Security

5.5.2.9. NopSec

5.5.2.10. RedSeal

5.5.2.11. RiskSense

5.5.2.12. Skybox Security

5.5.2.13. Swimlane

5.5.2.14. Siemplify

5.5.3. Security Operations Analytics

5.5.3.1. Ayehu

5.5.3.2. Cybersponse

5.5.3.3. DFLabs

5.5.3.4. EMC(RSA)

5.5.3.5. Hexadite

5.5.3.6. Proofpoint

5.5.3.7. Resilient Systems

5.5.3.8. Siemplify

5.5.3.9. Swimlane

5.5.4. Security Operations Automation Platforms (SOAPS)

5.5.4.1. Ayehu

5.5.4.2. Cyberbit

5.5.4.3. Cybersponse

5.5.4.4. DFLabs

5.5.4.5. Demisto

5.5.4.6. Fireye

5.5.4.7. Hexadite

5.5.4.8. IBM

5.5.4.9. Phantom Cyber

5.5.4.10. Swimlane

5.5.4.11. Syncurity

5.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

5.6.1. Crowdsourced Application Security Testing Platforms

5.6.1.1. Hyver

5.6.1.2. Applause

5.6.1.3. Bugcrowd

5.6.1.4. BugFinders

5.6.1.5. Cobalt

5.6.1.6. Crowdtesters

5.6.1.7. HackerOne

5.6.2. Managed Penetration Testing Services

5.6.2.1. Cenzic

5.6.2.2. WhiteHatSecurity

5.6.3. Penetration Testing Software

5.6.3.1. Core Security

5.6.3.2. Rapid7

5.6.3.2.1. Metasploit Pro

5.6.3.2.2. Metasploit Express

5.6.3.3. Trustwave

5.6.4. Vulnerability Assessment

5.6.4.1. Software as a Service

5.6.4.1.1. Vulnerability Management

5.6.4.1.2. Phish Testing/Management

5.6.4.2. Network-Based Vulnerability Assessment (On Premise)

5.6.4.2.1. Core Security

5.6.4.2.2. Digital Defense

5.6.4.2.3. Fortinet

5.6.4.2.4. Intel Security

5.6.4.2.5. NSAuditor

5.6.4.2.6. Ncircle

5.6.4.2.7. Netasq

5.6.4.2.8. Outpost24

5.6.4.2.9. Qualys

5.6.4.2.10. RandomStorm

5.6.4.2.11. Rapid 7

5.6.4.2.12. Trustwave

5.6.4.3. Agent-Based Vulnerability Assessment

5.6.4.3.1. BeyondTrust

5.6.4.3.2. Qualys

5.6.4.3.3. Secunia

5.6.4.3.4. Tenable

5.6.4.4. Mainframe Vulnerability Assessment

5.6.4.4.1. Key Resources Inc. (KRI)

5.6.5. Vulnerability Correlation

5.6.5.1. Application Vulnerability Correlation

5.6.5.1.1. Code DX

5.6.5.1.2. Denim Group

5.6.5.1.3. Kenna Security

5.6.5.1.4. NopSec

5.6.5.2. Network Vulnerability Correlation

5.6.5.2.1. Secure Decisions

5.6.5.2.2. RiskSense

5.6.5.2.3. NopSec

5.6.5.2.4. Kenna Security

5.6.5.2.5. Cybric

5.6.6. Vulnerability Research

5.6.6.1. CSC

5.6.6.2. HP

5.6.6.2.1. DV Labs

5.6.6.3. HotWAN

5.6.6.4. Intel Security

5.6.6.5. SecNiche Labs

5.6.6.6. Sourcefire VRT

5.6.6.7. Symantec

5.6.6.8. VRLSec

5.6.6.9. Vupen

6. • Malicious apps

6.1. Cloud Service Brokerages

6.1.1. Bitnami

6.1.2. Ensim

6.1.2.1. http://www.ensim.com/

6.1.3. Gravitant

6.1.4. Jamcracker

6.1.4.1. http://www.jamcracker.com/

6.1.5. StandingCloud

6.2. Distribution/Channel/VARs

6.2.1. VARs, Resellers

6.2.1.1. China

6.2.1.1.1. Mainland China

6.2.1.1.2. Hong Kong

6.2.1.1.3. Taiwan

6.2.1.2. Emerging Asia Pacific

6.2.1.2.1. India

6.2.1.2.2. Indonesia

6.2.1.2.3. Malasia

6.2.1.2.4. Thailand

6.2.1.2.5. Philippines

6.2.1.3. Eurasia

6.2.1.3.1. Russian Federation

6.2.1.3.2. Kazakhstan

6.2.1.3.3. Ukraine

6.2.1.4. Europe

6.2.1.4.1. Eastern Europe

6.2.1.4.2. Western Europe

6.2.1.5. Latin America

6.2.1.5.1. Brazil

6.2.1.5.2. Chile

6.2.1.5.3. Columbia

6.2.1.5.4. Costa Rica

6.2.1.5.5. Ecuador

6.2.1.5.6. Bolivia

6.2.1.5.7. Venezuela

6.2.1.5.8. Cuba

6.2.1.5.9. Argentina

6.2.1.5.10. Buenos Aires

6.2.1.5.11. Mexico

6.2.1.5.12. Peru

6.2.1.6. Mature Asia Pacific

6.2.1.6.1. Australia

6.2.1.6.2. Japan

6.2.1.6.3. Singapore

6.2.1.7. Middle East and North Africa

6.2.1.7.1. Turkey

6.2.1.7.2. Israel

6.2.1.7.3. Saudi Arabia

6.2.1.7.4. South Africa

6.2.1.7.5. India

6.2.1.7.6. United Arab Emirates

6.2.1.8. North America

6.2.1.8.1. United States

6.2.1.8.2. Canada

6.2.1.9. Sub-Sahara Africa

6.2.1.9.1. South Africa

6.2.1.10. WorldWide

6.2.1.10.1. AT&T

6.2.1.10.2. BT

6.2.1.10.3. Optiv

6.2.1.10.4. SHI

6.2.1.10.5. Secureworks

6.2.1.10.6. Verizon Business

6.2.2. Distributors

6.2.2.1. China

6.2.2.1.1. AVNet

6.2.2.1.2. B & Data Technology Co. Ltd.

6.2.2.1.3. Beijing Advazone Electronic Limited Comp

6.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.

