Information Security Technologies & Markets

.Global software security vendors, providers

Lancez-Vous. C'est gratuit
ou s'inscrire avec votre adresse e-mail
Information Security Technologies & Markets par Mind Map: Information Security Technologies & Markets

1. ValidEDGE

2. Web Application Firewalls (WAF)

2.1. Appliances

2.1.1. Virtualized Appliances

2.1.1.1. AlertLogic

2.1.1.2. Amazon AWS

2.1.1.2.1. Riverbed

2.1.1.3. Barracuda Networks

2.1.1.4. BeeWare

2.1.1.5. Imperva

2.1.1.6. PentaSecurity

2.1.2. Physical Appliances

2.1.2.1. AlertLogic

2.1.2.2. Barracuda Networks

2.1.2.3. BeeWare

2.1.2.4. Cisco

2.1.2.4.1. End of Life January 2011

2.1.2.5. Citrix

2.1.2.6. DPtech

2.1.2.7. DenyAll

2.1.2.8. F5

2.1.2.9. Imperva

2.1.2.10. NSFocus

2.1.2.11. PentaSecurity

2.1.2.12. Riverbed

2.1.2.13. Trustwave

2.2. Managed Services

2.2.1. Dell Secureworks

2.2.2. AT&T

2.2.3. Verizon Business

2.2.4. Cisco

2.3. Software

2.3.1. Apache

2.3.1.1. Applicure

2.3.1.1.1. dotDefender

2.3.2. DenyAll

2.3.3. ERGON Informatik AG

2.3.3.1. AIRLOCK

2.3.4. Juniper

2.3.4.1. Mykonos

2.3.5. Microsoft IIS

2.3.5.1. Applicure

2.3.5.1.1. dotDefender

2.3.5.2. BeyondTrust

2.3.5.3. ThreatSentry

2.3.6. Open Source

2.3.6.1. Mod Security

2.3.6.2. IronBee

2.3.7. Riverbed

2.4. Software as a Service

2.4.1. Akamai

2.4.1.1. Kona

2.4.2. AlertLogic

2.4.3. CloudFlare

2.4.4. Incapsula

2.4.5. Qualys

3. End User Privilege Management

3.1. Viewfinity

4. Software as a Service

4.1. Google Apps

4.1.1. CloudLock

4.1.2. FiLink

5. Advanced Threat Detection/Prevention

5.1. Advanced Network Threat Protection

5.1.1. Runtime Emulation

5.1.1.1. ValidEDGE

5.1.1.2. General Dynamics

5.1.1.2.1. Fidelis Systems

5.1.1.3. Checkpoint Software

5.1.2. Advanced Threat Intelligence

5.1.2.1. LookingGlass

5.1.3. Virtual Execution Assessment

5.1.3.1. Cloud Based

5.1.3.1.1. Netwitness

5.1.3.1.2. CrowdStrike

5.1.4. Appliances

5.1.4.1. AhnLab

5.1.4.2. Damballa

5.1.4.3. FireEye

5.1.4.3.1. Malware Analysis Appliance

5.1.4.4. Lastline

5.1.4.5. ThreatTrack

5.1.5. Network Monitoring/Detection

5.1.5.1. Netwitness

5.1.5.2. Kindsight

5.1.5.3. Taasera

5.1.6. Exploit Technique Prevention Software

5.1.6.1. Cyvera

5.1.6.2. Microsoft

5.1.6.2.1. EMET

5.2. Appliance Based

5.2.1. AhnLab

5.2.2. CheckPoint Software

5.2.3. ContentKeeper

5.2.4. Cyphort

5.2.5. Damballa

5.2.6. FireEye

5.2.7. HBGary

5.2.8. LastLine

5.2.9. McAfee

5.2.10. Palo Alto Networks

5.2.11. RSA

5.2.11.1. Security Analytics (Formerly Netwitness)

5.2.11.1.1. Spectrum

5.2.12. Trend Micro

5.3. Malware Analysis

5.3.1. Malware Analysis as a Service

5.3.1.1. Free Services

5.3.1.1.1. Malwr

5.3.2. Software

5.3.2.1. Norman

5.3.2.1.1. Malware Analyzer G2

5.3.2.2. GFI

5.3.2.2.1. GFI Sandbox

5.3.2.3. Joesecurity

5.3.2.3.1. Joe Sandbox

5.3.3. Firewalls

5.3.3.1. Palo Alto Networks

5.3.3.2. CheckPoint Software

5.3.3.3. Fortinet

5.4. Endopoint Sandboxes and Virtualized Containers

5.4.1. Sandboxes

5.4.1.1. Panda

5.4.1.2. Norman

5.4.1.3. Sandboxie

5.4.1.4. Bitdefender

5.4.2. Virtualized Containers

5.4.2.1. Bromium

5.4.3. Type-0 Hypervisors

5.4.3.1. Lynxworks

5.4.3.2. Zirtu

5.5. Endpoint Threat Detection and Response

5.5.1. Access Data

5.5.1.1. CIRT

5.5.2. Carbon Black

5.5.3. Countertack

5.5.4. CrowdStrike

5.5.5. Cyvera

5.5.6. Guidance Software

5.5.6.1. Encase Cybersecurity

5.5.7. HBGary

5.5.8. Invincea

5.5.9. Mandiant

5.5.10. Triumfant

5.6. Network Behavior Analysis

