1. ValidEDGE
2. Web Application Firewalls (WAF)
2.1. Appliances
2.1.1. Virtualized Appliances
2.1.1.1. AlertLogic
2.1.1.2. Amazon AWS
2.1.1.2.1. Riverbed
2.1.1.3. Barracuda Networks
2.1.1.4. BeeWare
2.1.1.5. Imperva
2.1.1.6. PentaSecurity
2.1.2. Physical Appliances
2.1.2.1. AlertLogic
2.1.2.2. Barracuda Networks
2.1.2.3. BeeWare
2.1.2.4. Cisco
2.1.2.4.1. End of Life January 2011
2.1.2.5. Citrix
2.1.2.6. DPtech
2.1.2.7. DenyAll
2.1.2.8. F5
2.1.2.9. Imperva
2.1.2.10. NSFocus
2.1.2.11. PentaSecurity
2.1.2.12. Riverbed
2.1.2.13. Trustwave
2.2. Managed Services
2.2.1. Dell Secureworks
2.2.2. AT&T
2.2.3. Verizon Business
2.2.4. Cisco
2.3. Software
2.3.1. Apache
2.3.1.1. Applicure
2.3.1.1.1. dotDefender
2.3.2. DenyAll
2.3.3. ERGON Informatik AG
2.3.3.1. AIRLOCK
2.3.4. Juniper
2.3.4.1. Mykonos
2.3.5. Microsoft IIS
2.3.5.1. Applicure
2.3.5.1.1. dotDefender
2.3.5.2. BeyondTrust
2.3.5.3. ThreatSentry
2.3.6. Open Source
2.3.6.1. Mod Security
2.3.6.2. IronBee
2.3.7. Riverbed
2.4. Software as a Service
2.4.1. Akamai
2.4.1.1. Kona
2.4.2. AlertLogic
2.4.3. CloudFlare
2.4.4. Incapsula
2.4.5. Qualys
3. End User Privilege Management
3.1. Viewfinity
4. Software as a Service
4.1. Google Apps
4.1.1. CloudLock
4.1.2. FiLink
5. Advanced Threat Detection/Prevention
5.1. Advanced Network Threat Protection
5.1.1. Runtime Emulation
5.1.1.1. ValidEDGE
5.1.1.2. General Dynamics
5.1.1.2.1. Fidelis Systems
5.1.1.3. Checkpoint Software
5.1.2. Advanced Threat Intelligence
5.1.2.1. LookingGlass
5.1.3. Virtual Execution Assessment
5.1.3.1. Cloud Based
5.1.3.1.1. Netwitness
5.1.3.1.2. CrowdStrike
5.1.4. Appliances
5.1.4.1. AhnLab
5.1.4.2. Damballa
5.1.4.3. FireEye
5.1.4.3.1. Malware Analysis Appliance
5.1.4.4. Lastline
5.1.4.5. ThreatTrack
5.1.5. Network Monitoring/Detection
5.1.5.1. Netwitness
5.1.5.2. Kindsight
5.1.5.3. Taasera
5.1.6. Exploit Technique Prevention Software
5.1.6.1. Cyvera
5.1.6.2. Microsoft
5.1.6.2.1. EMET
5.2. Appliance Based
5.2.1. AhnLab
5.2.2. CheckPoint Software
5.2.3. ContentKeeper
5.2.4. Cyphort
5.2.5. Damballa
5.2.6. FireEye
5.2.7. HBGary
5.2.8. LastLine
5.2.9. McAfee
5.2.10. Palo Alto Networks
5.2.11. RSA
5.2.11.1. Security Analytics (Formerly Netwitness)
5.2.11.1.1. Spectrum
5.2.12. Trend Micro
5.3. Malware Analysis
5.3.1. Malware Analysis as a Service
5.3.1.1. Free Services
5.3.1.1.1. Malwr
5.3.2. Software
5.3.2.1. Norman
5.3.2.1.1. Malware Analyzer G2
5.3.2.2. GFI
5.3.2.2.1. GFI Sandbox
5.3.2.3. Joesecurity
5.3.2.3.1. Joe Sandbox
5.3.3. Firewalls
5.3.3.1. Palo Alto Networks
5.3.3.2. CheckPoint Software
5.3.3.3. Fortinet
5.4. Endopoint Sandboxes and Virtualized Containers
5.4.1. Sandboxes
5.4.1.1. Panda
5.4.1.2. Norman
5.4.1.3. Sandboxie
5.4.1.4. Bitdefender
5.4.2. Virtualized Containers
5.4.2.1. Bromium
5.4.3. Type-0 Hypervisors
5.4.3.1. Lynxworks
5.4.3.2. Zirtu
5.5. Endpoint Threat Detection and Response
5.5.1. Access Data
5.5.1.1. CIRT
5.5.2. Carbon Black
5.5.3. Countertack
5.5.4. CrowdStrike
5.5.5. Cyvera
5.5.6. Guidance Software
5.5.6.1. Encase Cybersecurity
5.5.7. HBGary
5.5.8. Invincea
5.5.9. Mandiant
5.5.10. Triumfant
5.6. Network Behavior Analysis
5.6.1. Flow Analysis
5.6.1.1. Lancope
5.6.1.2. Arbor Networks
5.6.2. Network Traffic (Sniffers)
5.6.2.1. Arbor Networks
5.6.2.2. Lastline
5.6.2.3. Light Cyber
5.6.2.4. McAfee NBA
5.7. Security as a Service
5.7.1. Mail
5.7.1.1. Proofpoint
