Managed Security Services

Começar. É Gratuito
ou inscrever-se com seu endereço de e-mail
Managed Security Services por Mind Map: Managed Security Services

1. Provider-Direct Managed Security

1.1. Asia Pacific

1.1.1. Australia

1.1.2. China

1.1.2.1. NSFOCUS

1.1.3. Singapore

1.2. Europe

1.2.1. GoGrid

1.2.1.1. Compliance Reporting (PCI, HIPAA)

1.2.1.2. Host IDS

1.2.1.3. Log Management

1.2.1.4. SIEM

1.2.1.5. Vulnerability Assessment

1.2.2. RedScan

1.3. Global Providers

1.3.1. Symantec

1.4. Latin America

1.4.1. Spain

1.4.1.1. Entelgy

1.4.2. Brazil

1.4.2.1. Entelgy

1.4.3. Chile

1.4.3.1. Entelgy

1.4.4. Columbia

1.4.4.1. Entelgy

1.4.5. Peru

1.4.5.1. Entelgy

1.4.6. Mexico

1.4.6.1. Entelgy

1.5. Middle East and North Africa

1.5.1. Saudi Arabia

1.5.2. United Arab Emirates

1.6. North America

1.6.1. United States

1.6.1.1. Binary Defense

1.6.1.1.1. Endpoint Detection and Response

1.6.1.2. Carbon Black

1.6.1.2.1. Endpoint Detection and Response

1.6.1.3. Check Point Software

1.6.1.3.1. Next Generation Firewall

1.6.1.3.2. Unified Threat Management

1.6.1.4. CyberReason

1.6.1.4.1. Endpoint Detection and Response

1.6.1.5. Digital Guardian

1.6.1.5.1. Endpoint Detection and Response

1.6.1.6. FireEye

1.6.1.6.1. Endpoint Detection and Response

1.6.1.6.2. Incident Response

1.6.1.6.3. Network Sandboxing

1.6.1.6.4. Threat Intelligence

1.6.1.7. GoGrid

1.6.1.7.1. Compliance Reporting (PCI, HIPAA)

1.6.1.7.2. Host IDS

1.6.1.7.3. Log Management

1.6.1.7.4. SIEM

1.6.1.7.5. Vulnerability Assessment

1.6.1.8. Network Box

1.6.1.8.1. Unified Threat Management

1.6.1.8.2. Anti-DDoS

1.6.1.8.3. Web Application Firewall

1.6.1.9. NSFOCUS

1.6.1.9.1. Denial of Service Appliances

1.6.1.9.2. Vulnerability Assessment

1.6.1.9.3. Web Application Firewall

1.6.1.10. Rapid7

1.6.1.10.1. Rapid7 Analytic Response

2. General MSS Providers

2.1. Emerging Asia Pacific

2.1.1. India

2.1.1.1. CSS Corp PVT

2.1.1.1.1. Firewall Management

2.1.1.1.2. Log Management

2.1.1.1.3. SIEM

2.1.1.1.4. Intrusion Prevention

2.1.1.1.5. Authentication Management

2.1.1.1.6. Web Application Firewalls

2.1.1.1.7. Vulnerability Management

2.1.1.1.8. Endpoint Protection

2.1.1.2. Happiest Minds

2.1.1.2.1. Advanced Malware Protection

2.1.1.2.2. Application Activity Monitoring

2.1.1.2.3. Compliance Reporting

2.1.1.2.4. Database Activity Monitoring

2.1.1.2.5. File Integrity Monitoring

2.1.1.2.6. Log Management

2.1.1.2.7. Managed DLP

2.1.1.2.8. Network Forensics

2.1.1.2.9. SIEM

2.1.1.2.10. Unified Threat Management

2.1.1.2.11. Vulnerability Assessment

2.1.1.3. SunGard Availability Services

2.1.1.3.1. Firewalls

2.1.1.3.2. IAM

2.1.1.3.3. Intrusion Prevention

2.1.1.3.4. SIEM

2.1.1.3.5. Unified Threat Management

2.1.1.3.6. VPN

2.1.1.3.7. Web Application Firewall

2.1.1.4. Ecomnets India PVT. LTD

2.1.1.4.1. Compliance

2.1.1.4.2. Firewalls

2.1.1.4.3. Intrusion Prevention

2.1.1.4.4. Monitoring Services

2.1.1.4.5. Vulnerability Management

2.1.2. Malasia

2.1.2.1. Vigilant Asia

2.2. Europe

2.2.1. BT Global Services

2.2.2. Dell SecureWorks

2.2.3. Germany

2.2.3.1. Link11 GMBH

2.2.3.2. IPsoft

2.2.4. HP

2.2.5. Happiest Minds

2.2.5.1. Advanced Malware Protection

2.2.5.2. Application Activity Monitoring

2.2.5.3. Compliance Reporting

2.2.5.4. Database Activity Monitoring

2.2.5.5. File Integrity Monitoring

2.2.5.6. Log Management

2.2.5.7. Managed DLP