6.2.2.1.5. Digital China Technology LTD.

6.2.2.1.6. Ecs China

6.2.2.1.7. Edvance Technology (China) Limited

6.2.2.1.8. Huagai

6.2.2.1.9. M.Tech (Shanghai) Co., Ltd.

6.2.2.1.10. Shanghai S-I Information Tech. Ltd

6.2.2.1.11. Sinogrid Information Technology Ltd.

6.2.2.1.12. Sky Faith International Enterprise

6.2.2.2. Emerging Asia Pacific

6.2.2.2.1. India

6.2.2.2.2. Indonesia

6.2.2.2.3. Thailand

6.2.2.3. Eurasia

6.2.2.3.1. Russian Federation

6.2.2.3.2. Kazakhstan

6.2.2.4. Mature Asia Pacific

6.2.2.4.1. Singapore

6.2.2.4.2. Japan

6.2.2.4.3. South Korea

6.2.2.4.4. Australia

6.2.2.5. Middle East and South Africa

6.2.2.5.1. United Arab Emirates

6.2.2.5.2. South Africa

6.2.2.6. North America

6.2.2.6.1. Canada

6.2.2.6.2. United States

6.2.2.7. Sub-Sahara Africa

6.2.2.7.1. South Africa

6.2.2.8. Western Europe

6.2.2.8.1. United Kingdom

6.2.2.8.2. Germany

6.2.2.9. Worldwide

6.2.2.9.1. AVNet

6.2.2.9.2. Ingram Micro

6.2.2.9.3. LifeBoat Distribution

6.2.2.9.4. Tech Data

6.2.2.9.5. Westcon

6.2.2.10. Latin America

6.2.2.10.1. Mexico

6.2.2.10.2. Brazil

6.2.3. Reseller Programs

6.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm

6.2.4. Logistics/Deal Registration

6.2.4.1. Connectwise

6.3. Government Cyberwarrior (Personnel Estimates)

6.3.1. United States

6.3.1.1. NSA

6.3.1.1.1. Cyberwarrior Stats

6.3.1.2. Department of Defense

6.3.1.2.1. US Airforce

6.3.1.2.2. US Navy

6.3.1.2.3. DISA

6.3.2. Iran

6.3.2.1. 4500

6.3.3. Israel

6.3.3.1. Unit 8200

6.3.3.1.1. 5000

6.3.4. North Korea

6.3.4.1. 1000

6.4. Hardware and Chip Security

6.4.1. AMD

6.4.1.1. TPM

6.4.2. Cavium

6.4.2.1. Multi-Core Processors

6.4.3. Flow Processors

6.4.3.1. Netronome

6.4.4. Intel

6.4.4.1. TPM

6.4.4.2. Data Execution Protection

6.4.5. Systems

6.4.5.1. Janus Technologies

6.4.5.1.1. http://www.janustech.com/janus_secure_computer.html

6.5. Investment

6.5.1. ETFs

6.5.1.1. PureFunds

6.5.1.1.1. SYM:HACK

6.5.2. Venture Capitalists

6.5.2.1. Trident Capital

6.5.2.2. Andreesen Horowitz

6.6. Managed Service Enablement

6.6.1. Chartec

6.6.2. Jamcracker

6.7. Marketing/PR/AR

6.7.1. Analyst & Public Relations

6.7.1.1. Focused Image

6.7.1.1.1. http://www.focusedimage.com/

6.7.1.2. KTCpr

6.7.1.2.1. http://www.kahn-travel.com/

6.7.1.3. Madison Alexander PR

6.7.1.3.1. http://www.madisonalexanderpr.com/

6.7.1.4. Marc Gendron PR

6.7.1.4.1. http://www.mgpr.info/

6.7.1.5. Schwartz Communications

6.7.1.5.1. http://www.schwartzmsl.com/

6.7.1.6. Spalding Communications

6.7.1.7. Text 100

6.7.1.7.1. http://www.text100.com/

6.7.2. Campaign/Engagement

6.7.2.1. WCG World

6.7.2.1.1. http://wcgworld.com/

6.7.3. Creative/Design Services

6.7.3.1. Duarte

6.7.3.1.1. http://www.duarte.com/

6.7.3.2. Gig Productions

6.7.3.2.1. http://www.gigpros.com/index.php

6.7.3.3. Initiate Marketing

6.7.3.3.1. http://www.getinitiated.ca/

6.7.3.4. MN8Studio

6.7.3.4.1. http://www.mn8studio.com/

6.7.3.5. Text 100

6.7.3.5.1. http://www.text100.com/

6.7.4. Web Site Design

6.7.4.1. Baytech Web Design

6.7.4.1.1. http://www.baytechwebdesign.com/

6.7.4.2. EU Design Studios

6.7.4.2.1. http://eudesignstudio.com/

6.7.4.3. Pro Logic Web Services

6.7.4.3.1. http://www.prologicsoft.com/

6.7.5. Market Destinations (Sites)

6.7.5.1. CRN

6.7.5.2. Hak5

6.7.5.3. MSPMentor

6.7.5.4. Madison Logic

6.7.5.5. SCmagazine

6.7.5.6. TheVarGuy

6.7.6. Marketing Videos

6.7.6.1. Epipheo

6.7.6.1.1. http://www.epipheo.com/

6.7.7. Marketing/Branding Agencies

6.7.7.1. Focused Image

6.7.7.1.1. http://www.focusedimage.com/branding/

6.7.7.2. Hill and Knowlton

6.7.7.2.1. http://www.hkstrategies.com/

6.7.7.3. MetaDesign

6.7.7.3.1. http://www.metadesign.com/san-francisco

6.7.7.4. Ogilvy & Mather

6.7.7.5. Tailfin Marketing Communications

6.7.7.6. Toolbox Studios

6.8. Product Testing

6.8.1. Generic Product Testing, Certification and Accreditation

6.8.1.1. Certifications

6.8.1.1.1. North America

6.8.1.1.2. European Union

6.8.1.2. Testing

6.8.1.2.1. United Kingdom

6.8.1.2.2. North America

6.8.1.2.3. Singapore

6.8.1.3. Accreditation

6.8.1.3.1. DOD

6.8.1.3.2. NSA

6.8.2. Anti-Malware Testing

6.8.2.1. AMTSO

6.8.2.2. AV-Test

6.8.2.3. Av-Comparatives

6.8.2.4. MRG Effitas

6.8.2.5. VirusBTN

6.8.3. Sponsored Product Review/Testing

6.8.3.1. Delta Testing LTD

6.8.3.2. Dennis Labs

6.8.3.3. Miercom

6.8.3.4. NSS Labs

6.8.3.5. Network Testing Labs

6.8.3.6. Tolly Group

6.8.3.7. West Coast Labs

6.8.4. Antimalware Standards Bodies

6.8.4.1. AMTSO

6.8.4.1.1. http://www.amtso.org/

6.9. Cloud Service Brokerages

6.10. Security Conferences

6.10.1. North America

6.10.1.1. United States

6.10.1.1.1. RSA

6.10.1.1.2. Gartner

6.10.1.1.3. Cornerstones of Trust

6.10.1.1.4. Annual Security Conference

6.10.1.1.5. SecurityBsides

6.10.1.1.6. ShmooCon

6.10.2. Europe

6.10.2.1. United Kingdom

6.10.2.1.1. RSA Conference

6.10.2.1.2. Gartner

6.10.2.2. Russia

6.10.2.2.1. Infosecurity Russia

6.10.3. Emerging Asia Pacific

6.10.4. Mature Asia Pacific

6.10.4.1. Australia

6.10.4.1.1. Gartner

6.10.4.2. Singapore

6.10.4.2.1. RSA

6.11. Staffing/Recruiting/Executive Search

6.11.1. Millard Group

6.11.2. Lynch Bowie Group

6.11.3. Robert Half

6.12. User Interface Design

6.12.1. Consulting

6.12.1.1. User Interface

6.12.1.1.1. BlinkUX

