
1. • Broken Cryptography
1.1. Cloud/Virtualized Firewalls
1.1.1. Agent-Based
1.1.1.1. CloudPassage
1.1.1.2. Drawbridge Networks
1.1.1.3. Illumio
1.1.2. Cisco
1.1.3. Citrix Xen
1.1.3.1. Hillstone Networks
1.1.3.2. Huawei
1.1.3.3. Fortinet
1.1.3.4. Palo Alto Networks
1.1.4. Container-Based
1.1.4.1. ShieldX
1.1.5. Hyper-V
1.1.5.1. Fortinet
1.1.6. KVM
1.1.6.1. Hillstone Networks
1.1.6.2. Juniper Networks
1.1.6.3. Palo Alto Networks
1.1.7. Openstack
1.1.7.1. OpenFlow
1.1.7.1.1. Fortinet
1.1.7.2. Juniper Networks
1.1.8. Public Cloud
1.1.8.1. Virtual Appliances
1.1.8.1.1. Barracuda
1.1.8.1.2. Brocade
1.1.8.1.3. Catbird Networks
1.1.8.1.4. Check Point Software
1.1.8.1.5. Juniper Networks
1.1.8.1.6. Palo Alto Networks
1.1.8.1.7. PfSense
1.1.8.1.8. Sophos
1.1.8.1.9. vArmour
1.1.8.2. API-Driven
1.1.8.2.1. Dome9
1.1.8.2.2. Illumio
1.1.8.3. AWS
1.1.8.3.1. Check Point Software
1.1.8.3.2. Fortinet
1.1.8.3.3. Palo Alto Networks
1.1.8.4. Microsoft Azure
1.1.8.4.1. Check Point Software
1.1.8.4.2. Fortinet
1.1.8.5. Container-Based
1.1.9. VMware Environments
1.1.9.1. API Integration
1.1.9.1.1. Check Point Software
1.1.9.1.2. Fortinet
1.1.9.1.3. Palo Alto Networks
1.1.9.2. NSX
1.1.9.2.1. Fortinet
1.1.9.2.2. Check Point Software
1.1.9.3. VM Appliance
1.1.9.3.1. Barracuda
1.1.9.3.2. Brocade
1.1.9.3.3. Catbird Networks
1.1.9.3.4. Check Point Software
1.1.9.3.5. Fortinet
1.1.9.3.6. Hillstone Networks
1.1.9.3.7. Juniper Networks
1.1.9.3.8. Palo Alto Networks
1.1.9.3.9. PfSense
1.1.9.3.10. Sophos
1.1.9.3.11. vArmour
1.1.9.3.12. Huawei
2. • Phishing attacks
2.1. Virtualized Appliances
2.1.1. A10 Networks
2.1.2. AlertLogic
2.1.3. Amazon AWS
2.1.3.1. Riverbed
2.1.4. Barracuda Networks
2.1.5. BeeWare
2.1.6. DenyAll
2.1.7. Ergon Informatik AG
2.1.8. F5
2.1.9. Fortinet
2.1.10. Forum Systems
2.1.11. Imperva
2.1.12. PentaSecurity
2.1.13. Trustwave
2.1.14. Citrix
2.1.14.1. Netscaler VPX
2.1.14.1.1. https://www.citrix.com/products/netscaler-application-delivery-controller/platforms.html
2.2. Physical Appliances
2.2.1. A10 Networks
2.2.2. AdNovum
2.2.3. AlertLogic
2.2.4. Anchiva
2.2.5. Barracuda Networks
2.2.6. BeeWare
2.2.7. BugSec
2.2.8. Citrix
2.2.9. DBAPPSecurity
2.2.10. DPtech
2.2.11. Dell Sonicwall
2.2.12. DenyAll
2.2.13. Ergon Informatik
2.2.13.1. https://www.airlock.com/en/products/airlock-waf/
2.2.14. F5
2.2.15. Fortinet
2.2.16. Forum Systems
2.2.17. HP
2.2.18. Imperva
2.2.19. NSFocus
2.2.20. PentaSecurity
2.2.21. Positive Technologies
2.2.21.1. http://www.ptsecurity.com/products/af/
2.2.22. RadWare
2.2.23. Trustwave
2.2.24. WINS TECHNET LTD
2.2.24.1. http://www.wins21.co.kr/
2.3. Software
2.3.1. Dedicated Software
2.3.1.1. AdNovum
2.3.1.2. Applicure
2.3.1.2.1. http://www.applicure.com/Products/dotdefender
2.3.1.3. DenyAll
2.3.1.4. ERGON Informatik AG
2.3.1.4.1. AIRLOCK
2.3.1.5. Forum Systems
2.3.1.6. Positive Security
2.3.1.7. Riverbed
2.3.1.8. Trustifier
2.3.1.8.1. https://www.trustifier.com/f/#!overview
2.3.1.9. WebScurity
2.3.2. Open Source
2.3.2.1. IronBee
2.3.2.2. Mod Security
2.3.3. Web Server Modules
2.3.3.1. Microsoft IIS
2.3.3.1.1. AQTRONIX
2.3.3.1.2. Applicure
2.3.3.1.3. BeyondTrust
2.3.3.1.4. ThreatSentry
2.3.3.2. Apache
2.3.3.2.1. Applicure
2.4. Managed Services
2.4.1. Dell Secureworks
2.4.2. AT&T
2.4.3. Verizon Business
2.5. Software as a Service
2.5.1. Akamai
2.5.1.1. Kona
2.5.2. AlertLogic
2.5.3. Anquanbao
2.5.4. ArmorLogic
2.5.5. BinarySec
2.5.6. CloudFlare
2.5.7. DenyAll
2.5.7.1. http://www.denyall.com/products/web-application-firewall/
2.5.8. FireBlade
2.5.9. Imperva (Incapsula)
2.5.9.1. http://www.incapsula.com
2.5.10. Incapsula
2.5.11. PowerCDN
2.5.12. Qualys
2.5.13. Securi
2.5.14. Signal Sciences
2.5.15. Soha
2.5.15.1. http://soha.io/
2.5.16. ZenEdge
3. • Inactive apps
3.1. Active Directory Defense
3.1.1. Aorato
3.1.1.1. http://www.aorato.com/
3.2. Cloud-Based Remote Access VPN
3.2.1. Check Point
3.2.1.1. Capsule Cloud
3.2.2. Pertino
3.2.3. Soha
3.3. DNS-based Threat Prevention/Detection
3.3.1. Standalone Appliances
3.3.1.1. Bluecat Networks
3.3.1.2. Efficient IP
3.3.1.3. Infoblox
3.3.2. Recursive DNS Services
3.3.2.1. Bluecat Networks
3.3.2.2. Cisco
3.3.2.2.1. OpenDNS
3.3.2.3. Comodo
3.3.2.4. CrowdStrike
3.3.2.5. Infoblox
3.3.2.6. Neustar
3.3.2.7. Nominum
3.3.2.8. Symantec
3.3.2.9. ThreatStop
3.3.2.10. Verisign
3.3.3. Firewalls
3.3.3.1. Palo Alto Networks
3.4. Denial of Service Protection
3.4.1. Appliances
3.4.1.1. Arbor Networks
3.4.1.1.1. Prevail APS
3.4.1.2. Check Point Software
3.4.1.2.1. DDos Protector
3.4.1.3. Corero
3.4.1.4. Fortinet
3.4.1.5. Genie Networks
3.4.1.5.1. ATM Appliances
3.4.1.6. NSFOCUS
3.4.1.7. Radware
3.4.1.8. WINS TECHNET LTD
3.4.1.8.1. http://www.wins21.co.kr/
3.4.2. Security as a Service
3.4.2.1. HTTP/HTTPS Only
3.4.2.1.1. DOSArrest
3.4.2.1.2. Cloudflare
3.4.2.2. MultiProtocol/Network
3.4.2.2.1. Akamai
3.4.2.2.2. Black Lotus
3.4.2.2.3. Cloud Flare
3.4.2.2.4. F5
3.4.2.2.5. Incapsula
3.4.2.2.6. Link11
3.4.2.2.7. Neustar
3.4.2.2.8. NexusGuard
3.4.2.2.9. Verisign Inc
3.4.3. Clean Pipe Services
3.4.3.1. AT&T
3.4.3.2. Verizon
3.5. Fraud Prevention/Web Malware Monitoring
3.5.1. Fraud/Bot/Webscrape Prevention
3.5.1.1. Software
3.5.1.1.1. RSA (EMC)
3.5.1.1.2. IBM (Formerly Trusteer)
3.5.1.1.3. Intellinx
3.5.1.2. Appliances
3.5.1.2.1. RSA
3.5.1.2.2. Distil Networks
3.5.1.2.3. White Ops
3.5.1.3. Software as a Service
3.5.1.3.1. Akamai
3.5.1.3.2. BioCatch
3.5.1.3.3. Distil Networks
3.5.1.3.4. Guardian Analytics
3.5.1.3.5. Kount
3.5.1.3.6. MarkMonitor
3.5.1.3.7. ShieldSquare
3.5.1.3.8. ThreatMetrix
3.5.1.3.9. White Ops
3.5.1.3.10. X-Cart
3.5.1.3.11. iovation
3.5.1.4. Virtual Appliances
3.5.1.4.1. Distil Networks
3.5.2. Website & Ad Malware Monitoring
3.5.2.1. Ad-Juster
3.5.2.2. Globalsign
3.5.2.2.1. Leverages Hackalert
3.5.2.3. Hackalert
3.5.2.4. Intel Security
3.5.2.4.1. Siteadvisor
3.5.2.5. QualysGuard
3.5.2.6. RiskIQ
3.5.2.7. Sucuri
3.6. Network Access Control (NAC)
3.6.1. Host Based
3.6.1.1. Symantec
3.6.1.2. Intel Security
3.6.2. Network Based
3.6.2.1. Aruba Networks
3.6.2.2. Bradford Networks
3.6.2.3. Cisco
3.6.2.4. Forescout
3.6.2.5. Milton Security Group
3.6.2.6. Portnox
3.7. Network Anonymization & Consumer VPN Services
3.7.1. AnchorFree Hotspot Shield
3.7.2. Anonymize.net
3.7.3. CyberGhost
3.7.4. Dispel
3.7.5. GoldenFrog
3.7.6. HMA ProVPN
3.7.6.1. TorVPN
3.7.7. Okayfreedom
3.7.8. OpenVPN Shield Exchange
3.7.9. Private Wifi
3.7.10. Tor
3.7.11. luminati.io
3.8. Network Firewalls
3.8.1. Carrier Firewalls
3.8.2. Enterprise Firewalls
3.8.2.1. Multifunction Enterprise Firewalls
3.8.2.1.1. Bluedon
3.8.2.1.2. Check Point Software
3.8.2.1.3. Cisco
3.8.2.1.4. Fortinet
3.8.2.1.5. Huawei
3.8.2.1.6. Palo Alto Networks
3.8.2.1.7. Sonicwall
3.8.2.1.8. Websense (Formerly Intel Security)
3.8.2.2. Stateful Inspection - Traditional Firewalls
3.8.2.2.1. Cisco
3.8.2.2.2. Huawei
3.8.2.2.3. Check Point Software
3.8.3. Multi-Funtion SMB Firewalls
3.8.3.1. 443 Networks
3.8.3.2. Bluedon
3.8.3.3. Check Point Software
3.8.3.4. CheckPoint
3.8.3.5. Cisco
3.8.3.6. Clavister
3.8.3.7. Endian
3.8.3.8. Fortinet
3.8.3.9. Hillstone Networks
3.8.3.10. Meraki
3.8.3.11. PineApp
3.8.3.11.1. http://www.pineapp.com/
3.8.3.12. Sangfor
3.8.3.13. Sonicwall
3.8.3.14. Sophos
3.8.3.15. Trustwave
3.8.3.16. Untangle
3.8.3.17. WINS TechNet LTD
3.8.3.17.1. http://www.wins21.co.kr/
3.8.3.18. WatchGuard
3.8.4. Open Source & Community
3.8.4.1. IPTables
3.8.4.2. IPchains
3.8.4.3. PFSense
3.8.4.4. Untangle
3.8.5. Router Firewalls
3.9. Network Intrusion Detection/Prevention
3.9.1. Predictive Modeling
3.9.1.1. Cyactive
3.9.1.2. Trustpipe
3.9.2. IBM
3.9.3. Signature Based
3.9.3.1. AlienVault
3.9.3.1.1. Snort
3.9.3.2. Bricata
3.9.3.3. CheckPoint
3.9.3.4. Cisco
3.9.3.4.1. Sourcefire
3.9.3.5. Enterasys
3.9.3.6. Fortinet
3.9.3.7. HP
3.9.3.7.1. TippingPoint
3.9.3.8. IBM
3.9.3.9. Intel Security
3.9.3.10. Open Source
3.9.3.10.1. Snort
3.9.3.11. Symantec
3.9.3.11.1. APT Network
3.9.3.12. WINS TECHNET LTD
3.9.3.12.1. http://www.wins21.co.kr/
3.9.4. SCADA
3.9.4.1. Radiflow
3.10. Network Packet Brokers
3.10.1. Adara
3.10.2. Apcon
3.10.3. Arista Networks
3.10.4. Cubro
3.10.5. Gigamon
3.10.6. IXIA
3.10.7. Interface Masters Technologies
3.10.8. JDSU
3.10.9. NetOptics
3.10.10. NetScout
3.10.11. VSS Monitoring
3.11. Network Traffic Analysis, Network Behavior Analysis and Network Forensics
3.11.1. Flow Analysis/Metadata Extraction
3.11.1.1. Arbor Networks
3.11.1.2. IBM
3.11.1.3. Lancope
3.11.1.4. LogRythm
3.11.1.5. Intel Security NBA
3.11.2. Forensic Capture with User Surveillance & Security Threat Analytics
3.11.2.1. Access Data
3.11.2.2. BlueCoat
3.11.2.3. Cisco
3.11.2.3.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html
3.11.2.4. EMC
3.11.2.5. FireEye
3.11.2.6. Fluke Networks
3.11.2.7. IBM
3.11.2.8. IP Fabrics
3.11.2.9. JDSU (Network Instruments)
3.11.2.10. LightCyber
3.11.2.11. NetAgent
3.11.2.12. NetResec
3.11.2.13. NetScout
3.11.2.14. Niksun
3.11.2.15. Novetta Solutions
3.11.2.16. Nuix
3.11.2.17. Packetsled
3.11.2.18. Riverbed
3.11.2.19. SS8
3.11.2.19.1. http://www.ss8.com/
3.11.2.20. nPulse Technologies
3.11.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring
3.11.3.1. Emulex
3.11.3.2. Packetsled
