Information Security Technologies & Markets - by Lawrence Pingree

登録は簡単!. 無料です
または 登録 あなたのEメールアドレスで登録
Information Security Technologies & Markets - by Lawrence Pingree により Mind Map: Information Security Technologies & Markets - by Lawrence Pingree

1. Web Application Firewalls

1.1. Virtualized Appliances

1.1.1. A10 Networks

1.1.2. AlertLogic

1.1.3. Amazon AWS

1.1.3.1. Riverbed

1.1.4. Barracuda Networks

1.1.5. BeeWare

1.1.6. DenyAll

1.1.7. Ergon Informatik AG

1.1.8. F5

1.1.9. Fortinet

1.1.10. Forum Systems

1.1.11. Imperva

1.1.12. PentaSecurity

1.1.13. Trustwave

1.1.14. Citrix

1.1.14.1. Netscaler VPX

1.1.14.1.1. https://www.citrix.com/products/netscaler-application-delivery-controller/platforms.html

1.2. Physical Appliances

1.2.1. A10 Networks

1.2.2. AdNovum

1.2.3. AlertLogic

1.2.4. Anchiva

1.2.5. Barracuda Networks

1.2.6. BeeWare

1.2.7. BugSec

1.2.8. Citrix

1.2.9. DBAPPSecurity

1.2.10. DPtech

1.2.11. Dell Sonicwall

1.2.12. DenyAll

1.2.13. Ergon Informatik

1.2.13.1. https://www.airlock.com/en/products/airlock-waf/

1.2.14. F5

1.2.15. Fortinet

1.2.16. Forum Systems

1.2.17. HP

1.2.18. Imperva

1.2.19. NSFocus

1.2.20. PentaSecurity

1.2.21. Positive Technologies

1.2.21.1. http://www.ptsecurity.com/products/af/

1.2.22. RadWare

1.2.23. Trustwave

1.2.24. WINS TECHNET LTD

1.2.24.1. http://www.wins21.co.kr/

1.3. Software

1.3.1. Dedicated Software

1.3.1.1. AdNovum

1.3.1.2. Applicure

1.3.1.2.1. http://www.applicure.com/Products/dotdefender

1.3.1.3. DenyAll

1.3.1.4. ERGON Informatik AG

1.3.1.4.1. AIRLOCK

1.3.1.5. Forum Systems

1.3.1.6. Positive Security

1.3.1.7. Riverbed

1.3.1.8. Trustifier

1.3.1.8.1. https://www.trustifier.com/f/#!overview

1.3.1.9. WebScurity

1.3.2. Open Source

1.3.2.1. IronBee

1.3.2.2. Mod Security

1.3.3. Web Server Modules

1.3.3.1. Microsoft IIS

1.3.3.1.1. AQTRONIX

1.3.3.1.2. Applicure

1.3.3.1.3. BeyondTrust

1.3.3.1.4. ThreatSentry

1.3.3.2. Apache

1.3.3.2.1. Applicure

1.4. Managed Services

1.4.1. Dell Secureworks

1.4.2. AT&T

1.4.3. Verizon Business

1.5. Software as a Service

1.5.1. Akamai

1.5.1.1. Kona

1.5.2. AlertLogic

1.5.3. Anquanbao

1.5.4. ArmorLogic

1.5.5. BinarySec

1.5.6. CloudFlare

1.5.7. DenyAll

1.5.7.1. http://www.denyall.com/products/web-application-firewall/

1.5.8. FireBlade

1.5.9. Imperva (Incapsula)

1.5.9.1. http://www.incapsula.com

1.5.10. Incapsula

1.5.11. PowerCDN

1.5.12. Qualys

1.5.13. Securi

1.5.14. Signal Sciences

1.5.15. Soha

1.5.15.1. http://soha.io/

1.5.16. ZenEdge

2. Endpoint Security

2.1. Anti-Malware

2.1.1. Eastern Europe

2.1.1.1. Czech Republic

2.1.1.1.1. Avast

2.1.1.1.2. TrustPort

2.1.1.2. Denmark

2.1.1.2.1. BullGuard

2.1.1.3. Netherlands

2.1.1.3.1. AVG

2.1.1.4. Romania

2.1.1.4.1. Bitdefender

2.1.1.5. Slovakia

2.1.1.5.1. ESET

2.1.2. Emerging Asia/Pacific

2.1.2.1. India

2.1.2.1.1. eScan

2.1.2.1.2. K7 Computing

2.1.3. Latin America

2.1.3.1. Spain

2.1.3.1.1. Optenet

2.1.4. Mature Asia/Pacific

2.1.4.1. China

2.1.4.1.1. Qihoo

2.1.4.1.2. Rising International Software

2.1.4.2. South Korean

2.1.4.2.1. AhnLab

2.1.4.2.2. BKAV

2.1.4.2.3. ESTsoft

2.1.5. Middle East and Africa

2.1.5.1. Israel

2.1.5.1.1. Check Point Software

2.1.6. North America

2.1.6.1. Cyren

2.1.6.2. Fortinet

2.1.6.3. Intel Security

2.1.6.4. MalwareBytes

2.1.6.5. McAfee

2.1.6.6. Microsoft

2.1.6.7. PC Pitstop

2.1.6.8. Reason Core Security

2.1.6.9. Roboscan

2.1.6.10. Symantec

2.1.6.11. ThreatTrack

2.1.6.12. Total Defense

2.1.6.13. Trend Micro

2.1.7. Russia

2.1.7.1. Kaspersky

2.1.8. Western Europe

2.1.8.1. Austria

2.1.8.1.1. Ikarus Security

2.1.8.2. Finland

2.1.8.2.1. F-Secure

2.1.8.3. Germany

2.1.8.3.1. Avira

2.1.8.3.2. G-Data

2.1.8.3.3. Kromtech

2.1.8.4. Norway

2.1.8.4.1. Norman

2.1.8.5. United Kingdom

2.1.8.5.1. Sophos

2.1.8.6. Poland

2.1.8.6.1. Arcabit

2.2. Application Isolation

2.2.1. Blue Ridge Networks

2.2.1.1. http://www.blueridge.com/index.php/products/appguard/consumer

2.2.2. Bromium

2.2.3. Bufferzone

2.2.4. Invincea

2.2.4.1. SandBoxie

2.2.5. VMware

2.3. Endpoint Sandboxes and Virtualized Containers

2.3.1. Endpoint Sandboxes

2.3.1.1. Panda

2.3.1.1.1. www.panda.com

2.3.1.2. Sandboxie

2.3.1.2.1. http://www.sandboxie.com/

2.3.1.3. Bitdefender

2.3.1.3.1. www.bitdefender.com

2.3.2. Type-0 Hypervisors

2.3.2.1. Lynxworks

2.3.2.1.1. http://www.lynuxworks.com/

2.3.2.2. Zirtu

2.3.3. Process Isolation/Virtualization

2.3.3.1. Avectco

2.3.3.2. Bromium

2.3.3.3. Invincea

2.4. Endpoint Intrusion Prevention

2.4.1. Arkoon

2.4.1.1. StormShield

2.4.2. BeyondTrust

2.4.3. IBM

2.4.4. Landesk

2.4.5. McAfee

2.4.6. Safensoft

2.4.7. Symantec

2.5. Enterprise Mobility Mangement Suites

2.5.1. Absolute Software

2.5.2. AMware

2.5.2.1. Airwatch

2.5.3. Blackberry

2.5.4. Citrix

2.5.5. Globo

2.5.6. Good Technologies

2.5.7. IBM

2.5.8. Landesk

2.5.9. MobileIron

2.5.10. Mojave

2.5.10.1. https://www.mojave.net/

2.5.11. SAP

2.5.12. Sophos

2.5.13. Soti

2.5.14. Symantec

2.5.15. Tangoe

2.6. Application Control

2.6.1. AppSense

2.6.2. Avecto

2.6.3. Bit9

2.6.4. Landesk

2.6.5. Lumension

2.6.6. McAfee

2.6.7. Sophos

2.6.8. Symantec

2.6.9. Trend Micro

2.7. Exploit Technique Prevention Software

2.7.1. CyActive

2.7.2. CyBellum

2.7.3. Malwarebytes Anti-Exploit

2.7.4. Microsoft

2.7.4.1. Microsoft EMET - FREE

2.7.5. Morphisec

2.7.6. Palo Alto Networks

2.7.6.1. Endpoint

2.7.7. Sophos

2.7.7.1. Intercept X

2.7.8. Trend Micro

2.7.9. ViRobot APT Shield

2.8. File Integrity Monitoring

2.8.1. Open Source

2.8.1.1. 1. AIDE

2.8.1.2. 2. Trend Micro

2.8.1.2.1. 1. OSSEC

2.8.1.3. 3. Samhain

2.8.1.4. 4. Osiris

2.8.1.5. 5. Integrit

2.8.1.6. 6. Tripwire

2.8.2. Commercial

2.8.2.1. Imperva

2.8.2.2. Intel Security

2.8.2.3. Tripwire

2.9. Malware Analysis

2.9.1. Botnets

2.9.1.1. spyeyetracker.abuse.ch

2.9.2. Internet Identity

2.9.3. Malware Patrol

2.9.4. SpamHaus

2.9.5. Team Cymru

2.9.6. ThreatGrid

2.9.7. VirusTotal

2.9.8. zeustracker.abuse.ch

2.9.9. JoeSecurity

2.9.10. Shadowserver

2.10. Mobile Device Management

2.10.1. Absolute Software

2.10.2. Beachhead Security

2.10.3. Blackberry

2.10.4. Citrix

2.10.5. Globo

2.10.6. Good Technologies

2.10.7. IBM

2.10.8. Landesk

2.10.9. MobileIron

2.10.10. Mojave

2.10.10.1. https://www.mojave.net/

2.10.11. SAP

2.10.12. Sophos

2.10.13. Soti

2.10.14. Symantec

2.10.15. Tangoe

2.10.16. VMware

2.10.16.1. Airwatch

2.11. Policy Assessment and System Configuration Management

2.11.1. BMC

2.11.1.1. BMC Server Automation

2.11.2. Check Point Software

2.11.2.1. Endpoint Policy Management

2.11.3. IBM

2.11.3.1. IBM Endpoint Manager

2.11.4. Intel Security

2.11.4.1. Policy Auditor

2.11.5. RedHat

2.11.5.1. OpenSCAP

2.11.6. Saint

2.11.6.1. Saint Security

2.11.7. Tripwire

2.11.7.1. Tripwire Enterprise

3. Identity and Access Management (IAM)

3.1. AD/Unix bridge

3.1.1. Centrify

3.2. Enterprise single sign-on (ESSO)

3.3. Externalized authorization management (EAM)

3.3.1. Axiomatics

3.3.2. Dell Quest (BitKoo)

3.4. IAM as a Service

3.4.1. Centrify

3.4.2. IBM (Formerly Lighthouse Security)

3.4.3. Identity Automation

3.4.4. Intel

3.4.5. Okta

3.4.6. Password Bank

3.4.7. Ping Identity

3.4.8. Sailpoint

3.4.9. Symplifyed

3.4.10. iWelcome

3.5. Identity governance and administration

3.5.1. CA Technologies

3.5.2. IBM Security

3.5.3. Oracle

3.5.4. RSA (Aveksa)

3.6. Privileged account management (PAM)

3.6.1. BeyondTrust

3.6.2. Lieberman Software

3.6.3. Cyber Ark

3.6.4. Dell

3.6.5. Centrify

3.7. Public Certificate Authorities

3.7.1. Comodo

3.7.2. Geotrust

3.7.3. Godaddy

3.7.4. Symantec (Formerly VeriSign)

3.8. User Authentication

3.8.1. Tokens

3.8.1.1. OOB authentication

3.8.1.1.1. SMS

3.8.1.1.2. Voice

3.8.1.1.3. Push

3.8.1.1.4. Email

3.8.1.1.5. Social media

3.8.1.2. OTP tokens

3.8.1.2.1. OTP hardware tokens

3.8.1.2.2. OTP software tokens for smart phones

3.8.1.3. X.509 tokens

3.8.1.4. Other tokens

3.8.1.4.1. ANECT AS - ALUCID

3.8.2. Contextual authentication

3.8.2.1. Google

3.8.2.1.1. Trust API

3.8.3. KBA

3.8.3.1. It's Me Security

3.8.3.1.1. http://www.itsmesecurity.com/

3.8.4. Biometrics

3.8.4.1. Behavioral

3.8.4.1.1. Typing rhythm/keystroke dynamics

3.8.4.1.2. Voice recognition

3.8.4.2. Biological

3.8.4.2.1. Face recognition

3.8.4.2.2. Fingerprint

3.8.5. Wide-focus vendors

3.8.5.1. Alladin-RD

3.8.5.2. CA Technologies

3.8.5.3. Entrust

3.8.5.4. HID Global

3.8.5.5. RSA

3.8.5.5.1. Adaptive Auth

3.8.5.6. Gemalto

3.8.5.7. Symantec

3.8.5.8. Technology Nexus

3.8.5.9. VASCO

3.9. User Privilege Management

3.9.1. Appsense

3.9.1.1. http://www.appsense.com/

3.9.2. Ariella

3.9.2.1. http://www.arellia.com/

3.9.3. Avectco

3.9.3.1. http://www.avecto.com/

3.9.4. BeyondTrust

3.9.4.1. http://www.beyondtrust.com/

3.9.5. Centrify

3.9.5.1. http://www.centrify.com/

3.9.6. CionSystems

3.9.7. CrossIdeas

3.9.7.1. http://www.crossideas.com/

3.9.8. Dell

3.9.8.1. http://www.quest.com/desktop-authority-management-suite/

3.9.9. Lieberman Software

3.9.9.1. http://www.liebsoft.com/

3.9.10. Viewfinity

3.9.10.1. http://www.viewfinity.com/

4. Random Knowledge

4.1. Detection Methods

4.1.1. File Analysis

4.1.1.1. Computed Hash

4.1.1.1.1. Uniqueness

4.1.1.2. Metadata Attributes

4.1.1.2.1. File Content Inspection

4.1.1.2.2. File Headers

4.1.1.2.3. Temporal Analysis

4.1.1.2.4. Temporal Analysis with Prevalence

4.1.1.2.5. Time/Date

4.1.1.2.6. Certificate and Signature Evaluation (PKI)

4.1.1.3. Packing Method

4.1.1.3.1. Multi-packing Analysis

4.1.2. Network Specific

4.1.2.1. Protocol/File/Session Decode & Analysis

4.1.2.1.1. File Extraction

4.1.2.1.2. Playback (Surveillance)

4.1.2.1.3. File/Session Viewing

4.1.2.1.4. Correlation

4.1.2.1.5. Machine Learning (AI)

4.1.2.2. Network Flow Analysis

4.1.2.2.1. Machine Learning (AI)

4.1.2.3. Application Layer Analysis

4.1.2.3.1. Classification, Correlation , Deviance from Baselines (Heuristics)

4.1.2.3.2. Deep Packet Inspection (DPI)

4.1.2.3.3. Application Command and Input Analysis

4.1.2.4. IP Layer Analysis

4.1.2.4.1. TCP/UDP Ports

4.1.2.4.2. IP Address

4.1.3. Malware Behavioral Evaluations

4.1.3.1. Persistence

4.1.3.1.1. Installs as System Service

4.1.3.1.2. Installs Registry Keys in Startup locations

4.1.3.1.3. Modifies filesystem in specific locations

4.1.3.2. Suspicious Behaviors Evaluated

4.1.3.2.1. Attempts to login to systems that a specific user credential is not normally used on