5.6.1. Flow Analysis

5.6.1.1. Lancope

5.6.1.2. Arbor Networks

5.6.2. Network Traffic (Sniffers)

5.6.2.1. Arbor Networks

5.6.2.2. Lastline

5.6.2.3. Light Cyber

5.6.2.4. McAfee NBA

5.7. Security as a Service

5.7.1. Mail

5.7.1.1. Proofpoint

5.7.2. Malware Infection Monitoring Services

5.7.2.1. Lastline

5.7.2.1.1. Guardia

5.7.2.2. Qualys

5.7.2.3. Seculert

6. Governance, Risk and Compliance

6.1. Firewall Workflow,Modeling & Change Management

6.1.1. Firemon

6.1.2. Skybox

6.1.3. ManageEngine

6.1.4. Redseal Networks

6.1.5. Tufin

6.1.6. Checkpoint Software

6.2. eGRC

6.2.1. Software as a Service

6.2.1.1. Bwise

6.2.2. Software

6.2.2.1. Sword Achiever

6.2.2.2. BPS Resolver

6.2.2.3. Jade Software

6.2.2.4. Walters Kluwer Financial Services

6.2.2.5. SAI

6.2.2.6. Oracle

6.2.2.7. MetricStream

6.2.2.8. Nasdaq Bwise

6.2.2.9. SAP

6.2.2.10. RSA

6.2.2.10.1. Archer

6.2.2.11. OpenPages

6.2.2.12. MetricStream

6.2.2.13. IBM

6.2.2.13.1. Openpages

6.2.2.14. Thompson Reuters

6.2.2.15. Rsam

6.2.2.16. Mega

6.2.2.16.1. Mega Suite

6.2.2.17. Software AG

6.2.2.18. Protivity

6.2.2.19. CMO Compliance

6.2.2.20. Enablon

6.2.2.21. Cura Technologies

6.3. itGRCM

6.3.1. Allgress

6.3.1.1. Vulnerability Manager

6.3.1.2. Risk Analysis

6.3.1.3. Security and Compliance Assessment

6.3.1.4. Incident Management

6.3.1.5. Policy and Proceedures

6.3.2. Symantec

6.3.2.1. Control Compliance Suite

6.3.3. Modulo

6.3.4. Rsam

6.3.5. Agiliance

6.3.6. Brinqa

6.3.7. Nasdaq Bwise

6.3.8. ControlCase

6.3.9. EMC-RSA

6.3.10. Lumension Security

6.3.11. Microsoft

6.3.12. Telos

6.3.13. Software as a Service

6.3.13.1. SureCloud

6.4. Operational Risk Analytics

6.4.1. RiskIO

6.4.2. Skybox

6.4.3. Firemon

6.4.4. Redseal Networks

6.4.5. Algosec

6.4.6. Tufin

6.4.7. Solarwinds

6.4.8. IBM

6.4.8.1. Q1Radar Risk Manager

7. Security Information and Event Management (SIEM) & Log Management

7.1. Log Management

7.1.1. McAfee

7.1.1.1. McAfee Enterprise Log Manager

7.1.2. Tripwire

7.1.3. Splunk

7.1.4. LogRythm

7.2. SIEM

7.2.1. AlienVault

7.2.1.1. OSSIM

7.2.2. HP

7.2.2.1. Arcsight

7.2.3. IBM

7.2.3.1. Q1Radar

7.2.4. LogRythm

7.2.5. McAfee

7.2.5.1. NitroSecurity

7.2.6. Novell

7.2.6.1. Sentinel

7.2.7. RSA

7.2.7.1. Envision

7.2.8. Sensage

7.2.9. Solarwinds

7.2.10. Splunk

7.2.11. Tibco

7.2.11.1. Loglogic

7.2.12. eIQnetworks

8. Chip Layer Security

8.1. AMD

8.1.1. TPM

8.2. Cavium

8.2.1. Multi-Core Processors

8.3. Flow Processors

8.3.1. Netronome

8.4. Intel

8.4.1. TPM

8.4.2. Data Execution Protection

9. Fraud Prevention

9.1. Appliances

9.1.1. Silvertail Systems

9.2. Software

9.2.1. RSA (EMC)

9.2.2. Cisco (Formerly Trusteer)

9.3. Software as a Service

9.3.1. ThreatMetrix

9.3.2. X-Cart

9.3.3. MarkMonitor

9.3.4. iovation

10. Forensics & eDiscovery

10.1. Forensic Products

10.1.1. eDiscovery

10.1.1.1. Clearwell

10.1.1.2. Kazeon

10.1.1.3. Guidance Software

10.1.1.4. Access Data

10.1.1.5. Autonomy

10.1.1.6. kCura

10.1.1.7. FTI Technology

10.1.1.8. Barracuda Networks

10.1.2. Mobile Devices

10.1.2.1. Cellebrite

10.1.2.2. Paraben

10.1.2.3. Oxygen

10.1.3. Computing Systems

10.1.3.1. Guidance Software

10.1.3.2. Access Data

10.1.3.3. BlackBag

10.1.3.4. OSForensics

10.1.3.5. Xways Forensics

10.1.3.6. Cylance

10.1.4. Network Forensics

10.1.4.1. Access Data

10.1.4.2. BlueCoat

10.1.4.3. Cybertap

10.1.4.4. Endace

10.1.4.5. Fluke Networks

10.1.4.6. NetAgent

10.1.4.7. NetResec

10.1.4.8. NetScout