3.11.3.3. WildPackets
3.11.4. Network Forensics Tools
3.11.4.1. Alert Logic
3.11.4.1.1. Formerly Click Security
3.11.4.2. Corvil
3.11.4.3. Cybersift
3.11.4.3.1. http://www.cybersift.net/sifter10app.html
3.11.4.4. Decision Group INC
3.11.4.4.1. http://www.edecision4u.com/index.html
3.11.4.5. EMC
3.11.4.6. FireEye
3.11.4.7. Fluke Networks
3.11.4.8. IP Fabrics
3.11.4.9. IPCopper
3.11.4.10. InveaTech
3.11.4.10.1. https://www.invea.com/en/products-and-services/li-system
3.11.4.11. KLOS
3.11.4.11.1. http://www.klos.com/applications/lawful-intercept/
3.11.4.12. NEXT Computing
3.11.4.12.1. http://www.nextcomputing.com/products/packet-capture-systems
3.11.4.13. NetReSec
3.11.4.14. Niksun
3.11.4.15. Radisys
3.11.4.15.1. http://www.radisys.com/products/network-appliance/
3.11.4.16. Utimaco
3.11.4.16.1. https://lims.utimaco.com/utimaco-lims/
3.11.4.17. WildPackets
3.11.5. Network Forensics Tools as a Service (NFTaaS)
3.11.5.1. CloudShark
3.11.6. Network Taps
3.11.6.1. Optical
3.11.6.1.1. Apcon
3.11.6.1.2. DataCom Systems
3.11.6.1.3. FibreDyne
3.11.6.1.4. Gigamon
3.11.6.1.5. Glimmerglass
3.11.6.1.6. M2Optics
3.11.6.1.7. Netoptics
3.11.6.1.8. Network Instruments
3.11.6.1.9. VSS Monitoring
3.11.6.1.10. nTAP
3.11.7. Network Traffic Analysis
3.11.7.1. Amgine Securus
3.11.7.2. Arbor Networks
3.11.7.3. Boeing
3.11.7.4. Cisco
3.11.7.4.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html
3.11.7.5. Corvil
3.11.7.6. Cyber adAPT
3.11.7.7. Damballa
3.11.7.8. Darktrace
3.11.7.9. ExtraHop Networks
3.11.7.10. Fidelis Cybersecurity
3.11.7.11. Lancope
3.11.7.12. Light Cyber
3.11.7.13. Novetta Solutions
3.11.7.14. PacketSled
3.11.7.15. Phirelight
3.11.7.16. Qihoo 360
3.11.7.16.1. SkyEye
3.11.7.17. RedJack
3.11.7.18. SlashNext
3.11.7.19. Splunk
3.11.7.20. Taasera
3.11.7.21. ThreatTrack
3.11.7.22. Trustport
3.11.7.22.1. Threat Intelligence
3.11.7.23. Vectra Networks
3.11.7.24. WireX
3.11.8. Raw Network Packet Capture
3.11.8.1. Apcon
3.11.8.1.1. Riverbed
3.11.8.1.2. Netfort
3.11.8.1.3. Wireshark
3.11.8.1.4. NTOP
3.11.8.2. Arbor Networks
3.11.8.3. Comworth
3.11.8.4. NTOP.org
3.11.8.5. Netfort
3.11.8.6. WireShark
3.12. Network-Based Advanced Threat Protection
3.12.1. Firewalls with Malware Sandbox Capabilities
3.12.1.1. Barracuda
3.12.1.2. Check Point Software
3.12.1.3. Cisco
3.12.1.4. Fortinet
3.12.1.5. Huawei
3.12.1.6. Juniper Networks
3.12.1.7. Palo Alto Networks
3.12.1.8. Sonicwall
3.12.1.9. Sophos
3.12.1.10. Watchguard
3.12.2. Appliance Based Malware Sandboxes
3.12.2.1. AMGINE SECURUS
3.12.2.1.1. http://www.amgine.co.kr/index.html
3.12.2.2. AhnLab
3.12.2.3. Bluecoat
3.12.2.4. Check Point Software
3.12.2.4.1. Emulator Blade
3.12.2.5. Cisco
3.12.2.5.1. ThreatGrid
3.12.2.6. ContentKeeper
3.12.2.7. Cyphort
3.12.2.8. Damballa
3.12.2.9. FireEye
3.12.2.10. Fortinet
3.12.2.10.1. FortiSandbox
3.12.2.11. General Dynamics
3.12.2.11.1. Fidelis Security Systems
3.12.2.12. Huawei
3.12.2.12.1. Firehunter
3.12.2.13. Intel Security
3.12.2.13.1. McAfee Advanced Threat Detection Appliance
3.12.2.14. LastLine
3.12.2.15. Palo Alto Networks
3.12.2.15.1. WildFire
3.12.2.16. Payload Security
3.12.2.17. Qihoo
3.12.2.17.1. SkyEye
3.12.2.18. Techguard Security
3.12.2.19. ThreatTrack
3.12.2.20. Trend Micro
3.12.2.20.1. Deep Discovery
3.12.2.21. VMRay
3.12.2.22. VeeDog
3.12.2.22.1. http://veedog.com/
3.12.2.23. WINS TECHNET LTD
3.12.2.23.1. http://www.wins21.co.kr/
3.12.3. Cloud-Based Malware Sandboxes
3.12.3.1. Cisco
3.12.3.1.1. ThreatGrid
3.12.3.2. Fortinet
3.12.3.3. Huawei
3.12.3.4. Joe Security
3.12.3.5. Lastline
3.12.3.6. Netwitness
3.12.3.6.1. Spectrum
3.12.3.7. Palo Alto Networks
3.12.3.7.1. WildFire
3.12.3.8. Qihoo
3.12.3.8.1. SkyEye
3.12.3.9. Sonicwall
3.13. SCADA/ICS
3.13.1. Monitoring
3.13.1.1. CRITIFENSE
3.13.1.2. Cyberbit
3.13.1.3. PFP Cybersecurity
3.13.2. SCADA Firewalls
3.13.2.1. BAE Systems
3.13.2.1.1. http://www.baesystems.com/en-us/product/scada-firewall
3.13.2.2. Bayshore Networks
3.13.2.2.1. https://www.bayshorenetworks.com/products/it-ot-gateway/
3.13.2.3. Check Point Software
3.13.2.3.1. https://www.checkpoint.com/products-solutions/critical-infrastructure/
3.13.2.4. Endian
3.13.2.4.1. http://www.endian.com/products/4i/
3.13.2.5. Fortinet
3.13.2.5.1. https://www.fortinet.com/solutions/industries/scada-industrial-control-systems.html
3.13.2.6. Tofino Security
3.13.2.6.1. https://www.tofinosecurity.com/products/Tofino-Firewall-LSM
3.14. SSL Inspection Appliances
3.14.1. A10 Networks
3.14.2. Bluecoat
3.14.3. ResolutionOne
3.14.4. VSS Monitoring
3.14.5. SourceFire
3.15. Software Defined Perimeter
3.15.1. Certes Networks
3.15.2. Cryptzone
3.15.3. Tempered Networks
3.15.4. Unisys Stealth
3.15.5. Vidder
3.15.6. Waverly Labs
3.16. Virtual Private Networking (VPN/SSL VPN)
3.16.1. IPSec VPN Concentrators
3.16.1.1. Certes Networks
3.16.1.2. CheckPoint Software
3.16.1.3. Cisco
3.16.1.4. Mako Networks
3.16.2. Layer 2 Encryption
3.16.2.1. Certes Networks
3.16.3. Layer 4 Encryption
3.16.3.1. Certes Networks
3.16.4. SSL VPN
3.16.4.1. AhnLab
3.16.4.2. Array Networks
3.16.4.3. Barracuda Networks
3.16.4.4. Check Point Software
3.16.4.5. Cisco
3.16.4.6. Citrix
3.16.4.7. F5 Networks
3.16.4.8. Fortinet
3.16.4.9. Hillstone Networks
3.16.4.10. Juniper
3.16.4.11. NetGear
3.16.4.12. Sonicwall
3.16.4.13. Stonesoft
3.16.4.14. WatchGuard
3.16.5. Multi-Path Dynamic VPN
3.16.5.1. Secret Double Octopus
3.16.5.2. Dispersive Networks
3.17. Web/Email Protection
3.17.1. Secure Email Gateways
3.17.1.1. Alt-N Technologies
3.17.1.2. Bluecoat
3.17.1.3. Fortinet
3.17.1.4. GWAVA
3.17.1.5. Intel Security
3.17.1.6. Proofpoint
3.17.1.7. Re-Sec
3.17.1.8. Sonicwall
3.17.1.9. Symantec
3.17.1.10. Trustwave
3.17.1.11. Voitiro
3.17.1.12. Websense
3.17.1.13. iBoss
3.17.2. Secure Web Gateways
3.17.2.1. Anchiva
3.17.2.2. Bluecoat
3.17.2.3. ContentKeeper
3.17.2.4. GWAVA
3.17.2.5. Intel Security
3.17.2.6. Re-Sec
3.17.2.7. Symantec
3.17.2.8. Trustwave
3.17.2.9. Websense
3.17.2.10. iBoss
3.17.3. Security as a Service
3.17.3.1. Web & Email SaaS
3.17.3.1.1. Appriver
3.17.3.1.2. Barracuda
3.17.3.1.3. Bitglass
3.17.3.1.4. Cisco
3.17.3.1.5. Intel Security
3.17.3.1.6. MailGuard
3.17.3.1.7. Spamina
3.17.3.1.8. Symantec
3.17.3.1.9. Total Defense
3.17.3.1.10. TotalDefense
3.17.3.1.11. Websense
3.17.3.1.12. Zscaler
3.17.3.2. Web Only
3.17.3.2.1. Bluecoat
3.17.3.2.2. ContentKeeper
3.17.3.2.3. OpenDNS
3.17.3.2.4. Websense
3.17.3.2.5. Zscaler
3.17.3.3. Secure Email Gateways
3.17.3.3.1. Agari
3.17.3.3.2. CloudMark
3.17.3.3.3. Proofpoint
3.17.3.3.4. Return Path
3.17.3.3.5. Spam Experts
3.17.3.3.6. Spam Titan
3.17.3.3.7. Spamina
3.17.3.3.8. ValiMail
3.17.3.4. Anti-Phishing
3.17.3.4.1. Amgine Securus
3.17.3.4.2. Area1 Security
3.17.3.4.3. CloudMark
3.17.3.4.4. Cymbel
3.17.3.4.5. Cyveillance
3.17.3.4.6. FireEye
3.17.3.4.7. MailGuard
3.17.3.4.8. MediaPro
3.17.3.4.9. Phishlabs
3.17.3.4.10. ThreatTrack
3.17.3.4.11. Votiro
3.17.3.4.12. Webroot
3.17.3.4.13. ZapFraud
4. • Lack of end-to-end encryption
4.1. Web Application Firewalls (WAF) & Application Security
4.1.1. Web Threat Disruption Technology
4.1.1.1. Software
4.1.1.1.1. NuCaptcha
4.1.1.1.2. NuData
4.1.1.2. Appliances
4.1.1.2.1. Juniper
4.1.1.2.2. Shape Security
4.1.1.3. Open Source
4.1.1.3.1. Google Hack Honeypot
4.2. Web Application Security
4.2.1. Code Review Products
4.2.1.1. HP
4.2.1.2. IBM
4.2.2. Web Application Vulnerability Scanning Services
4.2.2.1. Cenzic
4.2.2.2. Controlscan
4.2.2.3. High-Tech Bridge
4.2.2.4. McAfee Secure
4.2.2.5. Qualys
4.2.2.6. Securi
4.2.2.7. Sitelock
4.2.2.8. Trustwave
4.2.2.9. WebSecurify
4.2.2.10. WhiteHat Security
4.2.3. Scanning Software
4.2.3.1. Open Source
4.2.3.1.1. Arachni Scanner
4.2.3.1.2. Subgraph
4.2.3.1.3. W3af
4.2.3.1.4. Wapiti
4.2.3.1.5. Watcher
4.2.3.2. Commercial
4.2.3.2.1. Accunetix
4.2.3.2.2. BeyondTrust
4.2.3.2.3. Cenzic
4.2.3.2.4. HP
4.2.3.2.5. MavitunaSecurity
4.2.3.2.6. NTObjectives
4.2.3.2.7. Nstalker
4.2.3.2.8. Portswigger
4.2.3.2.9. Syhunt
5. • Vulnerable Applications
5.1. Data Governance and Classification
5.1.1. Expert Source
5.1.1.1. http://www.expertsource.in/index.php
5.1.2. HP
5.1.3. IBM
5.1.4. Informatica
5.1.5. Nuix
5.1.6. Somansa
5.1.7. Titus
5.1.8. boldonjames
5.2. Data Loss Prevention (DLP)
5.2.1. Endpoint
5.2.1.1. Data Classification and Tracking
5.2.1.1.1. Banyan Solutions
5.2.1.1.2. BoldonJames
5.2.1.1.3. Digital Guardian
5.2.1.1.4. HP
5.2.1.1.5. IBM
5.2.1.1.6. Identity Finder
5.2.1.1.7. Mach1 Development
5.2.1.1.8. Microsoft (Formerly Secure Islands)
5.2.1.1.9. MinerEye
5.2.1.1.10. Nuix
5.2.1.1.11. Smartlogic
5.2.1.1.12. Titus
5.2.1.1.13. Varonis
5.2.1.1.14. CoSoSys
5.2.1.2. Mobile
5.2.1.2.1. Symantec
5.2.1.2.2. Websense
5.2.1.2.3. Microsoft (Secure Islands)
5.2.1.3. Windows
5.2.1.3.1. Absolute Software
5.2.1.3.2. CA Technologies
5.2.1.3.3. Digital Guardian
5.2.1.3.4. GTB Technologies
5.2.1.3.5. Infowatch
5.2.1.3.6. Intel Security
5.2.1.3.7. RSA
5.2.1.3.8. Microsoft (Secure Islands)
5.2.1.3.9. Somansa
5.2.1.3.10. Symantec
5.2.1.3.11. Trustwave
5.2.1.3.12. Watchful Software
5.2.1.3.13. Raytheon-Websense
5.2.1.3.14. Zecurion
5.2.2. Network
5.2.2.1. Digital Guardian
5.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)