4.1.3.2.2. Becomes another user on the system

4.1.3.2.3. CPU of Processes Spawned is high

4.1.3.2.4. Connects with a known bad URL or IP Address

4.1.3.2.5. Escalates privileges

4.1.3.2.6. Examines the Documents Folder or User Document Folders

4.1.3.2.7. File Isn't widely prevalent in user population

4.1.3.2.8. Injects data into memory of another running process

4.1.3.2.9. Modifies memory of another process

4.1.3.2.10. Opens TCP/IP Connections to other hosts

4.1.3.2.11. Performs a network port sweep

4.1.3.2.12. Process executes net use DOS command inside command.exe

4.1.3.2.13. Process spawns command.exe

4.1.3.2.14. Removes logs/events of application logs or operating system

4.1.3.2.15. Self Delete of files

4.1.3.2.16. Self-copy of files

4.1.3.2.17. Starts to repeatedly call the crypt function (ransom sign)

4.1.3.2.18. Time of execution is not normal in context of historical analysis

4.1.4. User

4.1.4.1. Activity on system when user's employment is in termination status

4.1.4.2. Deviates from past user behavior

4.1.4.3. Device not historically associated to user

4.1.4.4. Login time anamoly

4.1.4.5. Login time outside user's home timezone

4.1.4.6. Privileged data accessed

4.1.4.6.1. Volumetric analysis

4.1.4.6.2. Deviation from baseline

4.1.4.6.3. Cut-paste function used

4.1.4.7. Remote access and time of day abnormal from baselines

4.1.4.8. User authentication failure

4.1.4.9. User's browser or viewer is not the same as the baseline

4.1.4.10. User is logging into system remotely and locally simultaneously

4.1.4.11. User is logging into system remotely  (not expected)

4.1.4.12. User is logging into system remotely at an abnormal time

4.1.4.13. User is abnormally leveraging applications that are administrative in nature (Control Panel, Command.exe, Group Policy Editor, etc)

5. Cloud Security

5.1. Cloud/Virtualized Firewalls

5.1.1. Agent-Based

5.1.1.1. CloudPassage

5.1.1.2. Drawbridge Networks

5.1.1.3. Illumio

5.1.2. Cisco

5.1.3. Citrix Xen

5.1.3.1. Hillstone Networks

5.1.3.2. Huawei

5.1.3.3. Fortinet

5.1.3.4. Palo Alto Networks

5.1.4. Container-Based

5.1.4.1. ShieldX

5.1.5. Hyper-V

5.1.5.1. Fortinet

5.1.6. KVM

5.1.6.1. Hillstone Networks

5.1.6.2. Juniper Networks

5.1.6.3. Palo Alto Networks

5.1.7. Openstack

5.1.7.1. OpenFlow

5.1.7.1.1. Fortinet

5.1.7.2. Juniper Networks

5.1.8. Public Cloud

5.1.8.1. Virtual Appliances

5.1.8.1.1. Barracuda

5.1.8.1.2. Brocade

5.1.8.1.3. Catbird Networks

5.1.8.1.4. Check Point Software

5.1.8.1.5. Juniper Networks

5.1.8.1.6. Palo Alto Networks

5.1.8.1.7. PfSense

5.1.8.1.8. Sophos

5.1.8.1.9. vArmour

5.1.8.2. API-Driven

5.1.8.2.1. Dome9

5.1.8.2.2. Illumio

5.1.8.3. AWS

5.1.8.3.1. Check Point Software

5.1.8.3.2. Fortinet

5.1.8.3.3. Palo Alto Networks

5.1.8.4. Microsoft Azure

5.1.8.4.1. Check Point Software

5.1.8.4.2. Fortinet

5.1.8.5. Container-Based

5.1.9. VMware Environments

5.1.9.1. API Integration

5.1.9.1.1. Check Point Software

5.1.9.1.2. Fortinet

5.1.9.1.3. Palo Alto Networks

5.1.9.2. NSX

5.1.9.2.1. Fortinet

5.1.9.2.2. Check Point Software

5.1.9.3. VM Appliance

5.1.9.3.1. Barracuda

5.1.9.3.2. Brocade

5.1.9.3.3. Catbird Networks

5.1.9.3.4. Check Point Software

5.1.9.3.5. Fortinet

5.1.9.3.6. Hillstone Networks

5.1.9.3.7. Juniper Networks

5.1.9.3.8. Palo Alto Networks

5.1.9.3.9. PfSense

5.1.9.3.10. Sophos

5.1.9.3.11. vArmour

5.1.9.3.12. Huawei

6. Infrastructure Protection

6.1. Active Directory Defense

6.1.1. Aorato

6.1.1.1. http://www.aorato.com/

6.2. Cloud-Based Remote Access VPN

6.2.1. Check Point

6.2.1.1. Capsule Cloud

6.2.2. Pertino

6.2.3. Soha

6.3. DNS-based Threat Prevention/Detection

6.3.1. Standalone Appliances

6.3.1.1. Bluecat Networks

6.3.1.2. Efficient IP

6.3.1.3. Infoblox

6.3.2. Recursive DNS  Services

6.3.2.1. Bluecat Networks

6.3.2.2. Cisco

6.3.2.2.1. OpenDNS

6.3.2.3. Comodo

6.3.2.4. CrowdStrike

6.3.2.5. Infoblox

6.3.2.6. Neustar

6.3.2.7. Nominum

6.3.2.8. Symantec

6.3.2.9. ThreatStop

6.3.2.10. Verisign

6.3.3. Firewalls

6.3.3.1. Palo Alto Networks

6.4. Denial of Service Protection

6.4.1. Appliances

6.4.1.1. Arbor Networks

6.4.1.1.1. Prevail APS

6.4.1.2. Check Point Software

6.4.1.2.1. DDos Protector

6.4.1.3. Corero

6.4.1.4. Fortinet

6.4.1.5. Genie Networks

6.4.1.5.1. ATM Appliances

6.4.1.6. NSFOCUS

6.4.1.7. Radware

6.4.1.8. WINS TECHNET LTD

6.4.1.8.1. http://www.wins21.co.kr/

6.4.2. Security as a Service

6.4.2.1. HTTP/HTTPS Only

6.4.2.1.1. DOSArrest

6.4.2.1.2. Cloudflare

6.4.2.2. MultiProtocol/Network

6.4.2.2.1. Akamai

6.4.2.2.2. Black Lotus

6.4.2.2.3. Cloud Flare

6.4.2.2.4. F5

6.4.2.2.5. Incapsula

6.4.2.2.6. Link11

6.4.2.2.7. Neustar

6.4.2.2.8. NexusGuard

6.4.2.2.9. Verisign Inc

6.4.3. Clean Pipe Services

6.4.3.1. AT&T

6.4.3.2. Verizon

6.5. Fraud Prevention/Web Malware Monitoring

6.5.1. Fraud/Bot/Webscrape Prevention

6.5.1.1. Software

6.5.1.1.1. RSA (EMC)

6.5.1.1.2. IBM (Formerly Trusteer)

6.5.1.1.3. Intellinx

6.5.1.2. Appliances

6.5.1.2.1. RSA

6.5.1.2.2. Distil Networks

6.5.1.2.3. White Ops

6.5.1.3. Software as a Service

6.5.1.3.1. Akamai

6.5.1.3.2. BioCatch

6.5.1.3.3. Distil Networks

6.5.1.3.4. Guardian Analytics

6.5.1.3.5. Kount

6.5.1.3.6. MarkMonitor

6.5.1.3.7. ShieldSquare

6.5.1.3.8. ThreatMetrix

6.5.1.3.9. White Ops

6.5.1.3.10. X-Cart

6.5.1.3.11. iovation

6.5.1.4. Virtual Appliances

6.5.1.4.1. Distil Networks

6.5.2. Website & Ad Malware Monitoring

6.5.2.1. Ad-Juster

6.5.2.2. Globalsign

6.5.2.2.1. Leverages Hackalert

6.5.2.3. Hackalert

6.5.2.4. Intel Security

6.5.2.4.1. Siteadvisor

6.5.2.5. QualysGuard

6.5.2.6. RiskIQ

6.5.2.7. Sucuri

6.6. Network Access Control (NAC)

6.6.1. Host Based

6.6.1.1. Symantec

6.6.1.2. Intel Security

6.6.2. Network Based

6.6.2.1. Aruba Networks

6.6.2.2. Bradford Networks

6.6.2.3. Cisco

6.6.2.4. Forescout

6.6.2.5. Milton Security Group

6.6.2.6. Portnox

6.7. Network Anonymization & Consumer VPN Services

6.7.1. AnchorFree Hotspot Shield

6.7.2. Anonymize.net

6.7.3. CyberGhost

6.7.4. Dispel

6.7.5. GoldenFrog

6.7.6. HMA ProVPN

6.7.6.1. TorVPN

6.7.7. Okayfreedom

6.7.8. OpenVPN Shield Exchange

6.7.9. Private Wifi

6.7.10. Tor

6.7.11. luminati.io

6.8. Network Firewalls

6.8.1. Carrier Firewalls

6.8.2. Enterprise Firewalls

6.8.2.1. Multifunction Enterprise Firewalls

6.8.2.1.1. Bluedon

6.8.2.1.2. Check Point Software

6.8.2.1.3. Cisco

6.8.2.1.4. Fortinet

6.8.2.1.5. Huawei

6.8.2.1.6. Palo Alto Networks

6.8.2.1.7. Sonicwall

6.8.2.1.8. Websense (Formerly Intel Security)

6.8.2.2. Stateful Inspection - Traditional Firewalls

6.8.2.2.1. Cisco

6.8.2.2.2. Huawei

6.8.2.2.3. Check Point Software

6.8.3. Multi-Funtion SMB Firewalls

6.8.3.1. 443 Networks

6.8.3.2. Bluedon

6.8.3.3. Check Point Software

6.8.3.4. CheckPoint

6.8.3.5. Cisco

6.8.3.6. Clavister

6.8.3.7. Endian

6.8.3.8. Fortinet

6.8.3.9. Hillstone Networks

6.8.3.10. Meraki

6.8.3.11. PineApp

6.8.3.11.1. http://www.pineapp.com/

6.8.3.12. Sangfor

6.8.3.13. Sonicwall

6.8.3.14. Sophos

6.8.3.15. Trustwave

6.8.3.16. Untangle

6.8.3.17. WINS TechNet LTD

6.8.3.17.1. http://www.wins21.co.kr/

6.8.3.18. WatchGuard

6.8.4. Open Source & Community

6.8.4.1. IPTables

6.8.4.2. IPchains

6.8.4.3. PFSense

6.8.4.4. Untangle

6.8.5. Router Firewalls

6.9. Network Intrusion Detection/Prevention

6.9.1. Predictive Modeling

6.9.1.1. Cyactive

6.9.1.2. Trustpipe

6.9.2. IBM

6.9.3. Signature Based

6.9.3.1. AlienVault

6.9.3.1.1. Snort

6.9.3.2. Bricata

6.9.3.3. CheckPoint

6.9.3.4. Cisco

6.9.3.4.1. Sourcefire

6.9.3.5. Enterasys

6.9.3.6. Fortinet

6.9.3.7. HP

6.9.3.7.1. TippingPoint

6.9.3.8. IBM

6.9.3.9. Intel Security

6.9.3.10. Open Source

6.9.3.10.1. Snort

6.9.3.11. Symantec

6.9.3.11.1. APT Network

6.9.3.12. WINS TECHNET LTD

6.9.3.12.1. http://www.wins21.co.kr/

6.9.4. SCADA

6.9.4.1. Radiflow

6.10. Network Packet Brokers

6.10.1. Adara

6.10.2. Apcon

6.10.3. Arista Networks

6.10.4. Cubro

6.10.5. Gigamon

6.10.6. IXIA

6.10.7. Interface Masters Technologies

6.10.8. JDSU

6.10.9. NetOptics

6.10.10. NetScout

6.10.11. VSS Monitoring

6.11. Network Traffic Analysis, Network Behavior Analysis and Network Forensics

6.11.1. Flow Analysis/Metadata Extraction

6.11.1.1. Arbor Networks

6.11.1.2. IBM

6.11.1.3. Lancope

6.11.1.4. LogRythm

6.11.1.5. Intel Security NBA

6.11.2. Forensic Capture with User Surveillance & Security Threat Analytics

6.11.2.1. Access Data

6.11.2.2. BlueCoat

6.11.2.3. Cisco

6.11.2.3.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html

6.11.2.4. EMC

6.11.2.5. FireEye

6.11.2.6. Fluke Networks

6.11.2.7. IBM

6.11.2.8. IP Fabrics

6.11.2.9. JDSU (Network Instruments)

6.11.2.10. LightCyber

6.11.2.11. NetAgent

6.11.2.12. NetResec

6.11.2.13. NetScout

6.11.2.14. Niksun

6.11.2.15. Novetta Solutions

6.11.2.16. Nuix

6.11.2.17. Packetsled

6.11.2.18. Riverbed

6.11.2.19. SS8

6.11.2.19.1. http://www.ss8.com/

6.11.2.20. nPulse Technologies

6.11.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring

6.11.3.1. Emulex

6.11.3.2. Packetsled

6.11.3.3. WildPackets

6.11.4. Network Forensics Tools

6.11.4.1. Alert Logic

6.11.4.1.1. Formerly Click Security

6.11.4.2. Corvil

6.11.4.3. Cybersift

6.11.4.3.1. http://www.cybersift.net/sifter10app.html

6.11.4.4. Decision Group INC

6.11.4.4.1. http://www.edecision4u.com/index.html

6.11.4.5. EMC

6.11.4.6. FireEye

6.11.4.7. Fluke Networks

6.11.4.8. IP Fabrics

6.11.4.9. IPCopper

6.11.4.10. InveaTech

6.11.4.10.1. https://www.invea.com/en/products-and-services/li-system

6.11.4.11. KLOS

6.11.4.11.1. http://www.klos.com/applications/lawful-intercept/

6.11.4.12. NEXT Computing

6.11.4.12.1. http://www.nextcomputing.com/products/packet-capture-systems

6.11.4.13. NetReSec

6.11.4.14. Niksun

6.11.4.15. Radisys

6.11.4.15.1. http://www.radisys.com/products/network-appliance/

6.11.4.16. Utimaco

6.11.4.16.1. https://lims.utimaco.com/utimaco-lims/

6.11.4.17. WildPackets

6.11.5. Network Forensics Tools as a Service (NFTaaS)

6.11.5.1. CloudShark

6.11.6. Network Taps

6.11.6.1. Optical

6.11.6.1.1. Apcon

6.11.6.1.2. DataCom Systems

6.11.6.1.3. FibreDyne

6.11.6.1.4. Gigamon

6.11.6.1.5. Glimmerglass

6.11.6.1.6. M2Optics

6.11.6.1.7. Netoptics

6.11.6.1.8. Network Instruments

6.11.6.1.9. VSS Monitoring

6.11.6.1.10. nTAP

6.11.7. Network Traffic Analysis

6.11.7.1. Amgine Securus

6.11.7.2. Arbor Networks

6.11.7.3. Boeing

6.11.7.4. Cisco

6.11.7.4.1. http://www.cisco.com/c/en/us/products/data-center-analytics/tetration-analytics/index.html

