1. Data Classification and Tracking
1.1. Banyan Solutions
1.2. BoldonJames
1.3. Digital Guardian
1.4. HP
1.5. IBM
1.6. Identity Finder
1.7. Mach1 Development
1.8. Microsoft (Formerly Secure Islands)
1.9. MinerEye
1.10. Nuix
1.11. Smartlogic
1.12. Titus
1.13. Varonis
1.14. CoSoSys
2. Data Governance and Classification
2.1. Boldonjames
2.2. Expert Source
2.2.1. http://www.expertsource.in/index.php
2.3. HP
2.4. IBM
2.5. Informatica
2.6. Nuix
2.7. Somansa
2.8. Titus
2.9. ThinAir
3. Data Loss Prevention (DLP)
3.1. Endpoint
3.1.1. Mobile
3.1.1.1. Symantec
3.1.1.2. Websense
3.1.1.3. Microsoft (Secure Islands)
3.1.2. Windows
3.1.2.1. Absolute Software
3.1.2.2. CA Technologies
3.1.2.3. Digital Guardian
3.1.2.4. GTB Technologies
3.1.2.5. Infowatch
3.1.2.6. McAfee
3.1.2.7. RSA
3.1.2.8. Microsoft (Secure Islands)
3.1.2.9. Somansa
3.1.2.10. Symantec
3.1.2.11. Trustwave
3.1.2.12. Watchful Software
3.1.2.13. Raytheon-Websense
3.1.2.14. Zecurion
3.2. Network
3.2.1. Digital Guardian
3.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)
3.2.3. Symantec
3.2.4. InfoWatch
3.3. Secure Email Gateway
3.3.1. Cisco
3.3.2. Symantec
3.3.3. McAfee
3.3.4. Somansa
3.4. Secure Web Gateway
3.4.1. McAfee
3.4.2. Symantec
3.4.3. Somansa
3.5. Breached Data Detection
3.5.1. Consumer
3.5.1.1. haveibeenpwned.com
3.5.1.1.1. https://haveibeenpwned.com/
3.5.2. Enterprise
3.5.2.1. Hold Security
3.5.2.1.1. http://holdsecurity.com/
3.5.2.2. Infoarmor
3.5.2.2.1. https://www.infoarmor.com/
3.5.2.3. Ionic
3.5.2.3.1. https://www.ionic.com/
3.5.2.4. SpyCloud
3.5.2.4.1. https://spycloud.com/
4. Database Security
4.1. Database Audit and Protection (DAP)
4.1.1. Application Security, Inc
4.1.2. BeyondTrust
4.1.3. Big Data Platform DAP
4.1.3.1. BlueTalon
4.1.3.2. Cloudera
4.1.3.2.1. Sentry
4.1.3.3. Hortonworks
4.1.3.3.1. Ranger
4.1.3.4. IBM
4.1.3.5. Imperva
4.1.4. DataSunrise
4.1.5. Datiphy
4.1.6. Fortinet
4.1.7. Hexatier
4.1.8. IBM
4.1.9. Imperva
4.1.10. IRI
4.1.10.1. Oracle
4.1.10.2. SQL Server
4.1.11. McAfee
4.1.12. Mentis Software
4.1.13. Oracle Corp
4.1.14. PentaSecurity
4.1.15. Warevalley
4.2. Database Activity Monitoring
4.2.1. Cyral
4.2.2. Datiphy
4.2.3. IBM
4.2.4. Imperva
4.2.5. Satori
4.2.6. Somansa
4.2.7. Trellix
4.3. Data Lake Security
4.3.1. Satori
4.3.2. SISense
5. Encryption/Tokenization
5.1. Big Data
5.1.1. Gazzang
5.1.2. Vormetric
5.2. Cloud/SAAS Encryption
5.2.1. Appliances
5.2.1.1. Office365
5.2.1.1.1. Vaultive
5.2.1.1.2. FiLink
5.2.1.2. Ciphercloud
5.2.1.3. Afore Solutions
5.2.1.3.1. CloudLink VSA
5.2.1.4. Perspecsys
5.2.2. Software
5.2.2.1. BoxCryptor
5.2.2.2. CloudMask
5.2.2.3. PrivateCore
5.2.2.4. Trend Micro
5.2.2.4.1. SecureCloud
5.2.2.5. Viivo
5.2.2.6. Voltage Security
5.2.3. Software as a Service
5.2.3.1. Trend Micro
5.2.3.1.1. SecureCloud
5.2.3.2. SooKasa
5.2.3.3. Thales
5.2.3.3.1. SafeMonk