5.2.2.3. Symantec
5.2.2.4. InfoWatch
5.2.3. Secure Email Gateway
5.2.3.1. Cisco
5.2.3.2. Symantec
5.2.3.3. Intel Security
5.2.3.4. Somansa
5.2.4. Secure Web Gateway
5.2.4.1. Intel Security
5.2.4.2. Symantec
5.2.4.3. Somansa
5.2.5. Security as a Service
5.2.5.1. Consumer
5.2.5.1.1. Reputation.com
5.2.5.1.2. Social Fortress
5.2.5.1.3. PwnedList
5.2.5.2. Enterprise
5.2.5.2.1. Social Fortress
5.2.5.2.2. Google Apps
5.2.5.2.3. ZixCorp
5.3. Database Security
5.3.1. Database Audit and Protection (DAP)
5.3.1.1. Application Security, Inc
5.3.1.2. BeyondTrust
5.3.1.3. Big Data Platform DAP
5.3.1.3.1. BlueTalon
5.3.1.3.2. Cloudera
5.3.1.3.3. Hortonworks
5.3.1.3.4. IBM
5.3.1.3.5. Imperva
5.3.1.4. DataSunrise
5.3.1.5. Fortinet
5.3.1.6. GreenSQL
5.3.1.7. IBM
5.3.1.8. IRI
5.3.1.8.1. Oracle
5.3.1.8.2. SQL Server
5.3.1.9. Imperva
5.3.1.10. Intel Security
5.3.1.11. Mentis Software
5.3.1.12. Oracle Corp
5.3.1.13. PentaSecurity
5.3.1.14. Warevalley
5.3.2. Database Activity Monitoring
5.3.2.1. DB Networks
5.3.2.2. Somansa
5.4. Encryption/Tokenization
5.4.1. Big Data
5.4.1.1. Gazzang
5.4.1.2. Vormetric
5.4.2. Cloud/SAAS Encryption
5.4.2.1. Appliances
5.4.2.1.1. Office365
5.4.2.1.2. Ciphercloud
5.4.2.1.3. Afore Solutions
5.4.2.1.4. Perspecsys
5.4.2.2. Software
5.4.2.2.1. BoxCryptor
5.4.2.2.2. CloudMask
5.4.2.2.3. PrivateCore
5.4.2.2.4. Trend Micro
5.4.2.2.5. Viivo
5.4.2.2.6. Voltage Security
5.4.2.3. Software as a Service
5.4.2.3.1. Trend Micro
5.4.2.3.2. SooKasa
5.4.2.3.3. Gemalto
5.4.3. Cryptographic Providers
5.4.3.1. RSA
5.4.3.2. Quintessence
5.4.3.3. Microsoft
5.4.4. Data masking
5.4.4.1. Oracle
5.4.4.2. Dataguise
5.4.4.3. Informatica
5.4.4.4. IBM
5.4.4.5. Voltage Security
5.4.4.6. Green SQL
5.4.4.7. Mentis
5.4.4.8. Compuware
5.4.4.9. Axis
5.4.4.10. Privacy Analytics
5.4.4.11. Camouflage Software
5.4.4.12. Solix Technologies
5.4.4.13. Net 2000
5.4.5. Database
5.4.5.1. Gemalto
5.4.5.2. Dark Matter Labs
5.4.5.3. Vormetric
5.4.6. Email
5.4.6.1. ZixCorp
5.4.6.2. Encryptics
5.4.6.2.1. https://www.encryptics.com/default.aspx
5.4.7. Encrypted USB Storage
5.4.7.1. Apricorn
5.4.7.2. Datalocker
5.4.7.3. Integral Memory
5.4.7.4. IronKey
5.4.7.5. Kingston
5.4.7.6. Virbatim
5.4.8. File/Folder
5.4.8.1. Covertix
5.4.8.1.1. http://www.covertix.com/
5.4.8.2. IBM
5.4.8.2.1. Mainframe
5.4.8.3. SecureIslands
5.4.8.4. Sophos
5.4.8.4.1. SafeGuard Enterprise (Utimaco)
5.4.8.5. Symantec (PGP)
5.4.8.6. Vormetric
5.4.8.7. WinMagic
5.4.8.7.1. SecureDoc
5.4.9. Quantum Encryption
5.4.9.1. IDQ
5.4.9.2. Quintessence Labs
5.4.9.3. Whitewood Encryption
5.4.10. Tokenization
5.4.10.1. Protegrity
5.4.11. Whole Disk
5.4.11.1. Intel Security
5.4.11.2. Symantec (PGP)
5.4.11.3. CheckPoint Software
5.4.11.4. Encryption Management
5.4.11.4.1. Wave Systems
5.4.11.5. WinMagic
5.4.11.5.1. SecureDoc
5.4.11.6. Microsoft
5.4.11.6.1. Bitlocker
5.4.11.7. Sophos
5.4.11.7.1. SafeGuard Enterprise (Utimaco)
5.4.11.8. Trustwave
5.4.11.8.1. DataControl
5.4.11.9. Vormetric
5.5. File Analysis Software
5.5.1. Acaveo
5.5.2. Active Navigation
5.5.3. AvePoint
5.5.4. Beyond Recognition
5.5.5. Bloomberg
5.5.6. CommVault
5.5.7. Condrey
5.5.8. Covertix
5.5.9. DataGlobal
5.5.10. DataGravity
5.5.11. Equivio
5.5.12. HP
5.5.12.1. Control Point
5.5.13. HiSoftware
5.5.14. IBM
5.5.14.1. StoreIQ
5.5.15. Identifty Finder
5.5.16. Imperva
5.5.17. Index Engines
5.5.18. Kazoup
5.5.19. MailGuard
5.5.20. NTP Software
5.5.21. Novell
5.5.22. Nuix
5.5.23. Proofpoint
5.5.24. Stealthbits
5.5.25. Varonis
5.5.26. WatchDox
5.5.27. Whitebox Security
5.5.28. ZyLab
5.6. Hardware Security Modules (HSM)
5.6.1. Cloud HSM
5.6.1.1. Amazon
5.6.1.2. IBM
5.6.2. Hardware
5.6.2.1. FutureX
5.6.2.2. Gemalto
5.6.2.3. HPE
5.6.2.4. Safenet
5.6.2.5. Thales
5.7. Software Defined Storage Security
5.7.1. Dispersive Networks
5.7.1.1. https://dispersivetechnologies.com/
5.7.2. OceansBlue
5.7.2.1. http://www.oceansblue.net/index.html
5.8. eSignatures
5.8.1. Adobe eSign Services
5.8.2. Alphatrust
5.8.3. Docusign
5.8.4. Hellosign
5.8.5. Rightsignature
5.8.6. Sertifi
6. OEMs & System Integrators
6.1. Appliance Integrators
6.1.1. Accton
6.1.1.1. http://www.accton.com/
6.1.2. Advantech
6.1.2.1. http://www.advantech.com/
6.1.3. Celestica
6.1.3.1. http://www.celestica.com/
6.1.4. Dan-el Technologies Ltd.
6.1.4.1. http://www.danel.co.il/
6.1.5. Flextronics
6.1.5.1. http://www.flextronics.com/
6.1.6. Plexus
6.1.6.1. http://www.plexus.com/
6.2. Base Appliances
6.2.1. Advantech
6.2.2. Amax
6.2.3. Cas Well
6.2.4. Iron Systems
6.2.5. Lanner
6.2.6. Portwell
6.2.7. Tilera
6.3. Cards
6.3.1. Netronome
6.3.2. Tilera
6.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection
6.4. Encryption Acceleration
6.4.1. Intel
6.4.1.1. VPRO
6.4.2. Gemalto
6.4.2.1. Luna PCI
6.5. MSSP Appliances
6.5.1. 443 Networks
6.6. Threat Intelligence
6.6.1. Anti-Phishing
6.6.1.1. Cyren
6.6.2. DNS DGA Feeds
6.6.2.1. Farsight Security
6.6.3. File Reputation
6.6.3.1. Findthatfile
6.6.3.2. Webroot
6.6.4. Fraud
6.6.4.1. Internet Fraud Alert
6.6.4.1.1. http://www.ifraudalert.org/default.aspx
6.6.4.2. National Cyber-Forensics and Training Alliance
6.6.4.2.1. http://www.ncfta.net/Index.aspx
6.6.5. IP Block Lists
6.6.5.1. WebRoot Brightcloud
6.6.5.2. Cyren
6.6.5.3. Malwarebytes
6.6.5.3.1. hpHosts
6.6.6. IP Reputation
6.6.6.1. Cyren
6.6.6.2. WebRoot Brightcloud
6.6.7. Indicators of Compromise
6.6.7.1. FireEye
6.6.7.2. Proofpoint
6.6.7.2.1. Emerging Threats
6.6.7.3. Wapack labs
6.6.7.3.1. https://cms.wapacklabs.com/
6.6.7.3.2. ThreatRecon
6.6.7.4. CIRCL
6.6.7.4.1. https://www.circl.lu/services/misp-malware-information-sharing-platform/
6.6.8. Malicious URL
6.6.8.1. Cyren
6.6.8.2. Findthatfile
6.6.8.3. Webroot
6.6.9. Predictive
6.6.9.1. Seclytics
6.6.10. Vulnerability Research
6.6.10.1. Telus Security Labs
6.6.10.1.1. http://telussecuritylabs.com/signatures/attack_detection
6.6.10.2. Vupen
6.6.10.2.1. http://www.vupen.com/english/services/tpp-index.php
6.7. Security Related Chips & CPUs
6.7.1. Broadcom
6.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection
6.7.2. Cavium
6.7.2.1. http://www.cavium.com
6.7.3. Lionic
6.7.3.1. http://www.lionic.com/
6.7.4. Netronome
6.7.4.1. http://www.netronome.com
6.7.5. Tilera
6.7.5.1. http://www.tilera.com/products/processors
6.7.6. Intel
6.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH
6.8. Software
6.8.1. Advanced Content Disarming and Reconstruction
6.8.1.1. OPSWAT
6.8.1.1.1. https://www.opswat.com/products/metascan/
6.8.1.2. Votiro
6.8.2. Advanced Threat Protection - Virtual Execution Engines
6.8.2.1. ContentKeeper
6.8.2.2. Threat Track Security
6.8.2.2.1. http://www.threattracksecurity.com/oem.aspx
6.8.3. Analytics/Graphing/Reporting
6.8.3.1. Logi Analytics
6.8.3.1.1. https://www.logianalytics.com/