5.7.2. Malware Infection Monitoring Services
5.7.2.1. Lastline
5.7.2.1.1. Guardia
5.7.2.2. Qualys
5.7.2.3. Seculert
6. Governance, Risk and Compliance
6.1. Firewall Workflow,Modeling & Change Management
6.1.1. Firemon
6.1.2. Skybox
6.1.3. ManageEngine
6.1.4. Redseal Networks
6.1.5. Tufin
6.1.6. Checkpoint Software
6.2. eGRC
6.2.1. Software as a Service
6.2.1.1. Bwise
6.2.2. Software
6.2.2.1. Sword Achiever
6.2.2.2. BPS Resolver
6.2.2.3. Jade Software
6.2.2.4. Walters Kluwer Financial Services
6.2.2.5. SAI
6.2.2.6. Oracle
6.2.2.7. MetricStream
6.2.2.8. Nasdaq Bwise
6.2.2.9. SAP
6.2.2.10. RSA
6.2.2.10.1. Archer
6.2.2.11. OpenPages
6.2.2.12. MetricStream
6.2.2.13. IBM
6.2.2.13.1. Openpages
6.2.2.14. Thompson Reuters
6.2.2.15. Rsam
6.2.2.16. Mega
6.2.2.16.1. Mega Suite
6.2.2.17. Software AG
6.2.2.18. Protivity
6.2.2.19. CMO Compliance
6.2.2.20. Enablon
6.2.2.21. Cura Technologies
6.3. itGRCM
6.3.1. Allgress
6.3.1.1. Vulnerability Manager
6.3.1.2. Risk Analysis
6.3.1.3. Security and Compliance Assessment
6.3.1.4. Incident Management
6.3.1.5. Policy and Proceedures
6.3.2. Symantec
6.3.2.1. Control Compliance Suite
6.3.3. Modulo
6.3.4. Rsam
6.3.5. Agiliance
6.3.6. Brinqa
6.3.7. Nasdaq Bwise
6.3.8. ControlCase
6.3.9. EMC-RSA
6.3.10. Lumension Security
6.3.11. Microsoft
6.3.12. Telos
6.3.13. Software as a Service
6.3.13.1. SureCloud
6.4. Operational Risk Analytics
6.4.1. RiskIO
6.4.2. Skybox
6.4.3. Firemon
6.4.4. Redseal Networks
6.4.5. Algosec
6.4.6. Tufin
6.4.7. Solarwinds
6.4.8. IBM
6.4.8.1. Q1Radar Risk Manager
7. Security Information and Event Management (SIEM) & Log Management
7.1. Log Management
7.1.1. McAfee
7.1.1.1. McAfee Enterprise Log Manager
7.1.2. Tripwire
7.1.3. Splunk
7.1.4. LogRythm
7.2. SIEM
7.2.1. AlienVault
7.2.1.1. OSSIM
7.2.2. HP
7.2.2.1. Arcsight
7.2.3. IBM
7.2.3.1. Q1Radar
7.2.4. LogRythm
7.2.5. McAfee
7.2.5.1. NitroSecurity
7.2.6. Novell
7.2.6.1. Sentinel
7.2.7. RSA
7.2.7.1. Envision
7.2.8. Sensage
7.2.9. Solarwinds
7.2.10. Splunk
7.2.11. Tibco
7.2.11.1. Loglogic
7.2.12. eIQnetworks
8. Chip Layer Security
8.1. AMD
8.1.1. TPM
8.2. Cavium
8.2.1. Multi-Core Processors
8.3. Flow Processors
8.3.1. Netronome
8.4. Intel
8.4.1. TPM
8.4.2. Data Execution Protection
9. Fraud Prevention
9.1. Appliances
9.1.1. Silvertail Systems
9.2. Software
9.2.1. RSA (EMC)
9.2.2. Cisco (Formerly Trusteer)
9.3. Software as a Service
9.3.1. ThreatMetrix
9.3.2. X-Cart
9.3.3. MarkMonitor
9.3.4. iovation
10. Forensics & eDiscovery
10.1. Forensic Products
10.1.1. eDiscovery
10.1.1.1. Clearwell
10.1.1.2. Kazeon
10.1.1.3. Guidance Software
10.1.1.4. Access Data
10.1.1.5. Autonomy
10.1.1.6. kCura
10.1.1.7. FTI Technology
10.1.1.8. Barracuda Networks
10.1.2. Mobile Devices
10.1.2.1. Cellebrite
10.1.2.2. Paraben
10.1.2.3. Oxygen
10.1.3. Computing Systems
10.1.3.1. Guidance Software
10.1.3.2. Access Data
10.1.3.3. BlackBag
10.1.3.4. OSForensics
10.1.3.5. Xways Forensics
10.1.3.6. Cylance
10.1.4. Network Forensics
10.1.4.1. Access Data
10.1.4.2. BlueCoat
10.1.4.3. Cybertap
10.1.4.4. Endace
10.1.4.5. Fluke Networks
10.1.4.6. NetAgent
10.1.4.7. NetResec
10.1.4.8. NetScout
10.1.4.9. Niksun
10.1.4.10. Packetsled
10.1.4.11. RSA (EMC)
10.1.4.12. Riverbed
10.1.4.13. WildPackets
10.2. Forensics as a Service (FaaS)
10.3. Incident Response Legal Services
10.3.1. Information Law Group
10.4. eDiscovery Services
