Information Security Technologies & Markets

Comienza Ya. Es Gratis
ó regístrate con tu dirección de correo electrónico
Information Security Technologies & Markets por Mind Map: Information Security Technologies & Markets

1. Cloud Security

1.1. Cloud Firewall Management & Orchaestration

1.1.1. Check Point Software

1.1.2. Cisco

1.1.3. CloudPassage

1.1.4. Dome9

1.1.5. Hillstone Networks

1.1.6. Huawei

1.1.7. Illumio

1.1.8. Palo Alto Networks

1.1.9. Redcannon Security

1.1.10. VMware

1.1.11. XRoads Networks

1.1.12. vArmour

2. Identity and Access Management (IAM)

2.1. AD/Unix bridge

2.1.1. Centrify

2.2. Enterprise single sign-on (ESSO)

2.3. Externalized authorization management (EAM)

2.3.1. Axiomatics

2.3.2. Dell Quest (BitKoo)

2.4. IAM as a Service

2.4.1. Centrify

2.4.2. IBM (Formerly Lighthouse Security)

2.4.3. Identity Automation

2.4.4. Intel

2.4.5. Okta

2.4.6. Password Bank

2.4.7. Ping Identity

2.4.8. Sailpoint

2.4.9. Symplifyed

2.4.10. iWelcome

2.5. Identity governance and administration

2.5.1. CA Technologies

2.5.2. IBM Security

2.5.3. Oracle

2.5.4. RSA (Aveksa)

2.6. Privileged account management (PAM)

2.6.1. BeyondTrust

2.6.2. Lieberman Software

2.6.3. Cyber Ark

2.6.4. Dell

2.6.5. Centrify

2.7. Public Certificate Authorities

2.7.1. Comodo

2.7.2. Geotrust

2.7.3. Godaddy

2.7.4. Symantec (Formerly VeriSign)

2.8. User Authentication

2.8.1. Tokens

2.8.1.1. OOB authentication

2.8.1.1.1. SMS

2.8.1.1.2. Voice

2.8.1.1.3. Push

2.8.1.1.4. Email

2.8.1.1.5. Social media

2.8.1.2. OTP tokens

2.8.1.2.1. OTP hardware tokens

2.8.1.2.2. OTP software tokens for smart phones

2.8.1.3. X.509 tokens

2.8.1.4. Other tokens

2.8.1.4.1. ANECT AS - ALUCID

2.8.2. Contextual authentication

2.8.3. KBA

2.8.3.1. It's Me Security

2.8.3.1.1. http://www.itsmesecurity.com/

2.8.4. Biometrics

2.8.4.1. Behavioral

2.8.4.1.1. Typing rhythm/keystroke dynamics

2.8.4.1.2. Voice recognition

2.8.4.2. Biological

2.8.4.2.1. Face recognition

2.8.4.2.2. Fingerprint

2.8.5. Wide-focus vendors

2.8.5.1. Alladin-RD

2.8.5.2. CA Technologies

2.8.5.3. Entrust

2.8.5.4. HID Global

2.8.5.5. RSA

2.8.5.5.1. Adaptive Auth

2.8.5.6. SafeNet

2.8.5.7. Symantec

2.8.5.8. Technology Nexus

2.8.5.9. VASCO

2.9. User Privilege Management

2.9.1. Appsense

2.9.1.1. http://www.appsense.com/

2.9.2. Ariella

2.9.2.1. http://www.arellia.com/

2.9.3. Avectco

2.9.3.1. http://www.avecto.com/

2.9.4. BeyondTrust

2.9.4.1. http://www.beyondtrust.com/

2.9.5. CionSystems

2.9.6. CrossIdeas

2.9.6.1. http://www.crossideas.com/

2.9.7. Centrify

2.9.7.1. http://www.centrify.com/

2.9.8. Dell

2.9.8.1. http://www.quest.com/desktop-authority-management-suite/

2.9.9. Lieberman Software

2.9.9.1. http://www.liebsoft.com/

2.9.10. Viewfinity

2.9.10.1. http://www.viewfinity.com/

3. Infrastructure Protection

3.1. Active Directory Defense

3.1.1. Aorato

3.1.1.1. http://www.aorato.com/

3.2. Appliance Based Malware Sandboxes

3.2.1. AhnLab

3.2.2. CheckPoint Software

3.2.3. ContentKeeper

3.2.4. Cyphort

3.2.5. Damballa

3.2.6. FireEye

3.2.7. HBGary

3.2.8. LastLine

3.2.9. Intel Security

3.2.9.1. ValidEDGE

3.2.10. Palo Alto Networks

3.2.11. RSA

3.2.11.1. Security Analytics (Formerly Netwitness)