2.2.5.8. Network Forensics

2.2.5.9. SIEM

2.2.5.10. Unified Threat Management

2.2.5.11. Vulnerability Assessment

2.2.6. Integralis

2.2.7. Navisite

2.2.7.1. Mobile Device Management

2.2.8. Open Systems

2.2.9. Open Systems

2.2.10. Orange Business Services

2.2.11. SecureData

2.2.11.1. Firewall

2.2.11.2. IDS/IPS

2.2.11.3. SIEM

2.2.11.4. Data Loss Prevention

2.2.11.5. Secure Web Gateway

2.2.11.6. Secure Email Gateway

2.2.11.7. VPN/Remote Access

2.2.12. SunGard Availability Services

2.2.12.1. Firewalls

2.2.12.2. IAM

2.2.12.3. Intrusion Prevention

2.2.12.4. SIEM

2.2.12.5. Unified Threat Management

2.2.12.6. VPN

2.2.12.7. Web Application Firewall

2.2.13. Symantec

2.2.14. T-Systems

2.2.15. Tata Communications

2.2.16. Telefonica

2.2.16.1. DDoS Protection Service

2.2.16.2. Email Encryption

2.2.16.3. Email Security Gateway

2.2.16.4. Firewall Management

2.2.16.5. IAM

2.2.16.6. Intrusion Detection

2.2.16.7. Intrusion Prevention

2.2.16.8. Log Management

2.2.16.9. SIEM

2.2.16.10. Vulnerability Assessment

2.2.16.11. Web Security Gateway

2.2.16.12. Anti-Fraud

2.2.17. Verizon Business

2.2.17.1. Anti-DDoS

2.2.17.2. Email Security

2.2.17.3. Endpoint Protection

2.2.17.4. Firewall Management

2.2.17.5. Intrusion Detection

2.2.17.6. Intrusion Prevention

2.2.17.7. SIEM

2.2.17.8. Vulnerability Assessment

2.2.17.9. Web Security

2.2.18. Wipro

2.2.18.1. Email Security Gateway

2.2.18.2. Endpoint Security

2.2.18.3. Firewall Management

2.2.18.4. Fraud Management/Anti-Money Laundering

2.2.18.5. GRC

2.2.18.6. IAM

2.2.18.7. Intrusion Detection

2.2.18.8. Intrusion Prevention

2.2.18.9. SIEM

2.2.18.10. User Access Management

2.2.18.11. Web Security Gateway

2.2.19. United Kingdom

2.2.19.1. RedScan

2.3. Global Providers

2.3.1. AT&T

2.3.1.1. DDos Protection

2.3.1.2. Email/Data Encryption Services

2.3.1.3. Endpoint Anti-Virus

2.3.1.4. Endpoint Patch Management

2.3.1.5. Endpoint Policy Compliance

2.3.1.6. Mobile Device Security

2.3.1.7. Secure Email Gateway

2.3.1.8. Security Device Management

2.3.1.9. Web Application Firewall

2.3.1.10. Web Gateway (URL & Malware Filtering)

2.3.2. BEW Global

2.3.2.1. Data Loss Prevention

2.3.2.2. Web Security Gateway

2.3.2.3. Email Security Gateway

2.3.2.4. SIEM

2.3.2.5. Vulnerability Assessment

2.3.3. BT

2.3.4. Dell Secureworks

2.3.4.1. Advanced Malware Protection

2.3.4.2. Email Security Gateway

2.3.4.3. Firewall Management

2.3.4.4. Host IPS

2.3.4.5. IDS/IPS

2.3.4.6. Log Management

2.3.4.7. Log Retention

2.3.4.8. SIEM

2.3.4.9. Threat Intelligence

2.3.4.10. Unified Threat Management

2.3.4.10.1. Fortinet Preference

2.3.4.11. Vulnerability Assessment

2.3.4.12. Web Application Firewall

2.3.4.13. Web Application Vulnerability Assessment

2.3.5. Dimension Data

2.3.6. HP

2.3.6.1. Access Managment

2.3.6.2. Data Loss Prevention

2.3.6.3. Email Security Gateway

2.3.6.4. Endpoint Encryption

2.3.6.5. Endpoint Protection

2.3.6.6. Intrusion Detection

2.3.6.7. Intrusion Prevention

2.3.6.8. Managed Incident Response

2.3.6.9. Remote Access Management

2.3.6.10. SIEM

2.3.6.11. Vulnerability Assessment

2.3.6.12. Web Application Vulnerability Assessment

2.3.6.13. Web Security Gateway

2.3.7. IBM

2.3.7.1. Email Security Gateway

2.3.7.2. Endpoint Patch Management

2.3.7.3. Endpoint Policy Management

2.3.7.4. Endpoint Protection

2.3.7.5. Firewall Management

2.3.7.6. IAM

2.3.7.7. Intrusion Detection

