Information Security Technologies & Markets

Jetzt loslegen. Gratis!
oder registrieren mit Ihrer E-Mail-Adresse
Rocket clouds
Information Security Technologies & Markets von Mind Map: Information Security Technologies & Markets

1. Cloud Security

1.1. Cloud Firewall Management & Orchaestration

1.1.1. Check Point Software

1.1.2. Cisco

1.1.3. CloudPassage

1.1.4. Dome9

1.1.5. Hillstone Networks

1.1.6. Huawei

1.1.7. Illumio

1.1.8. Palo Alto Networks

1.1.9. Redcannon Security

1.1.10. VMware

1.1.11. XRoads Networks

1.1.12. vArmour

2. Security Operations & Incident Response

2.1. Forensics/eDiscovery

2.1.1. Forensic Products

2.1.1.1. eDiscovery

2.1.1.1.1. Clearwell

2.1.1.1.2. Kazeon

2.1.1.1.3. Guidance Software

2.1.1.1.4. Access Data

2.1.1.1.5. Autonomy

2.1.1.1.6. kCura

2.1.1.1.7. FTI Technology

2.1.1.1.8. Barracuda Networks

2.1.1.2. Mobile Devices

2.1.1.2.1. Cellebrite

2.1.1.2.2. Paraben

2.1.1.2.3. Oxygen

2.1.1.2.4. ViaForensics

2.1.1.3. Endpoint Computing Systems

2.1.1.3.1. Access Data

2.1.1.3.2. BlackBag

2.1.1.3.3. Cyfir

2.1.1.3.4. Guidance Software

2.1.1.3.5. Magnet Forensics

2.1.1.3.6. Nuix

2.1.1.3.7. OSForensics

2.1.1.3.8. Paraben

2.1.1.3.9. Xways Forensics

2.1.1.4. Forensics as a Service (FaaS)

2.1.1.4.1. CloudShark

2.1.1.5. Email Examination

2.1.1.5.1. Systools Software

2.1.1.5.2. Nuix

2.1.1.6. Forensic File & Data Analysis Tools

2.1.1.6.1. Cyfir

2.1.1.6.2. Intella

2.1.1.6.3. Magnet Forensics

2.1.1.6.4. Nuix

2.1.1.6.5. Systools Software

2.1.2. Network Forensics Tools (NFT)

2.1.2.1. Flow Analysis/Metadata Extraction

2.1.2.1.1. Arbor Networks

2.1.2.1.2. IBM

2.1.2.1.3. Lancope

2.1.2.1.4. LogRythm

2.1.2.1.5. Intel Security NBA

2.1.2.2. Forensic Capture with User Surveillance & Security Threat Analytics

2.1.2.2.1. Access Data

2.1.2.2.2. BlueCoat

2.1.2.2.3. EMC

2.1.2.2.4. FireEye

2.1.2.2.5. Fluke Networks

2.1.2.2.6. IBM

2.1.2.2.7. IP Fabrics

2.1.2.2.8. JDSU (Network Instruments)

2.1.2.2.9. LightCyber

2.1.2.2.10. NetAgent

2.1.2.2.11. NetResec

2.1.2.2.12. NetScout

2.1.2.2.13. Niksun

2.1.2.2.14. Novetta Solutions

2.1.2.2.15. Nuix

2.1.2.2.16. Packetsled

2.1.2.2.17. Riverbed

2.1.2.2.18. SS8

2.1.2.2.19. nPulse Technologies

2.1.2.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring

2.1.2.3.1. Emulex

2.1.2.3.2. Packetsled

2.1.2.3.3. WildPackets

2.1.2.4. Network Packet Brokers

2.1.2.4.1. Adara

2.1.2.4.2. Apcon

2.1.2.4.3. Arista Networks

2.1.2.4.4. Cubro

2.1.2.4.5. Gigamon

2.1.2.4.6. IXIA

2.1.2.4.7. Interface Masters Technologies

2.1.2.4.8. JDSU

2.1.2.4.9. NetOptics

2.1.2.4.10. NetScout

2.1.2.4.11. VSS Monitoring

2.1.2.5. Network Taps

2.1.2.5.1. Optical

2.1.2.6. Raw Network Packet Capture

2.1.2.6.1. Apcon

2.1.2.6.2. Arbor Networks

2.1.2.6.3. Comworth

2.1.2.6.4. WireShark

2.1.2.6.5. NTOP.org

2.1.3. Incident Response Management Software

2.1.3.1. SaaS

2.1.3.1.1. Co3 Systems

2.1.3.2. Software

2.1.3.2.1. DF Labs

2.1.4. eDiscovery Services

2.1.4.1. Robert Half

2.1.4.2. Advanced Discovery

2.1.5. eDiscovery Software

2.1.5.1. AccessData

2.1.5.2. Guidance Software

2.1.5.3. Nuix

2.1.5.4. Symantec

2.2. Security Incident Response Platforms (SIRP)

2.2.1. CSG Invotas

2.2.2. Cybersponse

2.2.3. DFLabs

2.2.4. Fido

2.2.5. Hexadite

2.2.6. Phantom Cyber

2.2.7. Proofpoint

2.2.8. Resilient Systems

2.2.9. ID Experts

2.3. Incident Response Collaboration Software

2.3.1. Resilient Systems

2.4. Incident Response Legal Services

2.4.1. Information Law Group

2.5. Security Information and Event Management (SIEM), Log Management & Analytics

2.5.1. Application Security Intelligence Engine

2.5.1.1. SAP

2.5.1.1.1. iT-Cube Systems

2.5.2. Log Management

2.5.2.1. EventTracker

2.5.2.2. IGLOO Security

2.5.2.3. Intel Security

2.5.2.3.1. McAfee Enterprise Log Manager

2.5.2.4. Kiwi Syslog Server

2.5.2.5. LogEntries

2.5.2.6. LogRythm

2.5.2.7. Logscape

2.5.2.8. Open Source

2.5.2.8.1. Elasticsearch (ELK Stack)

2.5.2.8.2. SEC (Simple Event Correlator)

2.5.2.8.3. OSSIM

2.5.2.8.4. Syslog-NG

2.5.2.8.5. Octopussy

2.5.2.9. Sawmill

2.5.2.10. Splunk

2.5.2.11. Sumo Logic

2.5.2.12. Tripwire

2.5.2.13. XpoLog

2.5.3. SIEM

2.5.3.1. AlienVault

2.5.3.1.1. OSSIM

2.5.3.2. CorreLog

2.5.3.3. EventTracker

2.5.3.4. HP

2.5.3.4.1. Arcsight

2.5.3.5. Hexis Cyber Solutions

2.5.3.5.1. Hawkeye AP

2.5.3.6. IBM

2.5.3.6.1. Q1Radar

2.5.3.7. IGLOO Security

2.5.3.8. LogPoint

2.5.3.8.1. http://www.logpoint.com/en/

2.5.3.9. LogRythm

2.5.3.10. Intel Security

2.5.3.10.1. NitroSecurity

2.5.3.11. Novell

2.5.3.11.1. Sentinel

2.5.3.12. RSA

2.5.3.12.1. Envision

2.5.3.13. Sensage

2.5.3.14. Solarwinds

2.5.3.15. Splunk

2.5.3.16. Sqrrl

2.5.3.17. Tibco

2.5.3.17.1. Loglogic

2.5.3.18. eIQnetworks

2.5.4. Security Analytics

2.5.4.1. Anomaly Analytics

2.5.4.1.1. Intel

2.5.4.1.2. Theta Ray

2.5.4.1.3. Prelert

2.5.4.2. User and Entity Behavior Analytics (UEBA)

2.5.4.2.1. Bay Dynamics

2.5.4.2.2. Darktrace

2.5.4.2.3. Exabeam

2.5.4.2.4. Fortscale

2.5.4.2.5. Gurcul

2.5.4.2.6. HP

2.5.4.2.7. IBM

2.5.4.2.8. Interset

2.5.4.2.9. Microsoft

2.5.4.2.10. Niara

2.5.4.2.11. Platfora

2.5.4.2.12. Secureonix

2.5.5. Threat Investigation and Analysis Platforms

2.5.5.1. BAE System Detica

2.5.5.1.1. Cybereveal

2.5.5.2. IKANow

2.5.5.3. Maltego

2.5.5.4. Palentir

2.5.5.4.1. Cyber

2.5.6. User and Entity Behavior Analytics (UEBA)

2.5.6.1. Bae Systems Applied Intelligence

2.5.6.2. Bay Dynamics

2.5.6.3. Caspida

2.5.6.4. Click Security

2.5.6.5. Exabeam

2.5.6.6. FICO

2.5.6.7. Fortscale

2.5.6.8. GuruCul

2.5.6.9. IBM

2.5.6.10. Intellinx

2.5.6.11. Lockheed Martin

2.5.6.12. Logtrust

2.5.6.13. Mobile System 7

2.5.6.14. Novetta Solutions

2.5.6.15. Oracle

2.5.6.16. Raytheon

2.5.6.17. SAS Institute

2.5.6.18. Secureonix

2.5.6.19. Splunk

3. Emerging Security Markets & Technologies

3.1. Application Security

3.1.1. Runtime Application Self Protection

3.1.1.1. Metaforic

3.1.1.2. Arxan

3.2. Cloud Security

3.2.1. Cloud Protection Gateways

3.2.1.1. CipherCloud

3.2.1.2. Netskope

3.2.1.3. Perspecsys

3.2.1.4. Skyhigh Networks

3.2.1.5. Vaultive

3.2.2. Cloud Access Security Brokers

3.2.2.1. User Activity Monitoring

3.2.2.1.1. Adallom

3.2.2.1.2. Bitglass

3.2.2.1.3. Elastica

3.2.2.1.4. Harvest.ai

3.2.2.1.5. Imperva

3.2.2.1.6. Netscope

3.2.2.1.7. SkyHigh Networks

3.2.2.2. Data Loss Prevention

