Mobile app based threats

mobile app threat mind map

Get Started. It's Free
or sign up with your email address
Mobile app based threats by Mind Map: Mobile app based threats

1. • Broken Cryptography

1.1. Cloud/Virtualized Firewalls

1.1.1. Agent-Based

1.1.1.1. CloudPassage

1.1.1.2. Drawbridge Networks

1.1.1.3. Illumio

1.1.2. Cisco

1.1.3. Citrix Xen

1.1.3.1. Hillstone Networks

1.1.3.2. Huawei

1.1.3.3. Fortinet

1.1.3.4. Palo Alto Networks

1.1.4. Container-Based

1.1.4.1. ShieldX

1.1.5. Hyper-V

1.1.5.1. Fortinet

1.1.6. KVM

1.1.6.1. Hillstone Networks

1.1.6.2. Juniper Networks

1.1.6.3. Palo Alto Networks

1.1.7. Openstack

1.1.7.1. OpenFlow

1.1.7.1.1. Fortinet

1.1.7.2. Juniper Networks

1.1.8. Public Cloud

1.1.8.1. Virtual Appliances

1.1.8.1.1. Barracuda

1.1.8.1.2. Brocade

1.1.8.1.3. Catbird Networks

1.1.8.1.4. Check Point Software

1.1.8.1.5. Juniper Networks

1.1.8.1.6. Palo Alto Networks

1.1.8.1.7. PfSense

1.1.8.1.8. Sophos

1.1.8.1.9. vArmour

1.1.8.2. API-Driven

1.1.8.2.1. Dome9

1.1.8.2.2. Illumio

1.1.8.3. AWS

1.1.8.3.1. Check Point Software

1.1.8.3.2. Fortinet

1.1.8.3.3. Palo Alto Networks

1.1.8.4. Microsoft Azure

1.1.8.4.1. Check Point Software

1.1.8.4.2. Fortinet

1.1.8.5. Container-Based

1.1.9. VMware Environments

1.1.9.1. API Integration

1.1.9.1.1. Check Point Software

1.1.9.1.2. Fortinet

1.1.9.1.3. Palo Alto Networks

1.1.9.2. NSX

1.1.9.2.1. Fortinet

1.1.9.2.2. Check Point Software

1.1.9.3. VM Appliance

1.1.9.3.1. Barracuda

1.1.9.3.2. Brocade

1.1.9.3.3. Catbird Networks

1.1.9.3.4. Check Point Software

1.1.9.3.5. Fortinet

1.1.9.3.6. Hillstone Networks

1.1.9.3.7. Juniper Networks

1.1.9.3.8. Palo Alto Networks

1.1.9.3.9. PfSense

1.1.9.3.10. Sophos

1.1.9.3.11. vArmour

1.1.9.3.12. Huawei

2. • Phishing attacks

2.1. Virtualized Appliances

2.1.1. A10 Networks

2.1.2. AlertLogic

2.1.3. Amazon AWS

2.1.3.1. Riverbed

2.1.4. Barracuda Networks

2.1.5. BeeWare

2.1.6. DenyAll

2.1.7. Ergon Informatik AG

2.1.8. F5

2.1.9. Fortinet

2.1.10. Forum Systems

2.1.11. Imperva

2.1.12. PentaSecurity

2.1.13. Trustwave

2.1.14. Citrix

2.1.14.1. Netscaler VPX

2.1.14.1.1. https://www.citrix.com/products/netscaler-application-delivery-controller/platforms.html

