1. Moving Target Defense
1.1. Applications
1.1.1. General Apps
1.1.1.1. Polyverse
1.1.1.2. RunSafe Security
1.1.2. Mobile Apps
1.1.2.1. Everspin Global
1.1.3. Kameleon Security
1.1.4. APIs
1.1.4.1. HOPR
1.2. Data Security
1.2.1. Nexitech
1.3. Deception
1.3.1. Active Directory
1.3.1.1. Acalvio
1.3.1.2. Proofpoint
1.3.1.3. SentinelOne
1.3.2. Distributed Deceptions
1.3.2.1. Acalvio
1.3.2.2. Fidelis Cybersecurity
1.3.2.3. SentinelOne
1.3.2.4. TrapX
1.3.2.5. Zscaler
1.3.2.6. Cynet
1.3.3. Endpoint
1.3.3.1. Cybertrap
1.3.3.2. Minerva Labs
1.4. Kubernetes
1.4.1. R6 Security
1.5. Memory
1.5.1. Anjuna
1.5.2. Intel
1.5.3. Morphisec
1.6. Network
1.6.1. CryptoniteNXT
1.6.2. Dispel.io
1.7. Operating Systems
1.7.1. Runsafe Security
1.8. Secure Computation
1.8.1. Agita Labs
1.8.2. Kameleon Security
1.8.3. Polyverse
2. Data Security
2.1. Data Security Posture Management
2.1.1. Concentric AI
2.1.2. Cyera
2.1.3. DIG Security
2.1.4. Flow Security
2.1.5. Laminar
2.1.6. Orca Security
2.1.7. Polar Security
2.1.8. Satori
2.1.9. Securiti.AI
2.1.10. Sentra
2.1.11. Symmetry Systems
2.1.12. Varonis
2.2. Isolation and Vaulting
2.2.1. Acronis
2.2.2. Cohesity
2.2.3. Commvault
2.2.4. Dell
2.2.5. Elastio
2.2.6. Rubric
2.2.7. Veeam
2.2.8. Veritas Technologies
2.3. Data Security Platforms
2.3.1. Cyera
2.3.2. IBM
2.3.3. Immuta
2.3.4. Okera
2.3.5. OneTrust
2.3.6. Prime Factors
2.3.7. Privacera
2.3.8. Privitar
2.3.9. Protegrity
2.3.10. Satori
2.3.11. SecuPi
2.3.12. TrustArc
2.3.13. Varonis
3. Application Security
3.1. API Defense
3.1.1. Cequence Security
3.1.2. Google Cloud
3.1.3. Imperva
3.1.4. L7Defense
3.1.5. Mulesoft
3.1.6. Salt.Security
3.1.7. SignalSciences
3.1.8. Spherical Defense
3.1.9. WallArm
3.1.10. Noname Security
3.1.11. Spherical Defence
3.1.12. Signal Sciences
3.2. Application Security Posture Management (ASPM)
3.2.1. Apiiro
3.2.2. ArmorCode
3.2.3. Bionic
3.2.4. Brinqa
3.2.5. Data Theorum
3.2.6. Dazz
3.2.7. Enso Security
3.2.8. Kenna Security
3.2.9. Kondukto
3.2.10. Maverix
3.2.11. Nucleus
3.2.12. Ox Security
3.2.13. Oxeye
3.2.14. Rezilion
3.2.15. Synopsys (Code Dx)
3.2.16. Tromzo
3.2.17. Wabbi
3.3. Composable Security APIs
3.3.1. Abuse.ch (URLHAUS)
3.3.2. Alienvault
3.3.3. Amazon
3.3.4. Avira
3.3.5. Bitdefender
3.3.6. BrightCloud (OpenText)
3.3.7. CISA (Automated Intelligence Sharing - AIS)
3.3.8. Fingerbank
3.3.9. Flare
3.3.10. Google (Virustotal)
3.3.11. Infraguard
3.3.12. Intel 471
3.3.13. MISP
3.3.14. Okta
3.3.15. OpenPhish
3.3.16. Pangea Security
3.3.17. Ping Identity