6.8.3.2. D3Plus
6.8.3.2.1. https://d3plus.org/
6.8.3.3. D3js
6.8.4. Anti-Spam/Phishing
6.8.4.1. APWG
6.8.4.2. BrandProtect
6.8.4.3. Cyren
6.8.4.4. Ikarus
6.8.4.4.1. http://www.ikarussecurity.com/products/oem/solutions-for-oem-partner/
6.8.4.5. Internet Fraud Alert
6.8.4.5.1. http://www.ifraudalert.org/default.aspx
6.8.4.6. ReturnPath
6.8.4.7. WebRoot Brightcloud
6.8.5. AntiMalware
6.8.5.1. Antiy
6.8.5.1.1. http://www.antiy.net/
6.8.5.2. Avira
6.8.5.3. Bitdefender
6.8.5.4. Cyren
6.8.5.5. ESet
6.8.5.6. Fortinet
6.8.5.7. GFI
6.8.5.8. Ikarus
6.8.5.8.1. http://www.ikarussecurity.com/products/oem/solutions-for-oem-partner/
6.8.5.9. Intel Security
6.8.5.10. Kaspersky
6.8.5.11. Norman
6.8.5.12. OPSWAT
6.8.5.13. QuickHeal
6.8.5.14. ThreatTrack
6.8.5.15. Zillya
6.8.5.16. ZonerAntiVirus
6.8.6. Content Extraction & Search
6.8.6.1. Oracle
6.8.6.1.1. Stellent Viewer
6.8.7. Encryption
6.8.7.1. Transport
6.8.7.1.1. Rosberg Systems AS
6.8.7.1.2. SIPBiz
6.8.7.1.3. NCP-E
6.8.8. Endpoint Security and Management
6.8.8.1. OPSWAT
6.8.8.1.1. https://www.opswat.com/products/oesis-framework
6.8.9. File Content Decoding/Analysis/Fingerprinting
6.8.9.1. HP Autonomy
6.8.9.1.1. IDOL
6.8.9.1.2. KeyView
6.8.9.2. Attivio
6.8.9.3. GTB Technologies
6.8.9.3.1. Data Loss Prevention OEM SDK
6.8.10. IT Service Management
6.8.10.1. ITRP
6.8.11. Image Recognition
6.8.11.1. Image Analyzer
6.8.12. Intrusion Detection/Prevention Signatures
6.8.12.1. Proofpoint
6.8.12.1.1. Emerging Threats
6.8.13. Network Stack
6.8.13.1. IPV4/6
6.8.13.1.1. NetX
6.8.13.1.2. Network Data Plane
6.8.13.2. Deep Packet Inspection
6.8.13.2.1. Broadweb
6.8.13.2.2. Ipoque
6.8.13.2.3. Procera Networks
6.8.13.2.4. Qosmos
6.8.13.3. SDN
6.8.13.3.1. 6Wind
6.8.14. Optical Character Recognition
6.8.14.1. Abbyy
6.8.15. Social Network Content Control
6.8.15.1. NetboxBlue
6.8.16. URL Categorization
6.8.16.1. Cyren
6.8.16.1.1. http://www.cyren.com/embedded-url-filtering.html
6.8.16.2. Ikarus
6.8.16.2.1. http://www.ikarussecurity.com/products/oem/solutions-for-oem-partner/
6.8.16.3. Malware
6.8.16.3.1. BrandProtect
6.8.16.4. Webroot Brightcloud
6.8.16.5. Zvelo
6.8.17. Voice Recognition
6.8.17.1. STC
6.8.17.2. Nuance
6.9. Managed Security OEMs
6.9.1. Digital Hands
7. • Broken Cryptography
7.1. Application Security
7.1.1. Runtime Application Self-Protection (RASP)
7.1.1.1. Arxan
7.1.1.2. Checkmarx
7.1.1.3. Contrast Security
7.1.1.4. HP
7.1.1.5. Immunio
7.1.1.6. Metaforic
7.1.1.7. OneASP
7.1.1.8. Prevoty
7.1.1.9. SecuPi
7.1.1.10. Veracode
7.1.1.11. Virsec
7.1.1.12. Waratek
7.1.1.13. whiteCryption
7.1.2. Enterprise App-Layer Protection
7.1.2.1. SecuPI
7.1.3. AI-Based Applicaton Threat Defense
7.1.3.1. Barricade
7.1.3.2. Signal Sciences
7.2. Cloud Security
7.2.1. Cloud Protection Gateways
7.2.1.1. CipherCloud
7.2.1.2. Netskope
7.2.1.3. Perspecsys
7.2.1.4. Skyhigh Networks
7.2.1.5. Vaultive
7.2.2. Cloud Access Security Brokers
7.2.2.1. User Activity Monitoring
7.2.2.1.1. Adallom
7.2.2.1.2. Avanan
7.2.2.1.3. Bitglass
7.2.2.1.4. Elastica
7.2.2.1.5. Harvest.ai
7.2.2.1.6. Imperva
7.2.2.1.7. Netscope
7.2.2.1.8. SkyHigh Networks
7.2.2.2. Data Loss Prevention
7.2.2.2.1. Integrated DLP
7.2.2.2.2. Harvest.ai
7.2.2.3. Encryption
7.2.2.3.1. Adallom
7.2.2.3.2. Avanan
7.2.2.3.3. Managed Methods
7.2.2.3.4. SkyHigh Networks
7.2.2.4. Identity and Access Management
7.2.2.4.1. Centrify
7.2.2.4.2. Cloudiway
7.2.2.4.3. Okta
7.2.2.4.4. Ping
7.2.2.5. Access Control
7.2.2.5.1. Adallom
7.2.2.5.2. Avanan
7.2.2.5.3. Bitglass
7.2.2.5.4. Elastica
7.2.2.5.5. FireLayers
7.2.2.5.6. Managed Methods
7.2.2.5.7. Netskope
7.2.2.5.8. Skyfence
7.2.3. Cloud Application Discovery
7.2.3.1. Ciphercloud
7.2.3.2. Elastica
7.2.3.3. Netskope
7.2.3.4. Skyhigh
7.2.4. Cloud Compliance and Security Risk Platforms
7.2.4.1. AlertLogic
7.2.4.2. Cavirin
7.2.4.3. Cloudcheckr
7.2.4.4. Evident.io
7.2.4.5. Harvest AI
7.3. Cross Domain Solutions
7.3.1. Advenica
7.3.1.1. ZoneGuard
7.3.1.2. SecuriRam
7.3.2. General Dynamics
7.3.2.1. TacGuard
7.3.2.2. Crossing Guard
7.3.2.3. NanoXD
7.3.3. LockHeed Martin
7.3.3.1. Trusted Manager
7.3.4. Tresys
7.3.4.1. XD Air
7.3.4.2. XD Bridge
7.3.4.3. XD Guardian
7.3.5. Owl Computing
7.3.5.1. Owl OPDS-100
7.3.5.2. Owl OPDS-100D
7.3.5.3. OCDS-SFF
7.4. Data Security
7.4.1. Network-Based Data Cleansing
7.4.1.1. DataStealth
7.4.1.1.1. http://www.datexdatastealth.com/
7.4.2. Big Data Security
7.4.2.1. BlueTalon
7.5. Endpoint Security
7.5.1. Endpoint Detection and Response (EDR)
7.5.1.1. Agent-Based
7.5.1.1.1. Carbon Black
7.5.1.1.2. Cisco
7.5.1.1.3. Countertack
7.5.1.1.4. CrowdStrike
7.5.1.1.5. Cyberbit
7.5.1.1.6. Cyberreason
7.5.1.1.7. Cylance
7.5.1.1.8. Deep Instinct
7.5.1.1.9. Digital Guardian
7.5.1.1.10. Dtex Systems
7.5.1.1.11. Endgame Systems
7.5.1.1.12. Fidelis Cybersecurity
7.5.1.1.13. FireEye
7.5.1.1.14. Forescout
7.5.1.1.15. Guidance Software
7.5.1.1.16. Hexis Cyber Solutions
7.5.1.1.17. Invincea
7.5.1.1.18. LogRhythm
7.5.1.1.19. NexThink
7.5.1.1.20. Panda Security
7.5.1.1.21. RSA (EMC)
7.5.1.1.22. SecDo
7.5.1.1.23. SentinelOne
7.5.1.1.24. Tanium
7.5.1.1.25. Triumfant
7.5.1.1.26. Verint
7.5.1.1.27. Ziften
7.5.1.2. Agentless
7.5.1.2.1. BeyondTrust
7.5.1.2.2. Cynet
7.5.1.2.3. Fidelis
7.5.1.2.4. ForeScout
7.5.1.2.5. Hexadite
7.5.1.2.6. Hexis Cyber Solutions
7.5.1.2.7. InfoCyte
7.5.1.2.8. LightCyber
7.5.1.2.9. Outlier Security
7.5.1.2.10. Promisec
7.5.2. Remote Browser-Isolation (remote dom)
7.5.2.1. Amune
7.5.2.1.1. https://amune.org/security
7.5.2.2. Armor5
7.5.2.3. Authentic8
7.5.2.4. Dispel
7.5.2.5. FireGlass
7.5.2.6. Menlo Security
7.5.2.7. Aurionpro
7.5.2.7.1. Formerly Spikes Security
7.6. Identification, Authentication, Access Control & IAM
7.7. Internet of Things
7.7.1. Automotive
7.7.1.1. Security Innovation
7.7.2. Embedded Security
7.7.2.1. Security Innovation
7.8. Network & Infrastructure Security
7.8.1. Content Disarm and Reconstruction (CDR)
7.8.1.1. Check Point Software
7.8.1.1.1. Threat Extraction
7.8.1.2. Glasswall
7.8.1.2.1. http://www.glasswallsolutions.com/
7.8.1.3. Mimecast
7.8.1.3.1. https://www.mimecast.com/
7.8.1.4. OPSWAT
7.8.1.5. ODI
7.8.1.5.1. http://www.odi-x.com/
7.8.1.6. Re-Sec
7.8.1.6.1. http://www.re-sec.com/
7.8.1.7. Sasa-Software
7.8.1.7.1. http://www.sasa-software.com/
7.8.1.8. Solebit Labs
7.8.1.8.1. http://www.solebitlabs.com/
7.8.1.9. Symantec
7.8.1.9.1. DisArm
7.8.1.10. TreSys
7.8.1.10.1. http://www.tresys.com/
7.8.1.11. Votiro
7.8.1.11.1. http://www.votiro.com/
7.8.2. Malware Infection Analysis and Monitoring Services
7.8.2.1. Lastline
7.8.2.1.1. Guardia
7.8.2.2. Cisco
7.8.2.2.1. Formerly OpenDNS
7.8.2.3. Qualys
7.8.2.4. Seculert
7.8.3. Network Behavior and Analytics
7.8.3.1. Industrial Control Systems (ICS)
7.8.3.1.1. CyberX
7.8.4. Standalone Threat Intelligence Defense Solutions (STIDS)