10.4.1. Robert Half
10.4.2. Advanced Discovery
11. Identity and Access Management (IAM)
11.1. Certificates
11.1.1. Symantec (Formerly VeriSign)
11.2. AD/Unix bridge
11.2.1. Centrify
11.3. Privileged account management (PAM)
11.3.1. BeyondTrust
11.3.2. Lieberman Software
11.3.3. Cyber Ark
11.4. Identity governance and administration
11.4.1. CA Technologies
11.4.2. IBM Security
11.4.3. Oracle
11.4.4. RSA (Aveksa)
11.5. Security as a Service
11.5.1. Identity and Access Management (IDaaS)
11.5.1.1. Symplifyed
11.5.1.2. Ping Identity
11.6. Secure USB dongles
11.6.1. IronKey
11.7. User Authentication
11.7.1. Tokens
11.7.1.1. OOB authentication
11.7.1.1.1. SMS
11.7.1.1.2. Voice
11.7.1.1.3. Push
11.7.1.1.4. Email
11.7.1.1.5. Social media
11.7.1.2. OTP tokens
11.7.1.2.1. OTP hardware tokens
11.7.1.2.2. OTP software tokens for smart phones
11.7.1.3. X.509 tokens
11.7.1.4. Other tokens
11.7.1.4.1. ANECT AS - ALUCID
11.7.2. Contextual authentication
11.7.3. KBA
11.7.4. Biometrics
11.7.4.1. Behavioral
11.7.4.1.1. Typing rhythm/keystroke dynamics
11.7.4.1.2. Voice recognition
11.7.4.2. Biological
11.7.4.2.1. Face recognition
11.7.4.2.2. Fingerprint
11.7.5. Wide-focus vendors
11.7.5.1. RSA
11.7.5.2. SafeNet
11.7.5.3. VASCO
11.7.5.4. CA Technologies
11.7.5.5. HID Global
11.7.5.6. Technology Nexus
11.7.5.7. Symantec
11.7.5.8. Entrust
11.8. Enterprise single sign-on (ESSO)
11.9. Web access management (WAM)
11.10. Federated SSO
11.11. Externalized authorization management (EAM)
11.11.1. Axiomatics
11.11.2. Dell Quest (BitKoo)
11.12. Access Management
11.12.1. CionSystems
12. Encryption/Tokenization
12.1. Cloud/SAAS Encryption
12.1.1. Appliances
12.1.1.1. Office365
12.1.1.1.1. Vaultive
12.1.1.1.2. FiLink
12.1.1.2. Ciphercloud
12.1.1.3. Afore Solutions
12.1.1.3.1. CloudLink VSA
12.1.1.4. Perspecsys
12.1.2. Software
12.1.2.1. BoxCryptor
12.1.2.2. SafeNet
12.1.2.2.1. SafeMonk
12.1.2.3. PrivateCore
12.1.2.4. Trend Micro
12.1.2.4.1. SecureCloud
12.1.3. Software as a Service
12.1.3.1. Trend Micro
12.1.3.1.1. SecureCloud
12.2. Data masking
12.2.1. Oracle
12.3. Database
12.3.1. SafeNet
12.3.2. Dark Matter Labs
12.3.3. Vormetric
12.4. File/Folder
12.4.1. WinMagic
12.4.1.1. SecureDoc
12.4.2. Symantec (PGP)
12.4.3. IBM
12.4.3.1. Mainframe
12.4.3.1.1. z10
12.4.4. Sophos
12.4.4.1. SafeGuard Enterprise (Utimaco)
12.4.5. Vormetric
12.5. Mobile Storage/USB
12.5.1. IronKey
12.6. Tokenization
12.6.1. Protegrity
12.7. Whole Disk
12.7.1. McAfee
12.7.2. Symantec (PGP)
12.7.3. CheckPoint Software
12.7.4. Encryption Management
12.7.4.1. Wave Systems
12.7.5. WinMagic
12.7.5.1. SecureDoc
12.7.6. Microsoft
12.7.6.1. Bitlocker
12.7.7. Sophos
12.7.7.1. SafeGuard Enterprise (Utimaco)
12.7.8. Trustwave
12.7.8.1. DataControl
12.7.9. Vormetric
13. Web/Email Protection
13.1. Secure Email Gateways
13.1.1. Bluecoat
13.1.2. Fortinet
13.1.3. McAfee
13.1.4. Sonicwall
13.1.5. Symantec
13.1.6. Trustwave
13.1.7. Websense
13.1.8. iBoss
13.2. Secure Web Gateways
13.2.1. Bluecoat
13.2.2. ContentKeeper
13.2.3. McAfee
13.2.4. Symantec
13.2.5. Trustwave
13.2.6. Websense
13.2.7. iBoss
13.3. Security as a Service
13.3.1. Web & Email SaaS
13.3.1.1. Appriver
13.3.1.2. Barracuda
13.3.1.3. Cisco
13.3.1.4. McAfee
13.3.1.5. Spamina
13.3.1.6. Symantec
13.3.1.7. Total Defense
13.3.1.8. Websense
13.3.1.9. Zscaler
13.3.2. Web Only
13.3.2.1. ContentKeeper
