Information Security Technologies & Markets - by Lawrence Pingree

Comienza Ya. Es Gratis
ó regístrate con tu dirección de correo electrónico
Rocket clouds
Information Security Technologies & Markets - by Lawrence Pingree por Mind Map: Information Security Technologies & Markets - by Lawrence Pingree

1. Web Application Firewalls

1.1. Virtualized Appliances

1.1.1. A10 Networks

1.1.2. AlertLogic

1.1.3. Amazon AWS

1.1.3.1. Riverbed

1.1.4. Barracuda Networks

1.1.5. BeeWare

1.1.6. DenyAll

1.1.7. Ergon Informatik AG

1.1.8. F5

1.1.9. Fortinet

1.1.10. Forum Systems

1.1.11. Imperva

1.1.12. PentaSecurity

1.1.13. Trustwave

1.1.14. Citrix

1.1.14.1. Netscaler VPX

1.1.14.1.1. https://www.citrix.com/products/netscaler-application-delivery-controller/platforms.html

1.2. Physical Appliances

1.2.1. A10 Networks

1.2.2. AdNovum

1.2.3. AlertLogic

1.2.4. Anchiva

1.2.5. Barracuda Networks

1.2.6. BeeWare

1.2.7. BugSec

1.2.8. Citrix

1.2.9. DBAPPSecurity

1.2.10. DPtech

1.2.11. Dell Sonicwall

1.2.12. DenyAll

1.2.13. Ergon Informatik

1.2.13.1. https://www.airlock.com/en/products/airlock-waf/

1.2.14. F5

1.2.15. Fortinet

1.2.16. Forum Systems

1.2.17. HP

1.2.18. Imperva

1.2.19. NSFocus

1.2.20. PentaSecurity

1.2.21. Positive Technologies

1.2.21.1. http://www.ptsecurity.com/products/af/

1.2.22. RadWare

1.2.23. Trustwave

1.2.24. WINS TECHNET LTD

1.2.24.1. http://www.wins21.co.kr/

1.3. Software

1.3.1. Dedicated Software

1.3.1.1. AdNovum

1.3.1.2. Applicure

1.3.1.2.1. http://www.applicure.com/Products/dotdefender

1.3.1.3. DenyAll

1.3.1.4. ERGON Informatik AG

1.3.1.4.1. AIRLOCK

1.3.1.5. Forum Systems

1.3.1.6. Positive Security

1.3.1.7. Riverbed

1.3.1.8. Trustifier

1.3.1.8.1. https://www.trustifier.com/f/#!overview

1.3.1.9. WebScurity

1.3.2. Open Source

1.3.2.1. IronBee

1.3.2.2. Mod Security

1.3.3. Web Server Modules

1.3.3.1. Microsoft IIS

1.3.3.1.1. AQTRONIX

1.3.3.1.2. Applicure

1.3.3.1.3. BeyondTrust

1.3.3.1.4. ThreatSentry

1.3.3.2. Apache

1.3.3.2.1. Applicure

1.4. Managed Services

1.4.1. Dell Secureworks

1.4.2. AT&T

1.4.3. Verizon Business

1.5. Software as a Service

1.5.1. Akamai

1.5.1.1. Kona

1.5.2. AlertLogic

1.5.3. Anquanbao

1.5.4. ArmorLogic

1.5.5. BinarySec

1.5.6. CloudFlare

1.5.7. DenyAll

1.5.7.1. http://www.denyall.com/products/web-application-firewall/

1.5.8. FireBlade

1.5.9. Imperva (Incapsula)

1.5.9.1. http://www.incapsula.com

1.5.10. Incapsula

1.5.11. PowerCDN

1.5.12. Qualys

1.5.13. Securi

1.5.14. Signal Sciences

1.5.15. Soha

1.5.15.1. http://soha.io/

1.5.16. ZenEdge

2. Cloud Security

2.1. Cloud/Virtualized Firewalls

2.1.1. Agent-Based

2.1.1.1. CloudPassage

2.1.1.2. Drawbridge Networks

2.1.1.3. Illumio

2.1.2. Cisco

2.1.3. Citrix Xen

2.1.3.1. Hillstone Networks

2.1.3.2. Huawei

2.1.3.3. Fortinet

2.1.3.4. Palo Alto Networks

2.1.4. Container-Based

2.1.4.1. ShieldX

2.1.5. Hyper-V

2.1.5.1. Fortinet

2.1.6. KVM

2.1.6.1. Hillstone Networks

2.1.6.2. Juniper Networks

2.1.6.3. Palo Alto Networks

2.1.7. Openstack

2.1.7.1. OpenFlow

2.1.7.1.1. Fortinet

2.1.7.2. Juniper Networks

2.1.8. Public Cloud

2.1.8.1. Virtual Appliances

2.1.8.1.1. Barracuda

2.1.8.1.2. Brocade

2.1.8.1.3. Catbird Networks

2.1.8.1.4. Check Point Software

2.1.8.1.5. Juniper Networks

2.1.8.1.6. Palo Alto Networks

2.1.8.1.7. PfSense

2.1.8.1.8. Sophos

2.1.8.1.9. vArmour

2.1.8.2. API-Driven

2.1.8.2.1. Dome9

2.1.8.2.2. Illumio

2.1.8.3. AWS

2.1.8.3.1. Check Point Software

2.1.8.3.2. Fortinet

2.1.8.3.3. Palo Alto Networks

2.1.8.4. Microsoft Azure

2.1.8.4.1. Check Point Software

2.1.8.4.2. Fortinet

2.1.8.5. Container-Based

2.1.9. VMware Environments

2.1.9.1. API Integration

2.1.9.1.1. Check Point Software

2.1.9.1.2. Fortinet

2.1.9.1.3. Palo Alto Networks

2.1.9.2. NSX

2.1.9.2.1. Fortinet

2.1.9.2.2. Check Point Software

2.1.9.3. VM Appliance

2.1.9.3.1. Barracuda

2.1.9.3.2. Brocade

2.1.9.3.3. Catbird Networks

2.1.9.3.4. Check Point Software

2.1.9.3.5. Fortinet

2.1.9.3.6. Hillstone Networks

2.1.9.3.7. Juniper Networks

2.1.9.3.8. Palo Alto Networks

2.1.9.3.9. PfSense

2.1.9.3.10. Sophos

2.1.9.3.11. vArmour

2.1.9.3.12. Huawei

3. Security Operations & Incident Response

3.1. Digital Forensics/eDiscovery

3.1.1. Content, File and Endpoint Forensics

3.1.1.1. eDiscovery

3.1.1.1.1. Clearwell

3.1.1.1.2. Kazeon

3.1.1.1.3. Guidance Software

3.1.1.1.4. Access Data

3.1.1.1.5. Autonomy

3.1.1.1.6. kCura

3.1.1.1.7. FTI Technology

3.1.1.1.8. Barracuda Networks

3.1.1.2. Mobile Devices

3.1.1.2.1. BlackBagTech

3.1.1.2.2. Cellebrite

3.1.1.2.3. Compelson Labs

3.1.1.2.4. Guidance Software

3.1.1.2.5. MSAB

3.1.1.2.6. NowSecure

3.1.1.2.7. Oxygen Forensics

3.1.1.2.8. Paraben Corporation

3.1.1.3. Endpoint Computing Systems

3.1.1.3.1. ADF Solutions

3.1.1.3.2. Access Data

3.1.1.3.3. ArxSys

3.1.1.3.4. BlackBag Technologies

3.1.1.3.5. CRU Inc

3.1.1.3.6. Cyfir

3.1.1.3.7. Guidance Software

3.1.1.3.8. Magnet Forensics

3.1.1.3.9. Nuix

3.1.1.3.10. OSForensics

3.1.1.3.11. Paraben Corporation

3.1.1.3.12. WindowsScope

3.1.1.3.13. X-Ways Forensics

3.1.1.4. Email Examination

3.1.1.4.1. Systools Software

3.1.1.4.2. Nuix

3.1.1.5. Forensic File & Data Analysis Tools

3.1.1.5.1. Cellebrite

3.1.1.5.2. Cyfir

3.1.1.5.3. Intella

3.1.1.5.4. Magnet Forensics

3.1.1.5.5. Nuix

3.1.1.5.6. Systools Software

3.1.1.6. Digital Forensics Case Management

3.1.1.6.1. D3 Security

3.1.1.6.2. Digital Investigation Manager

3.1.1.6.3. Guidance Software

3.1.1.6.4. Intaforensiscs

3.1.1.6.5. Sentinel Data

3.1.1.6.6. Sirentech

3.1.1.6.7. Wynyard Group

3.1.1.7. Memory Forensics

3.1.1.7.1. FireEye

3.1.1.7.2. Guidance Software

3.1.1.7.3. Volatility Framework

3.1.1.7.4. WindowsScope

3.1.2. eDiscovery Services

3.1.2.1. Robert Half

3.1.2.2. Advanced Discovery

3.1.3. eDiscovery Software

3.1.3.1. AccessData

3.1.3.2. Guidance Software

3.1.3.3. Nuix

3.1.3.4. Symantec

3.2. Fraud Prevention/Web Malware Monitoring

3.2.1. Fraud/Bot/Webscrape Prevention

3.2.1.1. Software

3.2.1.1.1. IBM (Formerly Trusteer)

3.2.1.1.2. Intellinx

3.2.1.1.3. RSA (EMC)

3.2.1.1.4. ShieldSquare

3.2.1.2. Appliances

3.2.1.2.1. Distil Networks

3.2.1.2.2. Imperva

3.2.1.2.3. RSA

3.2.1.2.4. Shape Security

3.2.1.2.5. White Ops

3.2.1.3. Software as a Service

3.2.1.3.1. Akamai

3.2.1.3.2. BioCatch

3.2.1.3.3. BotScout

3.2.1.3.4. Distil Networks

3.2.1.3.5. Guardian Analytics

3.2.1.3.6. Kount

3.2.1.3.7. MarkMonitor

3.2.1.3.8. NuData Security

3.2.1.3.9. Shape Security

3.2.1.3.10. ShieldSquare

3.2.1.3.11. ThreatMetrix

3.2.1.3.12. White Ops

3.2.1.3.13. X-Cart

3.2.1.3.14. iovation

3.2.1.4. Virtual Appliances

3.2.1.4.1. Distil Networks

3.2.1.4.2. Imperva

3.2.2. Website & Ad Malware Monitoring

3.2.2.1. Ad-Juster

3.2.2.2. Globalsign

3.2.2.2.1. Leverages Hackalert

3.2.2.3. Hackalert

3.2.2.4. Intel Security

3.2.2.4.1. Siteadvisor

3.2.2.5. QualysGuard

3.2.2.6. RiskIQ

3.2.2.7. Sucuri

3.2.2.8. The Media Trust

3.3. Incident Response Legal Services

3.3.1. Information Law Group

3.4. Security Information and Event Management (SIEM), Log Management & Analytics

3.4.1. Application Security Intelligence Engine

3.4.1.1. SAP

3.4.1.1.1. iT-Cube Systems

3.4.2. Log Management

3.4.2.1. EventTracker

3.4.2.2. IGLOO Security

3.4.2.3. Intel Security

3.4.2.3.1. McAfee Enterprise Log Manager

3.4.2.4. Kiwi Syslog Server