2.3.7.8. Intrusion Prevention

2.3.7.9. Log Management

2.3.7.10. Mobile Device Security

2.3.7.11. SIEM

2.3.7.12. Unified Threat Management

2.3.7.13. Vulnerability Assessment

2.3.7.14. Web Security Gateway

2.3.7.15. Web Vulnerability Assessment

2.3.8. Proficio

2.3.8.1. Email Security

2.3.8.2. Firewall Management

2.3.8.3. Incident Response

2.3.8.4. Log Management

2.3.8.5. Privileged Account Management

2.3.8.6. Regulatory and Polcy Compliance

2.3.8.7. SIEM

2.3.8.8. SOC Services

2.3.8.9. Vulnerability Assessment

2.3.8.10. Web Security

2.3.9. Tech Mahindra

2.3.9.1. Email Security

2.3.9.2. Endpoint Protection

2.3.9.3. Firewall Management

2.3.9.4. Identity and Access Management

2.3.9.5. Intrusion Detection

2.3.9.6. Intrusion Prevention

2.3.9.7. Log Management

2.3.9.8. SIEM

2.3.9.9. SOC Services

2.3.9.10. Vulnerability Assessment

2.3.9.11. Web Security

2.3.10. Telstra

2.3.11. Verizon Business

2.3.11.1. Anti-DDoS

2.3.11.2. Email Security

2.3.11.3. Endpoint Protection

2.3.11.4. Firewall Management

2.3.11.5. Intrusion Detection

2.3.11.6. Intrusion Prevention

2.3.11.7. SIEM

2.3.11.8. Vulnerability Assessment

2.3.11.9. Web Security

2.4. Greater China

2.4.1. Hong Kong

2.4.1.1. Network Box

2.4.1.2. Netswitch

2.4.1.2.1. Advanced Threat Detection Appliances

2.4.1.2.2. Security Operations Center

2.4.1.2.3. Incident Response and Administration

2.4.1.2.4. Firewall Management

2.4.1.2.5. Intrusion Prevention

2.4.1.2.6. Data Analytics

2.4.1.2.7. Data Loss Prevention

2.4.1.2.8. Endpoint Detection and Response

2.4.1.2.9. Cloud Access Security Broker Management

2.4.1.2.10. Vulnerability Management

2.4.2. BEW Global

2.4.2.1. Data Loss Prevention

2.4.2.2. Web Security Gateway

2.4.2.3. Email Security Gateway

2.4.2.4. SIEM

2.4.2.5. Vulnerability Assessment

2.4.3. Beijing

2.4.3.1. Netswitch

2.4.3.1.1. Advanced Threat Detection Appliances

2.4.3.1.2. Security Operations Center

2.4.3.1.3. Incident Response and Administration

2.4.3.1.4. Firewall Management

2.4.3.1.5. Intrusion Prevention

2.4.3.1.6. Data Analytics

2.4.3.1.7. Data Loss Prevention

2.4.3.1.8. Endpoint Detection and Response

2.4.3.1.9. Cloud Access Security Broker Management

2.4.3.1.10. Vulnerability Management

2.4.4. Shanghai

2.4.4.1. Shanghai Data Solution Co., Ltd

2.5. Latin America

2.5.1. Brazil

2.5.1.1. Arcon

2.5.1.2. Entelgy

2.5.1.3. Netcentrics

2.5.1.4. RealProtect

2.5.1.5. UOL Diveo

2.6. Mature Asia Pacific

2.6.1. Australia

2.6.1.1. Tesserent

2.6.1.2. Verizon

2.6.2. Singapore

2.6.2.1. Quann

2.6.2.1.1. Database Integrity Monitoring & Remediation

2.6.2.1.2. Endpoint Patch Mangement

2.6.2.1.3. File Integrity Monitoring & Remediation

2.6.2.1.4. Intrusion Detection

2.6.2.1.5. Log Management

2.6.2.1.6. SIEM

2.6.2.1.7. Vulnerability Assesment

2.6.2.1.8. Website Integrity Monitoring

2.6.2.2. NTT Singapore

2.6.2.2.1. Application Profiling

2.6.2.2.2. Data Loss Prevention

2.6.2.2.3. Endpoint Protection

2.6.2.2.4. Firewall Management

2.6.2.2.5. Intrusion Detection

2.6.2.2.6. Intrusion Prevention

2.6.2.2.7. Network Traffic Profiling

2.6.2.2.8. Secure Web Gateway

2.6.2.2.9. Unified Threat Management

2.6.2.2.10. Virtual Firewall Management

2.6.2.2.11. Vulnerability Assessment

2.6.2.2.12. Web Application Firewalls

2.6.2.3. Happiest Minds

2.6.2.3.1. Advanced Malware Protection

2.6.2.3.2. Application Activity Monitoring