3.2.2.2.1. DLP-Lite

3.2.2.2.2. Harvest.ai

3.2.2.3. Encryption

3.2.2.3.1. SkyHigh Networks

3.2.2.3.2. Adallom

3.2.2.3.3. Managed Methods

3.2.2.4. Identity and Access Management

3.2.2.4.1. Centrify

3.2.2.4.2. Cloudiway

3.2.2.4.3. Okta

3.2.2.4.4. Ping

3.2.2.5. Access Control

3.2.2.5.1. Adallom

3.2.2.5.2. Bitglass

3.2.2.5.3. Elastica

3.2.2.5.4. FireLayers

3.2.2.5.5. Netskope

3.2.2.5.6. Skyfence

3.2.2.5.7. Managed Methods

3.2.3. Cloud Application Discovery

3.2.3.1. Ciphercloud

3.2.3.2. Elastica

3.2.3.3. Netskope

3.2.3.4. Skyhigh

3.3. Data Security

3.4. Endpoint Security

3.4.1. Endpoint Detection and Response

3.4.1.1. Agent-Based

3.4.1.1.1. Bit9

3.4.1.1.2. Cisco

3.4.1.1.3. Confer

3.4.1.1.4. Countertack

3.4.1.1.5. CrowdStrike

3.4.1.1.6. Cyberreason

3.4.1.1.7. Cylance

3.4.1.1.8. Digital Guardian

3.4.1.1.9. Dtex Systems

3.4.1.1.10. Endgame Systems

3.4.1.1.11. Fidelis Cybersecurity

3.4.1.1.12. FireEye

3.4.1.1.13. Forescout

3.4.1.1.14. Guidance Software

3.4.1.1.15. Hexis Cyber Solutions

3.4.1.1.16. Invincea

3.4.1.1.17. LogRhythm

3.4.1.1.18. NexThink

3.4.1.1.19. Panda Security

3.4.1.1.20. RSA (EMC)

3.4.1.1.21. SecDo

3.4.1.1.22. SentinelOne

3.4.1.1.23. Tanium

3.4.1.1.24. Triumfant

3.4.1.1.25. Ziften

3.4.1.2. Agentless

3.4.1.2.1. Cynet

3.4.1.2.2. Fidelis

3.4.1.2.3. ForeScout

3.4.1.2.4. Hexadite

3.4.1.2.5. Hexis Cyber Solutions

3.4.1.2.6. LightCyber

3.4.1.2.7. Outlier Security

3.4.1.2.8. Promisec

3.5. Identification, Authentication, Access Control & IAM

3.6. Internet of Things

3.7. Network & Infrastructure Security

3.7.1. Advanced Content Disarming (ACD)

3.7.1.1. Check Point Software

3.7.1.1.1. Threat Extraction

3.7.1.2. Glasswall

3.7.1.2.1. http://www.glasswallsolutions.com/

3.7.1.3. OPSWAT

3.7.1.4. Re-Sec

3.7.1.4.1. http://www.re-sec.com/

3.7.1.5. Sasa-Software

3.7.1.5.1. http://www.sasa-software.com/

3.7.1.6. Symantec

3.7.1.6.1. DisArm

3.7.1.7. TreSys

3.7.1.7.1. http://www.tresys.com/

3.7.1.8. Votiro

3.7.1.8.1. http://www.votiro.com/

3.7.2. Unauthorized Connection Prevention

3.7.2.1. Ensilo

3.7.3. Malware Infection Analysis and Monitoring Services

3.7.3.1. Lastline

3.7.3.1.1. Guardia

3.7.3.2. OpenDNS

3.7.3.3. Qualys

3.7.3.4. Seculert

3.7.4. Network Behavior and Analytics

3.7.4.1. Industrial Control Systems (ICS)

3.7.4.1.1. CyberX

3.8. Risk, Compliance and Security Management

3.8.1. Security Ratings & Insurance

3.8.1.1. Security Ratings

3.8.1.1.1. Bitsight Technologies

3.8.1.1.2. SecurityScoreCard

3.8.1.2. Cyber Risk Insurance

3.8.1.2.1. Balsiger Insurance

3.8.1.2.2. HSB Group

3.8.1.2.3. Philadelphia Insurance Companies

3.8.1.2.4. Tennant Risk Services

3.8.1.2.5. The Hartford

3.8.1.2.6. Travelers

3.9. Security Operations, Incident Response

3.9.1. Intelligence/Data Feeds/Software & Services

3.9.1.1. Security Intelligence and Data Analysis Platforms

3.9.1.1.1. CSG International

3.9.1.2. Threat Intelligence Platforms

3.9.1.2.1. BAE Systems

3.9.1.2.2. BrightPoint Security

3.9.1.2.3. Codenomicon

3.9.1.2.4. Comilion

3.9.1.2.5. Confer

3.9.1.2.6. IID

3.9.1.2.7. Lockheed Martin

3.9.1.2.8. Lookingglass Cyber Solutions

3.9.1.2.9. Palentir

3.9.1.2.10. Soltra

3.9.1.2.11. ThreatConnect

3.9.1.2.12. ThreatQuotient

3.9.1.2.13. ThreatStream

3.9.1.2.14. TruStar

3.9.1.3. Threat Intelligence Services

3.9.1.3.1. Human Intelligence - HUMINT (Strategic)

3.9.1.3.2. Machine-Based (Tactical)

3.9.2. Malware Analysis

3.9.2.1. Malware Analysis as a Service

3.9.2.1.1. Free Services

3.9.2.1.2. ReversingLabs

3.9.2.1.3. ThreatGrid

3.9.2.2. Sandbox Software

3.9.2.2.1. GFI

3.9.2.2.2. Joesecurity

3.9.2.2.3. Bluecoat

3.9.2.2.4. Payload Security

3.9.2.3. Firewalls

3.9.2.3.1. Palo Alto Networks

3.9.2.3.2. CheckPoint Software

3.9.2.3.3. Fortinet

3.9.3. Threat Deception Technologies

3.9.3.1. Decoy Endpoints

3.9.3.1.1. Atomic Software Solutions

3.9.3.1.2. Attivo Networks

3.9.3.1.3. Cymmetria

3.9.3.1.4. GuardiCore

3.9.3.1.5. KeyFocus

3.9.3.1.6. Specter

3.9.3.1.7. TrapX

3.9.3.2. Network

3.9.3.2.1. ForeScout

3.9.3.2.2. Shadow Networks

3.9.3.2.3. Juniper Networks

3.9.3.3. Open Source

3.9.3.3.1. Honeypot

3.9.3.4. Web

3.9.3.4.1. Shape Security

3.9.3.4.2. Juniper Networks

3.9.3.5. Active Endpoint

3.9.3.5.1. Javelin Networks

3.9.3.5.2. PreeDat Security

3.9.3.5.3. Preedat

3.10. Cross Domain Solutions

3.10.1. Advenica

3.10.1.1. ZoneGuard

3.10.1.2. SecuriRam

3.10.2. General Dynamics

3.10.2.1. TacGuard

3.10.2.2. Crossing Guard

3.10.2.3. NanoXD

3.10.3. LockHeed Martin

3.10.3.1. Trusted Manager

4. Market Logistics & Supply Chain

4.1. Cloud Service Brokerages

4.1.1. Bitnami

4.1.2. Ensim

4.1.2.1. http://www.ensim.com/

4.1.3. Gravitant

4.1.4. Jamcracker

4.1.4.1. http://www.jamcracker.com/

4.1.5. StandingCloud

4.2. Distribution/Channel

4.2.1. VARs, Resellers

4.2.1.1. China

4.2.1.1.1. Rainbow Tech

4.2.1.1.2. Broad Sky Innovation Technology

4.2.1.1.3. Qast Software Group

4.2.1.1.4. Macrosea

4.2.1.2. Eastern Europe

4.2.1.2.1. CZECH Republic

4.2.1.2.2. Poland

4.2.1.3. Emerging Asia Pacific

4.2.1.3.1. India

4.2.1.3.2. Indonesia

4.2.1.3.3. Malasia

4.2.1.3.4. Thailand

4.2.1.3.5. Philippines

4.2.1.4. Eurasia

4.2.1.4.1. Russian Federation

4.2.1.4.2. Kazakhstan

4.2.1.4.3. Ukraine

4.2.1.5. Latin America

4.2.1.5.1. Brazil

4.2.1.5.2. Chile

4.2.1.5.3. Columbia

4.2.1.5.4. Costa Rica

4.2.1.5.5. Ecuador

4.2.1.5.6. Bolivia

4.2.1.5.7. Venezuela

4.2.1.5.8. Cuba

4.2.1.5.9. Argentina

4.2.1.5.10. Buenos Aires

4.2.1.5.11. Mexico

4.2.1.5.12. Peru

4.2.1.6. Mature Asia Pacific

4.2.1.6.1. Australia

4.2.1.6.2. Japan

4.2.1.6.3. Singapore

4.2.1.7. Middle East and North Africa

4.2.1.7.1. Turkey

4.2.1.7.2. Israel

4.2.1.7.3. Saudi Arabia

4.2.1.7.4. South Africa

4.2.1.7.5. India

4.2.1.7.6. United Arab Emirates

4.2.1.8. North America

4.2.1.8.1. United States

4.2.1.8.2. Canada

4.2.1.9. Sub-Sahara Africa

4.2.1.9.1. South Africa

4.2.1.10. Western Europe

4.2.1.10.1. France

4.2.1.10.2. Germany

4.2.1.10.3. Italy

4.2.1.10.4. Netherlands

4.2.1.10.5. Spain

4.2.1.10.6. United Kingdom

4.2.1.11. WorldWide

4.2.1.11.1. AT&T

4.2.1.11.2. Verizon Business

4.2.2. Distributors

4.2.2.1. China

4.2.2.1.1. AVNet

4.2.2.1.2. B & Data Technology Co. Ltd.

4.2.2.1.3. Beijing Advazone Electronic Limited Comp

4.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.