3.4.2.5. LogEntries

3.4.2.6. LogRythm

3.4.2.7. Logscape

3.4.2.8. Open Source

3.4.2.8.1. Elasticsearch (ELK Stack)

3.4.2.8.2. SEC (Simple Event Correlator)

3.4.2.8.3. OSSIM

3.4.2.8.4. Syslog-NG

3.4.2.8.5. Octopussy

3.4.2.9. Sawmill

3.4.2.10. Splunk

3.4.2.11. Sumo Logic

3.4.2.12. Tripwire

3.4.2.13. XpoLog

3.4.3. SIEM

3.4.3.1. AlienVault

3.4.3.1.1. OSSIM

3.4.3.2. CorreLog

3.4.3.3. EventTracker

3.4.3.4. Fortinet

3.4.3.5. HP

3.4.3.5.1. Arcsight

3.4.3.6. Hexis Cyber Solutions

3.4.3.6.1. Hawkeye AP

3.4.3.7. IBM

3.4.3.7.1. Q1Radar

3.4.3.8. IGLOO Security

3.4.3.9. Intel Security

3.4.3.9.1. NitroSecurity

3.4.3.10. LogPoint

3.4.3.10.1. http://www.logpoint.com/en/

3.4.3.11. LogRythm

3.4.3.12. Novell

3.4.3.12.1. Sentinel

3.4.3.13. RSA

3.4.3.13.1. Envision

3.4.3.14. Sensage

3.4.3.15. Solarwinds

3.4.3.16. Splunk

3.4.3.17. Sqrrl

3.4.3.18. Tibco

3.4.3.18.1. Loglogic

3.4.3.19. eIQnetworks

3.4.4. Security Analytics

3.4.4.1. Anomaly Analytics

3.4.4.1.1. Intel

3.4.4.1.2. Theta Ray

3.4.4.1.3. Prelert

3.4.4.1.4. eMite

3.4.4.2. User and Entity Behavior Analytics (UEBA)

3.4.4.2.1. Bay Dynamics

3.4.4.2.2. Darktrace

3.4.4.2.3. Detex Systems

3.4.4.2.4. Exabeam

3.4.4.2.5. Fortscale

3.4.4.2.6. Gurcul

3.4.4.2.7. HP

3.4.4.2.8. IBM

3.4.4.2.9. Interset

3.4.4.2.10. Microsoft

3.4.4.2.11. Niara

3.4.4.2.12. ObserveIT

3.4.4.2.13. Palerra

3.4.4.2.14. Platfora

3.4.4.2.15. Reveelium

3.4.4.2.16. Secureonix

3.4.4.2.17. Veriato

3.4.5. User and Entity Behavior Analytics (UEBA)

3.4.5.1. Bae Systems Applied Intelligence

3.4.5.2. Bay Dynamics

3.4.5.3. Caspida

3.4.5.4. Click Security

3.4.5.5. Exabeam

3.4.5.6. FICO

3.4.5.7. Fortscale

3.4.5.8. GuruCul

3.4.5.9. IBM

3.4.5.10. Intellinx

3.4.5.11. Lockheed Martin

3.4.5.12. Logtrust

3.4.5.13. Mobile System 7

3.4.5.14. Novetta Solutions

3.4.5.15. Oracle

3.4.5.16. Rapid7

3.4.5.17. Raytheon

3.4.5.18. SAS Institute

3.4.5.19. Secureonix

3.4.5.20. Splunk

3.5. Security Operations, Analytics and Reporting (SOAR)

3.5.1. Security Incident Response Platforms (SIRP)

3.5.1.1. Agiliance

3.5.1.2. DFLabs

3.5.1.3. Demisto

3.5.1.4. EMC(RSA)

3.5.1.5. Empow

3.5.1.6. Fido

3.5.1.7. Hexadite

3.5.1.8. ID Experts

3.5.1.9. Proofpoint

3.5.1.10. Resilient Systems

3.5.1.11. Siemplify

3.5.1.12. Syncurity

3.5.2. Threat and Vulnerability Management (TVM)

3.5.2.1. Acuity Risk Management

3.5.2.2. Agiliance

3.5.2.3. BeyondTrust

3.5.2.4. Core Security

3.5.2.5. Cybersponse

3.5.2.6. DFLabs

3.5.2.7. EMC(RSA)

3.5.2.8. Kenna Security

3.5.2.9. NopSec

3.5.2.10. RedSeal

3.5.2.11. RiskSense

3.5.2.12. Skybox Security

3.5.2.13. Swimlane

3.5.2.14. Siemplify

3.5.3. Security Operations Analytics

3.5.3.1. Ayehu

3.5.3.2. Cybersponse

3.5.3.3. DFLabs

3.5.3.4. EMC(RSA)

3.5.3.5. Hexadite

3.5.3.6. Proofpoint

3.5.3.7. Resilient Systems

3.5.3.8. Siemplify

3.5.3.9. Swimlane

3.5.4. Security Operations Automation Platforms (SOAPS)

3.5.4.1. Ayehu

3.5.4.2. Cyberbit

3.5.4.3. Cybersponse

3.5.4.4. DFLabs

3.5.4.5. Demisto

3.5.4.6. Fireye

3.5.4.7. Hexadite

3.5.4.8. IBM

3.5.4.9. Phantom Cyber

3.5.4.10. Swimlane

3.5.4.11. Syncurity

3.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

3.6.1. Crowdsourced Application Security Testing Platforms

3.6.1.1. Hyver

3.6.1.2. Applause

3.6.1.3. Bugcrowd

3.6.1.4. BugFinders

3.6.1.5. Cobalt

3.6.1.6. Crowdtesters

3.6.1.7. HackerOne

3.6.2. Managed Penetration Testing Services

3.6.2.1. Cenzic

3.6.2.2. WhiteHatSecurity

3.6.3. Penetration Testing Software

3.6.3.1. Core Security

3.6.3.2. Rapid7

3.6.3.2.1. Metasploit Pro

3.6.3.2.2. Metasploit Express

3.6.3.3. Trustwave

3.6.4. Vulnerability Assessment

3.6.4.1. Software as a Service

3.6.4.1.1. Vulnerability Management

3.6.4.1.2. Phish Testing/Management

3.6.4.2. Network-Based Vulnerability Assessment (On Premise)

3.6.4.2.1. Core Security

3.6.4.2.2. Digital Defense

3.6.4.2.3. Fortinet

3.6.4.2.4. Intel Security

3.6.4.2.5. NSAuditor

3.6.4.2.6. Ncircle

3.6.4.2.7. Netasq

3.6.4.2.8. Outpost24

3.6.4.2.9. Qualys

3.6.4.2.10. RandomStorm

3.6.4.2.11. Rapid 7

3.6.4.2.12. Trustwave

3.6.4.3. Agent-Based Vulnerability Assessment

3.6.4.3.1. BeyondTrust

3.6.4.3.2. Qualys

3.6.4.3.3. Secunia

3.6.4.3.4. Tenable

3.6.4.4. Mainframe Vulnerability Assessment

3.6.4.4.1. Key Resources Inc. (KRI)

3.6.5. Vulnerability Correlation

3.6.5.1. Application Vulnerability Correlation

3.6.5.1.1. Code DX

3.6.5.1.2. Denim Group

3.6.5.1.3. Kenna Security

3.6.5.1.4. NopSec

3.6.5.2. Network Vulnerability Correlation

3.6.5.2.1. Secure Decisions

3.6.5.2.2. RiskSense

3.6.5.2.3. NopSec

3.6.5.2.4. Kenna Security

3.6.5.2.5. Cybric

3.6.6. Vulnerability Research

3.6.6.1. CSC

3.6.6.2. HP

3.6.6.2.1. DV Labs

3.6.6.3. HotWAN

3.6.6.4. Intel Security

3.6.6.5. SecNiche Labs

3.6.6.6. Sourcefire VRT

3.6.6.7. Symantec

3.6.6.8. VRLSec

3.6.6.9. Vupen

4. Emerging Security Markets & Technologies

4.1. Application Security

4.1.1. Runtime Application Self-Protection (RASP)

4.1.1.1. Arxan

4.1.1.2. Checkmarx

4.1.1.3. Contrast Security

4.1.1.4. HP

4.1.1.5. Immunio

4.1.1.6. Metaforic

4.1.1.7. OneASP

4.1.1.8. Prevoty

4.1.1.9. SecuPi

4.1.1.10. Veracode

4.1.1.11. Virsec

4.1.1.12. Waratek

4.1.1.13. whiteCryption

4.1.2. Enterprise App-Layer Protection

4.1.2.1. SecuPI

4.1.3. AI-Based Applicaton Threat Defense

4.1.3.1. Barricade

4.1.3.2. Signal Sciences

4.2. Cloud Security

4.2.1. Cloud Protection Gateways

4.2.1.1. CipherCloud

4.2.1.2. Netskope

4.2.1.3. Perspecsys

4.2.1.4. Skyhigh Networks

4.2.1.5. Vaultive

4.2.2. Cloud Access Security Brokers

4.2.2.1. User Activity Monitoring

4.2.2.1.1. Adallom

4.2.2.1.2. Avanan

4.2.2.1.3. Bitglass

4.2.2.1.4. Elastica

4.2.2.1.5. Harvest.ai

4.2.2.1.6. Imperva

4.2.2.1.7. Netscope

4.2.2.1.8. SkyHigh Networks

4.2.2.2. Data Loss Prevention

4.2.2.2.1. Integrated DLP

4.2.2.2.2. Harvest.ai

4.2.2.3. Encryption

4.2.2.3.1. Adallom

4.2.2.3.2. Avanan

4.2.2.3.3. Managed Methods

4.2.2.3.4. SkyHigh Networks

4.2.2.4. Identity and Access Management

4.2.2.4.1. Centrify

4.2.2.4.2. Cloudiway

4.2.2.4.3. Okta

4.2.2.4.4. Ping

4.2.2.5. Access Control

4.2.2.5.1. Adallom

4.2.2.5.2. Avanan

4.2.2.5.3. Bitglass

4.2.2.5.4. Elastica

4.2.2.5.5. FireLayers

4.2.2.5.6. Managed Methods

4.2.2.5.7. Netskope

4.2.2.5.8. Skyfence

4.2.3. Cloud Application Discovery

4.2.3.1. Ciphercloud

4.2.3.2. Elastica

4.2.3.3. Netskope

4.2.3.4. Skyhigh

4.2.4. Cloud Compliance and Security Risk Platforms

4.2.4.1. AlertLogic

4.2.4.2. Cavirin

4.2.4.3. Cloudcheckr

4.2.4.4. Evident.io

4.2.4.5. Harvest AI

4.3. Cross Domain Solutions

4.3.1. Advenica

4.3.1.1. ZoneGuard

4.3.1.2. SecuriRam

4.3.2. General Dynamics

4.3.2.1. TacGuard

4.3.2.2. Crossing Guard

4.3.2.3. NanoXD

4.3.3. LockHeed Martin

4.3.3.1. Trusted Manager

4.3.4. Tresys

4.3.4.1. XD Air

4.3.4.2. XD Bridge

4.3.4.3. XD Guardian

4.3.5. Owl Computing

4.3.5.1. Owl OPDS-100

4.3.5.2. Owl OPDS-100D

4.3.5.3. OCDS-SFF

4.4. Data Security

4.4.1. Network-Based Data Cleansing

4.4.1.1. DataStealth

4.4.1.1.1. http://www.datexdatastealth.com/

4.4.2. Big Data Security

4.4.2.1. BlueTalon

4.5. Endpoint Security

4.5.1. Endpoint Detection and Response (EDR)

4.5.1.1. Agent-Based

4.5.1.1.1. Carbon Black

4.5.1.1.2. Cisco

4.5.1.1.3. Countertack

4.5.1.1.4. CrowdStrike

4.5.1.1.5. Cyberbit

4.5.1.1.6. Cyberreason