14. Data Loss Prevention (DLP)
14.1. Gateway
14.1.1. McAfee
14.1.2. Symantec
14.2. Host
14.2.1. McAfee
14.2.2. RSA
14.2.3. Symantec
14.2.4. Trustwave
14.3. Security as a Service
14.3.1. Consumer
14.3.1.1. Reputation.com
14.3.1.2. Social Fortress
14.3.1.3. PwnedList
14.3.2. Enterprise
14.3.2.1. Social Fortress
14.3.2.2. Google Apps
14.3.2.2.1. Cloudlock
15. Vulnerability Assessment/Management (VA/VM)
15.1. Managed Penetration Testing Services
15.1.1. WhiteHatSecurity
15.2. Penetration TestingSoftware
15.2.1. Core Security
15.2.2. Rapid7
15.2.2.1. Metasploit Pro
15.2.2.2. Metasploit Express
15.3. Software as a Service
15.3.1. Digital Defense
15.3.2. McAfee
15.3.3. Outpost24
15.3.4. Qualys
15.4. Network Vulnerability Assessment (On Premise)
15.4.1. Digital Defense
15.4.2. Fortinet
15.4.3. McAfee
15.4.3.1. McAfee Vulnerability Manager (Foundstone)
15.4.4. NSAuditor
15.4.5. Ncircle
15.4.6. Netasq
15.4.7. Outpost24
15.4.8. Qualys
15.4.9. Rapid 7
15.4.9.1. Nexspose
15.5. Web Application Security
15.5.1. Code Review Products
15.5.1.1. HP
15.5.1.2. IBM
15.5.2. Runtime Application Self Protection
15.5.2.1. Metaforic
15.5.2.2. Arxan
15.5.3. Scanning Services
15.5.3.1. High-Tech Bridge
15.5.3.2. McAfee Secure
15.5.3.3. WebSecurify
15.5.3.4. Qualys
15.5.3.5. WhiteHat
15.5.3.6. Controlscan
15.5.4. Scanning Software
15.5.4.1. Open Source
15.5.4.1.1. Arachni Scanner
15.5.4.1.2. Subgraph
15.5.4.1.3. W3af
15.5.4.1.4. Wapiti
15.5.4.1.5. Watcher
15.5.4.2. Commercial
15.5.4.2.1. Accunetix
15.5.4.2.2. BeyondTrust
15.5.4.2.3. Cenzic
15.5.4.2.4. HP
15.5.4.2.5. MavitunaSecurity
15.5.4.2.6. NTObjectives
15.5.4.2.7. Nstalker
15.5.4.2.8. Portswigger
15.5.4.2.9. Syhunt
15.6. Vulnerability Reporting/Tracking
15.6.1. Risk IO
15.7. Vulnerability Research
15.7.1. CSC
15.7.2. HP
15.7.2.1. DV Labs
15.7.3. HotWAN
15.7.4. McAfee
15.7.5. SecNiche Labs
15.7.6. Sourcefire VRT
15.7.7. Symantec
15.7.8. VRLSec
15.7.9. Vupen
16. Consulting
16.1. Application Security
16.1.1. Web
16.1.1.1. AppSec Consulting
16.1.1.2. Denim Group
16.1.2. Mobile
16.1.2.1. AppSec Consulting
16.1.2.2. Denim Group
16.2. Compliance
16.2.1. HIPAA
16.2.2. HITECH
16.2.3. ISO
16.2.4. PCI
16.2.4.1. WorldWide
16.2.4.1.1. Wipro
16.2.4.1.2. Dell Secureworks
16.2.4.1.3. Deloitte and Touche
16.2.4.1.4. EY
16.2.4.1.5. BT
16.2.4.1.6. PWC
16.2.4.2. Regional
16.2.4.2.1. North America
16.2.4.2.2. Latin America
16.2.4.2.3. EMEA
16.2.4.2.4. Asia Pacific
16.3. Governance
16.3.1. Accuvant
16.3.2. Fishnet Security
16.3.3. FOX-IT
16.4. Incident Response
16.4.1. Forensics
16.4.1.1. FOX-IT
16.4.1.2. PWC
16.4.1.3. Fishnet Security
16.4.1.4. EY
16.4.1.5. Deloitte
16.4.2. Digital Investigations
16.4.2.1. FOX-IT
16.4.2.2. Deloitte
16.4.2.3. EY
16.4.2.4. Fishnet Security
16.4.2.5. PWC
16.5. Penetration Testing
16.5.1. AppSec Consulting
16.5.2. Core Security
16.5.3. Element Digital Security
16.5.4. FOX-IT
16.5.5. Matasano Security
16.5.6. Rapid7
16.5.7. Secureworks
16.5.8. WhiteHat Security
16.6. Risk Management
16.6.1. Booz Allen Hamilton
16.6.2. Accuvant
16.6.3. Cloud Risks
16.6.4. On Premise Infrastructure
16.6.5. Business Risk
16.7. Security Program Development
16.7.1. Accuvant
16.7.2. Fishnet
16.7.3. FOX-IT
17. Virtual Private Networking (VPN)
17.1. IPSec VPN
17.1.1. Cisco
17.1.2. CheckPoint Software
17.1.3. Certes Networks
17.2. Layer 2 Encryption