6.11.7.5. Corvil

6.11.7.6. Cyber adAPT

6.11.7.7. Damballa

6.11.7.8. Darktrace

6.11.7.9. ExtraHop Networks

6.11.7.10. Fidelis Cybersecurity

6.11.7.11. Lancope

6.11.7.12. Light Cyber

6.11.7.13. Novetta Solutions

6.11.7.14. PacketSled

6.11.7.15. Phirelight

6.11.7.16. Qihoo 360

6.11.7.16.1. SkyEye

6.11.7.17. RedJack

6.11.7.18. SlashNext

6.11.7.19. Splunk

6.11.7.20. Taasera

6.11.7.21. ThreatTrack

6.11.7.22. Trustport

6.11.7.22.1. Threat Intelligence

6.11.7.23. Vectra Networks

6.11.7.24. WireX

6.11.8. Raw Network Packet Capture

6.11.8.1. Apcon

6.11.8.1.1. Riverbed

6.11.8.1.2. Netfort

6.11.8.1.3. Wireshark

6.11.8.1.4. NTOP

6.11.8.2. Arbor Networks

6.11.8.3. Comworth

6.11.8.4. NTOP.org

6.11.8.5. Netfort

6.11.8.6. WireShark

6.12. Network-Based Advanced Threat Protection

6.12.1. Firewalls with Malware Sandbox Capabilities

6.12.1.1. Barracuda

6.12.1.2. Check Point Software

6.12.1.3. Cisco

6.12.1.4. Fortinet

6.12.1.5. Huawei

6.12.1.6. Juniper Networks

6.12.1.7. Palo Alto Networks

6.12.1.8. Sonicwall

6.12.1.9. Sophos

6.12.1.10. Watchguard

6.12.2. Appliance Based Malware Sandboxes

6.12.2.1. AMGINE SECURUS

6.12.2.1.1. http://www.amgine.co.kr/index.html

6.12.2.2. AhnLab

6.12.2.3. Bluecoat

6.12.2.4. Check Point Software

6.12.2.4.1. Emulator Blade

6.12.2.5. Cisco

6.12.2.5.1. ThreatGrid

6.12.2.6. ContentKeeper

6.12.2.7. Cyphort

6.12.2.8. Damballa

6.12.2.9. FireEye

6.12.2.10. Fortinet

6.12.2.10.1. FortiSandbox

6.12.2.11. General Dynamics

6.12.2.11.1. Fidelis Security Systems

6.12.2.12. Huawei

6.12.2.12.1. Firehunter

6.12.2.13. Intel Security

6.12.2.13.1. McAfee Advanced Threat Detection Appliance

6.12.2.14. LastLine

6.12.2.15. Palo Alto Networks

6.12.2.15.1. WildFire

6.12.2.16. Payload Security

6.12.2.17. Qihoo

6.12.2.17.1. SkyEye

6.12.2.18. Techguard Security

6.12.2.19. ThreatTrack

6.12.2.20. Trend Micro

6.12.2.20.1. Deep Discovery

6.12.2.21. VMRay

6.12.2.22. VeeDog

6.12.2.22.1. http://veedog.com/

6.12.2.23. WINS TECHNET LTD

6.12.2.23.1. http://www.wins21.co.kr/

6.12.3. Cloud-Based Malware Sandboxes

6.12.3.1. Cisco

6.12.3.1.1. ThreatGrid

6.12.3.2. Fortinet

6.12.3.3. Huawei

6.12.3.4. Joe Security

6.12.3.5. Lastline

6.12.3.6. Netwitness

6.12.3.6.1. Spectrum

6.12.3.7. Palo Alto Networks

6.12.3.7.1. WildFire

6.12.3.8. Qihoo

6.12.3.8.1. SkyEye

6.12.3.9. Sonicwall

6.13. SCADA/ICS

6.13.1. Monitoring

6.13.1.1. CRITIFENSE

6.13.1.2. Cyberbit

6.13.1.3. PFP Cybersecurity

6.13.2. SCADA Firewalls

6.13.2.1. BAE Systems

6.13.2.1.1. http://www.baesystems.com/en-us/product/scada-firewall

6.13.2.2. Bayshore Networks

6.13.2.2.1. https://www.bayshorenetworks.com/products/it-ot-gateway/

6.13.2.3. Check Point Software

6.13.2.3.1. https://www.checkpoint.com/products-solutions/critical-infrastructure/

6.13.2.4. Endian

6.13.2.4.1. http://www.endian.com/products/4i/

6.13.2.5. Fortinet

6.13.2.5.1. https://www.fortinet.com/solutions/industries/scada-industrial-control-systems.html

6.13.2.6. Tofino Security

6.13.2.6.1. https://www.tofinosecurity.com/products/Tofino-Firewall-LSM

6.14. SSL Inspection Appliances

6.14.1. A10 Networks

6.14.2. Bluecoat

6.14.3. ResolutionOne

6.14.4. VSS Monitoring

6.14.5. SourceFire

6.15. Software Defined Perimeter

6.15.1. Certes Networks

6.15.2. Cryptzone

6.15.3. Tempered Networks

6.15.4. Unisys Stealth

6.15.5. Vidder

6.15.6. Waverly Labs

6.16. Virtual Private Networking (VPN/SSL VPN)

6.16.1. IPSec VPN Concentrators

6.16.1.1. Certes Networks

6.16.1.2. CheckPoint Software

6.16.1.3. Cisco

6.16.1.4. Mako Networks

6.16.2. Layer 2 Encryption

6.16.2.1. Certes Networks

6.16.3. Layer 4 Encryption

6.16.3.1. Certes Networks

6.16.4. SSL VPN

6.16.4.1. AhnLab

6.16.4.2. Array Networks

6.16.4.3. Barracuda Networks

6.16.4.4. Check Point Software

6.16.4.5. Cisco

6.16.4.6. Citrix

6.16.4.7. F5 Networks

6.16.4.8. Fortinet

6.16.4.9. Hillstone Networks

6.16.4.10. Juniper

6.16.4.11. NetGear

6.16.4.12. Sonicwall

6.16.4.13. Stonesoft

6.16.4.14. WatchGuard

6.16.5. Multi-Path Dynamic VPN

6.16.5.1. Secret Double Octopus

6.16.5.2. Dispersive Networks

6.17. Web/Email Protection

6.17.1. Secure Email Gateways

6.17.1.1. Alt-N Technologies

6.17.1.2. Bluecoat

6.17.1.3. Fortinet

6.17.1.4. GWAVA

6.17.1.5. Intel Security

6.17.1.6. Proofpoint

6.17.1.7. Re-Sec

6.17.1.8. Sonicwall

6.17.1.9. Symantec

6.17.1.10. Trustwave

6.17.1.11. Voitiro

6.17.1.12. Websense

6.17.1.13. iBoss

6.17.2. Secure Web Gateways

6.17.2.1. Anchiva

6.17.2.2. Bluecoat

6.17.2.3. ContentKeeper

6.17.2.4. GWAVA

6.17.2.5. Intel Security

6.17.2.6. Re-Sec

6.17.2.7. Symantec

6.17.2.8. Trustwave

6.17.2.9. Websense

6.17.2.10. iBoss

6.17.3. Security as a Service

6.17.3.1. Web & Email SaaS

6.17.3.1.1. Appriver

6.17.3.1.2. Barracuda

6.17.3.1.3. Bitglass

6.17.3.1.4. Cisco

6.17.3.1.5. Intel Security

6.17.3.1.6. MailGuard

6.17.3.1.7. Spamina

6.17.3.1.8. Symantec

6.17.3.1.9. Total Defense

6.17.3.1.10. TotalDefense

6.17.3.1.11. Websense

6.17.3.1.12. Zscaler

6.17.3.2. Web Only

6.17.3.2.1. Bluecoat

6.17.3.2.2. ContentKeeper

6.17.3.2.3. OpenDNS

6.17.3.2.4. Websense

6.17.3.2.5. Zscaler

6.17.3.3. Secure Email Gateways

6.17.3.3.1. Agari

6.17.3.3.2. CloudMark

6.17.3.3.3. Proofpoint

6.17.3.3.4. Return Path

6.17.3.3.5. Spam Experts

6.17.3.3.6. Spam Titan

6.17.3.3.7. Spamina

6.17.3.3.8. ValiMail

6.17.3.4. Anti-Phishing

6.17.3.4.1. Amgine Securus

6.17.3.4.2. Area1 Security

6.17.3.4.3. CloudMark

6.17.3.4.4. Cymbel

6.17.3.4.5. Cyveillance

6.17.3.4.6. FireEye

6.17.3.4.7. MailGuard

6.17.3.4.8. MediaPro

6.17.3.4.9. Phishlabs

6.17.3.4.10. ThreatTrack

6.17.3.4.11. Votiro

6.17.3.4.12. Webroot

6.17.3.4.13. ZapFraud

7. Application Security

7.1. Web Application Firewalls (WAF) & Application Security

7.1.1. Web Threat Disruption Technology

7.1.1.1. Software

7.1.1.1.1. NuCaptcha

7.1.1.1.2. NuData

7.1.1.2. Appliances

7.1.1.2.1. Juniper

7.1.1.2.2. Shape Security

7.1.1.3. Open Source

7.1.1.3.1. Google Hack Honeypot

7.2. Web Application Security

7.2.1. Code Review Products

7.2.1.1. HP

7.2.1.2. IBM

7.2.2. Web Application Vulnerability Scanning Services

7.2.2.1. Cenzic

7.2.2.2. Controlscan

7.2.2.3. High-Tech Bridge

7.2.2.4. McAfee Secure

7.2.2.5. Qualys

7.2.2.6. Securi

7.2.2.7. Sitelock

7.2.2.8. Trustwave

7.2.2.9. WebSecurify

7.2.2.10. WhiteHat Security

7.2.3. Scanning Software

7.2.3.1. Open Source

7.2.3.1.1. Arachni Scanner

7.2.3.1.2. Subgraph

7.2.3.1.3. W3af

7.2.3.1.4. Wapiti

7.2.3.1.5. Watcher

7.2.3.2. Commercial

7.2.3.2.1. Accunetix

7.2.3.2.2. BeyondTrust

7.2.3.2.3. Cenzic

7.2.3.2.4. HP

7.2.3.2.5. MavitunaSecurity

7.2.3.2.6. NTObjectives

7.2.3.2.7. Nstalker

7.2.3.2.8. Portswigger

7.2.3.2.9. Syhunt

8. Data & Collaboration Security

8.1. Data Governance and Classification

8.1.1. Expert Source

8.1.1.1. http://www.expertsource.in/index.php

8.1.2. HP

8.1.3. IBM

8.1.4. Informatica

8.1.5. Nuix

8.1.6. Somansa

8.1.7. Titus

8.1.8. boldonjames

8.2. Data Loss Prevention (DLP)

8.2.1. Endpoint

8.2.1.1. Data Classification and Tracking

8.2.1.1.1. Banyan Solutions

8.2.1.1.2. BoldonJames

8.2.1.1.3. Digital Guardian

8.2.1.1.4. HP

8.2.1.1.5. IBM

8.2.1.1.6. Identity Finder

8.2.1.1.7. Mach1 Development

8.2.1.1.8. Microsoft (Formerly Secure Islands)

8.2.1.1.9. MinerEye

8.2.1.1.10. Nuix

8.2.1.1.11. Smartlogic

8.2.1.1.12. Titus

8.2.1.1.13. Varonis

8.2.1.1.14. CoSoSys

8.2.1.2. Mobile

8.2.1.2.1. Symantec

8.2.1.2.2. Websense

8.2.1.2.3. Microsoft (Secure Islands)

8.2.1.3. Windows

8.2.1.3.1. Absolute Software

8.2.1.3.2. CA Technologies

8.2.1.3.3. Digital Guardian

8.2.1.3.4. GTB Technologies

8.2.1.3.5. Infowatch

8.2.1.3.6. Intel Security

8.2.1.3.7. RSA

8.2.1.3.8. Microsoft (Secure Islands)

8.2.1.3.9. Somansa

8.2.1.3.10. Symantec

8.2.1.3.11. Trustwave

8.2.1.3.12. Watchful Software

8.2.1.3.13. Raytheon-Websense

8.2.1.3.14. Zecurion

8.2.2. Network

8.2.2.1. Digital Guardian

8.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)