2.2. Physical Appliances

2.2.1. A10 Networks

2.2.2. AdNovum

2.2.3. AlertLogic

2.2.4. Anchiva

2.2.5. Barracuda Networks

2.2.6. BeeWare

2.2.7. BugSec

2.2.8. Citrix

2.2.9. DBAPPSecurity

2.2.10. DPtech

2.2.11. Dell Sonicwall

2.2.12. DenyAll

2.2.13. Ergon Informatik

2.2.13.1. https://www.airlock.com/en/products/airlock-waf/

2.2.14. F5

2.2.15. Fortinet

2.2.16. Forum Systems

2.2.17. HP

2.2.18. Imperva

2.2.19. NSFocus

2.2.20. PentaSecurity

2.2.21. Positive Technologies

2.2.21.1. http://www.ptsecurity.com/products/af/

2.2.22. RadWare

2.2.23. Trustwave

2.2.24. WINS TECHNET LTD

2.2.24.1. http://www.wins21.co.kr/

2.3. Software

2.3.1. Dedicated Software

2.3.1.1. AdNovum

2.3.1.2. Applicure

2.3.1.2.1. http://www.applicure.com/Products/dotdefender

2.3.1.3. DenyAll

2.3.1.4. ERGON Informatik AG

2.3.1.4.1. AIRLOCK

2.3.1.5. Forum Systems

2.3.1.6. Positive Security

2.3.1.7. Riverbed

2.3.1.8. Trustifier

2.3.1.8.1. https://www.trustifier.com/f/#!overview

2.3.1.9. WebScurity

2.3.2. Open Source

2.3.2.1. IronBee

2.3.2.2. Mod Security

2.3.3. Web Server Modules

2.3.3.1. Microsoft IIS

2.3.3.1.1. AQTRONIX

2.3.3.1.2. Applicure

2.3.3.1.3. BeyondTrust

2.3.3.1.4. ThreatSentry

2.3.3.2. Apache

2.3.3.2.1. Applicure

2.4. Managed Services

2.4.1. Dell Secureworks

2.4.2. AT&T

2.4.3. Verizon Business

2.5. Software as a Service

2.5.1. Akamai

2.5.1.1. Kona

2.5.2. AlertLogic

2.5.3. Anquanbao

2.5.4. ArmorLogic

2.5.5. BinarySec

2.5.6. CloudFlare

2.5.7. DenyAll

2.5.7.1. http://www.denyall.com/products/web-application-firewall/

2.5.8. FireBlade

2.5.9. Imperva (Incapsula)

2.5.9.1. http://www.incapsula.com

2.5.10. Incapsula

2.5.11. PowerCDN

2.5.12. Qualys

2.5.13. Securi

2.5.14. Signal Sciences

2.5.15. Soha

2.5.15.1. http://soha.io/

2.5.16. ZenEdge

3. • Inactive apps

3.1. Active Directory Defense

3.1.1. Aorato

3.1.1.1. http://www.aorato.com/

3.2. Cloud-Based Remote Access VPN

3.2.1. Check Point

3.2.1.1. Capsule Cloud

3.2.2. Pertino

3.2.3. Soha

3.3. DNS-based Threat Prevention/Detection

3.3.1. Standalone Appliances

3.3.1.1. Bluecat Networks

3.3.1.2. Efficient IP

3.3.1.3. Infoblox

3.3.2. Recursive DNS  Services

3.3.2.1. Bluecat Networks

3.3.2.2. Cisco

3.3.2.2.1. OpenDNS

3.3.2.3. Comodo

3.3.2.4. CrowdStrike

3.3.2.5. Infoblox

3.3.2.6. Neustar

3.3.2.7. Nominum

3.3.2.8. Symantec

3.3.2.9. ThreatStop

3.3.2.10. Verisign

3.3.3. Firewalls

3.3.3.1. Palo Alto Networks

3.4. Denial of Service Protection

3.4.1. Appliances

3.4.1.1. Arbor Networks

3.4.1.1.1. Prevail APS

3.4.1.2. Check Point Software

3.4.1.2.1. DDos Protector

3.4.1.3. Corero

3.4.1.4. Fortinet

3.4.1.5. Genie Networks

3.4.1.5.1. ATM Appliances

3.4.1.6. NSFOCUS

3.4.1.7. Radware

3.4.1.8. WINS TECHNET LTD

3.4.1.8.1. http://www.wins21.co.kr/

3.4.2. Security as a Service

3.4.2.1. HTTP/HTTPS Only

3.4.2.1.1. DOSArrest

3.4.2.1.2. Cloudflare

3.4.2.2. MultiProtocol/Network

3.4.2.2.1. Akamai

3.4.2.2.2. Black Lotus

3.4.2.2.3. Cloud Flare

3.4.2.2.4. F5

3.4.2.2.5. Incapsula

3.4.2.2.6. Link11

3.4.2.2.7. Neustar

3.4.2.2.8. NexusGuard

3.4.2.2.9. Verisign Inc

3.4.3. Clean Pipe Services

3.4.3.1. AT&T

3.4.3.2. Verizon

3.5. Fraud Prevention/Web Malware Monitoring

3.5.1. Fraud/Bot/Webscrape Prevention

3.5.1.1. Software

3.5.1.1.1. RSA (EMC)

3.5.1.1.2. IBM (Formerly Trusteer)

3.5.1.1.3. Intellinx

3.5.1.2. Appliances

3.5.1.2.1. RSA

3.5.1.2.2. Distil Networks

3.5.1.2.3. White Ops

3.5.1.3. Software as a Service

3.5.1.3.1. Akamai

3.5.1.3.2. BioCatch

3.5.1.3.3. Distil Networks

3.5.1.3.4. Guardian Analytics

3.5.1.3.5. Kount

3.5.1.3.6. MarkMonitor

3.5.1.3.7. ShieldSquare

3.5.1.3.8. ThreatMetrix

3.5.1.3.9. White Ops

3.5.1.3.10. X-Cart

3.5.1.3.11. iovation

3.5.1.4. Virtual Appliances

3.5.1.4.1. Distil Networks

3.5.2. Website & Ad Malware Monitoring

3.5.2.1. Ad-Juster

3.5.2.2. Globalsign

3.5.2.2.1. Leverages Hackalert

3.5.2.3. Hackalert

3.5.2.4. Intel Security

3.5.2.4.1. Siteadvisor

3.5.2.5. QualysGuard

3.5.2.6. RiskIQ

3.5.2.7. Sucuri

3.6. Network Access Control (NAC)

3.6.1. Host Based

3.6.1.1. Symantec

3.6.1.2. Intel Security

3.6.2. Network Based

3.6.2.1. Aruba Networks

3.6.2.2. Bradford Networks

3.6.2.3. Cisco

3.6.2.4. Forescout

3.6.2.5. Milton Security Group

3.6.2.6. Portnox

3.7. Network Anonymization & Consumer VPN Services

3.7.1. AnchorFree Hotspot Shield

3.7.2. Anonymize.net

3.7.3. CyberGhost

3.7.4. Dispel

3.7.5. GoldenFrog

3.7.6. HMA ProVPN

3.7.6.1. TorVPN

3.7.7. Okayfreedom

3.7.8. OpenVPN Shield Exchange

3.7.9. Private Wifi

3.7.10. Tor

3.7.11. luminati.io

3.8. Network Firewalls

3.8.1. Carrier Firewalls

3.8.2. Enterprise Firewalls

3.8.2.1. Multifunction Enterprise Firewalls

3.8.2.1.1. Bluedon

3.8.2.1.2. Check Point Software

3.8.2.1.3. Cisco

3.8.2.1.4. Fortinet

3.8.2.1.5. Huawei

3.8.2.1.6. Palo Alto Networks

3.8.2.1.7. Sonicwall

3.8.2.1.8. Websense (Formerly Intel Security)

3.8.2.2. Stateful Inspection - Traditional Firewalls

3.8.2.2.1. Cisco

3.8.2.2.2. Huawei

3.8.2.2.3. Check Point Software

3.8.3. Multi-Funtion SMB Firewalls

3.8.3.1. 443 Networks

3.8.3.2. Bluedon

3.8.3.3. Check Point Software

3.8.3.4. CheckPoint

3.8.3.5. Cisco

3.8.3.6. Clavister

3.8.3.7. Endian

3.8.3.8. Fortinet

3.8.3.9. Hillstone Networks

3.8.3.10. Meraki

3.8.3.11. PineApp

3.8.3.11.1. http://www.pineapp.com/

3.8.3.12. Sangfor

3.8.3.13. Sonicwall

3.8.3.14. Sophos

3.8.3.15. Trustwave

3.8.3.16. Untangle

3.8.3.17. WINS TechNet LTD

3.8.3.17.1. http://www.wins21.co.kr/

3.8.3.18. WatchGuard

3.8.4. Open Source & Community

3.8.4.1. IPTables

3.8.4.2. IPchains

3.8.4.3. PFSense

3.8.4.4. Untangle

3.8.5. Router Firewalls

3.9. Network Intrusion Detection/Prevention

3.9.1. Predictive Modeling

3.9.1.1. Cyactive

3.9.1.2. Trustpipe

3.9.2. IBM

3.9.3. Signature Based

3.9.3.1. AlienVault

3.9.3.1.1. Snort

3.9.3.2. Bricata

3.9.3.3. CheckPoint

3.9.3.4. Cisco

3.9.3.4.1. Sourcefire

3.9.3.5. Enterasys

3.9.3.6. Fortinet

3.9.3.7. HP

3.9.3.7.1. TippingPoint

3.9.3.8. IBM

3.9.3.9. Intel Security

3.9.3.10. Open Source

3.9.3.10.1. Snort

3.9.3.11. Symantec

3.9.3.11.1. APT Network

3.9.3.12. WINS TECHNET LTD

3.9.3.12.1. http://www.wins21.co.kr/

3.9.4. SCADA

3.9.4.1. Radiflow

3.10. Network Packet Brokers

3.10.1. Adara

3.10.2. Apcon

3.10.3. Arista Networks

3.10.4. Cubro

3.10.5. Gigamon

3.10.6. IXIA

3.10.7. Interface Masters Technologies

3.10.8. JDSU

3.10.9. NetOptics

3.10.10. NetScout

3.10.11. VSS Monitoring

3.11. Network Traffic Analysis, Network Behavior Analysis and Network Forensics

3.11.1. Flow Analysis/Metadata Extraction

3.11.1.1. Arbor Networks

3.11.1.2. IBM

3.11.1.3. Lancope

3.11.1.4. LogRythm

3.11.1.5. Intel Security NBA

3.11.2. Forensic Capture with User Surveillance & Security Threat Analytics

3.11.2.1. Access Data

3.11.2.2. BlueCoat

3.11.2.3. Cisco

3.11.2.3.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html

3.11.2.4. EMC

3.11.2.5. FireEye

3.11.2.6. Fluke Networks

3.11.2.7. IBM

3.11.2.8. IP Fabrics

3.11.2.9. JDSU (Network Instruments)

3.11.2.10. LightCyber

3.11.2.11. NetAgent

3.11.2.12. NetResec

3.11.2.13. NetScout

3.11.2.14. Niksun

3.11.2.15. Novetta Solutions

3.11.2.16. Nuix

3.11.2.17. Packetsled

3.11.2.18. Riverbed

3.11.2.19. SS8

3.11.2.19.1. http://www.ss8.com/

3.11.2.20. nPulse Technologies

3.11.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring

3.11.3.1. Emulex

3.11.3.2. Packetsled

3.11.3.3. WildPackets

3.11.4. Network Forensics Tools

3.11.4.1. Alert Logic

3.11.4.1.1. Formerly Click Security

3.11.4.2. Corvil

3.11.4.3. Cybersift

3.11.4.3.1. http://www.cybersift.net/sifter10app.html

3.11.4.4. Decision Group INC

3.11.4.4.1. http://www.edecision4u.com/index.html

3.11.4.5. EMC

3.11.4.6. FireEye

3.11.4.7. Fluke Networks

3.11.4.8. IP Fabrics

3.11.4.9. IPCopper

3.11.4.10. InveaTech

3.11.4.10.1. https://www.invea.com/en/products-and-services/li-system

3.11.4.11. KLOS

3.11.4.11.1. http://www.klos.com/applications/lawful-intercept/

3.11.4.12. NEXT Computing

3.11.4.12.1. http://www.nextcomputing.com/products/packet-capture-systems

3.11.4.13. NetReSec

3.11.4.14. Niksun

3.11.4.15. Radisys

3.11.4.15.1. http://www.radisys.com/products/network-appliance/

3.11.4.16. Utimaco

3.11.4.16.1. https://lims.utimaco.com/utimaco-lims/

3.11.4.17. WildPackets

3.11.5. Network Forensics Tools as a Service (NFTaaS)

3.11.5.1. CloudShark

3.11.6. Network Taps

3.11.6.1. Optical

3.11.6.1.1. Apcon

3.11.6.1.2. DataCom Systems

3.11.6.1.3. FibreDyne

3.11.6.1.4. Gigamon

3.11.6.1.5. Glimmerglass

3.11.6.1.6. M2Optics

3.11.6.1.7. Netoptics

3.11.6.1.8. Network Instruments

3.11.6.1.9. VSS Monitoring

3.11.6.1.10. nTAP

3.11.7. Network Traffic Analysis

3.11.7.1. Amgine Securus

3.11.7.2. Arbor Networks

3.11.7.3. Boeing

3.11.7.4. Cisco

3.11.7.4.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html

3.11.7.5. Corvil

3.11.7.6. Cyber adAPT

3.11.7.7. Damballa

3.11.7.8. Darktrace

3.11.7.9. ExtraHop Networks

3.11.7.10. Fidelis Cybersecurity

3.11.7.11. Lancope

3.11.7.12. Light Cyber

3.11.7.13. Novetta Solutions

3.11.7.14. PacketSled

3.11.7.15. Phirelight

3.11.7.16. Qihoo 360

3.11.7.16.1. SkyEye

3.11.7.17. RedJack

3.11.7.18. SlashNext

3.11.7.19. Splunk

3.11.7.20. Taasera

3.11.7.21. ThreatTrack

3.11.7.22. Trustport

3.11.7.22.1. Threat Intelligence

3.11.7.23. Vectra Networks

3.11.7.24. WireX

3.11.8. Raw Network Packet Capture

3.11.8.1. Apcon

3.11.8.1.1. Riverbed

3.11.8.1.2. Netfort

3.11.8.1.3. Wireshark

3.11.8.1.4. NTOP

3.11.8.2. Arbor Networks

3.11.8.3. Comworth

3.11.8.4. NTOP.org

3.11.8.5. Netfort

3.11.8.6. WireShark

3.12. Network-Based Advanced Threat Protection

3.12.1. Firewalls with Malware Sandbox Capabilities

3.12.1.1. Barracuda

3.12.1.2. Check Point Software

3.12.1.3. Cisco

3.12.1.4. Fortinet

3.12.1.5. Huawei

3.12.1.6. Juniper Networks

3.12.1.7. Palo Alto Networks

3.12.1.8. Sonicwall

3.12.1.9. Sophos

3.12.1.10. Watchguard

3.12.2. Appliance Based Malware Sandboxes

3.12.2.1. AMGINE SECURUS

3.12.2.1.1. http://www.amgine.co.kr/index.html

3.12.2.2. AhnLab

3.12.2.3. Bluecoat

3.12.2.4. Check Point Software

3.12.2.4.1. Emulator Blade

3.12.2.5. Cisco

3.12.2.5.1. ThreatGrid

3.12.2.6. ContentKeeper

3.12.2.7. Cyphort

3.12.2.8. Damballa

3.12.2.9. FireEye

3.12.2.10. Fortinet

3.12.2.10.1. FortiSandbox

3.12.2.11. General Dynamics

3.12.2.11.1. Fidelis Security Systems

3.12.2.12. Huawei

3.12.2.12.1. Firehunter

3.12.2.13. Intel Security

3.12.2.13.1. McAfee Advanced Threat Detection Appliance

3.12.2.14. LastLine

3.12.2.15. Palo Alto Networks

3.12.2.15.1. WildFire

3.12.2.16. Payload Security

3.12.2.17. Qihoo

3.12.2.17.1. SkyEye

3.12.2.18. Techguard Security

3.12.2.19. ThreatTrack

3.12.2.20. Trend Micro

3.12.2.20.1. Deep Discovery

3.12.2.21. VMRay

3.12.2.22. VeeDog

3.12.2.22.1. http://veedog.com/

3.12.2.23. WINS TECHNET LTD

3.12.2.23.1. http://www.wins21.co.kr/

3.12.3. Cloud-Based Malware Sandboxes

3.12.3.1. Cisco

3.12.3.1.1. ThreatGrid

3.12.3.2. Fortinet

3.12.3.3. Huawei

3.12.3.4. Joe Security

3.12.3.5. Lastline

3.12.3.6. Netwitness

3.12.3.6.1. Spectrum

3.12.3.7. Palo Alto Networks

3.12.3.7.1. WildFire

3.12.3.8. Qihoo

3.12.3.8.1. SkyEye

3.12.3.9. Sonicwall

3.13. SCADA/ICS

3.13.1. Monitoring

3.13.1.1. CRITIFENSE

3.13.1.2. Cyberbit

3.13.1.3. PFP Cybersecurity

3.13.2. SCADA Firewalls

3.13.2.1. BAE Systems

3.13.2.1.1. http://www.baesystems.com/en-us/product/scada-firewall

3.13.2.2. Bayshore Networks

3.13.2.2.1. https://www.bayshorenetworks.com/products/it-ot-gateway/

3.13.2.3. Check Point Software

3.13.2.3.1. https://www.checkpoint.com/products-solutions/critical-infrastructure/

3.13.2.4. Endian

3.13.2.4.1. http://www.endian.com/products/4i/

3.13.2.5. Fortinet

3.13.2.5.1. https://www.fortinet.com/solutions/industries/scada-industrial-control-systems.html

