
1. Web Application Firewalls
1.1. Virtualized Appliances
1.1.1. A10 Networks
1.1.2. AlertLogic
1.1.3. Amazon AWS
1.1.3.1. Riverbed
1.1.4. Barracuda Networks
1.1.5. BeeWare
1.1.6. DenyAll
1.1.7. Ergon Informatik AG
1.1.8. F5
1.1.9. Fortinet
1.1.10. Forum Systems
1.1.11. Imperva
1.1.12. PentaSecurity
1.1.13. Trustwave
1.1.14. Citrix
1.1.14.1. Netscaler VPX
1.1.14.1.1. https://www.citrix.com/products/netscaler-application-delivery-controller/platforms.html
1.2. Physical Appliances
1.2.1. A10 Networks
1.2.2. AdNovum
1.2.3. AlertLogic
1.2.4. Anchiva
1.2.5. Barracuda Networks
1.2.6. BeeWare
1.2.7. BugSec
1.2.8. Citrix
1.2.9. DBAPPSecurity
1.2.10. DPtech
1.2.11. Dell Sonicwall
1.2.12. DenyAll
1.2.13. Ergon Informatik
1.2.13.1. https://www.airlock.com/en/products/airlock-waf/
1.2.14. F5
1.2.15. Fortinet
1.2.16. Forum Systems
1.2.17. HP
1.2.18. Imperva
1.2.19. NSFocus
1.2.20. PentaSecurity
1.2.21. Positive Technologies
1.2.21.1. http://www.ptsecurity.com/products/af/
1.2.22. RadWare
1.2.23. Trustwave
1.2.24. WINS TECHNET LTD
1.2.24.1. http://www.wins21.co.kr/
1.3. Software
1.3.1. Dedicated Software
1.3.1.1. AdNovum
1.3.1.2. Applicure
1.3.1.2.1. http://www.applicure.com/Products/dotdefender
1.3.1.3. DenyAll
1.3.1.4. ERGON Informatik AG
1.3.1.4.1. AIRLOCK
1.3.1.5. Forum Systems
1.3.1.6. Positive Security
1.3.1.7. Riverbed
1.3.1.8. Trustifier
1.3.1.8.1. https://www.trustifier.com/f/#!overview
1.3.1.9. WebScurity
1.3.2. Open Source
1.3.2.1. IronBee
1.3.2.2. Mod Security
1.3.3. Web Server Modules
1.3.3.1. Microsoft IIS
1.3.3.1.1. AQTRONIX
1.3.3.1.2. Applicure
1.3.3.1.3. BeyondTrust
1.3.3.1.4. ThreatSentry
1.3.3.2. Apache
1.3.3.2.1. Applicure
1.4. Managed Services
1.4.1. Dell Secureworks
1.4.2. AT&T
1.4.3. Verizon Business
1.5. Software as a Service
1.5.1. Akamai
1.5.1.1. Kona
1.5.2. AlertLogic
1.5.3. Anquanbao
1.5.4. ArmorLogic
1.5.5. BinarySec
1.5.6. CloudFlare
1.5.7. DenyAll
1.5.7.1. http://www.denyall.com/products/web-application-firewall/
1.5.8. FireBlade
1.5.9. Imperva (Incapsula)
1.5.9.1. http://www.incapsula.com
1.5.10. Incapsula
1.5.11. PowerCDN
1.5.12. Qualys
1.5.13. Securi
1.5.14. Signal Sciences
1.5.15. Soha
1.5.15.1. http://soha.io/
1.5.16. ZenEdge
2. Endpoint Security
2.1. Anti-Malware
2.1.1. Eastern Europe
2.1.1.1. Czech Republic
2.1.1.1.1. Avast
2.1.1.1.2. TrustPort
2.1.1.2. Denmark
2.1.1.2.1. BullGuard
2.1.1.3. Netherlands
2.1.1.3.1. AVG
2.1.1.4. Romania
2.1.1.4.1. Bitdefender
2.1.1.5. Slovakia
2.1.1.5.1. ESET
2.1.2. Emerging Asia/Pacific
2.1.2.1. India
2.1.2.1.1. eScan
2.1.2.1.2. K7 Computing
2.1.3. Latin America
2.1.3.1. Spain
2.1.3.1.1. Optenet
2.1.4. Mature Asia/Pacific
2.1.4.1. China
2.1.4.1.1. Qihoo
2.1.4.1.2. Rising International Software
2.1.4.2. South Korean
2.1.4.2.1. AhnLab
2.1.4.2.2. BKAV
2.1.4.2.3. ESTsoft
2.1.5. Middle East and Africa
2.1.5.1. Israel
2.1.5.1.1. Check Point Software
2.1.6. North America
2.1.6.1. Cyren
2.1.6.2. Fortinet
2.1.6.3. Intel Security
2.1.6.4. MalwareBytes
2.1.6.5. McAfee
2.1.6.6. Microsoft
2.1.6.7. PC Pitstop
2.1.6.8. Reason Core Security
2.1.6.9. Roboscan
2.1.6.10. Symantec
2.1.6.11. ThreatTrack
2.1.6.12. Total Defense
2.1.6.13. Trend Micro
2.1.7. Russia
2.1.7.1. Kaspersky
2.1.8. Western Europe
2.1.8.1. Austria
2.1.8.1.1. Ikarus Security
2.1.8.2. Finland
2.1.8.2.1. F-Secure
2.1.8.3. Germany
2.1.8.3.1. Avira
2.1.8.3.2. G-Data
2.1.8.3.3. Kromtech
2.1.8.4. Norway
2.1.8.4.1. Norman
2.1.8.5. United Kingdom
2.1.8.5.1. Sophos
2.1.8.6. Poland
2.1.8.6.1. Arcabit
2.2. Application Isolation
2.2.1. Blue Ridge Networks
2.2.1.1. http://www.blueridge.com/index.php/products/appguard/consumer
2.2.2. Bromium
2.2.3. Bufferzone
2.2.4. Invincea
2.2.4.1. SandBoxie
2.2.5. VMware
2.3. Endpoint Sandboxes and Virtualized Containers
2.3.1. Endpoint Sandboxes
2.3.1.1. Panda
2.3.1.1.1. www.panda.com
2.3.1.2. Sandboxie
2.3.1.2.1. http://www.sandboxie.com/
2.3.1.3. Bitdefender
2.3.1.3.1. www.bitdefender.com
2.3.2. Type-0 Hypervisors
2.3.2.1. Lynxworks
2.3.2.1.1. http://www.lynuxworks.com/
2.3.2.2. Zirtu
2.3.3. Process Isolation/Virtualization
2.3.3.1. Avectco
2.3.3.2. Bromium
2.3.3.3. Invincea
2.4. Endpoint Intrusion Prevention
2.4.1. Arkoon
2.4.1.1. StormShield
2.4.2. BeyondTrust
2.4.3. IBM
2.4.4. Landesk
2.4.5. McAfee
2.4.6. Safensoft
2.4.7. Symantec
2.5. Enterprise Mobility Mangement Suites
2.5.1. Absolute Software
2.5.2. AMware
2.5.2.1. Airwatch
2.5.3. Blackberry
2.5.4. Citrix
2.5.5. Globo
2.5.6. Good Technologies
2.5.7. IBM
2.5.8. Landesk
2.5.9. MobileIron
2.5.10. Mojave
2.5.10.1. https://www.mojave.net/
2.5.11. SAP
2.5.12. Sophos
2.5.13. Soti
2.5.14. Symantec
2.5.15. Tangoe
2.6. Application Control
2.6.1. AppSense
2.6.2. Avecto
2.6.3. Bit9
2.6.4. Landesk
2.6.5. Lumension
2.6.6. McAfee
2.6.7. Sophos
2.6.8. Symantec
2.6.9. Trend Micro
2.7. Exploit Technique Prevention Software
2.7.1. CyActive
2.7.2. CyBellum
2.7.3. Malwarebytes Anti-Exploit
2.7.4. Microsoft
2.7.4.1. Microsoft EMET - FREE
2.7.5. Morphisec
2.7.6. Palo Alto Networks
2.7.6.1. Endpoint
2.7.7. Sophos
2.7.7.1. Intercept X
2.7.8. Trend Micro
2.7.9. ViRobot APT Shield
2.8. File Integrity Monitoring
2.8.1. Open Source
2.8.1.1. 1. AIDE
2.8.1.2. 2. Trend Micro
2.8.1.2.1. 1. OSSEC
2.8.1.3. 3. Samhain
2.8.1.4. 4. Osiris
2.8.1.5. 5. Integrit
2.8.1.6. 6. Tripwire
2.8.2. Commercial
2.8.2.1. Imperva
2.8.2.2. Intel Security
2.8.2.3. Tripwire
2.9. Malware Analysis
2.9.1. Botnets
2.9.1.1. spyeyetracker.abuse.ch
2.9.2. Internet Identity
2.9.3. Malware Patrol
2.9.4. SpamHaus
2.9.5. Team Cymru
2.9.6. ThreatGrid
2.9.7. VirusTotal
2.9.8. zeustracker.abuse.ch
2.9.9. JoeSecurity
2.9.10. Shadowserver
2.10. Mobile Device Management
2.10.1. Absolute Software
2.10.2. Beachhead Security
2.10.3. Blackberry
2.10.4. Citrix
2.10.5. Globo
2.10.6. Good Technologies
2.10.7. IBM
2.10.8. Landesk
2.10.9. MobileIron
2.10.10. Mojave
2.10.10.1. https://www.mojave.net/
2.10.11. SAP
2.10.12. Sophos
2.10.13. Soti
2.10.14. Symantec
2.10.15. Tangoe
2.10.16. VMware
2.10.16.1. Airwatch
2.11. Policy Assessment and System Configuration Management
2.11.1. BMC
2.11.1.1. BMC Server Automation
2.11.2. Check Point Software
2.11.2.1. Endpoint Policy Management
2.11.3. IBM
2.11.3.1. IBM Endpoint Manager
2.11.4. Intel Security
2.11.4.1. Policy Auditor
2.11.5. RedHat
2.11.5.1. OpenSCAP
2.11.6. Saint
2.11.6.1. Saint Security
2.11.7. Tripwire
2.11.7.1. Tripwire Enterprise
3. Identity and Access Management (IAM)
3.1. AD/Unix bridge
3.1.1. Centrify
3.2. Enterprise single sign-on (ESSO)
3.3. Externalized authorization management (EAM)
3.3.1. Axiomatics
3.3.2. Dell Quest (BitKoo)
3.4. IAM as a Service
3.4.1. Centrify
3.4.2. IBM (Formerly Lighthouse Security)
3.4.3. Identity Automation
3.4.4. Intel
3.4.5. Okta
3.4.6. Password Bank
3.4.7. Ping Identity
3.4.8. Sailpoint
3.4.9. Symplifyed
3.4.10. iWelcome
3.5. Identity governance and administration
3.5.1. CA Technologies
3.5.2. IBM Security
3.5.3. Oracle
3.5.4. RSA (Aveksa)
3.6. Privileged account management (PAM)
3.6.1. BeyondTrust
3.6.2. Lieberman Software
3.6.3. Cyber Ark
3.6.4. Dell
3.6.5. Centrify
3.7. Public Certificate Authorities
3.7.1. Comodo
3.7.2. Geotrust
3.7.3. Godaddy
3.7.4. Symantec (Formerly VeriSign)
3.8. User Authentication
3.8.1. Tokens
3.8.1.1. OOB authentication
3.8.1.1.1. SMS
3.8.1.1.2. Voice
3.8.1.1.3. Push
3.8.1.1.4. Email
3.8.1.1.5. Social media
3.8.1.2. OTP tokens
3.8.1.2.1. OTP hardware tokens
3.8.1.2.2. OTP software tokens for smart phones
3.8.1.3. X.509 tokens
3.8.1.4. Other tokens
3.8.1.4.1. ANECT AS - ALUCID
3.8.2. Contextual authentication
3.8.2.1. Google
3.8.2.1.1. Trust API
3.8.3. KBA
3.8.3.1. It's Me Security
3.8.3.1.1. http://www.itsmesecurity.com/
3.8.4. Biometrics
3.8.4.1. Behavioral
3.8.4.1.1. Typing rhythm/keystroke dynamics
3.8.4.1.2. Voice recognition
3.8.4.2. Biological
3.8.4.2.1. Face recognition
3.8.4.2.2. Fingerprint
3.8.5. Wide-focus vendors
3.8.5.1. Alladin-RD
3.8.5.2. CA Technologies
3.8.5.3. Entrust
3.8.5.4. HID Global
3.8.5.5. RSA
3.8.5.5.1. Adaptive Auth
3.8.5.6. Gemalto
3.8.5.7. Symantec
3.8.5.8. Technology Nexus
3.8.5.9. VASCO
3.9. User Privilege Management
3.9.1. Appsense
3.9.1.1. http://www.appsense.com/
3.9.2. Ariella
3.9.2.1. http://www.arellia.com/
3.9.3. Avectco
3.9.3.1. http://www.avecto.com/
3.9.4. BeyondTrust
3.9.4.1. http://www.beyondtrust.com/
3.9.5. Centrify
3.9.5.1. http://www.centrify.com/
3.9.6. CionSystems
3.9.7. CrossIdeas
3.9.7.1. http://www.crossideas.com/
3.9.8. Dell
3.9.8.1. http://www.quest.com/desktop-authority-management-suite/
3.9.9. Lieberman Software
3.9.9.1. http://www.liebsoft.com/
3.9.10. Viewfinity
3.9.10.1. http://www.viewfinity.com/
4. Random Knowledge
4.1. Detection Methods
4.1.1. File Analysis
4.1.1.1. Computed Hash
4.1.1.1.1. Uniqueness
4.1.1.2. Metadata Attributes
4.1.1.2.1. File Content Inspection
4.1.1.2.2. File Headers
4.1.1.2.3. Temporal Analysis
4.1.1.2.4. Temporal Analysis with Prevalence
4.1.1.2.5. Time/Date
4.1.1.2.6. Certificate and Signature Evaluation (PKI)
4.1.1.3. Packing Method
4.1.1.3.1. Multi-packing Analysis
4.1.2. Network Specific
4.1.2.1. Protocol/File/Session Decode & Analysis
4.1.2.1.1. File Extraction
4.1.2.1.2. Playback (Surveillance)
4.1.2.1.3. File/Session Viewing
4.1.2.1.4. Correlation