8.2.2.3. Symantec

8.2.2.4. InfoWatch

8.2.3. Secure Email Gateway

8.2.3.1. Cisco

8.2.3.2. Symantec

8.2.3.3. Intel Security

8.2.3.4. Somansa

8.2.4. Secure Web Gateway

8.2.4.1. Intel Security

8.2.4.2. Symantec

8.2.4.3. Somansa

8.2.5. Security as a Service

8.2.5.1. Consumer

8.2.5.1.1. Reputation.com

8.2.5.1.2. Social Fortress

8.2.5.1.3. PwnedList

8.2.5.2. Enterprise

8.2.5.2.1. Social Fortress

8.2.5.2.2. Google Apps

8.2.5.2.3. ZixCorp

8.3. Database Security

8.3.1. Database Audit and Protection (DAP)

8.3.1.1. Application Security, Inc

8.3.1.2. BeyondTrust

8.3.1.3. Big Data Platform DAP

8.3.1.3.1. BlueTalon

8.3.1.3.2. Cloudera

8.3.1.3.3. Hortonworks

8.3.1.3.4. IBM

8.3.1.3.5. Imperva

8.3.1.4. DataSunrise

8.3.1.5. Fortinet

8.3.1.6. GreenSQL

8.3.1.7. IBM

8.3.1.8. IRI

8.3.1.8.1. Oracle

8.3.1.8.2. SQL Server

8.3.1.9. Imperva

8.3.1.10. Intel Security

8.3.1.11. Mentis Software

8.3.1.12. Oracle Corp

8.3.1.13. PentaSecurity

8.3.1.14. Warevalley

8.3.2. Database Activity Monitoring

8.3.2.1. DB Networks

8.3.2.2. Somansa

8.4. Encryption/Tokenization

8.4.1. Big Data

8.4.1.1. Gazzang

8.4.1.2. Vormetric

8.4.2. Cloud/SAAS Encryption

8.4.2.1. Appliances

8.4.2.1.1. Office365

8.4.2.1.2. Ciphercloud

8.4.2.1.3. Afore Solutions

8.4.2.1.4. Perspecsys

8.4.2.2. Software

8.4.2.2.1. BoxCryptor

8.4.2.2.2. CloudMask

8.4.2.2.3. PrivateCore

8.4.2.2.4. Trend Micro

8.4.2.2.5. Viivo

8.4.2.2.6. Voltage Security

8.4.2.3. Software as a Service

8.4.2.3.1. Trend Micro

8.4.2.3.2. SooKasa

8.4.2.3.3. Gemalto

8.4.3. Cryptographic Providers

8.4.3.1. RSA

8.4.3.2. Quintessence

8.4.3.3. Microsoft

8.4.4. Data masking

8.4.4.1. Oracle

8.4.4.2. Dataguise

8.4.4.3. Informatica

8.4.4.4. IBM

8.4.4.5. Voltage Security

8.4.4.6. Green SQL

8.4.4.7. Mentis

8.4.4.8. Compuware

8.4.4.9. Axis

8.4.4.10. Privacy Analytics

8.4.4.11. Camouflage Software

8.4.4.12. Solix Technologies

8.4.4.13. Net 2000

8.4.5. Database

8.4.5.1. Gemalto

8.4.5.2. Dark Matter Labs

8.4.5.3. Vormetric

8.4.6. Email

8.4.6.1. ZixCorp

8.4.6.2. Encryptics

8.4.6.2.1. https://www.encryptics.com/default.aspx

8.4.7. Encrypted USB Storage

8.4.7.1. Apricorn

8.4.7.2. Datalocker

8.4.7.3. Integral Memory

8.4.7.4. IronKey

8.4.7.5. Kingston

8.4.7.6. Virbatim

8.4.8. File/Folder

8.4.8.1. Covertix

8.4.8.1.1. http://www.covertix.com/

8.4.8.2. IBM

8.4.8.2.1. Mainframe

8.4.8.3. SecureIslands

8.4.8.4. Sophos

8.4.8.4.1. SafeGuard Enterprise (Utimaco)

8.4.8.5. Symantec (PGP)

8.4.8.6. Vormetric

8.4.8.7. WinMagic

8.4.8.7.1. SecureDoc

8.4.9. Quantum Encryption

8.4.9.1. IDQ

8.4.9.2. Quintessence Labs

8.4.9.3. Whitewood Encryption

8.4.10. Tokenization

8.4.10.1. Protegrity

8.4.11. Whole Disk

8.4.11.1. Intel Security

8.4.11.2. Symantec (PGP)

8.4.11.3. CheckPoint Software

8.4.11.4. Encryption Management

8.4.11.4.1. Wave Systems

8.4.11.5. WinMagic

8.4.11.5.1. SecureDoc

8.4.11.6. Microsoft

8.4.11.6.1. Bitlocker

8.4.11.7. Sophos

8.4.11.7.1. SafeGuard Enterprise (Utimaco)

8.4.11.8. Trustwave

8.4.11.8.1. DataControl

8.4.11.9. Vormetric

8.5. File Analysis Software

8.5.1. Acaveo

8.5.2. Active Navigation

8.5.3. AvePoint

8.5.4. Beyond Recognition

8.5.5. Bloomberg

8.5.6. CommVault

8.5.7. Condrey

8.5.8. Covertix

8.5.9. DataGlobal

8.5.10. DataGravity

8.5.11. Equivio

8.5.12. HP

8.5.12.1. Control Point

8.5.13. HiSoftware

8.5.14. IBM

8.5.14.1. StoreIQ

8.5.15. Identifty Finder

8.5.16. Imperva

8.5.17. Index Engines

8.5.18. Kazoup

8.5.19. MailGuard

8.5.20. NTP Software

8.5.21. Novell

8.5.22. Nuix

8.5.23. Proofpoint

8.5.24. Stealthbits

8.5.25. Varonis

8.5.26. WatchDox

8.5.27. Whitebox Security

8.5.28. ZyLab

8.6. Hardware Security Modules (HSM)

8.6.1. Cloud HSM

8.6.1.1. Amazon

8.6.1.2. IBM

8.6.2. Hardware

8.6.2.1. FutureX

8.6.2.2. Gemalto

8.6.2.3. HPE

8.6.2.4. Safenet

8.6.2.5. Thales

8.7. Software Defined Storage Security

8.7.1. Dispersive Networks

8.7.1.1. https://dispersivetechnologies.com/

8.7.2. OceansBlue

8.7.2.1. http://www.oceansblue.net/index.html

8.8. eSignatures

8.8.1. Adobe eSign Services

8.8.2. Alphatrust

8.8.3. Docusign

8.8.4. Hellosign

8.8.5. Rightsignature

8.8.6. Sertifi

9. Security Consulting & Implementation

9.1. Forensics

9.1.1. Forensics

9.1.1.1. Incident Response

9.1.1.1.1. Crowdstrike

9.1.1.1.2. Cylance

9.1.1.1.3. Deloitte

9.1.1.1.4. Fidelis Cybersecurity

9.1.1.1.5. FireEye

9.1.1.1.6. Guidance Software

9.1.1.1.7. Maryman & Associates

9.1.1.1.8. NTT Coms Security

9.1.1.1.9. Nettitude

9.1.1.1.10. Optiv

9.1.1.1.11. Presecure

9.1.1.1.12. Secureworks

9.1.1.1.13. Verizon

9.1.1.2. E-Discovery & Computer Forensics

9.1.1.3. Endpoint Forensics

9.1.1.4. Network Forensics

9.2. Governance, Advisory, Assessment

9.2.1. Architecture and Design

9.2.2. Business Continuity

9.2.3. Compliance Review

9.2.4. Data Security Program

9.2.5. Governance, Compliance and Policy Design

9.2.5.1. Compliance Mandates

9.2.5.1.1. PCI

9.2.5.1.2. ISO

9.2.5.1.3. HITECH

9.2.5.1.4. HIPAA

9.2.6. People Centric Strategy

9.2.7. Policy Design

9.2.8. Program Assessment

9.2.9. Risk Assessment

9.2.10. Risk Management

9.2.10.1. Booz Allen Hamilton

9.2.10.2. Optiv

9.2.10.3. Cloud Risks

9.2.10.4. On Premise Infrastructure

9.2.10.5. Business Risk

9.2.11. Security Program Development

9.2.11.1. Optiv

9.2.11.2. FOX-IT

9.2.12. Strategy

9.2.13. Governance

9.2.13.1. Optiv

9.2.13.2. FOX-IT

9.2.13.3. Sec Consult

9.3. Operations

9.3.1. Application Security

9.3.1.1. Web

9.3.1.1.1. AppSec Consulting

9.3.1.1.2. Denim Group

9.3.1.1.3. Security Innovation

9.3.1.1.4. WhiteHat Security

9.3.1.1.5. Citigal

9.3.1.1.6. IOActive

9.3.1.2. Mobile

9.3.1.2.1. AppSec Consulting

9.3.1.2.2. Denim Group

9.3.1.3. Software Security Lifecycle (SDLC)

9.3.1.3.1. AppSecConsulting

9.3.1.3.2. Security Innovation

9.3.1.4. Custom Code

9.3.1.4.1. AppSec Consulting

9.3.1.4.2. Security Innovation

9.3.2. Application Security Vulnerability Assessement

9.3.3. Configuration Assessment

9.3.4. Device Security

9.3.5. Fraud, Identification and Privacy

9.3.6. Incident Response

9.3.6.1. Blackthorn Technologies

9.3.6.2. Crowdstrike

9.3.6.3. Dell SecureWorks

9.3.6.4. Deloitte

9.3.6.5. EY

9.3.6.6. FOX-IT

9.3.6.7. FireEye

9.3.6.8. High Tech Bridge

9.3.6.9. Ingalls Information Security

9.3.6.10. Intel Security

9.3.6.10.1. Foundstone

9.3.6.11. K2 Intelligence

9.3.6.12. Lares Consulting

9.3.6.13. Maryman

9.3.6.14. NTT Coms Security

9.3.6.15. Nettitude

9.3.6.16. Optiv

9.3.6.17. PWC

9.3.6.18. Presecure

9.3.6.19. Sec Consult

9.3.6.20. Stroz Friedberg

9.3.6.21. TrustMatta

9.3.7. Penetration Testing

9.3.7.1. AppSec Consulting

9.3.7.2. Core Security

9.3.7.3. Element Digital Security

9.3.7.3.1. http://www.edigitalsecurity.com/

9.3.7.4. FOX-IT

9.3.7.5. High Tech Bridge

9.3.7.6. Ingalls Information Security

9.3.7.7. K2 Intelligence

9.3.7.8. Matasano Security

9.3.7.9. NCC Group

9.3.7.10. Penetration Lab

9.3.7.11. Rapid7

9.3.7.12. Secureworks

9.3.7.13. TrustMatta

9.3.7.14. TrustedSec

9.3.7.15. WhiteHat Security

9.3.8. Remote Access

9.3.9. Secure Code Review

9.3.10. Threat Intelligence

9.3.11. Vulnerability Scan

9.4. Providers by Region

9.4.1. Latin America

9.4.2. Mature Asia/Pacific

9.4.3. Middle East and North Africa

9.4.3.1. Saudi Arabia

9.4.3.1.1. GBM

9.4.3.1.2. PGI

9.4.4. North America

9.4.4.1. A-G

9.4.4.1.1. AppsecConsulting

9.4.4.1.2. CSC

9.4.4.1.3. Control Case

9.4.4.1.4. CrowdStrike

9.4.4.1.5. Dell Secureworks

9.4.4.1.6. Deloitte

9.4.4.1.7. Denim Group

9.4.4.1.8. Ernst & Young

9.4.4.1.9. FireEye

9.4.4.1.10. ForSythe Solutions

9.4.4.1.11. Grant Thornton

9.4.4.2. H-L

9.4.4.2.1. HP

9.4.4.2.2. IBM

9.4.4.2.3. IOActive

9.4.4.2.4. Ingalls Information Security

9.4.4.2.5. Intel Security (Foundstone)

9.4.4.2.6. K2 Intelligence

9.4.4.2.7. Leidos

9.4.4.3. M-S

9.4.4.3.1. NTT Com Security

9.4.4.3.2. Neohapsis

9.4.4.3.3. Optiv

9.4.4.3.4. PWC

9.4.4.3.5. Paladion Networks

9.4.4.3.6. Perimeter eSecurity

9.4.4.3.7. Protivity

9.4.4.3.8. SISA

9.4.4.3.9. Solutionary

9.4.4.3.10. Stroz Friedberg

9.4.4.3.11. Sungard

9.4.4.3.12. Sword and Shield

9.4.4.3.13. Symantec

9.4.4.3.14. Syntegrity Networks

9.4.4.3.15. Sysnet Global Solutions

9.4.4.4. T-Z

9.4.4.4.1. Tevora Business Solutions

9.4.4.4.2. Trustwave

9.4.4.4.3. Verizon

9.4.4.4.4. WhiteHat Security

9.4.4.4.5. Zensar Technologies

9.4.5. Greater China

9.4.6. South Africa

9.4.6.1. Cyanre

9.4.6.1.1. http://www.cyanre.co.za/

9.4.7. Eurasia

9.4.7.1. Russia

9.4.8. Emerging Asia/Pacific

9.4.9. Canada

9.4.9.1. Conexsys

9.4.10. Europe

9.4.10.1. Eastern Europe

9.4.10.1.1. Poland

9.4.10.2. Western Europe

9.4.10.2.1. Italy

9.4.10.2.2. United Kingdom

10. Emerging Security Markets & Technologies

10.1. Application Security

10.1.1. Runtime Application Self-Protection (RASP)

10.1.1.1. Arxan

10.1.1.2. Checkmarx

10.1.1.3. Contrast Security

10.1.1.4. HP

10.1.1.5. Immunio

10.1.1.6. Metaforic

10.1.1.7. OneASP

10.1.1.8. Prevoty

10.1.1.9. SecuPi

10.1.1.10. Veracode

10.1.1.11. Virsec

10.1.1.12. Waratek

10.1.1.13. whiteCryption

10.1.2. Enterprise App-Layer Protection

10.1.2.1. SecuPI

10.1.3. AI-Based Applicaton Threat Defense

10.1.3.1. Barricade

10.1.3.2. Signal Sciences

10.2. Cloud Security

10.2.1. Cloud Protection Gateways