2.6.2.3.3. Compliance Reporting

2.6.2.3.4. Database Activity Monitoring

2.6.2.3.5. File Integrity Monitoring

2.6.2.3.6. Log Management

2.6.2.3.7. Network Forensics

2.6.2.3.8. SIEM

2.6.2.3.9. Unified Threat Management

2.6.2.3.10. Vulnerability Assessment

2.6.2.4. Singtel

2.6.2.4.1. Endpoint Protection

2.6.2.4.2. Firewall Management

2.6.2.4.3. Intrusion Detection

2.6.2.4.4. Intrusion Prevention

2.6.2.4.5. SIEM

2.6.2.4.6. Unified Threat Management

2.6.2.4.7. Web Security Gateway

2.6.2.5. NCS Group

2.6.2.5.1. Endpoint Patch Management

2.6.2.5.2. Endpoint Policy Management

2.6.2.5.3. Firewall Management

2.6.2.5.4. Insider Threat Monitoring

2.6.2.5.5. Intrusion Detection

2.6.2.5.6. Intrusion Prevention

2.6.2.5.7. SCADA Monitoring

2.6.2.5.8. SIEM

2.6.2.5.9. Unified Threat Management

2.7. Middle East and North Africa

2.7.1. Saudi Arabia

2.7.2. United Arab Emirates

2.7.2.1. Du Telecom

2.7.2.1.1. DDOS

2.7.2.1.2. VPN

2.7.2.1.3. Mobile Device Management

2.7.2.1.4. Vulnerability Management

2.7.2.1.5. Compliance Management

2.7.2.2. Tata Communications

2.7.2.3. Dell Secureworks

2.7.2.4. Dimension Data

2.8. North America

2.8.1. Canada

2.8.1.1. Above Security

2.8.1.1.1. Intrusion Detection

2.8.1.1.2. Intrusion Prevention

2.8.1.1.3. Log Management

2.8.1.1.4. SIEM

2.8.1.1.5. Vulnerability Assessment

2.8.1.2. Bell Canada

2.8.1.2.1. Authentication

2.8.1.2.2. Firewall Management

2.8.1.2.3. Intrusion Detection

2.8.1.2.4. Intrusion Prevention

2.8.1.2.5. Secure Mail Gateway

2.8.1.2.6. Secure Web Gateway

2.8.1.2.7. VPN

2.8.1.3. EWA

2.8.1.3.1. Firewall Management

2.8.1.3.2. Intrusion Detection

2.8.1.3.3. Intrusion Prevention

2.8.1.3.4. Managed PKI

2.8.1.3.5. VOIP Equipment Security Monitoring

2.8.1.4. Happiest Minds

2.8.1.4.1. Advanced Malware Protection

2.8.1.4.2. Application Activity Monitoring

2.8.1.4.3. Compliance Reporting

2.8.1.4.4. Database Activity Monitoring

2.8.1.4.5. File Integrity Monitoring

2.8.1.4.6. Log Management

2.8.1.4.7. Network Forensics

2.8.1.4.8. SIEM

2.8.1.4.9. Unified Threat Management

2.8.1.4.10. Vulnerability Assessment

2.8.1.4.11. Managed DLP

2.8.1.5. Netpulse

2.8.1.5.1. Endpoint Protection

2.8.1.5.2. Intrusion Detection

2.8.1.5.3. Intrusion Prevention

2.8.1.5.4. Log Management

2.8.1.5.5. SIEM

2.8.1.5.6. Secure Email Gateway

2.8.1.6. OneStone (Formerly Seccuris)

2.8.1.6.1. Firewall Management

2.8.1.6.2. Mobile Device Management

2.8.1.6.3. SIEM

2.8.1.6.4. Unified Threat Management

2.8.1.6.5. Vulnerability Assessment

2.8.1.7. SecureData

2.8.1.7.1. Firewall

2.8.1.7.2. IDS/IPS

2.8.1.7.3. SIEM

2.8.1.7.4. Data Loss Prevention

2.8.1.7.5. Secure Web Gateway

2.8.1.7.6. Secure Email Gateway

2.8.1.7.7. VPN/Remote Access

2.8.1.8. SentryMetrics

2.8.1.8.1. Endpoint Encryption

2.8.1.8.2. Endpoint Policy Management

2.8.1.8.3. GRC

2.8.1.8.4. Intrusion Detection

2.8.1.8.5. Intrusion Prevention

2.8.1.8.6. Log Management

2.8.1.8.7. SIEM

2.8.1.8.8. Secure Email Gateway

2.8.1.8.9. Secure Web Gateway

2.8.1.8.10. Wan Optimization

2.8.1.9. SunGard Availability Services

2.8.1.9.1. Firewalls

2.8.1.9.2. IAM

2.8.1.9.3. Intrusion Prevention

2.8.1.9.4. SIEM

2.8.1.9.5. Unified Threat Management

2.8.1.9.6. VPN

2.8.1.9.7. Web Application Firewall

2.8.1.10. Virtual Guardian

2.8.1.10.1. Host IDS/IPS

2.8.1.10.2. Intrusion Prevention

2.8.1.10.3. Log Management

2.8.1.10.4. SIEM

2.8.1.10.5. Vulnerability Assessment