3.13.2.6. Tofino Security

3.13.2.6.1. https://www.tofinosecurity.com/products/Tofino-Firewall-LSM

3.14. SSL Inspection Appliances

3.14.1. A10 Networks

3.14.2. Bluecoat

3.14.3. ResolutionOne

3.14.4. VSS Monitoring

3.14.5. SourceFire

3.15. Software Defined Perimeter

3.15.1. Certes Networks

3.15.2. Cryptzone

3.15.3. Tempered Networks

3.15.4. Unisys Stealth

3.15.5. Vidder

3.15.6. Waverly Labs

3.16. Virtual Private Networking (VPN/SSL VPN)

3.16.1. IPSec VPN Concentrators

3.16.1.1. Certes Networks

3.16.1.2. CheckPoint Software

3.16.1.3. Cisco

3.16.1.4. Mako Networks

3.16.2. Layer 2 Encryption

3.16.2.1. Certes Networks

3.16.3. Layer 4 Encryption

3.16.3.1. Certes Networks

3.16.4. SSL VPN

3.16.4.1. AhnLab

3.16.4.2. Array Networks

3.16.4.3. Barracuda Networks

3.16.4.4. Check Point Software

3.16.4.5. Cisco

3.16.4.6. Citrix

3.16.4.7. F5 Networks

3.16.4.8. Fortinet

3.16.4.9. Hillstone Networks

3.16.4.10. Juniper

3.16.4.11. NetGear

3.16.4.12. Sonicwall

3.16.4.13. Stonesoft

3.16.4.14. WatchGuard

3.16.5. Multi-Path Dynamic VPN

3.16.5.1. Secret Double Octopus

3.16.5.2. Dispersive Networks

3.17. Web/Email Protection

3.17.1. Secure Email Gateways

3.17.1.1. Alt-N Technologies

3.17.1.2. Bluecoat

3.17.1.3. Fortinet

3.17.1.4. GWAVA

3.17.1.5. Intel Security

3.17.1.6. Proofpoint

3.17.1.7. Re-Sec

3.17.1.8. Sonicwall

3.17.1.9. Symantec

3.17.1.10. Trustwave

3.17.1.11. Voitiro

3.17.1.12. Websense

3.17.1.13. iBoss

3.17.2. Secure Web Gateways

3.17.2.1. Anchiva

3.17.2.2. Bluecoat

3.17.2.3. ContentKeeper

3.17.2.4. GWAVA

3.17.2.5. Intel Security

3.17.2.6. Re-Sec

3.17.2.7. Symantec

3.17.2.8. Trustwave

3.17.2.9. Websense

3.17.2.10. iBoss

3.17.3. Security as a Service

3.17.3.1. Web & Email SaaS

3.17.3.1.1. Appriver

3.17.3.1.2. Barracuda

3.17.3.1.3. Bitglass

3.17.3.1.4. Cisco

3.17.3.1.5. Intel Security

3.17.3.1.6. MailGuard

3.17.3.1.7. Spamina

3.17.3.1.8. Symantec

3.17.3.1.9. Total Defense

3.17.3.1.10. TotalDefense

3.17.3.1.11. Websense

3.17.3.1.12. Zscaler

3.17.3.2. Web Only

3.17.3.2.1. Bluecoat

3.17.3.2.2. ContentKeeper

3.17.3.2.3. OpenDNS

3.17.3.2.4. Websense

3.17.3.2.5. Zscaler

3.17.3.3. Secure Email Gateways

3.17.3.3.1. Agari

3.17.3.3.2. CloudMark

3.17.3.3.3. Proofpoint

3.17.3.3.4. Return Path

3.17.3.3.5. Spam Experts

3.17.3.3.6. Spam Titan

3.17.3.3.7. Spamina

3.17.3.3.8. ValiMail

3.17.3.4. Anti-Phishing

3.17.3.4.1. Amgine Securus

3.17.3.4.2. Area1 Security

3.17.3.4.3. CloudMark

3.17.3.4.4. Cymbel

3.17.3.4.5. Cyveillance

3.17.3.4.6. FireEye

3.17.3.4.7. MailGuard

3.17.3.4.8. MediaPro

3.17.3.4.9. Phishlabs

3.17.3.4.10. ThreatTrack

3.17.3.4.11. Votiro

3.17.3.4.12. Webroot

3.17.3.4.13. ZapFraud

4. • Lack of end-to-end encryption

4.1. Web Application Firewalls (WAF) & Application Security

4.1.1. Web Threat Disruption Technology

4.1.1.1. Software

4.1.1.1.1. NuCaptcha

4.1.1.1.2. NuData

4.1.1.2. Appliances

4.1.1.2.1. Juniper

4.1.1.2.2. Shape Security

4.1.1.3. Open Source

4.1.1.3.1. Google Hack Honeypot

4.2. Web Application Security

4.2.1. Code Review Products

4.2.1.1. HP

4.2.1.2. IBM

4.2.2. Web Application Vulnerability Scanning Services

4.2.2.1. Cenzic

4.2.2.2. Controlscan

4.2.2.3. High-Tech Bridge

4.2.2.4. McAfee Secure

4.2.2.5. Qualys

4.2.2.6. Securi

4.2.2.7. Sitelock

4.2.2.8. Trustwave

4.2.2.9. WebSecurify

4.2.2.10. WhiteHat Security

4.2.3. Scanning Software

4.2.3.1. Open Source

4.2.3.1.1. Arachni Scanner

4.2.3.1.2. Subgraph

4.2.3.1.3. W3af

4.2.3.1.4. Wapiti

4.2.3.1.5. Watcher

4.2.3.2. Commercial

4.2.3.2.1. Accunetix

4.2.3.2.2. BeyondTrust

4.2.3.2.3. Cenzic

4.2.3.2.4. HP

4.2.3.2.5. MavitunaSecurity

4.2.3.2.6. NTObjectives

4.2.3.2.7. Nstalker

4.2.3.2.8. Portswigger

4.2.3.2.9. Syhunt

5. • Vulnerable Applications

5.1. Data Governance and Classification

5.1.1. Expert Source

5.1.1.1. http://www.expertsource.in/index.php

5.1.2. HP

5.1.3. IBM

5.1.4. Informatica

5.1.5. Nuix

5.1.6. Somansa

5.1.7. Titus

5.1.8. boldonjames

5.2. Data Loss Prevention (DLP)

5.2.1. Endpoint

5.2.1.1. Data Classification and Tracking

5.2.1.1.1. Banyan Solutions

5.2.1.1.2. BoldonJames

5.2.1.1.3. Digital Guardian

5.2.1.1.4. HP

5.2.1.1.5. IBM

5.2.1.1.6. Identity Finder

5.2.1.1.7. Mach1 Development

5.2.1.1.8. Microsoft (Formerly Secure Islands)

5.2.1.1.9. MinerEye

5.2.1.1.10. Nuix

5.2.1.1.11. Smartlogic

5.2.1.1.12. Titus

5.2.1.1.13. Varonis

5.2.1.1.14. CoSoSys

5.2.1.2. Mobile

5.2.1.2.1. Symantec

5.2.1.2.2. Websense

5.2.1.2.3. Microsoft (Secure Islands)

5.2.1.3. Windows

5.2.1.3.1. Absolute Software

5.2.1.3.2. CA Technologies

5.2.1.3.3. Digital Guardian

5.2.1.3.4. GTB Technologies

5.2.1.3.5. Infowatch

5.2.1.3.6. Intel Security

5.2.1.3.7. RSA

5.2.1.3.8. Microsoft (Secure Islands)

5.2.1.3.9. Somansa

5.2.1.3.10. Symantec

5.2.1.3.11. Trustwave

5.2.1.3.12. Watchful Software

5.2.1.3.13. Raytheon-Websense

5.2.1.3.14. Zecurion

5.2.2. Network

5.2.2.1. Digital Guardian

5.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)