10.2.1.1. CipherCloud

10.2.1.2. Netskope

10.2.1.3. Perspecsys

10.2.1.4. Skyhigh Networks

10.2.1.5. Vaultive

10.2.2. Cloud Access Security Brokers

10.2.2.1. User Activity Monitoring

10.2.2.1.1. Adallom

10.2.2.1.2. Avanan

10.2.2.1.3. Bitglass

10.2.2.1.4. Elastica

10.2.2.1.5. Harvest.ai

10.2.2.1.6. Imperva

10.2.2.1.7. Netscope

10.2.2.1.8. SkyHigh Networks

10.2.2.2. Data Loss Prevention

10.2.2.2.1. Integrated DLP

10.2.2.2.2. Harvest.ai

10.2.2.3. Encryption

10.2.2.3.1. Adallom

10.2.2.3.2. Avanan

10.2.2.3.3. Managed Methods

10.2.2.3.4. SkyHigh Networks

10.2.2.4. Identity and Access Management

10.2.2.4.1. Centrify

10.2.2.4.2. Cloudiway

10.2.2.4.3. Okta

10.2.2.4.4. Ping

10.2.2.5. Access Control

10.2.2.5.1. Adallom

10.2.2.5.2. Avanan

10.2.2.5.3. Bitglass

10.2.2.5.4. Elastica

10.2.2.5.5. FireLayers

10.2.2.5.6. Managed Methods

10.2.2.5.7. Netskope

10.2.2.5.8. Skyfence

10.2.3. Cloud Application Discovery

10.2.3.1. Ciphercloud

10.2.3.2. Elastica

10.2.3.3. Netskope

10.2.3.4. Skyhigh

10.2.4. Cloud Compliance and Security Risk Platforms

10.2.4.1. AlertLogic

10.2.4.2. Cavirin

10.2.4.3. Cloudcheckr

10.2.4.4. Evident.io

10.2.4.5. Harvest AI

10.3. Cross Domain Solutions

10.3.1. Advenica

10.3.1.1. ZoneGuard

10.3.1.2. SecuriRam

10.3.2. General Dynamics

10.3.2.1. TacGuard

10.3.2.2. Crossing Guard

10.3.2.3. NanoXD

10.3.3. LockHeed Martin

10.3.3.1. Trusted Manager

10.3.4. Tresys

10.3.4.1. XD Air

10.3.4.2. XD Bridge

10.3.4.3. XD Guardian

10.3.5. Owl Computing

10.3.5.1. Owl OPDS-100

10.3.5.2. Owl OPDS-100D

10.3.5.3. OCDS-SFF

10.4. Data Security

10.4.1. Network-Based Data Cleansing

10.4.1.1. DataStealth

10.4.1.1.1. http://www.datexdatastealth.com/

10.4.2. Big Data Security

10.4.2.1. BlueTalon

10.5. Endpoint Security

10.5.1. Endpoint Detection and Response (EDR)

10.5.1.1. Agent-Based

10.5.1.1.1. Carbon Black

10.5.1.1.2. Cisco

10.5.1.1.3. Countertack

10.5.1.1.4. CrowdStrike

10.5.1.1.5. Cyberbit

10.5.1.1.6. Cyberreason

10.5.1.1.7. Cylance

10.5.1.1.8. Deep Instinct

10.5.1.1.9. Digital Guardian

10.5.1.1.10. Dtex Systems

10.5.1.1.11. Endgame Systems

10.5.1.1.12. Fidelis Cybersecurity

10.5.1.1.13. FireEye

10.5.1.1.14. Forescout

10.5.1.1.15. Guidance Software

10.5.1.1.16. Hexis Cyber Solutions

10.5.1.1.17. Invincea

10.5.1.1.18. LogRhythm

10.5.1.1.19. NexThink

10.5.1.1.20. Panda Security

10.5.1.1.21. RSA (EMC)

10.5.1.1.22. SecDo

10.5.1.1.23. SentinelOne

10.5.1.1.24. Tanium

10.5.1.1.25. Triumfant

10.5.1.1.26. Verint

10.5.1.1.27. Ziften

10.5.1.2. Agentless

10.5.1.2.1. BeyondTrust

10.5.1.2.2. Cynet

10.5.1.2.3. Fidelis

10.5.1.2.4. ForeScout

10.5.1.2.5. Hexadite

10.5.1.2.6. Hexis Cyber Solutions

10.5.1.2.7. InfoCyte

10.5.1.2.8. LightCyber

10.5.1.2.9. Outlier Security

10.5.1.2.10. Promisec

10.5.2. Remote Browser-Isolation (remote dom)

10.5.2.1. Amune

10.5.2.1.1. https://amune.org/security

10.5.2.2. Armor5

10.5.2.3. Authentic8

10.5.2.4. Dispel

10.5.2.5. FireGlass

10.5.2.6. Menlo Security

10.5.2.7. Aurionpro

10.5.2.7.1. Formerly Spikes Security

10.6. Identification, Authentication, Access Control & IAM

10.7. Internet of Things

10.7.1. Automotive

10.7.1.1. Security Innovation

10.7.2. Embedded Security

10.7.2.1. Security Innovation

10.8. Network & Infrastructure Security

10.8.1. Content Disarm and Reconstruction (CDR)

10.8.1.1. Check Point Software

10.8.1.1.1. Threat Extraction

10.8.1.2. Glasswall

10.8.1.2.1. http://www.glasswallsolutions.com/

10.8.1.3. Mimecast

10.8.1.3.1. https://www.mimecast.com/

10.8.1.4. OPSWAT

10.8.1.5. ODI

10.8.1.5.1. http://www.odi-x.com/

10.8.1.6. Re-Sec

10.8.1.6.1. http://www.re-sec.com/

10.8.1.7. Sasa-Software

10.8.1.7.1. http://www.sasa-software.com/

10.8.1.8. Solebit Labs

10.8.1.8.1. http://www.solebitlabs.com/

10.8.1.9. Symantec

10.8.1.9.1. DisArm

10.8.1.10. TreSys

10.8.1.10.1. http://www.tresys.com/

10.8.1.11. Votiro

10.8.1.11.1. http://www.votiro.com/

10.8.2. Malware Infection Analysis and Monitoring Services

10.8.2.1. Lastline

10.8.2.1.1. Guardia

10.8.2.2. Cisco

10.8.2.2.1. Formerly OpenDNS

10.8.2.3. Qualys

10.8.2.4. Seculert

10.8.3. Network Behavior and Analytics

10.8.3.1. Industrial Control Systems (ICS)

10.8.3.1.1. CyberX

10.8.4. Standalone Threat Intelligence Defense Solutions (STIDS)

10.8.4.1. Bandura

10.8.4.1.1. PoliWall

10.8.4.2. Centripetal Networks

10.8.4.3. Damballa

10.8.4.4. Fidelis Cybersecurity

10.8.4.5. FireEye

10.8.4.6. Group IB

10.8.4.6.1. http://tds.group-ib.com/

10.8.4.7. Ixia

10.8.4.7.1. http://www.ixiacom.com/info/ta

10.8.4.8. LookingGlass

10.8.4.8.1. https://lgscout.com/products/dns-defender/

10.8.4.9. Redsocks

10.8.4.9.1. Redsocks Threat Defender

10.8.4.10. ReversingLabs

10.8.4.11. Symantec

10.8.4.11.1. APT Network

10.8.5. Unauthorized Endpoint Connection Prevention (UECP)

10.8.5.1. Ensilo

10.8.5.2. Intel Security

10.8.6. Software Defined WAN (SDwan)

10.8.6.1. CloudGenix

10.8.6.2. Pertino

10.8.6.3. Velocloud

10.8.6.4. Viptela

10.8.6.5. Versa Networks

10.8.7. Virtual Container Security

10.8.7.1. Apcera

10.8.7.2. Aqua Security

10.8.7.3. Illumio

10.8.7.4. StackRox

10.8.7.5. TwistLock

10.8.8. Network Security as a Service

10.8.8.1. Cato Networks

10.8.8.2. MyDigitalShield

10.8.8.3. Zscaler

10.9. Risk, Compliance and Security Management

10.9.1. Security Ratings & Insurance

10.9.1.1. Security Ratings

10.9.1.1.1. Bitsight Technologies

10.9.1.1.2. Prevalent

10.9.1.1.3. SecurityScoreCard

10.9.1.1.4. QuadMetrics

10.9.1.2. Cyber Risk Insurance

10.9.1.2.1. Balsiger Insurance

10.9.1.2.2. HSB Group

10.9.1.2.3. Philadelphia Insurance Companies

10.9.1.2.4. Tennant Risk Services

10.9.1.2.5. The Hartford

10.9.1.2.6. Travelers

10.10. Security Operations, Incident Response

10.10.1. Intelligence/Data Feeds/Software & Services

10.10.1.1. Security Intelligence and Data Analysis Platforms

10.10.1.1.1. FireEye

10.10.1.2. Threat Intelligence Platforms (TIPs)

10.10.1.2.1. Anomali

10.10.1.2.2. BAE Systems

10.10.1.2.3. Buguroo

10.10.1.2.4. Codenomicon

10.10.1.2.5. Comilion

10.10.1.2.6. Confer

10.10.1.2.7. Eclectic IQ

10.10.1.2.8. Infoblox

10.10.1.2.9. Lockheed Martin

10.10.1.2.10. Lookingglass Cyber Solutions

10.10.1.2.11. Microsoft

10.10.1.2.12. Palentir

10.10.1.2.13. PierceMatrix

10.10.1.2.14. Service Now (Formerly Brightpoint)

10.10.1.2.15. Soltra

10.10.1.2.16. ThreatConnect

10.10.1.2.17. ThreatQuotient

10.10.1.2.18. TruStar

10.10.1.3. Threat Intelligence Services

10.10.1.3.1. Human Intelligence - HUMINT (Strategic)

10.10.1.3.2. Machine-Based (Tactical)

10.10.1.3.3. Vulnerabilities and Exploits

10.10.1.3.4. Data Loss Detection - External

10.10.1.4. Collaborative Threat Investigation Platforms

10.10.1.4.1. BAE System Detica

10.10.1.4.2. IKANow

10.10.1.4.3. Maltego

10.10.1.4.4. NC4

10.10.1.4.5. Palentir

10.10.2. Malware Analysis

10.10.2.1. Malware Analysis as a Service

10.10.2.1.1. Free Services

10.10.2.1.2. ReversingLabs

10.10.2.1.3. ThreatGrid

10.10.2.2. Sandbox Software

10.10.2.2.1. GFI

10.10.2.2.2. Joesecurity

10.10.2.2.3. Bluecoat

10.10.2.2.4. Payload Security

10.10.3. Threat Deception Technologies

10.10.3.1. Distributed Deception Platforms

10.10.3.1.1. Amgine Securus

10.10.3.1.2. Atomic Software Solutions

10.10.3.1.3. Attivo Networks

10.10.3.1.4. Cymmetria

10.10.3.1.5. GuardiCore

10.10.3.1.6. Illusive Networks

10.10.3.1.7. Javelin Networks

10.10.3.1.8. KeyFocus

10.10.3.1.9. SmokeScreen

10.10.3.1.10. Specter

10.10.3.1.11. TrapX

10.10.3.1.12. Vision Space Technologies

10.10.3.2. Network

10.10.3.2.1. ForeScout

10.10.3.2.2. Juniper Networks

10.10.3.2.3. Percipient Networks

10.10.3.2.4. Ridgeback Network Defense

10.10.3.2.5. Shadow Networks

10.10.3.3. Open Source

10.10.3.3.1. Honeypot

10.10.3.4. Web

10.10.3.4.1. Shape Security

10.10.3.4.2. Juniper Networks

10.10.3.4.3. CyberTrap

11. Risk, Compliance and Security Management

11.1. Firewall Workflow,Modeling & Change Management

11.1.1. Checkpoint Software

11.1.2. Firemon

11.1.3. ManageEngine

11.1.4. Redseal Networks

11.1.5. Skybox

11.1.6. Tufin

11.1.7. Veriflow

11.2. Legal and regulatory information governance

11.3. Privacy

11.4. Regulations, Awareness and Training

11.4.1. Computer Based Training

11.4.1.1. Aujas

11.4.1.2. BeOne Development

11.4.1.3. Digital Defense

11.4.1.4. Fishnet Security

11.4.1.5. Inspired eLearning

11.4.1.6. Junglemap

11.4.1.7. KnowBe4

11.4.1.8. MediaPro

11.4.1.9. PhishMe

11.4.1.10. Phishline

11.4.1.11. Popcorn Training

11.4.1.12. Sans Institute

11.4.1.13. Scipp International

11.4.1.14. Secure Mentem

11.4.1.15. Security Innovation

11.4.1.16. Security Mentor

11.4.1.17. The Security Awareness Company

11.4.1.18. ThreatSim

11.4.1.19. Wombat Security Technologies

11.4.2. Educational, Awareness & News Outlets

11.4.2.1. Government Led

11.4.2.1.1. Information Sharing and Analysis Centers (ISACs)

11.4.2.2. Periodicals & Target Roles

11.4.2.2.1. Channel

11.4.2.2.2. CISO/CSO

11.4.2.2.3. Security Engineers/Analysts

11.4.3. Industry Standards/Groups

11.4.3.1. Standards

11.4.3.1.1. Technical

11.4.3.2. Industry Groups

11.4.3.2.1. Audit

11.4.3.2.2. General Security

11.4.3.2.3. Forensics

11.4.4. Regulations, Public Standards and Contractual Mandates

11.4.4.1. Global

11.4.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)