4.5.1.1.7. Cylance

4.5.1.1.8. Deep Instinct

4.5.1.1.9. Digital Guardian

4.5.1.1.10. Dtex Systems

4.5.1.1.11. Endgame Systems

4.5.1.1.12. Fidelis Cybersecurity

4.5.1.1.13. FireEye

4.5.1.1.14. Forescout

4.5.1.1.15. Guidance Software

4.5.1.1.16. Hexis Cyber Solutions

4.5.1.1.17. Invincea

4.5.1.1.18. LogRhythm

4.5.1.1.19. NexThink

4.5.1.1.20. Panda Security

4.5.1.1.21. RSA (EMC)

4.5.1.1.22. SecDo

4.5.1.1.23. SentinelOne

4.5.1.1.24. Tanium

4.5.1.1.25. Triumfant

4.5.1.1.26. Verint

4.5.1.1.27. Ziften

4.5.1.2. Agentless

4.5.1.2.1. BeyondTrust

4.5.1.2.2. Cynet

4.5.1.2.3. Fidelis

4.5.1.2.4. ForeScout

4.5.1.2.5. Hexadite

4.5.1.2.6. Hexis Cyber Solutions

4.5.1.2.7. InfoCyte

4.5.1.2.8. LightCyber

4.5.1.2.9. Outlier Security

4.5.1.2.10. Promisec

4.5.2. Remote Browser-Isolation (remote dom)

4.5.2.1. Amune

4.5.2.1.1. https://amune.org/security

4.5.2.2. Armor5

4.5.2.3. Authentic8

4.5.2.4. Dispel

4.5.2.5. FireGlass

4.5.2.6. Menlo Security

4.5.2.7. Aurionpro

4.5.2.7.1. Formerly Spikes Security

4.6. Identification, Authentication, Access Control & IAM

4.7. Internet of Things

4.7.1. Automotive

4.7.1.1. Security Innovation

4.7.2. Embedded Security

4.7.2.1. Security Innovation

4.8. Network & Infrastructure Security

4.8.1. Content Disarm and Reconstruction (CDR)

4.8.1.1. Check Point Software

4.8.1.1.1. Threat Extraction

4.8.1.2. Glasswall

4.8.1.2.1. http://www.glasswallsolutions.com/

4.8.1.3. Mimecast

4.8.1.3.1. https://www.mimecast.com/

4.8.1.4. OPSWAT

4.8.1.5. ODI

4.8.1.5.1. http://www.odi-x.com/

4.8.1.6. Re-Sec

4.8.1.6.1. http://www.re-sec.com/

4.8.1.7. Sasa-Software

4.8.1.7.1. http://www.sasa-software.com/

4.8.1.8. Solebit Labs

4.8.1.8.1. http://www.solebitlabs.com/

4.8.1.9. Symantec

4.8.1.9.1. DisArm

4.8.1.10. TreSys

4.8.1.10.1. http://www.tresys.com/

4.8.1.11. Votiro

4.8.1.11.1. http://www.votiro.com/

4.8.2. Malware Infection Analysis and Monitoring Services

4.8.2.1. Lastline

4.8.2.1.1. Guardia

4.8.2.2. Cisco

4.8.2.2.1. Formerly OpenDNS

4.8.2.3. Qualys

4.8.2.4. Seculert

4.8.3. Network Behavior and Analytics

4.8.3.1. Industrial Control Systems (ICS)

4.8.3.1.1. CyberX

4.8.4. Standalone Threat Intelligence Defense Solutions (STIDS)

4.8.4.1. Bandura

4.8.4.1.1. PoliWall

4.8.4.2. Centripetal Networks

4.8.4.3. Damballa

4.8.4.4. Fidelis Cybersecurity

4.8.4.5. FireEye

4.8.4.6. Group IB

4.8.4.6.1. http://tds.group-ib.com/

4.8.4.7. Ixia

4.8.4.7.1. http://www.ixiacom.com/info/ta

4.8.4.8. LookingGlass

4.8.4.8.1. https://lgscout.com/products/dns-defender/

4.8.4.9. Redsocks

4.8.4.9.1. Redsocks Threat Defender

4.8.4.10. ReversingLabs

4.8.4.11. Symantec

4.8.4.11.1. APT Network

4.8.5. Unauthorized Endpoint Connection Prevention (UECP)

4.8.5.1. Ensilo

4.8.5.2. Intel Security

4.8.6. Software Defined WAN (SDwan)

4.8.6.1. CloudGenix

4.8.6.2. Pertino

4.8.6.3. Velocloud

4.8.6.4. Viptela

4.8.6.5. Versa Networks

4.8.7. Virtual Container Security

4.8.7.1. Apcera

4.8.7.2. Aqua Security

4.8.7.3. Illumio

4.8.7.4. StackRox

4.8.7.5. TwistLock

4.8.8. Network Security as a Service

4.8.8.1. Cato Networks

4.8.8.2. MyDigitalShield

4.8.8.3. Zscaler

4.9. Risk, Compliance and Security Management

4.9.1. Security Ratings & Insurance

4.9.1.1. Security Ratings

4.9.1.1.1. Bitsight Technologies

4.9.1.1.2. Prevalent

4.9.1.1.3. SecurityScoreCard

4.9.1.1.4. QuadMetrics

4.9.1.2. Cyber Risk Insurance

4.9.1.2.1. Balsiger Insurance

4.9.1.2.2. HSB Group

4.9.1.2.3. Philadelphia Insurance Companies

4.9.1.2.4. Tennant Risk Services

4.9.1.2.5. The Hartford

4.9.1.2.6. Travelers

4.10. Security Operations, Incident Response

4.10.1. Intelligence/Data Feeds/Software & Services

4.10.1.1. Security Intelligence and Data Analysis Platforms

4.10.1.1.1. FireEye

4.10.1.2. Threat Intelligence Platforms (TIPs)

4.10.1.2.1. Anomali

4.10.1.2.2. BAE Systems

4.10.1.2.3. Buguroo

4.10.1.2.4. Codenomicon

4.10.1.2.5. Comilion

4.10.1.2.6. Confer

4.10.1.2.7. Eclectic IQ

4.10.1.2.8. Infoblox

4.10.1.2.9. Lockheed Martin

4.10.1.2.10. Lookingglass Cyber Solutions

4.10.1.2.11. Microsoft

4.10.1.2.12. Palentir

4.10.1.2.13. PierceMatrix

4.10.1.2.14. Service Now (Formerly Brightpoint)

4.10.1.2.15. Soltra

4.10.1.2.16. ThreatConnect

4.10.1.2.17. ThreatQuotient

4.10.1.2.18. TruStar

4.10.1.3. Threat Intelligence Services

4.10.1.3.1. Human Intelligence - HUMINT (Strategic)

4.10.1.3.2. Machine-Based (Tactical)

4.10.1.3.3. Vulnerabilities and Exploits

4.10.1.3.4. Data Loss Detection - External

4.10.1.4. Collaborative Threat Investigation Platforms

4.10.1.4.1. BAE System Detica

4.10.1.4.2. IKANow

4.10.1.4.3. Maltego

4.10.1.4.4. NC4

4.10.1.4.5. Palentir

4.10.2. Malware Analysis

4.10.2.1. Malware Analysis as a Service

4.10.2.1.1. Free Services

4.10.2.1.2. ReversingLabs

4.10.2.1.3. ThreatGrid

4.10.2.2. Sandbox Software

4.10.2.2.1. GFI

4.10.2.2.2. Joesecurity

4.10.2.2.3. Bluecoat

4.10.2.2.4. Payload Security

4.10.3. Threat Deception Technologies

4.10.3.1. Distributed Deception Platforms

4.10.3.1.1. Amgine Securus

4.10.3.1.2. Atomic Software Solutions

4.10.3.1.3. Attivo Networks

4.10.3.1.4. Cymmetria

4.10.3.1.5. GuardiCore

4.10.3.1.6. Illusive Networks

4.10.3.1.7. Javelin Networks

4.10.3.1.8. KeyFocus

4.10.3.1.9. SmokeScreen

4.10.3.1.10. Specter

4.10.3.1.11. TrapX

4.10.3.1.12. Vision Space Technologies

4.10.3.2. Network

4.10.3.2.1. ForeScout

4.10.3.2.2. Juniper Networks

4.10.3.2.3. Percipient Networks

4.10.3.2.4. Ridgeback Network Defense

4.10.3.2.5. Shadow Networks

4.10.3.3. Open Source

4.10.3.3.1. Honeypot

4.10.3.4. Web

4.10.3.4.1. Shape Security

4.10.3.4.2. Juniper Networks

4.10.3.4.3. CyberTrap

5. VARs, Distributors, Market Logistics & Supply Chain

5.1. Cloud Service Brokerages

5.1.1. Bitnami

5.1.2. Ensim

5.1.2.1. http://www.ensim.com/

5.1.3. Gravitant

5.1.4. Jamcracker

5.1.4.1. http://www.jamcracker.com/

5.1.5. StandingCloud

5.2. Distribution/Channel/VARs

5.2.1. VARs, Resellers

5.2.1.1. China

5.2.1.1.1. Mainland China

5.2.1.1.2. Hong Kong

5.2.1.1.3. Taiwan

5.2.1.2. Emerging Asia Pacific

5.2.1.2.1. India

5.2.1.2.2. Indonesia

5.2.1.2.3. Malasia

5.2.1.2.4. Thailand

5.2.1.2.5. Philippines

5.2.1.3. Eurasia

5.2.1.3.1. Russian Federation

5.2.1.3.2. Kazakhstan

5.2.1.3.3. Ukraine

5.2.1.4. Europe

5.2.1.4.1. Eastern Europe

5.2.1.4.2. Western Europe

5.2.1.5. Latin America

5.2.1.5.1. Brazil

5.2.1.5.2. Chile

5.2.1.5.3. Columbia

5.2.1.5.4. Costa Rica

5.2.1.5.5. Ecuador

5.2.1.5.6. Bolivia

5.2.1.5.7. Venezuela

5.2.1.5.8. Cuba

5.2.1.5.9. Argentina

5.2.1.5.10. Buenos Aires

5.2.1.5.11. Mexico

5.2.1.5.12. Peru

5.2.1.6. Mature Asia Pacific

5.2.1.6.1. Australia

5.2.1.6.2. Japan

5.2.1.6.3. Singapore

5.2.1.7. Middle East and North Africa

5.2.1.7.1. Turkey

5.2.1.7.2. Israel

5.2.1.7.3. Saudi Arabia

5.2.1.7.4. South Africa

5.2.1.7.5. India

5.2.1.7.6. United Arab Emirates

5.2.1.8. North America

5.2.1.8.1. United States

5.2.1.8.2. Canada

5.2.1.9. Sub-Sahara Africa

5.2.1.9.1. South Africa

5.2.1.10. WorldWide

5.2.1.10.1. AT&T

5.2.1.10.2. BT

5.2.1.10.3. Optiv

5.2.1.10.4. SHI

5.2.1.10.5. Secureworks

5.2.1.10.6. Verizon Business

5.2.2. Distributors

5.2.2.1. China

5.2.2.1.1. AVNet

5.2.2.1.2. B & Data Technology Co. Ltd.

5.2.2.1.3. Beijing Advazone Electronic Limited Comp

5.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.