7.8.4.1. Bandura
7.8.4.1.1. PoliWall
7.8.4.2. Centripetal Networks
7.8.4.3. Damballa
7.8.4.4. Fidelis Cybersecurity
7.8.4.5. FireEye
7.8.4.6. Group IB
7.8.4.6.1. http://tds.group-ib.com/
7.8.4.7. Ixia
7.8.4.7.1. http://www.ixiacom.com/info/ta
7.8.4.8. LookingGlass
7.8.4.8.1. https://lgscout.com/products/dns-defender/
7.8.4.9. Redsocks
7.8.4.9.1. Redsocks Threat Defender
7.8.4.10. ReversingLabs
7.8.4.11. Symantec
7.8.4.11.1. APT Network
7.8.5. Unauthorized Endpoint Connection Prevention (UECP)
7.8.5.1. Ensilo
7.8.5.2. Intel Security
7.8.6. Software Defined WAN (SDwan)
7.8.6.1. CloudGenix
7.8.6.2. Pertino
7.8.6.3. Velocloud
7.8.6.4. Viptela
7.8.6.5. Versa Networks
7.8.7. Virtual Container Security
7.8.7.1. Apcera
7.8.7.2. Aqua Security
7.8.7.3. Illumio
7.8.7.4. StackRox
7.8.7.5. TwistLock
7.8.8. Network Security as a Service
7.8.8.1. Cato Networks
7.8.8.2. MyDigitalShield
7.8.8.3. Zscaler
7.9. Security Operations, Incident Response
7.9.1. Intelligence/Data Feeds/Software & Services
7.9.1.1. Security Intelligence and Data Analysis Platforms
7.9.1.1.1. FireEye
7.9.1.2. Threat Intelligence Platforms (TIPs)
7.9.1.2.1. Anomali
7.9.1.2.2. BAE Systems
7.9.1.2.3. Buguroo
7.9.1.2.4. Codenomicon
7.9.1.2.5. Comilion
7.9.1.2.6. Confer
7.9.1.2.7. Eclectic IQ
7.9.1.2.8. Infoblox
7.9.1.2.9. Lockheed Martin
7.9.1.2.10. Lookingglass Cyber Solutions
7.9.1.2.11. Microsoft
7.9.1.2.12. Palentir
7.9.1.2.13. PierceMatrix
7.9.1.2.14. Service Now (Formerly Brightpoint)
7.9.1.2.15. Soltra
7.9.1.2.16. ThreatConnect
7.9.1.2.17. ThreatQuotient
7.9.1.2.18. TruStar
7.9.1.3. Threat Intelligence Services
7.9.1.3.1. Human Intelligence - HUMINT (Strategic)
7.9.1.3.2. Machine-Based (Tactical)
7.9.1.3.3. Vulnerabilities and Exploits
7.9.1.3.4. Data Loss Detection - External
7.9.1.4. Collaborative Threat Investigation Platforms
7.9.1.4.1. BAE System Detica
7.9.1.4.2. IKANow
7.9.1.4.3. Maltego
7.9.1.4.4. NC4
7.9.1.4.5. Palentir
7.9.2. Malware Analysis
7.9.2.1. Malware Analysis as a Service
7.9.2.1.1. Free Services
7.9.2.1.2. ReversingLabs
7.9.2.1.3. ThreatGrid
7.9.2.2. Sandbox Software
7.9.2.2.1. GFI
7.9.2.2.2. Joesecurity
7.9.2.2.3. Bluecoat
7.9.2.2.4. Payload Security
7.9.3. Threat Deception Technologies
7.9.3.1. Distributed Deception Platforms
7.9.3.1.1. Amgine Securus
7.9.3.1.2. Atomic Software Solutions
7.9.3.1.3. Attivo Networks
7.9.3.1.4. Cymmetria
7.9.3.1.5. GuardiCore
7.9.3.1.6. Illusive Networks
7.9.3.1.7. Javelin Networks
7.9.3.1.8. KeyFocus
7.9.3.1.9. SmokeScreen
7.9.3.1.10. Specter
7.9.3.1.11. TrapX
7.9.3.1.12. Vision Space Technologies
7.9.3.2. Network
7.9.3.2.1. ForeScout
7.9.3.2.2. Juniper Networks
7.9.3.2.3. Percipient Networks
7.9.3.2.4. Ridgeback Network Defense
7.9.3.2.5. Shadow Networks
7.9.3.3. Open Source
7.9.3.3.1. Honeypot
7.9.3.4. Web
7.9.3.4.1. Shape Security
7.9.3.4.2. Juniper Networks
7.9.3.4.3. CyberTrap
8. • Malware
8.1. Firewall Workflow,Modeling & Change Management
8.1.1. Checkpoint Software
8.1.2. Firemon
8.1.3. ManageEngine
8.1.4. Redseal Networks
8.1.5. Skybox
8.1.6. Veriflow
8.2. Tufin
8.3. Legal and regulatory information governance
8.4. Privacy
8.5. Regulations, Awareness and Training
8.5.1. Computer Based Training
8.5.1.1. Aujas
8.5.1.2. BeOne Development
8.5.1.3. Digital Defense
8.5.1.4. Fishnet Security
8.5.1.5. Inspired eLearning
8.5.1.6. Junglemap
8.5.1.7. KnowBe4
8.5.1.8. MediaPro
8.5.1.9. PhishMe
8.5.1.10. Phishline
8.5.1.11. Popcorn Training
8.5.1.12. Sans Institute
8.5.1.13. Scipp International
8.5.1.14. Secure Mentem
8.5.1.15. Security Innovation
8.5.1.16. Security Mentor
8.5.1.17. The Security Awareness Company
8.5.1.18. ThreatSim
8.5.1.19. Wombat Security Technologies
8.5.2. Educational, Awareness & News Outlets
8.5.2.1. Government Led
8.5.2.1.1. Information Sharing and Analysis Centers (ISACs)
8.5.2.2. Periodicals & Target Roles
8.5.2.2.1. Channel
8.5.2.2.2. CISO/CSO
8.5.2.2.3. Security Engineers/Analysts
8.5.3. Industry Standards/Groups
8.5.3.1. Standards
8.5.3.1.1. Technical
8.5.3.2. Industry Groups
8.5.3.2.1. Audit
8.5.3.2.2. General Security
8.5.3.2.3. Forensics
8.5.4. Regulations, Public Standards and Contractual Mandates
8.5.4.1. Global
8.5.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)
8.5.4.1.2. NIST
8.5.4.2. Country/Region Specific
8.5.4.2.1. China
8.5.4.2.2. Singapore
8.5.4.2.3. European Union
8.5.4.2.4. United States
8.6. Security Policy and Response Orchaestration Platforms
8.6.1. FireEye
8.6.2. Phantom
8.6.2.1. https://www.phantom.us/
8.6.3. Proofpoint
8.7. Security Program and Governance
8.7.1. Governance, Risk and Compliance
8.7.1.1. eGRC
8.7.1.1.1. Software as a Service
8.7.1.1.2. Software
8.7.1.2. Compliance Oriented Private Cloud Hosting (COPCH)
8.7.1.2.1. Note: This list is not an attestation of compliance
8.7.1.3. Operational Risk Analytics
8.7.1.3.1. Algosec
8.7.1.3.2. Cyber Observer
8.7.1.3.3. Cytegic
8.7.1.3.4. Firemon
8.7.1.3.5. IBM
8.7.1.3.6. Redseal Networks
8.7.1.3.7. RiskIO
8.7.1.3.8. Skybox
8.7.1.3.9. Software Development Lifecycle
8.7.1.3.10. Solarwinds
8.7.1.3.11. Tufin
8.7.1.4. Cloud & Container Compliance Assessment
8.7.1.4.1. Cavirin
9. • Malicious apps
9.1. Cloud Service Brokerages
9.1.1. Bitnami
9.1.2. Ensim
9.1.2.1. http://www.ensim.com/
9.1.3. Gravitant
9.1.4. Jamcracker
9.1.4.1. http://www.jamcracker.com/
9.1.5. StandingCloud
9.2. Distribution/Channel/VARs
9.2.1. VARs, Resellers
9.2.1.1. China
9.2.1.1.1. Mainland China
9.2.1.1.2. Hong Kong
9.2.1.1.3. Taiwan
9.2.1.2. Emerging Asia Pacific
9.2.1.2.1. India
9.2.1.2.2. Indonesia
9.2.1.2.3. Malasia
9.2.1.2.4. Thailand
9.2.1.2.5. Philippines
9.2.1.3. Eurasia
9.2.1.3.1. Russian Federation
9.2.1.3.2. Kazakhstan
9.2.1.3.3. Ukraine
9.2.1.4. Europe
9.2.1.4.1. Eastern Europe
9.2.1.4.2. Western Europe
9.2.1.5. Latin America
9.2.1.5.1. Brazil
9.2.1.5.2. Chile
9.2.1.5.3. Columbia
9.2.1.5.4. Costa Rica
9.2.1.5.5. Ecuador
9.2.1.5.6. Bolivia
9.2.1.5.7. Venezuela
9.2.1.5.8. Cuba
9.2.1.5.9. Argentina
9.2.1.5.10. Buenos Aires
9.2.1.5.11. Mexico
9.2.1.5.12. Peru
9.2.1.6. Mature Asia Pacific
9.2.1.6.1. Australia
9.2.1.6.2. Japan
9.2.1.6.3. Singapore
9.2.1.7. Middle East and North Africa
9.2.1.7.1. Turkey
9.2.1.7.2. Israel
9.2.1.7.3. Saudi Arabia
9.2.1.7.4. South Africa
9.2.1.7.5. India
9.2.1.7.6. United Arab Emirates
9.2.1.8. North America
9.2.1.8.1. United States
9.2.1.8.2. Canada
9.2.1.9. Sub-Sahara Africa
9.2.1.9.1. South Africa
9.2.1.10. WorldWide
9.2.1.10.1. AT&T
9.2.1.10.2. BT
9.2.1.10.3. Optiv
9.2.1.10.4. SHI
9.2.1.10.5. Secureworks
9.2.1.10.6. Verizon Business
9.2.2. Distributors
9.2.2.1. China
9.2.2.1.1. AVNet
9.2.2.1.2. B & Data Technology Co. Ltd.
9.2.2.1.3. Beijing Advazone Electronic Limited Comp
9.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.