11.4.4.1.2. NIST

11.4.4.2. Country/Region Specific

11.4.4.2.1. China

11.4.4.2.2. Singapore

11.4.4.2.3. European Union

11.4.4.2.4. United States

11.5. Security Policy and Response Orchaestration Platforms

11.5.1. FireEye

11.5.2. Phantom

11.5.2.1. https://www.phantom.us/

11.5.3. Proofpoint

11.6. Security Program and Governance

11.6.1. Governance, Risk and Compliance

11.6.1.1. eGRC

11.6.1.1.1. Software as a Service

11.6.1.1.2. Software

11.6.1.2. Compliance Oriented Private Cloud Hosting (COPCH)

11.6.1.2.1. Note: This list is not an attestation of compliance

11.6.1.3. Operational Risk Analytics

11.6.1.3.1. Algosec

11.6.1.3.2. Cyber Observer

11.6.1.3.3. Cytegic

11.6.1.3.4. Firemon

11.6.1.3.5. IBM

11.6.1.3.6. Redseal Networks

11.6.1.3.7. RiskIO

11.6.1.3.8. Skybox

11.6.1.3.9. Software Development Lifecycle

11.6.1.3.10. Solarwinds

11.6.1.3.11. Tufin

11.6.1.4. Cloud & Container Compliance Assessment

11.6.1.4.1. Cavirin

12. VARs, Distributors, Market Logistics & Supply Chain

12.1. Cloud Service Brokerages

12.1.1. Bitnami

12.1.2. Ensim

12.1.2.1. http://www.ensim.com/

12.1.3. Gravitant

12.1.4. Jamcracker

12.1.4.1. http://www.jamcracker.com/

12.1.5. StandingCloud

12.2. Distribution/Channel/VARs

12.2.1. VARs, Resellers

12.2.1.1. China

12.2.1.1.1. Mainland China

12.2.1.1.2. Hong Kong

12.2.1.1.3. Taiwan

12.2.1.2. Emerging Asia Pacific

12.2.1.2.1. India

12.2.1.2.2. Indonesia

12.2.1.2.3. Malasia

12.2.1.2.4. Thailand

12.2.1.2.5. Philippines

12.2.1.3. Eurasia

12.2.1.3.1. Russian Federation

12.2.1.3.2. Kazakhstan

12.2.1.3.3. Ukraine

12.2.1.4. Europe

12.2.1.4.1. Eastern Europe

12.2.1.4.2. Western Europe

12.2.1.5. Latin America

12.2.1.5.1. Brazil

12.2.1.5.2. Chile

12.2.1.5.3. Columbia

12.2.1.5.4. Costa Rica

12.2.1.5.5. Ecuador

12.2.1.5.6. Bolivia

12.2.1.5.7. Venezuela

12.2.1.5.8. Cuba

12.2.1.5.9. Argentina

12.2.1.5.10. Buenos Aires

12.2.1.5.11. Mexico

12.2.1.5.12. Peru

12.2.1.6. Mature Asia Pacific

12.2.1.6.1. Australia

12.2.1.6.2. Japan

12.2.1.6.3. Singapore

12.2.1.7. Middle East and North Africa

12.2.1.7.1. Turkey

12.2.1.7.2. Israel

12.2.1.7.3. Saudi Arabia

12.2.1.7.4. South Africa

12.2.1.7.5. India

12.2.1.7.6. United Arab Emirates

12.2.1.8. North America

12.2.1.8.1. United States

12.2.1.8.2. Canada

12.2.1.9. Sub-Sahara Africa

12.2.1.9.1. South Africa

12.2.1.10. WorldWide

12.2.1.10.1. AT&T

12.2.1.10.2. BT

12.2.1.10.3. Optiv

12.2.1.10.4. SHI

12.2.1.10.5. Secureworks

12.2.1.10.6. Verizon Business

12.2.2. Distributors

12.2.2.1. China

12.2.2.1.1. AVNet

12.2.2.1.2. B & Data Technology Co. Ltd.

12.2.2.1.3. Beijing Advazone Electronic Limited Comp

12.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.

