Emerging Security Markets & Technologies

Начать. Это бесплатно
или регистрация c помощью Вашего email-адреса
Emerging Security Markets & Technologies создатель Mind Map: Emerging Security Markets & Technologies

1. Moving Target Defense

1.1. Applications

1.1.1. General Apps

1.1.1.1. Polyverse

1.1.1.2. RunSafe Security

1.1.2. Mobile Apps

1.1.2.1. Everspin Global

1.1.3. Kameleon Security

1.1.4. APIs

1.1.4.1. HOPR

1.2. Data Security

1.2.1. Nexitech

1.3. Deception

1.3.1. Active Directory

1.3.1.1. Acalvio

1.3.1.2. Proofpoint

1.3.1.3. SentinelOne

1.3.2. Distributed Deceptions

1.3.2.1. Acalvio

1.3.2.2. Fidelis Cybersecurity

1.3.2.3. SentinelOne

1.3.2.4. TrapX

1.3.2.5. Zscaler

1.3.2.6. Cynet

1.3.3. Endpoint

1.3.3.1. Cybertrap

1.3.3.2. Minerva Labs

1.4. Kubernetes

1.4.1. R6 Security

1.5. Memory

1.5.1. Anjuna

1.5.2. Intel

1.5.3. Morphisec

1.6. Network

1.6.1. CryptoniteNXT

1.6.2. Dispel.io

1.7. Operating Systems

1.7.1. Runsafe Security

1.8. Secure Computation

1.8.1. Agita Labs

1.8.2. Kameleon Security

1.8.3. Polyverse

2. Data Security

2.1. Data Security Posture Management

2.1.1. Concentric AI

2.1.2. Cyera

2.1.3. DIG Security

2.1.4. Flow Security

2.1.5. Laminar

2.1.6. Orca Security

2.1.7. Polar Security

2.1.8. Satori

2.1.9. Securiti.AI

2.1.10. Sentra

2.1.11. Symmetry Systems

2.1.12. Varonis

2.2. Isolation and Vaulting

2.2.1. Acronis

2.2.2. Cohesity

2.2.3. Commvault

2.2.4. Dell

2.2.5. Elastio

2.2.6. Rubric

2.2.7. Veeam

2.2.8. Veritas Technologies

2.3. Data Security Platforms

2.3.1. Cyera

2.3.2. IBM

2.3.3. Immuta

2.3.4. Okera

2.3.5. OneTrust

2.3.6. Prime Factors

2.3.7. Privacera

2.3.8. Privitar

2.3.9. Protegrity

2.3.10. Satori

2.3.11. SecuPi

2.3.12. TrustArc

2.3.13. Varonis

3. Application Security

3.1. API Defense

3.1.1. Cequence Security

3.1.2. Google Cloud

3.1.3. Imperva

3.1.4. L7Defense

3.1.5. Mulesoft

3.1.6. Salt.Security

3.1.7. SignalSciences

3.1.8. Spherical Defense

3.1.9. WallArm

3.1.10. Noname Security

3.1.11. Spherical Defence

3.1.12. Signal Sciences

3.2. Application Security Posture Management (ASPM)

3.2.1. Apiiro

3.2.2. ArmorCode

3.2.3. Bionic

3.2.4. Brinqa

3.2.5. Data Theorum

3.2.6. Dazz

3.2.7. Enso Security

3.2.8. Kenna Security

3.2.9. Kondukto

3.2.10. Maverix

3.2.11. Nucleus

3.2.12. Ox Security

3.2.13. Oxeye

3.2.14. Rezilion

3.2.15. Synopsys (Code Dx)

3.2.16. Tromzo

3.2.17. Wabbi

3.3. Composable Security APIs

3.3.1. Abuse.ch (URLHAUS)

3.3.2. Alienvault

3.3.3. Amazon

3.3.4. Avira

3.3.5. Bitdefender

3.3.6. BrightCloud (OpenText)

3.3.7. CISA (Automated Intelligence Sharing - AIS)

3.3.8. Fingerbank