5.2.2.3. Symantec

5.2.2.4. InfoWatch

5.2.3. Secure Email Gateway

5.2.3.1. Cisco

5.2.3.2. Symantec

5.2.3.3. Intel Security

5.2.3.4. Somansa

5.2.4. Secure Web Gateway

5.2.4.1. Intel Security

5.2.4.2. Symantec

5.2.4.3. Somansa

5.2.5. Security as a Service

5.2.5.1. Consumer

5.2.5.1.1. Reputation.com

5.2.5.1.2. Social Fortress

5.2.5.1.3. PwnedList

5.2.5.2. Enterprise

5.2.5.2.1. Social Fortress

5.2.5.2.2. Google Apps

5.2.5.2.3. ZixCorp

5.3. Database Security

5.3.1. Database Audit and Protection (DAP)

5.3.1.1. Application Security, Inc

5.3.1.2. BeyondTrust

5.3.1.3. Big Data Platform DAP

5.3.1.3.1. BlueTalon

5.3.1.3.2. Cloudera

5.3.1.3.3. Hortonworks

5.3.1.3.4. IBM

5.3.1.3.5. Imperva

5.3.1.4. DataSunrise

5.3.1.5. Fortinet

5.3.1.6. GreenSQL

5.3.1.7. IBM

5.3.1.8. IRI

5.3.1.8.1. Oracle

5.3.1.8.2. SQL Server

5.3.1.9. Imperva

5.3.1.10. Intel Security

5.3.1.11. Mentis Software

5.3.1.12. Oracle Corp

5.3.1.13. PentaSecurity

5.3.1.14. Warevalley

5.3.2. Database Activity Monitoring

5.3.2.1. DB Networks

5.3.2.2. Somansa

5.4. Encryption/Tokenization

5.4.1. Big Data

5.4.1.1. Gazzang

5.4.1.2. Vormetric

5.4.2. Cloud/SAAS Encryption

5.4.2.1. Appliances

5.4.2.1.1. Office365

5.4.2.1.2. Ciphercloud

5.4.2.1.3. Afore Solutions

5.4.2.1.4. Perspecsys

5.4.2.2. Software

5.4.2.2.1. BoxCryptor

5.4.2.2.2. CloudMask

5.4.2.2.3. PrivateCore

5.4.2.2.4. Trend Micro

5.4.2.2.5. Viivo

5.4.2.2.6. Voltage Security

5.4.2.3. Software as a Service

5.4.2.3.1. Trend Micro

5.4.2.3.2. SooKasa

5.4.2.3.3. Gemalto

5.4.3. Cryptographic Providers

5.4.3.1. RSA

5.4.3.2. Quintessence

5.4.3.3. Microsoft

5.4.4. Data masking

5.4.4.1. Oracle

5.4.4.2. Dataguise

5.4.4.3. Informatica

5.4.4.4. IBM

5.4.4.5. Voltage Security

5.4.4.6. Green SQL

5.4.4.7. Mentis

5.4.4.8. Compuware

5.4.4.9. Axis

5.4.4.10. Privacy Analytics

5.4.4.11. Camouflage Software

5.4.4.12. Solix Technologies

5.4.4.13. Net 2000

5.4.5. Database

5.4.5.1. Gemalto

5.4.5.2. Dark Matter Labs

5.4.5.3. Vormetric

5.4.6. Email

5.4.6.1. ZixCorp

5.4.6.2. Encryptics

5.4.6.2.1. https://www.encryptics.com/default.aspx

5.4.7. Encrypted USB Storage

5.4.7.1. Apricorn

5.4.7.2. Datalocker

5.4.7.3. Integral Memory

5.4.7.4. IronKey

5.4.7.5. Kingston

5.4.7.6. Virbatim

5.4.8. File/Folder

5.4.8.1. Covertix

5.4.8.1.1. http://www.covertix.com/

5.4.8.2. IBM

5.4.8.2.1. Mainframe

5.4.8.3. SecureIslands

5.4.8.4. Sophos

5.4.8.4.1. SafeGuard Enterprise (Utimaco)

5.4.8.5. Symantec (PGP)

5.4.8.6. Vormetric

5.4.8.7. WinMagic

5.4.8.7.1. SecureDoc

5.4.9. Quantum Encryption

5.4.9.1. IDQ

5.4.9.2. Quintessence Labs

5.4.9.3. Whitewood Encryption

5.4.10. Tokenization

5.4.10.1. Protegrity

5.4.11. Whole Disk

5.4.11.1. Intel Security

5.4.11.2. Symantec (PGP)

5.4.11.3. CheckPoint Software

5.4.11.4. Encryption Management

5.4.11.4.1. Wave Systems

5.4.11.5. WinMagic

5.4.11.5.1. SecureDoc

5.4.11.6. Microsoft

5.4.11.6.1. Bitlocker

5.4.11.7. Sophos

5.4.11.7.1. SafeGuard Enterprise (Utimaco)

5.4.11.8. Trustwave

5.4.11.8.1. DataControl

5.4.11.9. Vormetric

5.5. File Analysis Software

5.5.1. Acaveo

5.5.2. Active Navigation

5.5.3. AvePoint

5.5.4. Beyond Recognition

5.5.5. Bloomberg

5.5.6. CommVault

5.5.7. Condrey

5.5.8. Covertix

5.5.9. DataGlobal

5.5.10. DataGravity

5.5.11. Equivio

5.5.12. HP

5.5.12.1. Control Point

5.5.13. HiSoftware

5.5.14. IBM

5.5.14.1. StoreIQ

5.5.15. Identifty Finder

5.5.16. Imperva

5.5.17. Index Engines

5.5.18. Kazoup

5.5.19. MailGuard

5.5.20. NTP Software

5.5.21. Novell

5.5.22. Nuix

5.5.23. Proofpoint

5.5.24. Stealthbits

5.5.25. Varonis

5.5.26. WatchDox

5.5.27. Whitebox Security

5.5.28. ZyLab

5.6. Hardware Security Modules (HSM)

5.6.1. Cloud HSM

5.6.1.1. Amazon

5.6.1.2. IBM

5.6.2. Hardware

5.6.2.1. FutureX

5.6.2.2. Gemalto

5.6.2.3. HPE

5.6.2.4. Safenet

5.6.2.5. Thales

5.7. Software Defined Storage Security

5.7.1. Dispersive Networks

5.7.1.1. https://dispersivetechnologies.com/

5.7.2. OceansBlue

5.7.2.1. http://www.oceansblue.net/index.html

5.8. eSignatures

5.8.1. Adobe eSign Services

5.8.2. Alphatrust

5.8.3. Docusign

5.8.4. Hellosign

5.8.5. Rightsignature

5.8.6. Sertifi

6. OEMs & System Integrators

6.1. Appliance Integrators

6.1.1. Accton

6.1.1.1. http://www.accton.com/

6.1.2. Advantech

6.1.2.1. http://www.advantech.com/

6.1.3. Celestica

6.1.3.1. http://www.celestica.com/

6.1.4. Dan-el Technologies Ltd.

6.1.4.1. http://www.danel.co.il/

6.1.5. Flextronics

6.1.5.1. http://www.flextronics.com/

6.1.6. Plexus

6.1.6.1. http://www.plexus.com/

6.2. Base Appliances

6.2.1. Advantech

6.2.2. Amax

6.2.3. Cas Well

6.2.4. Iron Systems

6.2.5. Lanner

6.2.6. Portwell

6.2.7. Tilera

6.3. Cards

6.3.1. Netronome

6.3.2. Tilera

6.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection

6.4. Encryption Acceleration

6.4.1. Intel

6.4.1.1. VPRO

6.4.2. Gemalto

6.4.2.1. Luna PCI

6.5. MSSP Appliances

6.5.1. 443 Networks

6.6. Threat Intelligence

6.6.1. Anti-Phishing

6.6.1.1. Cyren

6.6.2. DNS DGA Feeds

6.6.2.1. Farsight Security

6.6.3. File Reputation

6.6.3.1. Findthatfile

6.6.3.2. Webroot

6.6.4. Fraud

6.6.4.1. Internet Fraud Alert

6.6.4.1.1. http://www.ifraudalert.org/default.aspx

6.6.4.2. National Cyber-Forensics and Training Alliance

6.6.4.2.1. http://www.ncfta.net/Index.aspx

6.6.5. IP Block Lists

6.6.5.1. WebRoot Brightcloud

6.6.5.2. Cyren

6.6.5.3. Malwarebytes

6.6.5.3.1. hpHosts

6.6.6. IP Reputation

6.6.6.1. Cyren

6.6.6.2. WebRoot Brightcloud

6.6.7. Indicators of Compromise

6.6.7.1. FireEye

6.6.7.2. Proofpoint

6.6.7.2.1. Emerging Threats

6.6.7.3. Wapack labs

6.6.7.3.1. https://cms.wapacklabs.com/

6.6.7.3.2. ThreatRecon

6.6.7.4. CIRCL

6.6.7.4.1. https://www.circl.lu/services/misp-malware-information-sharing-platform/

6.6.8. Malicious URL

6.6.8.1. Cyren

6.6.8.2. Findthatfile

6.6.8.3. Webroot

6.6.9. Predictive

6.6.9.1. Seclytics

6.6.10. Vulnerability Research

6.6.10.1. Telus Security Labs

6.6.10.1.1. http://telussecuritylabs.com/signatures/attack_detection

6.6.10.2. Vupen

6.6.10.2.1. http://www.vupen.com/english/services/tpp-index.php

6.7. Security Related Chips & CPUs

6.7.1. Broadcom

6.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection

6.7.2. Cavium

6.7.2.1. http://www.cavium.com

6.7.3. Lionic

6.7.3.1. http://www.lionic.com/

6.7.4. Netronome

6.7.4.1. http://www.netronome.com

6.7.5. Tilera

6.7.5.1. http://www.tilera.com/products/processors

6.7.6. Intel

6.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH

6.8. Software

6.8.1. Advanced Content Disarming and Reconstruction

6.8.1.1. OPSWAT

6.8.1.1.1. https://www.opswat.com/products/metascan/

6.8.1.2. Votiro

6.8.2. Advanced Threat Protection - Virtual Execution Engines

6.8.2.1. ContentKeeper

6.8.2.2. Threat Track Security

6.8.2.2.1. http://www.threattracksecurity.com/oem.aspx

6.8.3. Analytics/Graphing/Reporting

6.8.3.1. Logi Analytics

6.8.3.1.1. https://www.logianalytics.com/

6.8.3.2. D3Plus

6.8.3.2.1. https://d3plus.org/

6.8.3.3. D3js

6.8.4. Anti-Spam/Phishing

6.8.4.1. APWG

6.8.4.2. BrandProtect

6.8.4.3. Cyren

6.8.4.4. Ikarus

6.8.4.4.1. http://www.ikarussecurity.com/products/oem/solutions-for-oem-partner/

6.8.4.5. Internet Fraud Alert

6.8.4.5.1. http://www.ifraudalert.org/default.aspx

6.8.4.6. ReturnPath

6.8.4.7. WebRoot Brightcloud

6.8.5. AntiMalware

6.8.5.1. Antiy

6.8.5.1.1. http://www.antiy.net/

6.8.5.2. Avira

6.8.5.3. Bitdefender

6.8.5.4. Cyren

6.8.5.5. ESet

6.8.5.6. Fortinet

6.8.5.7. GFI

6.8.5.8. Ikarus

6.8.5.8.1. http://www.ikarussecurity.com/products/oem/solutions-for-oem-partner/

6.8.5.9. Intel Security

6.8.5.10. Kaspersky

6.8.5.11. Norman

6.8.5.12. OPSWAT

6.8.5.13. QuickHeal

6.8.5.14. ThreatTrack

6.8.5.15. Zillya

6.8.5.16. ZonerAntiVirus

6.8.6. Content Extraction & Search

6.8.6.1. Oracle

6.8.6.1.1. Stellent Viewer

6.8.7. Encryption

6.8.7.1. Transport

6.8.7.1.1. Rosberg Systems AS

6.8.7.1.2. SIPBiz

6.8.7.1.3. NCP-E

6.8.8. Endpoint Security and Management

6.8.8.1. OPSWAT

6.8.8.1.1. https://www.opswat.com/products/oesis-framework

6.8.9. File Content Decoding/Analysis/Fingerprinting

6.8.9.1. HP Autonomy

6.8.9.1.1. IDOL

6.8.9.1.2. KeyView

6.8.9.2. Attivio

6.8.9.3. GTB Technologies

6.8.9.3.1. Data Loss Prevention OEM SDK

6.8.10. IT Service Management

6.8.10.1. ITRP

6.8.11. Image Recognition

6.8.11.1. Image Analyzer

6.8.12. Intrusion Detection/Prevention Signatures

6.8.12.1. Proofpoint

6.8.12.1.1. Emerging Threats

6.8.13. Network Stack

6.8.13.1. IPV4/6

6.8.13.1.1. NetX

6.8.13.1.2. Network Data Plane

6.8.13.2. Deep Packet Inspection

6.8.13.2.1. Broadweb

6.8.13.2.2. Ipoque

6.8.13.2.3. Procera Networks

6.8.13.2.4. Qosmos

6.8.13.3. SDN

6.8.13.3.1. 6Wind

6.8.14. Optical Character Recognition

6.8.14.1. Abbyy

6.8.15. Social Network Content Control

6.8.15.1. NetboxBlue

6.8.16. URL Categorization

6.8.16.1. Cyren

6.8.16.1.1. http://www.cyren.com/embedded-url-filtering.html

6.8.16.2. Ikarus

6.8.16.2.1. http://www.ikarussecurity.com/products/oem/solutions-for-oem-partner/