12.2.2.1.5. Digital China Technology LTD.

12.2.2.1.6. Ecs China

12.2.2.1.7. Edvance Technology (China) Limited

12.2.2.1.8. Huagai

12.2.2.1.9. M.Tech (Shanghai) Co., Ltd.

12.2.2.1.10. Shanghai S-I Information Tech. Ltd

12.2.2.1.11. Sinogrid Information Technology Ltd.

12.2.2.1.12. Sky Faith International Enterprise

12.2.2.2. Emerging Asia Pacific

12.2.2.2.1. India

12.2.2.2.2. Indonesia

12.2.2.2.3. Thailand

12.2.2.3. Eurasia

12.2.2.3.1. Russian Federation

12.2.2.3.2. Kazakhstan

12.2.2.4. Mature Asia Pacific

12.2.2.4.1. Singapore

12.2.2.4.2. Japan

12.2.2.4.3. South Korea

12.2.2.4.4. Australia

12.2.2.5. Middle East and South Africa

12.2.2.5.1. United Arab Emirates

12.2.2.5.2. South Africa

12.2.2.6. North America

12.2.2.6.1. Canada

12.2.2.6.2. United States

12.2.2.7. Sub-Sahara Africa

12.2.2.7.1. South Africa

12.2.2.8. Western Europe

12.2.2.8.1. United Kingdom

12.2.2.8.2. Germany

12.2.2.9. Worldwide

12.2.2.9.1. AVNet

12.2.2.9.2. Ingram Micro

12.2.2.9.3. LifeBoat Distribution

12.2.2.9.4. Tech Data

12.2.2.9.5. Westcon

12.2.2.10. Latin America

12.2.2.10.1. Mexico

12.2.2.10.2. Brazil

12.2.3. Reseller Programs

12.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm

12.2.4. Logistics/Deal Registration

12.2.4.1. Connectwise

12.3. Government Cyberwarrior (Personnel Estimates)

12.3.1. United States

12.3.1.1. NSA

12.3.1.1.1. Cyberwarrior Stats

12.3.1.2. Department of Defense

12.3.1.2.1. US Airforce

12.3.1.2.2. US Navy

12.3.1.2.3. DISA

12.3.2. Iran

12.3.2.1. 4500

12.3.3. Israel

12.3.3.1. Unit 8200

12.3.3.1.1. 5000

12.3.4. North Korea

12.3.4.1. 1000

12.4. Hardware and Chip Security

12.4.1. AMD

12.4.1.1. TPM

12.4.2. Cavium

12.4.2.1. Multi-Core Processors

12.4.3. Flow Processors

12.4.3.1. Netronome

12.4.4. Intel

12.4.4.1. TPM

12.4.4.2. Data Execution Protection

12.4.5. Systems

12.4.5.1. Janus Technologies

12.4.5.1.1. http://www.janustech.com/janus_secure_computer.html

12.5. Investment

12.5.1. ETFs

12.5.1.1. PureFunds

12.5.1.1.1. SYM:HACK

12.5.2. Venture Capitalists

12.5.2.1. Trident Capital

12.5.2.2. Andreesen Horowitz

12.6. Managed Service Enablement

12.6.1. Chartec

12.6.2. Jamcracker

12.7. Marketing/PR/AR

12.7.1. Analyst & Public Relations

12.7.1.1. Focused Image

12.7.1.1.1. http://www.focusedimage.com/

12.7.1.2. KTCpr

12.7.1.2.1. http://www.kahn-travel.com/

12.7.1.3. Madison Alexander PR

12.7.1.3.1. http://www.madisonalexanderpr.com/

12.7.1.4. Marc Gendron PR

12.7.1.4.1. http://www.mgpr.info/

12.7.1.5. Schwartz Communications

12.7.1.5.1. http://www.schwartzmsl.com/

12.7.1.6. Spalding Communications

12.7.1.7. Text 100

12.7.1.7.1. http://www.text100.com/

12.7.2. Campaign/Engagement

12.7.2.1. WCG World

12.7.2.1.1. http://wcgworld.com/

12.7.3. Creative/Design Services

12.7.3.1. Duarte

12.7.3.1.1. http://www.duarte.com/

12.7.3.2. Gig Productions

12.7.3.2.1. http://www.gigpros.com/index.php

12.7.3.3. Initiate Marketing

12.7.3.3.1. http://www.getinitiated.ca/

12.7.3.4. MN8Studio

12.7.3.4.1. http://www.mn8studio.com/

12.7.3.5. Text 100

12.7.3.5.1. http://www.text100.com/

12.7.4. Web Site Design

12.7.4.1. Baytech Web Design

12.7.4.1.1. http://www.baytechwebdesign.com/

12.7.4.2. EU Design Studios

12.7.4.2.1. http://eudesignstudio.com/

12.7.4.3. Pro Logic Web Services

12.7.4.3.1. http://www.prologicsoft.com/

12.7.5. Market Destinations (Sites)

12.7.5.1. CRN

12.7.5.2. Hak5

12.7.5.3. MSPMentor

12.7.5.4. Madison Logic

12.7.5.5. SCmagazine

12.7.5.6. TheVarGuy

12.7.6. Marketing Videos

12.7.6.1. Epipheo

12.7.6.1.1. http://www.epipheo.com/

12.7.7. Marketing/Branding Agencies

12.7.7.1. Focused Image

12.7.7.1.1. http://www.focusedimage.com/branding/

12.7.7.2. Hill and Knowlton

12.7.7.2.1. http://www.hkstrategies.com/

12.7.7.3. MetaDesign

12.7.7.3.1. http://www.metadesign.com/san-francisco

12.7.7.4. Ogilvy & Mather

12.7.7.5. Tailfin Marketing Communications

12.7.7.6. Toolbox Studios

12.8. OEMs & System Integrators

12.8.1. Appliance Integrators

12.8.1.1. Accton

12.8.1.1.1. http://www.accton.com/

12.8.1.2. Advantech

12.8.1.2.1. http://www.advantech.com/

12.8.1.3. Celestica

12.8.1.3.1. http://www.celestica.com/

12.8.1.4. Dan-el Technologies Ltd.

12.8.1.4.1. http://www.danel.co.il/

12.8.1.5. Flextronics

12.8.1.5.1. http://www.flextronics.com/

12.8.1.6. Plexus

12.8.1.6.1. http://www.plexus.com/

12.8.2. Base Appliances

12.8.2.1. Advantech

12.8.2.2. Amax

12.8.2.3. Cas Well

12.8.2.4. Iron Systems

12.8.2.5. Lanner

12.8.2.6. Portwell

12.8.2.7. Tilera

12.8.3. Cards

12.8.3.1. Netronome

12.8.3.2. Tilera

12.8.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection

12.8.4. Encryption Acceleration

12.8.4.1. Intel

12.8.4.1.1. VPRO

12.8.4.2. Gemalto

12.8.4.2.1. Luna PCI

12.8.5. MSSP Appliances

12.8.5.1. 443 Networks

12.8.6. Threat Intelligence

12.8.6.1. Anti-Phishing

12.8.6.1.1. Cyren

12.8.6.2. DNS DGA Feeds

12.8.6.2.1. Farsight Security

12.8.6.3. File Reputation

12.8.6.3.1. Findthatfile

12.8.6.3.2. Webroot

12.8.6.4. Fraud

12.8.6.4.1. Internet Fraud Alert

12.8.6.4.2. National Cyber-Forensics and Training Alliance

12.8.6.5. IP Block Lists

12.8.6.5.1. WebRoot Brightcloud

12.8.6.5.2. Cyren

12.8.6.5.3. Malwarebytes

12.8.6.6. IP Reputation

12.8.6.6.1. Cyren

12.8.6.6.2. WebRoot Brightcloud

12.8.6.7. Indicators of Compromise

12.8.6.7.1. FireEye

12.8.6.7.2. Proofpoint

12.8.6.7.3. Wapack labs

12.8.6.7.4. CIRCL

12.8.6.8. Malicious URL

12.8.6.8.1. Cyren

12.8.6.8.2. Findthatfile

12.8.6.8.3. Webroot

12.8.6.9. Predictive

12.8.6.9.1. Seclytics

12.8.6.10. Vulnerability Research

12.8.6.10.1. Telus Security Labs

12.8.6.10.2. Vupen

12.8.7. Security Related Chips & CPUs

12.8.7.1. Broadcom

12.8.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection

12.8.7.2. Cavium

12.8.7.2.1. http://www.cavium.com

12.8.7.3. Lionic

12.8.7.3.1. http://www.lionic.com/

12.8.7.4. Netronome

12.8.7.4.1. http://www.netronome.com

12.8.7.5. Tilera

12.8.7.5.1. http://www.tilera.com/products/processors

12.8.7.6. Intel

12.8.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH

12.8.8. Software

12.8.8.1. Advanced Content Disarming and Reconstruction

12.8.8.1.1. OPSWAT

12.8.8.1.2. Votiro

12.8.8.2. Advanced Threat Protection - Virtual Execution Engines

12.8.8.2.1. ContentKeeper

12.8.8.2.2. Threat Track Security

12.8.8.3. Analytics/Graphing/Reporting

12.8.8.3.1. Logi Analytics

12.8.8.3.2. D3Plus

12.8.8.3.3. D3js

12.8.8.4. Anti-Spam/Phishing

12.8.8.4.1. APWG

12.8.8.4.2. BrandProtect

12.8.8.4.3. Cyren

12.8.8.4.4. Ikarus

12.8.8.4.5. Internet Fraud Alert

12.8.8.4.6. ReturnPath

12.8.8.4.7. WebRoot Brightcloud

12.8.8.5. AntiMalware

12.8.8.5.1. Antiy

12.8.8.5.2. Avira

12.8.8.5.3. Bitdefender

12.8.8.5.4. Cyren

12.8.8.5.5. ESet

12.8.8.5.6. Fortinet

12.8.8.5.7. GFI

12.8.8.5.8. Ikarus

12.8.8.5.9. Intel Security

12.8.8.5.10. Kaspersky

12.8.8.5.11. Norman

12.8.8.5.12. OPSWAT

12.8.8.5.13. QuickHeal

12.8.8.5.14. ThreatTrack

12.8.8.5.15. Zillya

12.8.8.5.16. ZonerAntiVirus

12.8.8.6. Content Extraction & Search

12.8.8.6.1. Oracle

12.8.8.7. Encryption

12.8.8.7.1. Transport

12.8.8.8. Endpoint Security and Management

12.8.8.8.1. OPSWAT

12.8.8.9. File Content Decoding/Analysis/Fingerprinting

12.8.8.9.1. HP Autonomy

12.8.8.9.2. Attivio

12.8.8.9.3. GTB Technologies

12.8.8.10. IT Service Management

12.8.8.10.1. ITRP

12.8.8.11. Image Recognition

12.8.8.11.1. Image Analyzer

12.8.8.12. Intrusion Detection/Prevention Signatures

12.8.8.12.1. Proofpoint

12.8.8.13. Network Stack

12.8.8.13.1. IPV4/6

12.8.8.13.2. Deep Packet Inspection

12.8.8.13.3. SDN

12.8.8.14. Optical Character Recognition

12.8.8.14.1. Abbyy

12.8.8.15. Social Network Content Control

12.8.8.15.1. NetboxBlue

12.8.8.16. URL Categorization

12.8.8.16.1. Cyren

12.8.8.16.2. Ikarus

12.8.8.16.3. Malware

12.8.8.16.4. Webroot Brightcloud

12.8.8.16.5. Zvelo

12.8.8.17. Voice Recognition

12.8.8.17.1. STC

12.8.8.17.2. Nuance

12.8.9. Managed Security OEMs

12.8.9.1. Digital Hands

12.9. Product Testing

12.9.1. Generic Product Testing, Certification and Accreditation

12.9.1.1. Certifications

12.9.1.1.1. North America

12.9.1.1.2. European Union

12.9.1.2. Testing

12.9.1.2.1. United Kingdom

12.9.1.2.2. North America

12.9.1.2.3. Singapore

12.9.1.3. Accreditation

12.9.1.3.1. DOD

12.9.1.3.2. NSA

12.9.2. Anti-Malware Testing

12.9.2.1. AMTSO

12.9.2.2. AV-Test

12.9.2.3. Av-Comparatives

12.9.2.4. MRG Effitas

12.9.2.5. VirusBTN

12.9.3. Sponsored Product Review/Testing

12.9.3.1. Delta Testing LTD

12.9.3.2. Dennis Labs

12.9.3.3. Miercom

12.9.3.4. NSS Labs

12.9.3.5. Network Testing Labs

12.9.3.6. Tolly Group

12.9.3.7. West Coast Labs

12.9.4. Antimalware Standards Bodies

12.9.4.1. AMTSO

12.9.4.1.1. http://www.amtso.org/

12.10. Cloud Service Brokerages

12.11. Security Conferences

12.11.1. North America

12.11.1.1. United States

12.11.1.1.1. RSA

12.11.1.1.2. Gartner

12.11.1.1.3. Cornerstones of Trust

12.11.1.1.4. Annual Security Conference

12.11.1.1.5. SecurityBsides

12.11.1.1.6. ShmooCon

12.11.2. Europe

12.11.2.1. United Kingdom

12.11.2.1.1. RSA Conference

12.11.2.1.2. Gartner

12.11.2.2. Russia

12.11.2.2.1. Infosecurity Russia

12.11.3. Emerging Asia Pacific

12.11.4. Mature Asia Pacific

12.11.4.1. Australia

12.11.4.1.1. Gartner

12.11.4.2. Singapore

12.11.4.2.1. RSA

12.12. Staffing/Recruiting/Executive Search

12.12.1. Millard Group

12.12.2. Lynch Bowie Group

12.12.3. Robert Half

12.13. User Interface Design

12.13.1. Consulting

12.13.1.1. User Interface

12.13.1.1.1. BlinkUX

12.13.1.1.2. Sasa Technologies

12.13.1.1.3. Dabapps

12.13.1.2. Customer Survey

12.13.1.2.1. Techvalidate

12.13.2. HTML5 Visualization Libraries

12.13.2.1. Data-Driven Documents

12.13.2.1.1. http://d3js.org/

12.13.2.2. AngularJS

12.13.2.2.1. https://angularjs.org/

12.13.3. Icons

12.13.3.1. IconExperience

12.13.3.1.1. https://www.iconexperience.com/

12.13.3.2. FlatIcon

12.13.3.2.1. http://www.flaticon.com/packs/general-ui

12.13.3.3. ModernUIicons

12.13.3.3.1. http://modernuiicons.com/

12.13.3.4. Ui8

12.13.3.4.1. https://ui8.net/categories/icons

13. Managed Security Services

13.1. Direct Tech Providers Managed Security

13.1.1. Asia Pacific

13.1.1.1. Australia

13.1.1.2. China

13.1.1.2.1. NSFOCUS

13.1.1.3. Singapore

13.1.2. Europe

13.1.2.1. GoGrid

13.1.2.1.1. Compliance Reporting (PCI, HIPAA)

13.1.2.1.2. Host IDS

13.1.2.1.3. Log Management

13.1.2.1.4. SIEM

13.1.2.1.5. Vulnerability Assessment

13.1.3. Global Providers

13.1.4. Middle East and North Africa

13.1.4.1. Saudi Arabia

13.1.4.2. United Arab Emirates

13.1.5. North America

13.1.5.1. United States

13.1.5.1.1. NSFOCUS

13.1.5.1.2. Check Point Software

13.1.5.1.3. Network Box

13.1.5.1.4. GoGrid

13.1.5.1.5. FireEye

13.1.5.1.6. Rapid7

13.2. Indirect Providers

13.2.1. Emerging Asia Pacific

13.2.1.1. India

13.2.1.1.1. CSS Corp PVT

13.2.1.1.2. Happiest Minds

13.2.1.1.3. SunGard Availability Services

13.2.1.1.4. Ecomnets India PVT. LTD

13.2.2. Europe

13.2.2.1. BT Global Services

13.2.2.2. Dell SecureWorks

13.2.2.3. Germany

13.2.2.3.1. Link11 GMBH

13.2.2.3.2. IPsoft

13.2.2.4. HP

13.2.2.5. Happiest Minds

13.2.2.5.1. Advanced Malware Protection

13.2.2.5.2. Application Activity Monitoring

13.2.2.5.3. Compliance Reporting

13.2.2.5.4. Database Activity Monitoring

13.2.2.5.5. File Integrity Monitoring

13.2.2.5.6. Log Management

13.2.2.5.7. Managed DLP

13.2.2.5.8. Network Forensics

13.2.2.5.9. SIEM

13.2.2.5.10. Unified Threat Management

13.2.2.5.11. Vulnerability Assessment

13.2.2.6. Integralis

13.2.2.7. Navisite

13.2.2.7.1. Mobile Device Management

13.2.2.8. Open Systems

13.2.2.9. Open Systems

13.2.2.10. Orange Business Services

13.2.2.11. SecureData

13.2.2.11.1. Firewall

13.2.2.11.2. IDS/IPS

13.2.2.11.3. SIEM

13.2.2.11.4. Data Loss Prevention

13.2.2.11.5. Secure Web Gateway

13.2.2.11.6. Secure Email Gateway

13.2.2.11.7. VPN/Remote Access

13.2.2.12. SunGard Availability Services

13.2.2.12.1. Firewalls

13.2.2.12.2. IAM

13.2.2.12.3. Intrusion Prevention

13.2.2.12.4. SIEM

13.2.2.12.5. Unified Threat Management

13.2.2.12.6. VPN

13.2.2.12.7. Web Application Firewall

13.2.2.13. Symantec

13.2.2.14. T-Systems

13.2.2.15. Tata Communications

13.2.2.16. Telefonica

13.2.2.16.1. DDoS Protection Service

13.2.2.16.2. Email Encryption

13.2.2.16.3. Email Security Gateway

13.2.2.16.4. Firewall Management

13.2.2.16.5. IAM

13.2.2.16.6. Intrusion Detection

13.2.2.16.7. Intrusion Prevention

13.2.2.16.8. Log Management

13.2.2.16.9. SIEM

13.2.2.16.10. Vulnerability Assessment

13.2.2.16.11. Web Security Gateway

13.2.2.16.12. Anti-Fraud

13.2.2.17. Verizon Business

13.2.2.17.1. Anti-DDoS

13.2.2.17.2. Email Security

13.2.2.17.3. Endpoint Protection

13.2.2.17.4. Firewall Management

13.2.2.17.5. Intrusion Detection

13.2.2.17.6. Intrusion Prevention

13.2.2.17.7. SIEM

13.2.2.17.8. Vulnerability Assessment

13.2.2.17.9. Web Security

13.2.2.18. Wipro

13.2.2.18.1. Email Security Gateway

13.2.2.18.2. Endpoint Security

13.2.2.18.3. Firewall Management

13.2.2.18.4. Fraud Management/Anti-Money Laundering

13.2.2.18.5. GRC

13.2.2.18.6. IAM

13.2.2.18.7. Intrusion Detection

13.2.2.18.8. Intrusion Prevention

13.2.2.18.9. SIEM

13.2.2.18.10. User Access Management

13.2.2.18.11. Web Security Gateway

13.2.3. Global Providers

13.2.3.1. AT&T

13.2.3.1.1. DDos Protection

13.2.3.1.2. Email/Data Encryption Services

13.2.3.1.3. Endpoint Anti-Virus

13.2.3.1.4. Endpoint Patch Management

13.2.3.1.5. Endpoint Policy Compliance

13.2.3.1.6. Mobile Device Security

13.2.3.1.7. Secure Email Gateway

13.2.3.1.8. Security Device Management

13.2.3.1.9. Web Application Firewall

13.2.3.1.10. Web Gateway (URL & Malware Filtering)