3.3.18. Proofpoint (Emerging Threats)
3.3.19. ReversingLabs
3.3.20. Sophos
3.3.21. Spamhaus
3.3.22. Stairwell
3.3.23. VMray
3.3.24. Domaintools
3.4. Moving Target Defense
3.4.1. Applications
3.4.1.1. Application Mesh
3.4.1.1.1. Hopr.co
3.4.1.2. General Apps
3.4.1.2.1. RunSafe Security
3.4.1.2.2. ScrambleUp
3.4.1.3. Mobile Apps
3.4.1.3.1. Everspin Global
4. Identification, Authentication, Access Control & IAM
4.1. Active Directory Defense
4.1.1. SentinelOne
4.1.2. Varonis
4.2. Cloud Infrastructure Entitlement Management
4.2.1. Attivo Networks
4.2.2. Authomize
4.2.3. Britive
4.2.4. CyberArk
4.2.5. Ermetic
4.2.6. Horangi Cyber Security
4.2.7. Microsoft
4.2.8. Obsidian
4.2.9. Palo Alto Networks
4.2.10. SailPoint
4.2.11. Saviynt
4.2.12. Sonrai Security
4.2.13. Zscaler
4.3. Identity Threat Detection and Response (ITDR)
4.3.1. Authmind
4.3.2. Authomize
4.3.3. Cayosoft
4.3.4. CionSystems
4.3.5. Crowdstrike
4.3.6. Imanami
4.3.7. Lepide
4.3.8. ManageEngine
4.3.9. Microsoft (Defender for Cloud)
4.3.10. Netwrix
4.3.11. Oort
4.3.12. Plurilock
4.3.13. QOMPLX
4.3.14. Quest
4.3.15. Semperis
4.3.16. SentinelOne
4.3.17. Silverfort
4.3.18. Varonis
4.3.19. Varonis
4.3.20. Zohno
5. Internet of Things (IoT/OT)
5.1. Access Control
5.1.1. Sensify Security
5.2. Anomaly Detection
5.2.1. InfluxData
5.3. Authentication
5.3.1. Device Authority
5.3.2. Sensify Security
5.3.3. Trusfort
5.4. Automotive
5.4.1. Argus Cyber Security
5.4.2. Karamba Security
5.4.3. ProvenCore
5.4.4. Security Innovation
5.5. Embedded Security
5.5.1. ProvenCore
5.5.2. Security Innovation
5.5.3. Sequitur Labs
5.6. Encryption
5.6.1. Rubicon
5.7. Gateways
5.7.1. Bayshore Networks
5.7.2. Xage Security
5.7.3. Huawei
5.8. Industrial Control Systems (ICS/SCADA)
5.8.1. Network Traffic Inspection
5.8.1.1. Claroty
5.8.1.2. CyberX
5.8.1.3. Dragos
5.8.1.4. Indegy
5.8.1.5. Nexdefense
5.8.1.6. Sentryo
5.8.2. Firewall
5.8.2.1. Check Point Software
5.8.2.2. Forcepoint
5.8.2.3. Fortinet
5.8.2.4. Radiflow
5.8.3. Remote Access
5.8.3.1. Claroty
5.9. Power Monitoring
5.9.1. PFP Cybersecurity
5.10. Radio
5.10.1. Bastille
5.11. Risk and Compliance
5.11.1. VDOO
5.12. Operating System
5.12.1. ProvenCore
6. Infrastructure Protection
6.1. Blockchain-Based Data Protection
6.1.1. Acronis
6.2. Enterprise SIGINT
6.2.1. AirEye
6.2.2. Hawkeye360
6.2.3. Loch Technologies
6.2.4. xScape
6.3. Zero Trust Network Access (ZTNA)
6.3.1. Absolute Software
6.3.2. Akamai
6.3.3. Appgate
6.3.4. Banyan Security
6.3.5. Barracuda
6.3.6. Bitglass
6.3.7. Blackberry
6.3.8. Cato Networks