5.2.2.1.5. Digital China Technology LTD.

5.2.2.1.6. Ecs China

5.2.2.1.7. Edvance Technology (China) Limited

5.2.2.1.8. Huagai

5.2.2.1.9. M.Tech (Shanghai) Co., Ltd.

5.2.2.1.10. Shanghai S-I Information Tech. Ltd

5.2.2.1.11. Sinogrid Information Technology Ltd.

5.2.2.1.12. Sky Faith International Enterprise

5.2.2.2. Emerging Asia Pacific

5.2.2.2.1. India

5.2.2.2.2. Indonesia

5.2.2.2.3. Thailand

5.2.2.3. Eurasia

5.2.2.3.1. Russian Federation

5.2.2.3.2. Kazakhstan

5.2.2.4. Mature Asia Pacific

5.2.2.4.1. Singapore

5.2.2.4.2. Japan

5.2.2.4.3. South Korea

5.2.2.4.4. Australia

5.2.2.5. Middle East and South Africa

5.2.2.5.1. United Arab Emirates

5.2.2.5.2. South Africa

5.2.2.6. North America

5.2.2.6.1. Canada

5.2.2.6.2. United States

5.2.2.7. Sub-Sahara Africa

5.2.2.7.1. South Africa

5.2.2.8. Western Europe

5.2.2.8.1. United Kingdom

5.2.2.8.2. Germany

5.2.2.9. Worldwide

5.2.2.9.1. AVNet

5.2.2.9.2. Ingram Micro

5.2.2.9.3. LifeBoat Distribution

5.2.2.9.4. Tech Data

5.2.2.9.5. Westcon

5.2.2.10. Latin America

5.2.2.10.1. Mexico

5.2.2.10.2. Brazil

5.2.3. Reseller Programs

5.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm

5.2.4. Logistics/Deal Registration

5.2.4.1. Connectwise

5.3. Government Cyberwarrior (Personnel Estimates)

5.3.1. United States

5.3.1.1. NSA

5.3.1.1.1. Cyberwarrior Stats

5.3.1.2. Department of Defense

5.3.1.2.1. US Airforce

5.3.1.2.2. US Navy

5.3.1.2.3. DISA

5.3.2. Iran

5.3.2.1. 4500

5.3.3. Israel

5.3.3.1. Unit 8200

5.3.3.1.1. 5000

5.3.4. North Korea

5.3.4.1. 1000

5.4. Hardware and Chip Security

5.4.1. AMD

5.4.1.1. TPM

5.4.2. Cavium

5.4.2.1. Multi-Core Processors

5.4.3. Flow Processors

5.4.3.1. Netronome

5.4.4. Intel

5.4.4.1. TPM

5.4.4.2. Data Execution Protection

5.4.5. Systems

5.4.5.1. Janus Technologies

5.4.5.1.1. http://www.janustech.com/janus_secure_computer.html

5.5. Investment

5.5.1. ETFs

5.5.1.1. PureFunds

5.5.1.1.1. SYM:HACK

5.5.2. Venture Capitalists

5.5.2.1. Trident Capital

5.5.2.2. Andreesen Horowitz

5.6. Managed Service Enablement

5.6.1. Chartec

5.6.2. Jamcracker

5.7. Marketing/PR/AR

5.7.1. Analyst & Public Relations

5.7.1.1. Focused Image

5.7.1.1.1. http://www.focusedimage.com/

5.7.1.2. KTCpr

5.7.1.2.1. http://www.kahn-travel.com/

5.7.1.3. Madison Alexander PR

5.7.1.3.1. http://www.madisonalexanderpr.com/

5.7.1.4. Marc Gendron PR

5.7.1.4.1. http://www.mgpr.info/

5.7.1.5. Schwartz Communications

5.7.1.5.1. http://www.schwartzmsl.com/

5.7.1.6. Spalding Communications

5.7.1.7. Text 100

5.7.1.7.1. http://www.text100.com/

5.7.2. Campaign/Engagement

5.7.2.1. WCG World

5.7.2.1.1. http://wcgworld.com/

5.7.3. Creative/Design Services

5.7.3.1. Duarte

5.7.3.1.1. http://www.duarte.com/

5.7.3.2. Gig Productions

5.7.3.2.1. http://www.gigpros.com/index.php

5.7.3.3. Initiate Marketing

5.7.3.3.1. http://www.getinitiated.ca/

5.7.3.4. MN8Studio

5.7.3.4.1. http://www.mn8studio.com/

5.7.3.5. Text 100

5.7.3.5.1. http://www.text100.com/

5.7.4. Web Site Design

5.7.4.1. Baytech Web Design

5.7.4.1.1. http://www.baytechwebdesign.com/

5.7.4.2. EU Design Studios

5.7.4.2.1. http://eudesignstudio.com/

5.7.4.3. Pro Logic Web Services

5.7.4.3.1. http://www.prologicsoft.com/

5.7.5. Market Destinations (Sites)

5.7.5.1. CRN

5.7.5.2. Hak5

5.7.5.3. MSPMentor

5.7.5.4. Madison Logic

5.7.5.5. SCmagazine

5.7.5.6. TheVarGuy

5.7.6. Marketing Videos

5.7.6.1. Epipheo

5.7.6.1.1. http://www.epipheo.com/

5.7.7. Marketing/Branding Agencies

5.7.7.1. Focused Image

5.7.7.1.1. http://www.focusedimage.com/branding/

5.7.7.2. Hill and Knowlton

5.7.7.2.1. http://www.hkstrategies.com/

5.7.7.3. MetaDesign

5.7.7.3.1. http://www.metadesign.com/san-francisco

5.7.7.4. Ogilvy & Mather

5.7.7.5. Tailfin Marketing Communications

5.7.7.6. Toolbox Studios

5.8. OEMs & System Integrators

5.8.1. Appliance Integrators

5.8.1.1. Accton

5.8.1.1.1. http://www.accton.com/

5.8.1.2. Advantech

5.8.1.2.1. http://www.advantech.com/

5.8.1.3. Celestica

5.8.1.3.1. http://www.celestica.com/

5.8.1.4. Dan-el Technologies Ltd.

5.8.1.4.1. http://www.danel.co.il/

5.8.1.5. Flextronics

5.8.1.5.1. http://www.flextronics.com/

5.8.1.6. Plexus

5.8.1.6.1. http://www.plexus.com/

5.8.2. Base Appliances

5.8.2.1. Advantech

5.8.2.2. Amax

5.8.2.3. Cas Well

5.8.2.4. Iron Systems

5.8.2.5. Lanner

5.8.2.6. Portwell

5.8.2.7. Tilera

5.8.3. Cards

5.8.3.1. Netronome

5.8.3.2. Tilera

5.8.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection

5.8.4. Encryption Acceleration

5.8.4.1. Intel

5.8.4.1.1. VPRO

5.8.4.2. Gemalto

5.8.4.2.1. Luna PCI

5.8.5. MSSP Appliances

5.8.5.1. 443 Networks

5.8.6. Threat Intelligence

5.8.6.1. Anti-Phishing

5.8.6.1.1. Cyren

5.8.6.2. DNS DGA Feeds

5.8.6.2.1. Farsight Security

5.8.6.3. File Reputation

5.8.6.3.1. Findthatfile

5.8.6.3.2. Webroot

5.8.6.4. Fraud

5.8.6.4.1. Internet Fraud Alert

5.8.6.4.2. National Cyber-Forensics and Training Alliance

5.8.6.5. IP Block Lists

5.8.6.5.1. WebRoot Brightcloud

5.8.6.5.2. Cyren

5.8.6.5.3. Malwarebytes

5.8.6.6. IP Reputation

5.8.6.6.1. Cyren

5.8.6.6.2. WebRoot Brightcloud

5.8.6.7. Indicators of Compromise

5.8.6.7.1. FireEye

5.8.6.7.2. Proofpoint

5.8.6.7.3. Wapack labs

5.8.6.7.4. CIRCL

5.8.6.8. Malicious URL

5.8.6.8.1. Cyren

5.8.6.8.2. Findthatfile

5.8.6.8.3. Webroot

5.8.6.9. Predictive

5.8.6.9.1. Seclytics

5.8.6.10. Vulnerability Research

5.8.6.10.1. Telus Security Labs

5.8.6.10.2. Vupen

5.8.7. Security Related Chips & CPUs

5.8.7.1. Broadcom

5.8.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection

5.8.7.2. Cavium

5.8.7.2.1. http://www.cavium.com

5.8.7.3. Lionic

5.8.7.3.1. http://www.lionic.com/

5.8.7.4. Netronome

5.8.7.4.1. http://www.netronome.com

5.8.7.5. Tilera

5.8.7.5.1. http://www.tilera.com/products/processors

5.8.7.6. Intel

5.8.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH

5.8.8. Software

5.8.8.1. Advanced Content Disarming and Reconstruction

5.8.8.1.1. OPSWAT

5.8.8.1.2. Votiro

5.8.8.2. Advanced Threat Protection - Virtual Execution Engines

5.8.8.2.1. ContentKeeper

5.8.8.2.2. Threat Track Security

5.8.8.3. Analytics/Graphing/Reporting

5.8.8.3.1. Logi Analytics

5.8.8.3.2. D3Plus

5.8.8.3.3. D3js

5.8.8.4. Anti-Spam/Phishing

5.8.8.4.1. APWG

5.8.8.4.2. BrandProtect

5.8.8.4.3. Cyren

5.8.8.4.4. Ikarus

5.8.8.4.5. Internet Fraud Alert

5.8.8.4.6. ReturnPath

5.8.8.4.7. WebRoot Brightcloud

5.8.8.5. AntiMalware

5.8.8.5.1. Antiy

5.8.8.5.2. Avira

5.8.8.5.3. Bitdefender

5.8.8.5.4. Cyren

5.8.8.5.5. ESet

5.8.8.5.6. Fortinet

5.8.8.5.7. GFI

5.8.8.5.8. Ikarus

5.8.8.5.9. Intel Security

5.8.8.5.10. Kaspersky

5.8.8.5.11. Norman

5.8.8.5.12. OPSWAT

5.8.8.5.13. QuickHeal

5.8.8.5.14. ThreatTrack

5.8.8.5.15. Zillya

5.8.8.5.16. ZonerAntiVirus

5.8.8.6. Content Extraction & Search

5.8.8.6.1. Oracle

5.8.8.7. Encryption

5.8.8.7.1. Transport

5.8.8.8. Endpoint Security and Management

5.8.8.8.1. OPSWAT

5.8.8.9. File Content Decoding/Analysis/Fingerprinting

5.8.8.9.1. HP Autonomy

5.8.8.9.2. Attivio

5.8.8.9.3. GTB Technologies

5.8.8.10. IT Service Management

5.8.8.10.1. ITRP

5.8.8.11. Image Recognition

5.8.8.11.1. Image Analyzer

5.8.8.12. Intrusion Detection/Prevention Signatures

5.8.8.12.1. Proofpoint

5.8.8.13. Network Stack

5.8.8.13.1. IPV4/6

5.8.8.13.2. Deep Packet Inspection

5.8.8.13.3. SDN

5.8.8.14. Optical Character Recognition

5.8.8.14.1. Abbyy

5.8.8.15. Social Network Content Control

5.8.8.15.1. NetboxBlue

5.8.8.16. URL Categorization

5.8.8.16.1. Cyren

5.8.8.16.2. Ikarus

5.8.8.16.3. Malware

5.8.8.16.4. Webroot Brightcloud

5.8.8.16.5. Zvelo

5.8.8.17. Voice Recognition

5.8.8.17.1. STC

5.8.8.17.2. Nuance

5.8.9. Managed Security OEMs

5.8.9.1. Digital Hands

5.9. Product Testing

5.9.1. Generic Product Testing, Certification and Accreditation

5.9.1.1. Certifications

5.9.1.1.1. North America

5.9.1.1.2. European Union

5.9.1.2. Testing

5.9.1.2.1. United Kingdom

5.9.1.2.2. North America

5.9.1.2.3. Singapore

5.9.1.3. Accreditation

5.9.1.3.1. DOD

5.9.1.3.2. NSA

5.9.2. Anti-Malware Testing

5.9.2.1. AMTSO

5.9.2.2. AV-Test

5.9.2.3. Av-Comparatives

5.9.2.4. MRG Effitas

5.9.2.5. VirusBTN

5.9.3. Sponsored Product Review/Testing

5.9.3.1. Delta Testing LTD

5.9.3.2. Dennis Labs

5.9.3.3. Miercom

5.9.3.4. NSS Labs

5.9.3.5. Network Testing Labs

5.9.3.6. Tolly Group

5.9.3.7. West Coast Labs

5.9.4. Antimalware Standards Bodies

5.9.4.1. AMTSO

5.9.4.1.1. http://www.amtso.org/

5.10. Cloud Service Brokerages

5.11. Security Conferences

5.11.1. North America

5.11.1.1. United States

5.11.1.1.1. RSA

5.11.1.1.2. Gartner

5.11.1.1.3. Cornerstones of Trust

5.11.1.1.4. Annual Security Conference

5.11.1.1.5. SecurityBsides

5.11.1.1.6. ShmooCon

5.11.2. Europe

5.11.2.1. United Kingdom

5.11.2.1.1. RSA Conference

5.11.2.1.2. Gartner

5.11.2.2. Russia

5.11.2.2.1. Infosecurity Russia

5.11.3. Emerging Asia Pacific

5.11.4. Mature Asia Pacific

5.11.4.1. Australia

5.11.4.1.1. Gartner

5.11.4.2. Singapore

5.11.4.2.1. RSA

5.12. Staffing/Recruiting/Executive Search

5.12.1. Millard Group

5.12.2. Lynch Bowie Group

5.12.3. Robert Half

5.13. User Interface Design

5.13.1. Consulting

5.13.1.1. User Interface

5.13.1.1.1. BlinkUX

5.13.1.1.2. Sasa Technologies

5.13.1.1.3. Dabapps

5.13.1.2. Customer Survey

5.13.1.2.1. Techvalidate

5.13.2. HTML5 Visualization Libraries

5.13.2.1. Data-Driven Documents

5.13.2.1.1. http://d3js.org/

5.13.2.2. AngularJS

5.13.2.2.1. https://angularjs.org/

5.13.3. Icons

5.13.3.1. IconExperience

5.13.3.1.1. https://www.iconexperience.com/

5.13.3.2. FlatIcon

5.13.3.2.1. http://www.flaticon.com/packs/general-ui

5.13.3.3. ModernUIicons

5.13.3.3.1. http://modernuiicons.com/

5.13.3.4. Ui8

5.13.3.4.1. https://ui8.net/categories/icons

6. Infrastructure Protection

6.1. Active Directory Defense

6.1.1. Aorato

6.1.1.1. http://www.aorato.com/

6.2. Cloud-Based Remote Access VPN