6.12.1.1.2. Sasa Technologies

6.12.1.1.3. Dabapps

6.12.1.2. Customer Survey

6.12.1.2.1. Techvalidate

6.12.2. HTML5 Visualization Libraries

6.12.2.1. Data-Driven Documents

6.12.2.1.1. http://d3js.org/

6.12.2.2. AngularJS

6.12.2.2.1. https://angularjs.org/

6.12.3. Icons

6.12.3.1. IconExperience

6.12.3.1.1. https://www.iconexperience.com/

6.12.3.2. FlatIcon

6.12.3.2.1. http://www.flaticon.com/packs/general-ui

6.12.3.3. ModernUIicons

6.12.3.3.1. http://modernuiicons.com/

6.12.3.4. Ui8

6.12.3.4.1. https://ui8.net/categories/icons

7. • Inactive apps

7.1. Active Directory Defense

7.1.1. Aorato

7.1.1.1. http://www.aorato.com/

7.2. Cloud-Based Remote Access VPN

7.2.1. Check Point

7.2.1.1. Capsule Cloud

7.2.2. Pertino

7.2.3. Soha

7.3. DNS-based Threat Prevention/Detection

7.3.1. Standalone Appliances

7.3.1.1. Bluecat Networks

7.3.1.2. Efficient IP

7.3.1.3. Infoblox

7.3.2. Recursive DNS  Services

7.3.2.1. Bluecat Networks

7.3.2.2. Cisco

7.3.2.2.1. OpenDNS

7.3.2.3. Comodo

7.3.2.4. CrowdStrike

7.3.2.5. Infoblox

7.3.2.6. Neustar

7.3.2.7. Nominum

7.3.2.8. Symantec

7.3.2.9. ThreatStop

7.3.2.10. Verisign

7.3.3. Firewalls

7.3.3.1. Palo Alto Networks

7.4. Denial of Service Protection

7.4.1. Appliances

7.4.1.1. Arbor Networks

7.4.1.1.1. Prevail APS

7.4.1.2. Check Point Software

7.4.1.2.1. DDos Protector

7.4.1.3. Corero

7.4.1.4. Fortinet

7.4.1.5. Genie Networks

7.4.1.5.1. ATM Appliances

7.4.1.6. NSFOCUS

7.4.1.7. Radware

7.4.1.8. WINS TECHNET LTD

7.4.1.8.1. http://www.wins21.co.kr/

7.4.2. Security as a Service

7.4.2.1. HTTP/HTTPS Only

7.4.2.1.1. DOSArrest

7.4.2.1.2. Cloudflare

7.4.2.2. MultiProtocol/Network

7.4.2.2.1. Akamai

7.4.2.2.2. Black Lotus

7.4.2.2.3. Cloud Flare

7.4.2.2.4. F5

7.4.2.2.5. Incapsula

7.4.2.2.6. Link11

7.4.2.2.7. Neustar

7.4.2.2.8. NexusGuard

7.4.2.2.9. Verisign Inc

7.4.3. Clean Pipe Services

7.4.3.1. AT&T

7.4.3.2. Verizon

7.5. Fraud Prevention/Web Malware Monitoring

7.5.1. Fraud/Bot/Webscrape Prevention

7.5.1.1. Software

7.5.1.1.1. RSA (EMC)

7.5.1.1.2. IBM (Formerly Trusteer)

7.5.1.1.3. Intellinx

7.5.1.2. Appliances

7.5.1.2.1. RSA

7.5.1.2.2. Distil Networks

7.5.1.2.3. White Ops

7.5.1.3. Software as a Service

7.5.1.3.1. Akamai

7.5.1.3.2. BioCatch

7.5.1.3.3. Distil Networks

7.5.1.3.4. Guardian Analytics

7.5.1.3.5. Kount

7.5.1.3.6. MarkMonitor

7.5.1.3.7. ShieldSquare

7.5.1.3.8. ThreatMetrix

7.5.1.3.9. White Ops

7.5.1.3.10. X-Cart

7.5.1.3.11. iovation

7.5.1.4. Virtual Appliances

7.5.1.4.1. Distil Networks

7.5.2. Website & Ad Malware Monitoring

7.5.2.1. Ad-Juster

7.5.2.2. Globalsign

7.5.2.2.1. Leverages Hackalert

7.5.2.3. Hackalert

7.5.2.4. Intel Security

7.5.2.4.1. Siteadvisor

7.5.2.5. QualysGuard

7.5.2.6. RiskIQ

7.5.2.7. Sucuri

7.6. Network Access Control (NAC)

7.6.1. Host Based

7.6.1.1. Symantec

7.6.1.2. Intel Security

7.6.2. Network Based

7.6.2.1. Aruba Networks

7.6.2.2. Bradford Networks

7.6.2.3. Cisco

7.6.2.4. Forescout

7.6.2.5. Milton Security Group

7.6.2.6. Portnox

7.7. Network Anonymization & Consumer VPN Services

7.7.1. AnchorFree Hotspot Shield

7.7.2. Anonymize.net

7.7.3. CyberGhost

7.7.4. Dispel

7.7.5. GoldenFrog

7.7.6. HMA ProVPN

7.7.6.1. TorVPN

7.7.7. Okayfreedom

7.7.8. OpenVPN Shield Exchange

7.7.9. Private Wifi

7.7.10. Tor

7.7.11. luminati.io

7.8. Network Firewalls

7.8.1. Carrier Firewalls

7.8.2. Enterprise Firewalls

7.8.2.1. Multifunction Enterprise Firewalls

7.8.2.1.1. Bluedon

7.8.2.1.2. Check Point Software

7.8.2.1.3. Cisco

7.8.2.1.4. Fortinet

7.8.2.1.5. Huawei

7.8.2.1.6. Palo Alto Networks

7.8.2.1.7. Sonicwall

7.8.2.1.8. Websense (Formerly Intel Security)

7.8.2.2. Stateful Inspection - Traditional Firewalls

7.8.2.2.1. Cisco

7.8.2.2.2. Huawei

7.8.2.2.3. Check Point Software

7.8.3. Multi-Funtion SMB Firewalls

7.8.3.1. 443 Networks

7.8.3.2. Bluedon

7.8.3.3. Check Point Software

7.8.3.4. CheckPoint

7.8.3.5. Cisco

7.8.3.6. Clavister

7.8.3.7. Endian

7.8.3.8. Fortinet

7.8.3.9. Hillstone Networks

7.8.3.10. Meraki

7.8.3.11. PineApp

7.8.3.11.1. http://www.pineapp.com/

7.8.3.12. Sangfor

7.8.3.13. Sonicwall

7.8.3.14. Sophos

7.8.3.15. Trustwave

7.8.3.16. Untangle

7.8.3.17. WINS TechNet LTD

7.8.3.17.1. http://www.wins21.co.kr/

7.8.3.18. WatchGuard

7.8.4. Open Source & Community

7.8.4.1. IPTables

7.8.4.2. IPchains

7.8.4.3. PFSense

7.8.4.4. Untangle

7.8.5. Router Firewalls

7.9. Network Intrusion Detection/Prevention

7.9.1. Predictive Modeling

7.9.1.1. Cyactive

7.9.1.2. Trustpipe

7.9.2. IBM

7.9.3. Signature Based

7.9.3.1. AlienVault

7.9.3.1.1. Snort

7.9.3.2. Bricata

7.9.3.3. CheckPoint

7.9.3.4. Cisco

7.9.3.4.1. Sourcefire

7.9.3.5. Enterasys

7.9.3.6. Fortinet

7.9.3.7. HP

7.9.3.7.1. TippingPoint

7.9.3.8. IBM

7.9.3.9. Intel Security

7.9.3.10. Open Source

7.9.3.10.1. Snort

7.9.3.11. Symantec

7.9.3.11.1. APT Network

7.9.3.12. WINS TECHNET LTD

7.9.3.12.1. http://www.wins21.co.kr/

7.9.4. SCADA

7.9.4.1. Radiflow

7.10. Network Packet Brokers

7.10.1. Adara

7.10.2. Apcon

7.10.3. Arista Networks

7.10.4. Cubro

7.10.5. Gigamon

7.10.6. IXIA

7.10.7. Interface Masters Technologies

7.10.8. JDSU

7.10.9. NetOptics

7.10.10. NetScout

7.10.11. VSS Monitoring

7.11. Network Traffic Analysis, Network Behavior Analysis and Network Forensics