17.2.1. Certes Networks
17.3. Layer 4 Encryption
17.3.1. Certes Networks
17.4. SSL VPN
17.4.1. Juniper
17.4.2. Cisco
17.4.3. Sonicwall
17.4.4. Barracuda Networks
17.4.5. Stonesoft
17.4.6. F5 Networks
17.4.7. Citrix
17.4.8. WatchGuard
17.4.9. NetGear
17.4.10. Array Networks
18. Endpoint Security Platforms (EPP)
18.1. Anti-Malware
18.1.1. North America
18.1.1.1. McAfee
18.1.1.2. MalwareBytes
18.1.1.3. Trend Micro
18.1.1.4. Symantec
18.1.1.5. Total Defense
18.1.2. China
18.1.2.1. Rising International Software
18.1.3. Russia
18.1.3.1. Kaspersky
18.1.4. United Kingdom
18.1.4.1. Sophos
18.1.5. Romania
18.1.5.1. Bitdefender
18.1.6. South Korean
18.1.6.1. BKAV
18.1.7. Czech Republic
18.1.7.1. Avast
18.1.8. Netherlands
18.1.8.1. AVG
18.2. Endpoint Intrusion Prevention
18.2.1. McAfee
18.2.2. Symantec
18.3. File Integrity Monitoring
18.3.1. Open Source
18.3.1.1. 1. AIDE
18.3.1.2. 2. Trend Micro
18.3.1.2.1. 1. OSSEC
18.3.1.3. 3. Samhain
18.3.1.4. 4. Osiris
18.3.1.5. 5. Integrit
18.3.1.6. 6. Tripwire
18.3.2. Commercial
18.3.2.1. Imperva
18.3.2.2. McAfee
18.3.2.3. Tripwire
18.4. Sandboxing/MicroVM
18.4.1. SandBoxie
18.4.2. Norman Sandbox
18.4.3. Bromium
19. Intelligence Services/Data Feeds
19.1. Anti-Spam
19.1.1. www.au.sorbs.net
19.2. IP Blacklists
19.2.1. SpamHaus
19.2.2. Team Cymru
19.2.3. Dshield
19.2.4. hosts-file.net
19.3. Malware Analysis/Blocklists
19.3.1. Malware Patrol
19.3.2. hosts-file.net
19.3.3. zeustracker.abuse.ch
19.3.4. websecurityguard.com
19.3.5. SpamHaus
19.3.6. Botnets
19.3.6.1. spyeyetracker.abuse.ch
19.3.7. MalwareDomainList.com
19.3.8. ThreatGrid
19.3.9. VirusTotal
19.3.10. emergingthreats.net
19.3.11. www.malwareblacklist.com/
19.3.12. www.malware.com.br/lists.shtml
19.3.13. Team Cymru
19.4. Reputation Feeds
19.4.1. Symantec
19.4.1.1. Reputation Insight
19.4.2. McAfee
19.4.2.1. Global Threat Intelligence (GTI)
19.4.3. Trend Micro
19.4.3.1. Smart Protection Network
19.5. Threat Intelligence Services
19.5.1. CrowdStrike
19.5.2. Dell
19.5.2.1. Counter Threat Unit - CTU
19.5.3. FOX-IT
19.5.4. Lookingglass Cyber Solutions
19.5.5. McAfee
19.5.6. Proofpoint
19.5.7. Security Starfish
19.5.8. Team Cymru
19.5.9. Verisign
19.6. URL Lists
19.6.1. Shallalist
19.6.2. hosts-file.net
19.6.3. zvelo
19.6.4. http://malc0de.com/database/
19.7. Web Malware Monitoring
19.7.1. evuln.com
19.7.2. Qualys
20. Channel/Logistics/Supply Chain/OEMs/Product Testing/Marketing
20.1. Cloud Service Brokerages
20.1.1. Jamcracker
20.1.2. Gravitant
20.1.3. StandingCloud
20.1.4. Bitnami
20.2. Distribution/Channel
20.2.1. VARs, Resellers
20.2.1.1. China
20.2.1.1.1. Rainbow Tech
20.2.1.1.2. Broad Sky Innovation Technology
20.2.1.1.3. Qast Software Group
20.2.1.2. Eastern Europe
20.2.1.2.1. CZECH Republic
20.2.1.2.2. Poland
20.2.1.3. Emerging Asia Pacific
20.2.1.3.1. India
20.2.1.3.2. Indonesia
20.2.1.3.3. Malasia
20.2.1.3.4. Thailand
20.2.1.3.5. Philippines
20.2.1.4. Eurasia
20.2.1.4.1. Russian Federation
20.2.1.4.2. Kazakhstan
20.2.1.4.3. Ukraine
20.2.1.5. Latin America
20.2.1.5.1. Brazil
20.2.1.5.2. Chile
20.2.1.5.3. Columbia
20.2.1.5.4. Costa Rica
20.2.1.5.5. Ecuador
20.2.1.5.6. Bolivia
20.2.1.5.7. Venezuela
20.2.1.5.8. Cuba
20.2.1.5.9. Argentina
20.2.1.5.10. Buenos Aires
20.2.1.5.11. Mexico
20.2.1.5.12. Peru
20.2.1.6. Mature Asia Pacific
20.2.1.6.1. Australia
20.2.1.6.2. Japan
20.2.1.6.3. Singapore