3.3.9. Flare

3.3.10. Google (Virustotal)

3.3.11. Infraguard

3.3.12. Intel 471

3.3.13. MISP

3.3.14. Okta

3.3.15. OpenPhish

3.3.16. Pangea Security

3.3.17. Ping Identity

3.3.18. Proofpoint (Emerging Threats)

3.3.19. ReversingLabs

3.3.20. Sophos

3.3.21. Spamhaus

3.3.22. Stairwell

3.3.23. VMray

3.3.24. Domaintools

3.4. Moving Target Defense

3.4.1. Applications

3.4.1.1. Application Mesh

3.4.1.1.1. Hopr.co

3.4.1.2. General Apps

3.4.1.2.1. RunSafe Security

3.4.1.2.2. ScrambleUp

3.4.1.3. Mobile Apps

3.4.1.3.1. Everspin Global

4. Identification, Authentication, Access Control & IAM

4.1. Active Directory Defense

4.1.1. SentinelOne

4.1.2. Varonis

4.2. Cloud Infrastructure Entitlement Management

4.2.1. Attivo Networks

4.2.2. Authomize

4.2.3. Britive

4.2.4. CyberArk

4.2.5. Ermetic

4.2.6. Horangi Cyber Security

4.2.7. Microsoft

4.2.8. Obsidian

4.2.9. Palo Alto Networks

4.2.10. SailPoint

4.2.11. Saviynt

4.2.12. Sonrai Security

4.2.13. Zscaler

4.3. Identity Threat Detection and Response (ITDR)

4.3.1. Authmind

4.3.2. Authomize

4.3.3. Cayosoft

4.3.4. CionSystems

4.3.5. Crowdstrike

4.3.6. Imanami

4.3.7. Lepide

4.3.8. ManageEngine

4.3.9. Microsoft (Defender for Cloud)

4.3.10. Netwrix

4.3.11. Oort

4.3.12. Plurilock

4.3.13. QOMPLX

4.3.14. Quest

4.3.15. Semperis

4.3.16. SentinelOne

4.3.17. Silverfort

4.3.18. Varonis

4.3.19. Varonis

4.3.20. Zohno

5. Internet of Things (IoT/OT)

5.1. Access Control

5.1.1. Sensify Security

5.2. Anomaly Detection

5.2.1. InfluxData

5.3. Authentication

5.3.1. Device Authority

5.3.2. Sensify Security

5.3.3. Trusfort

5.4. Automotive

5.4.1. Argus Cyber Security

5.4.2. Karamba Security

5.4.3. ProvenCore

5.4.4. Security Innovation

5.5. Embedded Security

5.5.1. ProvenCore

5.5.2. Security Innovation

5.5.3. Sequitur Labs

5.6. Encryption

5.6.1. Rubicon

5.7. Gateways

5.7.1. Bayshore Networks

5.7.2. Xage Security

5.7.3. Huawei

5.8. Industrial Control Systems (ICS/SCADA)

5.8.1. Network Traffic Inspection

5.8.1.1. Claroty

5.8.1.2. CyberX

5.8.1.3. Dragos

5.8.1.4. Indegy

5.8.1.5. Nexdefense

5.8.1.6. Sentryo

5.8.2. Firewall

5.8.2.1. Check Point Software

5.8.2.2. Forcepoint

5.8.2.3. Fortinet

5.8.2.4. Radiflow

5.8.3. Remote Access

5.8.3.1. Claroty

5.9. Power Monitoring

5.9.1. PFP Cybersecurity

5.10. Radio

5.10.1. Bastille

5.11. Risk and Compliance

5.11.1. VDOO

5.12. Operating System

5.12.1. ProvenCore

6. Infrastructure Protection

6.1. Blockchain-Based Data Protection

6.1.1. Acronis

6.2. Enterprise SIGINT

6.2.1. AirEye

6.2.2. Hawkeye360

6.2.3. Loch Technologies

6.2.4. xScape

6.3. Zero Trust Network Access (ZTNA)