6.8.16.3. Malware

6.8.16.3.1. BrandProtect

6.8.16.4. Webroot Brightcloud

6.8.16.5. Zvelo

6.8.17. Voice Recognition

6.8.17.1. STC

6.8.17.2. Nuance

6.9. Managed Security OEMs

6.9.1. Digital Hands

7. • Broken Cryptography

7.1. Application Security

7.1.1. Runtime Application Self-Protection (RASP)

7.1.1.1. Arxan

7.1.1.2. Checkmarx

7.1.1.3. Contrast Security

7.1.1.4. HP

7.1.1.5. Immunio

7.1.1.6. Metaforic

7.1.1.7. OneASP

7.1.1.8. Prevoty

7.1.1.9. SecuPi

7.1.1.10. Veracode

7.1.1.11. Virsec

7.1.1.12. Waratek

7.1.1.13. whiteCryption

7.1.2. Enterprise App-Layer Protection

7.1.2.1. SecuPI

7.1.3. AI-Based Applicaton Threat Defense

7.1.3.1. Barricade

7.1.3.2. Signal Sciences

7.2. Cloud Security

7.2.1. Cloud Protection Gateways

7.2.1.1. CipherCloud

7.2.1.2. Netskope

7.2.1.3. Perspecsys

7.2.1.4. Skyhigh Networks

7.2.1.5. Vaultive

7.2.2. Cloud Access Security Brokers

7.2.2.1. User Activity Monitoring

7.2.2.1.1. Adallom

7.2.2.1.2. Avanan

7.2.2.1.3. Bitglass

7.2.2.1.4. Elastica

7.2.2.1.5. Harvest.ai

7.2.2.1.6. Imperva

7.2.2.1.7. Netscope

7.2.2.1.8. SkyHigh Networks

7.2.2.2. Data Loss Prevention

7.2.2.2.1. Integrated DLP

7.2.2.2.2. Harvest.ai

7.2.2.3. Encryption

7.2.2.3.1. Adallom

7.2.2.3.2. Avanan

7.2.2.3.3. Managed Methods

7.2.2.3.4. SkyHigh Networks

7.2.2.4. Identity and Access Management

7.2.2.4.1. Centrify

7.2.2.4.2. Cloudiway

7.2.2.4.3. Okta

7.2.2.4.4. Ping

7.2.2.5. Access Control

7.2.2.5.1. Adallom

7.2.2.5.2. Avanan

7.2.2.5.3. Bitglass

7.2.2.5.4. Elastica

7.2.2.5.5. FireLayers

7.2.2.5.6. Managed Methods

7.2.2.5.7. Netskope

7.2.2.5.8. Skyfence

7.2.3. Cloud Application Discovery

7.2.3.1. Ciphercloud

7.2.3.2. Elastica

7.2.3.3. Netskope

7.2.3.4. Skyhigh

7.2.4. Cloud Compliance and Security Risk Platforms

7.2.4.1. AlertLogic

7.2.4.2. Cavirin

7.2.4.3. Cloudcheckr

7.2.4.4. Evident.io

7.2.4.5. Harvest AI

7.3. Cross Domain Solutions

7.3.1. Advenica

7.3.1.1. ZoneGuard

7.3.1.2. SecuriRam

7.3.2. General Dynamics

7.3.2.1. TacGuard

7.3.2.2. Crossing Guard

7.3.2.3. NanoXD

7.3.3. LockHeed Martin

7.3.3.1. Trusted Manager

7.3.4. Tresys

7.3.4.1. XD Air

7.3.4.2. XD Bridge

7.3.4.3. XD Guardian

7.3.5. Owl Computing

7.3.5.1. Owl OPDS-100

7.3.5.2. Owl OPDS-100D

7.3.5.3. OCDS-SFF

7.4. Data Security

7.4.1. Network-Based Data Cleansing

7.4.1.1. DataStealth

7.4.1.1.1. http://www.datexdatastealth.com/

7.4.2. Big Data Security

7.4.2.1. BlueTalon

7.5. Endpoint Security

7.5.1. Endpoint Detection and Response (EDR)

7.5.1.1. Agent-Based

7.5.1.1.1. Carbon Black

7.5.1.1.2. Cisco

7.5.1.1.3. Countertack

7.5.1.1.4. CrowdStrike

7.5.1.1.5. Cyberbit

7.5.1.1.6. Cyberreason

7.5.1.1.7. Cylance

7.5.1.1.8. Deep Instinct

7.5.1.1.9. Digital Guardian

7.5.1.1.10. Dtex Systems

7.5.1.1.11. Endgame Systems

7.5.1.1.12. Fidelis Cybersecurity

7.5.1.1.13. FireEye

7.5.1.1.14. Forescout

7.5.1.1.15. Guidance Software

7.5.1.1.16. Hexis Cyber Solutions

7.5.1.1.17. Invincea

7.5.1.1.18. LogRhythm

7.5.1.1.19. NexThink

7.5.1.1.20. Panda Security

7.5.1.1.21. RSA (EMC)

7.5.1.1.22. SecDo

7.5.1.1.23. SentinelOne

7.5.1.1.24. Tanium

7.5.1.1.25. Triumfant

7.5.1.1.26. Verint

7.5.1.1.27. Ziften

7.5.1.2. Agentless

7.5.1.2.1. BeyondTrust

7.5.1.2.2. Cynet

7.5.1.2.3. Fidelis

7.5.1.2.4. ForeScout

7.5.1.2.5. Hexadite

7.5.1.2.6. Hexis Cyber Solutions

7.5.1.2.7. InfoCyte

7.5.1.2.8. LightCyber

7.5.1.2.9. Outlier Security

7.5.1.2.10. Promisec

7.5.2. Remote Browser-Isolation (remote dom)

7.5.2.1. Amune

7.5.2.1.1. https://amune.org/security

7.5.2.2. Armor5

7.5.2.3. Authentic8

7.5.2.4. Dispel

7.5.2.5. FireGlass

7.5.2.6. Menlo Security

7.5.2.7. Aurionpro

7.5.2.7.1. Formerly Spikes Security

7.6. Identification, Authentication, Access Control & IAM

7.7. Internet of Things

7.7.1. Automotive

7.7.1.1. Security Innovation

7.7.2. Embedded Security

7.7.2.1. Security Innovation

7.8. Network & Infrastructure Security

7.8.1. Content Disarm and Reconstruction (CDR)

7.8.1.1. Check Point Software

7.8.1.1.1. Threat Extraction

7.8.1.2. Glasswall

7.8.1.2.1. http://www.glasswallsolutions.com/

7.8.1.3. Mimecast

7.8.1.3.1. https://www.mimecast.com/

7.8.1.4. OPSWAT

7.8.1.5. ODI

7.8.1.5.1. http://www.odi-x.com/

7.8.1.6. Re-Sec

7.8.1.6.1. http://www.re-sec.com/

7.8.1.7. Sasa-Software

7.8.1.7.1. http://www.sasa-software.com/

7.8.1.8. Solebit Labs

7.8.1.8.1. http://www.solebitlabs.com/

7.8.1.9. Symantec

7.8.1.9.1. DisArm

7.8.1.10. TreSys

7.8.1.10.1. http://www.tresys.com/

7.8.1.11. Votiro

7.8.1.11.1. http://www.votiro.com/

7.8.2. Malware Infection Analysis and Monitoring Services

7.8.2.1. Lastline

7.8.2.1.1. Guardia

7.8.2.2. Cisco

7.8.2.2.1. Formerly OpenDNS

7.8.2.3. Qualys

7.8.2.4. Seculert

7.8.3. Network Behavior and Analytics

7.8.3.1. Industrial Control Systems (ICS)

7.8.3.1.1. CyberX

7.8.4. Standalone Threat Intelligence Defense Solutions (STIDS)

7.8.4.1. Bandura

7.8.4.1.1. PoliWall

7.8.4.2. Centripetal Networks

7.8.4.3. Damballa

7.8.4.4. Fidelis Cybersecurity

7.8.4.5. FireEye

7.8.4.6. Group IB

7.8.4.6.1. http://tds.group-ib.com/

7.8.4.7. Ixia

7.8.4.7.1. http://www.ixiacom.com/info/ta

7.8.4.8. LookingGlass

7.8.4.8.1. https://lgscout.com/products/dns-defender/

7.8.4.9. Redsocks

7.8.4.9.1. Redsocks Threat Defender

7.8.4.10. ReversingLabs

7.8.4.11. Symantec

7.8.4.11.1. APT Network

7.8.5. Unauthorized Endpoint Connection Prevention (UECP)

7.8.5.1. Ensilo

7.8.5.2. Intel Security

7.8.6. Software Defined WAN (SDwan)

7.8.6.1. CloudGenix

7.8.6.2. Pertino

7.8.6.3. Velocloud

7.8.6.4. Viptela

7.8.6.5. Versa Networks

7.8.7. Virtual Container Security

7.8.7.1. Apcera

7.8.7.2. Aqua Security

7.8.7.3. Illumio

7.8.7.4. StackRox

7.8.7.5. TwistLock

7.8.8. Network Security as a Service

7.8.8.1. Cato Networks

7.8.8.2. MyDigitalShield

7.8.8.3. Zscaler

7.9. Security Operations, Incident Response

7.9.1. Intelligence/Data Feeds/Software & Services

7.9.1.1. Security Intelligence and Data Analysis Platforms

7.9.1.1.1. FireEye

7.9.1.2. Threat Intelligence Platforms (TIPs)

7.9.1.2.1. Anomali

7.9.1.2.2. BAE Systems

7.9.1.2.3. Buguroo

7.9.1.2.4. Codenomicon

7.9.1.2.5. Comilion

7.9.1.2.6. Confer

7.9.1.2.7. Eclectic IQ

7.9.1.2.8. Infoblox

7.9.1.2.9. Lockheed Martin

7.9.1.2.10. Lookingglass Cyber Solutions

7.9.1.2.11. Microsoft

7.9.1.2.12. Palentir

7.9.1.2.13. PierceMatrix

7.9.1.2.14. Service Now (Formerly Brightpoint)

7.9.1.2.15. Soltra

7.9.1.2.16. ThreatConnect

7.9.1.2.17. ThreatQuotient

7.9.1.2.18. TruStar

7.9.1.3. Threat Intelligence Services

7.9.1.3.1. Human Intelligence - HUMINT (Strategic)

7.9.1.3.2. Machine-Based (Tactical)

7.9.1.3.3. Vulnerabilities and Exploits

7.9.1.3.4. Data Loss Detection - External

7.9.1.4. Collaborative Threat Investigation Platforms

7.9.1.4.1. BAE System Detica

7.9.1.4.2. IKANow

7.9.1.4.3. Maltego

7.9.1.4.4. NC4

7.9.1.4.5. Palentir

7.9.2. Malware Analysis

7.9.2.1. Malware Analysis as a Service

7.9.2.1.1. Free Services

7.9.2.1.2. ReversingLabs

7.9.2.1.3. ThreatGrid

7.9.2.2. Sandbox Software

7.9.2.2.1. GFI

7.9.2.2.2. Joesecurity

7.9.2.2.3. Bluecoat

7.9.2.2.4. Payload Security

7.9.3. Threat Deception Technologies

7.9.3.1. Distributed Deception Platforms

7.9.3.1.1. Amgine Securus

7.9.3.1.2. Atomic Software Solutions

7.9.3.1.3. Attivo Networks

7.9.3.1.4. Cymmetria

7.9.3.1.5. GuardiCore

7.9.3.1.6. Illusive Networks

7.9.3.1.7. Javelin Networks

7.9.3.1.8. KeyFocus

7.9.3.1.9. SmokeScreen

7.9.3.1.10. Specter

7.9.3.1.11. TrapX

7.9.3.1.12. Vision Space Technologies

7.9.3.2. Network

7.9.3.2.1. ForeScout

7.9.3.2.2. Juniper Networks

7.9.3.2.3. Percipient Networks

7.9.3.2.4. Ridgeback Network Defense

7.9.3.2.5. Shadow Networks

7.9.3.3. Open Source

7.9.3.3.1. Honeypot

7.9.3.4. Web

7.9.3.4.1. Shape Security

7.9.3.4.2. Juniper Networks

7.9.3.4.3. CyberTrap

8. • Malware

8.1. Firewall Workflow,Modeling & Change Management

8.1.1. Checkpoint Software

8.1.2. Firemon

8.1.3. ManageEngine

8.1.4. Redseal Networks

8.1.5. Skybox

8.1.6. Veriflow

8.2. Tufin

8.3. Legal and regulatory information governance

8.4. Privacy

8.5. Regulations, Awareness and Training

8.5.1. Computer Based Training

8.5.1.1. Aujas

8.5.1.2. BeOne Development

8.5.1.3. Digital Defense

8.5.1.4. Fishnet Security

8.5.1.5. Inspired eLearning

8.5.1.6. Junglemap

8.5.1.7. KnowBe4

8.5.1.8. MediaPro

8.5.1.9. PhishMe

8.5.1.10. Phishline

8.5.1.11. Popcorn Training

8.5.1.12. Sans Institute

8.5.1.13. Scipp International

8.5.1.14. Secure Mentem

8.5.1.15. Security Innovation

8.5.1.16. Security Mentor

8.5.1.17. The Security Awareness Company

8.5.1.18. ThreatSim

8.5.1.19. Wombat Security Technologies

8.5.2. Educational, Awareness & News Outlets

8.5.2.1. Government Led

8.5.2.1.1. Information Sharing and Analysis Centers (ISACs)

8.5.2.2. Periodicals & Target Roles

8.5.2.2.1. Channel

8.5.2.2.2. CISO/CSO

8.5.2.2.3. Security Engineers/Analysts

8.5.3. Industry Standards/Groups

8.5.3.1. Standards

8.5.3.1.1. Technical

8.5.3.2. Industry Groups

8.5.3.2.1. Audit

8.5.3.2.2. General Security

8.5.3.2.3. Forensics

8.5.4. Regulations, Public Standards and Contractual Mandates

8.5.4.1. Global

8.5.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)

8.5.4.1.2. NIST

8.5.4.2. Country/Region Specific

8.5.4.2.1. China

8.5.4.2.2. Singapore

8.5.4.2.3. European Union

8.5.4.2.4. United States

8.6. Security Policy and Response Orchaestration Platforms

8.6.1. FireEye

8.6.2. Phantom

8.6.2.1. https://www.phantom.us/

8.6.3. Proofpoint

8.7. Security Program and Governance

8.7.1. Governance, Risk and Compliance

8.7.1.1. eGRC

8.7.1.1.1. Software as a Service

8.7.1.1.2. Software

8.7.1.2. Compliance Oriented Private Cloud Hosting (COPCH)

8.7.1.2.1. Note: This list is not an attestation of compliance

8.7.1.3. Operational Risk Analytics

8.7.1.3.1. Algosec

8.7.1.3.2. Cyber Observer

8.7.1.3.3. Cytegic

8.7.1.3.4. Firemon

8.7.1.3.5. IBM

8.7.1.3.6. Redseal Networks

8.7.1.3.7. RiskIO

8.7.1.3.8. Skybox

8.7.1.3.9. Software Development Lifecycle

8.7.1.3.10. Solarwinds

8.7.1.3.11. Tufin

8.7.1.4. Cloud & Container Compliance Assessment

8.7.1.4.1. Cavirin

9. • Malicious apps

9.1. Cloud Service Brokerages

9.1.1. Bitnami

9.1.2. Ensim

9.1.2.1. http://www.ensim.com/

9.1.3. Gravitant

9.1.4. Jamcracker

9.1.4.1. http://www.jamcracker.com/

9.1.5. StandingCloud

9.2. Distribution/Channel/VARs

9.2.1. VARs, Resellers

9.2.1.1. China

9.2.1.1.1. Mainland China

9.2.1.1.2. Hong Kong

9.2.1.1.3. Taiwan

9.2.1.2. Emerging Asia Pacific

9.2.1.2.1. India

9.2.1.2.2. Indonesia

9.2.1.2.3. Malasia

9.2.1.2.4. Thailand

9.2.1.2.5. Philippines

9.2.1.3. Eurasia

9.2.1.3.1. Russian Federation

9.2.1.3.2. Kazakhstan

9.2.1.3.3. Ukraine

9.2.1.4. Europe

9.2.1.4.1. Eastern Europe

9.2.1.4.2. Western Europe

9.2.1.5. Latin America

9.2.1.5.1. Brazil

9.2.1.5.2. Chile

9.2.1.5.3. Columbia

9.2.1.5.4. Costa Rica

9.2.1.5.5. Ecuador

9.2.1.5.6. Bolivia

9.2.1.5.7. Venezuela

9.2.1.5.8. Cuba

9.2.1.5.9. Argentina

9.2.1.5.10. Buenos Aires

9.2.1.5.11. Mexico

9.2.1.5.12. Peru

9.2.1.6. Mature Asia Pacific

9.2.1.6.1. Australia

9.2.1.6.2. Japan

9.2.1.6.3. Singapore

9.2.1.7. Middle East and North Africa

9.2.1.7.1. Turkey

9.2.1.7.2. Israel

9.2.1.7.3. Saudi Arabia

9.2.1.7.4. South Africa

9.2.1.7.5. India

9.2.1.7.6. United Arab Emirates

9.2.1.8. North America

9.2.1.8.1. United States

9.2.1.8.2. Canada

9.2.1.9. Sub-Sahara Africa

9.2.1.9.1. South Africa

9.2.1.10. WorldWide

9.2.1.10.1. AT&T

9.2.1.10.2. BT

9.2.1.10.3. Optiv

9.2.1.10.4. SHI

9.2.1.10.5. Secureworks

9.2.1.10.6. Verizon Business

9.2.2. Distributors

9.2.2.1. China

9.2.2.1.1. AVNet

9.2.2.1.2. B & Data Technology Co. Ltd.

9.2.2.1.3. Beijing Advazone Electronic Limited Comp

9.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.