13.2.3.2. BEW Global

13.2.3.2.1. Data Loss Prevention

13.2.3.2.2. Web Security Gateway

13.2.3.2.3. Email Security Gateway

13.2.3.2.4. SIEM

13.2.3.2.5. Vulnerability Assessment

13.2.3.3. BT

13.2.3.4. Dell Secureworks

13.2.3.4.1. Advanced Malware Protection

13.2.3.4.2. Email Security Gateway

13.2.3.4.3. Firewall Management

13.2.3.4.4. Host IPS

13.2.3.4.5. IDS/IPS

13.2.3.4.6. Log Management

13.2.3.4.7. Log Retention

13.2.3.4.8. SIEM

13.2.3.4.9. Threat Intelligence

13.2.3.4.10. Unified Threat Management

13.2.3.4.11. Vulnerability Assessment

13.2.3.4.12. Web Application Firewall

13.2.3.4.13. Web Application Vulnerability Assessment

13.2.3.5. Dimension Data

13.2.3.6. HP

13.2.3.6.1. Access Managment

13.2.3.6.2. Data Loss Prevention

13.2.3.6.3. Email Security Gateway

13.2.3.6.4. Endpoint Encryption

13.2.3.6.5. Endpoint Protection

13.2.3.6.6. Intrusion Detection

13.2.3.6.7. Intrusion Prevention

13.2.3.6.8. Managed Incident Response

13.2.3.6.9. Remote Access Management

13.2.3.6.10. SIEM

13.2.3.6.11. Vulnerability Assessment

13.2.3.6.12. Web Application Vulnerability Assessment

13.2.3.6.13. Web Security Gateway

13.2.3.7. IBM

13.2.3.7.1. Email Security Gateway

13.2.3.7.2. Endpoint Patch Management

13.2.3.7.3. Endpoint Policy Management

13.2.3.7.4. Endpoint Protection

13.2.3.7.5. Firewall Management

13.2.3.7.6. IAM

13.2.3.7.7. Intrusion Detection

13.2.3.7.8. Intrusion Prevention

13.2.3.7.9. Log Management

13.2.3.7.10. Mobile Device Security

13.2.3.7.11. SIEM

13.2.3.7.12. Unified Threat Management

13.2.3.7.13. Vulnerability Assessment

13.2.3.7.14. Web Security Gateway

13.2.3.7.15. Web Vulnerability Assessment

13.2.3.8. Proficio

13.2.3.8.1. Email Security

13.2.3.8.2. Firewall Management

13.2.3.8.3. Incident Response

13.2.3.8.4. Log Management

13.2.3.8.5. Privileged Account Management

13.2.3.8.6. Regulatory and Polcy Compliance

13.2.3.8.7. SIEM

13.2.3.8.8. SOC Services

13.2.3.8.9. Vulnerability Assessment

13.2.3.8.10. Web Security

13.2.3.9. Tech Mahindra

13.2.3.9.1. Email Security

13.2.3.9.2. Endpoint Protection

13.2.3.9.3. Firewall Management

13.2.3.9.4. Identity and Access Management

13.2.3.9.5. Intrusion Detection

13.2.3.9.6. Intrusion Prevention

13.2.3.9.7. Log Management

13.2.3.9.8. SIEM

13.2.3.9.9. SOC Services

13.2.3.9.10. Vulnerability Assessment

13.2.3.9.11. Web Security

13.2.3.10. Telstra

13.2.3.11. Verizon Business

13.2.3.11.1. Anti-DDoS

13.2.3.11.2. Email Security

13.2.3.11.3. Endpoint Protection

13.2.3.11.4. Firewall Management

13.2.3.11.5. Intrusion Detection

13.2.3.11.6. Intrusion Prevention

13.2.3.11.7. SIEM

13.2.3.11.8. Vulnerability Assessment

13.2.3.11.9. Web Security

13.2.4. Greater China

13.2.4.1. Hong Kong

13.2.4.1.1. Network Box

13.2.4.1.2. Netswitch

13.2.4.2. BEW Global

13.2.4.2.1. Data Loss Prevention

13.2.4.2.2. Web Security Gateway

13.2.4.2.3. Email Security Gateway

13.2.4.2.4. SIEM

13.2.4.2.5. Vulnerability Assessment

13.2.4.3. Beijing

13.2.4.3.1. Netswitch

13.2.4.4. Shanghai

13.2.4.4.1. Shanghai Data Solution Co., Ltd

13.2.5. Latin America

13.2.5.1. Brazil

13.2.5.1.1. Arcon

13.2.5.1.2. Netcentrics

13.2.5.1.3. RealProtect

13.2.5.1.4. UOL Diveo

13.2.6. Mature Asia Pacific

13.2.6.1. Australia

13.2.6.1.1. Tesserent

13.2.6.1.2. Verizon

13.2.6.2. Singapore

13.2.6.2.1. Quann

13.2.6.2.2. NTT Singapore

13.2.6.2.3. Happiest Minds

13.2.6.2.4. Singtel

13.2.6.2.5. NCS Group

13.2.7. Middle East and North Africa

13.2.7.1. Saudi Arabia

13.2.7.2. United Arab Emirates

13.2.7.2.1. Du Telecom

13.2.7.2.2. Tata Communications

13.2.7.2.3. Dell Secureworks

13.2.7.2.4. Dimension Data

13.2.8. North America

13.2.8.1. Canada

13.2.8.1.1. Above Security

13.2.8.1.2. Bell Canada

13.2.8.1.3. EWA

13.2.8.1.4. Happiest Minds

13.2.8.1.5. Netpulse

13.2.8.1.6. OneStone (Formerly Seccuris)

13.2.8.1.7. SecureData

13.2.8.1.8. SentryMetrics

13.2.8.1.9. SunGard Availability Services

13.2.8.1.10. Virtual Guardian

13.2.8.2. United States

13.2.8.2.1. AT&T

13.2.8.2.2. Above Security

13.2.8.2.3. Alert Logic

13.2.8.2.4. Allstream

13.2.8.2.5. CGI

13.2.8.2.6. CSC

13.2.8.2.7. CSS Corp

13.2.8.2.8. CentraComm

13.2.8.2.9. CenturyLink- Savvis

13.2.8.2.10. Clone Systems

13.2.8.2.11. Compucom Systems

13.2.8.2.12. Cosentry

13.2.8.2.13. Dell Secureworks

13.2.8.2.14. Earthlink

13.2.8.2.15. Esentire

13.2.8.2.16. HCL Technologies

13.2.8.2.17. HP

13.2.8.2.18. Happiest Minds

13.2.8.2.19. IBM

13.2.8.2.20. Intelisecure

13.2.8.2.21. Leidos

13.2.8.2.22. LunarLine

13.2.8.2.23. Masergy Communications

13.2.8.2.24. Megapath

13.2.8.2.25. Morphick

13.2.8.2.26. My Digital Shield

13.2.8.2.27. NCA - Network Computing Architects

13.2.8.2.28. Navisite

13.2.8.2.29. Netfortris

13.2.8.2.30. Netswitch

13.2.8.2.31. Nuspire Networks

13.2.8.2.32. Rook Security

13.2.8.2.33. Secure Designs

13.2.8.2.34. SilverSky (Formerly Stillsecure/Perimeter esecurity)

13.2.8.2.35. Solutionary

13.2.8.2.36. SunGard Availability Services

13.2.8.2.37. Sword and Shield

13.2.8.2.38. Symantec

13.2.8.2.39. Symantec

13.2.8.2.40. Syntegrity Networks

13.2.8.2.41. Tesserent

13.2.8.2.42. Trustwave

13.2.8.2.43. Verizon Business

13.2.8.2.44. Wipro

13.2.9. Sub-Sahara Africa

13.2.9.1. AccessKenya

13.2.9.1.1. Firewall

13.2.9.1.2. Endpoint Protection

13.2.9.1.3. Secure Web Gateway

14. Security Operations & Incident Response

14.1. Digital Forensics/eDiscovery

14.1.1. Content, File and Endpoint Forensics

14.1.1.1. eDiscovery

14.1.1.1.1. Clearwell

14.1.1.1.2. Kazeon

14.1.1.1.3. Guidance Software

14.1.1.1.4. Access Data

14.1.1.1.5. Autonomy

14.1.1.1.6. kCura

14.1.1.1.7. FTI Technology

14.1.1.1.8. Barracuda Networks

14.1.1.2. Mobile Devices

14.1.1.2.1. BlackBagTech

14.1.1.2.2. Cellebrite

14.1.1.2.3. Compelson Labs

14.1.1.2.4. Guidance Software

14.1.1.2.5. MSAB

14.1.1.2.6. NowSecure

14.1.1.2.7. Oxygen Forensics

14.1.1.2.8. Paraben Corporation

14.1.1.3. Endpoint Computing Systems

14.1.1.3.1. ADF Solutions

14.1.1.3.2. Access Data

14.1.1.3.3. ArxSys

14.1.1.3.4. BlackBag Technologies

14.1.1.3.5. CRU Inc

14.1.1.3.6. Cyfir

14.1.1.3.7. Guidance Software

14.1.1.3.8. Magnet Forensics

14.1.1.3.9. Nuix

14.1.1.3.10. OSForensics

14.1.1.3.11. Paraben Corporation

14.1.1.3.12. WindowsScope

14.1.1.3.13. X-Ways Forensics

14.1.1.4. Email Examination

14.1.1.4.1. Systools Software

14.1.1.4.2. Nuix

14.1.1.5. Forensic File & Data Analysis Tools

14.1.1.5.1. Cellebrite

14.1.1.5.2. Cyfir

14.1.1.5.3. Intella

14.1.1.5.4. Magnet Forensics

14.1.1.5.5. Nuix

14.1.1.5.6. Systools Software

14.1.1.6. Digital Forensics Case Management

14.1.1.6.1. D3 Security

14.1.1.6.2. Digital Investigation Manager

14.1.1.6.3. Guidance Software

14.1.1.6.4. Intaforensiscs

14.1.1.6.5. Sentinel Data

14.1.1.6.6. Sirentech

14.1.1.6.7. Wynyard Group

14.1.1.7. Memory Forensics

14.1.1.7.1. FireEye

14.1.1.7.2. Guidance Software

14.1.1.7.3. Volatility Framework

14.1.1.7.4. WindowsScope

14.1.2. eDiscovery Services

14.1.2.1. Robert Half

14.1.2.2. Advanced Discovery

14.1.3. eDiscovery Software

14.1.3.1. AccessData

14.1.3.2. Guidance Software

14.1.3.3. Nuix

14.1.3.4. Symantec

14.2. Fraud Prevention/Web Malware Monitoring

14.2.1. Fraud/Bot/Webscrape Prevention

14.2.1.1. Software

14.2.1.1.1. IBM (Formerly Trusteer)

14.2.1.1.2. Intellinx

14.2.1.1.3. RSA (EMC)

14.2.1.1.4. ShieldSquare

14.2.1.2. Appliances

14.2.1.2.1. Distil Networks

14.2.1.2.2. Imperva

14.2.1.2.3. RSA

14.2.1.2.4. Shape Security

14.2.1.2.5. White Ops

14.2.1.3. Software as a Service

14.2.1.3.1. Akamai

14.2.1.3.2. BioCatch

14.2.1.3.3. BotScout

14.2.1.3.4. Distil Networks

14.2.1.3.5. Guardian Analytics

14.2.1.3.6. Kount

14.2.1.3.7. MarkMonitor

14.2.1.3.8. NuData Security

14.2.1.3.9. Shape Security

14.2.1.3.10. ShieldSquare

14.2.1.3.11. ThreatMetrix

14.2.1.3.12. White Ops

14.2.1.3.13. X-Cart

14.2.1.3.14. iovation

14.2.1.4. Virtual Appliances

14.2.1.4.1. Distil Networks

14.2.1.4.2. Imperva

14.2.2. Website & Ad Malware Monitoring

14.2.2.1. Ad-Juster

14.2.2.2. Globalsign

14.2.2.2.1. Leverages Hackalert

14.2.2.3. Hackalert

14.2.2.4. Intel Security

14.2.2.4.1. Siteadvisor

14.2.2.5. QualysGuard

14.2.2.6. RiskIQ

14.2.2.7. Sucuri

14.2.2.8. The Media Trust

14.3. Incident Response Legal Services

14.3.1. Information Law Group

14.4. Security Information and Event Management (SIEM), Log Management & Analytics

14.4.1. Application Security Intelligence Engine

14.4.1.1. SAP

14.4.1.1.1. iT-Cube Systems

14.4.2. Log Management

14.4.2.1. EventTracker

14.4.2.2. IGLOO Security

14.4.2.3. Intel Security

14.4.2.3.1. McAfee Enterprise Log Manager

14.4.2.4. Kiwi Syslog Server

14.4.2.5. LogEntries

14.4.2.6. LogRythm

14.4.2.7. Logscape

14.4.2.8. Open Source

14.4.2.8.1. Elasticsearch (ELK Stack)

14.4.2.8.2. SEC (Simple Event Correlator)

14.4.2.8.3. OSSIM

14.4.2.8.4. Syslog-NG

14.4.2.8.5. Octopussy

14.4.2.9. Sawmill

14.4.2.10. Splunk

14.4.2.11. Sumo Logic

14.4.2.12. Tripwire

14.4.2.13. XpoLog

14.4.3. SIEM

14.4.3.1. AlienVault

14.4.3.1.1. OSSIM

14.4.3.2. CorreLog

14.4.3.3. EventTracker

14.4.3.4. Fortinet

14.4.3.5. HP

14.4.3.5.1. Arcsight

14.4.3.6. Hexis Cyber Solutions

14.4.3.6.1. Hawkeye AP

14.4.3.7. IBM

14.4.3.7.1. Q1Radar

14.4.3.8. IGLOO Security

14.4.3.9. Intel Security

14.4.3.9.1. NitroSecurity

14.4.3.10. LogPoint

14.4.3.10.1. http://www.logpoint.com/en/

14.4.3.11. LogRythm

14.4.3.12. Novell

14.4.3.12.1. Sentinel

14.4.3.13. RSA

14.4.3.13.1. Envision

14.4.3.14. Sensage

14.4.3.15. Solarwinds

14.4.3.16. Splunk

14.4.3.17. Sqrrl

14.4.3.18. Tibco

14.4.3.18.1. Loglogic

14.4.3.19. eIQnetworks

14.4.4. Security Analytics

14.4.4.1. Anomaly Analytics

14.4.4.1.1. Intel

14.4.4.1.2. Theta Ray

14.4.4.1.3. Prelert

14.4.4.1.4. eMite

14.4.4.2. User and Entity Behavior Analytics (UEBA)

14.4.4.2.1. Bay Dynamics

14.4.4.2.2. Darktrace

14.4.4.2.3. Detex Systems

14.4.4.2.4. Exabeam

14.4.4.2.5. Fortscale

14.4.4.2.6. Gurcul

14.4.4.2.7. HP

14.4.4.2.8. IBM

14.4.4.2.9. Interset

14.4.4.2.10. Microsoft

14.4.4.2.11. Niara

14.4.4.2.12. ObserveIT

14.4.4.2.13. Palerra

14.4.4.2.14. Platfora

14.4.4.2.15. Reveelium

14.4.4.2.16. Secureonix

14.4.4.2.17. Veriato

14.4.5. User and Entity Behavior Analytics (UEBA)

14.4.5.1. Bae Systems Applied Intelligence

14.4.5.2. Bay Dynamics

14.4.5.3. Caspida

14.4.5.4. Click Security

14.4.5.5. Exabeam

14.4.5.6. FICO

14.4.5.7. Fortscale

14.4.5.8. GuruCul

14.4.5.9. IBM

14.4.5.10. Intellinx

14.4.5.11. Lockheed Martin

14.4.5.12. Logtrust

14.4.5.13. Mobile System 7

14.4.5.14. Novetta Solutions

14.4.5.15. Oracle

14.4.5.16. Rapid7

14.4.5.17. Raytheon

14.4.5.18. SAS Institute

14.4.5.19. Secureonix

14.4.5.20. Splunk

14.5. Security Operations, Analytics and Reporting (SOAR)

14.5.1. Security Incident Response Platforms (SIRP)

14.5.1.1. Agiliance

14.5.1.2. DFLabs

14.5.1.3. Demisto

14.5.1.4. EMC(RSA)

14.5.1.5. Empow

14.5.1.6. Fido

14.5.1.7. Hexadite

14.5.1.8. ID Experts

14.5.1.9. Proofpoint

14.5.1.10. Resilient Systems

14.5.1.11. Siemplify

14.5.1.12. Syncurity

14.5.2. Threat and Vulnerability Management (TVM)

14.5.2.1. Acuity Risk Management

14.5.2.2. Agiliance

14.5.2.3. BeyondTrust

14.5.2.4. Core Security

14.5.2.5. Cybersponse

14.5.2.6. DFLabs

14.5.2.7. EMC(RSA)

14.5.2.8. Kenna Security

14.5.2.9. NopSec

14.5.2.10. RedSeal

14.5.2.11. RiskSense

14.5.2.12. Skybox Security

14.5.2.13. Swimlane

14.5.2.14. Siemplify

14.5.3. Security Operations Analytics

14.5.3.1. Ayehu

14.5.3.2. Cybersponse

14.5.3.3. DFLabs

14.5.3.4. EMC(RSA)

14.5.3.5. Hexadite

14.5.3.6. Proofpoint

14.5.3.7. Resilient Systems

14.5.3.8. Siemplify

14.5.3.9. Swimlane

14.5.4. Security Operations Automation Platforms (SOAPS)

14.5.4.1. Ayehu

14.5.4.2. Cyberbit

14.5.4.3. Cybersponse

14.5.4.4. DFLabs

14.5.4.5. Demisto

14.5.4.6. Fireye

14.5.4.7. Hexadite

14.5.4.8. IBM

14.5.4.9. Phantom Cyber

14.5.4.10. Swimlane

14.5.4.11. Syncurity

14.6. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

14.6.1. Crowdsourced Application Security Testing Platforms

14.6.1.1. Hyver

14.6.1.2. Applause

14.6.1.3. Bugcrowd

14.6.1.4. BugFinders

14.6.1.5. Cobalt

14.6.1.6. Crowdtesters

14.6.1.7. HackerOne

14.6.2. Managed Penetration Testing Services

14.6.2.1. Cenzic

14.6.2.2. WhiteHatSecurity

14.6.3. Penetration Testing Software

14.6.3.1. Core Security

14.6.3.2. Rapid7

14.6.3.2.1. Metasploit Pro

14.6.3.2.2. Metasploit Express

14.6.3.3. Trustwave

14.6.4. Vulnerability Assessment

14.6.4.1. Software as a Service

14.6.4.1.1. Vulnerability Management

14.6.4.1.2. Phish Testing/Management

14.6.4.2. Network-Based Vulnerability Assessment (On Premise)

14.6.4.2.1. Core Security

14.6.4.2.2. Digital Defense

14.6.4.2.3. Fortinet

14.6.4.2.4. Intel Security

14.6.4.2.5. NSAuditor

14.6.4.2.6. Ncircle

14.6.4.2.7. Netasq

14.6.4.2.8. Outpost24

14.6.4.2.9. Qualys

14.6.4.2.10. RandomStorm

14.6.4.2.11. Rapid 7

14.6.4.2.12. Trustwave

14.6.4.3. Agent-Based Vulnerability Assessment

14.6.4.3.1. BeyondTrust

14.6.4.3.2. Qualys

14.6.4.3.3. Secunia

14.6.4.3.4. Tenable

14.6.4.4. Mainframe Vulnerability Assessment

14.6.4.4.1. Key Resources Inc. (KRI)

14.6.5. Vulnerability Correlation

14.6.5.1. Application Vulnerability Correlation

14.6.5.1.1. Code DX

14.6.5.1.2. Denim Group

14.6.5.1.3. Kenna Security

14.6.5.1.4. NopSec

14.6.5.2. Network Vulnerability Correlation

14.6.5.2.1. Secure Decisions

14.6.5.2.2. RiskSense

14.6.5.2.3. NopSec

14.6.5.2.4. Kenna Security

14.6.5.2.5. Cybric

14.6.6. Vulnerability Research

14.6.6.1. CSC

14.6.6.2. HP

14.6.6.2.1. DV Labs

14.6.6.3. HotWAN

14.6.6.4. Intel Security

14.6.6.5. SecNiche Labs

14.6.6.6. Sourcefire VRT

14.6.6.7. Symantec

14.6.6.8. VRLSec

14.6.6.9. Vupen