4.2.2.1.5. Digital China Technology LTD.

4.2.2.1.6. Ecs China

4.2.2.1.7. Edvance Technology (China) Limited

4.2.2.1.8. Huagai

4.2.2.1.9. M.Tech (Shanghai) Co., Ltd.

4.2.2.1.10. Shanghai S-I Information Tech. Ltd

4.2.2.1.11. Sinogrid Information Technology Ltd.

4.2.2.1.12. Sky Faith International Enterprise

4.2.2.2. Emerging Asia Pacific

4.2.2.2.1. India

4.2.2.2.2. Indonesia

4.2.2.2.3. Thailand

4.2.2.3. Eurasia

4.2.2.3.1. Russian Federation

4.2.2.3.2. Kazakhstan

4.2.2.4. Mature Asia Pacific

4.2.2.4.1. Singapore

4.2.2.4.2. Japan

4.2.2.4.3. South Korea

4.2.2.4.4. Australia

4.2.2.5. Middle East and South Africa

4.2.2.5.1. United Arab Emirates

4.2.2.5.2. South Africa

4.2.2.6. North America

4.2.2.6.1. Canada

4.2.2.6.2. United States

4.2.2.7. Sub-Sahara Africa

4.2.2.7.1. South Africa

4.2.2.8. Western Europe

4.2.2.8.1. United Kingdom

4.2.2.8.2. Germany

4.2.2.9. Worldwide

4.2.2.9.1. AVNet

4.2.2.9.2. Ingram Micro

4.2.2.9.3. Tech Data

4.2.2.9.4. Westcon

4.2.2.10. Latin America

4.2.2.10.1. Mexico

4.2.2.10.2. Brazil

4.2.3. Reseller Programs

4.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm

4.2.4. Logistics/Deal Registration

4.2.4.1. Connectwise

4.3. Government Cyberwarrior (Personnel Estimates)

4.3.1. United States

4.3.1.1. NSA

4.3.1.1.1. Cyberwarrior Stats

4.3.1.2. Department of Defense

4.3.1.2.1. US Airforce

4.3.1.2.2. US Navy

4.3.1.2.3. DISA

4.3.2. Iran

4.3.2.1. 4500

4.3.3. Israel

4.3.3.1. Unit 8200

4.3.3.1.1. 5000

4.3.4. North Korea

4.3.4.1. 1000

4.4. Hardware and Chip Security

4.4.1. AMD

4.4.1.1. TPM

4.4.2. Cavium

4.4.2.1. Multi-Core Processors

4.4.3. Flow Processors

4.4.3.1. Netronome

4.4.4. Intel

4.4.4.1. TPM

4.4.4.2. Data Execution Protection

4.5. Investment

4.5.1. ETFs

4.5.1.1. PureFunds

4.5.1.1.1. SYM:HACK

4.5.2. Venture Capitalists

4.5.2.1. Trident Capital

4.5.2.2. Andreesen Horowitz

4.6. Managed Service Enablement

4.6.1. Chartec

4.6.2. Jamcracker

4.7. Marketing/PR/AR

4.7.1. Marketing/Branding Agencies

4.7.1.1. Hill and Knowlton

4.7.1.1.1. http://www.hkstrategies.com/

4.7.1.2. MetaDesign

4.7.1.2.1. http://www.metadesign.com/san-francisco

4.7.1.3. Ogilvy & Mather

4.7.1.4. Tailfin Marketing Communications

4.7.1.5. Toolbox Studios

4.7.2. Market Destinations (Sites)

4.7.2.1. CRN

4.7.2.2. Hak5

4.7.2.3. MSPMentor

4.7.2.4. Madison Logic

4.7.2.5. SCmagazine

4.7.2.6. TheVarGuy

4.7.3. Web Site Design

4.7.3.1. Baytech Web Design

4.7.3.1.1. http://www.baytechwebdesign.com/

4.7.3.2. EU Design Studios

4.7.3.2.1. http://eudesignstudio.com/

4.7.4. Creative Services

4.7.4.1. Gig Productions

4.7.4.1.1. http://www.gigpros.com/index.php

4.7.4.2. Duarte

4.7.4.2.1. http://www.duarte.com/

4.7.4.3. Text 100

4.7.4.3.1. http://www.text100.com/

4.7.4.4. Initiate Marketing

4.7.4.4.1. http://www.getinitiated.ca/

4.7.5. Campaign/Engagement

4.7.5.1. WCG World

4.7.5.1.1. http://wcgworld.com/

4.7.6. Analyst & Public Relations

4.7.6.1. KTCpr

4.7.6.1.1. http://www.kahn-travel.com/

4.7.6.2. Madison Alexander PR

4.7.6.2.1. http://www.madisonalexanderpr.com/

4.7.6.3. Marc Gendron PR

4.7.6.3.1. http://www.mgpr.info/

4.7.6.4. Schwartz Communications

4.7.6.4.1. http://www.schwartzmsl.com/

4.7.6.5. Spalding Communications

4.7.6.6. Text 100

4.7.6.6.1. http://www.text100.com/

4.7.7. Marketing Videos

4.7.7.1. Epipheo

4.7.7.1.1. http://www.epipheo.com/

4.8. OEMs & System Integrators

4.8.1. Appliance Integrators

4.8.1.1. Accton

4.8.1.1.1. http://www.accton.com/

4.8.1.2. Advantech

4.8.1.2.1. http://www.advantech.com/

4.8.1.3. Celestica

4.8.1.3.1. http://www.celestica.com/

4.8.1.4. Dan-el Technologies Ltd.

4.8.1.4.1. http://www.danel.co.il/

4.8.1.5. Flextronics

4.8.1.5.1. http://www.flextronics.com/

4.8.1.6. Plexus

4.8.1.6.1. http://www.plexus.com/

4.8.2. Base Appliances

4.8.2.1. Advantech

4.8.2.2. Amax

4.8.2.3. Cas Well

4.8.2.4. Iron Systems

4.8.2.5. Lanner

4.8.2.6. Portwell

4.8.2.7. Tilera

4.8.3. Cards

4.8.3.1. Netronome

4.8.3.2. Tilera

4.8.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection

4.8.4. Encryption Acceleration

4.8.4.1. Intel

4.8.4.1.1. VPRO

4.8.4.2. Safenet

4.8.4.2.1. Luna PCI

4.8.5. MSSP Appliances

4.8.5.1. 443 Networks

4.8.6. Threat Intelligence

4.8.6.1. IP Reputation

4.8.6.1.1. Norse Corp

4.8.6.1.2. Cyren

4.8.6.1.3. WebRoot Brightcloud

4.8.6.2. IP Block Lists

4.8.6.2.1. WebRoot Brightcloud

4.8.6.2.2. Norse Corp

4.8.6.2.3. Cyren

4.8.6.3. Fraud

4.8.6.3.1. Internet Fraud Alert

4.8.6.3.2. National Cyber-Forensics and Training Alliance

4.8.6.4. File Reputation

4.8.6.4.1. Findthatfile

4.8.6.5. Anti-Phishing

4.8.6.5.1. Cyren

4.8.6.6. Malicious URL

4.8.6.6.1. Cyren

4.8.6.6.2. Findthatfile

4.8.6.7. Indicators of Compromise

4.8.6.7.1. FireEye

4.8.6.7.2. Proofpoint

4.8.6.7.3. Wapack labs

4.8.6.8. Vulnerability Research

4.8.6.8.1. Telus Security Labs

4.8.6.8.2. Vupen

4.8.6.9. DNS DGA Feeds

4.8.6.9.1. Farsight Security

4.8.7. Security Related Chips & CPUs

4.8.7.1. Broadcom

4.8.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection

4.8.7.2. Cavium

4.8.7.2.1. http://www.cavium.com

4.8.7.3. Lionic

4.8.7.3.1. http://www.lionic.com/

4.8.7.4. Netronome

4.8.7.4.1. http://www.netronome.com

4.8.7.5. Tilera

4.8.7.5.1. http://www.tilera.com/products/processors

4.8.7.6. Intel

4.8.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH

4.8.8. Software

4.8.8.1. Social Network Content Control

4.8.8.1.1. NetboxBlue

4.8.8.2. URL Categorization

4.8.8.2.1. Cyren

4.8.8.2.2. Ikarus

4.8.8.2.3. Malware

4.8.8.2.4. Webroot Brightcloud

4.8.8.2.5. Zvelo

4.8.8.3. Advanced Threat Protection - Virtual Execution Engines

4.8.8.3.1. ContentKeeper

4.8.8.3.2. Threat Track Security

4.8.8.4. Image Recognition

4.8.8.4.1. Image Analyzer

4.8.8.5. AntiMalware

4.8.8.5.1. Antiy

4.8.8.5.2. Avira

4.8.8.5.3. Bitdefender

4.8.8.5.4. Commtouch

4.8.8.5.5. Cyren

4.8.8.5.6. ESet

4.8.8.5.7. Fortinet

4.8.8.5.8. GFI

4.8.8.5.9. Ikarus

4.8.8.5.10. Kaspersky

4.8.8.5.11. Intel Security

4.8.8.5.12. Norman

4.8.8.5.13. OPSWAT

4.8.8.5.14. QuickHeal

4.8.8.5.15. Zillya

4.8.8.5.16. ZonerAntiVirus

4.8.8.6. Encryption

4.8.8.6.1. Transport

4.8.8.7. Optical Character Recognition

4.8.8.7.1. Abbyy

4.8.8.8. File Content Decoding/Analysis/Fingerprinting

4.8.8.8.1. HP Autonomy

4.8.8.8.2. Attivio

4.8.8.8.3. GTB Technologies

4.8.8.9. Voice Recognition

4.8.8.9.1. STC

4.8.8.9.2. Nuance

4.8.8.10. Network Stack

4.8.8.10.1. IPV4/6

4.8.8.10.2. Deep Packet Inspection

4.8.8.10.3. SDN

4.8.8.11. Anti-Spam/Phishing

4.8.8.11.1. APWG

4.8.8.11.2. BrandProtect

4.8.8.11.3. Cyren

4.8.8.11.4. Ikarus

4.8.8.11.5. Internet Fraud Alert

4.8.8.11.6. ReturnPath

4.8.8.11.7. WebRoot Brightcloud

4.8.8.12. Intrusion Detection/Prevention Signatures

4.8.8.12.1. Proofpoint

4.8.8.13. Content Extraction & Search

4.8.8.13.1. Oracle

4.8.8.14. Endpoint Security and Management

4.8.8.14.1. OPSWAT

4.8.8.15. Advanced Content Disarming and Reconstruction

4.8.8.15.1. OPSWAT

4.8.8.16. IT Service Management

4.8.8.16.1. ITRP

4.9. Product Certification/Assurance

4.9.1. ICSA Labs

4.9.2. Common Criteria for Information Technology Security Evaluation (CCITSE)

4.9.2.1. EAL1 through EAL7

4.9.2.1.1. Booz Allen Hamilton

4.9.2.1.2. COACT

4.9.2.1.3. CSC

4.9.2.1.4. CygnaCom Solutions

4.9.2.1.5. Infogard Laboratories

4.9.2.1.6. SAIC

4.9.2.1.7. atsec information security

4.10. Product Testing

4.10.1. Anti-Malware Testing

4.10.1.1. AV-Test

4.10.1.2. Av-Comparatives

4.10.1.3. VirusBTN

4.10.2. Cryptographic Testing

4.10.2.1. NIST

4.10.2.1.1. FIPS 140-2

4.10.3. Generic Product Testing, Certification and Accreditation

4.10.3.1. Certifications

4.10.3.1.1. North America

4.10.3.1.2. European Union

4.10.3.2. Testing

4.10.3.2.1. United Kingdom

4.10.3.2.2. North America

4.10.4. Sponsored Product Review/Testing

4.10.4.1. Delta Testing LTD

4.10.4.2. Dennis Labs

4.10.4.3. Miercom

4.10.4.4. NSS Labs

4.10.4.5. Network Testing Labs

4.10.4.6. Tolly Group

4.10.4.7. West Coast Labs

4.10.5. Singapore

4.10.5.1. iDA

4.10.5.1.1. http://www.ida.gov.sg/Policies-and-Regulations/Industry-and-Licensees/Standards-and-Quality-of-Service/Singapore-Common-Criteria-evaluation-and-certification-Scheme