6.2.1. Check Point

6.2.1.1. Capsule Cloud

6.2.2. Pertino

6.2.3. Soha

6.3. DNS-based Threat Prevention/Detection

6.3.1. Standalone Appliances

6.3.1.1. Bluecat Networks

6.3.1.2. Efficient IP

6.3.1.3. Infoblox

6.3.2. Recursive DNS  Services

6.3.2.1. Bluecat Networks

6.3.2.2. Cisco

6.3.2.2.1. OpenDNS

6.3.2.3. Comodo

6.3.2.4. CrowdStrike

6.3.2.5. Infoblox

6.3.2.6. Neustar

6.3.2.7. Nominum

6.3.2.8. Symantec

6.3.2.9. ThreatStop

6.3.2.10. Verisign

6.3.3. Firewalls

6.3.3.1. Palo Alto Networks

6.4. Denial of Service Protection

6.4.1. Appliances

6.4.1.1. Arbor Networks

6.4.1.1.1. Prevail APS

6.4.1.2. Check Point Software

6.4.1.2.1. DDos Protector

6.4.1.3. Corero

6.4.1.4. Fortinet

6.4.1.5. Genie Networks

6.4.1.5.1. ATM Appliances

6.4.1.6. NSFOCUS

6.4.1.7. Radware

6.4.1.8. WINS TECHNET LTD

6.4.1.8.1. http://www.wins21.co.kr/

6.4.2. Security as a Service

6.4.2.1. HTTP/HTTPS Only

6.4.2.1.1. DOSArrest

6.4.2.1.2. Cloudflare

6.4.2.2. MultiProtocol/Network

6.4.2.2.1. Akamai

6.4.2.2.2. Black Lotus

6.4.2.2.3. Cloud Flare

6.4.2.2.4. F5

6.4.2.2.5. Incapsula

6.4.2.2.6. Link11

6.4.2.2.7. Neustar

6.4.2.2.8. NexusGuard

6.4.2.2.9. Verisign Inc

6.4.3. Clean Pipe Services

6.4.3.1. AT&T

6.4.3.2. Verizon

6.5. Fraud Prevention/Web Malware Monitoring

6.5.1. Fraud/Bot/Webscrape Prevention

6.5.1.1. Software

6.5.1.1.1. RSA (EMC)

6.5.1.1.2. IBM (Formerly Trusteer)

6.5.1.1.3. Intellinx

6.5.1.2. Appliances

6.5.1.2.1. RSA

6.5.1.2.2. Distil Networks

6.5.1.2.3. White Ops

6.5.1.3. Software as a Service

6.5.1.3.1. Akamai

6.5.1.3.2. BioCatch

6.5.1.3.3. Distil Networks

6.5.1.3.4. Guardian Analytics

6.5.1.3.5. Kount

6.5.1.3.6. MarkMonitor

6.5.1.3.7. ShieldSquare

6.5.1.3.8. ThreatMetrix

6.5.1.3.9. White Ops

6.5.1.3.10. X-Cart

6.5.1.3.11. iovation

6.5.1.4. Virtual Appliances

6.5.1.4.1. Distil Networks

6.5.2. Website & Ad Malware Monitoring

6.5.2.1. Ad-Juster

6.5.2.2. Globalsign

6.5.2.2.1. Leverages Hackalert

6.5.2.3. Hackalert

6.5.2.4. Intel Security

6.5.2.4.1. Siteadvisor

6.5.2.5. QualysGuard

6.5.2.6. RiskIQ

6.5.2.7. Sucuri

6.6. Network Access Control (NAC)

6.6.1. Host Based

6.6.1.1. Symantec

6.6.1.2. Intel Security

6.6.2. Network Based

6.6.2.1. Aruba Networks

6.6.2.2. Bradford Networks

6.6.2.3. Cisco

6.6.2.4. Forescout

6.6.2.5. Milton Security Group

6.6.2.6. Portnox

6.7. Network Anonymization & Consumer VPN Services

6.7.1. AnchorFree Hotspot Shield

6.7.2. Anonymize.net

6.7.3. CyberGhost

6.7.4. Dispel

6.7.5. GoldenFrog

6.7.6. HMA ProVPN

6.7.6.1. TorVPN

6.7.7. Okayfreedom

6.7.8. OpenVPN Shield Exchange

6.7.9. Private Wifi

6.7.10. Tor

6.7.11. luminati.io

6.8. Network Firewalls

6.8.1. Carrier Firewalls

6.8.2. Enterprise Firewalls

6.8.2.1. Multifunction Enterprise Firewalls

6.8.2.1.1. Bluedon

6.8.2.1.2. Check Point Software

6.8.2.1.3. Cisco

6.8.2.1.4. Fortinet

6.8.2.1.5. Huawei

6.8.2.1.6. Palo Alto Networks

6.8.2.1.7. Sonicwall

6.8.2.1.8. Websense (Formerly Intel Security)

6.8.2.2. Stateful Inspection - Traditional Firewalls

6.8.2.2.1. Cisco

6.8.2.2.2. Huawei

6.8.2.2.3. Check Point Software

6.8.3. Multi-Funtion SMB Firewalls

6.8.3.1. 443 Networks

6.8.3.2. Bluedon

6.8.3.3. Check Point Software

6.8.3.4. CheckPoint

6.8.3.5. Cisco

6.8.3.6. Clavister

6.8.3.7. Endian

6.8.3.8. Fortinet

6.8.3.9. Hillstone Networks

6.8.3.10. Meraki

6.8.3.11. PineApp

6.8.3.11.1. http://www.pineapp.com/

6.8.3.12. Sangfor

6.8.3.13. Sonicwall

6.8.3.14. Sophos

6.8.3.15. Trustwave

6.8.3.16. Untangle

6.8.3.17. WINS TechNet LTD

6.8.3.17.1. http://www.wins21.co.kr/

6.8.3.18. WatchGuard

6.8.4. Open Source & Community

6.8.4.1. IPTables

6.8.4.2. IPchains

6.8.4.3. PFSense

6.8.4.4. Untangle

6.8.5. Router Firewalls

6.9. Network Intrusion Detection/Prevention

6.9.1. Predictive Modeling

6.9.1.1. Cyactive

6.9.1.2. Trustpipe

6.9.2. IBM

6.9.3. Signature Based

6.9.3.1. AlienVault

6.9.3.1.1. Snort

6.9.3.2. Bricata

6.9.3.3. CheckPoint

6.9.3.4. Cisco

6.9.3.4.1. Sourcefire

6.9.3.5. Enterasys

6.9.3.6. Fortinet

6.9.3.7. HP

6.9.3.7.1. TippingPoint

6.9.3.8. IBM

6.9.3.9. Intel Security

6.9.3.10. Open Source

6.9.3.10.1. Snort

6.9.3.11. Symantec

6.9.3.11.1. APT Network

6.9.3.12. WINS TECHNET LTD

6.9.3.12.1. http://www.wins21.co.kr/

6.9.4. SCADA

6.9.4.1. Radiflow

6.10. Network Packet Brokers

6.10.1. Adara

6.10.2. Apcon

6.10.3. Arista Networks

6.10.4. Cubro

6.10.5. Gigamon

6.10.6. IXIA

6.10.7. Interface Masters Technologies

6.10.8. JDSU

6.10.9. NetOptics

6.10.10. NetScout

6.10.11. VSS Monitoring

6.11. Network Traffic Analysis, Network Behavior Analysis and Network Forensics

6.11.1. Flow Analysis/Metadata Extraction

6.11.1.1. Arbor Networks

6.11.1.2. IBM

6.11.1.3. Lancope

6.11.1.4. LogRythm

6.11.1.5. Intel Security NBA

6.11.2. Forensic Capture with User Surveillance & Security Threat Analytics

6.11.2.1. Access Data

6.11.2.2. BlueCoat

6.11.2.3. Cisco

6.11.2.3.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html

6.11.2.4. EMC

6.11.2.5. FireEye

6.11.2.6. Fluke Networks

6.11.2.7. IBM

6.11.2.8. IP Fabrics

6.11.2.9. JDSU (Network Instruments)

6.11.2.10. LightCyber

6.11.2.11. NetAgent

6.11.2.12. NetResec

6.11.2.13. NetScout

6.11.2.14. Niksun

6.11.2.15. Novetta Solutions

6.11.2.16. Nuix

6.11.2.17. Packetsled

6.11.2.18. Riverbed

6.11.2.19. SS8

6.11.2.19.1. http://www.ss8.com/

6.11.2.20. nPulse Technologies

6.11.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring

6.11.3.1. Emulex

6.11.3.2. Packetsled

6.11.3.3. WildPackets

6.11.4. Network Forensics Tools

6.11.4.1. Alert Logic

6.11.4.1.1. Formerly Click Security

6.11.4.2. Corvil

6.11.4.3. Cybersift

6.11.4.3.1. http://www.cybersift.net/sifter10app.html

6.11.4.4. Decision Group INC

6.11.4.4.1. http://www.edecision4u.com/index.html

6.11.4.5. EMC

6.11.4.6. FireEye

6.11.4.7. Fluke Networks

6.11.4.8. IP Fabrics

6.11.4.9. IPCopper

6.11.4.10. InveaTech

6.11.4.10.1. https://www.invea.com/en/products-and-services/li-system

6.11.4.11. KLOS

6.11.4.11.1. http://www.klos.com/applications/lawful-intercept/

6.11.4.12. NEXT Computing

6.11.4.12.1. http://www.nextcomputing.com/products/packet-capture-systems

6.11.4.13. NetReSec

6.11.4.14. Niksun

6.11.4.15. Radisys

6.11.4.15.1. http://www.radisys.com/products/network-appliance/

6.11.4.16. Utimaco

6.11.4.16.1. https://lims.utimaco.com/utimaco-lims/

6.11.4.17. WildPackets

6.11.5. Network Forensics Tools as a Service (NFTaaS)

6.11.5.1. CloudShark

6.11.6. Network Taps

6.11.6.1. Optical

6.11.6.1.1. Apcon

6.11.6.1.2. DataCom Systems

6.11.6.1.3. FibreDyne

6.11.6.1.4. Gigamon

6.11.6.1.5. Glimmerglass

6.11.6.1.6. M2Optics

6.11.6.1.7. Netoptics

6.11.6.1.8. Network Instruments

6.11.6.1.9. VSS Monitoring

6.11.6.1.10. nTAP

6.11.7. Network Traffic Analysis

6.11.7.1. Amgine Securus

6.11.7.2. Arbor Networks

6.11.7.3. Boeing

6.11.7.4. Cisco

6.11.7.4.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html

6.11.7.5. Corvil

6.11.7.6. Cyber adAPT

6.11.7.7. Damballa

6.11.7.8. Darktrace

6.11.7.9. ExtraHop Networks

6.11.7.10. Fidelis Cybersecurity

6.11.7.11. Lancope

6.11.7.12. Light Cyber

6.11.7.13. Novetta Solutions

6.11.7.14. PacketSled

6.11.7.15. Phirelight

6.11.7.16. Qihoo 360

6.11.7.16.1. SkyEye

6.11.7.17. RedJack

6.11.7.18. SlashNext

6.11.7.19. Splunk

6.11.7.20. Taasera

6.11.7.21. ThreatTrack

6.11.7.22. Trustport

6.11.7.22.1. Threat Intelligence

6.11.7.23. Vectra Networks

6.11.7.24. WireX

6.11.8. Raw Network Packet Capture

6.11.8.1. Apcon

6.11.8.1.1. Riverbed

6.11.8.1.2. Netfort

6.11.8.1.3. Wireshark

6.11.8.1.4. NTOP

6.11.8.2. Arbor Networks

6.11.8.3. Comworth

6.11.8.4. NTOP.org

6.11.8.5. Netfort

6.11.8.6. WireShark

6.12. Network-Based Advanced Threat Protection

6.12.1. Firewalls with Malware Sandbox Capabilities

6.12.1.1. Barracuda

6.12.1.2. Check Point Software

6.12.1.3. Cisco

6.12.1.4. Fortinet

6.12.1.5. Huawei

6.12.1.6. Juniper Networks

6.12.1.7. Palo Alto Networks

6.12.1.8. Sonicwall

6.12.1.9. Sophos

6.12.1.10. Watchguard

6.12.2. Appliance Based Malware Sandboxes

6.12.2.1. AMGINE SECURUS

6.12.2.1.1. http://www.amgine.co.kr/index.html

6.12.2.2. AhnLab

6.12.2.3. Bluecoat

6.12.2.4. Check Point Software

6.12.2.4.1. Emulator Blade

6.12.2.5. Cisco

6.12.2.5.1. ThreatGrid

6.12.2.6. ContentKeeper

6.12.2.7. Cyphort

6.12.2.8. Damballa

6.12.2.9. FireEye

6.12.2.10. Fortinet

6.12.2.10.1. FortiSandbox

6.12.2.11. General Dynamics

6.12.2.11.1. Fidelis Security Systems

6.12.2.12. Huawei

6.12.2.12.1. Firehunter

6.12.2.13. Intel Security

6.12.2.13.1. McAfee Advanced Threat Detection Appliance

6.12.2.14. LastLine

6.12.2.15. Palo Alto Networks

6.12.2.15.1. WildFire

6.12.2.16. Payload Security

6.12.2.17. Qihoo

6.12.2.17.1. SkyEye

6.12.2.18. Techguard Security

6.12.2.19. ThreatTrack

6.12.2.20. Trend Micro

6.12.2.20.1. Deep Discovery

6.12.2.21. VMRay

6.12.2.22. VeeDog

6.12.2.22.1. http://veedog.com/

6.12.2.23. WINS TECHNET LTD

6.12.2.23.1. http://www.wins21.co.kr/

6.12.3. Cloud-Based Malware Sandboxes

6.12.3.1. Cisco

6.12.3.1.1. ThreatGrid

6.12.3.2. Fortinet

6.12.3.3. Huawei

6.12.3.4. Joe Security

6.12.3.5. Lastline

6.12.3.6. Netwitness

6.12.3.6.1. Spectrum

6.12.3.7. Palo Alto Networks

6.12.3.7.1. WildFire

6.12.3.8. Qihoo

6.12.3.8.1. SkyEye

6.12.3.9. Sonicwall

6.13. SCADA/ICS

6.13.1. Monitoring

6.13.1.1. CRITIFENSE

6.13.1.2. Cyberbit

6.13.1.3. PFP Cybersecurity

6.13.2. SCADA Firewalls

6.13.2.1. BAE Systems

6.13.2.1.1. http://www.baesystems.com/en-us/product/scada-firewall

6.13.2.2. Bayshore Networks

6.13.2.2.1. https://www.bayshorenetworks.com/products/it-ot-gateway/

6.13.2.3. Check Point Software

6.13.2.3.1. https://www.checkpoint.com/products-solutions/critical-infrastructure/

6.13.2.4. Endian

6.13.2.4.1. http://www.endian.com/products/4i/

6.13.2.5. Fortinet

6.13.2.5.1. https://www.fortinet.com/solutions/industries/scada-industrial-control-systems.html