7.11.1. Flow Analysis/Metadata Extraction

7.11.1.1. Arbor Networks

7.11.1.2. IBM

7.11.1.3. Lancope

7.11.1.4. LogRythm

7.11.1.5. Intel Security NBA

7.11.2. Forensic Capture with User Surveillance & Security Threat Analytics

7.11.2.1. Access Data

7.11.2.2. BlueCoat

7.11.2.3. Cisco

7.11.2.3.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html

7.11.2.4. EMC

7.11.2.5. FireEye

7.11.2.6. Fluke Networks

7.11.2.7. IBM

7.11.2.8. IP Fabrics

7.11.2.9. JDSU (Network Instruments)

7.11.2.10. LightCyber

7.11.2.11. NetAgent

7.11.2.12. NetResec

7.11.2.13. NetScout

7.11.2.14. Niksun

7.11.2.15. Novetta Solutions

7.11.2.16. Nuix

7.11.2.17. Packetsled

7.11.2.18. Riverbed

7.11.2.19. SS8

7.11.2.19.1. http://www.ss8.com/

7.11.2.20. nPulse Technologies

7.11.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring

7.11.3.1. Emulex

7.11.3.2. Packetsled

7.11.3.3. WildPackets

7.11.4. Network Forensics Tools

7.11.4.1. Alert Logic

7.11.4.1.1. Formerly Click Security

7.11.4.2. Corvil

7.11.4.3. Cybersift

7.11.4.3.1. http://www.cybersift.net/sifter10app.html

7.11.4.4. Decision Group INC

7.11.4.4.1. http://www.edecision4u.com/index.html

7.11.4.5. EMC

7.11.4.6. FireEye

7.11.4.7. Fluke Networks

7.11.4.8. IP Fabrics

7.11.4.9. IPCopper

7.11.4.10. InveaTech

7.11.4.10.1. https://www.invea.com/en/products-and-services/li-system

7.11.4.11. KLOS

7.11.4.11.1. http://www.klos.com/applications/lawful-intercept/

7.11.4.12. NEXT Computing

7.11.4.12.1. http://www.nextcomputing.com/products/packet-capture-systems

7.11.4.13. NetReSec

7.11.4.14. Niksun

7.11.4.15. Radisys

7.11.4.15.1. http://www.radisys.com/products/network-appliance/

7.11.4.16. Utimaco

7.11.4.16.1. https://lims.utimaco.com/utimaco-lims/

7.11.4.17. WildPackets

7.11.5. Network Forensics Tools as a Service (NFTaaS)

7.11.5.1. CloudShark

7.11.6. Network Taps

7.11.6.1. Optical

7.11.6.1.1. Apcon

7.11.6.1.2. DataCom Systems

7.11.6.1.3. FibreDyne

7.11.6.1.4. Gigamon

7.11.6.1.5. Glimmerglass

7.11.6.1.6. M2Optics

7.11.6.1.7. Netoptics

7.11.6.1.8. Network Instruments

7.11.6.1.9. VSS Monitoring

7.11.6.1.10. nTAP

7.11.7. Network Traffic Analysis

7.11.7.1. Amgine Securus

7.11.7.2. Arbor Networks

7.11.7.3. Boeing

7.11.7.4. Cisco

7.11.7.4.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html

7.11.7.5. Corvil

7.11.7.6. Cyber adAPT

7.11.7.7. Damballa

7.11.7.8. Darktrace

7.11.7.9. ExtraHop Networks

7.11.7.10. Fidelis Cybersecurity

7.11.7.11. Lancope

7.11.7.12. Light Cyber

7.11.7.13. Novetta Solutions

7.11.7.14. PacketSled

7.11.7.15. Phirelight

7.11.7.16. Qihoo 360

7.11.7.16.1. SkyEye

7.11.7.17. RedJack

7.11.7.18. SlashNext

7.11.7.19. Splunk

7.11.7.20. Taasera

7.11.7.21. ThreatTrack

7.11.7.22. Trustport

7.11.7.22.1. Threat Intelligence

7.11.7.23. Vectra Networks

7.11.7.24. WireX

7.11.8. Raw Network Packet Capture

7.11.8.1. Apcon

7.11.8.1.1. Riverbed

7.11.8.1.2. Netfort

7.11.8.1.3. Wireshark

7.11.8.1.4. NTOP

7.11.8.2. Arbor Networks

7.11.8.3. Comworth

7.11.8.4. NTOP.org

7.11.8.5. Netfort

7.11.8.6. WireShark

7.12. Network-Based Advanced Threat Protection

7.12.1. Firewalls with Malware Sandbox Capabilities

7.12.1.1. Barracuda

7.12.1.2. Check Point Software

7.12.1.3. Cisco

7.12.1.4. Fortinet

7.12.1.5. Huawei

7.12.1.6. Juniper Networks

7.12.1.7. Palo Alto Networks

7.12.1.8. Sonicwall

7.12.1.9. Sophos

7.12.1.10. Watchguard

7.12.2. Appliance Based Malware Sandboxes

7.12.2.1. AMGINE SECURUS

7.12.2.1.1. http://www.amgine.co.kr/index.html

7.12.2.2. AhnLab

7.12.2.3. Bluecoat

7.12.2.4. Check Point Software

7.12.2.4.1. Emulator Blade

7.12.2.5. Cisco

7.12.2.5.1. ThreatGrid

7.12.2.6. ContentKeeper

7.12.2.7. Cyphort

7.12.2.8. Damballa

7.12.2.9. FireEye

7.12.2.10. Fortinet

7.12.2.10.1. FortiSandbox

7.12.2.11. General Dynamics

7.12.2.11.1. Fidelis Security Systems

7.12.2.12. Huawei

7.12.2.12.1. Firehunter

7.12.2.13. Intel Security

7.12.2.13.1. McAfee Advanced Threat Detection Appliance

7.12.2.14. LastLine

7.12.2.15. Palo Alto Networks

7.12.2.15.1. WildFire

7.12.2.16. Payload Security

7.12.2.17. Qihoo

7.12.2.17.1. SkyEye

7.12.2.18. Techguard Security

7.12.2.19. ThreatTrack

7.12.2.20. Trend Micro

7.12.2.20.1. Deep Discovery

7.12.2.21. VMRay

7.12.2.22. VeeDog

7.12.2.22.1. http://veedog.com/

7.12.2.23. WINS TECHNET LTD

7.12.2.23.1. http://www.wins21.co.kr/

7.12.3. Cloud-Based Malware Sandboxes

7.12.3.1. Cisco

7.12.3.1.1. ThreatGrid

7.12.3.2. Fortinet

7.12.3.3. Huawei

7.12.3.4. Joe Security

7.12.3.5. Lastline

7.12.3.6. Netwitness

7.12.3.6.1. Spectrum

7.12.3.7. Palo Alto Networks

7.12.3.7.1. WildFire

7.12.3.8. Qihoo

7.12.3.8.1. SkyEye

7.12.3.9. Sonicwall

7.13. SCADA/ICS

7.13.1. Monitoring

7.13.1.1. CRITIFENSE

7.13.1.2. Cyberbit

7.13.1.3. PFP Cybersecurity

7.13.2. SCADA Firewalls

7.13.2.1. BAE Systems

7.13.2.1.1. http://www.baesystems.com/en-us/product/scada-firewall

7.13.2.2. Bayshore Networks

7.13.2.2.1. https://www.bayshorenetworks.com/products/it-ot-gateway/

7.13.2.3. Check Point Software

7.13.2.3.1. https://www.checkpoint.com/products-solutions/critical-infrastructure/

7.13.2.4. Endian

7.13.2.4.1. http://www.endian.com/products/4i/

7.13.2.5. Fortinet

7.13.2.5.1. https://www.fortinet.com/solutions/industries/scada-industrial-control-systems.html