6.3.9. Check Point
6.3.10. Cisco
6.3.11. Cloudflare
6.3.12. Cyolo
6.3.13. Forcepoint
6.3.14. Fortinet
6.3.15. Instasafe
6.3.16. Ivanti
6.3.17. Netscope
6.3.18. Okta
6.3.19. Palo Alto Networks
6.3.20. Pulse Secure
6.3.21. Sophos
6.3.22. Symantec
6.3.23. Verizon
6.3.24. Versa Networks
6.3.25. Zscaler
7. BlockChain
7.1. Asset Integrity
7.1.1. Guardtime
7.2. Authentication
7.2.1. NuID
7.3. Encryption
7.3.1. REMME
7.4. Hardware Wallets
7.4.1. CoolWallet
7.4.2. Ellipal
7.4.3. KeepKey
7.4.4. Ledger
7.4.5. PrivacyPros
7.4.6. SafePal
7.4.7. ShiftCrypto
7.4.8. Trezor.io
7.5. Software Defined Perimeter
7.5.1. Block Armour
7.6. BlockChain Surveillence and Analytics
7.6.1. Ankrscan
7.6.2. Bitquery
7.6.3. Chainalysis
7.6.4. CipherTrace
7.6.5. Coinmetrics
7.6.6. Elementus
7.6.7. elliptic.co
7.6.8. Lukka
7.6.9. Messari.io
7.6.10. Trmlabs
7.7. Blockchain Security Monitoring
7.7.1. Hypernative.io
8. Risk, Compliance and Security Management
8.1. Security Ratings & Insurance
8.1.1. Security Ratings
8.1.1.1. Bitsight Technologies
8.1.1.2. FICO
8.1.1.3. Gooann
8.1.1.4. Guidewire Software
8.1.1.5. Prevalent
8.1.1.6. SecurityScoreCard
8.1.2. Cyber Risk Insurance
8.1.2.1. Balsiger Insurance
8.1.2.2. CyberWrite
8.1.2.3. HSB Group
8.1.2.4. Philadelphia Insurance Companies
8.1.2.5. Tennant Risk Services
8.1.2.6. The Hartford
8.1.2.7. Travelers
8.2. Digital Risk Protection Services
8.2.1. BlueVoyant
8.2.2. CybelAngel
8.2.3. CyberInt
8.2.4. Digital Shadows
8.2.5. IntSights
8.2.6. PhishLabs
8.2.7. Recorded Future
8.2.8. RiskIQ
8.2.9. SafeGuard Cyber
8.2.10. ZeroFOX
9. Security Operations & Incident Response
9.1. Cloud Incident Response Automation (CIRA)
9.1.1. Binalyze
9.1.2. Cado Security
9.1.3. Cado Security, Binalyze, F-Response, Mitiga, Magnet Forensics, Paraben
9.1.4. F-Response
9.1.5. Magnet Forensics
9.1.6. Mitiga
9.1.7. Paraben
9.2. Continuous Threat and Exposure Management
9.2.1. Cyber Asset Attack Surface Management
9.2.1.1. AirTrack Software
9.2.1.2. AppNovi
9.2.1.3. Armis
9.2.1.4. Axonius
9.2.1.5. Balbix
9.2.1.6. Brinqa
9.2.1.7. CoalFire
9.2.1.8. Cyberpion
9.2.1.9. CyCognito
9.2.1.10. DigitalShadows
9.2.1.11. Dragonfly Cyber
9.2.1.12. FireCompass
9.2.1.13. HackerOne
9.2.1.14. JupiterOne
9.2.1.15. LookingGlass Cyber
9.2.1.16. Microsoft
9.2.1.17. Netspi
9.2.1.18. New Push
9.2.1.19. Noetic Cyber
9.2.1.20. NorthStar.io
9.2.1.21. Palo Alto Networks
9.2.1.22. Panaseer
9.2.1.23. Pentera
9.2.1.24. Performata
9.2.1.25. Randori
9.2.1.26. RunZero
9.2.1.27. Sevco Security
9.2.1.28. TemplarBit