4.1.2.1.5. Machine Learning (AI)
4.1.2.2. Network Flow Analysis
4.1.2.2.1. Machine Learning (AI)
4.1.2.3. Application Layer Analysis
4.1.2.3.1. Classification, Correlation , Deviance from Baselines (Heuristics)
4.1.2.3.2. Deep Packet Inspection (DPI)
4.1.2.3.3. Application Command and Input Analysis
4.1.2.4. IP Layer Analysis
4.1.2.4.1. TCP/UDP Ports
4.1.2.4.2. IP Address
4.1.3. Malware Behavioral Evaluations
4.1.3.1. Persistence
4.1.3.1.1. Installs as System Service
4.1.3.1.2. Installs Registry Keys in Startup locations
4.1.3.1.3. Modifies filesystem in specific locations
4.1.3.2. Suspicious Behaviors Evaluated
4.1.3.2.1. Attempts to login to systems that a specific user credential is not normally used on
4.1.3.2.2. Becomes another user on the system
4.1.3.2.3. CPU of Processes Spawned is high
4.1.3.2.4. Connects with a known bad URL or IP Address
4.1.3.2.5. Escalates privileges
4.1.3.2.6. Examines the Documents Folder or User Document Folders
4.1.3.2.7. File Isn't widely prevalent in user population
4.1.3.2.8. Injects data into memory of another running process
4.1.3.2.9. Modifies memory of another process
4.1.3.2.10. Opens TCP/IP Connections to other hosts
4.1.3.2.11. Performs a network port sweep
4.1.3.2.12. Process executes net use DOS command inside command.exe
4.1.3.2.13. Process spawns command.exe
4.1.3.2.14. Removes logs/events of application logs or operating system
4.1.3.2.15. Self Delete of files
4.1.3.2.16. Self-copy of files
4.1.3.2.17. Starts to repeatedly call the crypt function (ransom sign)
4.1.3.2.18. Time of execution is not normal in context of historical analysis
4.1.4. User
4.1.4.1. Activity on system when user's employment is in termination status
4.1.4.2. Deviates from past user behavior
4.1.4.3. Device not historically associated to user
4.1.4.4. Login time anamoly
4.1.4.5. Login time outside user's home timezone
4.1.4.6. Privileged data accessed
4.1.4.6.1. Volumetric analysis
4.1.4.6.2. Deviation from baseline
4.1.4.6.3. Cut-paste function used
4.1.4.7. Remote access and time of day abnormal from baselines
4.1.4.8. User authentication failure
4.1.4.9. User's browser or viewer is not the same as the baseline
4.1.4.10. User is logging into system remotely and locally simultaneously
4.1.4.11. User is logging into system remotely (not expected)
4.1.4.12. User is logging into system remotely at an abnormal time
4.1.4.13. User is abnormally leveraging applications that are administrative in nature (Control Panel, Command.exe, Group Policy Editor, etc)
5. Cloud Security
5.1. Cloud/Virtualized Firewalls
5.1.1. Agent-Based
5.1.1.1. CloudPassage
5.1.1.2. Drawbridge Networks
5.1.1.3. Illumio
5.1.2. Cisco
5.1.3. Citrix Xen
5.1.3.1. Hillstone Networks
5.1.3.2. Huawei
5.1.3.3. Fortinet
5.1.3.4. Palo Alto Networks
5.1.4. Container-Based
5.1.4.1. ShieldX
5.1.5. Hyper-V
5.1.5.1. Fortinet
5.1.6. KVM
5.1.6.1. Hillstone Networks
5.1.6.2. Juniper Networks
5.1.6.3. Palo Alto Networks
5.1.7. Openstack
5.1.7.1. OpenFlow
5.1.7.1.1. Fortinet
5.1.7.2. Juniper Networks
5.1.8. Public Cloud
5.1.8.1. Virtual Appliances
5.1.8.1.1. Barracuda
5.1.8.1.2. Brocade
5.1.8.1.3. Catbird Networks
5.1.8.1.4. Check Point Software
5.1.8.1.5. Juniper Networks
5.1.8.1.6. Palo Alto Networks
5.1.8.1.7. PfSense
5.1.8.1.8. Sophos
5.1.8.1.9. vArmour
5.1.8.2. API-Driven
5.1.8.2.1. Dome9
5.1.8.2.2. Illumio
5.1.8.3. AWS
5.1.8.3.1. Check Point Software
5.1.8.3.2. Fortinet
5.1.8.3.3. Palo Alto Networks
5.1.8.4. Microsoft Azure
5.1.8.4.1. Check Point Software
5.1.8.4.2. Fortinet
5.1.8.5. Container-Based
5.1.9. VMware Environments
5.1.9.1. API Integration
5.1.9.1.1. Check Point Software
5.1.9.1.2. Fortinet
5.1.9.1.3. Palo Alto Networks
5.1.9.2. NSX
5.1.9.2.1. Fortinet
5.1.9.2.2. Check Point Software
5.1.9.3. VM Appliance
5.1.9.3.1. Barracuda
5.1.9.3.2. Brocade
5.1.9.3.3. Catbird Networks
5.1.9.3.4. Check Point Software
5.1.9.3.5. Fortinet
5.1.9.3.6. Hillstone Networks
5.1.9.3.7. Juniper Networks
5.1.9.3.8. Palo Alto Networks
5.1.9.3.9. PfSense
5.1.9.3.10. Sophos
5.1.9.3.11. vArmour
5.1.9.3.12. Huawei
6. Infrastructure Protection
6.1. Active Directory Defense
6.1.1. Aorato
6.1.1.1. http://www.aorato.com/
6.2. Cloud-Based Remote Access VPN
6.2.1. Check Point
6.2.1.1. Capsule Cloud
6.2.2. Pertino
6.2.3. Soha
6.3. DNS-based Threat Prevention/Detection
6.3.1. Standalone Appliances
6.3.1.1. Bluecat Networks
6.3.1.2. Efficient IP
6.3.1.3. Infoblox
6.3.2. Recursive DNS Services
6.3.2.1. Bluecat Networks
6.3.2.2. Cisco
6.3.2.2.1. OpenDNS
6.3.2.3. Comodo
6.3.2.4. CrowdStrike
6.3.2.5. Infoblox
6.3.2.6. Neustar
6.3.2.7. Nominum
6.3.2.8. Symantec
6.3.2.9. ThreatStop
6.3.2.10. Verisign
6.3.3. Firewalls
6.3.3.1. Palo Alto Networks
6.4. Denial of Service Protection
6.4.1. Appliances
6.4.1.1. Arbor Networks
6.4.1.1.1. Prevail APS
6.4.1.2. Check Point Software
6.4.1.2.1. DDos Protector
6.4.1.3. Corero
6.4.1.4. Fortinet
6.4.1.5. Genie Networks
6.4.1.5.1. ATM Appliances
6.4.1.6. NSFOCUS
6.4.1.7. Radware
6.4.1.8. WINS TECHNET LTD
6.4.1.8.1. http://www.wins21.co.kr/
6.4.2. Security as a Service
6.4.2.1. HTTP/HTTPS Only
6.4.2.1.1. DOSArrest
6.4.2.1.2. Cloudflare
6.4.2.2. MultiProtocol/Network
6.4.2.2.1. Akamai
6.4.2.2.2. Black Lotus
6.4.2.2.3. Cloud Flare
6.4.2.2.4. F5
6.4.2.2.5. Incapsula
6.4.2.2.6. Link11
6.4.2.2.7. Neustar
6.4.2.2.8. NexusGuard
6.4.2.2.9. Verisign Inc
6.4.3. Clean Pipe Services
6.4.3.1. AT&T
6.4.3.2. Verizon
6.5. Fraud Prevention/Web Malware Monitoring
6.5.1. Fraud/Bot/Webscrape Prevention
6.5.1.1. Software
6.5.1.1.1. RSA (EMC)
6.5.1.1.2. IBM (Formerly Trusteer)
6.5.1.1.3. Intellinx
6.5.1.2. Appliances
6.5.1.2.1. RSA
6.5.1.2.2. Distil Networks
6.5.1.2.3. White Ops
6.5.1.3. Software as a Service
6.5.1.3.1. Akamai
6.5.1.3.2. BioCatch
6.5.1.3.3. Distil Networks
6.5.1.3.4. Guardian Analytics
6.5.1.3.5. Kount
6.5.1.3.6. MarkMonitor
6.5.1.3.7. ShieldSquare
6.5.1.3.8. ThreatMetrix
6.5.1.3.9. White Ops
6.5.1.3.10. X-Cart
6.5.1.3.11. iovation
6.5.1.4. Virtual Appliances
6.5.1.4.1. Distil Networks
6.5.2. Website & Ad Malware Monitoring
6.5.2.1. Ad-Juster
6.5.2.2. Globalsign
6.5.2.2.1. Leverages Hackalert
6.5.2.3. Hackalert
6.5.2.4. Intel Security
6.5.2.4.1. Siteadvisor
6.5.2.5. QualysGuard
6.5.2.6. RiskIQ
6.5.2.7. Sucuri
6.6. Network Access Control (NAC)
6.6.1. Host Based
6.6.1.1. Symantec
6.6.1.2. Intel Security
6.6.2. Network Based
6.6.2.1. Aruba Networks
6.6.2.2. Bradford Networks
6.6.2.3. Cisco
6.6.2.4. Forescout
6.6.2.5. Milton Security Group
6.6.2.6. Portnox
6.7. Network Anonymization & Consumer VPN Services
6.7.1. AnchorFree Hotspot Shield
6.7.2. Anonymize.net
6.7.3. CyberGhost
6.7.4. Dispel
6.7.5. GoldenFrog
6.7.6. HMA ProVPN
6.7.6.1. TorVPN
6.7.7. Okayfreedom
6.7.8. OpenVPN Shield Exchange
6.7.9. Private Wifi
6.7.10. Tor
6.7.11. luminati.io
6.8. Network Firewalls
6.8.1. Carrier Firewalls
6.8.2. Enterprise Firewalls
6.8.2.1. Multifunction Enterprise Firewalls
6.8.2.1.1. Bluedon
6.8.2.1.2. Check Point Software
6.8.2.1.3. Cisco
6.8.2.1.4. Fortinet
6.8.2.1.5. Huawei
6.8.2.1.6. Palo Alto Networks
6.8.2.1.7. Sonicwall
6.8.2.1.8. Websense (Formerly Intel Security)
6.8.2.2. Stateful Inspection - Traditional Firewalls
6.8.2.2.1. Cisco
6.8.2.2.2. Huawei
6.8.2.2.3. Check Point Software
6.8.3. Multi-Funtion SMB Firewalls
6.8.3.1. 443 Networks
6.8.3.2. Bluedon
6.8.3.3. Check Point Software
6.8.3.4. CheckPoint
6.8.3.5. Cisco
6.8.3.6. Clavister
6.8.3.7. Endian
6.8.3.8. Fortinet
6.8.3.9. Hillstone Networks
6.8.3.10. Meraki
6.8.3.11. PineApp
6.8.3.11.1. http://www.pineapp.com/
6.8.3.12. Sangfor
6.8.3.13. Sonicwall
6.8.3.14. Sophos
6.8.3.15. Trustwave
6.8.3.16. Untangle
6.8.3.17. WINS TechNet LTD
6.8.3.17.1. http://www.wins21.co.kr/
6.8.3.18. WatchGuard
6.8.4. Open Source & Community
6.8.4.1. IPTables
6.8.4.2. IPchains
6.8.4.3. PFSense
6.8.4.4. Untangle
6.8.5. Router Firewalls
6.9. Network Intrusion Detection/Prevention
6.9.1. Predictive Modeling
6.9.1.1. Cyactive
6.9.1.2. Trustpipe
6.9.2. IBM
6.9.3. Signature Based
6.9.3.1. AlienVault
6.9.3.1.1. Snort
6.9.3.2. Bricata
6.9.3.3. CheckPoint
6.9.3.4. Cisco
6.9.3.4.1. Sourcefire
6.9.3.5. Enterasys
6.9.3.6. Fortinet
6.9.3.7. HP
6.9.3.7.1. TippingPoint
6.9.3.8. IBM
6.9.3.9. Intel Security
6.9.3.10. Open Source
6.9.3.10.1. Snort
6.9.3.11. Symantec
6.9.3.11.1. APT Network
6.9.3.12. WINS TECHNET LTD
6.9.3.12.1. http://www.wins21.co.kr/
6.9.4. SCADA
6.9.4.1. Radiflow
6.10. Network Packet Brokers
6.10.1. Adara
6.10.2. Apcon
6.10.3. Arista Networks
6.10.4. Cubro
6.10.5. Gigamon
6.10.6. IXIA
6.10.7. Interface Masters Technologies
6.10.8. JDSU
6.10.9. NetOptics
6.10.10. NetScout
6.10.11. VSS Monitoring
6.11. Network Traffic Analysis, Network Behavior Analysis and Network Forensics
6.11.1. Flow Analysis/Metadata Extraction
6.11.1.1. Arbor Networks
6.11.1.2. IBM
6.11.1.3. Lancope
6.11.1.4. LogRythm
6.11.1.5. Intel Security NBA
6.11.2. Forensic Capture with User Surveillance & Security Threat Analytics
6.11.2.1. Access Data
6.11.2.2. BlueCoat
6.11.2.3. Cisco
6.11.2.3.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html
6.11.2.4. EMC
6.11.2.5. FireEye
6.11.2.6. Fluke Networks
6.11.2.7. IBM
6.11.2.8. IP Fabrics
6.11.2.9. JDSU (Network Instruments)
6.11.2.10. LightCyber
6.11.2.11. NetAgent