6.13.2.6. Tofino Security

6.13.2.6.1. https://www.tofinosecurity.com/products/Tofino-Firewall-LSM

6.14. SSL Inspection Appliances

6.14.1. A10 Networks

6.14.2. Bluecoat

6.14.3. ResolutionOne

6.14.4. VSS Monitoring

6.14.5. SourceFire

6.15. Software Defined Perimeter

6.15.1. Certes Networks

6.15.2. Cryptzone

6.15.3. Tempered Networks

6.15.4. Unisys Stealth

6.15.5. Vidder

6.15.6. Waverly Labs

6.16. Virtual Private Networking (VPN/SSL VPN)

6.16.1. IPSec VPN Concentrators

6.16.1.1. Certes Networks

6.16.1.2. CheckPoint Software

6.16.1.3. Cisco

6.16.1.4. Mako Networks

6.16.2. Layer 2 Encryption

6.16.2.1. Certes Networks

6.16.3. Layer 4 Encryption

6.16.3.1. Certes Networks

6.16.4. SSL VPN

6.16.4.1. AhnLab

6.16.4.2. Array Networks

6.16.4.3. Barracuda Networks

6.16.4.4. Check Point Software

6.16.4.5. Cisco

6.16.4.6. Citrix

6.16.4.7. F5 Networks

6.16.4.8. Fortinet

6.16.4.9. Hillstone Networks

6.16.4.10. Juniper

6.16.4.11. NetGear

6.16.4.12. Sonicwall

6.16.4.13. Stonesoft

6.16.4.14. WatchGuard

6.16.5. Multi-Path Dynamic VPN

6.16.5.1. Secret Double Octopus

6.16.5.2. Dispersive Networks

6.17. Web/Email Protection

6.17.1. Secure Email Gateways

6.17.1.1. Alt-N Technologies

6.17.1.2. Bluecoat

6.17.1.3. Fortinet

6.17.1.4. GWAVA

6.17.1.5. Intel Security

6.17.1.6. Proofpoint

6.17.1.7. Re-Sec

6.17.1.8. Sonicwall

6.17.1.9. Symantec

6.17.1.10. Trustwave

6.17.1.11. Voitiro

6.17.1.12. Websense

6.17.1.13. iBoss

6.17.2. Secure Web Gateways

6.17.2.1. Anchiva

6.17.2.2. Bluecoat

6.17.2.3. ContentKeeper

6.17.2.4. GWAVA

6.17.2.5. Intel Security

6.17.2.6. Re-Sec

6.17.2.7. Symantec

6.17.2.8. Trustwave

6.17.2.9. Websense

6.17.2.10. iBoss

6.17.3. Security as a Service

6.17.3.1. Web & Email SaaS

6.17.3.1.1. Appriver

6.17.3.1.2. Barracuda

6.17.3.1.3. Bitglass

6.17.3.1.4. Cisco

6.17.3.1.5. Intel Security

6.17.3.1.6. MailGuard

6.17.3.1.7. Spamina

6.17.3.1.8. Symantec

6.17.3.1.9. Total Defense

6.17.3.1.10. TotalDefense

6.17.3.1.11. Websense

6.17.3.1.12. Zscaler

6.17.3.2. Web Only

6.17.3.2.1. Bluecoat

6.17.3.2.2. ContentKeeper

6.17.3.2.3. OpenDNS

6.17.3.2.4. Websense

6.17.3.2.5. Zscaler

6.17.3.3. Secure Email Gateways

6.17.3.3.1. Agari

6.17.3.3.2. CloudMark

6.17.3.3.3. Proofpoint

6.17.3.3.4. Return Path

6.17.3.3.5. Spam Experts

6.17.3.3.6. Spam Titan

6.17.3.3.7. Spamina

6.17.3.3.8. ValiMail

6.17.3.4. Anti-Phishing

6.17.3.4.1. Amgine Securus

6.17.3.4.2. Area1 Security

6.17.3.4.3. CloudMark

6.17.3.4.4. Cymbel

6.17.3.4.5. Cyveillance

6.17.3.4.6. FireEye

6.17.3.4.7. MailGuard

6.17.3.4.8. MediaPro

6.17.3.4.9. Phishlabs

6.17.3.4.10. ThreatTrack

6.17.3.4.11. Votiro

6.17.3.4.12. Webroot

6.17.3.4.13. ZapFraud

7. Security Consulting & Implementation

7.1. Forensics

7.1.1. Forensics

7.1.1.1. Incident Response

7.1.1.1.1. Crowdstrike

7.1.1.1.2. Cylance

7.1.1.1.3. Deloitte

7.1.1.1.4. Fidelis Cybersecurity

7.1.1.1.5. FireEye

7.1.1.1.6. Guidance Software

7.1.1.1.7. Maryman & Associates

7.1.1.1.8. NTT Coms Security

7.1.1.1.9. Nettitude

7.1.1.1.10. Optiv

7.1.1.1.11. Presecure

7.1.1.1.12. Secureworks

7.1.1.1.13. Verizon

7.1.1.2. E-Discovery & Computer Forensics

7.1.1.3. Endpoint Forensics

7.1.1.4. Network Forensics

7.2. Governance, Advisory, Assessment

7.2.1. Architecture and Design

7.2.2. Business Continuity

7.2.3. Compliance Review

7.2.4. Data Security Program

7.2.5. Governance, Compliance and Policy Design

7.2.5.1. Compliance Mandates

7.2.5.1.1. PCI

7.2.5.1.2. ISO

7.2.5.1.3. HITECH

7.2.5.1.4. HIPAA

7.2.6. People Centric Strategy

7.2.7. Policy Design

7.2.8. Program Assessment

7.2.9. Risk Assessment

7.2.10. Risk Management

7.2.10.1. Booz Allen Hamilton

7.2.10.2. Optiv

7.2.10.3. Cloud Risks

7.2.10.4. On Premise Infrastructure

7.2.10.5. Business Risk

7.2.11. Security Program Development

7.2.11.1. Optiv

7.2.11.2. FOX-IT

7.2.12. Strategy

7.2.13. Governance

7.2.13.1. Optiv

7.2.13.2. FOX-IT

7.2.13.3. Sec Consult

7.3. Operations

7.3.1. Application Security

7.3.1.1. Web

7.3.1.1.1. AppSec Consulting

7.3.1.1.2. Denim Group

7.3.1.1.3. Security Innovation

7.3.1.1.4. WhiteHat Security

7.3.1.1.5. Citigal

7.3.1.1.6. IOActive

7.3.1.2. Mobile

7.3.1.2.1. AppSec Consulting

7.3.1.2.2. Denim Group

7.3.1.3. Software Security Lifecycle (SDLC)

7.3.1.3.1. AppSecConsulting

7.3.1.3.2. Security Innovation

7.3.1.4. Custom Code

7.3.1.4.1. AppSec Consulting

7.3.1.4.2. Security Innovation

7.3.2. Application Security Vulnerability Assessement

7.3.3. Configuration Assessment

7.3.4. Device Security

7.3.5. Fraud, Identification and Privacy

7.3.6. Incident Response

7.3.6.1. Blackthorn Technologies

7.3.6.2. Crowdstrike

7.3.6.3. Dell SecureWorks

7.3.6.4. Deloitte

7.3.6.5. EY

7.3.6.6. FOX-IT

7.3.6.7. FireEye

7.3.6.8. High Tech Bridge

7.3.6.9. Ingalls Information Security

7.3.6.10. Intel Security

7.3.6.10.1. Foundstone

7.3.6.11. K2 Intelligence

7.3.6.12. Lares Consulting

7.3.6.13. Maryman

7.3.6.14. NTT Coms Security

7.3.6.15. Nettitude

7.3.6.16. Optiv

7.3.6.17. PWC

7.3.6.18. Presecure

7.3.6.19. Sec Consult

7.3.6.20. Stroz Friedberg

7.3.6.21. TrustMatta

7.3.7. Penetration Testing

7.3.7.1. AppSec Consulting

7.3.7.2. Core Security

7.3.7.3. Element Digital Security

7.3.7.3.1. http://www.edigitalsecurity.com/

7.3.7.4. FOX-IT

7.3.7.5. High Tech Bridge

7.3.7.6. Ingalls Information Security

7.3.7.7. K2 Intelligence

7.3.7.8. Matasano Security

7.3.7.9. NCC Group

7.3.7.10. Penetration Lab

7.3.7.11. Rapid7

7.3.7.12. Secureworks

7.3.7.13. TrustMatta

7.3.7.14. TrustedSec

7.3.7.15. WhiteHat Security

7.3.8. Remote Access

7.3.9. Secure Code Review

7.3.10. Threat Intelligence

7.3.11. Vulnerability Scan

7.4. Providers by Region

7.4.1. Latin America

7.4.2. Mature Asia/Pacific

7.4.3. Middle East and North Africa

7.4.3.1. Saudi Arabia

7.4.3.1.1. GBM

7.4.3.1.2. PGI

7.4.4. North America

7.4.4.1. A-G

7.4.4.1.1. AppsecConsulting

7.4.4.1.2. CSC

7.4.4.1.3. Control Case

7.4.4.1.4. CrowdStrike

7.4.4.1.5. Dell Secureworks

7.4.4.1.6. Deloitte

7.4.4.1.7. Denim Group

7.4.4.1.8. Ernst & Young

7.4.4.1.9. FireEye

7.4.4.1.10. ForSythe Solutions

7.4.4.1.11. Grant Thornton

7.4.4.2. H-L

7.4.4.2.1. HP

7.4.4.2.2. IBM

7.4.4.2.3. IOActive

7.4.4.2.4. Ingalls Information Security

7.4.4.2.5. Intel Security (Foundstone)

7.4.4.2.6. K2 Intelligence

7.4.4.2.7. Leidos

7.4.4.3. M-S

7.4.4.3.1. NTT Com Security

7.4.4.3.2. Neohapsis

7.4.4.3.3. Optiv

7.4.4.3.4. PWC

7.4.4.3.5. Paladion Networks

7.4.4.3.6. Perimeter eSecurity

7.4.4.3.7. Protivity

7.4.4.3.8. SISA

7.4.4.3.9. Solutionary

7.4.4.3.10. Stroz Friedberg

7.4.4.3.11. Sungard

7.4.4.3.12. Sword and Shield

7.4.4.3.13. Symantec

7.4.4.3.14. Syntegrity Networks

7.4.4.3.15. Sysnet Global Solutions

7.4.4.4. T-Z

7.4.4.4.1. Tevora Business Solutions

7.4.4.4.2. Trustwave

7.4.4.4.3. Verizon

7.4.4.4.4. WhiteHat Security

7.4.4.4.5. Zensar Technologies

7.4.5. Greater China

7.4.6. South Africa

7.4.6.1. Cyanre

7.4.6.1.1. http://www.cyanre.co.za/

7.4.7. Eurasia

7.4.7.1. Russia

7.4.8. Emerging Asia/Pacific

7.4.9. Canada

7.4.9.1. Conexsys

7.4.10. Europe

7.4.10.1. Eastern Europe

7.4.10.1.1. Poland

7.4.10.2. Western Europe

7.4.10.2.1. Italy

7.4.10.2.2. United Kingdom

8. Managed Security Services

8.1. Direct Tech Providers Managed Security

8.1.1. Asia Pacific

8.1.1.1. Australia

8.1.1.2. China

8.1.1.2.1. NSFOCUS

8.1.1.3. Singapore

8.1.2. Europe

8.1.2.1. GoGrid

8.1.2.1.1. Compliance Reporting (PCI, HIPAA)

8.1.2.1.2. Host IDS

8.1.2.1.3. Log Management

8.1.2.1.4. SIEM

8.1.2.1.5. Vulnerability Assessment

8.1.3. Global Providers

8.1.4. Middle East and North Africa

8.1.4.1. Saudi Arabia

8.1.4.2. United Arab Emirates

8.1.5. North America

8.1.5.1. United States

8.1.5.1.1. NSFOCUS

8.1.5.1.2. Check Point Software

8.1.5.1.3. Network Box

8.1.5.1.4. GoGrid

8.1.5.1.5. FireEye

8.1.5.1.6. Rapid7

8.2. Indirect Providers

8.2.1. Emerging Asia Pacific

8.2.1.1. India

8.2.1.1.1. CSS Corp PVT

8.2.1.1.2. Happiest Minds

8.2.1.1.3. SunGard Availability Services

8.2.1.1.4. Ecomnets India PVT. LTD

8.2.2. Europe

8.2.2.1. BT Global Services

8.2.2.2. Dell SecureWorks

8.2.2.3. Germany

8.2.2.3.1. Link11 GMBH

8.2.2.3.2. IPsoft

8.2.2.4. HP

8.2.2.5. Happiest Minds

8.2.2.5.1. Advanced Malware Protection

8.2.2.5.2. Application Activity Monitoring

8.2.2.5.3. Compliance Reporting

8.2.2.5.4. Database Activity Monitoring

8.2.2.5.5. File Integrity Monitoring

8.2.2.5.6. Log Management

8.2.2.5.7. Managed DLP

8.2.2.5.8. Network Forensics

8.2.2.5.9. SIEM

8.2.2.5.10. Unified Threat Management

8.2.2.5.11. Vulnerability Assessment

8.2.2.6. Integralis

8.2.2.7. Navisite

8.2.2.7.1. Mobile Device Management

8.2.2.8. Open Systems

8.2.2.9. Open Systems

8.2.2.10. Orange Business Services

8.2.2.11. SecureData

8.2.2.11.1. Firewall

8.2.2.11.2. IDS/IPS

8.2.2.11.3. SIEM

8.2.2.11.4. Data Loss Prevention

8.2.2.11.5. Secure Web Gateway

8.2.2.11.6. Secure Email Gateway

8.2.2.11.7. VPN/Remote Access

8.2.2.12. SunGard Availability Services

8.2.2.12.1. Firewalls

8.2.2.12.2. IAM

8.2.2.12.3. Intrusion Prevention

8.2.2.12.4. SIEM

8.2.2.12.5. Unified Threat Management

8.2.2.12.6. VPN

8.2.2.12.7. Web Application Firewall

8.2.2.13. Symantec

8.2.2.14. T-Systems

8.2.2.15. Tata Communications

8.2.2.16. Telefonica

8.2.2.16.1. DDoS Protection Service

8.2.2.16.2. Email Encryption

8.2.2.16.3. Email Security Gateway

8.2.2.16.4. Firewall Management

8.2.2.16.5. IAM

8.2.2.16.6. Intrusion Detection

8.2.2.16.7. Intrusion Prevention

8.2.2.16.8. Log Management

8.2.2.16.9. SIEM

8.2.2.16.10. Vulnerability Assessment

8.2.2.16.11. Web Security Gateway

8.2.2.16.12. Anti-Fraud

8.2.2.17. Verizon Business

8.2.2.17.1. Anti-DDoS

8.2.2.17.2. Email Security

8.2.2.17.3. Endpoint Protection

8.2.2.17.4. Firewall Management

8.2.2.17.5. Intrusion Detection

8.2.2.17.6. Intrusion Prevention

8.2.2.17.7. SIEM

8.2.2.17.8. Vulnerability Assessment

8.2.2.17.9. Web Security

8.2.2.18. Wipro

8.2.2.18.1. Email Security Gateway

8.2.2.18.2. Endpoint Security

8.2.2.18.3. Firewall Management

8.2.2.18.4. Fraud Management/Anti-Money Laundering

8.2.2.18.5. GRC

8.2.2.18.6. IAM

8.2.2.18.7. Intrusion Detection

8.2.2.18.8. Intrusion Prevention

8.2.2.18.9. SIEM

8.2.2.18.10. User Access Management

8.2.2.18.11. Web Security Gateway

8.2.3. Global Providers

8.2.3.1. AT&T

8.2.3.1.1. DDos Protection

8.2.3.1.2. Email/Data Encryption Services

8.2.3.1.3. Endpoint Anti-Virus

8.2.3.1.4. Endpoint Patch Management

8.2.3.1.5. Endpoint Policy Compliance

8.2.3.1.6. Mobile Device Security

8.2.3.1.7. Secure Email Gateway

8.2.3.1.8. Security Device Management

8.2.3.1.9. Web Application Firewall

8.2.3.1.10. Web Gateway (URL & Malware Filtering)

8.2.3.2. BEW Global