4.11. Cloud Service Brokerages

4.12. Security Conferences

4.12.1. North America

4.12.1.1. United States

4.12.1.1.1. RSA

4.12.1.1.2. Gartner

4.12.1.1.3. Cornerstones of Trust

4.12.1.1.4. Annual Security Conference

4.12.1.1.5. SecurityBsides

4.12.1.1.6. ShmooCon

4.12.2. Europe

4.12.2.1. United Kingdom

4.12.2.1.1. RSA Conference

4.12.2.1.2. Gartner

4.12.2.2. Russia

4.12.2.2.1. Infosecurity Russia

4.12.3. Emerging Asia Pacific

4.12.4. Mature Asia Pacific

4.12.4.1. Australia

4.12.4.1.1. Gartner

4.12.4.2. Singapore

4.12.4.2.1. RSA

4.13. Staffing/Recruiting/Executive Search

4.13.1. Millard Group

4.13.2. Lynch Bowie Group

4.13.3. Robert Half

4.14. User Interface

4.14.1. Consulting

4.14.1.1. User Interface

4.14.1.1.1. BlinkUX

4.14.1.1.2. Sasa Technologies

4.14.1.1.3. Dabapps

4.14.1.2. Customer Survey

4.14.1.2.1. Techvalidate

4.14.2. HTML5 Visualization Libraries

4.14.2.1. Data-Driven Documents

4.14.2.1.1. http://d3js.org/

4.14.2.2. AngularJS

4.14.2.2.1. https://angularjs.org/

5. Infrastructure Protection

5.1. Active Directory Defense

5.1.1. Aorato

5.1.1.1. http://www.aorato.com/

5.2. Appliance Based Malware Sandboxes

5.2.1. AhnLab

5.2.2. CheckPoint Software

5.2.3. ContentKeeper

5.2.4. Cyphort

5.2.5. Damballa

5.2.6. FireEye

5.2.7. HBGary

5.2.8. LastLine

5.2.9. Intel Security

5.2.9.1. ValidEDGE

5.2.10. Palo Alto Networks

5.2.11. RSA

5.2.11.1. Security Analytics (Formerly Netwitness)

5.2.11.1.1. Spectrum

5.2.12. Trend Micro

5.2.13. WINS TECHNET LTD

5.2.13.1. http://www.wins21.co.kr/

5.3. Cloud-Based Remote Access

5.3.1. BubblewRapp

5.3.2. Pertino

5.4. DNS-based Threat Prevention/Detection

5.4.1. Standalone Appliances

5.4.1.1. Efficient IP

5.4.1.2. Infoblox

5.4.2. DNS Services

5.4.2.1. Comodo

5.4.2.2. Neustar

5.4.2.3. OpenDNS

5.4.2.4. Symantec

5.4.3. Firewalls

5.4.3.1. Palo Alto Networks

5.5. Denial of Service Protection

5.5.1. Appliances

5.5.1.1. Arbor Networks

5.5.1.1.1. Prevail APS

5.5.1.2. Check Point Software

5.5.1.2.1. DDos Protector

5.5.1.3. Corero

5.5.1.4. Fortinet

5.5.1.5. Genie Networks

5.5.1.5.1. ATM Appliances

5.5.1.6. NSFOCUS

5.5.1.7. Radware

5.5.1.8. WINS TECHNET LTD

5.5.1.8.1. http://www.wins21.co.kr/

5.5.2. Security as a Service

5.5.2.1. HTTP/HTTPS Only

5.5.2.1.1. DOSArrest

5.5.2.1.2. Cloudflare

5.5.2.2. MultiProtocol/Network

5.5.2.2.1. Akamai

5.5.2.2.2. Black Lotus

5.5.2.2.3. Cloud Flare

5.5.2.2.4. F5

5.5.2.2.5. Incapsula

5.5.2.2.6. Link11

5.5.2.2.7. Neustar

5.5.2.2.8. NexusGuard

5.5.2.2.9. Verisign Inc

5.5.3. Clean Pipe Services

5.5.3.1. AT&T

5.5.3.2. Verizon

5.6. Network Access Control (NAC)

5.6.1. Host Based

5.6.1.1. Symantec

5.6.1.2. Intel Security

5.6.2. Network Based

5.6.2.1. Forescout

5.6.2.2. Cisco

5.6.2.3. Bradford Networks

5.6.2.4. Milton Security Group

5.7. Network Anonymization & Consumer VPN Services

5.7.1. AnchorFree Hotspot Shield

5.7.2. Anonymize.net

5.7.3. CyberGhost

5.7.4. GoldenFrog

5.7.5. HMA ProVPN

5.7.5.1. TorVPN

5.7.6. Okayfreedom

5.7.7. OpenVPN Shield Exchange

5.7.8. Private Wifi

5.7.9. Tor

5.8. Network Behavior Analysis/Network Forensics

5.8.1. Network Behavior and Advanced Threat Analytics

5.8.1.1. Arbor Networks

5.8.1.2. Boeing

5.8.1.2.1. http://www.boeing.com/defense/cybersecurity-information-management/

5.8.1.3. Cyber adAPT

5.8.1.4. Darktrace

5.8.1.5. EMC

5.8.1.6. Lancope

5.8.1.7. Light Cyber

5.8.1.8. Novetta Solutions

5.8.1.8.1. http://www.novetta.com/commercial/novetta-advanced-analytics/cyber-analytics/