6.11.2.12. NetResec
6.11.2.13. NetScout
6.11.2.14. Niksun
6.11.2.15. Novetta Solutions
6.11.2.16. Nuix
6.11.2.17. Packetsled
6.11.2.18. Riverbed
6.11.2.19. SS8
6.11.2.19.1. http://www.ss8.com/
6.11.2.20. nPulse Technologies
6.11.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring
6.11.3.1. Emulex
6.11.3.2. Packetsled
6.11.3.3. WildPackets
6.11.4. Network Forensics Tools
6.11.4.1. Alert Logic
6.11.4.1.1. Formerly Click Security
6.11.4.2. Corvil
6.11.4.3. Cybersift
6.11.4.3.1. http://www.cybersift.net/sifter10app.html
6.11.4.4. Decision Group INC
6.11.4.4.1. http://www.edecision4u.com/index.html
6.11.4.5. EMC
6.11.4.6. FireEye
6.11.4.7. Fluke Networks
6.11.4.8. IP Fabrics
6.11.4.9. IPCopper
6.11.4.10. InveaTech
6.11.4.10.1. https://www.invea.com/en/products-and-services/li-system
6.11.4.11. KLOS
6.11.4.11.1. http://www.klos.com/applications/lawful-intercept/
6.11.4.12. NEXT Computing
6.11.4.12.1. http://www.nextcomputing.com/products/packet-capture-systems
6.11.4.13. NetReSec
6.11.4.14. Niksun
6.11.4.15. Radisys
6.11.4.15.1. http://www.radisys.com/products/network-appliance/
6.11.4.16. Utimaco
6.11.4.16.1. https://lims.utimaco.com/utimaco-lims/
6.11.4.17. WildPackets
6.11.5. Network Forensics Tools as a Service (NFTaaS)
6.11.5.1. CloudShark
6.11.6. Network Taps
6.11.6.1. Optical
6.11.6.1.1. Apcon
6.11.6.1.2. DataCom Systems
6.11.6.1.3. FibreDyne
6.11.6.1.4. Gigamon
6.11.6.1.5. Glimmerglass
6.11.6.1.6. M2Optics
6.11.6.1.7. Netoptics
6.11.6.1.8. Network Instruments
6.11.6.1.9. VSS Monitoring
6.11.6.1.10. nTAP
6.11.7. Network Traffic Analysis
6.11.7.1. Amgine Securus
6.11.7.2. Arbor Networks
6.11.7.3. Boeing
6.11.7.4. Cisco
6.11.7.4.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html
6.11.7.5. Corvil
6.11.7.6. Cyber adAPT
6.11.7.7. Damballa
6.11.7.8. Darktrace
6.11.7.9. ExtraHop Networks
6.11.7.10. Fidelis Cybersecurity
6.11.7.11. Lancope
6.11.7.12. Light Cyber
6.11.7.13. Novetta Solutions
6.11.7.14. PacketSled
6.11.7.15. Phirelight
6.11.7.16. Qihoo 360
6.11.7.16.1. SkyEye
6.11.7.17. RedJack
6.11.7.18. SlashNext
6.11.7.19. Splunk
6.11.7.20. Taasera
6.11.7.21. ThreatTrack
6.11.7.22. Trustport
6.11.7.22.1. Threat Intelligence
6.11.7.23. Vectra Networks
6.11.7.24. WireX
6.11.8. Raw Network Packet Capture
6.11.8.1. Apcon
6.11.8.1.1. Riverbed
6.11.8.1.2. Netfort
6.11.8.1.3. Wireshark
6.11.8.1.4. NTOP
6.11.8.2. Arbor Networks
6.11.8.3. Comworth
6.11.8.4. NTOP.org
6.11.8.5. Netfort
6.11.8.6. WireShark
6.12. Network-Based Advanced Threat Protection
6.12.1. Firewalls with Malware Sandbox Capabilities
6.12.1.1. Barracuda
6.12.1.2. Check Point Software
6.12.1.3. Cisco
6.12.1.4. Fortinet
6.12.1.5. Huawei
6.12.1.6. Juniper Networks
6.12.1.7. Palo Alto Networks
6.12.1.8. Sonicwall
6.12.1.9. Sophos
6.12.1.10. Watchguard
6.12.2. Appliance Based Malware Sandboxes
6.12.2.1. AMGINE SECURUS
6.12.2.1.1. http://www.amgine.co.kr/index.html
6.12.2.2. AhnLab
6.12.2.3. Bluecoat
6.12.2.4. Check Point Software
6.12.2.4.1. Emulator Blade
6.12.2.5. Cisco
6.12.2.5.1. ThreatGrid
6.12.2.6. ContentKeeper
6.12.2.7. Cyphort
6.12.2.8. Damballa
6.12.2.9. FireEye
6.12.2.10. Fortinet
6.12.2.10.1. FortiSandbox
6.12.2.11. General Dynamics
6.12.2.11.1. Fidelis Security Systems
6.12.2.12. Huawei
6.12.2.12.1. Firehunter
6.12.2.13. Intel Security
6.12.2.13.1. McAfee Advanced Threat Detection Appliance
6.12.2.14. LastLine
6.12.2.15. Palo Alto Networks
6.12.2.15.1. WildFire
6.12.2.16. Payload Security
6.12.2.17. Qihoo
6.12.2.17.1. SkyEye
6.12.2.18. Techguard Security
6.12.2.19. ThreatTrack
6.12.2.20. Trend Micro
6.12.2.20.1. Deep Discovery
6.12.2.21. VMRay
6.12.2.22. VeeDog
6.12.2.22.1. http://veedog.com/
6.12.2.23. WINS TECHNET LTD
6.12.2.23.1. http://www.wins21.co.kr/
6.12.3. Cloud-Based Malware Sandboxes
6.12.3.1. Cisco
6.12.3.1.1. ThreatGrid
6.12.3.2. Fortinet
6.12.3.3. Huawei
6.12.3.4. Joe Security
6.12.3.5. Lastline
6.12.3.6. Netwitness
6.12.3.6.1. Spectrum
6.12.3.7. Palo Alto Networks
6.12.3.7.1. WildFire
6.12.3.8. Qihoo
6.12.3.8.1. SkyEye
6.12.3.9. Sonicwall
6.13. SCADA/ICS
6.13.1. Monitoring
6.13.1.1. CRITIFENSE
6.13.1.2. Cyberbit
6.13.1.3. PFP Cybersecurity
6.13.2. SCADA Firewalls
6.13.2.1. BAE Systems
6.13.2.1.1. http://www.baesystems.com/en-us/product/scada-firewall
6.13.2.2. Bayshore Networks
6.13.2.2.1. https://www.bayshorenetworks.com/products/it-ot-gateway/
6.13.2.3. Check Point Software
6.13.2.3.1. https://www.checkpoint.com/products-solutions/critical-infrastructure/
6.13.2.4. Endian
6.13.2.4.1. http://www.endian.com/products/4i/
6.13.2.5. Fortinet
6.13.2.5.1. https://www.fortinet.com/solutions/industries/scada-industrial-control-systems.html
6.13.2.6. Tofino Security
6.13.2.6.1. https://www.tofinosecurity.com/products/Tofino-Firewall-LSM
6.14. SSL Inspection Appliances
6.14.1. A10 Networks
6.14.2. Bluecoat
6.14.3. ResolutionOne
6.14.4. VSS Monitoring
6.14.5. SourceFire
6.15. Software Defined Perimeter
6.15.1. Certes Networks
6.15.2. Cryptzone
6.15.3. Tempered Networks
6.15.4. Unisys Stealth
6.15.5. Vidder
6.15.6. Waverly Labs
6.16. Virtual Private Networking (VPN/SSL VPN)
6.16.1. IPSec VPN Concentrators
6.16.1.1. Certes Networks
6.16.1.2. CheckPoint Software
6.16.1.3. Cisco
6.16.1.4. Mako Networks
6.16.2. Layer 2 Encryption
6.16.2.1. Certes Networks
6.16.3. Layer 4 Encryption
6.16.3.1. Certes Networks
6.16.4. SSL VPN
6.16.4.1. AhnLab
6.16.4.2. Array Networks
6.16.4.3. Barracuda Networks
6.16.4.4. Check Point Software
6.16.4.5. Cisco
6.16.4.6. Citrix
6.16.4.7. F5 Networks
6.16.4.8. Fortinet
6.16.4.9. Hillstone Networks
6.16.4.10. Juniper
6.16.4.11. NetGear
6.16.4.12. Sonicwall
6.16.4.13. Stonesoft
6.16.4.14. WatchGuard
6.16.5. Multi-Path Dynamic VPN
6.16.5.1. Secret Double Octopus
6.16.5.2. Dispersive Networks
6.17. Web/Email Protection
6.17.1. Secure Email Gateways
6.17.1.1. Alt-N Technologies
6.17.1.2. Bluecoat
6.17.1.3. Fortinet
6.17.1.4. GWAVA
6.17.1.5. Intel Security
6.17.1.6. Proofpoint
6.17.1.7. Re-Sec
6.17.1.8. Sonicwall
6.17.1.9. Symantec
6.17.1.10. Trustwave
6.17.1.11. Voitiro
6.17.1.12. Websense
6.17.1.13. iBoss
6.17.2. Secure Web Gateways
6.17.2.1. Anchiva
6.17.2.2. Bluecoat
6.17.2.3. ContentKeeper
6.17.2.4. GWAVA
6.17.2.5. Intel Security
6.17.2.6. Re-Sec
6.17.2.7. Symantec
6.17.2.8. Trustwave
6.17.2.9. Websense
6.17.2.10. iBoss
6.17.3. Security as a Service
6.17.3.1. Web & Email SaaS
6.17.3.1.1. Appriver
6.17.3.1.2. Barracuda
6.17.3.1.3. Bitglass
6.17.3.1.4. Cisco
6.17.3.1.5. Intel Security
6.17.3.1.6. MailGuard
6.17.3.1.7. Spamina
6.17.3.1.8. Symantec
6.17.3.1.9. Total Defense
6.17.3.1.10. TotalDefense
6.17.3.1.11. Websense
6.17.3.1.12. Zscaler
6.17.3.2. Web Only
6.17.3.2.1. Bluecoat
6.17.3.2.2. ContentKeeper
6.17.3.2.3. OpenDNS
6.17.3.2.4. Websense
6.17.3.2.5. Zscaler
6.17.3.3. Secure Email Gateways
6.17.3.3.1. Agari
6.17.3.3.2. CloudMark
6.17.3.3.3. Proofpoint
6.17.3.3.4. Return Path
6.17.3.3.5. Spam Experts
6.17.3.3.6. Spam Titan
6.17.3.3.7. Spamina
6.17.3.3.8. ValiMail
6.17.3.4. Anti-Phishing
6.17.3.4.1. Amgine Securus
6.17.3.4.2. Area1 Security
6.17.3.4.3. CloudMark
6.17.3.4.4. Cymbel
6.17.3.4.5. Cyveillance
6.17.3.4.6. FireEye
6.17.3.4.7. MailGuard
6.17.3.4.8. MediaPro
6.17.3.4.9. Phishlabs
6.17.3.4.10. ThreatTrack
6.17.3.4.11. Votiro
6.17.3.4.12. Webroot
6.17.3.4.13. ZapFraud
7. Application Security
7.1. Web Application Firewalls (WAF) & Application Security
7.1.1. Web Threat Disruption Technology
7.1.1.1. Software
7.1.1.1.1. NuCaptcha
7.1.1.1.2. NuData
7.1.1.2. Appliances
7.1.1.2.1. Juniper
7.1.1.2.2. Shape Security
7.1.1.3. Open Source
7.1.1.3.1. Google Hack Honeypot
7.2. Web Application Security
7.2.1. Code Review Products
7.2.1.1. HP
7.2.1.2. IBM
7.2.2. Web Application Vulnerability Scanning Services
7.2.2.1. Cenzic
7.2.2.2. Controlscan
7.2.2.3. High-Tech Bridge
7.2.2.4. McAfee Secure
7.2.2.5. Qualys
7.2.2.6. Securi
7.2.2.7. Sitelock
7.2.2.8. Trustwave
7.2.2.9. WebSecurify
7.2.2.10. WhiteHat Security
7.2.3. Scanning Software
7.2.3.1. Open Source
7.2.3.1.1. Arachni Scanner
7.2.3.1.2. Subgraph
7.2.3.1.3. W3af
7.2.3.1.4. Wapiti
7.2.3.1.5. Watcher
7.2.3.2. Commercial
7.2.3.2.1. Accunetix
7.2.3.2.2. BeyondTrust
7.2.3.2.3. Cenzic
7.2.3.2.4. HP
7.2.3.2.5. MavitunaSecurity
7.2.3.2.6. NTObjectives
7.2.3.2.7. Nstalker
7.2.3.2.8. Portswigger
7.2.3.2.9. Syhunt
8. Data & Collaboration Security
8.1. Data Governance and Classification
8.1.1. Expert Source
8.1.1.1. http://www.expertsource.in/index.php
8.1.2. HP
8.1.3. IBM
8.1.4. Informatica
8.1.5. Nuix
8.1.6. Somansa
8.1.7. Titus
8.1.8. boldonjames
8.2. Data Loss Prevention (DLP)
8.2.1. Endpoint
8.2.1.1. Data Classification and Tracking
8.2.1.1.1. Banyan Solutions
8.2.1.1.2. BoldonJames
8.2.1.1.3. Digital Guardian
8.2.1.1.4. HP
8.2.1.1.5. IBM
8.2.1.1.6. Identity Finder
8.2.1.1.7. Mach1 Development
8.2.1.1.8. Microsoft (Formerly Secure Islands)
8.2.1.1.9. MinerEye
8.2.1.1.10. Nuix
8.2.1.1.11. Smartlogic
8.2.1.1.12. Titus
8.2.1.1.13. Varonis
8.2.1.1.14. CoSoSys
8.2.1.2. Mobile
8.2.1.2.1. Symantec
8.2.1.2.2. Websense
8.2.1.2.3. Microsoft (Secure Islands)
8.2.1.3. Windows
8.2.1.3.1. Absolute Software
8.2.1.3.2. CA Technologies
8.2.1.3.3. Digital Guardian
8.2.1.3.4. GTB Technologies
8.2.1.3.5. Infowatch
8.2.1.3.6. Intel Security