10.1.4.9. Niksun

10.1.4.10. Packetsled

10.1.4.11. RSA (EMC)

10.1.4.12. Riverbed

10.1.4.13. WildPackets

10.2. Forensics as a Service (FaaS)

10.3. Incident Response Legal Services

10.3.1. Information Law Group

10.4. eDiscovery Services

10.4.1. Robert Half

10.4.2. Advanced Discovery

11. Identity and Access Management (IAM)

11.1. Certificates

11.1.1. Symantec (Formerly VeriSign)

11.2. AD/Unix bridge

11.2.1. Centrify

11.3. Privileged account management (PAM)

11.3.1. BeyondTrust

11.3.2. Lieberman Software

11.3.3. Cyber Ark

11.4. Identity governance and administration

11.4.1. CA Technologies

11.4.2. IBM Security

11.4.3. Oracle

11.4.4. RSA (Aveksa)

11.5. Security as a Service

11.5.1. Identity and Access Management (IDaaS)

11.5.1.1. Symplifyed

11.5.1.2. Ping Identity

11.6. Secure USB dongles

11.6.1. IronKey

11.7. User Authentication

11.7.1. Tokens

11.7.1.1. OOB authentication

11.7.1.1.1. SMS

11.7.1.1.2. Voice

11.7.1.1.3. Push

11.7.1.1.4. Email

11.7.1.1.5. Social media

11.7.1.2. OTP tokens

11.7.1.2.1. OTP hardware tokens

11.7.1.2.2. OTP software tokens for smart phones

11.7.1.3. X.509 tokens

11.7.1.4. Other tokens

11.7.1.4.1. ANECT AS - ALUCID

11.7.2. Contextual authentication

11.7.3. KBA

11.7.4. Biometrics

11.7.4.1. Behavioral

11.7.4.1.1. Typing rhythm/keystroke dynamics

11.7.4.1.2. Voice recognition

11.7.4.2. Biological

11.7.4.2.1. Face recognition

11.7.4.2.2. Fingerprint

11.7.5. Wide-focus vendors

11.7.5.1. RSA

11.7.5.2. SafeNet

11.7.5.3. VASCO

11.7.5.4. CA Technologies

11.7.5.5. HID Global

11.7.5.6. Technology Nexus

11.7.5.7. Symantec

11.7.5.8. Entrust

11.8. Enterprise single sign-on (ESSO)

11.9. Web access management (WAM)

11.10. Federated SSO

11.11. Externalized authorization management (EAM)

11.11.1. Axiomatics

11.11.2. Dell Quest (BitKoo)

11.12. Access Management

11.12.1. CionSystems

12. Encryption/Tokenization

12.1. Cloud/SAAS Encryption

12.1.1. Appliances

12.1.1.1. Office365

12.1.1.1.1. Vaultive

12.1.1.1.2. FiLink

12.1.1.2. Ciphercloud

12.1.1.3. Afore Solutions

12.1.1.3.1. CloudLink VSA

12.1.1.4. Perspecsys

12.1.2. Software

12.1.2.1. BoxCryptor

12.1.2.2. SafeNet

12.1.2.2.1. SafeMonk

12.1.2.3. PrivateCore

12.1.2.4. Trend Micro

12.1.2.4.1. SecureCloud

12.1.3. Software as a Service

12.1.3.1. Trend Micro

12.1.3.1.1. SecureCloud

12.2. Data masking

12.2.1. Oracle

12.3. Database

12.3.1. SafeNet

12.3.2. Dark Matter Labs

12.3.3. Vormetric

12.4. File/Folder

12.4.1. WinMagic

12.4.1.1. SecureDoc

12.4.2. Symantec (PGP)

12.4.3. IBM

12.4.3.1. Mainframe

12.4.3.1.1. z10

12.4.4. Sophos

12.4.4.1. SafeGuard Enterprise (Utimaco)

12.4.5. Vormetric

12.5. Mobile Storage/USB

12.5.1. IronKey

12.6. Tokenization

12.6.1. Protegrity

12.7. Whole Disk

12.7.1. McAfee

12.7.2. Symantec (PGP)

12.7.3. CheckPoint Software

12.7.4. Encryption Management

12.7.4.1. Wave Systems

12.7.5. WinMagic

12.7.5.1. SecureDoc

12.7.6. Microsoft

12.7.6.1. Bitlocker

12.7.7. Sophos

12.7.7.1. SafeGuard Enterprise (Utimaco)

12.7.8. Trustwave

12.7.8.1. DataControl

12.7.9. Vormetric

13. Web/Email Protection

13.1. Secure Email Gateways

13.1.1. Bluecoat

13.1.2. Fortinet

13.1.3. McAfee

13.1.4. Sonicwall

13.1.5. Symantec

13.1.6. Trustwave

13.1.7. Websense

13.1.8. iBoss

13.2. Secure Web Gateways

13.2.1. Bluecoat

13.2.2. ContentKeeper

13.2.3. McAfee

13.2.4. Symantec

13.2.5. Trustwave

13.2.6. Websense

13.2.7. iBoss

13.3. Security as a Service

13.3.1. Web & Email SaaS

13.3.1.1. Appriver