5.8.1.9. PacketSled

5.8.1.10. RedJack

5.8.1.11. Splunk

5.8.1.12. Taasera

5.8.1.13. Trustport

5.8.1.13.1. Threat Intelligence

5.8.1.14. Vectra Networks

5.8.2. Network Monitoring, Network Behavior & Metadata Extraction Appliances

5.8.2.1. Damballa

5.8.2.2. ExtraHop Networks

5.8.2.2.1. No-Net Flow Support

5.8.2.3. Genie Networks

5.8.2.4. GreatBay Software

5.8.2.5. Kindsight

5.8.2.6. Light Cyber

5.8.3. Network-Based Threat Intelligence Enforcement Appliances

5.8.3.1. Centripetal Networks

5.8.3.2. Check Point Software

5.8.3.3. Norse Corp

5.8.3.3.1. Darkwatch

5.8.4. Surveillance/Lawful Intercept

5.8.4.1. Cybersift

5.8.4.1.1. http://www.cybersift.net/sifter10app.html

5.8.4.2. Decision Group INC

5.8.4.2.1. http://www.edecision4u.com/index.html

5.8.4.3. IP Fabrics

5.8.4.4. InveaTech

5.8.4.4.1. https://www.invea.com/en/products-and-services/li-system

5.8.4.5. KLOS

5.8.4.5.1. http://www.klos.com/applications/lawful-intercept/

5.8.4.6. NEXT Computing

5.8.4.6.1. http://www.nextcomputing.com/products/packet-capture-systems

5.8.4.7. Radisys

5.8.4.7.1. http://www.radisys.com/products/network-appliance/

5.8.4.8. Utimaco

5.8.4.8.1. https://lims.utimaco.com/utimaco-lims/

5.9. Network Firewalls

5.9.1. Carrier Firewalls

5.9.2. Enterprise Firewalls

5.9.2.1. Multifunction Enterprise Firewalls

5.9.2.1.1. Check Point Software

5.9.2.1.2. Cisco

5.9.2.1.3. Fortinet

5.9.2.1.4. Palo Alto Networks

5.9.2.2. Stateful Inspection - Traditional Firewalls

5.9.2.2.1. Cisco

5.9.2.2.2. Meraki

5.9.2.2.3. HP

5.9.2.2.4. Huawei

5.9.2.2.5. Check Point Software

5.9.3. Multi-Funtion SMB Firewalls

5.9.3.1. 443 Networks

5.9.3.2. Check Point Software

5.9.3.3. CheckPoint

5.9.3.4. Cisco

5.9.3.5. Clavister

5.9.3.6. Endian

5.9.3.7. Fortinet

5.9.3.8. Hillstone Networks

5.9.3.9. PineApp

5.9.3.9.1. http://www.pineapp.com/

5.9.3.10. Sangfor

5.9.3.11. Sonicwall

5.9.3.12. Sophos

5.9.3.13. Trustwave

5.9.3.14. Untangle

5.9.3.15. WINS TechNet LTD

5.9.3.15.1. http://www.wins21.co.kr/

5.9.3.16. WatchGuard

5.9.4. Open Source & Community

5.9.4.1. IPTables

5.9.4.2. IPchains

5.9.4.3. PFSense

5.9.4.4. Untangle

5.9.5. Router Firewalls

5.10. Network Intrusion Prevention

5.10.1. Predictive Modeling

5.10.1.1. Trustpipe

5.10.1.2. Cyactive

5.10.2. IBM

5.10.3. Signature Based

5.10.3.1. WINS TECHNET LTD

5.10.3.1.1. http://www.wins21.co.kr/

5.10.3.2. Open Source

5.10.3.2.1. Snort

5.10.3.3. Intel Security

5.10.3.4. IBM

5.10.3.5. HP

5.10.3.5.1. TippingPoint

5.10.3.6. Fortinet

5.10.3.7. Enterasys

5.10.3.8. Cisco

5.10.3.8.1. Sourcefire

5.10.3.9. CheckPoint

5.10.3.10. AlienVault

5.10.3.10.1. Snort

5.11. Network-Based Advanced Threat Protection

5.11.1. Advanced Threat Intelligence

5.11.1.1. LookingGlass

5.11.1.2. OpenDNS

5.11.1.3. Norse Corp

5.11.2. Firewalls with File Sandbox Capabilities

5.11.2.1. Barracuda

5.11.2.2. Check Point Software

5.11.2.3. Fortinet

5.11.2.4. Juniper Networks

5.11.2.5. Palo Alto Networks

5.11.2.6. Sophos

5.11.2.7. Watchguard

5.11.3. Virtual Execution Assessment

5.11.3.1. Cloud Based

5.11.3.1.1. Netwitness

5.11.3.1.2. CrowdStrike

5.11.3.1.3. Cisco

5.11.4. Virtualization & Emulation Sandbox Standalone Appliances

5.11.4.1. AhnLab

5.11.4.2. Bluecoat

5.11.4.3. Check Point Software

5.11.4.3.1. Emulator Blade

5.11.4.4. Cisco

5.11.4.4.1. ThreatGrid

5.11.4.5. Cyphort

5.11.4.6. Damballa

5.11.4.7. FireEye

5.11.4.7.1. Malware Analysis Appliance

5.11.4.8. Fortinet

5.11.4.8.1. FortiSandbox

5.11.4.9. General Dynamics

5.11.4.9.1. Fidelis Security Systems

5.11.4.10. Intel Security

5.11.4.10.1. McAfee Advanced Threat Detection Appliance

5.11.4.11. Lastline

5.11.4.12. Palo Alto Networks

5.11.4.12.1. WildFire

5.11.4.13. Techguard Security

5.11.4.14. ThreatTrack

5.11.4.14.1. Email Only

5.11.4.15. Trend Micro

5.11.4.15.1. Deep Discovery

5.11.4.16. VMRay

5.12. SCADA Monitoring

5.12.1. PFP Cybersecurity

5.13. SSL Inspection Appliances

5.13.1. A10 Networks

5.13.2. Bluecoat

5.13.3. ResolutionOne

5.13.4. VSS Monitoring

5.13.5. SourceFire

5.14. Software Defined Network Perimeter

5.14.1. Tempered Networks

5.14.2. Unisys Stealth

5.14.3. Vidder

5.15. Virtual Private Networking (VPN/SSL VPN)

5.15.1. IPSec VPN Concentrators

5.15.1.1. Certes Networks

5.15.1.2. CheckPoint Software

5.15.1.3. Cisco

5.15.1.4. Mako Networks

5.15.2. Layer 2 Encryption

5.15.2.1. Certes Networks

5.15.3. Layer 4 Encryption

5.15.3.1. Certes Networks

5.15.4. SSL VPN

5.15.4.1. AhnLab

5.15.4.2. Array Networks

5.15.4.3. Barracuda Networks

5.15.4.4. Cisco

5.15.4.5. Citrix

5.15.4.6. F5 Networks

5.15.4.7. Hillstone Networks

5.15.4.8. Juniper

5.15.4.9. NetGear

5.15.4.10. Sonicwall

5.15.4.11. Stonesoft

5.15.4.12. WatchGuard

5.16. Web/Email Protection

5.16.1. Secure Email Gateways

5.16.1.1. Bluecoat

5.16.1.2. Fortinet

5.16.1.3. GWAVA

5.16.1.4. Intel Security

5.16.1.5. Proofpoint

5.16.1.6. Sonicwall

5.16.1.7. Symantec

5.16.1.8. Trustwave

5.16.1.9. Websense

5.16.1.10. iBoss

5.16.2. Secure Web Gateways

5.16.2.1. Bluecoat

5.16.2.2. ContentKeeper

5.16.2.3. GWAVA

5.16.2.4. Intel Security

5.16.2.5. Symantec

5.16.2.6. Trustwave

5.16.2.7. Websense

5.16.2.8. iBoss

5.16.3. Security as a Service

5.16.3.1. Web & Email SaaS

5.16.3.1.1. Appriver

5.16.3.1.2. Barracuda

5.16.3.1.3. Bitglass

5.16.3.1.4. Cisco

5.16.3.1.5. Intel Security

5.16.3.1.6. Spamina

5.16.3.1.7. Symantec

5.16.3.1.8. Total Defense

5.16.3.1.9. TotalDefense

5.16.3.1.10. Websense

5.16.3.1.11. Zscaler

5.16.3.2. Web Only

5.16.3.2.1. ContentKeeper

5.16.3.2.2. OpenDNS

5.16.3.3. Email Only

5.16.3.3.1. Agari

6. Security Consulting & Implementation

6.1. Providers by Region

6.1.1. Latin America

6.1.2. Mature Asia/Pacific

6.1.3. Middle East and North Africa

6.1.3.1. Saudi Arabia

6.1.3.1.1. GBM

6.1.3.1.2. PGI

6.1.4. North America

6.1.4.1. Accuvant

6.1.4.2. AppsecConsulting

6.1.4.3. CSC

6.1.4.4. Control Case

6.1.4.5. CrowdStrike

6.1.4.6. Dell Secureworks

6.1.4.7. Deloitte

6.1.4.8. Denim Group

6.1.4.9. Ernst & Young

6.1.4.10. FireEye

6.1.4.11. Fishnet

6.1.4.12. ForSythe Solutions

6.1.4.13. Grant Thornton

6.1.4.14. HP

6.1.4.15. IBM

6.1.4.16. IOActive

6.1.4.17. Leidos

6.1.4.18. Intel Security (Foundstone)

6.1.4.19. NTT Com Security

6.1.4.20. Neohapsis

6.1.4.21. PWC

6.1.4.22. Paladion Networks

6.1.4.23. Perimeter eSecurity

6.1.4.24. Protivity

6.1.4.25. SISA

6.1.4.26. Solutionary

6.1.4.27. Stroz Friedberg

6.1.4.28. Sungard

6.1.4.29. Sword and Shield

6.1.4.30. Symantec

6.1.4.31. Sysnet Global Solutions

6.1.4.32. Tevora Business Solutions

6.1.4.33. Trustwave

6.1.4.34. Verizon

6.1.4.35. WhiteHat Security

6.1.4.36. Zensar Technologies

6.1.5. Western Europe

6.1.5.1. Italy

6.1.5.1.1. KBE.it

6.1.5.1.2. Consulthink SPA

6.1.5.2. United Kingdom

6.1.5.2.1. FOX-IT

6.1.6. Greater China

6.1.7. South Africa

6.1.7.1. Cyanre

6.1.7.1.1. http://www.cyanre.co.za/

6.1.8. Governance

6.1.8.1. Accuvant

6.1.8.2. Fishnet Security

6.1.8.3. FOX-IT

6.1.8.4. Sec Consult

6.1.9. Eurasia

6.1.9.1. Russia

6.1.10. Emerging Asia/Pacific

6.1.11. Eastern Europe

6.1.12. Canada

6.1.12.1. Conexsys

6.2. Governance, Advisory, Assessment

6.2.1. Architecture and Design

6.2.2. Business Continuity

6.2.3. Compliance Review

6.2.4. Data Security Program

6.2.5. Governance

6.2.6. Governance, Compliance and Policy Design

6.2.6.1. Compliance Mandates