9.2.2.1.5. Digital China Technology LTD.
9.2.2.1.6. Ecs China
9.2.2.1.7. Edvance Technology (China) Limited
9.2.2.1.8. Huagai
9.2.2.1.9. M.Tech (Shanghai) Co., Ltd.
9.2.2.1.10. Shanghai S-I Information Tech. Ltd
9.2.2.1.11. Sinogrid Information Technology Ltd.
9.2.2.1.12. Sky Faith International Enterprise
9.2.2.2. Emerging Asia Pacific
9.2.2.2.1. India
9.2.2.2.2. Indonesia
9.2.2.2.3. Thailand
9.2.2.3. Eurasia
9.2.2.3.1. Russian Federation
9.2.2.3.2. Kazakhstan
9.2.2.4. Mature Asia Pacific
9.2.2.4.1. Singapore
9.2.2.4.2. Japan
9.2.2.4.3. South Korea
9.2.2.4.4. Australia
9.2.2.5. Middle East and South Africa
9.2.2.5.1. United Arab Emirates
9.2.2.5.2. South Africa
9.2.2.6. North America
9.2.2.6.1. Canada
9.2.2.6.2. United States
9.2.2.7. Sub-Sahara Africa
9.2.2.7.1. South Africa
9.2.2.8. Western Europe
9.2.2.8.1. United Kingdom
9.2.2.8.2. Germany
9.2.2.9. Worldwide
9.2.2.9.1. AVNet
9.2.2.9.2. Ingram Micro
9.2.2.9.3. LifeBoat Distribution
9.2.2.9.4. Tech Data
9.2.2.9.5. Westcon
9.2.2.10. Latin America
9.2.2.10.1. Mexico
9.2.2.10.2. Brazil
9.2.3. Reseller Programs
9.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm
9.2.4. Logistics/Deal Registration
9.2.4.1. Connectwise
9.3. Government Cyberwarrior (Personnel Estimates)
9.3.1. United States
9.3.1.1. NSA
9.3.1.1.1. Cyberwarrior Stats
9.3.1.2. Department of Defense
9.3.1.2.1. US Airforce
9.3.1.2.2. US Navy
9.3.1.2.3. DISA
9.3.2. Iran
9.3.2.1. 4500
9.3.3. Israel
9.3.3.1. Unit 8200
9.3.3.1.1. 5000
9.3.4. North Korea
9.3.4.1. 1000
9.4. Hardware and Chip Security
9.4.1. AMD
9.4.1.1. TPM
9.4.2. Cavium
9.4.2.1. Multi-Core Processors
9.4.3. Flow Processors
9.4.3.1. Netronome
9.4.4. Intel
9.4.4.1. TPM
9.4.4.2. Data Execution Protection
9.4.5. Systems
9.4.5.1. Janus Technologies
9.4.5.1.1. http://www.janustech.com/janus_secure_computer.html
9.5. Investment
9.5.1. ETFs
9.5.1.1. PureFunds
9.5.1.1.1. SYM:HACK
9.5.2. Venture Capitalists
9.5.2.1. Trident Capital
9.5.2.2. Andreesen Horowitz
9.6. Managed Service Enablement
9.6.1. Chartec
9.6.2. Jamcracker
9.7. Marketing/PR/AR
9.7.1. Analyst & Public Relations
9.7.1.1. Focused Image
9.7.1.1.1. http://www.focusedimage.com/
9.7.1.2. KTCpr
9.7.1.2.1. http://www.kahn-travel.com/
9.7.1.3. Madison Alexander PR
9.7.1.3.1. http://www.madisonalexanderpr.com/
9.7.1.4. Marc Gendron PR
9.7.1.4.1. http://www.mgpr.info/
9.7.1.5. Schwartz Communications
9.7.1.5.1. http://www.schwartzmsl.com/
9.7.1.6. Spalding Communications
9.7.1.7. Text 100
9.7.1.7.1. http://www.text100.com/
9.7.2. Campaign/Engagement
9.7.2.1. WCG World
9.7.2.1.1. http://wcgworld.com/
9.7.3. Creative/Design Services
9.7.3.1. Duarte
9.7.3.1.1. http://www.duarte.com/
9.7.3.2. Gig Productions
9.7.3.2.1. http://www.gigpros.com/index.php
9.7.3.3. Initiate Marketing
9.7.3.3.1. http://www.getinitiated.ca/
9.7.3.4. MN8Studio
9.7.3.4.1. http://www.mn8studio.com/
9.7.3.5. Text 100
9.7.3.5.1. http://www.text100.com/
9.7.4. Web Site Design
9.7.4.1. Baytech Web Design
9.7.4.1.1. http://www.baytechwebdesign.com/
9.7.4.2. EU Design Studios
9.7.4.2.1. http://eudesignstudio.com/
9.7.4.3. Pro Logic Web Services
9.7.4.3.1. http://www.prologicsoft.com/
9.7.5. Market Destinations (Sites)
9.7.5.1. CRN
9.7.5.2. Hak5
9.7.5.3. MSPMentor
9.7.5.4. Madison Logic
9.7.5.5. SCmagazine
9.7.5.6. TheVarGuy
9.7.6. Marketing Videos
9.7.6.1. Epipheo
9.7.6.1.1. http://www.epipheo.com/
9.7.7. Marketing/Branding Agencies
9.7.7.1. Focused Image
9.7.7.1.1. http://www.focusedimage.com/branding/
9.7.7.2. Hill and Knowlton
9.7.7.2.1. http://www.hkstrategies.com/
9.7.7.3. MetaDesign
9.7.7.3.1. http://www.metadesign.com/san-francisco
9.7.7.4. Ogilvy & Mather
9.7.7.5. Tailfin Marketing Communications
9.7.7.6. Toolbox Studios
9.8. Product Testing
9.8.1. Generic Product Testing, Certification and Accreditation
9.8.1.1. Certifications
9.8.1.1.1. North America
9.8.1.1.2. European Union
9.8.1.2. Testing
9.8.1.2.1. United Kingdom
9.8.1.2.2. North America
9.8.1.2.3. Singapore
9.8.1.3. Accreditation
9.8.1.3.1. DOD
9.8.1.3.2. NSA
9.8.2. Anti-Malware Testing
9.8.2.1. AMTSO
9.8.2.2. AV-Test
9.8.2.3. Av-Comparatives
9.8.2.4. MRG Effitas
9.8.2.5. VirusBTN
9.8.3. Sponsored Product Review/Testing
9.8.3.1. Delta Testing LTD
9.8.3.2. Dennis Labs
9.8.3.3. Miercom
9.8.3.4. NSS Labs
9.8.3.5. Network Testing Labs
9.8.3.6. Tolly Group
9.8.3.7. West Coast Labs
9.8.4. Antimalware Standards Bodies
9.8.4.1. AMTSO
9.8.4.1.1. http://www.amtso.org/
9.9. Cloud Service Brokerages
9.10. Security Conferences
9.10.1. North America
9.10.1.1. United States
9.10.1.1.1. RSA
9.10.1.1.2. Gartner
9.10.1.1.3. Cornerstones of Trust
9.10.1.1.4. Annual Security Conference
9.10.1.1.5. SecurityBsides
9.10.1.1.6. ShmooCon
9.10.2. Europe
9.10.2.1. United Kingdom
9.10.2.1.1. RSA Conference
9.10.2.1.2. Gartner
9.10.2.2. Russia
9.10.2.2.1. Infosecurity Russia
9.10.3. Emerging Asia Pacific
9.10.4. Mature Asia Pacific
9.10.4.1. Australia
9.10.4.1.1. Gartner
9.10.4.2. Singapore
9.10.4.2.1. RSA
9.11. Staffing/Recruiting/Executive Search
9.11.1. Millard Group
9.11.2. Lynch Bowie Group
9.11.3. Robert Half
9.12. User Interface Design
9.12.1. Consulting
9.12.1.1. User Interface
9.12.1.1.1. BlinkUX
9.12.1.1.2. Sasa Technologies
9.12.1.1.3. Dabapps
9.12.1.2. Customer Survey
9.12.1.2.1. Techvalidate
9.12.2. HTML5 Visualization Libraries
9.12.2.1. Data-Driven Documents
9.12.2.1.1. http://d3js.org/
9.12.2.2. AngularJS
9.12.2.2.1. https://angularjs.org/
9.12.3. Icons
9.12.3.1. IconExperience
9.12.3.1.1. https://www.iconexperience.com/
9.12.3.2. FlatIcon
9.12.3.2.1. http://www.flaticon.com/packs/general-ui
9.12.3.3. ModernUIicons
9.12.3.3.1. http://modernuiicons.com/
9.12.3.4. Ui8
9.12.3.4.1. https://ui8.net/categories/icons
10. • Spyware
10.1. Direct Tech Providers Managed Security
10.1.1. Asia Pacific
10.1.1.1. Australia
10.1.1.2. China
10.1.1.2.1. NSFOCUS
10.1.1.3. Singapore
10.1.2. Europe
10.1.2.1. GoGrid
10.1.2.1.1. Compliance Reporting (PCI, HIPAA)
10.1.2.1.2. Host IDS
10.1.2.1.3. Log Management
10.1.2.1.4. SIEM
10.1.2.1.5. Vulnerability Assessment
10.1.3. Global Providers
10.1.4. Middle East and North Africa
10.1.4.1. Saudi Arabia
10.1.4.2. United Arab Emirates
10.1.5. North America
10.1.5.1. United States
10.1.5.1.1. NSFOCUS
10.1.5.1.2. Check Point Software
10.1.5.1.3. Network Box
10.1.5.1.4. GoGrid
10.1.5.1.5. FireEye
10.1.5.1.6. Rapid7
10.2. Indirect Providers
10.2.1. Emerging Asia Pacific
10.2.1.1. India
10.2.1.1.1. CSS Corp PVT
10.2.1.1.2. Happiest Minds
10.2.1.1.3. SunGard Availability Services
10.2.1.1.4. Ecomnets India PVT. LTD
10.2.2. Europe
10.2.2.1. BT Global Services
10.2.2.2. Dell SecureWorks
10.2.2.3. Germany
10.2.2.3.1. Link11 GMBH
10.2.2.3.2. IPsoft
10.2.2.4. HP
10.2.2.5. Happiest Minds
10.2.2.5.1. Advanced Malware Protection
10.2.2.5.2. Application Activity Monitoring
10.2.2.5.3. Compliance Reporting
10.2.2.5.4. Database Activity Monitoring
10.2.2.5.5. File Integrity Monitoring
10.2.2.5.6. Log Management
10.2.2.5.7. Managed DLP
10.2.2.5.8. Network Forensics
10.2.2.5.9. SIEM
10.2.2.5.10. Unified Threat Management
10.2.2.5.11. Vulnerability Assessment
10.2.2.6. Integralis
10.2.2.7. Navisite
10.2.2.7.1. Mobile Device Management
10.2.2.8. Open Systems
10.2.2.9. Open Systems
10.2.2.10. Orange Business Services
10.2.2.11. SecureData
10.2.2.11.1. Firewall
10.2.2.11.2. IDS/IPS
10.2.2.11.3. SIEM
10.2.2.11.4. Data Loss Prevention
10.2.2.11.5. Secure Web Gateway
10.2.2.11.6. Secure Email Gateway
10.2.2.11.7. VPN/Remote Access
10.2.2.12. SunGard Availability Services
10.2.2.12.1. Firewalls