13.3.1.2. Barracuda

13.3.1.3. Cisco

13.3.1.4. McAfee

13.3.1.5. Spamina

13.3.1.6. Symantec

13.3.1.7. Total Defense

13.3.1.8. Websense

13.3.1.9. Zscaler

13.3.2. Web Only

13.3.2.1. ContentKeeper

14. Data Loss Prevention (DLP)

14.1. Gateway

14.1.1. McAfee

14.1.2. Symantec

14.2. Host

14.2.1. McAfee

14.2.2. RSA

14.2.3. Symantec

14.2.4. Trustwave

14.3. Security as a Service

14.3.1. Consumer

14.3.1.1. Reputation.com

14.3.1.2. Social Fortress

14.3.1.3. PwnedList

14.3.2. Enterprise

14.3.2.1. Social Fortress

14.3.2.2. Google Apps

14.3.2.2.1. Cloudlock

15. Vulnerability Assessment/Management (VA/VM)

15.1. Managed Penetration Testing Services

15.1.1. WhiteHatSecurity

15.2. Penetration TestingSoftware

15.2.1. Core Security

15.2.2. Rapid7

15.2.2.1. Metasploit Pro

15.2.2.2. Metasploit Express

15.3. Software as a Service

15.3.1. Digital Defense

15.3.2. McAfee

15.3.3. Outpost24

15.3.4. Qualys

15.4. Network Vulnerability Assessment (On Premise)

15.4.1. Digital Defense

15.4.2. Fortinet

15.4.3. McAfee

15.4.3.1. McAfee Vulnerability Manager (Foundstone)

15.4.4. NSAuditor

15.4.5. Ncircle

15.4.6. Netasq

15.4.7. Outpost24

15.4.8. Qualys

15.4.9. Rapid 7

15.4.9.1. Nexspose

15.5. Web Application Security

15.5.1. Code Review Products

15.5.1.1. HP

15.5.1.2. IBM

15.5.2. Runtime Application Self Protection

15.5.2.1. Metaforic

15.5.2.2. Arxan

15.5.3. Scanning Services

15.5.3.1. High-Tech Bridge

15.5.3.2. McAfee Secure

15.5.3.3. WebSecurify

15.5.3.4. Qualys

15.5.3.5. WhiteHat

15.5.3.6. Controlscan

15.5.4. Scanning Software

15.5.4.1. Open Source

15.5.4.1.1. Arachni Scanner

15.5.4.1.2. Subgraph

15.5.4.1.3. W3af

15.5.4.1.4. Wapiti

15.5.4.1.5. Watcher

15.5.4.2. Commercial

15.5.4.2.1. Accunetix

15.5.4.2.2. BeyondTrust

15.5.4.2.3. Cenzic

15.5.4.2.4. HP

15.5.4.2.5. MavitunaSecurity

15.5.4.2.6. NTObjectives

15.5.4.2.7. Nstalker

15.5.4.2.8. Portswigger

15.5.4.2.9. Syhunt

15.6. Vulnerability Reporting/Tracking

15.6.1. Risk IO

15.7. Vulnerability Research

15.7.1. CSC

15.7.2. HP

15.7.2.1. DV Labs

15.7.3. HotWAN

15.7.4. McAfee

15.7.5. SecNiche Labs

15.7.6. Sourcefire VRT

15.7.7. Symantec

15.7.8. VRLSec

15.7.9. Vupen

16. Consulting

16.1. Application Security

16.1.1. Web

16.1.1.1. AppSec Consulting

16.1.1.2. Denim Group

16.1.2. Mobile

16.1.2.1. AppSec Consulting

16.1.2.2. Denim Group

16.2. Compliance

16.2.1. HIPAA

16.2.2. HITECH

16.2.3. ISO

16.2.4. PCI

16.2.4.1. WorldWide

16.2.4.1.1. Wipro

16.2.4.1.2. Dell Secureworks

16.2.4.1.3. Deloitte and Touche

16.2.4.1.4. EY

16.2.4.1.5. BT

16.2.4.1.6. PWC

16.2.4.2. Regional

16.2.4.2.1. North America

16.2.4.2.2. Latin America

16.2.4.2.3. EMEA

16.2.4.2.4. Asia Pacific

16.3. Governance

16.3.1. Accuvant

16.3.2. Fishnet Security

16.3.3. FOX-IT

16.4. Incident Response

16.4.1. Forensics

16.4.1.1. FOX-IT

16.4.1.2. PWC

16.4.1.3. Fishnet Security

16.4.1.4. EY

16.4.1.5. Deloitte

16.4.2. Digital Investigations

16.4.2.1. FOX-IT

16.4.2.2. Deloitte

16.4.2.3. EY

16.4.2.4. Fishnet Security

16.4.2.5. PWC

16.5. Penetration Testing

16.5.1. AppSec Consulting

16.5.2. Core Security

16.5.3. Element Digital Security

16.5.4. FOX-IT

16.5.5. Matasano Security

16.5.6. Rapid7

16.5.7. Secureworks

16.5.8. WhiteHat Security

16.6. Risk Management

16.6.1. Booz Allen Hamilton

16.6.2. Accuvant

16.6.3. Cloud Risks

16.6.4. On Premise Infrastructure

16.6.5. Business Risk

16.7. Security Program Development

16.7.1. Accuvant

16.7.2. Fishnet