7.13.2.6. Tofino Security

7.13.2.6.1. https://www.tofinosecurity.com/products/Tofino-Firewall-LSM

7.14. SSL Inspection Appliances

7.14.1. A10 Networks

7.14.2. Bluecoat

7.14.3. ResolutionOne

7.14.4. VSS Monitoring

7.14.5. SourceFire

7.15. Software Defined Perimeter

7.15.1. Certes Networks

7.15.2. Cryptzone

7.15.3. Tempered Networks

7.15.4. Unisys Stealth

7.15.5. Vidder

7.15.6. Waverly Labs

7.16. Virtual Private Networking (VPN/SSL VPN)

7.16.1. IPSec VPN Concentrators

7.16.1.1. Certes Networks

7.16.1.2. CheckPoint Software

7.16.1.3. Cisco

7.16.1.4. Mako Networks

7.16.2. Layer 2 Encryption

7.16.2.1. Certes Networks

7.16.3. Layer 4 Encryption

7.16.3.1. Certes Networks

7.16.4. SSL VPN

7.16.4.1. AhnLab

7.16.4.2. Array Networks

7.16.4.3. Barracuda Networks

7.16.4.4. Check Point Software

7.16.4.5. Cisco

7.16.4.6. Citrix

7.16.4.7. F5 Networks

7.16.4.8. Fortinet

7.16.4.9. Hillstone Networks

7.16.4.10. Juniper

7.16.4.11. NetGear

7.16.4.12. Sonicwall

7.16.4.13. Stonesoft

7.16.4.14. WatchGuard

7.16.5. Multi-Path Dynamic VPN

7.16.5.1. Secret Double Octopus

7.16.5.2. Dispersive Networks

7.17. Web/Email Protection

7.17.1. Secure Email Gateways

7.17.1.1. Alt-N Technologies

7.17.1.2. Bluecoat

7.17.1.3. Fortinet

7.17.1.4. GWAVA

7.17.1.5. Intel Security

7.17.1.6. Proofpoint

7.17.1.7. Re-Sec

7.17.1.8. Sonicwall

7.17.1.9. Symantec

7.17.1.10. Trustwave

7.17.1.11. Voitiro

7.17.1.12. Websense

7.17.1.13. iBoss

7.17.2. Secure Web Gateways

7.17.2.1. Anchiva

7.17.2.2. Bluecoat

7.17.2.3. ContentKeeper

7.17.2.4. GWAVA

7.17.2.5. Intel Security

7.17.2.6. Re-Sec

7.17.2.7. Symantec

7.17.2.8. Trustwave

7.17.2.9. Websense

7.17.2.10. iBoss

7.17.3. Security as a Service

7.17.3.1. Web & Email SaaS

7.17.3.1.1. Appriver

7.17.3.1.2. Barracuda

7.17.3.1.3. Bitglass

7.17.3.1.4. Cisco

7.17.3.1.5. Intel Security

7.17.3.1.6. MailGuard

7.17.3.1.7. Spamina

7.17.3.1.8. Symantec

7.17.3.1.9. Total Defense

7.17.3.1.10. TotalDefense

7.17.3.1.11. Websense

7.17.3.1.12. Zscaler

7.17.3.2. Web Only

7.17.3.2.1. Bluecoat

7.17.3.2.2. ContentKeeper

7.17.3.2.3. OpenDNS

7.17.3.2.4. Websense

7.17.3.2.5. Zscaler

7.17.3.3. Secure Email Gateways

7.17.3.3.1. Agari

7.17.3.3.2. CloudMark

7.17.3.3.3. Proofpoint

7.17.3.3.4. Return Path

7.17.3.3.5. Spam Experts

7.17.3.3.6. Spam Titan

7.17.3.3.7. Spamina

7.17.3.3.8. ValiMail

7.17.3.4. Anti-Phishing

7.17.3.4.1. Amgine Securus

7.17.3.4.2. Area1 Security

7.17.3.4.3. CloudMark

7.17.3.4.4. Cymbel

7.17.3.4.5. Cyveillance

7.17.3.4.6. FireEye

7.17.3.4.7. MailGuard

7.17.3.4.8. MediaPro

7.17.3.4.9. Phishlabs

7.17.3.4.10. ThreatTrack

7.17.3.4.11. Votiro

7.17.3.4.12. Webroot

7.17.3.4.13. ZapFraud

8. • Spyware

8.1. Direct Tech Providers Managed Security

8.1.1. Asia Pacific

8.1.1.1. Australia

8.1.1.2. China

8.1.1.2.1. NSFOCUS

8.1.1.3. Singapore

8.1.2. Europe

8.1.2.1. GoGrid

8.1.2.1.1. Compliance Reporting (PCI, HIPAA)

8.1.2.1.2. Host IDS

8.1.2.1.3. Log Management

8.1.2.1.4. SIEM

8.1.2.1.5. Vulnerability Assessment

8.1.3. Global Providers

8.1.4. Middle East and North Africa

8.1.4.1. Saudi Arabia

8.1.4.2. United Arab Emirates

8.1.5. North America

8.1.5.1. United States

8.1.5.1.1. NSFOCUS

8.1.5.1.2. Check Point Software

8.1.5.1.3. Network Box

8.1.5.1.4. GoGrid

8.1.5.1.5. FireEye

8.1.5.1.6. Rapid7

8.2. Indirect Providers

8.2.1. Emerging Asia Pacific

8.2.1.1. India

8.2.1.1.1. CSS Corp PVT

8.2.1.1.2. Happiest Minds

8.2.1.1.3. SunGard Availability Services

8.2.1.1.4. Ecomnets India PVT. LTD

8.2.2. Europe

8.2.2.1. BT Global Services

8.2.2.2. Dell SecureWorks

8.2.2.3. Germany

8.2.2.3.1. Link11 GMBH

8.2.2.3.2. IPsoft

8.2.2.4. HP

8.2.2.5. Happiest Minds

8.2.2.5.1. Advanced Malware Protection

8.2.2.5.2. Application Activity Monitoring

8.2.2.5.3. Compliance Reporting

8.2.2.5.4. Database Activity Monitoring

8.2.2.5.5. File Integrity Monitoring

8.2.2.5.6. Log Management

8.2.2.5.7. Managed DLP

8.2.2.5.8. Network Forensics

8.2.2.5.9. SIEM

8.2.2.5.10. Unified Threat Management

8.2.2.5.11. Vulnerability Assessment

8.2.2.6. Integralis

8.2.2.7. Navisite

8.2.2.7.1. Mobile Device Management

8.2.2.8. Open Systems

8.2.2.9. Open Systems