2.8.2. United States

2.8.2.1. 5th Column

2.8.2.1.1. Network Anamoly Detection

2.8.2.1.2. Advanced threat defense

2.8.2.1.3. Security Orchaestration

2.8.2.1.4. Threat intelligence

2.8.2.2. Above Security

2.8.2.2.1. Vulnerability Assessment

2.8.2.2.2. IDS and IPS Services

2.8.2.2.3. Log Management

2.8.2.2.4. Event Correlation (SIEM)

2.8.2.3. Alert Logic

2.8.2.3.1. Network IDS

2.8.2.3.2. Log Management

2.8.2.3.3. Threat Management (SIEM&Monitoring)

2.8.2.3.4. Vulnerability Assessment

2.8.2.3.5. Web Application Firewall

2.8.2.4. Allstream

2.8.2.4.1. Firewall Management

2.8.2.4.2. Host IPS

2.8.2.4.3. Log Management

2.8.2.4.4. Log Monitoring

2.8.2.4.5. Log Monitoring

2.8.2.4.6. Network IPS

2.8.2.4.7. SIM

2.8.2.4.8. Threat Intelligence (Third party - Dell Secureworks)

2.8.2.4.9. Vulnerability Assessment

2.8.2.4.10. Web Application Firewall

2.8.2.4.11. Web Application Vulnerability Assessment

2.8.2.5. AT&T

2.8.2.5.1. DDos Protection

2.8.2.5.2. Email/Data Encryption Services

2.8.2.5.3. Endpoint Anti-Virus

2.8.2.5.4. Endpoint Patch Management

2.8.2.5.5. Endpoint Policy Compliance

2.8.2.5.6. Mobile Device Security

2.8.2.5.7. Secure Email Gateway

2.8.2.5.8. Security Device Management

2.8.2.5.9. Security Device Management

2.8.2.5.10. Web Application Firewall

2.8.2.5.11. Web Gateway (URL & Malware Filtering)

2.8.2.6. Avantgarde Partners

2.8.2.6.1. Application Security

2.8.2.6.2. Data Protection

2.8.2.6.3. Cloud Security

2.8.2.6.4. SIEM Monitoring

2.8.2.6.5. Security Automation

2.8.2.7. CentraComm

2.8.2.7.1. Anti-Spam

2.8.2.7.2. Firewall Management

2.8.2.7.3. Intrusion Prevention

2.8.2.7.4. Remote Access

2.8.2.7.5. SIEM

2.8.2.7.6. Unified Threat Management

2.8.2.8. CenturyLink- Savvis

2.8.2.9. CGI

2.8.2.9.1. Vulnerability Assessment

2.8.2.9.2. SIEM

2.8.2.9.3. Log Management

2.8.2.9.4. IAM

2.8.2.9.5. Web Security Gateway

2.8.2.9.6. IDS/IPS

2.8.2.9.7. Email Security Gateway

2.8.2.9.8. Unified Threat Management

2.8.2.9.9. Authentication (Two Factor)

2.8.2.10. Clone Systems

2.8.2.10.1. Email Security Gateway

2.8.2.10.2. Firewall Management

2.8.2.10.3. Host IDS

2.8.2.10.4. Intrusion Detection

2.8.2.10.5. Intrusion Prevention

2.8.2.10.6. Log Monitoring

2.8.2.10.7. Unified Threat Management

2.8.2.10.8. VPN (IPSEC & SSL)

2.8.2.10.9. Vulnerability Assessment

2.8.2.10.10. Web Application Firewall

2.8.2.11. Compucom Systems

2.8.2.11.1. Firewall Management

2.8.2.11.2. Identity and Access Management

2.8.2.11.3. Log Management

2.8.2.11.4. Network IPS

2.8.2.11.5. SIEM

2.8.2.11.6. Vulnerability Assessment

2.8.2.11.7. Web Application Vulnerability Assessment

2.8.2.11.8. Unified Threat Management

2.8.2.12. Cosentry

2.8.2.12.1. SIEM

2.8.2.12.2. Firewall Management

2.8.2.13. CSC

2.8.2.13.1. Advanced Malware Protection

2.8.2.13.2. Authentication Management

2.8.2.13.3. Data Loss Prevention

2.8.2.13.4. Database Security Monitoring

2.8.2.13.5. Encryption Management

2.8.2.13.6. Endpoint Protection

2.8.2.13.7. File Integrity Monitoring

2.8.2.13.8. Firewall Management

2.8.2.13.9. GRC

2.8.2.13.10. Intrusion Detection

2.8.2.13.11. Log Management

2.8.2.13.12. Secure Password Storage (Privileged Identity Management)

2.8.2.13.13. Threat Intelligence

2.8.2.13.14. Vulnerability Assessment

2.8.2.13.15. Web Application Firewall

2.8.2.13.16. Web Application Vulnerability Assessment

2.8.2.14. CSS Corp