8.2.1.3.7. RSA
8.2.1.3.8. Microsoft (Secure Islands)
8.2.1.3.9. Somansa
8.2.1.3.10. Symantec
8.2.1.3.11. Trustwave
8.2.1.3.12. Watchful Software
8.2.1.3.13. Raytheon-Websense
8.2.1.3.14. Zecurion
8.2.2. Network
8.2.2.1. Digital Guardian
8.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)
8.2.2.3. Symantec
8.2.2.4. InfoWatch
8.2.3. Secure Email Gateway
8.2.3.1. Cisco
8.2.3.2. Symantec
8.2.3.3. Intel Security
8.2.3.4. Somansa
8.2.4. Secure Web Gateway
8.2.4.1. Intel Security
8.2.4.2. Symantec
8.2.4.3. Somansa
8.2.5. Security as a Service
8.2.5.1. Consumer
8.2.5.1.1. Reputation.com
8.2.5.1.2. Social Fortress
8.2.5.1.3. PwnedList
8.2.5.2. Enterprise
8.2.5.2.1. Social Fortress
8.2.5.2.2. Google Apps
8.2.5.2.3. ZixCorp
8.3. Database Security
8.3.1. Database Audit and Protection (DAP)
8.3.1.1. Application Security, Inc
8.3.1.2. BeyondTrust
8.3.1.3. Big Data Platform DAP
8.3.1.3.1. BlueTalon
8.3.1.3.2. Cloudera
8.3.1.3.3. Hortonworks
8.3.1.3.4. IBM
8.3.1.3.5. Imperva
8.3.1.4. DataSunrise
8.3.1.5. Fortinet
8.3.1.6. GreenSQL
8.3.1.7. IBM
8.3.1.8. IRI
8.3.1.8.1. Oracle
8.3.1.8.2. SQL Server
8.3.1.9. Imperva
8.3.1.10. Intel Security
8.3.1.11. Mentis Software
8.3.1.12. Oracle Corp
8.3.1.13. PentaSecurity
8.3.1.14. Warevalley
8.3.2. Database Activity Monitoring
8.3.2.1. DB Networks
8.3.2.2. Somansa
8.4. Encryption/Tokenization
8.4.1. Big Data
8.4.1.1. Gazzang
8.4.1.2. Vormetric
8.4.2. Cloud/SAAS Encryption
8.4.2.1. Appliances
8.4.2.1.1. Office365
8.4.2.1.2. Ciphercloud
8.4.2.1.3. Afore Solutions
8.4.2.1.4. Perspecsys
8.4.2.2. Software
8.4.2.2.1. BoxCryptor
8.4.2.2.2. CloudMask
8.4.2.2.3. PrivateCore
8.4.2.2.4. Trend Micro
8.4.2.2.5. Viivo
8.4.2.2.6. Voltage Security
8.4.2.3. Software as a Service
8.4.2.3.1. Trend Micro
8.4.2.3.2. SooKasa
8.4.2.3.3. Gemalto
8.4.3. Cryptographic Providers
8.4.3.1. RSA
8.4.3.2. Quintessence
8.4.3.3. Microsoft
8.4.4. Data masking
8.4.4.1. Oracle
8.4.4.2. Dataguise
8.4.4.3. Informatica
8.4.4.4. IBM
8.4.4.5. Voltage Security
8.4.4.6. Green SQL
8.4.4.7. Mentis
8.4.4.8. Compuware
8.4.4.9. Axis
8.4.4.10. Privacy Analytics
8.4.4.11. Camouflage Software
8.4.4.12. Solix Technologies
8.4.4.13. Net 2000
8.4.5. Database
8.4.5.1. Gemalto
8.4.5.2. Dark Matter Labs
8.4.5.3. Vormetric
8.4.6. Email
8.4.6.1. ZixCorp
8.4.6.2. Encryptics
8.4.6.2.1. https://www.encryptics.com/default.aspx
8.4.7. Encrypted USB Storage
8.4.7.1. Apricorn
8.4.7.2. Datalocker
8.4.7.3. Integral Memory
8.4.7.4. IronKey
8.4.7.5. Kingston
8.4.7.6. Virbatim
8.4.8. File/Folder
8.4.8.1. Covertix
8.4.8.1.1. http://www.covertix.com/
8.4.8.2. IBM
8.4.8.2.1. Mainframe
8.4.8.3. SecureIslands
8.4.8.4. Sophos
8.4.8.4.1. SafeGuard Enterprise (Utimaco)
8.4.8.5. Symantec (PGP)
8.4.8.6. Vormetric
8.4.8.7. WinMagic
8.4.8.7.1. SecureDoc
8.4.9. Quantum Encryption
8.4.9.1. IDQ
8.4.9.2. Quintessence Labs
8.4.9.3. Whitewood Encryption
8.4.10. Tokenization
8.4.10.1. Protegrity
8.4.11. Whole Disk
8.4.11.1. Intel Security
8.4.11.2. Symantec (PGP)
8.4.11.3. CheckPoint Software
8.4.11.4. Encryption Management
8.4.11.4.1. Wave Systems
8.4.11.5. WinMagic
8.4.11.5.1. SecureDoc
8.4.11.6. Microsoft
8.4.11.6.1. Bitlocker
8.4.11.7. Sophos
8.4.11.7.1. SafeGuard Enterprise (Utimaco)
8.4.11.8. Trustwave
8.4.11.8.1. DataControl
8.4.11.9. Vormetric
8.5. File Analysis Software
8.5.1. Acaveo
8.5.2. Active Navigation
8.5.3. AvePoint
8.5.4. Beyond Recognition
8.5.5. Bloomberg
8.5.6. CommVault
8.5.7. Condrey
8.5.8. Covertix
8.5.9. DataGlobal
8.5.10. DataGravity
8.5.11. Equivio
8.5.12. HP
8.5.12.1. Control Point
8.5.13. HiSoftware
8.5.14. IBM
8.5.14.1. StoreIQ
8.5.15. Identifty Finder
8.5.16. Imperva
8.5.17. Index Engines
8.5.18. Kazoup
8.5.19. MailGuard
8.5.20. NTP Software
8.5.21. Novell
8.5.22. Nuix
8.5.23. Proofpoint
8.5.24. Stealthbits
8.5.25. Varonis
8.5.26. WatchDox
8.5.27. Whitebox Security
8.5.28. ZyLab
8.6. Hardware Security Modules (HSM)
8.6.1. Cloud HSM
8.6.1.1. Amazon
8.6.1.2. IBM
8.6.2. Hardware
8.6.2.1. FutureX
8.6.2.2. Gemalto
8.6.2.3. HPE
8.6.2.4. Safenet
8.6.2.5. Thales
8.7. Software Defined Storage Security
8.7.1. Dispersive Networks
8.7.1.1. https://dispersivetechnologies.com/
8.7.2. OceansBlue
8.7.2.1. http://www.oceansblue.net/index.html
8.8. eSignatures
8.8.1. Adobe eSign Services
8.8.2. Alphatrust
8.8.3. Docusign
8.8.4. Hellosign
8.8.5. Rightsignature
8.8.6. Sertifi
9. Security Consulting & Implementation
9.1. Forensics
9.1.1. Forensics
9.1.1.1. Incident Response
9.1.1.1.1. Crowdstrike
9.1.1.1.2. Cylance
9.1.1.1.3. Deloitte
9.1.1.1.4. Fidelis Cybersecurity
9.1.1.1.5. FireEye
9.1.1.1.6. Guidance Software
9.1.1.1.7. Maryman & Associates
9.1.1.1.8. NTT Coms Security
9.1.1.1.9. Nettitude
9.1.1.1.10. Optiv
9.1.1.1.11. Presecure
9.1.1.1.12. Secureworks
9.1.1.1.13. Verizon
9.1.1.2. E-Discovery & Computer Forensics
9.1.1.3. Endpoint Forensics
9.1.1.4. Network Forensics
9.2. Governance, Advisory, Assessment
9.2.1. Architecture and Design
9.2.2. Business Continuity
9.2.3. Compliance Review
9.2.4. Data Security Program
9.2.5. Governance, Compliance and Policy Design
9.2.5.1. Compliance Mandates
9.2.5.1.1. PCI
9.2.5.1.2. ISO
9.2.5.1.3. HITECH
9.2.5.1.4. HIPAA
9.2.6. People Centric Strategy
9.2.7. Policy Design
9.2.8. Program Assessment
9.2.9. Risk Assessment
9.2.10. Risk Management
9.2.10.1. Booz Allen Hamilton
9.2.10.2. Optiv
9.2.10.3. Cloud Risks
9.2.10.4. On Premise Infrastructure
9.2.10.5. Business Risk
9.2.11. Security Program Development
9.2.11.1. Optiv
9.2.11.2. FOX-IT
9.2.12. Strategy
9.2.13. Governance
9.2.13.1. Optiv
9.2.13.2. FOX-IT
9.2.13.3. Sec Consult
9.3. Operations
9.3.1. Application Security
9.3.1.1. Web
9.3.1.1.1. AppSec Consulting
9.3.1.1.2. Denim Group
9.3.1.1.3. Security Innovation
9.3.1.1.4. WhiteHat Security
9.3.1.1.5. Citigal
9.3.1.1.6. IOActive
9.3.1.2. Mobile
9.3.1.2.1. AppSec Consulting
9.3.1.2.2. Denim Group
9.3.1.3. Software Security Lifecycle (SDLC)
9.3.1.3.1. AppSecConsulting
9.3.1.3.2. Security Innovation
9.3.1.4. Custom Code
9.3.1.4.1. AppSec Consulting
9.3.1.4.2. Security Innovation
9.3.2. Application Security Vulnerability Assessement
9.3.3. Configuration Assessment
9.3.4. Device Security
9.3.5. Fraud, Identification and Privacy
9.3.6. Incident Response
9.3.6.1. Blackthorn Technologies
9.3.6.2. Crowdstrike
9.3.6.3. Dell SecureWorks
9.3.6.4. Deloitte
9.3.6.5. EY
9.3.6.6. FOX-IT
9.3.6.7. FireEye
9.3.6.8. High Tech Bridge
9.3.6.9. Ingalls Information Security
9.3.6.10. Intel Security
9.3.6.10.1. Foundstone
9.3.6.11. K2 Intelligence
9.3.6.12. Lares Consulting
9.3.6.13. Maryman
9.3.6.14. NTT Coms Security
9.3.6.15. Nettitude
9.3.6.16. Optiv
9.3.6.17. PWC
9.3.6.18. Presecure
9.3.6.19. Sec Consult
9.3.6.20. Stroz Friedberg
9.3.6.21. TrustMatta
9.3.7. Penetration Testing
9.3.7.1. AppSec Consulting
9.3.7.2. Core Security
9.3.7.3. Element Digital Security
9.3.7.3.1. http://www.edigitalsecurity.com/
9.3.7.4. FOX-IT
9.3.7.5. High Tech Bridge
9.3.7.6. Ingalls Information Security
9.3.7.7. K2 Intelligence
9.3.7.8. Matasano Security
9.3.7.9. NCC Group
9.3.7.10. Penetration Lab
9.3.7.11. Rapid7
9.3.7.12. Secureworks
9.3.7.13. TrustMatta
9.3.7.14. TrustedSec
9.3.7.15. WhiteHat Security
9.3.8. Remote Access
9.3.9. Secure Code Review
9.3.10. Threat Intelligence
9.3.11. Vulnerability Scan
9.4. Providers by Region
9.4.1. Latin America
9.4.2. Mature Asia/Pacific
9.4.3. Middle East and North Africa
9.4.3.1. Saudi Arabia
9.4.3.1.1. GBM
9.4.3.1.2. PGI
9.4.4. North America
9.4.4.1. A-G
9.4.4.1.1. AppsecConsulting
9.4.4.1.2. CSC
9.4.4.1.3. Control Case
9.4.4.1.4. CrowdStrike
9.4.4.1.5. Dell Secureworks
9.4.4.1.6. Deloitte
9.4.4.1.7. Denim Group
9.4.4.1.8. Ernst & Young
9.4.4.1.9. FireEye
9.4.4.1.10. ForSythe Solutions
9.4.4.1.11. Grant Thornton
9.4.4.2. H-L
9.4.4.2.1. HP
9.4.4.2.2. IBM
9.4.4.2.3. IOActive
9.4.4.2.4. Ingalls Information Security
9.4.4.2.5. Intel Security (Foundstone)
9.4.4.2.6. K2 Intelligence
9.4.4.2.7. Leidos
9.4.4.3. M-S
9.4.4.3.1. NTT Com Security
9.4.4.3.2. Neohapsis
9.4.4.3.3. Optiv
9.4.4.3.4. PWC
9.4.4.3.5. Paladion Networks
9.4.4.3.6. Perimeter eSecurity
9.4.4.3.7. Protivity
9.4.4.3.8. SISA
9.4.4.3.9. Solutionary
9.4.4.3.10. Stroz Friedberg
9.4.4.3.11. Sungard
9.4.4.3.12. Sword and Shield
9.4.4.3.13. Symantec
9.4.4.3.14. Syntegrity Networks
9.4.4.3.15. Sysnet Global Solutions
9.4.4.4. T-Z
9.4.4.4.1. Tevora Business Solutions
9.4.4.4.2. Trustwave
9.4.4.4.3. Verizon
9.4.4.4.4. WhiteHat Security
9.4.4.4.5. Zensar Technologies
9.4.5. Greater China
9.4.6. South Africa
9.4.6.1. Cyanre
9.4.6.1.1. http://www.cyanre.co.za/
9.4.7. Eurasia
9.4.7.1. Russia
9.4.8. Emerging Asia/Pacific
9.4.9. Canada
9.4.9.1. Conexsys
9.4.10. Europe
9.4.10.1. Eastern Europe
9.4.10.1.1. Poland
9.4.10.2. Western Europe
9.4.10.2.1. Italy
9.4.10.2.2. United Kingdom
10. Emerging Security Markets & Technologies
10.1. Application Security
10.1.1. Runtime Application Self-Protection (RASP)
10.1.1.1. Arxan
10.1.1.2. Checkmarx
10.1.1.3. Contrast Security
10.1.1.4. HP
10.1.1.5. Immunio
10.1.1.6. Metaforic
10.1.1.7. OneASP
10.1.1.8. Prevoty
10.1.1.9. SecuPi
10.1.1.10. Veracode
10.1.1.11. Virsec
10.1.1.12. Waratek
10.1.1.13. whiteCryption
10.1.2. Enterprise App-Layer Protection
10.1.2.1. SecuPI
10.1.3. AI-Based Applicaton Threat Defense