9.2.2.1.5. Digital China Technology LTD.

9.2.2.1.6. Ecs China

9.2.2.1.7. Edvance Technology (China) Limited

9.2.2.1.8. Huagai

9.2.2.1.9. M.Tech (Shanghai) Co., Ltd.

9.2.2.1.10. Shanghai S-I Information Tech. Ltd

9.2.2.1.11. Sinogrid Information Technology Ltd.

9.2.2.1.12. Sky Faith International Enterprise

9.2.2.2. Emerging Asia Pacific

9.2.2.2.1. India

9.2.2.2.2. Indonesia

9.2.2.2.3. Thailand

9.2.2.3. Eurasia

9.2.2.3.1. Russian Federation

9.2.2.3.2. Kazakhstan

9.2.2.4. Mature Asia Pacific

9.2.2.4.1. Singapore

9.2.2.4.2. Japan

9.2.2.4.3. South Korea

9.2.2.4.4. Australia

9.2.2.5. Middle East and South Africa

9.2.2.5.1. United Arab Emirates

9.2.2.5.2. South Africa

9.2.2.6. North America

9.2.2.6.1. Canada

9.2.2.6.2. United States

9.2.2.7. Sub-Sahara Africa

9.2.2.7.1. South Africa

9.2.2.8. Western Europe

9.2.2.8.1. United Kingdom

9.2.2.8.2. Germany

9.2.2.9. Worldwide

9.2.2.9.1. AVNet

9.2.2.9.2. Ingram Micro

9.2.2.9.3. LifeBoat Distribution

9.2.2.9.4. Tech Data

9.2.2.9.5. Westcon

9.2.2.10. Latin America

9.2.2.10.1. Mexico

9.2.2.10.2. Brazil

9.2.3. Reseller Programs

9.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm

9.2.4. Logistics/Deal Registration

9.2.4.1. Connectwise

9.3. Government Cyberwarrior (Personnel Estimates)

9.3.1. United States

9.3.1.1. NSA

9.3.1.1.1. Cyberwarrior Stats

9.3.1.2. Department of Defense

9.3.1.2.1. US Airforce

9.3.1.2.2. US Navy

9.3.1.2.3. DISA

9.3.2. Iran

9.3.2.1. 4500

9.3.3. Israel

9.3.3.1. Unit 8200

9.3.3.1.1. 5000

9.3.4. North Korea

9.3.4.1. 1000

9.4. Hardware and Chip Security

9.4.1. AMD

9.4.1.1. TPM

9.4.2. Cavium

9.4.2.1. Multi-Core Processors

9.4.3. Flow Processors

9.4.3.1. Netronome

9.4.4. Intel

9.4.4.1. TPM

9.4.4.2. Data Execution Protection

9.4.5. Systems

9.4.5.1. Janus Technologies

9.4.5.1.1. http://www.janustech.com/janus_secure_computer.html

9.5. Investment

9.5.1. ETFs

9.5.1.1. PureFunds

9.5.1.1.1. SYM:HACK

9.5.2. Venture Capitalists

9.5.2.1. Trident Capital

9.5.2.2. Andreesen Horowitz

9.6. Managed Service Enablement

9.6.1. Chartec

9.6.2. Jamcracker

9.7. Marketing/PR/AR

9.7.1. Analyst & Public Relations

9.7.1.1. Focused Image

9.7.1.1.1. http://www.focusedimage.com/

9.7.1.2. KTCpr

9.7.1.2.1. http://www.kahn-travel.com/

9.7.1.3. Madison Alexander PR

9.7.1.3.1. http://www.madisonalexanderpr.com/

9.7.1.4. Marc Gendron PR

9.7.1.4.1. http://www.mgpr.info/

9.7.1.5. Schwartz Communications

9.7.1.5.1. http://www.schwartzmsl.com/

9.7.1.6. Spalding Communications

9.7.1.7. Text 100

9.7.1.7.1. http://www.text100.com/

9.7.2. Campaign/Engagement

9.7.2.1. WCG World

9.7.2.1.1. http://wcgworld.com/

9.7.3. Creative/Design Services

9.7.3.1. Duarte

9.7.3.1.1. http://www.duarte.com/

9.7.3.2. Gig Productions

9.7.3.2.1. http://www.gigpros.com/index.php

9.7.3.3. Initiate Marketing

9.7.3.3.1. http://www.getinitiated.ca/

9.7.3.4. MN8Studio

9.7.3.4.1. http://www.mn8studio.com/

9.7.3.5. Text 100

9.7.3.5.1. http://www.text100.com/

9.7.4. Web Site Design

9.7.4.1. Baytech Web Design

9.7.4.1.1. http://www.baytechwebdesign.com/

9.7.4.2. EU Design Studios

9.7.4.2.1. http://eudesignstudio.com/

9.7.4.3. Pro Logic Web Services

9.7.4.3.1. http://www.prologicsoft.com/

9.7.5. Market Destinations (Sites)

9.7.5.1. CRN

9.7.5.2. Hak5

9.7.5.3. MSPMentor

9.7.5.4. Madison Logic

9.7.5.5. SCmagazine

9.7.5.6. TheVarGuy

9.7.6. Marketing Videos

9.7.6.1. Epipheo

9.7.6.1.1. http://www.epipheo.com/

9.7.7. Marketing/Branding Agencies

9.7.7.1. Focused Image

9.7.7.1.1. http://www.focusedimage.com/branding/

9.7.7.2. Hill and Knowlton

9.7.7.2.1. http://www.hkstrategies.com/

9.7.7.3. MetaDesign

9.7.7.3.1. http://www.metadesign.com/san-francisco

9.7.7.4. Ogilvy & Mather

9.7.7.5. Tailfin Marketing Communications

9.7.7.6. Toolbox Studios

9.8. Product Testing

9.8.1. Generic Product Testing, Certification and Accreditation

9.8.1.1. Certifications

9.8.1.1.1. North America

9.8.1.1.2. European Union

9.8.1.2. Testing

9.8.1.2.1. United Kingdom

9.8.1.2.2. North America

9.8.1.2.3. Singapore

9.8.1.3. Accreditation

9.8.1.3.1. DOD

9.8.1.3.2. NSA

9.8.2. Anti-Malware Testing

9.8.2.1. AMTSO

9.8.2.2. AV-Test

9.8.2.3. Av-Comparatives

9.8.2.4. MRG Effitas

9.8.2.5. VirusBTN

9.8.3. Sponsored Product Review/Testing

9.8.3.1. Delta Testing LTD

9.8.3.2. Dennis Labs

9.8.3.3. Miercom

9.8.3.4. NSS Labs

9.8.3.5. Network Testing Labs

9.8.3.6. Tolly Group

9.8.3.7. West Coast Labs

9.8.4. Antimalware Standards Bodies

9.8.4.1. AMTSO

9.8.4.1.1. http://www.amtso.org/

9.9. Cloud Service Brokerages

9.10. Security Conferences

9.10.1. North America

9.10.1.1. United States

9.10.1.1.1. RSA

9.10.1.1.2. Gartner

9.10.1.1.3. Cornerstones of Trust

9.10.1.1.4. Annual Security Conference

9.10.1.1.5. SecurityBsides

9.10.1.1.6. ShmooCon

9.10.2. Europe

9.10.2.1. United Kingdom

9.10.2.1.1. RSA Conference

9.10.2.1.2. Gartner

9.10.2.2. Russia

9.10.2.2.1. Infosecurity Russia

9.10.3. Emerging Asia Pacific

9.10.4. Mature Asia Pacific

9.10.4.1. Australia

9.10.4.1.1. Gartner

9.10.4.2. Singapore

9.10.4.2.1. RSA

9.11. Staffing/Recruiting/Executive Search

9.11.1. Millard Group

9.11.2. Lynch Bowie Group

9.11.3. Robert Half

9.12. User Interface Design

9.12.1. Consulting

9.12.1.1. User Interface

9.12.1.1.1. BlinkUX

9.12.1.1.2. Sasa Technologies

9.12.1.1.3. Dabapps

9.12.1.2. Customer Survey

9.12.1.2.1. Techvalidate

9.12.2. HTML5 Visualization Libraries

9.12.2.1. Data-Driven Documents

9.12.2.1.1. http://d3js.org/

9.12.2.2. AngularJS

9.12.2.2.1. https://angularjs.org/

9.12.3. Icons

9.12.3.1. IconExperience

9.12.3.1.1. https://www.iconexperience.com/

9.12.3.2. FlatIcon

9.12.3.2.1. http://www.flaticon.com/packs/general-ui

9.12.3.3. ModernUIicons

9.12.3.3.1. http://modernuiicons.com/

9.12.3.4. Ui8

9.12.3.4.1. https://ui8.net/categories/icons

10. • Spyware

10.1. Direct Tech Providers Managed Security

10.1.1. Asia Pacific

10.1.1.1. Australia

10.1.1.2. China

10.1.1.2.1. NSFOCUS

10.1.1.3. Singapore

10.1.2. Europe

10.1.2.1. GoGrid

10.1.2.1.1. Compliance Reporting (PCI, HIPAA)

10.1.2.1.2. Host IDS

10.1.2.1.3. Log Management

10.1.2.1.4. SIEM

10.1.2.1.5. Vulnerability Assessment

10.1.3. Global Providers

10.1.4. Middle East and North Africa

10.1.4.1. Saudi Arabia

10.1.4.2. United Arab Emirates

10.1.5. North America

10.1.5.1. United States

10.1.5.1.1. NSFOCUS

10.1.5.1.2. Check Point Software

10.1.5.1.3. Network Box

10.1.5.1.4. GoGrid

10.1.5.1.5. FireEye

10.1.5.1.6. Rapid7

10.2. Indirect Providers

10.2.1. Emerging Asia Pacific

10.2.1.1. India

10.2.1.1.1. CSS Corp PVT

10.2.1.1.2. Happiest Minds

10.2.1.1.3. SunGard Availability Services

10.2.1.1.4. Ecomnets India PVT. LTD

10.2.2. Europe

10.2.2.1. BT Global Services

10.2.2.2. Dell SecureWorks

10.2.2.3. Germany

10.2.2.3.1. Link11 GMBH

10.2.2.3.2. IPsoft

10.2.2.4. HP

10.2.2.5. Happiest Minds

10.2.2.5.1. Advanced Malware Protection

10.2.2.5.2. Application Activity Monitoring

10.2.2.5.3. Compliance Reporting

10.2.2.5.4. Database Activity Monitoring

10.2.2.5.5. File Integrity Monitoring

10.2.2.5.6. Log Management

10.2.2.5.7. Managed DLP

10.2.2.5.8. Network Forensics

10.2.2.5.9. SIEM

10.2.2.5.10. Unified Threat Management

10.2.2.5.11. Vulnerability Assessment

10.2.2.6. Integralis

10.2.2.7. Navisite

10.2.2.7.1. Mobile Device Management

10.2.2.8. Open Systems

10.2.2.9. Open Systems

10.2.2.10. Orange Business Services

10.2.2.11. SecureData

10.2.2.11.1. Firewall

10.2.2.11.2. IDS/IPS

10.2.2.11.3. SIEM

10.2.2.11.4. Data Loss Prevention

10.2.2.11.5. Secure Web Gateway

10.2.2.11.6. Secure Email Gateway

10.2.2.11.7. VPN/Remote Access

10.2.2.12. SunGard Availability Services

10.2.2.12.1. Firewalls