2.8.2.14.1. Security Operations Center

2.8.2.14.2. Device Management

2.8.2.14.3. Vulnerability Management Services

2.8.2.14.4. Mobile Security Services

2.8.2.14.5. IAM

2.8.2.14.6. Web Application Firewall

2.8.2.14.7. Database Activity Monitoring

2.8.2.14.8. Advanced Threat Detection

2.8.2.15. Cybera

2.8.2.15.1. Firewall Management

2.8.2.15.2. Intrusion Detection/Prevention

2.8.2.15.3. SD-WAN

2.8.2.15.4. User Authentication

2.8.2.15.5. Compliance

2.8.2.16. CyberOne Security

2.8.2.16.1. Governance

2.8.2.16.2. Risk Mangement

2.8.2.16.3. Compliance

2.8.2.17. Dell Secureworks

2.8.2.17.1. Advanced Malware Protection

2.8.2.17.2. Email Security Gateway

2.8.2.17.3. Firewall Management

2.8.2.17.4. Host IPS

2.8.2.17.5. IDS/IPS

2.8.2.17.6. Log Management

2.8.2.17.7. Log Retention

2.8.2.17.8. SIEM

2.8.2.17.9. Threat Intelligence

2.8.2.17.10. Unified Threat Management

2.8.2.17.11. Vulnerability Assessment

2.8.2.17.12. Web Application Firewall

2.8.2.17.13. Web Application Vulnerability Assessment

2.8.2.18. Earthlink

2.8.2.19. Esentire

2.8.2.19.1. Intrusion Prevention

2.8.2.19.2. Security Information and Event Management

2.8.2.19.3. Vulnerability Management

2.8.2.19.4. Incident Response

2.8.2.19.5. Threat Intelligence

2.8.2.20. Happiest Minds

2.8.2.20.1. Advanced Malware Protection

2.8.2.20.2. Application Activity Monitoring

2.8.2.20.3. Compliance Reporting

2.8.2.20.4. Database Activity Monitoring

2.8.2.20.5. File Integrity Monitoring

2.8.2.20.6. Log Management

2.8.2.20.7. Managed DLP

2.8.2.20.8. Network Forensics

2.8.2.20.9. SIEM

2.8.2.20.10. Unified Threat Management

2.8.2.20.11. Vulnerability Assessment

2.8.2.21. HCL Technologies

2.8.2.21.1. Authentication

2.8.2.21.2. Brand Management

2.8.2.21.3. Endpoint Patch Management

2.8.2.21.4. Endpoint Protection

2.8.2.21.5. Firewall Management

2.8.2.21.6. Intrusion Detection

2.8.2.21.7. Intrusion Prevention

2.8.2.21.8. Log Management

2.8.2.21.9. SIEM

2.8.2.21.10. Secure Email Gateway

2.8.2.21.11. Secure Web Gateway

2.8.2.21.12. Unified Threat Management

2.8.2.21.13. Vulnerability Assessment

2.8.2.22. HP

2.8.2.22.1. Access Managment

2.8.2.22.2. Data Loss Prevention

2.8.2.22.3. Email Security Gateway

2.8.2.22.4. Endpoint Encryption

2.8.2.22.5. Endpoint Protection

2.8.2.22.6. Intrusion Detection

2.8.2.22.7. Intrusion Prevention

2.8.2.22.8. Managed Incident Response

2.8.2.22.9. Remote Access Management

2.8.2.22.10. SIEM

2.8.2.22.11. Vulnerability Assessment

2.8.2.22.12. Web Application Vulnerability Assessment

2.8.2.22.13. Web Security Gateway

2.8.2.23. IBM

2.8.2.23.1. Email Security Gateway

2.8.2.23.2. Endpoint Patch Management

2.8.2.23.3. Endpoint Policy Management

2.8.2.23.4. Endpoint Protection

2.8.2.23.5. Firewall Management

2.8.2.23.6. IAM

2.8.2.23.7. Intrusion Detection

2.8.2.23.8. Intrusion Prevention

2.8.2.23.9. Log Management

2.8.2.23.10. Mobile Device Security

2.8.2.23.11. SIEM

2.8.2.23.12. Unified Threat Management

2.8.2.23.13. Vulnerability Assessment

2.8.2.23.14. Web Security Gateway

2.8.2.23.15. Web Vulnerability Assessment

2.8.2.24. Intelisecure

2.8.2.24.1. Data Loss Prevention

2.8.2.24.2. SIEM

2.8.2.24.3. Vulnerability Management

2.8.2.24.4. Secure Web Gateway

2.8.2.24.5. Secure Email Gateway

2.8.2.24.6. Firewall Management

2.8.2.25. Leidos

2.8.2.25.1. Endpoint Protection

2.8.2.25.2. Host IPS

2.8.2.25.3. Intrusion Detection