8.2.3.2.1. Data Loss Prevention

8.2.3.2.2. Web Security Gateway

8.2.3.2.3. Email Security Gateway

8.2.3.2.4. SIEM

8.2.3.2.5. Vulnerability Assessment

8.2.3.3. BT

8.2.3.4. Dell Secureworks

8.2.3.4.1. Advanced Malware Protection

8.2.3.4.2. Email Security Gateway

8.2.3.4.3. Firewall Management

8.2.3.4.4. Host IPS

8.2.3.4.5. IDS/IPS

8.2.3.4.6. Log Management

8.2.3.4.7. Log Retention

8.2.3.4.8. SIEM

8.2.3.4.9. Threat Intelligence

8.2.3.4.10. Unified Threat Management

8.2.3.4.11. Vulnerability Assessment

8.2.3.4.12. Web Application Firewall

8.2.3.4.13. Web Application Vulnerability Assessment

8.2.3.5. Dimension Data

8.2.3.6. HP

8.2.3.6.1. Access Managment

8.2.3.6.2. Data Loss Prevention

8.2.3.6.3. Email Security Gateway

8.2.3.6.4. Endpoint Encryption

8.2.3.6.5. Endpoint Protection

8.2.3.6.6. Intrusion Detection

8.2.3.6.7. Intrusion Prevention

8.2.3.6.8. Managed Incident Response

8.2.3.6.9. Remote Access Management

8.2.3.6.10. SIEM

8.2.3.6.11. Vulnerability Assessment

8.2.3.6.12. Web Application Vulnerability Assessment

8.2.3.6.13. Web Security Gateway

8.2.3.7. IBM

8.2.3.7.1. Email Security Gateway

8.2.3.7.2. Endpoint Patch Management

8.2.3.7.3. Endpoint Policy Management

8.2.3.7.4. Endpoint Protection

8.2.3.7.5. Firewall Management

8.2.3.7.6. IAM

8.2.3.7.7. Intrusion Detection

8.2.3.7.8. Intrusion Prevention

8.2.3.7.9. Log Management

8.2.3.7.10. Mobile Device Security

8.2.3.7.11. SIEM

8.2.3.7.12. Unified Threat Management

8.2.3.7.13. Vulnerability Assessment

8.2.3.7.14. Web Security Gateway

8.2.3.7.15. Web Vulnerability Assessment

8.2.3.8. Proficio

8.2.3.8.1. Email Security

8.2.3.8.2. Firewall Management

8.2.3.8.3. Incident Response

8.2.3.8.4. Log Management

8.2.3.8.5. Privileged Account Management

8.2.3.8.6. Regulatory and Polcy Compliance

8.2.3.8.7. SIEM

8.2.3.8.8. SOC Services

8.2.3.8.9. Vulnerability Assessment

8.2.3.8.10. Web Security

8.2.3.9. Tech Mahindra

8.2.3.9.1. Email Security

8.2.3.9.2. Endpoint Protection

8.2.3.9.3. Firewall Management

8.2.3.9.4. Identity and Access Management

8.2.3.9.5. Intrusion Detection

8.2.3.9.6. Intrusion Prevention

8.2.3.9.7. Log Management

8.2.3.9.8. SIEM

8.2.3.9.9. SOC Services

8.2.3.9.10. Vulnerability Assessment

8.2.3.9.11. Web Security

8.2.3.10. Telstra

8.2.3.11. Verizon Business

8.2.3.11.1. Anti-DDoS

8.2.3.11.2. Email Security

8.2.3.11.3. Endpoint Protection

8.2.3.11.4. Firewall Management

8.2.3.11.5. Intrusion Detection

8.2.3.11.6. Intrusion Prevention

8.2.3.11.7. SIEM

8.2.3.11.8. Vulnerability Assessment

8.2.3.11.9. Web Security

8.2.4. Greater China

8.2.4.1. Hong Kong

8.2.4.1.1. Network Box

8.2.4.1.2. Netswitch

8.2.4.2. BEW Global

8.2.4.2.1. Data Loss Prevention

8.2.4.2.2. Web Security Gateway

8.2.4.2.3. Email Security Gateway

8.2.4.2.4. SIEM

8.2.4.2.5. Vulnerability Assessment

8.2.4.3. Beijing

8.2.4.3.1. Netswitch

8.2.4.4. Shanghai

8.2.4.4.1. Shanghai Data Solution Co., Ltd

8.2.5. Latin America

8.2.5.1. Brazil

8.2.5.1.1. Arcon

8.2.5.1.2. Netcentrics

8.2.5.1.3. RealProtect

8.2.5.1.4. UOL Diveo

8.2.6. Mature Asia Pacific

8.2.6.1. Australia

8.2.6.1.1. Tesserent

8.2.6.1.2. Verizon

8.2.6.2. Singapore

8.2.6.2.1. Quann

8.2.6.2.2. NTT Singapore

8.2.6.2.3. Happiest Minds

8.2.6.2.4. Singtel

8.2.6.2.5. NCS Group

8.2.7. Middle East and North Africa

8.2.7.1. Saudi Arabia

8.2.7.2. United Arab Emirates

8.2.7.2.1. Du Telecom

8.2.7.2.2. Tata Communications

8.2.7.2.3. Dell Secureworks

8.2.7.2.4. Dimension Data

8.2.8. North America

8.2.8.1. Canada

8.2.8.1.1. Above Security

8.2.8.1.2. Bell Canada

8.2.8.1.3. EWA

8.2.8.1.4. Happiest Minds

8.2.8.1.5. Netpulse

8.2.8.1.6. OneStone (Formerly Seccuris)

8.2.8.1.7. SecureData

8.2.8.1.8. SentryMetrics

8.2.8.1.9. SunGard Availability Services

8.2.8.1.10. Virtual Guardian

8.2.8.2. United States

8.2.8.2.1. AT&T

8.2.8.2.2. Above Security

8.2.8.2.3. Alert Logic

8.2.8.2.4. Allstream

8.2.8.2.5. CGI

8.2.8.2.6. CSC

8.2.8.2.7. CSS Corp

8.2.8.2.8. CentraComm

8.2.8.2.9. CenturyLink- Savvis

8.2.8.2.10. Clone Systems

8.2.8.2.11. Compucom Systems

8.2.8.2.12. Cosentry

8.2.8.2.13. Dell Secureworks

8.2.8.2.14. Earthlink

8.2.8.2.15. Esentire

8.2.8.2.16. HCL Technologies

8.2.8.2.17. HP

8.2.8.2.18. Happiest Minds

8.2.8.2.19. IBM

8.2.8.2.20. Intelisecure

8.2.8.2.21. Leidos

8.2.8.2.22. LunarLine

8.2.8.2.23. Masergy Communications

8.2.8.2.24. Megapath

8.2.8.2.25. Morphick

8.2.8.2.26. My Digital Shield

8.2.8.2.27. NCA - Network Computing Architects

8.2.8.2.28. Navisite

8.2.8.2.29. Netfortris

8.2.8.2.30. Netswitch

8.2.8.2.31. Nuspire Networks

8.2.8.2.32. Rook Security

8.2.8.2.33. Secure Designs

8.2.8.2.34. SilverSky (Formerly Stillsecure/Perimeter esecurity)

8.2.8.2.35. Solutionary

8.2.8.2.36. SunGard Availability Services

8.2.8.2.37. Sword and Shield

8.2.8.2.38. Symantec

8.2.8.2.39. Symantec

8.2.8.2.40. Syntegrity Networks

8.2.8.2.41. Tesserent

8.2.8.2.42. Trustwave

8.2.8.2.43. Verizon Business

8.2.8.2.44. Wipro

8.2.9. Sub-Sahara Africa

8.2.9.1. AccessKenya

8.2.9.1.1. Firewall

8.2.9.1.2. Endpoint Protection

8.2.9.1.3. Secure Web Gateway

9. Endpoint Security

9.1. Anti-Malware

9.1.1. Eastern Europe

9.1.1.1. Czech Republic

9.1.1.1.1. Avast

9.1.1.1.2. TrustPort

9.1.1.2. Denmark

9.1.1.2.1. BullGuard

9.1.1.3. Netherlands

9.1.1.3.1. AVG

9.1.1.4. Romania

9.1.1.4.1. Bitdefender

9.1.1.5. Slovakia

9.1.1.5.1. ESET

9.1.2. Emerging Asia/Pacific

9.1.2.1. India

9.1.2.1.1. eScan

9.1.2.1.2. K7 Computing

9.1.3. Latin America

9.1.3.1. Spain

9.1.3.1.1. Optenet

9.1.4. Mature Asia/Pacific

9.1.4.1. China

9.1.4.1.1. Qihoo

9.1.4.1.2. Rising International Software

9.1.4.2. South Korean

9.1.4.2.1. AhnLab

9.1.4.2.2. BKAV

9.1.4.2.3. ESTsoft

9.1.5. Middle East and Africa

9.1.5.1. Israel

9.1.5.1.1. Check Point Software

9.1.6. North America

9.1.6.1. Cyren

9.1.6.2. Fortinet

9.1.6.3. Intel Security

9.1.6.4. MalwareBytes

9.1.6.5. McAfee

9.1.6.6. Microsoft

9.1.6.7. PC Pitstop

9.1.6.8. Reason Core Security

9.1.6.9. Roboscan

9.1.6.10. Symantec

9.1.6.11. ThreatTrack

9.1.6.12. Total Defense

9.1.6.13. Trend Micro

9.1.7. Russia

9.1.7.1. Kaspersky

9.1.8. Western Europe

9.1.8.1. Austria

9.1.8.1.1. Ikarus Security

9.1.8.2. Finland

9.1.8.2.1. F-Secure

9.1.8.3. Germany

9.1.8.3.1. Avira

9.1.8.3.2. G-Data

9.1.8.3.3. Kromtech

9.1.8.4. Norway

9.1.8.4.1. Norman

9.1.8.5. United Kingdom

9.1.8.5.1. Sophos

9.1.8.6. Poland

9.1.8.6.1. Arcabit

9.2. Application Isolation

9.2.1. Blue Ridge Networks

9.2.1.1. http://www.blueridge.com/index.php/products/appguard/consumer

9.2.2. Bromium

9.2.3. Bufferzone

9.2.4. Invincea

9.2.4.1. SandBoxie

9.2.5. VMware

9.3. Endpoint Sandboxes and Virtualized Containers

9.3.1. Endpoint Sandboxes

9.3.1.1. Panda

9.3.1.1.1. www.panda.com

9.3.1.2. Sandboxie

9.3.1.2.1. http://www.sandboxie.com/

9.3.1.3. Bitdefender

9.3.1.3.1. www.bitdefender.com

9.3.2. Type-0 Hypervisors

9.3.2.1. Lynxworks

9.3.2.1.1. http://www.lynuxworks.com/

9.3.2.2. Zirtu

9.3.3. Process Isolation/Virtualization

9.3.3.1. Avectco

9.3.3.2. Bromium

9.3.3.3. Invincea

9.4. Endpoint Intrusion Prevention

9.4.1. Arkoon

9.4.1.1. StormShield

9.4.2. BeyondTrust

9.4.3. IBM

9.4.4. Landesk

9.4.5. McAfee

9.4.6. Safensoft

9.4.7. Symantec

9.5. Enterprise Mobility Mangement Suites

9.5.1. Absolute Software

9.5.2. AMware

9.5.2.1. Airwatch

9.5.3. Blackberry

9.5.4. Citrix

9.5.5. Globo

9.5.6. Good Technologies

9.5.7. IBM

9.5.8. Landesk

9.5.9. MobileIron

9.5.10. Mojave

9.5.10.1. https://www.mojave.net/

9.5.11. SAP

9.5.12. Sophos

9.5.13. Soti

9.5.14. Symantec

9.5.15. Tangoe

9.6. Application Control

9.6.1. AppSense

9.6.2. Avecto

9.6.3. Bit9

9.6.4. Landesk

9.6.5. Lumension

9.6.6. McAfee

9.6.7. Sophos

9.6.8. Symantec

9.6.9. Trend Micro

9.7. Exploit Technique Prevention Software

9.7.1. CyActive

9.7.2. CyBellum

9.7.3. Malwarebytes Anti-Exploit

9.7.4. Microsoft

9.7.4.1. Microsoft EMET - FREE

9.7.5. Morphisec

9.7.6. Palo Alto Networks

9.7.6.1. Endpoint

9.7.7. Sophos

9.7.7.1. Intercept X

9.7.8. Trend Micro

9.7.9. ViRobot APT Shield

9.8. File Integrity Monitoring

9.8.1. Open Source

9.8.1.1. 1. AIDE

9.8.1.2. 2. Trend Micro

9.8.1.2.1. 1. OSSEC

9.8.1.3. 3. Samhain

9.8.1.4. 4. Osiris

9.8.1.5. 5. Integrit

9.8.1.6. 6. Tripwire

9.8.2. Commercial

9.8.2.1. Imperva

9.8.2.2. Intel Security

9.8.2.3. Tripwire

9.9. Malware Analysis

9.9.1. Botnets

9.9.1.1. spyeyetracker.abuse.ch

9.9.2. Internet Identity

9.9.3. Malware Patrol

9.9.4. SpamHaus

9.9.5. Team Cymru

9.9.6. ThreatGrid

9.9.7. VirusTotal

9.9.8. zeustracker.abuse.ch

9.9.9. JoeSecurity

9.9.10. Shadowserver

9.10. Mobile Device Management

9.10.1. Absolute Software

9.10.2. Beachhead Security

9.10.3. Blackberry

9.10.4. Citrix

9.10.5. Globo

9.10.6. Good Technologies

9.10.7. IBM

9.10.8. Landesk

9.10.9. MobileIron

9.10.10. Mojave

9.10.10.1. https://www.mojave.net/

9.10.11. SAP

9.10.12. Sophos

9.10.13. Soti

9.10.14. Symantec

9.10.15. Tangoe

9.10.16. VMware

9.10.16.1. Airwatch

9.11. Policy Assessment and System Configuration Management

9.11.1. BMC

9.11.1.1. BMC Server Automation

9.11.2. Check Point Software

9.11.2.1. Endpoint Policy Management

9.11.3. IBM

9.11.3.1. IBM Endpoint Manager

9.11.4. Intel Security

9.11.4.1. Policy Auditor

9.11.5. RedHat

9.11.5.1. OpenSCAP

9.11.6. Saint

9.11.6.1. Saint Security

9.11.7. Tripwire

9.11.7.1. Tripwire Enterprise

10. Data & Collaboration Security

10.1. Data Governance and Classification

10.1.1. Expert Source

10.1.1.1. http://www.expertsource.in/index.php

10.1.2. HP

10.1.3. IBM

10.1.4. Informatica

10.1.5. Nuix

10.1.6. Somansa

10.1.7. Titus

10.1.8. boldonjames

10.2. Data Loss Prevention (DLP)

10.2.1. Endpoint

10.2.1.1. Data Classification and Tracking

10.2.1.1.1. Banyan Solutions

10.2.1.1.2. BoldonJames

10.2.1.1.3. Digital Guardian

10.2.1.1.4. HP

10.2.1.1.5. IBM

10.2.1.1.6. Identity Finder

10.2.1.1.7. Mach1 Development

10.2.1.1.8. Microsoft (Formerly Secure Islands)

10.2.1.1.9. MinerEye

10.2.1.1.10. Nuix

10.2.1.1.11. Smartlogic

10.2.1.1.12. Titus

10.2.1.1.13. Varonis

10.2.1.1.14. CoSoSys

10.2.1.2. Mobile

10.2.1.2.1. Symantec

10.2.1.2.2. Websense

10.2.1.2.3. Microsoft (Secure Islands)

10.2.1.3. Windows

10.2.1.3.1. Absolute Software

10.2.1.3.2. CA Technologies

10.2.1.3.3. Digital Guardian

10.2.1.3.4. GTB Technologies

10.2.1.3.5. Infowatch

10.2.1.3.6. Intel Security

10.2.1.3.7. RSA

10.2.1.3.8. Microsoft (Secure Islands)

10.2.1.3.9. Somansa

10.2.1.3.10. Symantec

10.2.1.3.11. Trustwave

10.2.1.3.12. Watchful Software

10.2.1.3.13. Raytheon-Websense

10.2.1.3.14. Zecurion

10.2.2. Network

10.2.2.1. Digital Guardian

10.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)