8.2.2.10. Orange Business Services

8.2.2.11. SecureData

8.2.2.11.1. Firewall

8.2.2.11.2. IDS/IPS

8.2.2.11.3. SIEM

8.2.2.11.4. Data Loss Prevention

8.2.2.11.5. Secure Web Gateway

8.2.2.11.6. Secure Email Gateway

8.2.2.11.7. VPN/Remote Access

8.2.2.12. SunGard Availability Services

8.2.2.12.1. Firewalls

8.2.2.12.2. IAM

8.2.2.12.3. Intrusion Prevention

8.2.2.12.4. SIEM

8.2.2.12.5. Unified Threat Management

8.2.2.12.6. VPN

8.2.2.12.7. Web Application Firewall

8.2.2.13. Symantec

8.2.2.14. T-Systems

8.2.2.15. Tata Communications

8.2.2.16. Telefonica

8.2.2.16.1. DDoS Protection Service

8.2.2.16.2. Email Encryption

8.2.2.16.3. Email Security Gateway

8.2.2.16.4. Firewall Management

8.2.2.16.5. IAM

8.2.2.16.6. Intrusion Detection

8.2.2.16.7. Intrusion Prevention

8.2.2.16.8. Log Management

8.2.2.16.9. SIEM

8.2.2.16.10. Vulnerability Assessment

8.2.2.16.11. Web Security Gateway

8.2.2.16.12. Anti-Fraud

8.2.2.17. Verizon Business

8.2.2.17.1. Anti-DDoS

8.2.2.17.2. Email Security

8.2.2.17.3. Endpoint Protection

8.2.2.17.4. Firewall Management

8.2.2.17.5. Intrusion Detection

8.2.2.17.6. Intrusion Prevention

8.2.2.17.7. SIEM

8.2.2.17.8. Vulnerability Assessment

8.2.2.17.9. Web Security

8.2.2.18. Wipro

8.2.2.18.1. Email Security Gateway

8.2.2.18.2. Endpoint Security

8.2.2.18.3. Firewall Management

8.2.2.18.4. Fraud Management/Anti-Money Laundering

8.2.2.18.5. GRC

8.2.2.18.6. IAM

8.2.2.18.7. Intrusion Detection

8.2.2.18.8. Intrusion Prevention

8.2.2.18.9. SIEM

8.2.2.18.10. User Access Management

8.2.2.18.11. Web Security Gateway

8.2.3. Global Providers

8.2.3.1. AT&T

8.2.3.1.1. DDos Protection

8.2.3.1.2. Email/Data Encryption Services

8.2.3.1.3. Endpoint Anti-Virus

8.2.3.1.4. Endpoint Patch Management

8.2.3.1.5. Endpoint Policy Compliance

8.2.3.1.6. Mobile Device Security

8.2.3.1.7. Secure Email Gateway

8.2.3.1.8. Security Device Management

8.2.3.1.9. Web Application Firewall

8.2.3.1.10. Web Gateway (URL & Malware Filtering)

8.2.3.2. BEW Global

8.2.3.2.1. Data Loss Prevention

8.2.3.2.2. Web Security Gateway

8.2.3.2.3. Email Security Gateway

8.2.3.2.4. SIEM

8.2.3.2.5. Vulnerability Assessment

8.2.3.3. BT

8.2.3.4. Dell Secureworks

8.2.3.4.1. Advanced Malware Protection

8.2.3.4.2. Email Security Gateway

8.2.3.4.3. Firewall Management

8.2.3.4.4. Host IPS

8.2.3.4.5. IDS/IPS

8.2.3.4.6. Log Management

8.2.3.4.7. Log Retention

8.2.3.4.8. SIEM

8.2.3.4.9. Threat Intelligence

8.2.3.4.10. Unified Threat Management

8.2.3.4.11. Vulnerability Assessment

8.2.3.4.12. Web Application Firewall

8.2.3.4.13. Web Application Vulnerability Assessment

8.2.3.5. Dimension Data

8.2.3.6. HP

8.2.3.6.1. Access Managment

8.2.3.6.2. Data Loss Prevention

8.2.3.6.3. Email Security Gateway

8.2.3.6.4. Endpoint Encryption

8.2.3.6.5. Endpoint Protection

8.2.3.6.6. Intrusion Detection

8.2.3.6.7. Intrusion Prevention

8.2.3.6.8. Managed Incident Response

8.2.3.6.9. Remote Access Management

8.2.3.6.10. SIEM

8.2.3.6.11. Vulnerability Assessment

8.2.3.6.12. Web Application Vulnerability Assessment

8.2.3.6.13. Web Security Gateway

8.2.3.7. IBM

8.2.3.7.1. Email Security Gateway

8.2.3.7.2. Endpoint Patch Management

8.2.3.7.3. Endpoint Policy Management

8.2.3.7.4. Endpoint Protection

8.2.3.7.5. Firewall Management

8.2.3.7.6. IAM

8.2.3.7.7. Intrusion Detection

8.2.3.7.8. Intrusion Prevention

8.2.3.7.9. Log Management

8.2.3.7.10. Mobile Device Security

8.2.3.7.11. SIEM

8.2.3.7.12. Unified Threat Management

8.2.3.7.13. Vulnerability Assessment

8.2.3.7.14. Web Security Gateway

8.2.3.7.15. Web Vulnerability Assessment

8.2.3.8. Proficio

8.2.3.8.1. Email Security

8.2.3.8.2. Firewall Management

8.2.3.8.3. Incident Response

8.2.3.8.4. Log Management

8.2.3.8.5. Privileged Account Management

8.2.3.8.6. Regulatory and Polcy Compliance

8.2.3.8.7. SIEM

8.2.3.8.8. SOC Services

8.2.3.8.9. Vulnerability Assessment

8.2.3.8.10. Web Security

8.2.3.9. Tech Mahindra

8.2.3.9.1. Email Security

8.2.3.9.2. Endpoint Protection

8.2.3.9.3. Firewall Management

8.2.3.9.4. Identity and Access Management

8.2.3.9.5. Intrusion Detection

8.2.3.9.6. Intrusion Prevention

8.2.3.9.7. Log Management

8.2.3.9.8. SIEM