2.8.2.25.4. Intrusion Prevention

2.8.2.25.5. Log Management

2.8.2.25.6. Patch Management

2.8.2.25.7. SIEM

2.8.2.25.8. Vulnerability Assessment

2.8.2.25.9. Web Application Vulnerability Assessment

2.8.2.25.10. Web Security Gateway

2.8.2.26. LunarLine

2.8.2.27. Masergy Communications

2.8.2.27.1. Cloud Firewall Management

2.8.2.27.2. Firewall Management

2.8.2.27.3. Intrusion Detection/Prevention

2.8.2.27.4. Network Behavior Analysis

2.8.2.27.5. On-Premise Management Console

2.8.2.27.6. SIEM

2.8.2.27.7. Vulnerability Management

2.8.2.28. Megapath

2.8.2.28.1. Email Security Gateway

2.8.2.28.2. Firewall Management

2.8.2.28.3. Intrusion Prevention

2.8.2.28.4. Log Management

2.8.2.28.5. Network Anti-Virus

2.8.2.28.6. SIEM

2.8.2.28.7. Vulnerability Assessment

2.8.2.28.8. Vulnerability Assessment

2.8.2.28.9. Web Security Gateway

2.8.2.29. MKACyber

2.8.2.30. Morphick

2.8.2.30.1. Managed Detection and Response

2.8.2.31. My Digital Shield

2.8.2.31.1. Unified Threat Management

2.8.2.31.2. Advanced Threat Detection

2.8.2.31.3. Botnet Prevention

2.8.2.31.4. URL Filtering

2.8.2.31.5. Application Control (Application Filtering)

2.8.2.32. Navisite

2.8.2.32.1. Mobile Device Management

2.8.2.33. NCA - Network Computing Architects

2.8.2.33.1. WatchGuard Firewall Management

2.8.2.34. Netfortris

2.8.2.34.1. Next Generation Firewall

2.8.2.34.2. Unified Threat Management

2.8.2.34.3. Virtual Private Networking

2.8.2.35. Netswitch

2.8.2.35.1. Advanced Threat Detection Appliances

2.8.2.35.2. Security Operations Center

2.8.2.35.3. Incident Response and Administration

2.8.2.35.4. Firewall Management

2.8.2.35.5. Intrusion Prevention

2.8.2.35.6. Data Analytics

2.8.2.35.7. Data Loss Prevention

2.8.2.35.8. Endpoint Detection and Response

2.8.2.35.9. Cloud Access Security Broker Management

2.8.2.35.10. Vulnerability Management

2.8.2.36. Nuspire Networks

2.8.2.36.1. Endpoint Patch Management

2.8.2.36.2. Endpoint Policy Enforcement

2.8.2.36.3. Endpoint Protection

2.8.2.36.4. Firewall Management

2.8.2.36.5. Intrusion Detection

2.8.2.36.6. Intrusion Prevention

2.8.2.36.7. Log Management

2.8.2.36.8. Network Asset Management

2.8.2.36.9. Network Device Monitoring

2.8.2.36.10. Patch Management

2.8.2.36.11. Point of Sale Device Monitoring

2.8.2.36.12. SIEM

2.8.2.36.13. Secure Email Gateway

2.8.2.36.14. Unified Threat Management

2.8.2.36.15. Vulnerability Assessment

2.8.2.37. Overwatch Technologies

2.8.2.37.1. Advanced Threat Monitoring

2.8.2.37.2. Endpoint Backup

2.8.2.37.3. Endpoint Management

2.8.2.37.4. Endpoint Monitoring

2.8.2.37.5. Endpoint Threat Forensics

2.8.2.37.6. Incident Response

2.8.2.37.7. Patch Management

2.8.2.38. Paladion

2.8.2.39. Rook Security

2.8.2.39.1. Incident Response/Forensics

2.8.2.39.2. Log Management

2.8.2.39.3. SIEM

2.8.2.39.4. Threat Intelligence

2.8.2.39.5. Threat Management

2.8.2.39.6. Vulnerability Management

2.8.2.40. Secure Designs

2.8.2.40.1. Authentication

2.8.2.40.2. Email Encryption

2.8.2.40.3. Email Security Gateway

2.8.2.40.4. Firewall Management

2.8.2.40.5. Full Disk Encryption

2.8.2.40.6. Intrusion Detection

2.8.2.40.7. Intrusion Prevention

2.8.2.40.8. Log Management

2.8.2.40.9. Network Data Loss Prevention

2.8.2.40.10. VPN (SSL)

2.8.2.40.11. Web Security Gateway

2.8.2.41. SilverSky (Formerly Stillsecure/Perimeter esecurity)

2.8.2.41.1. Email Encryption