16.7.3. FOX-IT

17. Virtual Private Networking (VPN)

17.1. IPSec VPN

17.1.1. Cisco

17.1.2. CheckPoint Software

17.1.3. Certes Networks

17.2. Layer 2 Encryption

17.2.1. Certes Networks

17.3. Layer 4 Encryption

17.3.1. Certes Networks

17.4. SSL VPN

17.4.1. Juniper

17.4.2. Cisco

17.4.3. Sonicwall

17.4.4. Barracuda Networks

17.4.5. Stonesoft

17.4.6. F5 Networks

17.4.7. Citrix

17.4.8. WatchGuard

17.4.9. NetGear

17.4.10. Array Networks

18. Endpoint Security Platforms (EPP)

18.1. Anti-Malware

18.1.1. North America

18.1.1.1. McAfee

18.1.1.2. MalwareBytes

18.1.1.3. Trend Micro

18.1.1.4. Symantec

18.1.1.5. Total Defense

18.1.2. China

18.1.2.1. Rising International Software

18.1.3. Russia

18.1.3.1. Kaspersky

18.1.4. United Kingdom

18.1.4.1. Sophos

18.1.5. Romania

18.1.5.1. Bitdefender

18.1.6. South Korean

18.1.6.1. BKAV

18.1.7. Czech Republic

18.1.7.1. Avast

18.1.8. Netherlands

18.1.8.1. AVG

18.2. Endpoint Intrusion Prevention

18.2.1. McAfee

18.2.2. Symantec

18.3. File Integrity Monitoring

18.3.1. Open Source

18.3.1.1. 1. AIDE

18.3.1.2. 2. Trend Micro

18.3.1.2.1. 1. OSSEC

18.3.1.3. 3. Samhain

18.3.1.4. 4. Osiris

18.3.1.5. 5. Integrit

18.3.1.6. 6. Tripwire

18.3.2. Commercial

18.3.2.1. Imperva

18.3.2.2. McAfee

18.3.2.3. Tripwire

18.4. Sandboxing/MicroVM

18.4.1. SandBoxie

18.4.2. Norman Sandbox

18.4.3. Bromium

19. Intelligence Services/Data Feeds

19.1. Anti-Spam

19.1.1. www.au.sorbs.net

19.2. IP Blacklists

19.2.1. SpamHaus

19.2.2. Team Cymru

19.2.3. Dshield

19.2.4. hosts-file.net

19.3. Malware Analysis/Blocklists

19.3.1. Malware Patrol

19.3.2. hosts-file.net

19.3.3. zeustracker.abuse.ch

19.3.4. websecurityguard.com

19.3.5. SpamHaus

19.3.6. Botnets

19.3.6.1. spyeyetracker.abuse.ch

19.3.7. MalwareDomainList.com

19.3.8. ThreatGrid

19.3.9. VirusTotal

19.3.10. emergingthreats.net

19.3.11. www.malwareblacklist.com/

19.3.12. www.malware.com.br/lists.shtml

19.3.13. Team Cymru

19.4. Reputation Feeds

19.4.1. Symantec

19.4.1.1. Reputation Insight

19.4.2. McAfee

19.4.2.1. Global Threat Intelligence (GTI)

19.4.3. Trend Micro

19.4.3.1. Smart Protection Network

19.5. Threat Intelligence Services

19.5.1. CrowdStrike

19.5.2. Dell

19.5.2.1. Counter Threat Unit - CTU

19.5.3. FOX-IT

19.5.4. Lookingglass Cyber Solutions

19.5.5. McAfee

19.5.6. Proofpoint

19.5.7. Security Starfish

19.5.8. Team Cymru

19.5.9. Verisign

19.6. URL Lists

19.6.1. Shallalist

19.6.2. hosts-file.net

19.6.3. zvelo

19.6.4. http://malc0de.com/database/

19.7. Web Malware Monitoring

19.7.1. evuln.com

19.7.2. Qualys

20. Channel/Logistics/Supply Chain/OEMs/Product Testing/Marketing

20.1. Cloud Service Brokerages

20.1.1. Jamcracker

20.1.2. Gravitant

20.1.3. StandingCloud

20.1.4. Bitnami

20.2. Distribution/Channel

20.2.1. VARs, Resellers

20.2.1.1. China

20.2.1.1.1. Rainbow Tech

20.2.1.1.2. Broad Sky Innovation Technology

20.2.1.1.3. Qast Software Group

20.2.1.2. Eastern Europe

20.2.1.2.1. CZECH Republic

20.2.1.2.2. Poland

20.2.1.3. Emerging Asia Pacific

20.2.1.3.1. India

20.2.1.3.2. Indonesia

20.2.1.3.3. Malasia

20.2.1.3.4. Thailand

20.2.1.3.5. Philippines

20.2.1.4. Eurasia

20.2.1.4.1. Russian Federation

20.2.1.4.2. Kazakhstan

20.2.1.4.3. Ukraine

20.2.1.5. Latin America

20.2.1.5.1. Brazil

20.2.1.5.2. Chile

20.2.1.5.3. Columbia

20.2.1.5.4. Costa Rica

20.2.1.5.5. Ecuador

20.2.1.5.6. Bolivia

20.2.1.5.7. Venezuela

20.2.1.5.8. Cuba

20.2.1.5.9. Argentina

20.2.1.5.10. Buenos Aires