6.3.1. Absolute Software

6.3.2. Akamai

6.3.3. Appgate

6.3.4. Banyan Security

6.3.5. Barracuda

6.3.6. Bitglass

6.3.7. Blackberry

6.3.8. Cato Networks

6.3.9. Check Point

6.3.10. Cisco

6.3.11. Cloudflare

6.3.12. Cyolo

6.3.13. Forcepoint

6.3.14. Fortinet

6.3.15. Instasafe

6.3.16. Ivanti

6.3.17. Netscope

6.3.18. Okta

6.3.19. Palo Alto Networks

6.3.20. Pulse Secure

6.3.21. Sophos

6.3.22. Symantec

6.3.23. Verizon

6.3.24. Versa Networks

6.3.25. Zscaler

7. BlockChain

7.1. Asset Integrity

7.1.1. Guardtime

7.2. Authentication

7.2.1. NuID

7.3. Encryption

7.3.1. REMME

7.4. Hardware Wallets

7.4.1. CoolWallet

7.4.2. Ellipal

7.4.3. KeepKey

7.4.4. Ledger

7.4.5. PrivacyPros

7.4.6. SafePal

7.4.7. ShiftCrypto

7.4.8. Trezor.io

7.5. Software Defined Perimeter

7.5.1. Block Armour

7.6. BlockChain Surveillence and Analytics

7.6.1. Ankrscan

7.6.2. Bitquery

7.6.3. Chainalysis

7.6.4. CipherTrace

7.6.5. Coinmetrics

7.6.6. Elementus

7.6.7. elliptic.co

7.6.8. Lukka

7.6.9. Messari.io

7.6.10. Trmlabs

7.7. Blockchain Security Monitoring

7.7.1. Hypernative.io

8. Risk, Compliance and Security Management

8.1. Security Ratings & Insurance

8.1.1. Security Ratings

8.1.1.1. Bitsight Technologies

8.1.1.2. FICO

8.1.1.3. Gooann

8.1.1.4. Guidewire Software

8.1.1.5. Prevalent

8.1.1.6. SecurityScoreCard

8.1.2. Cyber Risk Insurance

8.1.2.1. Balsiger Insurance

8.1.2.2. CyberWrite

8.1.2.3. HSB Group

8.1.2.4. Philadelphia Insurance Companies

8.1.2.5. Tennant Risk Services

8.1.2.6. The Hartford

8.1.2.7. Travelers

8.2. Digital Risk Protection Services

8.2.1. BlueVoyant

8.2.2. CybelAngel

8.2.3. CyberInt

8.2.4. Digital Shadows

8.2.5. IntSights

8.2.6. PhishLabs

8.2.7. Recorded Future

8.2.8. RiskIQ

8.2.9. SafeGuard Cyber

8.2.10. ZeroFOX

9. Security Operations & Incident Response

9.1. Cloud Incident Response Automation (CIRA)

9.1.1. Binalyze

9.1.2. Cado Security

9.1.3. Cado Security, Binalyze, F-Response, Mitiga, Magnet Forensics, Paraben

9.1.4. F-Response

9.1.5. Magnet Forensics

9.1.6. Mitiga

9.1.7. Paraben

9.2. Continuous Threat and Exposure Management

9.2.1. Cyber Asset Attack Surface Management

9.2.1.1. AirTrack Software

9.2.1.2. AppNovi

9.2.1.3. Armis

9.2.1.4. Axonius

9.2.1.5. Balbix

9.2.1.6. Brinqa

9.2.1.7. CoalFire

9.2.1.8. Cyberpion

9.2.1.9. CyCognito

9.2.1.10. DigitalShadows

9.2.1.11. Dragonfly Cyber

9.2.1.12. FireCompass

9.2.1.13. HackerOne

9.2.1.14. JupiterOne

9.2.1.15. LookingGlass Cyber

9.2.1.16. Microsoft

9.2.1.17. Netspi

9.2.1.18. New Push

9.2.1.19. Noetic Cyber

9.2.1.20. NorthStar.io

9.2.1.21. Palo Alto Networks

9.2.1.22. Panaseer

9.2.1.23. Pentera