10.2.2.12.2. IAM
10.2.2.12.3. Intrusion Prevention
10.2.2.12.4. SIEM
10.2.2.12.5. Unified Threat Management
10.2.2.12.6. VPN
10.2.2.12.7. Web Application Firewall
10.2.2.13. Symantec
10.2.2.14. T-Systems
10.2.2.15. Tata Communications
10.2.2.16. Telefonica
10.2.2.16.1. DDoS Protection Service
10.2.2.16.2. Email Encryption
10.2.2.16.3. Email Security Gateway
10.2.2.16.4. Firewall Management
10.2.2.16.5. IAM
10.2.2.16.6. Intrusion Detection
10.2.2.16.7. Intrusion Prevention
10.2.2.16.8. Log Management
10.2.2.16.9. SIEM
10.2.2.16.10. Vulnerability Assessment
10.2.2.16.11. Web Security Gateway
10.2.2.16.12. Anti-Fraud
10.2.2.17. Verizon Business
10.2.2.17.1. Anti-DDoS
10.2.2.17.2. Email Security
10.2.2.17.3. Endpoint Protection
10.2.2.17.4. Firewall Management
10.2.2.17.5. Intrusion Detection
10.2.2.17.6. Intrusion Prevention
10.2.2.17.7. SIEM
10.2.2.17.8. Vulnerability Assessment
10.2.2.17.9. Web Security
10.2.2.18. Wipro
10.2.2.18.1. Email Security Gateway
10.2.2.18.2. Endpoint Security
10.2.2.18.3. Firewall Management
10.2.2.18.4. Fraud Management/Anti-Money Laundering
10.2.2.18.5. GRC
10.2.2.18.6. IAM
10.2.2.18.7. Intrusion Detection
10.2.2.18.8. Intrusion Prevention
10.2.2.18.9. SIEM
10.2.2.18.10. User Access Management
10.2.2.18.11. Web Security Gateway
10.2.3. Global Providers
10.2.3.1. AT&T
10.2.3.1.1. DDos Protection
10.2.3.1.2. Email/Data Encryption Services
10.2.3.1.3. Endpoint Anti-Virus
10.2.3.1.4. Endpoint Patch Management
10.2.3.1.5. Endpoint Policy Compliance
10.2.3.1.6. Mobile Device Security
10.2.3.1.7. Secure Email Gateway
10.2.3.1.8. Security Device Management
10.2.3.1.9. Web Application Firewall
10.2.3.1.10. Web Gateway (URL & Malware Filtering)
10.2.3.2. BEW Global
10.2.3.2.1. Data Loss Prevention
10.2.3.2.2. Web Security Gateway
10.2.3.2.3. Email Security Gateway
10.2.3.2.4. SIEM
10.2.3.2.5. Vulnerability Assessment
10.2.3.3. BT
10.2.3.4. Dell Secureworks
10.2.3.4.1. Advanced Malware Protection
10.2.3.4.2. Email Security Gateway
10.2.3.4.3. Firewall Management
10.2.3.4.4. Host IPS
10.2.3.4.5. IDS/IPS
10.2.3.4.6. Log Management
10.2.3.4.7. Log Retention
10.2.3.4.8. SIEM
10.2.3.4.9. Threat Intelligence
10.2.3.4.10. Unified Threat Management
10.2.3.4.11. Vulnerability Assessment
10.2.3.4.12. Web Application Firewall
10.2.3.4.13. Web Application Vulnerability Assessment
10.2.3.5. Dimension Data
10.2.3.6. HP
10.2.3.6.1. Access Managment
10.2.3.6.2. Data Loss Prevention
10.2.3.6.3. Email Security Gateway
10.2.3.6.4. Endpoint Encryption
10.2.3.6.5. Endpoint Protection
10.2.3.6.6. Intrusion Detection
10.2.3.6.7. Intrusion Prevention
10.2.3.6.8. Managed Incident Response
10.2.3.6.9. Remote Access Management
10.2.3.6.10. SIEM
10.2.3.6.11. Vulnerability Assessment
10.2.3.6.12. Web Application Vulnerability Assessment
10.2.3.6.13. Web Security Gateway
10.2.3.7. IBM
10.2.3.7.1. Email Security Gateway
10.2.3.7.2. Endpoint Patch Management
10.2.3.7.3. Endpoint Policy Management
10.2.3.7.4. Endpoint Protection
10.2.3.7.5. Firewall Management
10.2.3.7.6. IAM
10.2.3.7.7. Intrusion Detection
10.2.3.7.8. Intrusion Prevention
10.2.3.7.9. Log Management
10.2.3.7.10. Mobile Device Security
10.2.3.7.11. SIEM
10.2.3.7.12. Unified Threat Management
10.2.3.7.13. Vulnerability Assessment
10.2.3.7.14. Web Security Gateway
10.2.3.7.15. Web Vulnerability Assessment
10.2.3.8. Proficio
10.2.3.8.1. Email Security
10.2.3.8.2. Firewall Management
10.2.3.8.3. Incident Response
10.2.3.8.4. Log Management
10.2.3.8.5. Privileged Account Management
10.2.3.8.6. Regulatory and Polcy Compliance
10.2.3.8.7. SIEM
10.2.3.8.8. SOC Services
10.2.3.8.9. Vulnerability Assessment
10.2.3.8.10. Web Security
10.2.3.9. Tech Mahindra
10.2.3.9.1. Email Security
10.2.3.9.2. Endpoint Protection
10.2.3.9.3. Firewall Management
10.2.3.9.4. Identity and Access Management
10.2.3.9.5. Intrusion Detection
10.2.3.9.6. Intrusion Prevention
10.2.3.9.7. Log Management
10.2.3.9.8. SIEM
10.2.3.9.9. SOC Services
10.2.3.9.10. Vulnerability Assessment
10.2.3.9.11. Web Security
10.2.3.10. Telstra
10.2.3.11. Verizon Business
10.2.3.11.1. Anti-DDoS
10.2.3.11.2. Email Security
10.2.3.11.3. Endpoint Protection
10.2.3.11.4. Firewall Management
10.2.3.11.5. Intrusion Detection
10.2.3.11.6. Intrusion Prevention
10.2.3.11.7. SIEM
10.2.3.11.8. Vulnerability Assessment
10.2.3.11.9. Web Security
10.2.4. Greater China
10.2.4.1. Hong Kong
10.2.4.1.1. Network Box
10.2.4.1.2. Netswitch
10.2.4.2. BEW Global
10.2.4.2.1. Data Loss Prevention
10.2.4.2.2. Web Security Gateway
10.2.4.2.3. Email Security Gateway
10.2.4.2.4. SIEM
10.2.4.2.5. Vulnerability Assessment
10.2.4.3. Beijing
10.2.4.3.1. Netswitch
10.2.4.4. Shanghai
10.2.4.4.1. Shanghai Data Solution Co., Ltd
10.2.5. Latin America
10.2.5.1. Brazil
10.2.5.1.1. Arcon
10.2.5.1.2. Netcentrics
10.2.5.1.3. RealProtect
10.2.5.1.4. UOL Diveo
10.2.6. Mature Asia Pacific
10.2.6.1. Australia
10.2.6.1.1. Tesserent
10.2.6.1.2. Verizon
10.2.6.2. Singapore
10.2.6.2.1. Quann
10.2.6.2.2. NTT Singapore
10.2.6.2.3. Happiest Minds
10.2.6.2.4. Singtel
10.2.6.2.5. NCS Group
10.2.7. Middle East and North Africa
10.2.7.1. Saudi Arabia
10.2.7.2. United Arab Emirates
10.2.7.2.1. Du Telecom
10.2.7.2.2. Tata Communications
10.2.7.2.3. Dell Secureworks
10.2.7.2.4. Dimension Data
10.2.8. North America
10.2.8.1. Canada
10.2.8.1.1. Above Security
10.2.8.1.2. Bell Canada
10.2.8.1.3. EWA
10.2.8.1.4. Happiest Minds
10.2.8.1.5. Netpulse
10.2.8.1.6. OneStone (Formerly Seccuris)
10.2.8.1.7. SecureData
10.2.8.1.8. SentryMetrics
10.2.8.1.9. SunGard Availability Services
10.2.8.1.10. Virtual Guardian
10.2.8.2. United States
10.2.8.2.1. AT&T
10.2.8.2.2. Above Security
10.2.8.2.3. Alert Logic
10.2.8.2.4. Allstream
10.2.8.2.5. CGI
10.2.8.2.6. CSC
10.2.8.2.7. CSS Corp
10.2.8.2.8. CentraComm
10.2.8.2.9. CenturyLink- Savvis
10.2.8.2.10. Clone Systems
10.2.8.2.11. Compucom Systems
10.2.8.2.12. Cosentry
10.2.8.2.13. Dell Secureworks
10.2.8.2.14. Earthlink
10.2.8.2.15. Esentire
10.2.8.2.16. HCL Technologies
10.2.8.2.17. HP
10.2.8.2.18. Happiest Minds
10.2.8.2.19. IBM
10.2.8.2.20. Intelisecure
10.2.8.2.21. Leidos
10.2.8.2.22. LunarLine
10.2.8.2.23. Masergy Communications
10.2.8.2.24. Megapath
10.2.8.2.25. Morphick
10.2.8.2.26. My Digital Shield
10.2.8.2.27. NCA - Network Computing Architects
10.2.8.2.28. Navisite
10.2.8.2.29. Netfortris
10.2.8.2.30. Netswitch
10.2.8.2.31. Nuspire Networks
10.2.8.2.32. Rook Security
10.2.8.2.33. Secure Designs
10.2.8.2.34. SilverSky (Formerly Stillsecure/Perimeter esecurity)
10.2.8.2.35. Solutionary
10.2.8.2.36. SunGard Availability Services
10.2.8.2.37. Sword and Shield
10.2.8.2.38. Symantec
10.2.8.2.39. Symantec
10.2.8.2.40. Syntegrity Networks
10.2.8.2.41. Tesserent
10.2.8.2.42. Trustwave
10.2.8.2.43. Verizon Business
10.2.8.2.44. Wipro
10.2.9. Sub-Sahara Africa
10.2.9.1. AccessKenya
10.2.9.1.1. Firewall
10.2.9.1.2. Endpoint Protection
10.2.9.1.3. Secure Web Gateway
11. • Privacy Threats
11.1. Digital Forensics/eDiscovery
11.1.1. Content, File and Endpoint Forensics
11.1.1.1. eDiscovery
11.1.1.1.1. Clearwell
11.1.1.1.2. Kazeon
11.1.1.1.3. Guidance Software
11.1.1.1.4. Access Data
11.1.1.1.5. Autonomy
11.1.1.1.6. kCura
11.1.1.1.7. FTI Technology
11.1.1.1.8. Barracuda Networks
11.1.1.2. Mobile Devices
11.1.1.2.1. BlackBagTech
11.1.1.2.2. Cellebrite
11.1.1.2.3. Compelson Labs
11.1.1.2.4. Guidance Software
11.1.1.2.5. MSAB
11.1.1.2.6. NowSecure
11.1.1.2.7. Oxygen Forensics
11.1.1.2.8. Paraben Corporation
11.1.1.3. Endpoint Computing Systems
11.1.1.3.1. ADF Solutions