20.2.1.7. Middle East and North Africa
20.2.1.7.1. Turkey
20.2.1.7.2. Israel
20.2.1.7.3. Saudi Arabia
20.2.1.7.4. South Africa
20.2.1.7.5. India
20.2.1.7.6. United Arab Emirates
20.2.1.8. North America
20.2.1.8.1. United States
20.2.1.8.2. Canada
20.2.1.9. Sub-Sahara Africa
20.2.1.9.1. South Africa
20.2.1.10. Western Europe
20.2.1.10.1. France
20.2.1.10.2. Germany
20.2.1.10.3. Italy
20.2.1.10.4. Netherlands
20.2.1.10.5. Spain
20.2.1.10.6. United Kingdom
20.2.1.11. WorldWide
20.2.1.11.1. AT&T
20.2.1.11.2. Verizon Business
20.2.2. Distributors
20.2.2.1. China
20.2.2.1.1. Huagai
20.2.2.1.2. Ecschina
20.2.2.1.3. B & Data Technology Co. Ltd.
20.2.2.1.4. Beijing Advazone Electronic Limited Comp
20.2.2.1.5. Beijing HolyZone Technology Co.,Ltd.
20.2.2.1.6. Digital China Technology LTD.
20.2.2.1.7. M.Tech (Shanghai) Co., Ltd.
20.2.2.1.8. Sky Faith International Enterprise
20.2.2.2. Emerging Asia Pacific
20.2.2.2.1. India
20.2.2.2.2. Indonesia
20.2.2.3. Eurasia
20.2.2.3.1. Russian Federation
20.2.2.3.2. Kazakhstan
20.2.2.4. Mature Asia Pacific
20.2.2.4.1. Singapore
20.2.2.4.2. Japan
20.2.2.4.3. South Korea
20.2.2.5. Middle East and South Africa
20.2.2.5.1. United Arab Emirates
20.2.2.6. North America
20.2.2.6.1. Canada
20.2.2.6.2. United States
20.2.2.7. Sub-Sahara Africa
20.2.2.7.1. South Africa
20.2.2.8. Worldwide
20.2.2.8.1. Ingram Micro
20.2.2.8.2. Tech Data
20.2.2.8.3. Westcon
20.3. Managed Service Enablement
20.3.1. Chartec
20.3.2. Jamcracker
20.4. OEM Manufacturers/Integrators
20.4.1. Appliances
20.4.1.1. Netronome
20.4.1.2. Lanner
20.4.1.3. Caswell
20.4.1.4. Portwell
20.4.2. Appliance Integrators
20.4.2.1. Dan-el Technologies Ltd.
20.4.2.2. Advantech
20.4.3. Chips
20.4.3.1. Cavium
20.4.3.2. Netronome
20.4.4. Cards
20.4.4.1. Netronome
20.4.5. Encryption Acceleration
20.4.5.1. Intel
20.4.5.1.1. VPRO
20.4.5.2. Safenet
20.4.5.2.1. Luna PCI
20.4.6. Software
20.4.6.1. Social Network Content Control
20.4.6.1.1. NetboxBlue
20.4.6.2. URL Categorization
20.4.6.2.1. Zvelo
20.4.6.3. Advanced Threat Protection - Virtual Execution Engines
20.4.6.3.1. ContentKeeper
20.4.6.4. Image Recognition
20.4.6.4.1. Image Analyzer
20.4.6.5. AntiMalware
20.4.6.5.1. Commtouch
20.4.6.6. Encryption
20.4.6.6.1. Transport
20.5. Product Testing
20.5.1. United Kingdom
20.5.1.1. Dennis Technology Labs
20.5.2. Generic Product Testing
20.5.2.1. North America
20.5.2.1.1. NIST
20.5.2.1.2. ICSA Labs (Division of Verizon)
20.5.2.1.3. NSS Labs
20.5.2.1.4. CGI
20.5.3. Sponsored Product Review/Testing
20.5.3.1. Network Testing Labs
20.5.3.2. West Coast Labs
20.5.3.3. Miercom
20.5.3.4. NSS Labs
20.5.4. Cryptographic Testing
20.5.4.1. NIST
20.5.4.1.1. FIPS 140-2
20.5.5. Anti-Malware Testing
20.5.5.1. VirusBTN
20.5.5.2. Av-Comparatives
20.5.5.3. AV-Test
20.6. Security Product Testing/Evaluation
20.6.1. Product Certification/Assurance
20.6.1.1. ICSA Labs
20.6.1.2. Common Criteria for Information Technology Security Evaluation (CCITSE)
20.6.1.2.1. EAL1 through EAL7
20.7. User Interface Consulting/Development
20.7.1. BlinkUX
20.7.2. Marketing
20.7.2.1. Agencies
20.7.2.1.1. Toolbox Studios
20.7.2.2. Market Destinations (Sites)
20.7.2.2.1. SCmagazine
20.7.2.2.2. Hak5
20.7.2.2.3. CRN
21. Managed Security Services
21.1. Indirect Providers
21.1.1. Asia Pacific
21.1.1.1. Singapore
21.1.1.1.1. e-Cop
21.1.1.1.2. NTT Singapore
21.1.1.1.3. Singtel