2.8.2.41.2. Email Security Gateway

2.8.2.41.3. Intrusion Detection

2.8.2.41.4. Intrusion Prevention

2.8.2.41.5. Log Management

2.8.2.41.6. Network Device Management

2.8.2.41.7. SIEM

2.8.2.41.8. Unified Threat Management

2.8.2.41.9. VPN Remote User Management

2.8.2.42. Solutionary

2.8.2.42.1. File Integrity Monitoring

2.8.2.42.2. Firewall Management

2.8.2.42.3. Intrusion Detection

2.8.2.42.4. Intrusion Prevention\

2.8.2.42.5. Log Management

2.8.2.42.6. Vulnerability Assessment

2.8.2.42.7. Web Application Firewalls

2.8.2.42.8. Web Vulnerability Assessment

2.8.2.43. SunGard Availability Services

2.8.2.43.1. Firewalls

2.8.2.43.2. IAM

2.8.2.43.3. Intrusion Prevention

2.8.2.43.4. SIEM

2.8.2.43.5. Unified Threat Management

2.8.2.43.6. VPN

2.8.2.43.7. Web Application Firewall

2.8.2.44. Sword and Shield

2.8.2.44.1. Intrusion Detection

2.8.2.44.2. Intrusion Prevention

2.8.2.44.3. Log Management

2.8.2.44.4. Network Flow Monitoring

2.8.2.44.5. SIEM

2.8.2.44.6. Vulnerability Assessment

2.8.2.45. Symantec

2.8.2.45.1. Intrusion Detection

2.8.2.45.2. Intrusion Prevention

2.8.2.45.3. Log Management

2.8.2.45.4. SIEM

2.8.2.46. Symantec

2.8.2.47. Syntegrity Networks

2.8.2.47.1. Database Firewalls

2.8.2.47.2. Identity and Access Management

2.8.2.47.3. Log Management

2.8.2.47.4. SIEM

2.8.2.47.5. Single Sign-On (SSO)

2.8.2.47.6. Vulnerability Assessment

2.8.2.47.7. Web Application Firewall

2.8.2.48. Tesserent

2.8.2.49. Trustwave

2.8.2.49.1. Authentication (Two Factor)

2.8.2.49.2. Encryption

2.8.2.49.3. Intrusion Detection

2.8.2.49.4. Intrusion Prevention

2.8.2.49.5. Network Access Control

2.8.2.49.6. SIEM

2.8.2.49.7. Unified Threat Management

2.8.2.49.8. Web Application Firewall

2.8.2.50. Verizon Business

2.8.2.50.1. Anti-DDoS

2.8.2.50.2. Email Security

2.8.2.50.3. Endpoint Protection

2.8.2.50.4. Firewall Management

2.8.2.50.5. Intrusion Detection

2.8.2.50.6. Intrusion Prevention

2.8.2.50.7. SIEM

2.8.2.50.8. Vulnerability Assessment

2.8.2.50.9. Web Security

2.8.2.51. Wipro

2.8.2.51.1. Email Security Gateway

2.8.2.51.2. Endpoint Security

2.8.2.51.3. Firewall Management

2.8.2.51.4. Fraud Management/Anti-Money Laundering

2.8.2.51.5. GRC

2.8.2.51.6. IAM

2.8.2.51.7. Intrusion Detection

2.8.2.51.8. Intrusion Prevention

2.8.2.51.9. SIEM

2.8.2.51.10. User Access Management

2.8.2.51.11. Web Security Gateway

2.8.3. Zenedge

2.8.3.1. Applicaton Security

2.8.3.2. Bot Management

2.8.3.3. API Security

2.8.3.4. DDoS

2.9. Sub-Sahara Africa

2.9.1. AccessKenya

2.9.1.1. Firewall

2.9.1.2. Endpoint Protection

2.9.1.3. Secure Web Gateway

3. Managed Detection and Response

3.1. United States

3.1.1. AlertLogic

3.1.2. Arctic Wolf

3.1.3. ATD Cybersecurity

3.1.4. Booz Allen Hamilton

3.1.5. Cisco

3.1.6. Critical Informatics

3.1.7. CrowdStrike

3.1.8. eSentire

3.1.9. Expel

3.1.10. FireEye

3.1.11. Ingalls Information Security

3.1.12. Intelligo Networks

3.1.13. Ironnet CyberSecurity

3.1.14. Leidos

3.1.15. Masergy

3.1.16. Paladion

3.1.17. Proficio

3.1.18. Rapid7

3.1.19. Raytheon Foreground Security

3.1.20. Red Canary

3.1.21. SecureWorks

3.1.22. Seekintoo

3.1.23. Sophos

3.1.24. Trustwave

3.1.25. UnitedLex

3.2. Europe

3.2.1. Countercept

3.2.2. CSIS

3.2.3. EY

3.2.4. Ezenta

3.2.5. F-Secure

3.2.6. Kudelski Security

3.2.7. Mnemonic

3.2.8. RedScan

3.2.9. SecureLink

3.3. Asia

3.3.1. Singapore

3.3.1.1. Vigilant Asia