20.2.1.5.11. Mexico

20.2.1.5.12. Peru

20.2.1.6. Mature Asia Pacific

20.2.1.6.1. Australia

20.2.1.6.2. Japan

20.2.1.6.3. Singapore

20.2.1.7. Middle East and North Africa

20.2.1.7.1. Turkey

20.2.1.7.2. Israel

20.2.1.7.3. Saudi Arabia

20.2.1.7.4. South Africa

20.2.1.7.5. India

20.2.1.7.6. United Arab Emirates

20.2.1.8. North America

20.2.1.8.1. United States

20.2.1.8.2. Canada

20.2.1.9. Sub-Sahara Africa

20.2.1.9.1. South Africa

20.2.1.10. Western Europe

20.2.1.10.1. France

20.2.1.10.2. Germany

20.2.1.10.3. Italy

20.2.1.10.4. Netherlands

20.2.1.10.5. Spain

20.2.1.10.6. United Kingdom

20.2.1.11. WorldWide

20.2.1.11.1. AT&T

20.2.1.11.2. Verizon Business

20.2.2. Distributors

20.2.2.1. China

20.2.2.1.1. Huagai

20.2.2.1.2. Ecschina

20.2.2.1.3. B & Data Technology Co. Ltd.

20.2.2.1.4. Beijing Advazone Electronic Limited Comp

20.2.2.1.5. Beijing HolyZone Technology Co.,Ltd.

20.2.2.1.6. Digital China Technology LTD.

20.2.2.1.7. M.Tech (Shanghai) Co., Ltd.

20.2.2.1.8. Sky Faith International Enterprise

20.2.2.2. Emerging Asia Pacific

20.2.2.2.1. India

20.2.2.2.2. Indonesia

20.2.2.3. Eurasia

20.2.2.3.1. Russian Federation

20.2.2.3.2. Kazakhstan

20.2.2.4. Mature Asia Pacific

20.2.2.4.1. Singapore

20.2.2.4.2. Japan

20.2.2.4.3. South Korea

20.2.2.5. Middle East and South Africa

20.2.2.5.1. United Arab Emirates

20.2.2.6. North America

20.2.2.6.1. Canada

20.2.2.6.2. United States

20.2.2.7. Sub-Sahara Africa

20.2.2.7.1. South Africa

20.2.2.8. Worldwide

20.2.2.8.1. Ingram Micro

20.2.2.8.2. Tech Data

20.2.2.8.3. Westcon

20.3. Managed Service Enablement

20.3.1. Chartec

20.3.2. Jamcracker

20.4. OEM Manufacturers/Integrators

20.4.1. Appliances

20.4.1.1. Netronome

20.4.1.2. Lanner

20.4.1.3. Caswell

20.4.1.4. Portwell

20.4.2. Appliance Integrators

20.4.2.1. Dan-el Technologies Ltd.

20.4.2.2. Advantech

20.4.3. Chips

20.4.3.1. Cavium

20.4.3.2. Netronome

20.4.4. Cards

20.4.4.1. Netronome

20.4.5. Encryption Acceleration

20.4.5.1. Intel

20.4.5.1.1. VPRO

20.4.5.2. Safenet

20.4.5.2.1. Luna PCI

20.4.6. Software

20.4.6.1. Social Network Content Control

20.4.6.1.1. NetboxBlue

20.4.6.2. URL Categorization

20.4.6.2.1. Zvelo

20.4.6.3. Advanced Threat Protection - Virtual Execution Engines

20.4.6.3.1. ContentKeeper

20.4.6.4. Image Recognition

20.4.6.4.1. Image Analyzer

20.4.6.5. AntiMalware

20.4.6.5.1. Commtouch

20.4.6.6. Encryption

20.4.6.6.1. Transport

20.5. Product Testing

20.5.1. United Kingdom

20.5.1.1. Dennis Technology Labs

20.5.2. Generic Product Testing

20.5.2.1. North America

20.5.2.1.1. NIST

20.5.2.1.2. ICSA Labs (Division of Verizon)

20.5.2.1.3. NSS Labs

20.5.2.1.4. CGI

20.5.3. Sponsored Product Review/Testing

20.5.3.1. Network Testing Labs

20.5.3.2. West Coast Labs

20.5.3.3. Miercom

20.5.3.4. NSS Labs

20.5.4. Cryptographic Testing

20.5.4.1. NIST

20.5.4.1.1. FIPS 140-2

20.5.5. Anti-Malware Testing

20.5.5.1. VirusBTN

20.5.5.2. Av-Comparatives

20.5.5.3. AV-Test

20.6. Security Product Testing/Evaluation

20.6.1. Product Certification/Assurance

20.6.1.1. ICSA Labs

20.6.1.2. Common Criteria for Information Technology Security Evaluation (CCITSE)

20.6.1.2.1. EAL1 through EAL7

20.7. User Interface Consulting/Development

20.7.1. BlinkUX

20.7.2. Marketing

20.7.2.1. Agencies

20.7.2.1.1. Toolbox Studios

20.7.2.2. Market Destinations (Sites)

20.7.2.2.1. SCmagazine

20.7.2.2.2. Hak5

20.7.2.2.3. CRN

21. Managed Security Services

21.1. Indirect Providers