9.2.2. External ASM (EASM)
9.2.2.1. Assetnote
9.2.2.2. Censys
9.2.2.3. Crowdstrike
9.2.2.4. CyCognito
9.2.2.5. Darktrace
9.2.2.6. FireCompass
9.2.2.7. IBM (Formerly Randori)
9.2.2.8. Immuniweb
9.2.2.9. LookingGlass Cyber
9.2.2.10. Mandiant
9.2.2.11. Palo Alto Networks
9.2.2.12. Performata
9.2.2.13. Recorded Future
9.2.2.14. Reflectiz
9.2.2.15. Team Cymru
9.2.2.16. Upguard
9.3. Cyber Defense Program Optimization (CDPO)
9.3.1. Bluelava
9.3.2. Cardinal Ops
9.3.3. Enveedo
9.3.4. Holisticyber
9.3.5. Onyxia
9.3.6. Posturity
9.3.7. Rivial
9.3.8. SeeMetrics
9.3.9. Trustmapp
9.3.10. Veriti
9.3.11. XM Cyber
9.4. Cyber Ranges
9.4.1. Cloud Range
9.4.2. CYBER RANGES
9.4.3. Cyberbit
9.4.4. Cyrin
9.4.5. IBM
9.4.6. Immersive Labs
9.4.7. Keysight
9.4.8. RangeForce
9.4.9. Simspace
9.5. Intelligence/Data Feeds/Software & Services
9.5.1. Collaborative Threat Investigation Platforms
9.5.1.1. BAE Systems Detica
9.5.1.1.1. Cybereveal
9.5.1.2. Maltego
9.5.1.3. NC4
9.5.1.4. Palentir
9.5.1.4.1. Cyber
9.5.2. Open Source Threat & Data Mining
9.5.2.1. ThreatCrowd.org
9.5.2.2. ThreatMiner.org
9.5.3. Security Intelligence and Data Analysis Platforms
9.5.3.1. Trellix
9.5.3.1.1. Security Orchestrator
9.5.3.2. Palentir
9.5.4. Threat Intelligence Platforms (TIPs)
9.5.4.1. Anomali
9.5.4.2. BAE Systems
9.5.4.3. Comilion
9.5.4.4. CTILab
9.5.4.5. Cyjax
9.5.4.6. Eclectic IQ
9.5.4.7. Infoblox
9.5.4.8. Lockheed Martin
9.5.4.9. Lookingglass Cyber Solutions
9.5.4.10. Microsoft
9.5.4.10.1. Interflow
9.5.4.11. NC4
9.5.4.11.1. Soltra
9.5.4.12. Pulsedive
9.5.4.13. Service Now (Formerly Brightpoint)
9.5.4.14. Synopsys
9.5.4.15. ThreatConnect
9.5.4.16. ThreatQuotient
9.5.4.17. TruStar
9.5.4.18. Zeneth
9.5.5. Threat Intelligence Services
9.5.5.1. Human Intelligence - HUMINT (Strategic)
9.5.5.1.1. Attacker Tactics, Techniques and Procedures
9.5.5.1.2. Brand & Attack Target Monitoring
9.5.5.1.3. Credential Theft
9.5.5.1.4. Cybersquatting
9.5.5.1.5. External Data Loss & Risk Monitoring
9.5.5.1.6. Social Media, User Forum and External Threat Monitoring
9.5.5.2. Machine-Based (Tactical)
9.5.5.2.1. Anti-Phishing
9.5.5.2.2. Anti-Spam
9.5.5.2.3. Domain Name Monitoring/DGA Feeds
9.5.5.2.4. File Reputation
9.5.5.2.5. Indicators of Compromise (Feeds)
9.5.5.2.6. IP Blacklists
9.5.5.2.7. IP Reputation Feeds
9.5.5.2.8. Malicious Hashes
9.5.5.2.9. TI Feed Aggregation
9.5.5.2.10. Vulnerabilities and Exploits
9.5.5.2.11. Web Malware
9.6. LLM Enabled SOAR
9.6.1. BlinkOps
9.6.2. Dropzone.ai
9.7. Security Search
9.7.1. Cyclops Security
10. Cloud Security