10.2.2.3. Symantec

10.2.2.4. InfoWatch

10.2.3. Secure Email Gateway

10.2.3.1. Cisco

10.2.3.2. Symantec

10.2.3.3. Intel Security

10.2.3.4. Somansa

10.2.4. Secure Web Gateway

10.2.4.1. Intel Security

10.2.4.2. Symantec

10.2.4.3. Somansa

10.2.5. Security as a Service

10.2.5.1. Consumer

10.2.5.1.1. Reputation.com

10.2.5.1.2. Social Fortress

10.2.5.1.3. PwnedList

10.2.5.2. Enterprise

10.2.5.2.1. Social Fortress

10.2.5.2.2. Google Apps

10.2.5.2.3. ZixCorp

10.3. Database Security

10.3.1. Database Audit and Protection (DAP)

10.3.1.1. Application Security, Inc

10.3.1.2. BeyondTrust

10.3.1.3. Big Data Platform DAP

10.3.1.3.1. BlueTalon

10.3.1.3.2. Cloudera

10.3.1.3.3. Hortonworks

10.3.1.3.4. IBM

10.3.1.3.5. Imperva

10.3.1.4. DataSunrise

10.3.1.5. Fortinet

10.3.1.6. GreenSQL

10.3.1.7. IBM

10.3.1.8. IRI

10.3.1.8.1. Oracle

10.3.1.8.2. SQL Server

10.3.1.9. Imperva

10.3.1.10. Intel Security

10.3.1.11. Mentis Software

10.3.1.12. Oracle Corp

10.3.1.13. PentaSecurity

10.3.1.14. Warevalley

10.3.2. Database Activity Monitoring

10.3.2.1. DB Networks

10.3.2.2. Somansa

10.4. Encryption/Tokenization

10.4.1. Big Data

10.4.1.1. Gazzang

10.4.1.2. Vormetric

10.4.2. Cloud/SAAS Encryption

10.4.2.1. Appliances

10.4.2.1.1. Office365

10.4.2.1.2. Ciphercloud

10.4.2.1.3. Afore Solutions

10.4.2.1.4. Perspecsys

10.4.2.2. Software

10.4.2.2.1. BoxCryptor

10.4.2.2.2. CloudMask

10.4.2.2.3. PrivateCore

10.4.2.2.4. Trend Micro

10.4.2.2.5. Viivo

10.4.2.2.6. Voltage Security

10.4.2.3. Software as a Service

10.4.2.3.1. Trend Micro

10.4.2.3.2. SooKasa

10.4.2.3.3. Gemalto

10.4.3. Cryptographic Providers

10.4.3.1. RSA

10.4.3.2. Quintessence

10.4.3.3. Microsoft

10.4.4. Data masking

10.4.4.1. Oracle

10.4.4.2. Dataguise

10.4.4.3. Informatica

10.4.4.4. IBM

10.4.4.5. Voltage Security

10.4.4.6. Green SQL

10.4.4.7. Mentis

10.4.4.8. Compuware

10.4.4.9. Axis

10.4.4.10. Privacy Analytics

10.4.4.11. Camouflage Software

10.4.4.12. Solix Technologies

10.4.4.13. Net 2000

10.4.5. Database

10.4.5.1. Gemalto

10.4.5.2. Dark Matter Labs

10.4.5.3. Vormetric

10.4.6. Email

10.4.6.1. ZixCorp

10.4.6.2. Encryptics

10.4.6.2.1. https://www.encryptics.com/default.aspx

10.4.7. Encrypted USB Storage

10.4.7.1. Apricorn

10.4.7.2. Datalocker

10.4.7.3. Integral Memory

10.4.7.4. IronKey

10.4.7.5. Kingston

10.4.7.6. Virbatim

10.4.8. File/Folder

10.4.8.1. Covertix

10.4.8.1.1. http://www.covertix.com/

10.4.8.2. IBM

10.4.8.2.1. Mainframe

10.4.8.3. SecureIslands

10.4.8.4. Sophos

10.4.8.4.1. SafeGuard Enterprise (Utimaco)

10.4.8.5. Symantec (PGP)

10.4.8.6. Vormetric

10.4.8.7. WinMagic

10.4.8.7.1. SecureDoc

10.4.9. Quantum Encryption

10.4.9.1. IDQ

10.4.9.2. Quintessence Labs

10.4.9.3. Whitewood Encryption

10.4.10. Tokenization

10.4.10.1. Protegrity

10.4.11. Whole Disk

10.4.11.1. Intel Security

10.4.11.2. Symantec (PGP)

10.4.11.3. CheckPoint Software

10.4.11.4. Encryption Management

10.4.11.4.1. Wave Systems

10.4.11.5. WinMagic

10.4.11.5.1. SecureDoc

10.4.11.6. Microsoft

10.4.11.6.1. Bitlocker

10.4.11.7. Sophos

10.4.11.7.1. SafeGuard Enterprise (Utimaco)

10.4.11.8. Trustwave

10.4.11.8.1. DataControl

10.4.11.9. Vormetric

10.5. File Analysis Software

10.5.1. Acaveo

10.5.2. Active Navigation

10.5.3. AvePoint

10.5.4. Beyond Recognition

10.5.5. Bloomberg

10.5.6. CommVault

10.5.7. Condrey

10.5.8. Covertix

10.5.9. DataGlobal

10.5.10. DataGravity

10.5.11. Equivio

10.5.12. HP

10.5.12.1. Control Point

10.5.13. HiSoftware

10.5.14. IBM

10.5.14.1. StoreIQ

10.5.15. Identifty Finder

10.5.16. Imperva

10.5.17. Index Engines

10.5.18. Kazoup

10.5.19. MailGuard

10.5.20. NTP Software

10.5.21. Novell

10.5.22. Nuix

10.5.23. Proofpoint

10.5.24. Stealthbits

10.5.25. Varonis

10.5.26. WatchDox

10.5.27. Whitebox Security

10.5.28. ZyLab

10.6. Hardware Security Modules (HSM)

10.6.1. Cloud HSM

10.6.1.1. Amazon

10.6.1.2. IBM

10.6.2. Hardware

10.6.2.1. FutureX

10.6.2.2. Gemalto

10.6.2.3. HPE

10.6.2.4. Safenet

10.6.2.5. Thales

10.7. Software Defined Storage Security

10.7.1. Dispersive Networks

10.7.1.1. https://dispersivetechnologies.com/

10.7.2. OceansBlue

10.7.2.1. http://www.oceansblue.net/index.html

10.8. eSignatures

10.8.1. Adobe eSign Services

10.8.2. Alphatrust

10.8.3. Docusign

10.8.4. Hellosign

10.8.5. Rightsignature

10.8.6. Sertifi

11. Identity and Access Management (IAM)

11.1. AD/Unix bridge

11.1.1. Centrify

11.2. Enterprise single sign-on (ESSO)

11.3. Externalized authorization management (EAM)

11.3.1. Axiomatics

11.3.2. Dell Quest (BitKoo)

11.4. IAM as a Service

11.4.1. Centrify

11.4.2. IBM (Formerly Lighthouse Security)

11.4.3. Identity Automation

11.4.4. Intel

11.4.5. Okta

11.4.6. Password Bank

11.4.7. Ping Identity

11.4.8. Sailpoint

11.4.9. Symplifyed

11.4.10. iWelcome

11.5. Identity governance and administration

11.5.1. CA Technologies

11.5.2. IBM Security

11.5.3. Oracle

11.5.4. RSA (Aveksa)

11.6. Privileged account management (PAM)

11.6.1. BeyondTrust

11.6.2. Lieberman Software

11.6.3. Cyber Ark

11.6.4. Dell

11.6.5. Centrify

11.7. Public Certificate Authorities

11.7.1. Comodo

11.7.2. Geotrust

11.7.3. Godaddy

11.7.4. Symantec (Formerly VeriSign)

11.8. User Authentication

11.8.1. Tokens

11.8.1.1. OOB authentication

11.8.1.1.1. SMS

11.8.1.1.2. Voice

11.8.1.1.3. Push

11.8.1.1.4. Email

11.8.1.1.5. Social media

11.8.1.2. OTP tokens

11.8.1.2.1. OTP hardware tokens

11.8.1.2.2. OTP software tokens for smart phones

11.8.1.3. X.509 tokens

11.8.1.4. Other tokens

11.8.1.4.1. ANECT AS - ALUCID

11.8.2. Contextual authentication

11.8.2.1. Google

11.8.2.1.1. Trust API

11.8.3. KBA

11.8.3.1. It's Me Security

11.8.3.1.1. http://www.itsmesecurity.com/

11.8.4. Biometrics

11.8.4.1. Behavioral

11.8.4.1.1. Typing rhythm/keystroke dynamics

11.8.4.1.2. Voice recognition

11.8.4.2. Biological

11.8.4.2.1. Face recognition

11.8.4.2.2. Fingerprint

11.8.5. Wide-focus vendors

11.8.5.1. Alladin-RD

11.8.5.2. CA Technologies

11.8.5.3. Entrust

11.8.5.4. HID Global

11.8.5.5. RSA

11.8.5.5.1. Adaptive Auth

11.8.5.6. Gemalto

11.8.5.7. Symantec

11.8.5.8. Technology Nexus

11.8.5.9. VASCO

11.9. User Privilege Management

11.9.1. Appsense

11.9.1.1. http://www.appsense.com/

11.9.2. Ariella

11.9.2.1. http://www.arellia.com/

11.9.3. Avectco

11.9.3.1. http://www.avecto.com/

11.9.4. BeyondTrust

11.9.4.1. http://www.beyondtrust.com/

11.9.5. Centrify

11.9.5.1. http://www.centrify.com/

11.9.6. CionSystems

11.9.7. CrossIdeas

11.9.7.1. http://www.crossideas.com/

11.9.8. Dell

11.9.8.1. http://www.quest.com/desktop-authority-management-suite/

11.9.9. Lieberman Software

11.9.9.1. http://www.liebsoft.com/

11.9.10. Viewfinity

11.9.10.1. http://www.viewfinity.com/

12. Application Security

12.1. Web Application Firewalls (WAF) & Application Security

12.1.1. Web Threat Disruption Technology

12.1.1.1. Software

12.1.1.1.1. NuCaptcha

12.1.1.1.2. NuData

12.1.1.2. Appliances

12.1.1.2.1. Juniper

12.1.1.2.2. Shape Security

12.1.1.3. Open Source

12.1.1.3.1. Google Hack Honeypot

12.2. Web Application Security

12.2.1. Code Review Products

12.2.1.1. HP

12.2.1.2. IBM

12.2.2. Web Application Vulnerability Scanning Services

12.2.2.1. Cenzic

12.2.2.2. Controlscan

12.2.2.3. High-Tech Bridge

12.2.2.4. McAfee Secure

12.2.2.5. Qualys

12.2.2.6. Securi

12.2.2.7. Sitelock

12.2.2.8. Trustwave

12.2.2.9. WebSecurify

12.2.2.10. WhiteHat Security

12.2.3. Scanning Software

12.2.3.1. Open Source

12.2.3.1.1. Arachni Scanner

12.2.3.1.2. Subgraph

12.2.3.1.3. W3af

12.2.3.1.4. Wapiti

12.2.3.1.5. Watcher

12.2.3.2. Commercial

12.2.3.2.1. Accunetix

12.2.3.2.2. BeyondTrust

12.2.3.2.3. Cenzic

12.2.3.2.4. HP

12.2.3.2.5. MavitunaSecurity

12.2.3.2.6. NTObjectives

12.2.3.2.7. Nstalker

12.2.3.2.8. Portswigger

12.2.3.2.9. Syhunt

13. Risk, Compliance and Security Management

13.1. Firewall Workflow,Modeling & Change Management

13.1.1. Checkpoint Software

13.1.2. Firemon

13.1.3. ManageEngine

13.1.4. Redseal Networks

13.1.5. Skybox

13.1.6. Tufin

13.1.7. Veriflow

13.2. Legal and regulatory information governance

13.3. Privacy

13.4. Regulations, Awareness and Training

13.4.1. Computer Based Training

13.4.1.1. Aujas

13.4.1.2. BeOne Development

13.4.1.3. Digital Defense

13.4.1.4. Fishnet Security

13.4.1.5. Inspired eLearning

13.4.1.6. Junglemap

13.4.1.7. KnowBe4

13.4.1.8. MediaPro

13.4.1.9. PhishMe

13.4.1.10. Phishline

13.4.1.11. Popcorn Training

13.4.1.12. Sans Institute

13.4.1.13. Scipp International

13.4.1.14. Secure Mentem

13.4.1.15. Security Innovation

13.4.1.16. Security Mentor

13.4.1.17. The Security Awareness Company

13.4.1.18. ThreatSim

13.4.1.19. Wombat Security Technologies

13.4.2. Educational, Awareness & News Outlets

13.4.2.1. Government Led

13.4.2.1.1. Information Sharing and Analysis Centers (ISACs)

13.4.2.2. Periodicals & Target Roles

13.4.2.2.1. Channel

13.4.2.2.2. CISO/CSO

13.4.2.2.3. Security Engineers/Analysts

13.4.3. Industry Standards/Groups

13.4.3.1. Standards

13.4.3.1.1. Technical

13.4.3.2. Industry Groups

13.4.3.2.1. Audit

13.4.3.2.2. General Security

13.4.3.2.3. Forensics

13.4.4. Regulations, Public Standards and Contractual Mandates

13.4.4.1. Global

13.4.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)

13.4.4.1.2. NIST

13.4.4.2. Country/Region Specific

13.4.4.2.1. China

13.4.4.2.2. Singapore

13.4.4.2.3. European Union

13.4.4.2.4. United States

13.5. Security Policy and Response Orchaestration Platforms

13.5.1. FireEye

13.5.2. Phantom

13.5.2.1. https://www.phantom.us/

13.5.3. Proofpoint

13.6. Security Program and Governance

13.6.1. Governance, Risk and Compliance

13.6.1.1. eGRC

13.6.1.1.1. Software as a Service

13.6.1.1.2. Software

13.6.1.2. Compliance Oriented Private Cloud Hosting (COPCH)

13.6.1.2.1. Note: This list is not an attestation of compliance

13.6.1.3. Operational Risk Analytics

13.6.1.3.1. Algosec

13.6.1.3.2. Cyber Observer

13.6.1.3.3. Cytegic

13.6.1.3.4. Firemon

13.6.1.3.5. IBM

13.6.1.3.6. Redseal Networks

13.6.1.3.7. RiskIO

13.6.1.3.8. Skybox

13.6.1.3.9. Software Development Lifecycle

13.6.1.3.10. Solarwinds

13.6.1.3.11. Tufin

13.6.1.4. Cloud & Container Compliance Assessment

13.6.1.4.1. Cavirin

14. Random Knowledge

14.1. Detection Methods

14.1.1. File Analysis

14.1.1.1. Computed Hash

14.1.1.1.1. Uniqueness

14.1.1.2. Metadata Attributes

14.1.1.2.1. File Content Inspection

14.1.1.2.2. File Headers

14.1.1.2.3. Temporal Analysis

14.1.1.2.4. Temporal Analysis with Prevalence

14.1.1.2.5. Time/Date

14.1.1.2.6. Certificate and Signature Evaluation (PKI)

14.1.1.3. Packing Method

14.1.1.3.1. Multi-packing Analysis

14.1.2. Network Specific

14.1.2.1. Protocol/File/Session Decode & Analysis

14.1.2.1.1. File Extraction

14.1.2.1.2. Playback (Surveillance)

14.1.2.1.3. File/Session Viewing

14.1.2.1.4. Correlation

14.1.2.1.5. Machine Learning (AI)

14.1.2.2. Network Flow Analysis

14.1.2.2.1. Machine Learning (AI)

14.1.2.3. Application Layer Analysis

14.1.2.3.1. Classification, Correlation , Deviance from Baselines (Heuristics)

14.1.2.3.2. Deep Packet Inspection (DPI)

14.1.2.3.3. Application Command and Input Analysis

14.1.2.4. IP Layer Analysis

14.1.2.4.1. TCP/UDP Ports

14.1.2.4.2. IP Address

14.1.3. Malware Behavioral Evaluations

14.1.3.1. Persistence

14.1.3.1.1. Installs as System Service

14.1.3.1.2. Installs Registry Keys in Startup locations

14.1.3.1.3. Modifies filesystem in specific locations

14.1.3.2. Suspicious Behaviors Evaluated

14.1.3.2.1. Attempts to login to systems that a specific user credential is not normally used on

14.1.3.2.2. Becomes another user on the system

14.1.3.2.3. CPU of Processes Spawned is high

14.1.3.2.4. Connects with a known bad URL or IP Address

14.1.3.2.5. Escalates privileges

14.1.3.2.6. Examines the Documents Folder or User Document Folders

14.1.3.2.7. File Isn't widely prevalent in user population

14.1.3.2.8. Injects data into memory of another running process

14.1.3.2.9. Modifies memory of another process

14.1.3.2.10. Opens TCP/IP Connections to other hosts

14.1.3.2.11. Performs a network port sweep

14.1.3.2.12. Process executes net use DOS command inside command.exe

14.1.3.2.13. Process spawns command.exe

14.1.3.2.14. Removes logs/events of application logs or operating system

14.1.3.2.15. Self Delete of files

14.1.3.2.16. Self-copy of files

14.1.3.2.17. Starts to repeatedly call the crypt function (ransom sign)

14.1.3.2.18. Time of execution is not normal in context of historical analysis

14.1.4. User

14.1.4.1. Activity on system when user's employment is in termination status

14.1.4.2. Deviates from past user behavior

14.1.4.3. Device not historically associated to user

14.1.4.4. Login time anamoly

14.1.4.5. Login time outside user's home timezone

14.1.4.6. Privileged data accessed

14.1.4.6.1. Volumetric analysis

14.1.4.6.2. Deviation from baseline

14.1.4.6.3. Cut-paste function used

14.1.4.7. Remote access and time of day abnormal from baselines

14.1.4.8. User authentication failure

14.1.4.9. User's browser or viewer is not the same as the baseline

14.1.4.10. User is logging into system remotely and locally simultaneously

14.1.4.11. User is logging into system remotely  (not expected)

14.1.4.12. User is logging into system remotely at an abnormal time

14.1.4.13. User is abnormally leveraging applications that are administrative in nature (Control Panel, Command.exe, Group Policy Editor, etc)