10.1.3.1. Barricade
10.1.3.2. Signal Sciences
10.2. Cloud Security
10.2.1. Cloud Protection Gateways
10.2.1.1. CipherCloud
10.2.1.2. Netskope
10.2.1.3. Perspecsys
10.2.1.4. Skyhigh Networks
10.2.1.5. Vaultive
10.2.2. Cloud Access Security Brokers
10.2.2.1. User Activity Monitoring
10.2.2.1.1. Adallom
10.2.2.1.2. Avanan
10.2.2.1.3. Bitglass
10.2.2.1.4. Elastica
10.2.2.1.5. Harvest.ai
10.2.2.1.6. Imperva
10.2.2.1.7. Netscope
10.2.2.1.8. SkyHigh Networks
10.2.2.2. Data Loss Prevention
10.2.2.2.1. Integrated DLP
10.2.2.2.2. Harvest.ai
10.2.2.3. Encryption
10.2.2.3.1. Adallom
10.2.2.3.2. Avanan
10.2.2.3.3. Managed Methods
10.2.2.3.4. SkyHigh Networks
10.2.2.4. Identity and Access Management
10.2.2.4.1. Centrify
10.2.2.4.2. Cloudiway
10.2.2.4.3. Okta
10.2.2.4.4. Ping
10.2.2.5. Access Control
10.2.2.5.1. Adallom
10.2.2.5.2. Avanan
10.2.2.5.3. Bitglass
10.2.2.5.4. Elastica
10.2.2.5.5. FireLayers
10.2.2.5.6. Managed Methods
10.2.2.5.7. Netskope
10.2.2.5.8. Skyfence
10.2.3. Cloud Application Discovery
10.2.3.1. Ciphercloud
10.2.3.2. Elastica
10.2.3.3. Netskope
10.2.3.4. Skyhigh
10.2.4. Cloud Compliance and Security Risk Platforms
10.2.4.1. AlertLogic
10.2.4.2. Cavirin
10.2.4.3. Cloudcheckr
10.2.4.4. Evident.io
10.2.4.5. Harvest AI
10.3. Cross Domain Solutions
10.3.1. Advenica
10.3.1.1. ZoneGuard
10.3.1.2. SecuriRam
10.3.2. General Dynamics
10.3.2.1. TacGuard
10.3.2.2. Crossing Guard
10.3.2.3. NanoXD
10.3.3. LockHeed Martin
10.3.3.1. Trusted Manager
10.3.4. Tresys
10.3.4.1. XD Air
10.3.4.2. XD Bridge
10.3.4.3. XD Guardian
10.3.5. Owl Computing
10.3.5.1. Owl OPDS-100
10.3.5.2. Owl OPDS-100D
10.3.5.3. OCDS-SFF
10.4. Data Security
10.4.1. Network-Based Data Cleansing
10.4.1.1. DataStealth
10.4.1.1.1. http://www.datexdatastealth.com/
10.4.2. Big Data Security
10.4.2.1. BlueTalon
10.5. Endpoint Security
10.5.1. Endpoint Detection and Response (EDR)
10.5.1.1. Agent-Based
10.5.1.1.1. Carbon Black
10.5.1.1.2. Cisco
10.5.1.1.3. Countertack
10.5.1.1.4. CrowdStrike
10.5.1.1.5. Cyberbit
10.5.1.1.6. Cyberreason
10.5.1.1.7. Cylance
10.5.1.1.8. Deep Instinct
10.5.1.1.9. Digital Guardian
10.5.1.1.10. Dtex Systems
10.5.1.1.11. Endgame Systems
10.5.1.1.12. Fidelis Cybersecurity
10.5.1.1.13. FireEye
10.5.1.1.14. Forescout
10.5.1.1.15. Guidance Software
10.5.1.1.16. Hexis Cyber Solutions
10.5.1.1.17. Invincea
10.5.1.1.18. LogRhythm
10.5.1.1.19. NexThink
10.5.1.1.20. Panda Security
10.5.1.1.21. RSA (EMC)
10.5.1.1.22. SecDo
10.5.1.1.23. SentinelOne
10.5.1.1.24. Tanium
10.5.1.1.25. Triumfant
10.5.1.1.26. Verint
10.5.1.1.27. Ziften
10.5.1.2. Agentless
10.5.1.2.1. BeyondTrust
10.5.1.2.2. Cynet
10.5.1.2.3. Fidelis
10.5.1.2.4. ForeScout
10.5.1.2.5. Hexadite
10.5.1.2.6. Hexis Cyber Solutions
10.5.1.2.7. InfoCyte
10.5.1.2.8. LightCyber
10.5.1.2.9. Outlier Security
10.5.1.2.10. Promisec
10.5.2. Remote Browser-Isolation (remote dom)
10.5.2.1. Amune
10.5.2.1.1. https://amune.org/security
10.5.2.2. Armor5
10.5.2.3. Authentic8
10.5.2.4. Dispel
10.5.2.5. FireGlass
10.5.2.6. Menlo Security
10.5.2.7. Aurionpro
10.5.2.7.1. Formerly Spikes Security
10.6. Identification, Authentication, Access Control & IAM
10.7. Internet of Things
10.7.1. Automotive
10.7.1.1. Security Innovation
10.7.2. Embedded Security
10.7.2.1. Security Innovation
10.8. Network & Infrastructure Security
10.8.1. Content Disarm and Reconstruction (CDR)
10.8.1.1. Check Point Software
10.8.1.1.1. Threat Extraction
10.8.1.2. Glasswall
10.8.1.2.1. http://www.glasswallsolutions.com/
10.8.1.3. Mimecast
10.8.1.3.1. https://www.mimecast.com/
10.8.1.4. OPSWAT
10.8.1.5. ODI
10.8.1.5.1. http://www.odi-x.com/
10.8.1.6. Re-Sec
10.8.1.6.1. http://www.re-sec.com/
10.8.1.7. Sasa-Software
10.8.1.7.1. http://www.sasa-software.com/
10.8.1.8. Solebit Labs
10.8.1.8.1. http://www.solebitlabs.com/
10.8.1.9. Symantec
10.8.1.9.1. DisArm
10.8.1.10. TreSys
10.8.1.10.1. http://www.tresys.com/
10.8.1.11. Votiro
10.8.1.11.1. http://www.votiro.com/
10.8.2. Malware Infection Analysis and Monitoring Services
10.8.2.1. Lastline
10.8.2.1.1. Guardia
10.8.2.2. Cisco
10.8.2.2.1. Formerly OpenDNS
10.8.2.3. Qualys
10.8.2.4. Seculert
10.8.3. Network Behavior and Analytics
10.8.3.1. Industrial Control Systems (ICS)
10.8.3.1.1. CyberX
10.8.4. Standalone Threat Intelligence Defense Solutions (STIDS)
10.8.4.1. Bandura
10.8.4.1.1. PoliWall
10.8.4.2. Centripetal Networks
10.8.4.3. Damballa
10.8.4.4. Fidelis Cybersecurity
10.8.4.5. FireEye
10.8.4.6. Group IB
10.8.4.6.1. http://tds.group-ib.com/
10.8.4.7. Ixia
10.8.4.7.1. http://www.ixiacom.com/info/ta
10.8.4.8. LookingGlass
10.8.4.8.1. https://lgscout.com/products/dns-defender/
10.8.4.9. Redsocks
10.8.4.9.1. Redsocks Threat Defender
10.8.4.10. ReversingLabs
10.8.4.11. Symantec
10.8.4.11.1. APT Network
10.8.5. Unauthorized Endpoint Connection Prevention (UECP)
10.8.5.1. Ensilo
10.8.5.2. Intel Security
10.8.6. Software Defined WAN (SDwan)
10.8.6.1. CloudGenix
10.8.6.2. Pertino
10.8.6.3. Velocloud
10.8.6.4. Viptela
10.8.6.5. Versa Networks
10.8.7. Virtual Container Security
10.8.7.1. Apcera
10.8.7.2. Aqua Security
10.8.7.3. Illumio
10.8.7.4. StackRox
10.8.7.5. TwistLock
10.8.8. Network Security as a Service
10.8.8.1. Cato Networks
10.8.8.2. MyDigitalShield
10.8.8.3. Zscaler
10.9. Risk, Compliance and Security Management
10.9.1. Security Ratings & Insurance
10.9.1.1. Security Ratings
10.9.1.1.1. Bitsight Technologies
10.9.1.1.2. Prevalent
10.9.1.1.3. SecurityScoreCard
10.9.1.1.4. QuadMetrics
10.9.1.2. Cyber Risk Insurance
10.9.1.2.1. Balsiger Insurance
10.9.1.2.2. HSB Group
10.9.1.2.3. Philadelphia Insurance Companies
10.9.1.2.4. Tennant Risk Services
10.9.1.2.5. The Hartford
10.9.1.2.6. Travelers
10.10. Security Operations, Incident Response
10.10.1. Intelligence/Data Feeds/Software & Services
10.10.1.1. Security Intelligence and Data Analysis Platforms
10.10.1.1.1. FireEye
10.10.1.2. Threat Intelligence Platforms (TIPs)
10.10.1.2.1. Anomali
10.10.1.2.2. BAE Systems
10.10.1.2.3. Buguroo
10.10.1.2.4. Codenomicon
10.10.1.2.5. Comilion
10.10.1.2.6. Confer
10.10.1.2.7. Eclectic IQ
10.10.1.2.8. Infoblox
10.10.1.2.9. Lockheed Martin
10.10.1.2.10. Lookingglass Cyber Solutions
10.10.1.2.11. Microsoft
10.10.1.2.12. Palentir
10.10.1.2.13. PierceMatrix
10.10.1.2.14. Service Now (Formerly Brightpoint)
10.10.1.2.15. Soltra
10.10.1.2.16. ThreatConnect
10.10.1.2.17. ThreatQuotient
10.10.1.2.18. TruStar
10.10.1.3. Threat Intelligence Services
10.10.1.3.1. Human Intelligence - HUMINT (Strategic)
10.10.1.3.2. Machine-Based (Tactical)
10.10.1.3.3. Vulnerabilities and Exploits
10.10.1.3.4. Data Loss Detection - External
10.10.1.4. Collaborative Threat Investigation Platforms
10.10.1.4.1. BAE System Detica
10.10.1.4.2. IKANow
10.10.1.4.3. Maltego
10.10.1.4.4. NC4
10.10.1.4.5. Palentir
10.10.2. Malware Analysis
10.10.2.1. Malware Analysis as a Service
10.10.2.1.1. Free Services
10.10.2.1.2. ReversingLabs
10.10.2.1.3. ThreatGrid
10.10.2.2. Sandbox Software
10.10.2.2.1. GFI
10.10.2.2.2. Joesecurity
10.10.2.2.3. Bluecoat
10.10.2.2.4. Payload Security
10.10.3. Threat Deception Technologies
10.10.3.1. Distributed Deception Platforms
10.10.3.1.1. Amgine Securus
10.10.3.1.2. Atomic Software Solutions
10.10.3.1.3. Attivo Networks
10.10.3.1.4. Cymmetria
10.10.3.1.5. GuardiCore
10.10.3.1.6. Illusive Networks
10.10.3.1.7. Javelin Networks
10.10.3.1.8. KeyFocus
10.10.3.1.9. SmokeScreen
10.10.3.1.10. Specter
10.10.3.1.11. TrapX
10.10.3.1.12. Vision Space Technologies
10.10.3.2. Network
10.10.3.2.1. ForeScout
10.10.3.2.2. Juniper Networks
10.10.3.2.3. Percipient Networks
10.10.3.2.4. Ridgeback Network Defense
10.10.3.2.5. Shadow Networks
10.10.3.3. Open Source
10.10.3.3.1. Honeypot
10.10.3.4. Web
10.10.3.4.1. Shape Security
10.10.3.4.2. Juniper Networks
10.10.3.4.3. CyberTrap
11. Risk, Compliance and Security Management
11.1. Firewall Workflow,Modeling & Change Management
11.1.1. Checkpoint Software
11.1.2. Firemon
11.1.3. ManageEngine
11.1.4. Redseal Networks
11.1.5. Skybox
11.1.6. Tufin
11.1.7. Veriflow
11.2. Legal and regulatory information governance
11.3. Privacy
11.4. Regulations, Awareness and Training
11.4.1. Computer Based Training
11.4.1.1. Aujas
11.4.1.2. BeOne Development
11.4.1.3. Digital Defense
11.4.1.4. Fishnet Security
11.4.1.5. Inspired eLearning
11.4.1.6. Junglemap
11.4.1.7. KnowBe4
11.4.1.8. MediaPro
11.4.1.9. PhishMe
11.4.1.10. Phishline
11.4.1.11. Popcorn Training
11.4.1.12. Sans Institute
11.4.1.13. Scipp International
11.4.1.14. Secure Mentem
11.4.1.15. Security Innovation
11.4.1.16. Security Mentor
11.4.1.17. The Security Awareness Company
11.4.1.18. ThreatSim
11.4.1.19. Wombat Security Technologies
11.4.2. Educational, Awareness & News Outlets
11.4.2.1. Government Led
11.4.2.1.1. Information Sharing and Analysis Centers (ISACs)
11.4.2.2. Periodicals & Target Roles
11.4.2.2.1. Channel
11.4.2.2.2. CISO/CSO
11.4.2.2.3. Security Engineers/Analysts
11.4.3. Industry Standards/Groups
11.4.3.1. Standards
11.4.3.1.1. Technical
11.4.3.2. Industry Groups
11.4.3.2.1. Audit
11.4.3.2.2. General Security
11.4.3.2.3. Forensics
11.4.4. Regulations, Public Standards and Contractual Mandates
11.4.4.1. Global
11.4.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)