21.1.1. Asia Pacific

21.1.1.1. Singapore

21.1.1.1.1. e-Cop

21.1.1.1.2. NTT Singapore

21.1.1.1.3. Singtel

21.1.1.1.4. NCS Group

21.1.1.2. China

21.1.1.2.1. Hong Kong

21.1.1.3. Australia

21.1.2. Europe

21.1.2.1. BT Global Services

21.1.2.2. Dell SecureWorks

21.1.2.3. Germany

21.1.2.3.1. Link11 GMBH

21.1.2.3.2. IPsoft

21.1.2.4. HP

21.1.2.5. Integralis

21.1.2.6. Open Systems

21.1.2.7. Open Systems

21.1.2.8. Orange Business Services

21.1.2.9. Symantec

21.1.2.10. T-Systems

21.1.2.11. Tata Communications

21.1.2.12. Telefonica

21.1.2.12.1. DDoS Protection Service

21.1.2.12.2. Email Encryption

21.1.2.12.3. Email Security Gateway

21.1.2.12.4. Firewall Management

21.1.2.12.5. IAM

21.1.2.12.6. Intrusion Detection

21.1.2.12.7. Intrusion Prevention

21.1.2.12.8. Log Management

21.1.2.12.9. SIEM

21.1.2.12.10. Vulnerability Assessment

21.1.2.12.11. Web Security Gateway

21.1.2.12.12. Anti-Fraud

21.1.2.13. Verizon Business

21.1.2.13.1. Anti-DDoS

21.1.2.13.2. Email Security

21.1.2.13.3. Endpoint Protection

21.1.2.13.4. Firewall Management

21.1.2.13.5. Intrusion Detection

21.1.2.13.6. Intrusion Prevention

21.1.2.13.7. SIEM

21.1.2.13.8. Vulnerability Assessment

21.1.2.13.9. Web Security

21.1.2.14. Wipro

21.1.2.14.1. Email Security Gateway

21.1.2.14.2. Endpoint Security

21.1.2.14.3. Firewall Management

21.1.2.14.4. Fraud Management/Anti-Money Laundering

21.1.2.14.5. GRC

21.1.2.14.6. IAM

21.1.2.14.7. Intrusion Detection

21.1.2.14.8. Intrusion Prevention

21.1.2.14.9. SIEM

21.1.2.14.10. User Access Management

21.1.2.14.11. Web Security Gateway

21.1.3. Global Providers

21.1.3.1. AT&T

21.1.3.1.1. DDos Protection

21.1.3.1.2. Email/Data Encryption Services

21.1.3.1.3. Endpoint Anti-Virus

21.1.3.1.4. Endpoint Patch Management

21.1.3.1.5. Endpoint Policy Compliance

21.1.3.1.6. Mobile Device Security

21.1.3.1.7. Secure Email Gateway

21.1.3.1.8. Security Device Management

21.1.3.1.9. Web Application Firewall

21.1.3.1.10. Web Gateway (URL & Malware Filtering)

21.1.3.2. BT

21.1.3.3. Dell Secureworks

21.1.3.3.1. Advanced Malware Protection

21.1.3.3.2. Email Security Gateway

21.1.3.3.3. Firewall Management

21.1.3.3.4. Host IPS

21.1.3.3.5. IDS/IPS

21.1.3.3.6. Log Management

21.1.3.3.7. Log Retention

21.1.3.3.8. SIEM

21.1.3.3.9. Threat Intelligence

21.1.3.3.10. Unified Threat Management

21.1.3.3.11. Vulnerability Assessment

21.1.3.3.12. Web Application Firewall

21.1.3.3.13. Web Application Vulnerability Assessment

21.1.3.4. Dimension Data

21.1.3.5. HP

21.1.3.5.1. Access Managment

21.1.3.5.2. Data Loss Prevention

21.1.3.5.3. Email Security Gateway

21.1.3.5.4. Endpoint Encryption

21.1.3.5.5. Endpoint Protection

21.1.3.5.6. Intrusion Detection

21.1.3.5.7. Intrusion Prevention

21.1.3.5.8. Managed Incident Response

21.1.3.5.9. Remote Access Management

21.1.3.5.10. SIEM

21.1.3.5.11. Vulnerability Assessment

21.1.3.5.12. Web Application Vulnerability Assessment

21.1.3.5.13. Web Security Gateway

21.1.3.6. IBM

21.1.3.6.1. Email Security Gateway

21.1.3.6.2. Endpoint Patch Management

21.1.3.6.3. Endpoint Policy Management

21.1.3.6.4. Endpoint Protection

21.1.3.6.5. Firewall Management

21.1.3.6.6. IAM

21.1.3.6.7. Intrusion Detection

21.1.3.6.8. Intrusion Prevention

21.1.3.6.9. Log Management

21.1.3.6.10. Mobile Device Security

21.1.3.6.11. SIEM

21.1.3.6.12. Unified Threat Management

21.1.3.6.13. Vulnerability Assessment

21.1.3.6.14. Web Security Gateway

21.1.3.6.15. Web Vulnerability Assessment