6.2.6.1.1. PCI

6.2.6.1.2. ISO

6.2.6.1.3. HITECH

6.2.6.1.4. HIPAA

6.2.7. People Centric Strategy

6.2.8. Policy Design

6.2.9. Program Assessment

6.2.10. Risk Assessment

6.2.11. Risk Management

6.2.11.1. Booz Allen Hamilton

6.2.11.2. Accuvant

6.2.11.3. Cloud Risks

6.2.11.4. On Premise Infrastructure

6.2.11.5. Business Risk

6.2.12. Security Program Development

6.2.12.1. Accuvant

6.2.12.2. Fishnet

6.2.12.3. FOX-IT

6.2.13. Strategy

6.3. Operations

6.3.1. Application Security

6.3.1.1. Web

6.3.1.1.1. AppSec Consulting

6.3.1.1.2. Denim Group

6.3.1.2. Mobile

6.3.1.2.1. AppSec Consulting

6.3.1.2.2. Denim Group

6.3.2. Application Security Vulnerability Assessement

6.3.3. Configuration Assessment

6.3.4. Device Security

6.3.5. Fraud, Identification and Privacy

6.3.6. Incident Response

6.3.6.1. Digital Forensics

6.3.6.1.1. Accuvant

6.3.6.1.2. Blackthorn Technologies

6.3.6.1.3. Dell Secureworks

6.3.6.1.4. Deloitte

6.3.6.1.5. E&Y

6.3.6.1.6. EY

6.3.6.1.7. FOX-IT

6.3.6.1.8. Fishnet Security

6.3.6.1.9. High Tech Bridge

6.3.6.1.10. PWC

6.3.6.1.11. TrustMatta

6.3.6.1.12. Sec Consult

6.3.6.2. Digital Investigations

6.3.6.2.1. FOX-IT

6.3.6.2.2. Deloitte

6.3.6.2.3. EY

6.3.6.2.4. Fishnet Security

6.3.6.2.5. PWC

6.3.7. Penetration Testing

6.3.7.1. AppSec Consulting

6.3.7.2. Core Security

6.3.7.3. Element Digital Security

6.3.7.4. FOX-IT

6.3.7.5. High Tech Bridge

6.3.7.6. Matasano Security

6.3.7.7. NCC Group

6.3.7.8. Rapid7

6.3.7.9. Secureworks

6.3.7.10. TrustMatta

6.3.7.11. WhiteHat Security

6.3.8. Remote Access

6.3.9. Secure Code Review

6.3.10. Threat Intelligence

6.3.11. Vulnerability Scan

6.4. Forensics

6.4.1. Forensics

6.4.1.1. Compliance & Investigative Analytics

6.4.1.2. Cybercrime & Data Breach

6.4.1.3. E-Discovery & Computer Forensics

6.4.1.4. Endpoint Forensics

6.4.1.5. Network Forensics

7. Managed Security Services

7.1. Indirect Providers

7.1.1. Emerging Asia Pacific

7.1.1.1. India

7.1.1.1.1. CSS Corp PVT

7.1.1.1.2. Happiest Minds

7.1.1.1.3. SunGard Availability Services

7.1.1.1.4. Ecomnets India PVT. LTD

7.1.2. Europe

7.1.2.1. BT Global Services

7.1.2.2. Dell SecureWorks

7.1.2.3. Germany

7.1.2.3.1. Link11 GMBH

7.1.2.3.2. IPsoft

7.1.2.4. HP

7.1.2.5. Happiest Minds

7.1.2.5.1. Advanced Malware Protection

7.1.2.5.2. Application Activity Monitoring

7.1.2.5.3. Compliance Reporting

7.1.2.5.4. Database Activity Monitoring

7.1.2.5.5. File Integrity Monitoring

7.1.2.5.6. Log Management

7.1.2.5.7. Managed DLP

7.1.2.5.8. Network Forensics

7.1.2.5.9. SIEM

7.1.2.5.10. Unified Threat Management

7.1.2.5.11. Vulnerability Assessment

7.1.2.6. Integralis

7.1.2.7. Navisite

7.1.2.7.1. Mobile Device Management

7.1.2.8. Open Systems

7.1.2.9. Open Systems

7.1.2.10. Orange Business Services

7.1.2.11. SecureData

7.1.2.11.1. Firewall

7.1.2.11.2. IDS/IPS

7.1.2.11.3. SIEM

7.1.2.11.4. Data Loss Prevention

7.1.2.11.5. Secure Web Gateway

7.1.2.11.6. Secure Email Gateway

7.1.2.11.7. VPN/Remote Access

7.1.2.12. SunGard Availability Services

7.1.2.12.1. Firewalls

7.1.2.12.2. IAM

7.1.2.12.3. Intrusion Prevention

7.1.2.12.4. SIEM

7.1.2.12.5. Unified Threat Management

7.1.2.12.6. VPN

7.1.2.12.7. Web Application Firewall

7.1.2.13. Symantec

7.1.2.14. T-Systems

7.1.2.15. Tata Communications

7.1.2.16. Telefonica

7.1.2.16.1. DDoS Protection Service

7.1.2.16.2. Email Encryption

7.1.2.16.3. Email Security Gateway

7.1.2.16.4. Firewall Management

7.1.2.16.5. IAM

7.1.2.16.6. Intrusion Detection

7.1.2.16.7. Intrusion Prevention

7.1.2.16.8. Log Management

7.1.2.16.9. SIEM

7.1.2.16.10. Vulnerability Assessment

7.1.2.16.11. Web Security Gateway

7.1.2.16.12. Anti-Fraud

7.1.2.17. Verizon Business

7.1.2.17.1. Anti-DDoS

7.1.2.17.2. Email Security

7.1.2.17.3. Endpoint Protection

7.1.2.17.4. Firewall Management

7.1.2.17.5. Intrusion Detection

7.1.2.17.6. Intrusion Prevention

7.1.2.17.7. SIEM

7.1.2.17.8. Vulnerability Assessment

7.1.2.17.9. Web Security

7.1.2.18. Wipro

7.1.2.18.1. Email Security Gateway

7.1.2.18.2. Endpoint Security

7.1.2.18.3. Firewall Management

7.1.2.18.4. Fraud Management/Anti-Money Laundering

7.1.2.18.5. GRC

7.1.2.18.6. IAM

7.1.2.18.7. Intrusion Detection

7.1.2.18.8. Intrusion Prevention

7.1.2.18.9. SIEM

7.1.2.18.10. User Access Management

7.1.2.18.11. Web Security Gateway

7.1.3. Global Providers

7.1.3.1. AT&T

7.1.3.1.1. DDos Protection

7.1.3.1.2. Email/Data Encryption Services

7.1.3.1.3. Endpoint Anti-Virus

7.1.3.1.4. Endpoint Patch Management

7.1.3.1.5. Endpoint Policy Compliance

7.1.3.1.6. Mobile Device Security

7.1.3.1.7. Secure Email Gateway

7.1.3.1.8. Security Device Management

7.1.3.1.9. Web Application Firewall

7.1.3.1.10. Web Gateway (URL & Malware Filtering)

7.1.3.2. BEW Global

7.1.3.2.1. Data Loss Prevention

7.1.3.2.2. Web Security Gateway

7.1.3.2.3. Email Security Gateway

7.1.3.2.4. SIEM

7.1.3.2.5. Vulnerability Assessment

7.1.3.3. BT

7.1.3.4. Dell Secureworks

7.1.3.4.1. Advanced Malware Protection

7.1.3.4.2. Email Security Gateway

7.1.3.4.3. Firewall Management

7.1.3.4.4. Host IPS

7.1.3.4.5. IDS/IPS

7.1.3.4.6. Log Management

7.1.3.4.7. Log Retention

7.1.3.4.8. SIEM

7.1.3.4.9. Threat Intelligence

7.1.3.4.10. Unified Threat Management

7.1.3.4.11. Vulnerability Assessment

7.1.3.4.12. Web Application Firewall

7.1.3.4.13. Web Application Vulnerability Assessment

7.1.3.5. Dimension Data

7.1.3.6. HP

7.1.3.6.1. Access Managment

7.1.3.6.2. Data Loss Prevention

7.1.3.6.3. Email Security Gateway

7.1.3.6.4. Endpoint Encryption

7.1.3.6.5. Endpoint Protection

7.1.3.6.6. Intrusion Detection

7.1.3.6.7. Intrusion Prevention

7.1.3.6.8. Managed Incident Response

7.1.3.6.9. Remote Access Management

7.1.3.6.10. SIEM

7.1.3.6.11. Vulnerability Assessment

7.1.3.6.12. Web Application Vulnerability Assessment

7.1.3.6.13. Web Security Gateway

7.1.3.7. IBM

7.1.3.7.1. Email Security Gateway

7.1.3.7.2. Endpoint Patch Management

7.1.3.7.3. Endpoint Policy Management

7.1.3.7.4. Endpoint Protection

7.1.3.7.5. Firewall Management

7.1.3.7.6. IAM

7.1.3.7.7. Intrusion Detection

7.1.3.7.8. Intrusion Prevention

7.1.3.7.9. Log Management

7.1.3.7.10. Mobile Device Security

7.1.3.7.11. SIEM

7.1.3.7.12. Unified Threat Management

7.1.3.7.13. Vulnerability Assessment

7.1.3.7.14. Web Security Gateway

7.1.3.7.15. Web Vulnerability Assessment

7.1.3.8. Telstra

7.1.3.9. Verizon Business

7.1.3.9.1. Anti-DDoS

7.1.3.9.2. Email Security

7.1.3.9.3. Endpoint Protection

7.1.3.9.4. Firewall Management

7.1.3.9.5. Intrusion Detection

7.1.3.9.6. Intrusion Prevention

7.1.3.9.7. SIEM

7.1.3.9.8. Vulnerability Assessment

7.1.3.9.9. Web Security

7.1.4. Greater China

7.1.4.1. Hong Kong

7.1.4.1.1. Network Box

7.1.4.1.2. Netswitch

7.1.4.2. BEW Global

7.1.4.2.1. Data Loss Prevention

7.1.4.2.2. Web Security Gateway

7.1.4.2.3. Email Security Gateway

7.1.4.2.4. SIEM

7.1.4.2.5. Vulnerability Assessment

7.1.4.3. Beijing

7.1.4.3.1. Netswitch

7.1.5. Latin America

7.1.5.1. Brazil

7.1.5.1.1. Arcon

7.1.5.1.2. Netcentrics

7.1.5.1.3. RealProtect

7.1.5.1.4. UOL Diveo

7.1.6. Mature Asia Pacific

7.1.6.1. Australia

7.1.6.1.1. Tesserent

7.1.6.1.2. Verizon

7.1.6.2. Singapore

7.1.6.2.1. e-Cop

7.1.6.2.2. NTT Singapore

7.1.6.2.3. Happiest Minds

7.1.6.2.4. Singtel

7.1.6.2.5. NCS Group

7.1.7. Middle East and North Africa

7.1.7.1. Saudi Arabia