11.4.4.1.2. NIST
11.4.4.2. Country/Region Specific
11.4.4.2.1. China
11.4.4.2.2. Singapore
11.4.4.2.3. European Union
11.4.4.2.4. United States
11.5. Security Policy and Response Orchaestration Platforms
11.5.1. FireEye
11.5.2. Phantom
11.5.2.1. https://www.phantom.us/
11.5.3. Proofpoint
11.6. Security Program and Governance
11.6.1. Governance, Risk and Compliance
11.6.1.1. eGRC
11.6.1.1.1. Software as a Service
11.6.1.1.2. Software
11.6.1.2. Compliance Oriented Private Cloud Hosting (COPCH)
11.6.1.2.1. Note: This list is not an attestation of compliance
11.6.1.3. Operational Risk Analytics
11.6.1.3.1. Algosec
11.6.1.3.2. Cyber Observer
11.6.1.3.3. Cytegic
11.6.1.3.4. Firemon
11.6.1.3.5. IBM
11.6.1.3.6. Redseal Networks
11.6.1.3.7. RiskIO
11.6.1.3.8. Skybox
11.6.1.3.9. Software Development Lifecycle
11.6.1.3.10. Solarwinds
11.6.1.3.11. Tufin
11.6.1.4. Cloud & Container Compliance Assessment
11.6.1.4.1. Cavirin
12. VARs, Distributors, Market Logistics & Supply Chain
12.1. Cloud Service Brokerages
12.1.1. Bitnami
12.1.2. Ensim
12.1.2.1. http://www.ensim.com/
12.1.3. Gravitant
12.1.4. Jamcracker
12.1.4.1. http://www.jamcracker.com/
12.1.5. StandingCloud
12.2. Distribution/Channel/VARs
12.2.1. VARs, Resellers
12.2.1.1. China
12.2.1.1.1. Mainland China
12.2.1.1.2. Hong Kong
12.2.1.1.3. Taiwan
12.2.1.2. Emerging Asia Pacific
12.2.1.2.1. India
12.2.1.2.2. Indonesia
12.2.1.2.3. Malasia
12.2.1.2.4. Thailand
12.2.1.2.5. Philippines
12.2.1.3. Eurasia
12.2.1.3.1. Russian Federation
12.2.1.3.2. Kazakhstan
12.2.1.3.3. Ukraine
12.2.1.4. Europe
12.2.1.4.1. Eastern Europe
12.2.1.4.2. Western Europe
12.2.1.5. Latin America
12.2.1.5.1. Brazil
12.2.1.5.2. Chile
12.2.1.5.3. Columbia
12.2.1.5.4. Costa Rica
12.2.1.5.5. Ecuador
12.2.1.5.6. Bolivia
12.2.1.5.7. Venezuela
12.2.1.5.8. Cuba
12.2.1.5.9. Argentina
12.2.1.5.10. Buenos Aires
12.2.1.5.11. Mexico
12.2.1.5.12. Peru
12.2.1.6. Mature Asia Pacific
12.2.1.6.1. Australia
12.2.1.6.2. Japan
12.2.1.6.3. Singapore
12.2.1.7. Middle East and North Africa
12.2.1.7.1. Turkey
12.2.1.7.2. Israel
12.2.1.7.3. Saudi Arabia
12.2.1.7.4. South Africa
12.2.1.7.5. India
12.2.1.7.6. United Arab Emirates
12.2.1.8. North America
12.2.1.8.1. United States
12.2.1.8.2. Canada
12.2.1.9. Sub-Sahara Africa
12.2.1.9.1. South Africa
12.2.1.10. WorldWide
12.2.1.10.1. AT&T
12.2.1.10.2. BT
12.2.1.10.3. Optiv
12.2.1.10.4. SHI
12.2.1.10.5. Secureworks
12.2.1.10.6. Verizon Business
12.2.2. Distributors
12.2.2.1. China
12.2.2.1.1. AVNet
12.2.2.1.2. B & Data Technology Co. Ltd.
12.2.2.1.3. Beijing Advazone Electronic Limited Comp
12.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.
12.2.2.1.5. Digital China Technology LTD.
12.2.2.1.6. Ecs China
12.2.2.1.7. Edvance Technology (China) Limited
12.2.2.1.8. Huagai
12.2.2.1.9. M.Tech (Shanghai) Co., Ltd.
12.2.2.1.10. Shanghai S-I Information Tech. Ltd
12.2.2.1.11. Sinogrid Information Technology Ltd.
12.2.2.1.12. Sky Faith International Enterprise
12.2.2.2. Emerging Asia Pacific
12.2.2.2.1. India
12.2.2.2.2. Indonesia
12.2.2.2.3. Thailand
12.2.2.3. Eurasia
12.2.2.3.1. Russian Federation
12.2.2.3.2. Kazakhstan
12.2.2.4. Mature Asia Pacific
12.2.2.4.1. Singapore
12.2.2.4.2. Japan
12.2.2.4.3. South Korea
12.2.2.4.4. Australia
12.2.2.5. Middle East and South Africa
12.2.2.5.1. United Arab Emirates
12.2.2.5.2. South Africa
12.2.2.6. North America
12.2.2.6.1. Canada
12.2.2.6.2. United States
12.2.2.7. Sub-Sahara Africa
12.2.2.7.1. South Africa
12.2.2.8. Western Europe
12.2.2.8.1. United Kingdom
12.2.2.8.2. Germany
12.2.2.9. Worldwide
12.2.2.9.1. AVNet
12.2.2.9.2. Ingram Micro
12.2.2.9.3. LifeBoat Distribution
12.2.2.9.4. Tech Data
12.2.2.9.5. Westcon
12.2.2.10. Latin America
12.2.2.10.1. Mexico
12.2.2.10.2. Brazil
12.2.3. Reseller Programs
12.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm
12.2.4. Logistics/Deal Registration
12.2.4.1. Connectwise
12.3. Government Cyberwarrior (Personnel Estimates)
12.3.1. United States
12.3.1.1. NSA
12.3.1.1.1. Cyberwarrior Stats
12.3.1.2. Department of Defense
12.3.1.2.1. US Airforce
12.3.1.2.2. US Navy
12.3.1.2.3. DISA
12.3.2. Iran
12.3.2.1. 4500
12.3.3. Israel
12.3.3.1. Unit 8200
12.3.3.1.1. 5000
12.3.4. North Korea
12.3.4.1. 1000
12.4. Hardware and Chip Security
12.4.1. AMD
12.4.1.1. TPM
12.4.2. Cavium
12.4.2.1. Multi-Core Processors
12.4.3. Flow Processors
12.4.3.1. Netronome
12.4.4. Intel
12.4.4.1. TPM
12.4.4.2. Data Execution Protection
12.4.5. Systems
12.4.5.1. Janus Technologies
12.4.5.1.1. http://www.janustech.com/janus_secure_computer.html
12.5. Investment
12.5.1. ETFs
12.5.1.1. PureFunds
12.5.1.1.1. SYM:HACK
12.5.2. Venture Capitalists
12.5.2.1. Trident Capital
12.5.2.2. Andreesen Horowitz
12.6. Managed Service Enablement
12.6.1. Chartec
12.6.2. Jamcracker
12.7. Marketing/PR/AR
12.7.1. Analyst & Public Relations
12.7.1.1. Focused Image
12.7.1.1.1. http://www.focusedimage.com/
12.7.1.2. KTCpr
12.7.1.2.1. http://www.kahn-travel.com/
12.7.1.3. Madison Alexander PR
12.7.1.3.1. http://www.madisonalexanderpr.com/
12.7.1.4. Marc Gendron PR
12.7.1.4.1. http://www.mgpr.info/
12.7.1.5. Schwartz Communications
12.7.1.5.1. http://www.schwartzmsl.com/
12.7.1.6. Spalding Communications
12.7.1.7. Text 100
12.7.1.7.1. http://www.text100.com/
12.7.2. Campaign/Engagement
12.7.2.1. WCG World
12.7.2.1.1. http://wcgworld.com/
12.7.3. Creative/Design Services
12.7.3.1. Duarte
12.7.3.1.1. http://www.duarte.com/
12.7.3.2. Gig Productions
12.7.3.2.1. http://www.gigpros.com/index.php
12.7.3.3. Initiate Marketing
12.7.3.3.1. http://www.getinitiated.ca/
12.7.3.4. MN8Studio
12.7.3.4.1. http://www.mn8studio.com/
12.7.3.5. Text 100
12.7.3.5.1. http://www.text100.com/
12.7.4. Web Site Design
12.7.4.1. Baytech Web Design
12.7.4.1.1. http://www.baytechwebdesign.com/
12.7.4.2. EU Design Studios
12.7.4.2.1. http://eudesignstudio.com/
12.7.4.3. Pro Logic Web Services
12.7.4.3.1. http://www.prologicsoft.com/
12.7.5. Market Destinations (Sites)
12.7.5.1. CRN
12.7.5.2. Hak5
12.7.5.3. MSPMentor
12.7.5.4. Madison Logic
12.7.5.5. SCmagazine
12.7.5.6. TheVarGuy
12.7.6. Marketing Videos
12.7.6.1. Epipheo
12.7.6.1.1. http://www.epipheo.com/
12.7.7. Marketing/Branding Agencies
12.7.7.1. Focused Image
12.7.7.1.1. http://www.focusedimage.com/branding/
12.7.7.2. Hill and Knowlton
12.7.7.2.1. http://www.hkstrategies.com/
12.7.7.3. MetaDesign
12.7.7.3.1. http://www.metadesign.com/san-francisco
12.7.7.4. Ogilvy & Mather
12.7.7.5. Tailfin Marketing Communications
12.7.7.6. Toolbox Studios
12.8. OEMs & System Integrators
12.8.1. Appliance Integrators
12.8.1.1. Accton
12.8.1.1.1. http://www.accton.com/
12.8.1.2. Advantech
12.8.1.2.1. http://www.advantech.com/
12.8.1.3. Celestica
12.8.1.3.1. http://www.celestica.com/
12.8.1.4. Dan-el Technologies Ltd.
12.8.1.4.1. http://www.danel.co.il/
12.8.1.5. Flextronics
12.8.1.5.1. http://www.flextronics.com/
12.8.1.6. Plexus
12.8.1.6.1. http://www.plexus.com/
12.8.2. Base Appliances
12.8.2.1. Advantech
12.8.2.2. Amax
12.8.2.3. Cas Well
12.8.2.4. Iron Systems
12.8.2.5. Lanner
12.8.2.6. Portwell
12.8.2.7. Tilera
12.8.3. Cards
12.8.3.1. Netronome
12.8.3.2. Tilera
12.8.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection
12.8.4. Encryption Acceleration
12.8.4.1. Intel
12.8.4.1.1. VPRO
12.8.4.2. Gemalto
12.8.4.2.1. Luna PCI
12.8.5. MSSP Appliances
12.8.5.1. 443 Networks
12.8.6. Threat Intelligence
12.8.6.1. Anti-Phishing
12.8.6.1.1. Cyren
12.8.6.2. DNS DGA Feeds
12.8.6.2.1. Farsight Security
12.8.6.3. File Reputation
12.8.6.3.1. Findthatfile
12.8.6.3.2. Webroot
12.8.6.4. Fraud
12.8.6.4.1. Internet Fraud Alert
12.8.6.4.2. National Cyber-Forensics and Training Alliance
12.8.6.5. IP Block Lists
12.8.6.5.1. WebRoot Brightcloud
12.8.6.5.2. Cyren
12.8.6.5.3. Malwarebytes
12.8.6.6. IP Reputation
12.8.6.6.1. Cyren
12.8.6.6.2. WebRoot Brightcloud
12.8.6.7. Indicators of Compromise
12.8.6.7.1. FireEye
12.8.6.7.2. Proofpoint
12.8.6.7.3. Wapack labs
12.8.6.7.4. CIRCL
12.8.6.8. Malicious URL
12.8.6.8.1. Cyren
12.8.6.8.2. Findthatfile
12.8.6.8.3. Webroot
12.8.6.9. Predictive
12.8.6.9.1. Seclytics
12.8.6.10. Vulnerability Research
12.8.6.10.1. Telus Security Labs
12.8.6.10.2. Vupen
12.8.7. Security Related Chips & CPUs
12.8.7.1. Broadcom
12.8.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection
12.8.7.2. Cavium
12.8.7.2.1. http://www.cavium.com
12.8.7.3. Lionic
12.8.7.3.1. http://www.lionic.com/
12.8.7.4. Netronome
12.8.7.4.1. http://www.netronome.com
12.8.7.5. Tilera
12.8.7.5.1. http://www.tilera.com/products/processors
12.8.7.6. Intel
12.8.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH
12.8.8. Software
12.8.8.1. Advanced Content Disarming and Reconstruction
12.8.8.1.1. OPSWAT
12.8.8.1.2. Votiro
12.8.8.2. Advanced Threat Protection - Virtual Execution Engines
12.8.8.2.1. ContentKeeper
12.8.8.2.2. Threat Track Security
12.8.8.3. Analytics/Graphing/Reporting
12.8.8.3.1. Logi Analytics
12.8.8.3.2. D3Plus
12.8.8.3.3. D3js
12.8.8.4. Anti-Spam/Phishing
12.8.8.4.1. APWG
12.8.8.4.2. BrandProtect
12.8.8.4.3. Cyren
12.8.8.4.4. Ikarus
12.8.8.4.5. Internet Fraud Alert
12.8.8.4.6. ReturnPath
12.8.8.4.7. WebRoot Brightcloud
12.8.8.5. AntiMalware
12.8.8.5.1. Antiy
12.8.8.5.2. Avira
12.8.8.5.3. Bitdefender
12.8.8.5.4. Cyren
12.8.8.5.5. ESet
12.8.8.5.6. Fortinet
12.8.8.5.7. GFI
12.8.8.5.8. Ikarus
12.8.8.5.9. Intel Security
12.8.8.5.10. Kaspersky
12.8.8.5.11. Norman
12.8.8.5.12. OPSWAT
12.8.8.5.13. QuickHeal
12.8.8.5.14. ThreatTrack
12.8.8.5.15. Zillya
12.8.8.5.16. ZonerAntiVirus
12.8.8.6. Content Extraction & Search
12.8.8.6.1. Oracle
12.8.8.7. Encryption
12.8.8.7.1. Transport
12.8.8.8. Endpoint Security and Management
12.8.8.8.1. OPSWAT
12.8.8.9. File Content Decoding/Analysis/Fingerprinting
12.8.8.9.1. HP Autonomy
12.8.8.9.2. Attivio
12.8.8.9.3. GTB Technologies
12.8.8.10. IT Service Management