8.2.3.9.9. SOC Services

8.2.3.9.10. Vulnerability Assessment

8.2.3.9.11. Web Security

8.2.3.10. Telstra

8.2.3.11. Verizon Business

8.2.3.11.1. Anti-DDoS

8.2.3.11.2. Email Security

8.2.3.11.3. Endpoint Protection

8.2.3.11.4. Firewall Management

8.2.3.11.5. Intrusion Detection

8.2.3.11.6. Intrusion Prevention

8.2.3.11.7. SIEM

8.2.3.11.8. Vulnerability Assessment

8.2.3.11.9. Web Security

8.2.4. Greater China

8.2.4.1. Hong Kong

8.2.4.1.1. Network Box

8.2.4.1.2. Netswitch

8.2.4.2. BEW Global

8.2.4.2.1. Data Loss Prevention

8.2.4.2.2. Web Security Gateway

8.2.4.2.3. Email Security Gateway

8.2.4.2.4. SIEM

8.2.4.2.5. Vulnerability Assessment

8.2.4.3. Beijing

8.2.4.3.1. Netswitch

8.2.4.4. Shanghai

8.2.4.4.1. Shanghai Data Solution Co., Ltd

8.2.5. Latin America

8.2.5.1. Brazil

8.2.5.1.1. Arcon

8.2.5.1.2. Netcentrics

8.2.5.1.3. RealProtect

8.2.5.1.4. UOL Diveo

8.2.6. Mature Asia Pacific

8.2.6.1. Australia

8.2.6.1.1. Tesserent

8.2.6.1.2. Verizon

8.2.6.2. Singapore

8.2.6.2.1. Quann

8.2.6.2.2. NTT Singapore

8.2.6.2.3. Happiest Minds

8.2.6.2.4. Singtel

8.2.6.2.5. NCS Group

8.2.7. Middle East and North Africa

8.2.7.1. Saudi Arabia

8.2.7.2. United Arab Emirates

8.2.7.2.1. Du Telecom

8.2.7.2.2. Tata Communications

8.2.7.2.3. Dell Secureworks

8.2.7.2.4. Dimension Data

8.2.8. North America

8.2.8.1. Canada

8.2.8.1.1. Above Security

8.2.8.1.2. Bell Canada

8.2.8.1.3. EWA

8.2.8.1.4. Happiest Minds

8.2.8.1.5. Netpulse

8.2.8.1.6. OneStone (Formerly Seccuris)

8.2.8.1.7. SecureData

8.2.8.1.8. SentryMetrics

8.2.8.1.9. SunGard Availability Services

8.2.8.1.10. Virtual Guardian

8.2.8.2. United States

8.2.8.2.1. AT&T

8.2.8.2.2. Above Security

8.2.8.2.3. Alert Logic

8.2.8.2.4. Allstream

8.2.8.2.5. CGI

8.2.8.2.6. CSC

8.2.8.2.7. CSS Corp

8.2.8.2.8. CentraComm

8.2.8.2.9. CenturyLink- Savvis

8.2.8.2.10. Clone Systems

8.2.8.2.11. Compucom Systems

8.2.8.2.12. Cosentry

8.2.8.2.13. Dell Secureworks

8.2.8.2.14. Earthlink

8.2.8.2.15. Esentire

8.2.8.2.16. HCL Technologies

8.2.8.2.17. HP

8.2.8.2.18. Happiest Minds

8.2.8.2.19. IBM

8.2.8.2.20. Intelisecure

8.2.8.2.21. Leidos

8.2.8.2.22. LunarLine

8.2.8.2.23. Masergy Communications

8.2.8.2.24. Megapath

8.2.8.2.25. Morphick

8.2.8.2.26. My Digital Shield

8.2.8.2.27. NCA - Network Computing Architects

8.2.8.2.28. Navisite

8.2.8.2.29. Netfortris

8.2.8.2.30. Netswitch

8.2.8.2.31. Nuspire Networks

8.2.8.2.32. Rook Security

8.2.8.2.33. Secure Designs

8.2.8.2.34. SilverSky (Formerly Stillsecure/Perimeter esecurity)

8.2.8.2.35. Solutionary

8.2.8.2.36. SunGard Availability Services

8.2.8.2.37. Sword and Shield

8.2.8.2.38. Symantec

8.2.8.2.39. Symantec

8.2.8.2.40. Syntegrity Networks

8.2.8.2.41. Tesserent

8.2.8.2.42. Trustwave

8.2.8.2.43. Verizon Business

8.2.8.2.44. Wipro

8.2.9. Sub-Sahara Africa

8.2.9.1. AccessKenya

8.2.9.1.1. Firewall

8.2.9.1.2. Endpoint Protection

8.2.9.1.3. Secure Web Gateway

9. • Vulnerable Applications

9.1. Data Governance and Classification

9.1.1. Expert Source

9.1.1.1. http://www.expertsource.in/index.php

9.1.2. HP

9.1.3. IBM

9.1.4. Informatica

9.1.5. Nuix

9.1.6. Somansa

9.1.7. Titus

9.1.8. boldonjames

9.2. Data Loss Prevention (DLP)

9.2.1. Endpoint

9.2.1.1. Data Classification and Tracking

9.2.1.1.1. Banyan Solutions

9.2.1.1.2. BoldonJames

9.2.1.1.3. Digital Guardian

9.2.1.1.4. HP

9.2.1.1.5. IBM

9.2.1.1.6. Identity Finder

9.2.1.1.7. Mach1 Development

9.2.1.1.8. Microsoft (Formerly Secure Islands)

9.2.1.1.9. MinerEye

9.2.1.1.10. Nuix

9.2.1.1.11. Smartlogic

9.2.1.1.12. Titus

9.2.1.1.13. Varonis

9.2.1.1.14. CoSoSys

9.2.1.2. Mobile

9.2.1.2.1. Symantec

9.2.1.2.2. Websense

9.2.1.2.3. Microsoft (Secure Islands)

9.2.1.3. Windows

9.2.1.3.1. Absolute Software

9.2.1.3.2. CA Technologies

9.2.1.3.3. Digital Guardian

9.2.1.3.4. GTB Technologies

9.2.1.3.5. Infowatch

9.2.1.3.6. Intel Security

9.2.1.3.7. RSA

9.2.1.3.8. Microsoft (Secure Islands)

9.2.1.3.9. Somansa

9.2.1.3.10. Symantec

9.2.1.3.11. Trustwave

9.2.1.3.12. Watchful Software

9.2.1.3.13. Raytheon-Websense

9.2.1.3.14. Zecurion

9.2.2. Network

9.2.2.1. Digital Guardian

9.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)