21.1.3.7. Telstra

21.1.3.8. Verizon Business

21.1.3.8.1. Anti-DDoS

21.1.3.8.2. Email Security

21.1.3.8.3. Endpoint Protection

21.1.3.8.4. Firewall Management

21.1.3.8.5. Intrusion Detection

21.1.3.8.6. Intrusion Prevention

21.1.3.8.7. SIEM

21.1.3.8.8. Vulnerability Assessment

21.1.3.8.9. Web Security

21.1.4. Middle East and North Africa

21.1.4.1. Saudi Arabia

21.1.4.2. United Arab Emirates

21.1.4.2.1. Du Telecom

21.1.5. North America

21.1.5.1. Canada

21.1.5.1.1. Above Security

21.1.5.1.2. Bell Canada

21.1.5.1.3. OneStone (Formerly Seccuris)

21.1.5.1.4. EWA

21.1.5.1.5. SentryMetrics

21.1.5.1.6. Netpulse

21.1.5.2. United States

21.1.5.2.1. AT&T

21.1.5.2.2. Alert Logic

21.1.5.2.3. Allstream

21.1.5.2.4. CGI

21.1.5.2.5. CSC

21.1.5.2.6. CenturyLink- Savvis

21.1.5.2.7. Clone Systems

21.1.5.2.8. Compucom Systems

21.1.5.2.9. Dell Secureworks

21.1.5.2.10. HCL Technologies

21.1.5.2.11. HP

21.1.5.2.12. IBM

21.1.5.2.13. Megapath

21.1.5.2.14. Nuspire Networks

21.1.5.2.15. SAIC

21.1.5.2.16. Secure Designs

21.1.5.2.17. SilverSky (Formerly Stillsecure/Perimeter esecurity)

21.1.5.2.18. Solutionary

21.1.5.2.19. Sword and Shield

21.1.5.2.20. Symantec

21.1.5.2.21. Trustwave

21.1.5.2.22. Verizon Business

21.1.5.2.23. Wipro

21.2. Direct Tech Providers Managed Security

21.2.1. Asia Pacific

21.2.1.1. Australia

21.2.1.2. China

21.2.1.2.1. NSFOCUS

21.2.1.3. Singapore

21.2.2. Europe

21.2.3. Global Providers

21.2.4. Middle East and North Africa

21.2.4.1. Saudi Arabia

21.2.4.2. United Arab Emirates

21.2.5. North America

21.2.5.1. United States

21.2.5.1.1. NSFOCUS

21.2.5.1.2. Check Point Software

22. Database Security

22.1. Database Audit and Protection

22.1.1. Application Security, Inc

22.1.2. BeyondTrust

22.1.3. Fortinet

22.1.4. GreenSQL

22.1.5. IBM

22.1.6. Imperva

22.1.7. McAfee

22.1.8. Mentis Software

22.1.9. Oracle Corp

22.1.10. PentaSecurity

22.1.11. Warevalley

23. Network Security

23.1. Denial of Service Protection

23.1.1. Appliances

23.1.1.1. Arbor Networks

23.1.1.1.1. Prevail APS

23.1.1.2. Check Point Software

23.1.1.2.1. DDos Protector

23.1.1.3. Corero

23.1.1.4. Fortinet

23.1.1.5. Genie Networks

23.1.1.5.1. ATM Appliances

23.1.1.6. NSFOCUS

23.1.1.7. Radware

23.1.2. Security as a Service

23.1.2.1. Akamai

23.1.2.2. Black Lotus

23.1.2.3. Cloudflare

23.1.2.4. Incapsula

23.1.2.5. Link11

23.1.2.6. Prolexic

23.1.2.7. Neustar

23.1.2.8. Verisign

23.1.3. Clean Pipe Services

23.1.3.1. AT&T

23.1.3.2. Verizon

23.2. Network Access Control (NAC)

23.2.1. Host Based

23.2.1.1. Symantec

23.2.1.2. McAfee

23.2.2. Network Based

23.2.2.1. Forescout

23.2.2.2. Cisco

23.2.2.3. Bradford Networks

23.2.2.4. Milton Security Group

23.3. Network Firewalls

23.3.1. Enterprise Firewalls

23.3.1.1. Next Generation Firewalls

23.3.1.1.1. Fortinet

23.3.1.1.2. Palo Alto Networks

23.3.1.1.3. CheckPoint Software

23.3.1.2. Stateful Inspection - Traditional Firewalls

23.3.1.2.1. Cisco

23.3.1.2.2. Meraki

23.3.1.2.3. HP

23.3.1.2.4. Huawei

23.3.2. Open Source Based

23.3.2.1. IPchains

23.3.2.2. Untangle

23.3.3. Router Firewalls

23.4. Network Intrusion Prevention

23.4.1. CheckPoint

23.4.2. HP

23.4.2.1. TippingPoint

23.4.3. IBM

23.4.4. McAfee

23.4.5. Sourcefire

23.5. Unified Threat Management

23.5.1. CheckPoint

23.5.2. Cisco

23.5.3. Clavister

23.5.4. Fortinet

23.5.5. Hillstone Networks

23.5.6. Sonicwall

23.5.7. Sophos/Astaro

23.5.8. Trustwave

23.5.9. Untangle

23.5.10. WatchGuard