12.8.8.10.1. ITRP
12.8.8.11. Image Recognition
12.8.8.11.1. Image Analyzer
12.8.8.12. Intrusion Detection/Prevention Signatures
12.8.8.12.1. Proofpoint
12.8.8.13. Network Stack
12.8.8.13.1. IPV4/6
12.8.8.13.2. Deep Packet Inspection
12.8.8.13.3. SDN
12.8.8.14. Optical Character Recognition
12.8.8.14.1. Abbyy
12.8.8.15. Social Network Content Control
12.8.8.15.1. NetboxBlue
12.8.8.16. URL Categorization
12.8.8.16.1. Cyren
12.8.8.16.2. Ikarus
12.8.8.16.3. Malware
12.8.8.16.4. Webroot Brightcloud
12.8.8.16.5. Zvelo
12.8.8.17. Voice Recognition
12.8.8.17.1. STC
12.8.8.17.2. Nuance
12.8.9. Managed Security OEMs
12.8.9.1. Digital Hands
12.9. Product Testing
12.9.1. Generic Product Testing, Certification and Accreditation
12.9.1.1. Certifications
12.9.1.1.1. North America
12.9.1.1.2. European Union
12.9.1.2. Testing
12.9.1.2.1. United Kingdom
12.9.1.2.2. North America
12.9.1.2.3. Singapore
12.9.1.3. Accreditation
12.9.1.3.1. DOD
12.9.1.3.2. NSA
12.9.2. Anti-Malware Testing
12.9.2.1. AMTSO
12.9.2.2. AV-Test
12.9.2.3. Av-Comparatives
12.9.2.4. MRG Effitas
12.9.2.5. VirusBTN
12.9.3. Sponsored Product Review/Testing
12.9.3.1. Delta Testing LTD
12.9.3.2. Dennis Labs
12.9.3.3. Miercom
12.9.3.4. NSS Labs
12.9.3.5. Network Testing Labs
12.9.3.6. Tolly Group
12.9.3.7. West Coast Labs
12.9.4. Antimalware Standards Bodies
12.9.4.1. AMTSO
12.9.4.1.1. http://www.amtso.org/
12.10. Cloud Service Brokerages
12.11. Security Conferences
12.11.1. North America
12.11.1.1. United States
12.11.1.1.1. RSA
12.11.1.1.2. Gartner
12.11.1.1.3. Cornerstones of Trust
12.11.1.1.4. Annual Security Conference
12.11.1.1.5. SecurityBsides
12.11.1.1.6. ShmooCon
12.11.2. Europe
12.11.2.1. United Kingdom
12.11.2.1.1. RSA Conference
12.11.2.1.2. Gartner
12.11.2.2. Russia
12.11.2.2.1. Infosecurity Russia
12.11.3. Emerging Asia Pacific
12.11.4. Mature Asia Pacific
12.11.4.1. Australia
12.11.4.1.1. Gartner
12.11.4.2. Singapore
12.11.4.2.1. RSA
12.12. Staffing/Recruiting/Executive Search
12.12.1. Millard Group
12.12.2. Lynch Bowie Group
12.12.3. Robert Half
12.13. User Interface Design
12.13.1. Consulting
12.13.1.1. User Interface
12.13.1.1.1. BlinkUX
12.13.1.1.2. Sasa Technologies
12.13.1.1.3. Dabapps
12.13.1.2. Customer Survey
12.13.1.2.1. Techvalidate
12.13.2. HTML5 Visualization Libraries
12.13.2.1. Data-Driven Documents
12.13.2.1.1. http://d3js.org/
12.13.2.2. AngularJS
12.13.2.2.1. https://angularjs.org/
12.13.3. Icons
12.13.3.1. IconExperience
12.13.3.1.1. https://www.iconexperience.com/
12.13.3.2. FlatIcon
12.13.3.2.1. http://www.flaticon.com/packs/general-ui
12.13.3.3. ModernUIicons
12.13.3.3.1. http://modernuiicons.com/
12.13.3.4. Ui8
12.13.3.4.1. https://ui8.net/categories/icons
13. Managed Security Services
13.1. Direct Tech Providers Managed Security
13.1.1. Asia Pacific
13.1.1.1. Australia
13.1.1.2. China
13.1.1.2.1. NSFOCUS
13.1.1.3. Singapore
13.1.2. Europe
13.1.2.1. GoGrid
13.1.2.1.1. Compliance Reporting (PCI, HIPAA)
13.1.2.1.2. Host IDS
13.1.2.1.3. Log Management
13.1.2.1.4. SIEM
13.1.2.1.5. Vulnerability Assessment
13.1.3. Global Providers
13.1.4. Middle East and North Africa
13.1.4.1. Saudi Arabia
13.1.4.2. United Arab Emirates
13.1.5. North America
13.1.5.1. United States
13.1.5.1.1. NSFOCUS
13.1.5.1.2. Check Point Software
13.1.5.1.3. Network Box
13.1.5.1.4. GoGrid
13.1.5.1.5. FireEye
13.1.5.1.6. Rapid7
13.2. Indirect Providers
13.2.1. Emerging Asia Pacific
13.2.1.1. India
13.2.1.1.1. CSS Corp PVT
13.2.1.1.2. Happiest Minds
13.2.1.1.3. SunGard Availability Services
13.2.1.1.4. Ecomnets India PVT. LTD
13.2.2. Europe
13.2.2.1. BT Global Services
13.2.2.2. Dell SecureWorks
13.2.2.3. Germany
13.2.2.3.1. Link11 GMBH
13.2.2.3.2. IPsoft
13.2.2.4. HP
13.2.2.5. Happiest Minds
13.2.2.5.1. Advanced Malware Protection
13.2.2.5.2. Application Activity Monitoring
13.2.2.5.3. Compliance Reporting
13.2.2.5.4. Database Activity Monitoring
13.2.2.5.5. File Integrity Monitoring
13.2.2.5.6. Log Management
13.2.2.5.7. Managed DLP
13.2.2.5.8. Network Forensics
13.2.2.5.9. SIEM
13.2.2.5.10. Unified Threat Management
13.2.2.5.11. Vulnerability Assessment
13.2.2.6. Integralis
13.2.2.7. Navisite
13.2.2.7.1. Mobile Device Management
13.2.2.8. Open Systems
13.2.2.9. Open Systems
13.2.2.10. Orange Business Services
13.2.2.11. SecureData
13.2.2.11.1. Firewall
13.2.2.11.2. IDS/IPS
13.2.2.11.3. SIEM
13.2.2.11.4. Data Loss Prevention
13.2.2.11.5. Secure Web Gateway
13.2.2.11.6. Secure Email Gateway
13.2.2.11.7. VPN/Remote Access
13.2.2.12. SunGard Availability Services
13.2.2.12.1. Firewalls
13.2.2.12.2. IAM
13.2.2.12.3. Intrusion Prevention
13.2.2.12.4. SIEM
13.2.2.12.5. Unified Threat Management
13.2.2.12.6. VPN
13.2.2.12.7. Web Application Firewall
13.2.2.13. Symantec
13.2.2.14. T-Systems
13.2.2.15. Tata Communications
13.2.2.16. Telefonica
13.2.2.16.1. DDoS Protection Service
13.2.2.16.2. Email Encryption
13.2.2.16.3. Email Security Gateway
13.2.2.16.4. Firewall Management
13.2.2.16.5. IAM
13.2.2.16.6. Intrusion Detection
13.2.2.16.7. Intrusion Prevention
13.2.2.16.8. Log Management
13.2.2.16.9. SIEM
13.2.2.16.10. Vulnerability Assessment
13.2.2.16.11. Web Security Gateway
13.2.2.16.12. Anti-Fraud
13.2.2.17. Verizon Business
13.2.2.17.1. Anti-DDoS
13.2.2.17.2. Email Security
13.2.2.17.3. Endpoint Protection
13.2.2.17.4. Firewall Management
13.2.2.17.5. Intrusion Detection
13.2.2.17.6. Intrusion Prevention
13.2.2.17.7. SIEM
13.2.2.17.8. Vulnerability Assessment
13.2.2.17.9. Web Security
13.2.2.18. Wipro
13.2.2.18.1. Email Security Gateway
13.2.2.18.2. Endpoint Security
13.2.2.18.3. Firewall Management
13.2.2.18.4. Fraud Management/Anti-Money Laundering
13.2.2.18.5. GRC
13.2.2.18.6. IAM
13.2.2.18.7. Intrusion Detection
13.2.2.18.8. Intrusion Prevention
13.2.2.18.9. SIEM
13.2.2.18.10. User Access Management
13.2.2.18.11. Web Security Gateway
13.2.3. Global Providers
13.2.3.1. AT&T
13.2.3.1.1. DDos Protection
13.2.3.1.2. Email/Data Encryption Services
13.2.3.1.3. Endpoint Anti-Virus
13.2.3.1.4. Endpoint Patch Management
13.2.3.1.5. Endpoint Policy Compliance
13.2.3.1.6. Mobile Device Security
13.2.3.1.7. Secure Email Gateway
13.2.3.1.8. Security Device Management
13.2.3.1.9. Web Application Firewall
13.2.3.1.10. Web Gateway (URL & Malware Filtering)
13.2.3.2. BEW Global
13.2.3.2.1. Data Loss Prevention
13.2.3.2.2. Web Security Gateway
13.2.3.2.3. Email Security Gateway
13.2.3.2.4. SIEM
13.2.3.2.5. Vulnerability Assessment
13.2.3.3. BT
13.2.3.4. Dell Secureworks
13.2.3.4.1. Advanced Malware Protection
13.2.3.4.2. Email Security Gateway
13.2.3.4.3. Firewall Management
13.2.3.4.4. Host IPS
13.2.3.4.5. IDS/IPS
13.2.3.4.6. Log Management
13.2.3.4.7. Log Retention
13.2.3.4.8. SIEM
13.2.3.4.9. Threat Intelligence
13.2.3.4.10. Unified Threat Management
13.2.3.4.11. Vulnerability Assessment
13.2.3.4.12. Web Application Firewall
13.2.3.4.13. Web Application Vulnerability Assessment
13.2.3.5. Dimension Data
13.2.3.6. HP
13.2.3.6.1. Access Managment
13.2.3.6.2. Data Loss Prevention
13.2.3.6.3. Email Security Gateway
13.2.3.6.4. Endpoint Encryption
13.2.3.6.5. Endpoint Protection
13.2.3.6.6. Intrusion Detection
13.2.3.6.7. Intrusion Prevention
13.2.3.6.8. Managed Incident Response
13.2.3.6.9. Remote Access Management
13.2.3.6.10. SIEM
13.2.3.6.11. Vulnerability Assessment
13.2.3.6.12. Web Application Vulnerability Assessment
13.2.3.6.13. Web Security Gateway
13.2.3.7. IBM
13.2.3.7.1. Email Security Gateway
13.2.3.7.2. Endpoint Patch Management
13.2.3.7.3. Endpoint Policy Management
13.2.3.7.4. Endpoint Protection
13.2.3.7.5. Firewall Management
13.2.3.7.6. IAM
13.2.3.7.7. Intrusion Detection
13.2.3.7.8. Intrusion Prevention
13.2.3.7.9. Log Management
13.2.3.7.10. Mobile Device Security
13.2.3.7.11. SIEM
13.2.3.7.12. Unified Threat Management
13.2.3.7.13. Vulnerability Assessment
13.2.3.7.14. Web Security Gateway
13.2.3.7.15. Web Vulnerability Assessment
13.2.3.8. Proficio
13.2.3.8.1. Email Security
13.2.3.8.2. Firewall Management
13.2.3.8.3. Incident Response
13.2.3.8.4. Log Management
13.2.3.8.5. Privileged Account Management
13.2.3.8.6. Regulatory and Polcy Compliance
13.2.3.8.7. SIEM
13.2.3.8.8. SOC Services
13.2.3.8.9. Vulnerability Assessment
13.2.3.8.10. Web Security
13.2.3.9. Tech Mahindra
13.2.3.9.1. Email Security
13.2.3.9.2. Endpoint Protection
13.2.3.9.3. Firewall Management
13.2.3.9.4. Identity and Access Management
13.2.3.9.5. Intrusion Detection
13.2.3.9.6. Intrusion Prevention
13.2.3.9.7. Log Management
13.2.3.9.8. SIEM
13.2.3.9.9. SOC Services
13.2.3.9.10. Vulnerability Assessment
13.2.3.9.11. Web Security
13.2.3.10. Telstra
13.2.3.11. Verizon Business
13.2.3.11.1. Anti-DDoS
13.2.3.11.2. Email Security
13.2.3.11.3. Endpoint Protection
13.2.3.11.4. Firewall Management
13.2.3.11.5. Intrusion Detection
13.2.3.11.6. Intrusion Prevention
13.2.3.11.7. SIEM
13.2.3.11.8. Vulnerability Assessment
13.2.3.11.9. Web Security
13.2.4. Greater China
13.2.4.1. Hong Kong
13.2.4.1.1. Network Box
13.2.4.1.2. Netswitch
13.2.4.2. BEW Global
13.2.4.2.1. Data Loss Prevention
13.2.4.2.2. Web Security Gateway
13.2.4.2.3. Email Security Gateway
13.2.4.2.4. SIEM
13.2.4.2.5. Vulnerability Assessment
13.2.4.3. Beijing
13.2.4.3.1. Netswitch
13.2.4.4. Shanghai
13.2.4.4.1. Shanghai Data Solution Co., Ltd
13.2.5. Latin America
13.2.5.1. Brazil
13.2.5.1.1. Arcon
13.2.5.1.2. Netcentrics
13.2.5.1.3. RealProtect
13.2.5.1.4. UOL Diveo
13.2.6. Mature Asia Pacific
13.2.6.1. Australia
13.2.6.1.1. Tesserent
13.2.6.1.2. Verizon
13.2.6.2. Singapore
13.2.6.2.1. Quann
13.2.6.2.2. NTT Singapore
13.2.6.2.3. Happiest Minds
13.2.6.2.4. Singtel
13.2.6.2.5. NCS Group
13.2.7. Middle East and North Africa
13.2.7.1. Saudi Arabia
13.2.7.2. United Arab Emirates
13.2.7.2.1. Du Telecom
13.2.7.2.2. Tata Communications
13.2.7.2.3. Dell Secureworks
13.2.7.2.4. Dimension Data