10.1. Cloud Infrastructure Entitlement Management (CIEM)
10.1.1. ARCON
10.1.2. Authomize
10.1.3. Britive
10.1.4. CyberArk
10.1.5. Ermetic
10.1.6. Horangi Cyber Security
10.1.7. Microsoft (CloudKnox Security)
10.1.8. Orca Security
10.1.9. Palo Alto Networks
10.1.10. SailPoint
10.1.11. Saviynt
10.1.12. SentinelOne (Attivo Networks)
10.1.13. Sonrai Security
10.1.14. Sysdig
10.1.15. Uptycs
10.1.16. Wiz
10.1.17. Zscaler
10.2. Cloud Native Application Protection Platforms (CNAPP)
10.2.1. Aqua Security
10.2.2. Bionic
10.2.3. BMC (Helix Cloud Security)
10.2.4. Caveonix
10.2.5. Check Point Software
10.2.6. Cyberark
10.2.7. Ermetic
10.2.8. F5
10.2.9. Fugue
10.2.10. Lacework
10.2.11. Microsoft (Defender for Cloud)
10.2.12. NetApp (Formerly CloudCheckr
10.2.13. nOps
10.2.14. Orca
10.2.15. Palo Alto Networks (Prisma Cloud)
10.2.16. Rapid7
10.2.17. RuneCast
10.2.18. Skyhigh Security
10.2.19. Sophos Cloud Optix
10.2.20. Sysdig
10.2.21. Tenable
10.2.22. Tenacity
10.2.23. Threat Stack
10.2.24. Trellix
10.2.25. Trend Micro
10.2.26. Turbot
10.2.27. Wiz
10.3. Cloud Security Posture Management (CSPM)
10.3.1. Alert Logic
10.3.2. AlienV
10.3.3. Carbon Black
10.3.4. Check Point
10.3.5. Cisco
10.3.6. F-Secure
10.3.7. FireEye
10.3.8. IBM Security
10.3.9. Kaspersky
10.3.10. LogRhythm
10.3.11. McAfee
10.3.12. Palo Alto Networks
10.3.13. Qualys
10.3.14. Rapid7
10.3.15. Sophos
10.3.16. Splunk
10.3.17. Symantec
10.3.18. Tenable
10.3.19. Trend Micro
10.3.20. Wiz
10.4. Kubernetes Security
10.4.1. KSPM
10.4.1.1. Aqua Security
10.4.1.2. Armo Security
10.4.1.3. Buildpiper
10.4.1.4. Check Point Software
10.4.1.5. Orca Security
10.4.1.6. Runecast
10.4.1.7. Sysdig
10.4.2. CWPP
10.4.2.1. Aqua Security
10.4.2.2. Crowdstrike
10.4.2.3. Microsoft
10.4.2.4. Palo Alto Networks
10.4.2.5. Redhat ACS
10.4.2.6. SentinelOne
10.4.2.7. Sophos (Capsule8)
10.4.2.8. SUSE (Neuvector)
10.4.2.9. Tigera
10.4.2.10. Trend Micro
10.4.2.11. Uptycs
10.4.2.12. Wiz
10.4.3. Kubernetes Runtime Security
10.4.3.1. Aqua Security
10.4.3.2. Araali Networks
10.4.3.3. Crowdstrike
10.4.3.4. DeepFactor
10.4.3.5. Kodem Security
10.4.3.6. KSOC
10.4.3.7. LightSpin Security
10.4.3.8. Operant.ai
10.4.3.9. Palo Alto Networks
10.4.3.10. Snyk
10.4.3.11. Sweet Security
10.4.3.12. Sysdig
10.4.3.13. ThreatX
10.4.3.14. Upwind Security
10.4.3.15. Wiz
10.5. SaaS Management Platforms
10.5.1. Augmentt
10.5.2. Auvik
10.5.3. Beamy
10.5.4. Bettercloud
10.5.5. LeanIx
10.5.6. Lumos
10.5.7. Oomnitza
10.5.8. Productiv
10.5.9. Torii
10.5.10. Trelica
10.5.11. Zluri