9.2.2.3. Symantec

9.2.2.4. InfoWatch

9.2.3. Secure Email Gateway

9.2.3.1. Cisco

9.2.3.2. Symantec

9.2.3.3. Intel Security

9.2.3.4. Somansa

9.2.4. Secure Web Gateway

9.2.4.1. Intel Security

9.2.4.2. Symantec

9.2.4.3. Somansa

9.2.5. Security as a Service

9.2.5.1. Consumer

9.2.5.1.1. Reputation.com

9.2.5.1.2. Social Fortress

9.2.5.1.3. PwnedList

9.2.5.2. Enterprise

9.2.5.2.1. Social Fortress

9.2.5.2.2. Google Apps

9.2.5.2.3. ZixCorp

9.3. Database Security

9.3.1. Database Audit and Protection (DAP)

9.3.1.1. Application Security, Inc

9.3.1.2. BeyondTrust

9.3.1.3. Big Data Platform DAP

9.3.1.3.1. BlueTalon

9.3.1.3.2. Cloudera

9.3.1.3.3. Hortonworks

9.3.1.3.4. IBM

9.3.1.3.5. Imperva

9.3.1.4. DataSunrise

9.3.1.5. Fortinet

9.3.1.6. GreenSQL

9.3.1.7. IBM

9.3.1.8. IRI

9.3.1.8.1. Oracle

9.3.1.8.2. SQL Server

9.3.1.9. Imperva

9.3.1.10. Intel Security

9.3.1.11. Mentis Software

9.3.1.12. Oracle Corp

9.3.1.13. PentaSecurity

9.3.1.14. Warevalley

9.3.2. Database Activity Monitoring

9.3.2.1. DB Networks

9.3.2.2. Somansa

9.4. Encryption/Tokenization

9.4.1. Big Data

9.4.1.1. Gazzang

9.4.1.2. Vormetric

9.4.2. Cloud/SAAS Encryption

9.4.2.1. Appliances

9.4.2.1.1. Office365

9.4.2.1.2. Ciphercloud

9.4.2.1.3. Afore Solutions

9.4.2.1.4. Perspecsys

9.4.2.2. Software

9.4.2.2.1. BoxCryptor

9.4.2.2.2. CloudMask

9.4.2.2.3. PrivateCore

9.4.2.2.4. Trend Micro

9.4.2.2.5. Viivo

9.4.2.2.6. Voltage Security

9.4.2.3. Software as a Service

9.4.2.3.1. Trend Micro

9.4.2.3.2. SooKasa

9.4.2.3.3. Gemalto

9.4.3. Cryptographic Providers

9.4.3.1. RSA

9.4.3.2. Quintessence

9.4.3.3. Microsoft

9.4.4. Data masking

9.4.4.1. Oracle

9.4.4.2. Dataguise

9.4.4.3. Informatica

9.4.4.4. IBM

9.4.4.5. Voltage Security

9.4.4.6. Green SQL

9.4.4.7. Mentis

9.4.4.8. Compuware

9.4.4.9. Axis

9.4.4.10. Privacy Analytics

9.4.4.11. Camouflage Software

9.4.4.12. Solix Technologies

9.4.4.13. Net 2000

9.4.5. Database

9.4.5.1. Gemalto

9.4.5.2. Dark Matter Labs

9.4.5.3. Vormetric

9.4.6. Email

9.4.6.1. ZixCorp

9.4.6.2. Encryptics

9.4.6.2.1. https://www.encryptics.com/default.aspx

9.4.7. Encrypted USB Storage

9.4.7.1. Apricorn

9.4.7.2. Datalocker

9.4.7.3. Integral Memory

9.4.7.4. IronKey

9.4.7.5. Kingston

9.4.7.6. Virbatim

9.4.8. File/Folder

9.4.8.1. Covertix

9.4.8.1.1. http://www.covertix.com/

9.4.8.2. IBM

9.4.8.2.1. Mainframe

9.4.8.3. SecureIslands

9.4.8.4. Sophos

9.4.8.4.1. SafeGuard Enterprise (Utimaco)

9.4.8.5. Symantec (PGP)

9.4.8.6. Vormetric

9.4.8.7. WinMagic

9.4.8.7.1. SecureDoc

9.4.9. Quantum Encryption

9.4.9.1. IDQ

9.4.9.2. Quintessence Labs

9.4.9.3. Whitewood Encryption

9.4.10. Tokenization

9.4.10.1. Protegrity

9.4.11. Whole Disk

9.4.11.1. Intel Security

9.4.11.2. Symantec (PGP)

9.4.11.3. CheckPoint Software

9.4.11.4. Encryption Management

9.4.11.4.1. Wave Systems

9.4.11.5. WinMagic

9.4.11.5.1. SecureDoc

9.4.11.6. Microsoft

9.4.11.6.1. Bitlocker

9.4.11.7. Sophos

9.4.11.7.1. SafeGuard Enterprise (Utimaco)

9.4.11.8. Trustwave

9.4.11.8.1. DataControl

9.4.11.9. Vormetric

9.5. File Analysis Software

9.5.1. Acaveo

9.5.2. Active Navigation

9.5.3. AvePoint

9.5.4. Beyond Recognition

9.5.5. Bloomberg

9.5.6. CommVault

9.5.7. Condrey

9.5.8. Covertix

9.5.9. DataGlobal

9.5.10. DataGravity

9.5.11. Equivio

9.5.12. HP

9.5.12.1. Control Point

9.5.13. HiSoftware

9.5.14. IBM

9.5.14.1. StoreIQ

9.5.15. Identifty Finder

9.5.16. Imperva

9.5.17. Index Engines

9.5.18. Kazoup

9.5.19. MailGuard

9.5.20. NTP Software

9.5.21. Novell

9.5.22. Nuix

9.5.23. Proofpoint

9.5.24. Stealthbits

9.5.25. Varonis

9.5.26. WatchDox

9.5.27. Whitebox Security

9.5.28. ZyLab

9.6. Hardware Security Modules (HSM)

9.6.1. Cloud HSM

9.6.1.1. Amazon

9.6.1.2. IBM

9.6.2. Hardware

9.6.2.1. FutureX

9.6.2.2. Gemalto

9.6.2.3. HPE

9.6.2.4. Safenet

9.6.2.5. Thales

9.7. Software Defined Storage Security

9.7.1. Dispersive Networks

9.7.1.1. https://dispersivetechnologies.com/

9.7.2. OceansBlue

9.7.2.1. http://www.oceansblue.net/index.html

9.8. eSignatures

9.8.1. Adobe eSign Services

9.8.2. Alphatrust

9.8.3. Docusign

9.8.4. Hellosign

9.8.5. Rightsignature

9.8.6. Sertifi

10. • Lack of end-to-end encryption

10.1. Web Application Firewalls (WAF) & Application Security

10.1.1. Web Threat Disruption Technology

10.1.1.1. Software

10.1.1.1.1. NuCaptcha

10.1.1.1.2. NuData

10.1.1.2. Appliances

10.1.1.2.1. Juniper

10.1.1.2.2. Shape Security

10.1.1.3. Open Source

10.1.1.3.1. Google Hack Honeypot

10.2. Web Application Security

10.2.1. Code Review Products

10.2.1.1. HP

10.2.1.2. IBM

10.2.2. Web Application Vulnerability Scanning Services

10.2.2.1. Cenzic

10.2.2.2. Controlscan

10.2.2.3. High-Tech Bridge

10.2.2.4. McAfee Secure

10.2.2.5. Qualys

10.2.2.6. Securi

10.2.2.7. Sitelock

10.2.2.8. Trustwave

10.2.2.9. WebSecurify

10.2.2.10. WhiteHat Security

10.2.3. Scanning Software

10.2.3.1. Open Source

10.2.3.1.1. Arachni Scanner

10.2.3.1.2. Subgraph

10.2.3.1.3. W3af

10.2.3.1.4. Wapiti

10.2.3.1.5. Watcher

10.2.3.2. Commercial

10.2.3.2.1. Accunetix

10.2.3.2.2. BeyondTrust

10.2.3.2.3. Cenzic

10.2.3.2.4. HP

10.2.3.2.5. MavitunaSecurity

10.2.3.2.6. NTObjectives

10.2.3.2.7. Nstalker

10.2.3.2.8. Portswigger

10.2.3.2.9. Syhunt

11. • Malware

11.1. Firewall Workflow,Modeling & Change Management

11.1.1. Checkpoint Software

11.1.2. Firemon

11.1.3. ManageEngine

11.1.4. Redseal Networks

11.1.5. Skybox

11.1.6. Veriflow

11.2. Tufin

11.3. Legal and regulatory information governance

11.4. Privacy

11.5. Regulations, Awareness and Training

11.5.1. Computer Based Training

11.5.1.1. Aujas

11.5.1.2. BeOne Development

11.5.1.3. Digital Defense

11.5.1.4. Fishnet Security

11.5.1.5. Inspired eLearning

11.5.1.6. Junglemap

11.5.1.7. KnowBe4

11.5.1.8. MediaPro

11.5.1.9. PhishMe

11.5.1.10. Phishline

11.5.1.11. Popcorn Training

11.5.1.12. Sans Institute

11.5.1.13. Scipp International

11.5.1.14. Secure Mentem

11.5.1.15. Security Innovation

11.5.1.16. Security Mentor

11.5.1.17. The Security Awareness Company

11.5.1.18. ThreatSim

11.5.1.19. Wombat Security Technologies

11.5.2. Educational, Awareness & News Outlets

11.5.2.1. Government Led

11.5.2.1.1. Information Sharing and Analysis Centers (ISACs)

11.5.2.2. Periodicals & Target Roles

11.5.2.2.1. Channel

11.5.2.2.2. CISO/CSO

11.5.2.2.3. Security Engineers/Analysts

11.5.3. Industry Standards/Groups

11.5.3.1. Standards

11.5.3.1.1. Technical

11.5.3.2. Industry Groups

11.5.3.2.1. Audit

11.5.3.2.2. General Security

11.5.3.2.3. Forensics

11.5.4. Regulations, Public Standards and Contractual Mandates

11.5.4.1. Global

11.5.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)

11.5.4.1.2. NIST

11.5.4.2. Country/Region Specific

11.5.4.2.1. China

11.5.4.2.2. Singapore

11.5.4.2.3. European Union

11.5.4.2.4. United States

11.6. Security Policy and Response Orchaestration Platforms

11.6.1. FireEye

11.6.2. Phantom

11.6.2.1. https://www.phantom.us/

11.6.3. Proofpoint

11.7. Security Program and Governance

11.7.1. Governance, Risk and Compliance

11.7.1.1. eGRC

11.7.1.1.1. Software as a Service

11.7.1.1.2. Software

11.7.1.2. Compliance Oriented Private Cloud Hosting (COPCH)

11.7.1.2.1. Note: This list is not an attestation of compliance

11.7.1.3. Operational Risk Analytics

11.7.1.3.1. Algosec

11.7.1.3.2. Cyber Observer

11.7.1.3.3. Cytegic

11.7.1.3.4. Firemon

11.7.1.3.5. IBM

11.7.1.3.6. Redseal Networks

11.7.1.3.7. RiskIO

11.7.1.3.8. Skybox

11.7.1.3.9. Software Development Lifecycle

11.7.1.3.10. Solarwinds

11.7.1.3.11. Tufin

11.7.1.4. Cloud & Container Compliance Assessment

11.7.1.4.1. Cavirin