7.1.7.2. United Arab Emirates

7.1.7.2.1. Du Telecom

7.1.7.2.2. Tata Communications

7.1.7.2.3. Dell Secureworks

7.1.7.2.4. Dimension Data

7.1.8. North America

7.1.8.1. Canada

7.1.8.1.1. Above Security

7.1.8.1.2. Bell Canada

7.1.8.1.3. EWA

7.1.8.1.4. Happiest Minds

7.1.8.1.5. Netpulse

7.1.8.1.6. OneStone (Formerly Seccuris)

7.1.8.1.7. SecureData

7.1.8.1.8. SentryMetrics

7.1.8.1.9. SunGard Availability Services

7.1.8.1.10. Virtual Guardian

7.1.8.2. United States

7.1.8.2.1. AT&T

7.1.8.2.2. Above Security

7.1.8.2.3. Alert Logic

7.1.8.2.4. Allstream

7.1.8.2.5. CGI

7.1.8.2.6. CSC

7.1.8.2.7. CSS Corp

7.1.8.2.8. CentraComm

7.1.8.2.9. CenturyLink- Savvis

7.1.8.2.10. Clone Systems

7.1.8.2.11. Compucom Systems

7.1.8.2.12. Cosentry

7.1.8.2.13. Dell Secureworks

7.1.8.2.14. Earthlink

7.1.8.2.15. Esentire

7.1.8.2.16. HCL Technologies

7.1.8.2.17. HP

7.1.8.2.18. Happiest Minds

7.1.8.2.19. IBM

7.1.8.2.20. Leidos

7.1.8.2.21. LunarLine

7.1.8.2.22. Masergy Communications

7.1.8.2.23. Megapath

7.1.8.2.24. NCA - Network Computing Architects

7.1.8.2.25. Navisite

7.1.8.2.26. Netfortris

7.1.8.2.27. Nuspire Networks

7.1.8.2.28. Secure Designs

7.1.8.2.29. SilverSky (Formerly Stillsecure/Perimeter esecurity)

7.1.8.2.30. Solutionary

7.1.8.2.31. SunGard Availability Services

7.1.8.2.32. Sword and Shield

7.1.8.2.33. Symantec

7.1.8.2.34. Symantec

7.1.8.2.35. Tesserent

7.1.8.2.36. Trustwave

7.1.8.2.37. Verizon Business

7.1.8.2.38. Wipro

7.1.8.2.39. Rook Security

7.1.8.2.40. Netswitch

7.1.9. Sub-Sahara Africa

7.1.9.1. AccessKenya

7.1.9.1.1. Firewall

7.1.9.1.2. Endpoint Protection

7.1.9.1.3. Secure Web Gateway

7.2. Direct Tech Providers Managed Security

7.2.1. Asia Pacific

7.2.1.1. Australia

7.2.1.2. China

7.2.1.2.1. NSFOCUS

7.2.1.3. Singapore

7.2.2. Europe

7.2.2.1. GoGrid

7.2.2.1.1. Compliance Reporting (PCI, HIPAA)

7.2.2.1.2. Host IDS

7.2.2.1.3. Log Management

7.2.2.1.4. SIEM

7.2.2.1.5. Vulnerability Assessment

7.2.3. Global Providers

7.2.4. Middle East and North Africa

7.2.4.1. Saudi Arabia

7.2.4.2. United Arab Emirates

7.2.5. North America

7.2.5.1. United States

7.2.5.1.1. NSFOCUS

7.2.5.1.2. Check Point Software

7.2.5.1.3. Network Box

7.2.5.1.4. GoGrid

8. Endpoint Security

8.1. Anti-Malware

8.1.1. Eastern Europe

8.1.1.1. Czech Republic

8.1.1.1.1. Avast

8.1.1.1.2. TrustPort

8.1.1.2. Denmark

8.1.1.2.1. BullGuard

8.1.1.3. Netherlands

8.1.1.3.1. AVG

8.1.1.4. Romania

8.1.1.4.1. Bitdefender

8.1.1.5. Slovakia

8.1.1.5.1. ESET

8.1.2. Emerging Asia/Pacific

8.1.2.1. India

8.1.2.1.1. eScan

8.1.2.1.2. K7 Computing

8.1.3. Latin America

8.1.3.1. Spain

8.1.3.1.1. Optenet

8.1.4. Mature Asia/Pacific

8.1.4.1. China

8.1.4.1.1. Qihoo

8.1.4.1.2. Rising International Software

8.1.4.2. South Korean

8.1.4.2.1. AhnLab

8.1.4.2.2. BKAV

8.1.4.2.3. ESTsoft

8.1.5. Middle East and Africa

8.1.5.1. Israel

8.1.5.1.1. Check Point Software

8.1.6. North America

8.1.6.1. Cyren

8.1.6.2. MalwareBytes

8.1.6.3. Intel Security

8.1.6.4. Microsoft

8.1.6.5. PC Pitstop

8.1.6.6. Roboscan

8.1.6.7. Symantec

8.1.6.8. ThreatTrack Security

8.1.6.9. Total Defense

8.1.6.10. Trend Micro

8.1.7. Russia

8.1.7.1. Kaspersky

8.1.8. Western Europe

8.1.8.1. Austria

8.1.8.1.1. Ikarus Security

8.1.8.2. Finland

8.1.8.2.1. F-Secure

8.1.8.3. Germany

8.1.8.3.1. Avira

8.1.8.3.2. G-Data

8.1.8.3.3. Kromtech

8.1.8.4. Norway

8.1.8.4.1. Norman

8.1.8.5. United Kingdom

8.1.8.5.1. Sophos

8.1.8.6. Poland

8.1.8.6.1. Arcabit

8.2. Endopoint Sandboxes and Virtualized Containers

8.2.1. Endpoint Sandboxes

8.2.1.1. Panda

8.2.1.1.1. www.panda.com

8.2.1.2. Sandboxie

8.2.1.2.1. http://www.sandboxie.com/

8.2.1.3. Bitdefender

8.2.1.3.1. www.bitdefender.com

8.2.1.4. Bluecoat

8.2.1.4.1. NormanShark

8.2.2. Type-0 Hypervisors

8.2.2.1. Lynxworks

8.2.2.1.1. http://www.lynuxworks.com/

8.2.2.2. Zirtu

8.2.3. Browser-Isolation (remote dom)

8.2.3.1. Amune

8.2.3.1.1. https://amune.org/security

8.2.3.2. Armor5

8.2.3.3. Menlo Security

8.2.3.4. Spikes Security

8.2.4. Process Isolation/Virtualization

8.2.4.1. Invincea

8.2.4.2. Bromium

8.3. Endpoint Intrusion Prevention

8.3.1. Arkoon

8.3.1.1. StormShield

8.3.2. BeyondTrust

8.3.3. IBM

8.3.4. Landesk

8.3.5. McAfee

8.3.6. Safensoft

8.3.7. Symantec

8.4. Enterprise Mobility Mangement Suites

8.4.1. Absolute Software

8.4.2. AMware

8.4.2.1. Airwatch

8.4.3. Blackberry

8.4.4. Citrix

8.4.5. Globo

8.4.6. Good Technologies

8.4.7. IBM

8.4.8. Landesk

8.4.9. MobileIron

8.4.10. Mojave

8.4.10.1. https://www.mojave.net/

8.4.11. SAP

8.4.12. Sophos

8.4.13. Soti

8.4.14. Symantec

8.4.15. Tangoe

8.5. File Integrity Monitoring

8.5.1. Open Source

8.5.1.1. 1. AIDE

8.5.1.2. 2. Trend Micro

8.5.1.2.1. 1. OSSEC

8.5.1.3. 3. Samhain

8.5.1.4. 4. Osiris

8.5.1.5. 5. Integrit

8.5.1.6. 6. Tripwire

8.5.2. Commercial

8.5.2.1. Imperva

8.5.2.2. Intel Security

8.5.2.3. Tripwire

8.6. Malware Analysis

8.6.1. Botnets

8.6.1.1. spyeyetracker.abuse.ch

8.6.2. Internet Identity

8.6.3. Malware Patrol

8.6.4. SpamHaus

8.6.5. Team Cymru

8.6.6. ThreatGrid

8.6.7. VirusTotal

8.6.8. zeustracker.abuse.ch

8.6.9. JoeSecurity

8.6.10. Shadowserver

8.7. Mobile Device Management

8.7.1. Absolute Software

8.7.2. Beachhead Security

8.7.3. Blackberry

8.7.4. Citrix

8.7.5. Globo

8.7.6. Good Technologies

8.7.7. IBM

8.7.8. Landesk

8.7.9. MobileIron

8.7.10. Mojave

8.7.10.1. https://www.mojave.net/

8.7.11. SAP

8.7.12. Sophos

8.7.13. Soti

8.7.14. Symantec

8.7.15. Tangoe

8.7.16. VMware

8.7.16.1. Airwatch

8.8. Policy Assessment and System Configuration Management

8.8.1. BMC

8.8.1.1. BMC Server Automation

8.8.2. IBM

8.8.2.1. IBM Endpoint Manager

8.8.3. Intel Security

8.8.3.1. Policy Auditor

8.8.4. RedHat

8.8.4.1. OpenSCAP

8.8.5. Saint

8.8.5.1. Saint Security

8.8.6. Tripwire

8.8.6.1. Tripwire Enterprise

8.9. Sandboxing/MicroVM

8.9.1. Norman Sandbox

8.9.2. Bromium

8.9.3. Bufferzone

8.9.4. Invincea

8.9.5. SandBoxie

8.10. Exploit Technique Prevention Software

8.10.1. CyActive

8.10.2. Malwarebytes Anti-Exploit

8.10.3. Microsoft

8.10.3.1. EMET

8.10.4. Palo Alto Networks

8.10.4.1. Endpoint

8.10.5. ViRobot APT Shield

8.10.6. Microsoft EMET - FREE

9. Data and Collaboration Security

9.1. Data Governance and Classification

9.1.1. Expert Source

9.1.1.1. http://www.expertsource.in/index.php

9.1.2. HP

9.1.3. IBM

9.1.4. Informatica

9.1.5. Nuix

9.1.6. Somansa

9.1.7. Titus

9.1.8. boldonjames

9.2. Data Loss Prevention (DLP)

9.2.1. Endpoint

9.2.1.1. Data Classification and Tracking

9.2.1.1.1. Banyan Solutions

9.2.1.1.2. BoldonJames

9.2.1.1.3. Digital Guardian

9.2.1.1.4. HP

9.2.1.1.5. IBM

9.2.1.1.6. Mach1 Development

9.2.1.1.7. MinerEye

9.2.1.1.8. Nuix

9.2.1.1.9. SecureIslands

9.2.1.1.10. Smartlogic

9.2.1.1.11. Titus

9.2.1.1.12. Varonis

9.2.1.2. Mobile

9.2.1.2.1. Symantec

9.2.1.2.2. Websense

9.2.1.2.3. SecureIslands

9.2.1.3. Windows

9.2.1.3.1. Absolute Software

9.2.1.3.2. CA Technologies

9.2.1.3.3. Digital Guardian

9.2.1.3.4. GTB Technologies

9.2.1.3.5. Infowatch

9.2.1.3.6. Intel Security

9.2.1.3.7. RSA

9.2.1.3.8. SecureIslands

9.2.1.3.9. Somansa

9.2.1.3.10. Symantec

9.2.1.3.11. Trustwave

9.2.1.3.12. Watchful Software

9.2.1.3.13. Websense

9.2.1.3.14. Zecurion

9.2.2. Network

9.2.2.1. Code Green Networks

9.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)