13.2.8. North America
13.2.8.1. Canada
13.2.8.1.1. Above Security
13.2.8.1.2. Bell Canada
13.2.8.1.3. EWA
13.2.8.1.4. Happiest Minds
13.2.8.1.5. Netpulse
13.2.8.1.6. OneStone (Formerly Seccuris)
13.2.8.1.7. SecureData
13.2.8.1.8. SentryMetrics
13.2.8.1.9. SunGard Availability Services
13.2.8.1.10. Virtual Guardian
13.2.8.2. United States
13.2.8.2.1. AT&T
13.2.8.2.2. Above Security
13.2.8.2.3. Alert Logic
13.2.8.2.4. Allstream
13.2.8.2.5. CGI
13.2.8.2.6. CSC
13.2.8.2.7. CSS Corp
13.2.8.2.8. CentraComm
13.2.8.2.9. CenturyLink- Savvis
13.2.8.2.10. Clone Systems
13.2.8.2.11. Compucom Systems
13.2.8.2.12. Cosentry
13.2.8.2.13. Dell Secureworks
13.2.8.2.14. Earthlink
13.2.8.2.15. Esentire
13.2.8.2.16. HCL Technologies
13.2.8.2.17. HP
13.2.8.2.18. Happiest Minds
13.2.8.2.19. IBM
13.2.8.2.20. Intelisecure
13.2.8.2.21. Leidos
13.2.8.2.22. LunarLine
13.2.8.2.23. Masergy Communications
13.2.8.2.24. Megapath
13.2.8.2.25. Morphick
13.2.8.2.26. My Digital Shield
13.2.8.2.27. NCA - Network Computing Architects
13.2.8.2.28. Navisite
13.2.8.2.29. Netfortris
13.2.8.2.30. Netswitch
13.2.8.2.31. Nuspire Networks
13.2.8.2.32. Rook Security
13.2.8.2.33. Secure Designs
13.2.8.2.34. SilverSky (Formerly Stillsecure/Perimeter esecurity)
13.2.8.2.35. Solutionary
13.2.8.2.36. SunGard Availability Services
13.2.8.2.37. Sword and Shield
13.2.8.2.38. Symantec
13.2.8.2.39. Symantec
13.2.8.2.40. Syntegrity Networks
13.2.8.2.41. Tesserent
13.2.8.2.42. Trustwave
13.2.8.2.43. Verizon Business
13.2.8.2.44. Wipro
13.2.9. Sub-Sahara Africa
13.2.9.1. AccessKenya
13.2.9.1.1. Firewall
13.2.9.1.2. Endpoint Protection
13.2.9.1.3. Secure Web Gateway
14. Security Operations & Incident Response
14.1. Digital Forensics/eDiscovery
14.1.1. Content, File and Endpoint Forensics
14.1.1.1. eDiscovery
14.1.1.1.1. Clearwell
14.1.1.1.2. Kazeon
14.1.1.1.3. Guidance Software
14.1.1.1.4. Access Data
14.1.1.1.5. Autonomy
14.1.1.1.6. kCura
14.1.1.1.7. FTI Technology
14.1.1.1.8. Barracuda Networks
14.1.1.2. Mobile Devices
14.1.1.2.1. BlackBagTech
14.1.1.2.2. Cellebrite
14.1.1.2.3. Compelson Labs
14.1.1.2.4. Guidance Software
14.1.1.2.5. MSAB
14.1.1.2.6. NowSecure
14.1.1.2.7. Oxygen Forensics
14.1.1.2.8. Paraben Corporation
14.1.1.3. Endpoint Computing Systems
14.1.1.3.1. ADF Solutions
14.1.1.3.2. Access Data
14.1.1.3.3. ArxSys
14.1.1.3.4. BlackBag Technologies
14.1.1.3.5. CRU Inc
14.1.1.3.6. Cyfir
14.1.1.3.7. Guidance Software
14.1.1.3.8. Magnet Forensics
14.1.1.3.9. Nuix
14.1.1.3.10. OSForensics
14.1.1.3.11. Paraben Corporation
14.1.1.3.12. WindowsScope
14.1.1.3.13. X-Ways Forensics
14.1.1.4. Email Examination
14.1.1.4.1. Systools Software
14.1.1.4.2. Nuix
14.1.1.5. Forensic File & Data Analysis Tools
14.1.1.5.1. Cellebrite
14.1.1.5.2. Cyfir
14.1.1.5.3. Intella
14.1.1.5.4. Magnet Forensics
14.1.1.5.5. Nuix
14.1.1.5.6. Systools Software
14.1.1.6. Digital Forensics Case Management
14.1.1.6.1. D3 Security
14.1.1.6.2. Digital Investigation Manager
14.1.1.6.3. Guidance Software
14.1.1.6.4. Intaforensiscs
14.1.1.6.5. Sentinel Data
14.1.1.6.6. Sirentech
14.1.1.6.7. Wynyard Group
14.1.1.7. Memory Forensics
14.1.1.7.1. FireEye
14.1.1.7.2. Guidance Software
14.1.1.7.3. Volatility Framework
14.1.1.7.4. WindowsScope
14.1.2. eDiscovery Services
14.1.2.1. Robert Half
14.1.2.2. Advanced Discovery
14.1.3. eDiscovery Software
14.1.3.1. AccessData
14.1.3.2. Guidance Software
14.1.3.3. Nuix
14.1.3.4. Symantec
14.2. Fraud Prevention/Web Malware Monitoring
14.2.1. Fraud/Bot/Webscrape Prevention
14.2.1.1. Software
14.2.1.1.1. IBM (Formerly Trusteer)
14.2.1.1.2. Intellinx
14.2.1.1.3. RSA (EMC)
14.2.1.1.4. ShieldSquare
14.2.1.2. Appliances
14.2.1.2.1. Distil Networks
14.2.1.2.2. Imperva
14.2.1.2.3. RSA
14.2.1.2.4. Shape Security
14.2.1.2.5. White Ops
14.2.1.3. Software as a Service
14.2.1.3.1. Akamai
14.2.1.3.2. BioCatch
14.2.1.3.3. BotScout
14.2.1.3.4. Distil Networks
14.2.1.3.5. Guardian Analytics
14.2.1.3.6. Kount
14.2.1.3.7. MarkMonitor
14.2.1.3.8. NuData Security
14.2.1.3.9. Shape Security
14.2.1.3.10. ShieldSquare
14.2.1.3.11. ThreatMetrix
14.2.1.3.12. White Ops
14.2.1.3.13. X-Cart
14.2.1.3.14. iovation
14.2.1.4. Virtual Appliances
14.2.1.4.1. Distil Networks
14.2.1.4.2. Imperva
14.2.2. Website & Ad Malware Monitoring
14.2.2.1. Ad-Juster
14.2.2.2. Globalsign
14.2.2.2.1. Leverages Hackalert
14.2.2.3. Hackalert
14.2.2.4. Intel Security
14.2.2.4.1. Siteadvisor
14.2.2.5. QualysGuard
14.2.2.6. RiskIQ
14.2.2.7. Sucuri
14.2.2.8. The Media Trust
14.3. Incident Response Legal Services
14.3.1. Information Law Group
14.4. Security Information and Event Management (SIEM), Log Management & Analytics
14.4.1. Application Security Intelligence Engine
14.4.1.1. SAP
14.4.1.1.1. iT-Cube Systems
14.4.2. Log Management
14.4.2.1. EventTracker
14.4.2.2. IGLOO Security
14.4.2.3. Intel Security
14.4.2.3.1. McAfee Enterprise Log Manager
14.4.2.4. Kiwi Syslog Server
14.4.2.5. LogEntries
14.4.2.6. LogRythm
14.4.2.7. Logscape
14.4.2.8. Open Source
14.4.2.8.1. Elasticsearch (ELK Stack)
14.4.2.8.2. SEC (Simple Event Correlator)
14.4.2.8.3. OSSIM
14.4.2.8.4. Syslog-NG
14.4.2.8.5. Octopussy
14.4.2.9. Sawmill
14.4.2.10. Splunk
14.4.2.11. Sumo Logic
14.4.2.12. Tripwire
14.4.2.13. XpoLog
14.4.3. SIEM
14.4.3.1. AlienVault
14.4.3.1.1. OSSIM
14.4.3.2. CorreLog
14.4.3.3. EventTracker
14.4.3.4. Fortinet
14.4.3.5. HP
14.4.3.5.1. Arcsight
14.4.3.6. Hexis Cyber Solutions
14.4.3.6.1. Hawkeye AP
14.4.3.7. IBM
14.4.3.7.1. Q1Radar
14.4.3.8. IGLOO Security
14.4.3.9. Intel Security
14.4.3.9.1. NitroSecurity
14.4.3.10. LogPoint
14.4.3.10.1. http://www.logpoint.com/en/
14.4.3.11. LogRythm
14.4.3.12. Novell
14.4.3.12.1. Sentinel
14.4.3.13. RSA
14.4.3.13.1. Envision
14.4.3.14. Sensage
14.4.3.15. Solarwinds
14.4.3.16. Splunk
14.4.3.17. Sqrrl
14.4.3.18. Tibco
14.4.3.18.1. Loglogic
14.4.3.19. eIQnetworks
14.4.4. Security Analytics
14.4.4.1. Anomaly Analytics
14.4.4.1.1. Intel
14.4.4.1.2. Theta Ray
14.4.4.1.3. Prelert
14.4.4.1.4. eMite
14.4.4.2. User and Entity Behavior Analytics (UEBA)
14.4.4.2.1. Bay Dynamics
14.4.4.2.2. Darktrace
14.4.4.2.3. Detex Systems
14.4.4.2.4. Exabeam
14.4.4.2.5. Fortscale
14.4.4.2.6. Gurcul
14.4.4.2.7. HP
14.4.4.2.8. IBM
14.4.4.2.9. Interset
14.4.4.2.10. Microsoft
14.4.4.2.11. Niara
14.4.4.2.12. ObserveIT
14.4.4.2.13. Palerra
14.4.4.2.14. Platfora
14.4.4.2.15. Reveelium
14.4.4.2.16. Secureonix
14.4.4.2.17. Veriato
14.4.5. User and Entity Behavior Analytics (UEBA)
14.4.5.1. Bae Systems Applied Intelligence
14.4.5.2. Bay Dynamics
14.4.5.3. Caspida
14.4.5.4. Click Security
14.4.5.5. Exabeam
14.4.5.6. FICO
14.4.5.7. Fortscale
14.4.5.8. GuruCul
14.4.5.9. IBM
14.4.5.10. Intellinx
14.4.5.11. Lockheed Martin
14.4.5.12. Logtrust
14.4.5.13. Mobile System 7
14.4.5.14. Novetta Solutions
14.4.5.15. Oracle
14.4.5.16. Rapid7
14.4.5.17. Raytheon
14.4.5.18. SAS Institute
14.4.5.19. Secureonix
14.4.5.20. Splunk
14.5. Security Operations, Analytics and Reporting (SOAR)
14.5.1. Security Incident Response Platforms (SIRP)
14.5.1.1. Agiliance
14.5.1.2. DFLabs
14.5.1.3. Demisto
14.5.1.4. EMC(RSA)
14.5.1.5. Empow
14.5.1.6. Fido
14.5.1.7. Hexadite
14.5.1.8. ID Experts
14.5.1.9. Proofpoint
14.5.1.10. Resilient Systems
14.5.1.11. Siemplify
14.5.1.12. Syncurity
14.5.2. Threat and Vulnerability Management (TVM)
14.5.2.1. Acuity Risk Management
14.5.2.2. Agiliance
14.5.2.3. BeyondTrust
14.5.2.4. Core Security
14.5.2.5. Cybersponse
14.5.2.6. DFLabs
14.5.2.7. EMC(RSA)
14.5.2.8. Kenna Security
14.5.2.9. NopSec
14.5.2.10. RedSeal
14.5.2.11. RiskSense
14.5.2.12. Skybox Security
14.5.2.13. Swimlane
14.5.2.14. Siemplify
14.5.3. Security Operations Analytics
14.5.3.1. Ayehu
14.5.3.2. Cybersponse
14.5.3.3. DFLabs
14.5.3.4. EMC(RSA)
14.5.3.5. Hexadite
14.5.3.6. Proofpoint
14.5.3.7. Resilient Systems
14.5.3.8. Siemplify
14.5.3.9. Swimlane
14.5.4. Security Operations Automation Platforms (SOAPS)
14.5.4.1. Ayehu
14.5.4.2. Cyberbit
14.5.4.3. Cybersponse
14.5.4.4. DFLabs
14.5.4.5. Demisto
14.5.4.6. Fireye
14.5.4.7. Hexadite
14.5.4.8. IBM
14.5.4.9. Phantom Cyber
14.5.4.10. Swimlane
14.5.4.11. Syncurity
14.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)
14.6.1. Crowdsourced Application Security Testing Platforms
14.6.1.1. Hyver
14.6.1.2. Applause
14.6.1.3. Bugcrowd
14.6.1.4. BugFinders
14.6.1.5. Cobalt
14.6.1.6. Crowdtesters
14.6.1.7. HackerOne
14.6.2. Managed Penetration Testing Services
14.6.2.1. Cenzic
14.6.2.2. WhiteHatSecurity
14.6.3. Penetration Testing Software
14.6.3.1. Core Security
14.6.3.2. Rapid7
14.6.3.2.1. Metasploit Pro
14.6.3.2.2. Metasploit Express
14.6.3.3. Trustwave
14.6.4. Vulnerability Assessment
14.6.4.1. Software as a Service
14.6.4.1.1. Vulnerability Management
14.6.4.1.2. Phish Testing/Management
14.6.4.2. Network-Based Vulnerability Assessment (On Premise)
14.6.4.2.1. Core Security
14.6.4.2.2. Digital Defense
14.6.4.2.3. Fortinet
14.6.4.2.4. Intel Security
14.6.4.2.5. NSAuditor
14.6.4.2.6. Ncircle
14.6.4.2.7. Netasq
14.6.4.2.8. Outpost24
14.6.4.2.9. Qualys
14.6.4.2.10. RandomStorm
14.6.4.2.11. Rapid 7
14.6.4.2.12. Trustwave
14.6.4.3. Agent-Based Vulnerability Assessment
14.6.4.3.1. BeyondTrust
14.6.4.3.2. Qualys
14.6.4.3.3. Secunia
14.6.4.3.4. Tenable
14.6.4.4. Mainframe Vulnerability Assessment
14.6.4.4.1. Key Resources Inc. (KRI)
14.6.5. Vulnerability Correlation
14.6.5.1. Application Vulnerability Correlation
14.6.5.1.1. Code DX
14.6.5.1.2. Denim Group
14.6.5.1.3. Kenna Security
14.6.5.1.4. NopSec
14.6.5.2. Network Vulnerability Correlation
14.6.5.2.1. Secure Decisions
14.6.5.2.2. RiskSense
14.6.5.2.3. NopSec
14.6.5.2.4. Kenna Security
14.6.5.2.5. Cybric
14.6.6. Vulnerability Research
14.6.6.1. CSC
14.6.6.2. HP
14.6.6.2.1. DV Labs
14.6.6.3. HotWAN
14.6.6.4. Intel Security
14.6.6.5. SecNiche Labs
14.6.6.6. Sourcefire VRT
14.6.6.7. Symantec
14.6.6.8. VRLSec
14.6.6.9. Vupen