10.2.2.12.2. IAM

10.2.2.12.3. Intrusion Prevention

10.2.2.12.4. SIEM

10.2.2.12.5. Unified Threat Management

10.2.2.12.6. VPN

10.2.2.12.7. Web Application Firewall

10.2.2.13. Symantec

10.2.2.14. T-Systems

10.2.2.15. Tata Communications

10.2.2.16. Telefonica

10.2.2.16.1. DDoS Protection Service

10.2.2.16.2. Email Encryption

10.2.2.16.3. Email Security Gateway

10.2.2.16.4. Firewall Management

10.2.2.16.5. IAM

10.2.2.16.6. Intrusion Detection

10.2.2.16.7. Intrusion Prevention

10.2.2.16.8. Log Management

10.2.2.16.9. SIEM

10.2.2.16.10. Vulnerability Assessment

10.2.2.16.11. Web Security Gateway

10.2.2.16.12. Anti-Fraud

10.2.2.17. Verizon Business

10.2.2.17.1. Anti-DDoS

10.2.2.17.2. Email Security

10.2.2.17.3. Endpoint Protection

10.2.2.17.4. Firewall Management

10.2.2.17.5. Intrusion Detection

10.2.2.17.6. Intrusion Prevention

10.2.2.17.7. SIEM

10.2.2.17.8. Vulnerability Assessment

10.2.2.17.9. Web Security

10.2.2.18. Wipro

10.2.2.18.1. Email Security Gateway

10.2.2.18.2. Endpoint Security

10.2.2.18.3. Firewall Management

10.2.2.18.4. Fraud Management/Anti-Money Laundering

10.2.2.18.5. GRC

10.2.2.18.6. IAM

10.2.2.18.7. Intrusion Detection

10.2.2.18.8. Intrusion Prevention

10.2.2.18.9. SIEM

10.2.2.18.10. User Access Management

10.2.2.18.11. Web Security Gateway

10.2.3. Global Providers

10.2.3.1. AT&T

10.2.3.1.1. DDos Protection

10.2.3.1.2. Email/Data Encryption Services

10.2.3.1.3. Endpoint Anti-Virus

10.2.3.1.4. Endpoint Patch Management

10.2.3.1.5. Endpoint Policy Compliance

10.2.3.1.6. Mobile Device Security

10.2.3.1.7. Secure Email Gateway

10.2.3.1.8. Security Device Management

10.2.3.1.9. Web Application Firewall

10.2.3.1.10. Web Gateway (URL & Malware Filtering)

10.2.3.2. BEW Global

10.2.3.2.1. Data Loss Prevention

10.2.3.2.2. Web Security Gateway

10.2.3.2.3. Email Security Gateway

10.2.3.2.4. SIEM

10.2.3.2.5. Vulnerability Assessment

10.2.3.3. BT

10.2.3.4. Dell Secureworks

10.2.3.4.1. Advanced Malware Protection

10.2.3.4.2. Email Security Gateway

10.2.3.4.3. Firewall Management

10.2.3.4.4. Host IPS

10.2.3.4.5. IDS/IPS

10.2.3.4.6. Log Management

10.2.3.4.7. Log Retention

10.2.3.4.8. SIEM

10.2.3.4.9. Threat Intelligence

10.2.3.4.10. Unified Threat Management

10.2.3.4.11. Vulnerability Assessment

10.2.3.4.12. Web Application Firewall

10.2.3.4.13. Web Application Vulnerability Assessment

10.2.3.5. Dimension Data

10.2.3.6. HP

10.2.3.6.1. Access Managment

10.2.3.6.2. Data Loss Prevention

10.2.3.6.3. Email Security Gateway

10.2.3.6.4. Endpoint Encryption

10.2.3.6.5. Endpoint Protection

10.2.3.6.6. Intrusion Detection

10.2.3.6.7. Intrusion Prevention

10.2.3.6.8. Managed Incident Response

10.2.3.6.9. Remote Access Management

10.2.3.6.10. SIEM

10.2.3.6.11. Vulnerability Assessment

10.2.3.6.12. Web Application Vulnerability Assessment

10.2.3.6.13. Web Security Gateway

10.2.3.7. IBM

10.2.3.7.1. Email Security Gateway

10.2.3.7.2. Endpoint Patch Management

10.2.3.7.3. Endpoint Policy Management

10.2.3.7.4. Endpoint Protection

10.2.3.7.5. Firewall Management

10.2.3.7.6. IAM

10.2.3.7.7. Intrusion Detection

10.2.3.7.8. Intrusion Prevention

10.2.3.7.9. Log Management

10.2.3.7.10. Mobile Device Security

10.2.3.7.11. SIEM

10.2.3.7.12. Unified Threat Management

10.2.3.7.13. Vulnerability Assessment

10.2.3.7.14. Web Security Gateway

10.2.3.7.15. Web Vulnerability Assessment

10.2.3.8. Proficio

10.2.3.8.1. Email Security

10.2.3.8.2. Firewall Management

10.2.3.8.3. Incident Response

10.2.3.8.4. Log Management

10.2.3.8.5. Privileged Account Management

10.2.3.8.6. Regulatory and Polcy Compliance

10.2.3.8.7. SIEM

10.2.3.8.8. SOC Services

10.2.3.8.9. Vulnerability Assessment

10.2.3.8.10. Web Security

10.2.3.9. Tech Mahindra

10.2.3.9.1. Email Security

10.2.3.9.2. Endpoint Protection

10.2.3.9.3. Firewall Management

10.2.3.9.4. Identity and Access Management

10.2.3.9.5. Intrusion Detection

10.2.3.9.6. Intrusion Prevention

10.2.3.9.7. Log Management

10.2.3.9.8. SIEM

10.2.3.9.9. SOC Services

10.2.3.9.10. Vulnerability Assessment

10.2.3.9.11. Web Security

10.2.3.10. Telstra

10.2.3.11. Verizon Business

10.2.3.11.1. Anti-DDoS

10.2.3.11.2. Email Security

10.2.3.11.3. Endpoint Protection

10.2.3.11.4. Firewall Management

10.2.3.11.5. Intrusion Detection

10.2.3.11.6. Intrusion Prevention

10.2.3.11.7. SIEM

10.2.3.11.8. Vulnerability Assessment

10.2.3.11.9. Web Security

10.2.4. Greater China

10.2.4.1. Hong Kong

10.2.4.1.1. Network Box

10.2.4.1.2. Netswitch

10.2.4.2. BEW Global

10.2.4.2.1. Data Loss Prevention

10.2.4.2.2. Web Security Gateway

10.2.4.2.3. Email Security Gateway

10.2.4.2.4. SIEM

10.2.4.2.5. Vulnerability Assessment

10.2.4.3. Beijing

10.2.4.3.1. Netswitch

10.2.4.4. Shanghai

10.2.4.4.1. Shanghai Data Solution Co., Ltd

10.2.5. Latin America

10.2.5.1. Brazil

10.2.5.1.1. Arcon

10.2.5.1.2. Netcentrics

10.2.5.1.3. RealProtect

10.2.5.1.4. UOL Diveo

10.2.6. Mature Asia Pacific

10.2.6.1. Australia

10.2.6.1.1. Tesserent

10.2.6.1.2. Verizon

10.2.6.2. Singapore

10.2.6.2.1. Quann

10.2.6.2.2. NTT Singapore

10.2.6.2.3. Happiest Minds

10.2.6.2.4. Singtel

10.2.6.2.5. NCS Group

10.2.7. Middle East and North Africa

10.2.7.1. Saudi Arabia

10.2.7.2. United Arab Emirates

10.2.7.2.1. Du Telecom

10.2.7.2.2. Tata Communications

10.2.7.2.3. Dell Secureworks

10.2.7.2.4. Dimension Data

10.2.8. North America

10.2.8.1. Canada

10.2.8.1.1. Above Security

10.2.8.1.2. Bell Canada

10.2.8.1.3. EWA

10.2.8.1.4. Happiest Minds

10.2.8.1.5. Netpulse

10.2.8.1.6. OneStone (Formerly Seccuris)

10.2.8.1.7. SecureData

10.2.8.1.8. SentryMetrics

10.2.8.1.9. SunGard Availability Services

10.2.8.1.10. Virtual Guardian

10.2.8.2. United States

10.2.8.2.1. AT&T

10.2.8.2.2. Above Security

10.2.8.2.3. Alert Logic

10.2.8.2.4. Allstream

10.2.8.2.5. CGI

10.2.8.2.6. CSC

10.2.8.2.7. CSS Corp

10.2.8.2.8. CentraComm

10.2.8.2.9. CenturyLink- Savvis

10.2.8.2.10. Clone Systems

10.2.8.2.11. Compucom Systems

10.2.8.2.12. Cosentry

10.2.8.2.13. Dell Secureworks

10.2.8.2.14. Earthlink

10.2.8.2.15. Esentire

10.2.8.2.16. HCL Technologies

10.2.8.2.17. HP

10.2.8.2.18. Happiest Minds

10.2.8.2.19. IBM

10.2.8.2.20. Intelisecure

10.2.8.2.21. Leidos

10.2.8.2.22. LunarLine

10.2.8.2.23. Masergy Communications

10.2.8.2.24. Megapath

10.2.8.2.25. Morphick

10.2.8.2.26. My Digital Shield

10.2.8.2.27. NCA - Network Computing Architects

10.2.8.2.28. Navisite

10.2.8.2.29. Netfortris

10.2.8.2.30. Netswitch

10.2.8.2.31. Nuspire Networks

10.2.8.2.32. Rook Security

10.2.8.2.33. Secure Designs

10.2.8.2.34. SilverSky (Formerly Stillsecure/Perimeter esecurity)

10.2.8.2.35. Solutionary

10.2.8.2.36. SunGard Availability Services

10.2.8.2.37. Sword and Shield

10.2.8.2.38. Symantec

10.2.8.2.39. Symantec

10.2.8.2.40. Syntegrity Networks

10.2.8.2.41. Tesserent

10.2.8.2.42. Trustwave

10.2.8.2.43. Verizon Business

10.2.8.2.44. Wipro

10.2.9. Sub-Sahara Africa

10.2.9.1. AccessKenya

10.2.9.1.1. Firewall

10.2.9.1.2. Endpoint Protection

10.2.9.1.3. Secure Web Gateway

11. • Privacy Threats

11.1. Digital Forensics/eDiscovery

11.1.1. Content, File and Endpoint Forensics

11.1.1.1. eDiscovery

11.1.1.1.1. Clearwell

11.1.1.1.2. Kazeon

11.1.1.1.3. Guidance Software

11.1.1.1.4. Access Data

11.1.1.1.5. Autonomy

11.1.1.1.6. kCura

11.1.1.1.7. FTI Technology

11.1.1.1.8. Barracuda Networks

11.1.1.2. Mobile Devices

11.1.1.2.1. BlackBagTech

11.1.1.2.2. Cellebrite

11.1.1.2.3. Compelson Labs

11.1.1.2.4. Guidance Software

11.1.1.2.5. MSAB

11.1.1.2.6. NowSecure

11.1.1.2.7. Oxygen Forensics

11.1.1.2.8. Paraben Corporation

11.1.1.3. Endpoint Computing Systems

11.1.1.3.1. ADF Solutions

11.1.1.3.2. Access Data