5.3. Cryptographic Providers
5.3.1. RSA
5.3.2. Quintessence
5.3.3. Microsoft
5.4. Data masking
5.4.1. Oracle
5.4.2. Dataguise
5.4.3. Informatica
5.4.4. IBM
5.4.5. Voltage Security
5.4.6. Green SQL
5.4.7. Mentis
5.4.8. Compuware
5.4.9. Axis
5.4.10. Privacy Analytics
5.4.11. Camouflage Software
5.4.12. Solix Technologies
5.4.13. Net 2000
5.5. Database
5.5.1. Thales
5.5.2. Dark Matter Labs
5.5.3. Vormetric
5.6. Email
5.6.1. ZixCorp
5.6.2. Encryptics
5.6.2.1. https://www.encryptics.com/default.aspx
5.7. Encrypted USB Storage
5.7.1. Apricorn
5.7.2. Datalocker
5.7.3. EgoSecure
5.7.4. Integral Memory
5.7.5. IronKey
5.7.6. Kingston
5.7.7. Virbatim
5.8. File/Folder
5.8.1. Covertix
5.8.1.1. http://www.covertix.com/
5.8.2. EgoSecure
5.8.3. IBM
5.8.3.1. Mainframe
5.8.3.1.1. z10
5.8.4. SecureIslands
5.8.5. Sophos
5.8.5.1. SafeGuard Enterprise (Utimaco)
5.8.6. Symantec (PGP)
5.8.7. Vormetric
5.8.8. WinMagic
5.8.8.1. SecureDoc
5.9. Quantum Encryption
5.9.1. IDQ
5.9.2. Quintessence Labs
5.9.3. Whitewood Encryption
5.10. Tokenization
5.10.1. Altr
5.10.2. Hessegg
5.10.3. Investax
5.10.4. Nutanix
5.10.5. Protegrity
5.10.6. Visa
5.11. Whole Disk
5.11.1. CheckPoint Software
5.11.2. EgoSecure
5.11.3. Encryption Management
5.11.3.1. Wave Systems
5.11.4. McAfee
5.11.5. Microsoft
5.11.5.1. Bitlocker
5.11.6. Sophos
5.11.6.1. SafeGuard Enterprise (Utimaco)
5.11.7. Symantec (PGP)
5.11.8. Trustwave
5.11.8.1. DataControl
5.11.9. Vormetric
5.11.10. WinMagic
5.11.10.1. SecureDoc
6. Enterprise File Syncronization and Share
6.1. Blackberry
6.2. Box
6.3. Citrix
6.4. Covata
6.5. Dropbox
6.6. Egnyte
6.7. Google
6.8. Huddle
6.9. Intralinks
6.10. Kiteworks
6.11. Microsoft OneDrive
6.12. Syncplicity
6.13. Thru
6.14. Varonis
7. File Analysis Software
7.1. Acaveo
7.2. Active Navigation
7.3. AvePoint
7.4. Beyond Recognition
7.5. Bloomberg
7.6. CommVault
7.7. Condrey
7.8. Covertix
7.9. DataGlobal
7.10. DataGravity
7.11. Equivio
7.12. HiSoftware
7.13. HP
7.13.1. Control Point
7.14. IBM
7.14.1. StoreIQ
7.15. Identifty Finder
7.16. Imperva
7.17. Index Engines
7.18. Kazoup
7.19. MailGuard
7.20. Novell
7.21. NTP Software
7.22. Nuix
7.23. Proofpoint
7.24. Stealthbits
7.25. ThinAir
7.26. Varonis
7.27. WatchDox
7.28. Whitebox Security
7.29. ZyLab
8. Hardware Security Modules (HSM)
8.1. Cloud HSM
8.1.1. Amazon
8.1.2. Azure
8.1.3. Google
8.1.4. IBM
8.2. Hardware
8.2.1. Entrust
8.2.2. FutureX
8.2.3. Futurex
8.2.4. HPE
8.2.5. Keyfactor
8.2.6. PrimeKey
8.2.7. Thales
9. eSignatures
9.1. Adobe eSign Services
9.2. Alphatrust
9.3. Docusign
9.4. Hellosign
9.5. Rightsignature
9.6. Sertifi
10. Content Disarming and Reconstruction (CDR)
10.1. Check Point
10.2. DeepInstinct
10.3. Forcepoint
10.4. Fortinet
10.5. Garrison Technology
10.6. Glasswall
10.7. IronScales
10.8. ODI-X
10.9. OPSWAT
10.9.1. https://www.opswat.com/products/metascan/