21.1.1.1.4. NCS Group
21.1.1.2. China
21.1.1.2.1. Hong Kong
21.1.1.3. Australia
21.1.2. Europe
21.1.2.1. BT Global Services
21.1.2.2. Dell SecureWorks
21.1.2.3. Germany
21.1.2.3.1. Link11 GMBH
21.1.2.3.2. IPsoft
21.1.2.4. HP
21.1.2.5. Integralis
21.1.2.6. Open Systems
21.1.2.7. Open Systems
21.1.2.8. Orange Business Services
21.1.2.9. Symantec
21.1.2.10. T-Systems
21.1.2.11. Tata Communications
21.1.2.12. Telefonica
21.1.2.12.1. DDoS Protection Service
21.1.2.12.2. Email Encryption
21.1.2.12.3. Email Security Gateway
21.1.2.12.4. Firewall Management
21.1.2.12.5. IAM
21.1.2.12.6. Intrusion Detection
21.1.2.12.7. Intrusion Prevention
21.1.2.12.8. Log Management
21.1.2.12.9. SIEM
21.1.2.12.10. Vulnerability Assessment
21.1.2.12.11. Web Security Gateway
21.1.2.12.12. Anti-Fraud
21.1.2.13. Verizon Business
21.1.2.13.1. Anti-DDoS
21.1.2.13.2. Email Security
21.1.2.13.3. Endpoint Protection
21.1.2.13.4. Firewall Management
21.1.2.13.5. Intrusion Detection
21.1.2.13.6. Intrusion Prevention
21.1.2.13.7. SIEM
21.1.2.13.8. Vulnerability Assessment
21.1.2.13.9. Web Security
21.1.2.14. Wipro
21.1.2.14.1. Email Security Gateway
21.1.2.14.2. Endpoint Security
21.1.2.14.3. Firewall Management
21.1.2.14.4. Fraud Management/Anti-Money Laundering
21.1.2.14.5. GRC
21.1.2.14.6. IAM
21.1.2.14.7. Intrusion Detection
21.1.2.14.8. Intrusion Prevention
21.1.2.14.9. SIEM
21.1.2.14.10. User Access Management
21.1.2.14.11. Web Security Gateway
21.1.3. Global Providers
21.1.3.1. AT&T
21.1.3.1.1. DDos Protection
21.1.3.1.2. Email/Data Encryption Services
21.1.3.1.3. Endpoint Anti-Virus
21.1.3.1.4. Endpoint Patch Management
21.1.3.1.5. Endpoint Policy Compliance
21.1.3.1.6. Mobile Device Security
21.1.3.1.7. Secure Email Gateway
21.1.3.1.8. Security Device Management
21.1.3.1.9. Web Application Firewall
21.1.3.1.10. Web Gateway (URL & Malware Filtering)
21.1.3.2. BT
21.1.3.3. Dell Secureworks
21.1.3.3.1. Advanced Malware Protection
21.1.3.3.2. Email Security Gateway
21.1.3.3.3. Firewall Management
21.1.3.3.4. Host IPS
21.1.3.3.5. IDS/IPS
21.1.3.3.6. Log Management
21.1.3.3.7. Log Retention
21.1.3.3.8. SIEM
21.1.3.3.9. Threat Intelligence
21.1.3.3.10. Unified Threat Management
21.1.3.3.11. Vulnerability Assessment
21.1.3.3.12. Web Application Firewall
21.1.3.3.13. Web Application Vulnerability Assessment
21.1.3.4. Dimension Data
21.1.3.5. HP
21.1.3.5.1. Access Managment
21.1.3.5.2. Data Loss Prevention
21.1.3.5.3. Email Security Gateway
21.1.3.5.4. Endpoint Encryption
21.1.3.5.5. Endpoint Protection
21.1.3.5.6. Intrusion Detection
21.1.3.5.7. Intrusion Prevention
21.1.3.5.8. Managed Incident Response
21.1.3.5.9. Remote Access Management
21.1.3.5.10. SIEM
21.1.3.5.11. Vulnerability Assessment
21.1.3.5.12. Web Application Vulnerability Assessment
21.1.3.5.13. Web Security Gateway
21.1.3.6. IBM
21.1.3.6.1. Email Security Gateway
21.1.3.6.2. Endpoint Patch Management
21.1.3.6.3. Endpoint Policy Management
21.1.3.6.4. Endpoint Protection
21.1.3.6.5. Firewall Management
21.1.3.6.6. IAM
21.1.3.6.7. Intrusion Detection
21.1.3.6.8. Intrusion Prevention
21.1.3.6.9. Log Management
21.1.3.6.10. Mobile Device Security
21.1.3.6.11. SIEM
21.1.3.6.12. Unified Threat Management
21.1.3.6.13. Vulnerability Assessment
21.1.3.6.14. Web Security Gateway
21.1.3.6.15. Web Vulnerability Assessment
21.1.3.7. Telstra
21.1.3.8. Verizon Business