9.2.1.24. Performata

9.2.1.25. Randori

9.2.1.26. RunZero

9.2.1.27. Sevco Security

9.2.1.28. TemplarBit

9.2.2. External ASM (EASM)

9.2.2.1. Assetnote

9.2.2.2. Censys

9.2.2.3. Crowdstrike

9.2.2.4. CyCognito

9.2.2.5. Darktrace

9.2.2.6. FireCompass

9.2.2.7. IBM (Formerly Randori)

9.2.2.8. Immuniweb

9.2.2.9. LookingGlass Cyber

9.2.2.10. Mandiant

9.2.2.11. Palo Alto Networks

9.2.2.12. Performata

9.2.2.13. Recorded Future

9.2.2.14. Reflectiz

9.2.2.15. Team Cymru

9.2.2.16. Upguard

9.3. Cyber Defense Program Optimization (CDPO)

9.3.1. Bluelava

9.3.2. Cardinal Ops

9.3.3. Enveedo

9.3.4. Holisticyber

9.3.5. Onyxia

9.3.6. Posturity

9.3.7. Rivial

9.3.8. SeeMetrics

9.3.9. Trustmapp

9.3.10. Veriti

9.3.11. XM Cyber

9.4. Cyber Ranges

9.4.1. Cloud Range

9.4.2. CYBER RANGES

9.4.3. Cyberbit

9.4.4. Cyrin

9.4.5. IBM

9.4.6. Immersive Labs

9.4.7. Keysight

9.4.8. RangeForce

9.4.9. Simspace

9.5. Intelligence/Data Feeds/Software & Services

9.5.1. Collaborative Threat Investigation Platforms

9.5.1.1. BAE Systems Detica

9.5.1.1.1. Cybereveal

9.5.1.2. Maltego

9.5.1.3. NC4

9.5.1.4. Palentir

9.5.1.4.1. Cyber

9.5.2. Open Source Threat & Data Mining

9.5.2.1. ThreatCrowd.org

9.5.2.2. ThreatMiner.org

9.5.3. Security Intelligence and Data Analysis Platforms

9.5.3.1. Trellix

9.5.3.1.1. Security Orchestrator

9.5.3.2. Palentir

9.5.4. Threat Intelligence Platforms (TIPs)

9.5.4.1. Anomali

9.5.4.2. BAE Systems

9.5.4.3. Comilion

9.5.4.4. CTILab

9.5.4.5. Cyjax

9.5.4.6. Eclectic IQ

9.5.4.7. Infoblox

9.5.4.8. Lockheed Martin

9.5.4.9. Lookingglass Cyber Solutions

9.5.4.10. Microsoft

9.5.4.10.1. Interflow

9.5.4.11. NC4

9.5.4.11.1. Soltra

9.5.4.12. Pulsedive

9.5.4.13. Service Now (Formerly Brightpoint)

9.5.4.14. Synopsys

9.5.4.15. ThreatConnect

9.5.4.16. ThreatQuotient

9.5.4.17. TruStar

9.5.4.18. Zeneth

9.5.5. Threat Intelligence Services

9.5.5.1. Human Intelligence - HUMINT (Strategic)

9.5.5.1.1. Attacker Tactics, Techniques and Procedures

9.5.5.1.2. Brand & Attack Target Monitoring

9.5.5.1.3. Credential Theft

9.5.5.1.4. Cybersquatting

9.5.5.1.5. External Data Loss & Risk Monitoring

9.5.5.1.6. Social Media, User Forum and External Threat Monitoring

9.5.5.2. Machine-Based (Tactical)

9.5.5.2.1. Anti-Phishing

9.5.5.2.2. Anti-Spam

9.5.5.2.3. Domain Name Monitoring/DGA Feeds

9.5.5.2.4. File Reputation

9.5.5.2.5. Indicators of Compromise (Feeds)

9.5.5.2.6. IP Blacklists

9.5.5.2.7. IP Reputation Feeds

9.5.5.2.8. Malicious Hashes

9.5.5.2.9. TI Feed Aggregation

9.5.5.2.10. Vulnerabilities and Exploits

9.5.5.2.11. Web Malware

9.6. LLM Enabled SOAR

9.6.1. BlinkOps

9.6.2. Dropzone.ai