11.1.1.3.3. ArxSys

11.1.1.3.4. BlackBag Technologies

11.1.1.3.5. CRU Inc

11.1.1.3.6. Cyfir

11.1.1.3.7. Guidance Software

11.1.1.3.8. Magnet Forensics

11.1.1.3.9. Nuix

11.1.1.3.10. OSForensics

11.1.1.3.11. Paraben Corporation

11.1.1.3.12. WindowsScope

11.1.1.3.13. X-Ways Forensics

11.1.1.4. Email Examination

11.1.1.4.1. Systools Software

11.1.1.4.2. Nuix

11.1.1.5. Forensic File & Data Analysis Tools

11.1.1.5.1. Cellebrite

11.1.1.5.2. Cyfir

11.1.1.5.3. Intella

11.1.1.5.4. Magnet Forensics

11.1.1.5.5. Nuix

11.1.1.5.6. Systools Software

11.1.1.6. Digital Forensics Case Management

11.1.1.6.1. D3 Security

11.1.1.6.2. Digital Investigation Manager

11.1.1.6.3. Guidance Software

11.1.1.6.4. Intaforensiscs

11.1.1.6.5. Sentinel Data

11.1.1.6.6. Sirentech

11.1.1.6.7. Wynyard Group

11.1.1.7. Memory Forensics

11.1.1.7.1. FireEye

11.1.1.7.2. Guidance Software

11.1.1.7.3. Volatility Framework

11.1.1.7.4. WindowsScope

11.1.2. eDiscovery Services

11.1.2.1. Robert Half

11.1.2.2. Advanced Discovery

11.1.3. eDiscovery Software

11.1.3.1. AccessData

11.1.3.2. Guidance Software

11.1.3.3. Nuix

11.1.3.4. Symantec

11.2. Fraud Prevention/Web Malware Monitoring

11.2.1. Fraud/Bot/Webscrape Prevention

11.2.1.1. Software

11.2.1.1.1. IBM (Formerly Trusteer)

11.2.1.1.2. Intellinx

11.2.1.1.3. RSA (EMC)

11.2.1.1.4. ShieldSquare

11.2.1.2. Appliances

11.2.1.2.1. Distil Networks

11.2.1.2.2. Imperva

11.2.1.2.3. RSA

11.2.1.2.4. Shape Security

11.2.1.2.5. White Ops

11.2.1.3. Software as a Service

11.2.1.3.1. Akamai

11.2.1.3.2. BioCatch

11.2.1.3.3. BotScout

11.2.1.3.4. Distil Networks

11.2.1.3.5. Guardian Analytics

11.2.1.3.6. Kount

11.2.1.3.7. MarkMonitor

11.2.1.3.8. NuData Security

11.2.1.3.9. Shape Security

11.2.1.3.10. ShieldSquare

11.2.1.3.11. ThreatMetrix

11.2.1.3.12. White Ops

11.2.1.3.13. X-Cart

11.2.1.3.14. iovation

11.2.1.4. Virtual Appliances

11.2.1.4.1. Distil Networks

11.2.1.4.2. Imperva

11.2.2. Website & Ad Malware Monitoring

11.2.2.1. Ad-Juster

11.2.2.2. Globalsign

11.2.2.2.1. Leverages Hackalert

11.2.2.3. Hackalert

11.2.2.4. Intel Security

11.2.2.4.1. Siteadvisor

11.2.2.5. QualysGuard

11.2.2.6. RiskIQ

11.2.2.7. Sucuri

11.2.2.8. The Media Trust

11.3. Incident Response Legal Services

11.3.1. Information Law Group

11.4. Security Information and Event Management (SIEM), Log Management & Analytics

11.4.1. Application Security Intelligence Engine

11.4.1.1. SAP

11.4.1.1.1. iT-Cube Systems

11.4.2. Log Management

11.4.2.1. EventTracker

11.4.2.2. IGLOO Security

11.4.2.3. Intel Security

11.4.2.3.1. McAfee Enterprise Log Manager

11.4.2.4. Kiwi Syslog Server

11.4.2.5. LogEntries

11.4.2.6. LogRythm

11.4.2.7. Logscape

11.4.2.8. Open Source

11.4.2.8.1. Elasticsearch (ELK Stack)

11.4.2.8.2. SEC (Simple Event Correlator)

11.4.2.8.3. OSSIM

11.4.2.8.4. Syslog-NG

11.4.2.8.5. Octopussy

11.4.2.9. Sawmill

11.4.2.10. Splunk

11.4.2.11. Sumo Logic

11.4.2.12. Tripwire

11.4.2.13. XpoLog

11.4.3. SIEM

11.4.3.1. AlienVault

11.4.3.1.1. OSSIM

11.4.3.2. CorreLog

11.4.3.3. EventTracker

11.4.3.4. Fortinet

11.4.3.5. HP

11.4.3.5.1. Arcsight

11.4.3.6. Hexis Cyber Solutions

11.4.3.6.1. Hawkeye AP

11.4.3.7. IBM

11.4.3.7.1. Q1Radar

11.4.3.8. IGLOO Security

11.4.3.9. Intel Security

11.4.3.9.1. NitroSecurity

11.4.3.10. LogPoint

11.4.3.10.1. http://www.logpoint.com/en/

11.4.3.11. LogRythm

11.4.3.12. Novell

11.4.3.12.1. Sentinel

11.4.3.13. RSA

11.4.3.13.1. Envision

11.4.3.14. Sensage

11.4.3.15. Solarwinds

11.4.3.16. Splunk

11.4.3.17. Sqrrl

11.4.3.18. Tibco

11.4.3.18.1. Loglogic

11.4.3.19. eIQnetworks

11.4.4. Security Analytics

11.4.4.1. Anomaly Analytics

11.4.4.1.1. Intel

11.4.4.1.2. Theta Ray

11.4.4.1.3. Prelert

11.4.4.1.4. eMite

11.4.4.2. User and Entity Behavior Analytics (UEBA)

11.4.4.2.1. Bay Dynamics

11.4.4.2.2. Darktrace

11.4.4.2.3. Detex Systems

11.4.4.2.4. Exabeam

11.4.4.2.5. Fortscale

11.4.4.2.6. Gurcul

11.4.4.2.7. HP

11.4.4.2.8. IBM

11.4.4.2.9. Interset

11.4.4.2.10. Microsoft

11.4.4.2.11. Niara

11.4.4.2.12. ObserveIT

11.4.4.2.13. Palerra

11.4.4.2.14. Platfora

11.4.4.2.15. Reveelium

11.4.4.2.16. Secureonix

11.4.4.2.17. Veriato

11.4.5. User and Entity Behavior Analytics (UEBA)

11.4.5.1. Bae Systems Applied Intelligence

11.4.5.2. Bay Dynamics

11.4.5.3. Caspida

11.4.5.4. Click Security

11.4.5.5. Exabeam

11.4.5.6. FICO

11.4.5.7. Fortscale

11.4.5.8. GuruCul

11.4.5.9. IBM

11.4.5.10. Intellinx

11.4.5.11. Lockheed Martin

11.4.5.12. Logtrust

11.4.5.13. Mobile System 7

11.4.5.14. Novetta Solutions

11.4.5.15. Oracle

11.4.5.16. Rapid7

11.4.5.17. Raytheon

11.4.5.18. SAS Institute

11.4.5.19. Secureonix

11.4.5.20. Splunk

11.5. Security Operations, Analytics and Reporting (SOAR)

11.5.1. Security Incident Response Platforms (SIRP)

11.5.1.1. Agiliance

11.5.1.2. DFLabs

11.5.1.3. Demisto

11.5.1.4. EMC(RSA)

11.5.1.5. Empow

11.5.1.6. Fido

11.5.1.7. Hexadite

11.5.1.8. ID Experts

11.5.1.9. Proofpoint

11.5.1.10. Resilient Systems

11.5.1.11. Siemplify

11.5.1.12. Syncurity

11.5.2. Threat and Vulnerability Management (TVM)

11.5.2.1. Acuity Risk Management

11.5.2.2. Agiliance

11.5.2.3. BeyondTrust

11.5.2.4. Core Security

11.5.2.5. Cybersponse

11.5.2.6. DFLabs

11.5.2.7. EMC(RSA)

11.5.2.8. Kenna Security

11.5.2.9. NopSec

11.5.2.10. RedSeal

11.5.2.11. RiskSense

11.5.2.12. Skybox Security

11.5.2.13. Swimlane

11.5.2.14. Siemplify

11.5.3. Security Operations Analytics

11.5.3.1. Ayehu

11.5.3.2. Cybersponse

11.5.3.3. DFLabs

11.5.3.4. EMC(RSA)

11.5.3.5. Hexadite

11.5.3.6. Proofpoint

11.5.3.7. Resilient Systems

11.5.3.8. Siemplify

11.5.3.9. Swimlane

11.5.4. Security Operations Automation Platforms (SOAPS)

11.5.4.1. Ayehu

11.5.4.2. Cyberbit

11.5.4.3. Cybersponse

11.5.4.4. DFLabs

11.5.4.5. Demisto

11.5.4.6. Fireye

11.5.4.7. Hexadite

11.5.4.8. IBM

11.5.4.9. Phantom Cyber

11.5.4.10. Swimlane

11.5.4.11. Syncurity

11.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

11.6.1. Crowdsourced Application Security Testing Platforms

11.6.1.1. Hyver

11.6.1.2. Applause

11.6.1.3. Bugcrowd

11.6.1.4. BugFinders

11.6.1.5. Cobalt

11.6.1.6. Crowdtesters

11.6.1.7. HackerOne

11.6.2. Managed Penetration Testing Services

11.6.2.1. Cenzic

11.6.2.2. WhiteHatSecurity

11.6.3. Penetration Testing Software

11.6.3.1. Core Security

11.6.3.2. Rapid7

11.6.3.2.1. Metasploit Pro

11.6.3.2.2. Metasploit Express

11.6.3.3. Trustwave

11.6.4. Vulnerability Assessment

11.6.4.1. Software as a Service

11.6.4.1.1. Vulnerability Management

11.6.4.1.2. Phish Testing/Management

11.6.4.2. Network-Based Vulnerability Assessment (On Premise)

11.6.4.2.1. Core Security

11.6.4.2.2. Digital Defense

11.6.4.2.3. Fortinet

11.6.4.2.4. Intel Security

11.6.4.2.5. NSAuditor

11.6.4.2.6. Ncircle

11.6.4.2.7. Netasq

11.6.4.2.8. Outpost24

11.6.4.2.9. Qualys

11.6.4.2.10. RandomStorm

11.6.4.2.11. Rapid 7

11.6.4.2.12. Trustwave

11.6.4.3. Agent-Based Vulnerability Assessment

11.6.4.3.1. BeyondTrust

11.6.4.3.2. Qualys

11.6.4.3.3. Secunia

11.6.4.3.4. Tenable

11.6.4.4. Mainframe Vulnerability Assessment

11.6.4.4.1. Key Resources Inc. (KRI)

11.6.5. Vulnerability Correlation

11.6.5.1. Application Vulnerability Correlation

11.6.5.1.1. Code DX

11.6.5.1.2. Denim Group

11.6.5.1.3. Kenna Security

11.6.5.1.4. NopSec

11.6.5.2. Network Vulnerability Correlation

11.6.5.2.1. Secure Decisions

11.6.5.2.2. RiskSense

11.6.5.2.3. NopSec

11.6.5.2.4. Kenna Security

11.6.5.2.5. Cybric

11.6.6. Vulnerability Research

11.6.6.1. CSC

11.6.6.2. HP

11.6.6.2.1. DV Labs

11.6.6.3. HotWAN

11.6.6.4. Intel Security

11.6.6.5. SecNiche Labs

11.6.6.6. Sourcefire VRT

11.6.6.7. Symantec

11.6.6.8. VRLSec

11.6.6.9. Vupen