21.1.3.8.1. Anti-DDoS
21.1.3.8.2. Email Security
21.1.3.8.3. Endpoint Protection
21.1.3.8.4. Firewall Management
21.1.3.8.5. Intrusion Detection
21.1.3.8.6. Intrusion Prevention
21.1.3.8.7. SIEM
21.1.3.8.8. Vulnerability Assessment
21.1.3.8.9. Web Security
21.1.4. Middle East and North Africa
21.1.4.1. Saudi Arabia
21.1.4.2. United Arab Emirates
21.1.4.2.1. Du Telecom
21.1.5. North America
21.1.5.1. Canada
21.1.5.1.1. Above Security
21.1.5.1.2. Bell Canada
21.1.5.1.3. OneStone (Formerly Seccuris)
21.1.5.1.4. EWA
21.1.5.1.5. SentryMetrics
21.1.5.1.6. Netpulse
21.1.5.2. United States
21.1.5.2.1. AT&T
21.1.5.2.2. Alert Logic
21.1.5.2.3. Allstream
21.1.5.2.4. CGI
21.1.5.2.5. CSC
21.1.5.2.6. CenturyLink- Savvis
21.1.5.2.7. Clone Systems
21.1.5.2.8. Compucom Systems
21.1.5.2.9. Dell Secureworks
21.1.5.2.10. HCL Technologies
21.1.5.2.11. HP
21.1.5.2.12. IBM
21.1.5.2.13. Megapath
21.1.5.2.14. Nuspire Networks
21.1.5.2.15. SAIC
21.1.5.2.16. Secure Designs
21.1.5.2.17. SilverSky (Formerly Stillsecure/Perimeter esecurity)
21.1.5.2.18. Solutionary
21.1.5.2.19. Sword and Shield
21.1.5.2.20. Symantec
21.1.5.2.21. Trustwave
21.1.5.2.22. Verizon Business
21.1.5.2.23. Wipro
21.2. Direct Tech Providers Managed Security
21.2.1. Asia Pacific
21.2.1.1. Australia
21.2.1.2. China
21.2.1.2.1. NSFOCUS
21.2.1.3. Singapore
21.2.2. Europe
21.2.3. Global Providers
21.2.4. Middle East and North Africa
21.2.4.1. Saudi Arabia
21.2.4.2. United Arab Emirates
21.2.5. North America
21.2.5.1. United States
21.2.5.1.1. NSFOCUS
21.2.5.1.2. Check Point Software
22. Database Security
22.1. Database Audit and Protection
22.1.1. Application Security, Inc
22.1.2. BeyondTrust
22.1.3. Fortinet
22.1.4. GreenSQL
22.1.5. IBM
22.1.6. Imperva
22.1.7. McAfee
22.1.8. Mentis Software
22.1.9. Oracle Corp
22.1.10. PentaSecurity
22.1.11. Warevalley
23. Network Security
23.1. Denial of Service Protection
23.1.1. Appliances
23.1.1.1. Arbor Networks
23.1.1.1.1. Prevail APS
23.1.1.2. Check Point Software
23.1.1.2.1. DDos Protector
23.1.1.3. Corero
23.1.1.4. Fortinet
23.1.1.5. Genie Networks
23.1.1.5.1. ATM Appliances
23.1.1.6. NSFOCUS
23.1.1.7. Radware
23.1.2. Security as a Service
23.1.2.1. Akamai
23.1.2.2. Black Lotus
23.1.2.3. Cloudflare
23.1.2.4. Incapsula
23.1.2.5. Link11
23.1.2.6. Prolexic
23.1.2.7. Neustar
23.1.2.8. Verisign
23.1.3. Clean Pipe Services
23.1.3.1. AT&T
23.1.3.2. Verizon
23.2. Network Access Control (NAC)
23.2.1. Host Based
23.2.1.1. Symantec
23.2.1.2. McAfee
23.2.2. Network Based
23.2.2.1. Forescout
23.2.2.2. Cisco
23.2.2.3. Bradford Networks
23.2.2.4. Milton Security Group
23.3. Network Firewalls
23.3.1. Enterprise Firewalls
23.3.1.1. Next Generation Firewalls
23.3.1.1.1. Fortinet
23.3.1.1.2. Palo Alto Networks
23.3.1.1.3. CheckPoint Software
23.3.1.2. Stateful Inspection - Traditional Firewalls
23.3.1.2.1. Cisco
23.3.1.2.2. Meraki
23.3.1.2.3. HP
23.3.1.2.4. Huawei
23.3.2. Open Source Based
23.3.2.1. IPchains
23.3.2.2. Untangle
23.3.3. Router Firewalls
23.4. Network Intrusion Prevention
23.4.1. CheckPoint
23.4.2. HP
23.4.2.1. TippingPoint
23.4.3. IBM
23.4.4. McAfee
23.4.5. Sourcefire
23.5. Unified Threat Management
23.5.1. CheckPoint
23.5.2. Cisco
23.5.3. Clavister
23.5.4. Fortinet
23.5.5. Hillstone Networks
23.5.6. Sonicwall
23.5.7. Sophos/Astaro
23.5.8. Trustwave
23.5.9. Untangle
23.5.10. WatchGuard