9.7. Security Search

9.7.1. Cyclops Security

10. Cloud Security

10.1. Cloud Infrastructure Entitlement Management (CIEM)

10.1.1. ARCON

10.1.2. Authomize

10.1.3. Britive

10.1.4. CyberArk

10.1.5. Ermetic

10.1.6. Horangi Cyber Security

10.1.7. Microsoft (CloudKnox Security)

10.1.8. Orca Security

10.1.9. Palo Alto Networks

10.1.10. SailPoint

10.1.11. Saviynt

10.1.12. SentinelOne (Attivo Networks)

10.1.13. Sonrai Security

10.1.14. Sysdig

10.1.15. Uptycs

10.1.16. Wiz

10.1.17. Zscaler

10.2. Cloud Native Application Protection Platforms (CNAPP)

10.2.1. Aqua Security

10.2.2. Bionic

10.2.3. BMC (Helix Cloud Security)

10.2.4. Caveonix

10.2.5. Check Point Software

10.2.6. Cyberark

10.2.7. Ermetic

10.2.8. F5

10.2.9. Fugue

10.2.10. Lacework

10.2.11. Microsoft (Defender for Cloud)

10.2.12. NetApp (Formerly CloudCheckr

10.2.13. nOps

10.2.14. Orca

10.2.15. Palo Alto Networks (Prisma Cloud)

10.2.16. Rapid7

10.2.17. RuneCast

10.2.18. Skyhigh Security

10.2.19. Sophos Cloud Optix

10.2.20. Sysdig

10.2.21. Tenable

10.2.22. Tenacity

10.2.23. Threat Stack

10.2.24. Trellix

10.2.25. Trend Micro

10.2.26. Turbot

10.2.27. Wiz

10.3. Cloud Security Posture Management (CSPM)

10.3.1. Alert Logic

10.3.2. AlienV

10.3.3. Carbon Black

10.3.4. Check Point

10.3.5. Cisco

10.3.6. F-Secure

10.3.7. FireEye

10.3.8. IBM Security

10.3.9. Kaspersky

10.3.10. LogRhythm

10.3.11. McAfee

10.3.12. Palo Alto Networks

10.3.13. Qualys

10.3.14. Rapid7

10.3.15. Sophos

10.3.16. Splunk

10.3.17. Symantec

10.3.18. Tenable

10.3.19. Trend Micro

10.3.20. Wiz

10.4. Kubernetes Security

10.4.1. KSPM

10.4.1.1. Aqua Security

10.4.1.2. Armo Security

10.4.1.3. Buildpiper

10.4.1.4. Check Point Software

10.4.1.5. Orca Security

10.4.1.6. Runecast

10.4.1.7. Sysdig

10.4.2. CWPP

10.4.2.1. Aqua Security

10.4.2.2. Crowdstrike

10.4.2.3. Microsoft

10.4.2.4. Palo Alto Networks

10.4.2.5. Redhat ACS

10.4.2.6. SentinelOne

10.4.2.7. Sophos (Capsule8)

10.4.2.8. SUSE (Neuvector)

10.4.2.9. Tigera

10.4.2.10. Trend Micro

10.4.2.11. Uptycs

10.4.2.12. Wiz

10.4.3. Kubernetes Runtime Security

10.4.3.1. Aqua Security

10.4.3.2. Araali Networks

10.4.3.3. Crowdstrike

10.4.3.4. DeepFactor

10.4.3.5. Kodem Security

10.4.3.6. KSOC

10.4.3.7. LightSpin Security

10.4.3.8. Operant.ai

10.4.3.9. Palo Alto Networks

10.4.3.10. Snyk

10.4.3.11. Sweet Security

10.4.3.12. Sysdig

10.4.3.13. ThreatX

10.4.3.14. Upwind Security

10.4.3.15. Wiz

10.5. SaaS Management Platforms

10.5.1. Augmentt

10.5.2. Auvik

10.5.3. Beamy

10.5.4. Bettercloud

10.5.5. LeanIx

10.5.6. Lumos

10.5.7. Oomnitza

10.5.8. Productiv

10.5.9. Torii