9.2.2.3. RSA (EMC)

9.2.2.4. Symantec

9.2.3. Secure Email Gateway

9.2.3.1. Cisco

9.2.3.2. Symantec

9.2.3.3. Intel Security

9.2.3.4. Somansa

9.2.4. Secure Web Gateway

9.2.4.1. Intel Security

9.2.4.2. Symantec

9.2.4.3. Somansa

9.2.5. Security as a Service

9.2.5.1. Consumer

9.2.5.1.1. Reputation.com

9.2.5.1.2. Social Fortress

9.2.5.1.3. PwnedList

9.2.5.2. Enterprise

9.2.5.2.1. Social Fortress

9.2.5.2.2. Google Apps

9.2.5.2.3. ZixCorp

9.3. Database Security

9.3.1. Database Audit and Protection

9.3.1.1. Application Security, Inc

9.3.1.2. BeyondTrust

9.3.1.3. Fortinet

9.3.1.4. GreenSQL

9.3.1.5. IBM

9.3.1.6. IRI

9.3.1.6.1. Oracle

9.3.1.6.2. SQL Server

9.3.1.7. Imperva

9.3.1.8. Intel Security

9.3.1.9. Mentis Software

9.3.1.10. Oracle Corp

9.3.1.11. PentaSecurity

9.3.1.12. Warevalley

9.3.2. Database Activity Monitoring

9.3.2.1. DB Networks

9.3.2.2. Somansa

9.4. Encrypted USB Storage

9.4.1. Apricorn

9.4.2. Datalocker

9.4.3. Integral Memory

9.4.4. IronKey

9.4.5. Kingston

9.4.6. Virbatim

9.5. Encryption/Tokenization

9.5.1. Cloud/SAAS Encryption

9.5.1.1. Appliances

9.5.1.1.1. Office365

9.5.1.1.2. Ciphercloud

9.5.1.1.3. Afore Solutions

9.5.1.1.4. Perspecsys

9.5.1.2. Software

9.5.1.2.1. BoxCryptor

9.5.1.2.2. CloudMask

9.5.1.2.3. PrivateCore

9.5.1.2.4. Trend Micro

9.5.1.2.5. Viivo

9.5.1.2.6. Voltage Security

9.5.1.3. Software as a Service

9.5.1.3.1. Trend Micro

9.5.1.3.2. SooKasa

9.5.1.3.3. SafeNet

9.5.2. Data masking

9.5.2.1. Oracle

9.5.3. Database

9.5.3.1. SafeNet

9.5.3.2. Dark Matter Labs

9.5.3.3. Vormetric

9.5.4. File/Folder

9.5.4.1. Covertix

9.5.4.1.1. http://www.covertix.com/

9.5.4.2. IBM

9.5.4.2.1. Mainframe

9.5.4.3. SecureIslands

9.5.4.4. Sophos

9.5.4.4.1. SafeGuard Enterprise (Utimaco)

9.5.4.5. Symantec (PGP)

9.5.4.6. Vormetric

9.5.4.7. WinMagic

9.5.4.7.1. SecureDoc

9.5.5. Mobile Storage/USB

9.5.5.1. IronKey

9.5.6. Tokenization

9.5.6.1. Protegrity

9.5.7. Whole Disk

9.5.7.1. Intel Security

9.5.7.2. Symantec (PGP)

9.5.7.3. CheckPoint Software

9.5.7.4. Encryption Management

9.5.7.4.1. Wave Systems

9.5.7.5. WinMagic

9.5.7.5.1. SecureDoc

9.5.7.6. Microsoft

9.5.7.6.1. Bitlocker

9.5.7.7. Sophos

9.5.7.7.1. SafeGuard Enterprise (Utimaco)

9.5.7.8. Trustwave

9.5.7.8.1. DataControl

9.5.7.9. Vormetric

9.5.8. Big Data

9.5.8.1. Gazzang

9.5.8.2. Vormetric

9.5.9. Email

9.5.9.1. ZixCorp

9.5.9.2. Encryptics

9.5.9.2.1. https://www.encryptics.com/default.aspx

9.5.10. Cryptographic Providers

9.5.10.1. RSA

9.5.10.2. Quintessence

9.5.10.3. Microsoft

9.6. File Analysis Software

9.6.1. Acaveo

9.6.2. Active Navigation

9.6.3. AvePoint

9.6.4. Beyond Recognition

9.6.5. Bloomberg

9.6.6. CommVault

9.6.7. Condrey

9.6.8. Covertix

9.6.9. DataGlobal

9.6.10. DataGravity

9.6.11. Equivio

9.6.12. HP

9.6.12.1. Control Point

9.6.13. HiSoftware

9.6.14. IBM

9.6.14.1. StoreIQ

9.6.15. Identifty Finder

9.6.16. Imperva

9.6.17. Index Engines

9.6.18. Kazoup

9.6.19. NTP Software

9.6.20. Novell

9.6.21. Nuix

9.6.22. Proofpoint

9.6.23. Stealthbits

9.6.24. Varonis

9.6.25. WatchDox

9.6.26. Whitebox Security

9.6.27. ZyLab

10. Identity and Access Management (IAM)

10.1. AD/Unix bridge

10.1.1. Centrify

10.2. Enterprise single sign-on (ESSO)

10.3. Externalized authorization management (EAM)

10.3.1. Axiomatics

10.3.2. Dell Quest (BitKoo)

10.4. IAM as a Service

10.4.1. Centrify

10.4.2. IBM (Formerly Lighthouse Security)

10.4.3. Identity Automation

10.4.4. Intel

10.4.5. Okta

10.4.6. Password Bank

10.4.7. Ping Identity

10.4.8. Sailpoint

10.4.9. Symplifyed

10.4.10. iWelcome

10.5. Identity governance and administration

10.5.1. CA Technologies

10.5.2. IBM Security

10.5.3. Oracle

10.5.4. RSA (Aveksa)

10.6. Privileged account management (PAM)

10.6.1. BeyondTrust

10.6.2. Lieberman Software

10.6.3. Cyber Ark

10.6.4. Dell

10.6.5. Centrify

10.7. Public Certificate Authorities

10.7.1. Comodo

10.7.2. Geotrust

10.7.3. Godaddy

10.7.4. Symantec (Formerly VeriSign)

10.8. User Authentication

10.8.1. Tokens

10.8.1.1. OOB authentication

10.8.1.1.1. SMS

10.8.1.1.2. Voice

10.8.1.1.3. Push

10.8.1.1.4. Email

10.8.1.1.5. Social media

10.8.1.2. OTP tokens

10.8.1.2.1. OTP hardware tokens

10.8.1.2.2. OTP software tokens for smart phones

10.8.1.3. X.509 tokens

10.8.1.4. Other tokens

10.8.1.4.1. ANECT AS - ALUCID

10.8.2. Contextual authentication

10.8.3. KBA

10.8.3.1. It's Me Security

10.8.3.1.1. http://www.itsmesecurity.com/

10.8.4. Biometrics

10.8.4.1. Behavioral

10.8.4.1.1. Typing rhythm/keystroke dynamics

10.8.4.1.2. Voice recognition

10.8.4.2. Biological

10.8.4.2.1. Face recognition

10.8.4.2.2. Fingerprint

10.8.5. Wide-focus vendors

10.8.5.1. Alladin-RD

10.8.5.2. CA Technologies

10.8.5.3. Entrust

10.8.5.4. HID Global

10.8.5.5. RSA

10.8.5.5.1. Adaptive Auth

10.8.5.6. SafeNet

10.8.5.7. Symantec

10.8.5.8. Technology Nexus

10.8.5.9. VASCO

10.9. User Privilege Management

10.9.1. Appsense

10.9.1.1. http://www.appsense.com/

10.9.2. Ariella

10.9.2.1. http://www.arellia.com/

10.9.3. Avectco

10.9.3.1. http://www.avecto.com/

10.9.4. BeyondTrust

10.9.4.1. http://www.beyondtrust.com/

10.9.5. CionSystems

10.9.6. CrossIdeas

10.9.6.1. http://www.crossideas.com/

10.9.7. Centrify

10.9.7.1. http://www.centrify.com/

10.9.8. Dell

10.9.8.1. http://www.quest.com/desktop-authority-management-suite/

10.9.9. Lieberman Software

10.9.9.1. http://www.liebsoft.com/

10.9.10. Viewfinity

10.9.10.1. http://www.viewfinity.com/

11. Application Security

11.1. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

11.1.1. Network Vulnerability Assessment (On Premise)

11.1.1.1. Core Security

11.1.1.2. Digital Defense

11.1.1.3. Fortinet

11.1.1.4. Intel Security

11.1.1.4.1. McAfee Vulnerability Manager (Foundstone)

11.1.1.5. NSAuditor

11.1.1.6. Ncircle

11.1.1.7. Netasq

11.1.1.8. Outpost24

11.1.1.9. Qualys

11.1.1.10. Rapid 7

11.1.1.10.1. Nexspose

11.1.1.11. Trustwave

11.1.2. Managed Penetration Testing Services

11.1.2.1. WhiteHatSecurity

11.1.2.2. Cenzic

11.1.3. Penetration TestingSoftware

11.1.3.1. Core Security

11.1.3.2. Rapid7

11.1.3.2.1. Metasploit Pro

11.1.3.2.2. Metasploit Express

11.1.3.3. Trustwave

11.1.4. Software as a Service

11.1.4.1. Vulnerability Management

11.1.4.1.1. Trustwave

11.1.4.1.2. Qualys

11.1.4.1.3. Outpost24

11.1.4.1.4. Intel Security

11.1.4.1.5. Digital Defense

11.1.4.2. Phish Testing/Management

11.1.4.2.1. Phishme

11.1.5. Vulnerability Reporting/Tracking

11.1.5.1. Risk IO

11.1.6. Vulnerability Research

11.1.6.1. CSC

11.1.6.2. HP

11.1.6.2.1. DV Labs

11.1.6.3. HotWAN

11.1.6.4. Intel Security

11.1.6.5. SecNiche Labs

11.1.6.6. Sourcefire VRT

11.1.6.7. Symantec

11.1.6.8. VRLSec

11.1.6.9. Vupen

11.1.7. Vulnerability Resolution and Prioritization Platforms

11.1.7.1. RiskIO

11.1.7.2. Secure Decisions

11.1.7.3. Synack

11.1.7.4. ThreadFix

11.2. Web Application Firewalls (WAF) & Application Security

11.2.1. Web Application Firewalls

11.2.1.1. Virtualized Appliances

11.2.1.1.1. A10 Networks

11.2.1.1.2. AlertLogic

11.2.1.1.3. Amazon AWS

11.2.1.1.4. Barracuda Networks

11.2.1.1.5. BeeWare

11.2.1.1.6. Ergon Informatik AG

11.2.1.1.7. Forum Systems

11.2.1.1.8. Imperva

11.2.1.1.9. PentaSecurity

11.2.1.2. Physical Appliances

11.2.1.2.1. A10 Networks

11.2.1.2.2. AdNovum

11.2.1.2.3. AlertLogic

11.2.1.2.4. Anchiva

11.2.1.2.5. Barracuda Networks

11.2.1.2.6. BeeWare

11.2.1.2.7. BugSec

11.2.1.2.8. Cisco

11.2.1.2.9. Citrix

11.2.1.2.10. DBAPPSecurity

11.2.1.2.11. DPtech

11.2.1.2.12. Dell Sonicwall

11.2.1.2.13. DenyAll

11.2.1.2.14. Ergon Informatik

11.2.1.2.15. F5

11.2.1.2.16. Fortinet

11.2.1.2.17. Forum Systems

11.2.1.2.18. HP

11.2.1.2.19. Imperva

11.2.1.2.20. NSFocus

11.2.1.2.21. PentaSecurity

11.2.1.2.22. Positive Technologies

11.2.1.2.23. RadWare

11.2.1.2.24. Riverbed

11.2.1.2.25. Trustwave

11.2.1.2.26. WINS TECHNET LTD

11.2.1.3. Software

11.2.1.3.1. AdNovum

11.2.1.3.2. Apache

11.2.1.3.3. DenyAll

11.2.1.3.4. ERGON Informatik AG

11.2.1.3.5. Forum Systems

11.2.1.3.6. Juniper

11.2.1.3.7. Microsoft IIS

11.2.1.3.8. Open Source

11.2.1.3.9. Positive Security

11.2.1.3.10. Riverbed

11.2.1.3.11. Trustifier

11.2.1.3.12. WebScurity

11.2.1.4. Managed Services

11.2.1.4.1. Dell Secureworks

11.2.1.4.2. AT&T

11.2.1.4.3. Verizon Business

11.2.2. Software as a Service

11.2.2.1. Akamai

11.2.2.1.1. Kona

11.2.2.2. AlertLogic

11.2.2.3. ArmorLogic

11.2.2.4. BinarySec

11.2.2.5. CloudFlare

11.2.2.5.1. http://www.cloudflare.com

11.2.2.6. FireBlade

11.2.2.7. Incapsula

11.2.2.7.1. http://www.incapsula.com

11.2.2.8. Qualys

11.2.2.9. Securi

11.2.2.10. Soha

11.2.2.10.1. http://soha.io/

11.2.3. Web Threat Disruption Technology

11.2.3.1. Software

11.2.3.1.1. NuCaptcha

11.2.3.1.2. NuData

11.2.3.2. Appliances

11.2.3.2.1. Juniper

11.2.3.2.2. Shape Security

11.2.3.3. Open Source

11.2.3.3.1. Google Hack Honeypot

11.3. Web Application Security

11.3.1. Code Review Products

11.3.1.1. HP

11.3.1.2. IBM

11.3.2. Scanning Services

11.3.2.1. Cenzic

11.3.2.2. Controlscan

11.3.2.3. High-Tech Bridge

11.3.2.4. McAfee Secure

11.3.2.5. Qualys

11.3.2.6. Trustwave

11.3.2.7. WebSecurify

11.3.2.8. WhiteHat Security

11.3.3. Scanning Software

11.3.3.1. Open Source

11.3.3.1.1. Arachni Scanner

11.3.3.1.2. Subgraph

11.3.3.1.3. W3af

11.3.3.1.4. Wapiti

11.3.3.1.5. Watcher

11.3.3.2. Commercial

11.3.3.2.1. Accunetix

11.3.3.2.2. BeyondTrust

11.3.3.2.3. Cenzic

11.3.3.2.4. HP

11.3.3.2.5. MavitunaSecurity

11.3.3.2.6. NTObjectives

11.3.3.2.7. Nstalker

11.3.3.2.8. Portswigger

11.3.3.2.9. Syhunt

12. Risk, Compliance and Security Management

12.1. Firewall Workflow,Modeling & Change Management

12.1.1. Checkpoint Software

12.1.2. Firemon

12.1.3. ManageEngine

12.1.4. Redseal Networks

12.1.5. Skybox

12.1.6. Tufin

12.2. Regulations, Awareness and Training

12.2.1. Computer Based Training

12.2.1.1. Aujas

12.2.1.2. BeOne Development

12.2.1.3. Digital Defense

12.2.1.4. Fishnet Security

12.2.1.5. Inspired eLearning

12.2.1.6. Junglemap

12.2.1.7. KnowBe4

12.2.1.8. MediaPro

12.2.1.9. PhishMe

12.2.1.10. Phishline

12.2.1.11. Popcorn Training

12.2.1.12. Sans Institute

12.2.1.13. Scipp International

12.2.1.14. Secure Mentem

12.2.1.15. Security Innovation

12.2.1.16. Security Mentor

12.2.1.17. The Security Awareness Company

12.2.1.18. ThreatSim

12.2.1.19. Wombat Security Technologies

12.2.2. Educational, Awareness & News Outlets

12.2.2.1. Government Led

12.2.2.1.1. Information Sharing and Analysis Centers (ISACs)

12.2.2.2. Periodicals & Target Roles

12.2.2.2.1. Channel

12.2.2.2.2. CISO/CSO

12.2.2.2.3. Security Engineers/Analysts

12.2.3. Industry Standards/Groups

12.2.3.1. Standards

12.2.3.1.1. Technical

12.2.3.2. Industry Groups

12.2.3.2.1. Audit

12.2.3.2.2. General Security

12.2.3.2.3. Forensics

12.2.4. Regulations, Public Standards and Contractual Mandates

12.2.4.1. Global

12.2.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)

12.2.4.1.2. NIST

12.2.4.2. Country/Region Specific

12.2.4.2.1. China

12.2.4.2.2. Singapore

12.2.4.2.3. European Union

12.2.4.2.4. United States

12.3. Legal and regulatory information governance

12.4. Privacy

12.5. Security Policy and Response Orchaestration Platforms

12.5.1. Proofpoint

12.5.2. CSG Invotas

12.6. Security Program and Governance

12.6.1. Fraud Prevention/Web Malware Monitoring

12.6.1.1. Fraud Prevention

12.6.1.1.1. Software

12.6.1.1.2. Appliances

12.6.1.1.3. Software as a Service

12.6.1.1.4. Virtual Appliances

12.6.1.2. Website & Ad Malware Monitoring

12.6.1.2.1. Ad-Juster

12.6.1.2.2. Globalsign

12.6.1.2.3. Hackalert

12.6.1.2.4. Intel Security

12.6.1.2.5. QualysGuard

12.6.1.2.6. RiskIQ

12.6.1.2.7. Sucuri

12.6.2. Governance, Risk and Compliance

12.6.2.1. eGRC

12.6.2.1.1. Software as a Service

12.6.2.1.2. Software

12.6.2.2. Compliance Oriented Private Cloud Hosting (COPCH)

12.6.2.2.1. Note: This list is not an attestation of compliance

12.6.2.3. itGRCM

12.6.2.3.1. Agiliance

12.6.2.3.2. Allgress

12.6.2.3.3. Blackthorn Technologies

12.6.2.3.4. Brinqa

12.6.2.3.5. ControlCase

12.6.2.3.6. DF Labs

12.6.2.3.7. EMC-RSA

12.6.2.3.8. LockPath

12.6.2.3.9. Lumension Security

12.6.2.3.10. Microsoft

12.6.2.3.11. Modulo

12.6.2.3.12. Nasdaq Bwise

12.6.2.3.13. Rsam

12.6.2.3.14. Software as a Service

12.6.2.3.15. Symantec

12.6.2.3.16. Telos

12.6.2.3.17. WCK GRC Software

12.6.2.4. Operational Risk Analytics

12.6.2.4.1. Algosec

12.6.2.4.2. Cytegic

12.6.2.4.3. Firemon

12.6.2.4.4. IBM

12.6.2.4.5. Redseal Networks

12.6.2.4.6. RiskIO

12.6.2.4.7. Skybox

12.6.2.4.8. Software Development Lifecycle

12.6.2.4.9. Solarwinds

12.6.2.4.10. Tufin

12.6.2.5. Cloud & Container Compliance Assessment

12.6.2.5.1. Cavirin