11.1.1.3.2. Access Data
11.1.1.3.3. ArxSys
11.1.1.3.4. BlackBag Technologies
11.1.1.3.5. CRU Inc
11.1.1.3.6. Cyfir
11.1.1.3.7. Guidance Software
11.1.1.3.8. Magnet Forensics
11.1.1.3.9. Nuix
11.1.1.3.10. OSForensics
11.1.1.3.11. Paraben Corporation
11.1.1.3.12. WindowsScope
11.1.1.3.13. X-Ways Forensics
11.1.1.4. Email Examination
11.1.1.4.1. Systools Software
11.1.1.4.2. Nuix
11.1.1.5. Forensic File & Data Analysis Tools
11.1.1.5.1. Cellebrite
11.1.1.5.2. Cyfir
11.1.1.5.3. Intella
11.1.1.5.4. Magnet Forensics
11.1.1.5.5. Nuix
11.1.1.5.6. Systools Software
11.1.1.6. Digital Forensics Case Management
11.1.1.6.1. D3 Security
11.1.1.6.2. Digital Investigation Manager
11.1.1.6.3. Guidance Software
11.1.1.6.4. Intaforensiscs
11.1.1.6.5. Sentinel Data
11.1.1.6.6. Sirentech
11.1.1.6.7. Wynyard Group
11.1.1.7. Memory Forensics
11.1.1.7.1. FireEye
11.1.1.7.2. Guidance Software
11.1.1.7.3. Volatility Framework
11.1.1.7.4. WindowsScope
11.1.2. eDiscovery Services
11.1.2.1. Robert Half
11.1.2.2. Advanced Discovery
11.1.3. eDiscovery Software
11.1.3.1. AccessData
11.1.3.2. Guidance Software
11.1.3.3. Nuix
11.1.3.4. Symantec
11.2. Fraud Prevention/Web Malware Monitoring
11.2.1. Fraud/Bot/Webscrape Prevention
11.2.1.1. Software
11.2.1.1.1. IBM (Formerly Trusteer)
11.2.1.1.2. Intellinx
11.2.1.1.3. RSA (EMC)
11.2.1.1.4. ShieldSquare
11.2.1.2. Appliances
11.2.1.2.1. Distil Networks
11.2.1.2.2. Imperva
11.2.1.2.3. RSA
11.2.1.2.4. Shape Security
11.2.1.2.5. White Ops
11.2.1.3. Software as a Service
11.2.1.3.1. Akamai
11.2.1.3.2. BioCatch
11.2.1.3.3. BotScout
11.2.1.3.4. Distil Networks
11.2.1.3.5. Guardian Analytics
11.2.1.3.6. Kount
11.2.1.3.7. MarkMonitor
11.2.1.3.8. NuData Security
11.2.1.3.9. Shape Security
11.2.1.3.10. ShieldSquare
11.2.1.3.11. ThreatMetrix
11.2.1.3.12. White Ops
11.2.1.3.13. X-Cart
11.2.1.3.14. iovation
11.2.1.4. Virtual Appliances
11.2.1.4.1. Distil Networks
11.2.1.4.2. Imperva
11.2.2. Website & Ad Malware Monitoring
11.2.2.1. Ad-Juster
11.2.2.2. Globalsign
11.2.2.2.1. Leverages Hackalert
11.2.2.3. Hackalert
11.2.2.4. Intel Security
11.2.2.4.1. Siteadvisor
11.2.2.5. QualysGuard
11.2.2.6. RiskIQ
11.2.2.7. Sucuri
11.2.2.8. The Media Trust
11.3. Incident Response Legal Services
11.3.1. Information Law Group
11.4. Security Information and Event Management (SIEM), Log Management & Analytics
11.4.1. Application Security Intelligence Engine
11.4.1.1. SAP
11.4.1.1.1. iT-Cube Systems
11.4.2. Log Management
11.4.2.1. EventTracker
11.4.2.2. IGLOO Security
11.4.2.3. Intel Security
11.4.2.3.1. McAfee Enterprise Log Manager
11.4.2.4. Kiwi Syslog Server
11.4.2.5. LogEntries
11.4.2.6. LogRythm
11.4.2.7. Logscape
11.4.2.8. Open Source
11.4.2.8.1. Elasticsearch (ELK Stack)
11.4.2.8.2. SEC (Simple Event Correlator)
11.4.2.8.3. OSSIM
11.4.2.8.4. Syslog-NG
11.4.2.8.5. Octopussy
11.4.2.9. Sawmill
11.4.2.10. Splunk
11.4.2.11. Sumo Logic
11.4.2.12. Tripwire
11.4.2.13. XpoLog
11.4.3. SIEM
11.4.3.1. AlienVault
11.4.3.1.1. OSSIM
11.4.3.2. CorreLog
11.4.3.3. EventTracker
11.4.3.4. Fortinet
11.4.3.5. HP
11.4.3.5.1. Arcsight
11.4.3.6. Hexis Cyber Solutions
11.4.3.6.1. Hawkeye AP
11.4.3.7. IBM
11.4.3.7.1. Q1Radar
11.4.3.8. IGLOO Security
11.4.3.9. Intel Security
11.4.3.9.1. NitroSecurity
11.4.3.10. LogPoint
11.4.3.10.1. http://www.logpoint.com/en/
11.4.3.11. LogRythm
11.4.3.12. Novell
11.4.3.12.1. Sentinel
11.4.3.13. RSA
11.4.3.13.1. Envision
11.4.3.14. Sensage
11.4.3.15. Solarwinds
11.4.3.16. Splunk
11.4.3.17. Sqrrl
11.4.3.18. Tibco
11.4.3.18.1. Loglogic
11.4.3.19. eIQnetworks
11.4.4. Security Analytics
11.4.4.1. Anomaly Analytics
11.4.4.1.1. Intel
11.4.4.1.2. Theta Ray
11.4.4.1.3. Prelert
11.4.4.1.4. eMite
11.4.4.2. User and Entity Behavior Analytics (UEBA)
11.4.4.2.1. Bay Dynamics
11.4.4.2.2. Darktrace
11.4.4.2.3. Detex Systems
11.4.4.2.4. Exabeam
11.4.4.2.5. Fortscale
11.4.4.2.6. Gurcul
11.4.4.2.7. HP
11.4.4.2.8. IBM
11.4.4.2.9. Interset
11.4.4.2.10. Microsoft
11.4.4.2.11. Niara
11.4.4.2.12. ObserveIT
11.4.4.2.13. Palerra
11.4.4.2.14. Platfora
11.4.4.2.15. Reveelium
11.4.4.2.16. Secureonix
11.4.4.2.17. Veriato
11.4.5. User and Entity Behavior Analytics (UEBA)
11.4.5.1. Bae Systems Applied Intelligence
11.4.5.2. Bay Dynamics
11.4.5.3. Caspida
11.4.5.4. Click Security
11.4.5.5. Exabeam
11.4.5.6. FICO
11.4.5.7. Fortscale
11.4.5.8. GuruCul
11.4.5.9. IBM
11.4.5.10. Intellinx
11.4.5.11. Lockheed Martin
11.4.5.12. Logtrust
11.4.5.13. Mobile System 7
11.4.5.14. Novetta Solutions
11.4.5.15. Oracle
11.4.5.16. Rapid7
11.4.5.17. Raytheon
11.4.5.18. SAS Institute
11.4.5.19. Secureonix
11.4.5.20. Splunk
11.5. Security Operations, Analytics and Reporting (SOAR)
11.5.1. Security Incident Response Platforms (SIRP)
11.5.1.1. Agiliance
11.5.1.2. DFLabs
11.5.1.3. Demisto
11.5.1.4. EMC(RSA)
11.5.1.5. Empow
11.5.1.6. Fido
11.5.1.7. Hexadite
11.5.1.8. ID Experts
11.5.1.9. Proofpoint
11.5.1.10. Resilient Systems
11.5.1.11. Siemplify
11.5.1.12. Syncurity
11.5.2. Threat and Vulnerability Management (TVM)
11.5.2.1. Acuity Risk Management
11.5.2.2. Agiliance
11.5.2.3. BeyondTrust
11.5.2.4. Core Security
11.5.2.5. Cybersponse
11.5.2.6. DFLabs
11.5.2.7. EMC(RSA)
11.5.2.8. Kenna Security
11.5.2.9. NopSec
11.5.2.10. RedSeal
11.5.2.11. RiskSense
11.5.2.12. Skybox Security
11.5.2.13. Swimlane
11.5.2.14. Siemplify
11.5.3. Security Operations Analytics
11.5.3.1. Ayehu
11.5.3.2. Cybersponse
11.5.3.3. DFLabs
11.5.3.4. EMC(RSA)
11.5.3.5. Hexadite
11.5.3.6. Proofpoint
11.5.3.7. Resilient Systems
11.5.3.8. Siemplify
11.5.3.9. Swimlane
11.5.4. Security Operations Automation Platforms (SOAPS)
11.5.4.1. Ayehu
11.5.4.2. Cyberbit
11.5.4.3. Cybersponse
11.5.4.4. DFLabs
11.5.4.5. Demisto
11.5.4.6. Fireye
11.5.4.7. Hexadite
11.5.4.8. IBM
11.5.4.9. Phantom Cyber
11.5.4.10. Swimlane
11.5.4.11. Syncurity
11.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)
11.6.1. Crowdsourced Application Security Testing Platforms
11.6.1.1. Hyver
11.6.1.2. Applause
11.6.1.3. Bugcrowd
11.6.1.4. BugFinders
11.6.1.5. Cobalt
11.6.1.6. Crowdtesters
11.6.1.7. HackerOne
11.6.2. Managed Penetration Testing Services
11.6.2.1. Cenzic
11.6.2.2. WhiteHatSecurity
11.6.3. Penetration Testing Software
11.6.3.1. Core Security
11.6.3.2. Rapid7
11.6.3.2.1. Metasploit Pro
11.6.3.2.2. Metasploit Express
11.6.3.3. Trustwave
11.6.4. Vulnerability Assessment
11.6.4.1. Software as a Service
11.6.4.1.1. Vulnerability Management
11.6.4.1.2. Phish Testing/Management
11.6.4.2. Network-Based Vulnerability Assessment (On Premise)
11.6.4.2.1. Core Security
11.6.4.2.2. Digital Defense
11.6.4.2.3. Fortinet
11.6.4.2.4. Intel Security
11.6.4.2.5. NSAuditor
11.6.4.2.6. Ncircle
11.6.4.2.7. Netasq
11.6.4.2.8. Outpost24
11.6.4.2.9. Qualys
11.6.4.2.10. RandomStorm
11.6.4.2.11. Rapid 7
11.6.4.2.12. Trustwave
11.6.4.3. Agent-Based Vulnerability Assessment
11.6.4.3.1. BeyondTrust
11.6.4.3.2. Qualys
11.6.4.3.3. Secunia
11.6.4.3.4. Tenable
11.6.4.4. Mainframe Vulnerability Assessment
11.6.4.4.1. Key Resources Inc. (KRI)
11.6.5. Vulnerability Correlation
11.6.5.1. Application Vulnerability Correlation
11.6.5.1.1. Code DX
11.6.5.1.2. Denim Group
11.6.5.1.3. Kenna Security
11.6.5.1.4. NopSec
11.6.5.2. Network Vulnerability Correlation
11.6.5.2.1. Secure Decisions
11.6.5.2.2. RiskSense
11.6.5.2.3. NopSec
11.6.5.2.4. Kenna Security
11.6.5.2.5. Cybric
11.6.6. Vulnerability Research
11.6.6.1. CSC
11.6.6.2. HP
11.6.6.2.1. DV Labs
11.6.6.3. HotWAN
11.6.6.4. Intel Security
11.6.6.5. SecNiche Labs
11.6.6.6. Sourcefire VRT
11.6.6.7. Symantec
11.6.6.8. VRLSec
11.6.6.9. Vupen