10.5.10. Trelica

10.5.11. Zluri

10.5.12. Zylo

10.6. SaaS Security Posture Management (SSPM)

10.6.1. Adaptive Shield

10.6.2. Appomni

10.6.3. Asterisk Security

10.6.4. Atmosec

10.6.5. Axonius

10.6.6. DoControl

10.6.7. Obsidian Security

10.6.8. Privya

10.6.9. Reco.ai

10.6.10. Reveal Security

10.6.11. Valence Security

10.6.12. Wing Security

10.7. Data Provenance/Lineage

10.7.1. RKVST

10.7.2. Alation

10.7.3. Informatica

10.7.4. Octopai

11. Browser Security

11.1. Browser Extensions for Security

11.1.1. Ermes

11.1.2. Guardio

11.1.3. HP

11.1.4. Inky

11.1.5. Keep Aware

11.1.6. LayerX

11.1.7. Manage Engine

11.1.8. Perception Point

11.1.9. Seraphic

11.1.10. Slashnext

11.1.11. Trend Micro

11.2. Secure Enterprise Browsers

11.2.1. Island.io

11.2.2. Talon Security

12. Collaboration Security

12.1. Abnormal Security

12.2. Check Point Software

12.3. Microsoft

12.4. SafeGuard Cyber

12.5. Slashnext

12.6. Trellix

12.7. Trend Micro

12.8. WithSecure

13. ML and GenAI Security

13.1. AI TRISM

13.1.1. AI Application Security

13.1.1.1. Bosh AISheild

13.1.1.2. CalypsoAI

13.1.1.3. HiddenLayer

13.1.2. Model Monitoring

13.1.2.1. Abzu

13.1.2.2. Amruta Inc

13.1.2.3. Arize AI

13.1.2.4. ArthurAI

13.1.2.5. DreamQuark

13.1.2.6. Fairly.ai

13.1.2.7. Fiddler

13.1.2.8. Giskard

13.1.2.9. Kyndi

13.1.2.10. Robust Intelligence

13.1.2.11. Seldon Technologies

13.1.2.12. SolasAI

13.1.2.13. Superwise

13.1.2.14. TMRYK

13.1.2.15. TrojAI

13.1.2.16. Truera

13.1.3. Model Ops

13.1.3.1. Aporia

13.1.3.2. Cnvrg.io

13.1.3.3. HPE

13.1.3.4. Iguazio

13.1.3.5. ModelOp

13.1.3.6. Modzy

13.1.3.7. Mona

13.1.3.8. One Data

13.1.3.9. tmryk

13.1.3.10. Valohai

13.1.3.11. Verta

13.1.4. Privacy & Data Security

13.1.4.1. Anonos

13.1.4.2. DivePlane

13.1.4.3. Ederlabs

13.1.4.4. Enveil

13.1.4.5. Gretel

13.1.4.6. Hazy

13.1.4.7. LLMShield

13.1.4.8. Mostly AI

13.1.4.9. Plurilock

13.1.4.10. Private AI

13.1.4.11. Protopia AI

13.1.5. Standalone Prompt Filtering/Firewall

13.1.5.1. ArthurAI

13.1.5.2. Bosch AI Shield

13.1.5.3. Calypso.ai

13.1.5.4. LLMShield

13.1.5.5. tmryk

13.1.5.6. TrojAI

13.2. AI Platforms

13.2.1. Ask Sage

13.2.1.1. Data Encryption

13.2.2. Azure AI

13.2.2.1. Prompt Filtering

13.2.2.2. Data Grounding/Retrieval

13.2.2.3. Data Encryption at Rest

13.2.3. Google

13.2.4. HuggingFace

13.3. Secure Code Copilots

13.3.1. Alphacode

13.3.2. Amazon Codewhisperer

13.3.3. Ask Codi

13.3.4. Bito

13.3.5. Captain Stack

13.3.6. CodeGeex

13.3.7. Codeium

13.3.8. Fossa

13.3.9. Github

13.3.10. GPT-Code-Clippy (GPT-CC)

13.3.11. IntelliCode

13.3.12. Replit

13.3.13. Tabnine

13.3.14. YouCompleteMe