10.5.12. Zylo
10.6. SaaS Security Posture Management (SSPM)
10.6.1. Adaptive Shield
10.6.2. Appomni
10.6.3. Asterisk Security
10.6.4. Atmosec
10.6.5. Axonius
10.6.6. DoControl
10.6.7. Obsidian Security
10.6.8. Privya
10.6.9. Reco.ai
10.6.10. Reveal Security
10.6.11. Valence Security
10.6.12. Wing Security
10.7. Data Provenance/Lineage
10.7.1. RKVST
10.7.2. Alation
10.7.3. Informatica
10.7.4. Octopai
11. Browser Security
11.1. Browser Extensions for Security
11.1.1. Ermes
11.1.2. Guardio
11.1.3. HP
11.1.4. Inky
11.1.5. Keep Aware
11.1.6. LayerX
11.1.7. Manage Engine
11.1.8. Perception Point
11.1.9. Seraphic
11.1.10. Slashnext
11.1.11. Trend Micro
11.2. Secure Enterprise Browsers
11.2.1. Island.io
11.2.2. Talon Security
12. Collaboration Security
12.1. Abnormal Security
12.2. Check Point Software
12.3. Microsoft
12.4. SafeGuard Cyber
12.5. Slashnext
12.6. Trellix
12.7. Trend Micro
12.8. WithSecure
13. ML and GenAI Security
13.1. AI TRISM
13.1.1. AI Application Security
13.1.1.1. Bosh AISheild
13.1.1.2. CalypsoAI
13.1.1.3. HiddenLayer
13.1.2. Model Monitoring
13.1.2.1. Abzu
13.1.2.2. Amruta Inc
13.1.2.3. Arize AI
13.1.2.4. ArthurAI
13.1.2.5. DreamQuark
13.1.2.6. Fairly.ai
13.1.2.7. Fiddler
13.1.2.8. Giskard
13.1.2.9. Kyndi
13.1.2.10. Robust Intelligence
13.1.2.11. Seldon Technologies
13.1.2.12. SolasAI
13.1.2.13. Superwise
13.1.2.14. TMRYK
13.1.2.15. TrojAI
13.1.2.16. Truera
13.1.3. Model Ops
13.1.3.1. Aporia
13.1.3.2. Cnvrg.io
13.1.3.3. HPE
13.1.3.4. Iguazio
13.1.3.5. ModelOp
13.1.3.6. Modzy
13.1.3.7. Mona
13.1.3.8. One Data
13.1.3.9. tmryk
13.1.3.10. Valohai
13.1.3.11. Verta
13.1.4. Privacy & Data Security
13.1.4.1. Anonos
13.1.4.2. DivePlane
13.1.4.3. Ederlabs
13.1.4.4. Enveil
13.1.4.5. Gretel
13.1.4.6. Hazy
13.1.4.7. LLMShield
13.1.4.8. Mostly AI
13.1.4.9. Plurilock
13.1.4.10. Private AI
13.1.4.11. Protopia AI
13.1.5. Standalone Prompt Filtering/Firewall
13.1.5.1. ArthurAI
13.1.5.2. Bosch AI Shield
13.1.5.3. Calypso.ai
13.1.5.4. LLMShield
13.1.5.5. tmryk
13.1.5.6. TrojAI
13.2. AI Platforms
13.2.1. Ask Sage
13.2.1.1. Data Encryption
13.2.2. Azure AI
13.2.2.1. Prompt Filtering
13.2.2.2. Data Grounding/Retrieval
13.2.2.3. Data Encryption at Rest
13.2.3. Google
13.2.4. HuggingFace
13.3. Secure Code Copilots
13.3.1. Alphacode
13.3.2. Amazon Codewhisperer
13.3.3. Ask Codi
13.3.4. Bito
13.3.5. Captain Stack
13.3.6. CodeGeex
13.3.7. Codeium
13.3.8. Fossa
13.3.9. Github
13.3.10. GPT-Code-Clippy (GPT-CC)
13.3.11. IntelliCode
13.3.12. Replit
13.3.13. Tabnine
13.3.14. YouCompleteMe