3.2.11.1.1. Spectrum

3.2.12. Trend Micro

3.2.13. WINS TECHNET LTD

3.2.13.1. http://www.wins21.co.kr/

3.3. Cloud-Based Remote Access

3.3.1. BubblewRapp

3.3.2. Pertino

3.4. DNS-based Threat Prevention/Detection

3.4.1. Standalone Appliances

3.4.1.1. Efficient IP

3.4.1.2. Infoblox

3.4.2. DNS Services

3.4.2.1. Comodo

3.4.2.2. Neustar

3.4.2.3. OpenDNS

3.4.2.4. Symantec

3.4.3. Firewalls

3.4.3.1. Palo Alto Networks

3.5. Denial of Service Protection

3.5.1. Appliances

3.5.1.1. Arbor Networks

3.5.1.1.1. Prevail APS

3.5.1.2. Check Point Software

3.5.1.2.1. DDos Protector

3.5.1.3. Corero

3.5.1.4. Fortinet

3.5.1.5. Genie Networks

3.5.1.5.1. ATM Appliances

3.5.1.6. NSFOCUS

3.5.1.7. Radware

3.5.1.8. WINS TECHNET LTD

3.5.1.8.1. http://www.wins21.co.kr/

3.5.2. Security as a Service

3.5.2.1. HTTP/HTTPS Only

3.5.2.1.1. DOSArrest

3.5.2.1.2. Cloudflare

3.5.2.2. MultiProtocol/Network

3.5.2.2.1. Akamai

3.5.2.2.2. Black Lotus

3.5.2.2.3. Cloud Flare

3.5.2.2.4. F5

3.5.2.2.5. Incapsula

3.5.2.2.6. Link11

3.5.2.2.7. Neustar

3.5.2.2.8. NexusGuard

3.5.2.2.9. Verisign Inc

3.5.3. Clean Pipe Services

3.5.3.1. AT&T

3.5.3.2. Verizon

3.6. Network Access Control (NAC)

3.6.1. Host Based

3.6.1.1. Symantec

3.6.1.2. Intel Security

3.6.2. Network Based

3.6.2.1. Forescout

3.6.2.2. Cisco

3.6.2.3. Bradford Networks

3.6.2.4. Milton Security Group

3.7. Network Anonymization & Consumer VPN Services

3.7.1. AnchorFree Hotspot Shield

3.7.2. Anonymize.net

3.7.3. CyberGhost

3.7.4. GoldenFrog

3.7.5. HMA ProVPN

3.7.5.1. TorVPN

3.7.6. Okayfreedom

3.7.7. OpenVPN Shield Exchange

3.7.8. Private Wifi

3.7.9. Tor

3.8. Network Behavior Analysis/Network Forensics

3.8.1. Network Behavior and Advanced Threat Analytics

3.8.1.1. Arbor Networks

3.8.1.2. Boeing

3.8.1.2.1. http://www.boeing.com/defense/cybersecurity-information-management/

3.8.1.3. Cyber adAPT

3.8.1.4. Darktrace

3.8.1.5. EMC

3.8.1.6. Lancope

3.8.1.7. Light Cyber

3.8.1.8. Novetta Solutions

3.8.1.8.1. http://www.novetta.com/commercial/novetta-advanced-analytics/cyber-analytics/

3.8.1.9. PacketSled

3.8.1.10. RedJack

3.8.1.11. Splunk

3.8.1.12. Taasera

3.8.1.13. Trustport

3.8.1.13.1. Threat Intelligence

3.8.1.14. Vectra Networks

3.8.2. Network Monitoring, Network Behavior & Metadata Extraction Appliances

3.8.2.1. Damballa

3.8.2.2. ExtraHop Networks

3.8.2.2.1. No-Net Flow Support

3.8.2.3. Genie Networks

3.8.2.4. GreatBay Software

3.8.2.5. Kindsight

3.8.2.6. Light Cyber

3.8.3. Network-Based Threat Intelligence Enforcement Appliances

3.8.3.1. Centripetal Networks

3.8.3.2. Check Point Software

3.8.3.3. Norse Corp

3.8.3.3.1. Darkwatch

3.8.4. Surveillance/Lawful Intercept

3.8.4.1. Cybersift

3.8.4.1.1. http://www.cybersift.net/sifter10app.html

3.8.4.2. Decision Group INC

3.8.4.2.1. http://www.edecision4u.com/index.html

3.8.4.3. IP Fabrics

3.8.4.4. InveaTech

3.8.4.4.1. https://www.invea.com/en/products-and-services/li-system

3.8.4.5. KLOS

3.8.4.5.1. http://www.klos.com/applications/lawful-intercept/

3.8.4.6. NEXT Computing

3.8.4.6.1. http://www.nextcomputing.com/products/packet-capture-systems

3.8.4.7. Radisys

3.8.4.7.1. http://www.radisys.com/products/network-appliance/

3.8.4.8. Utimaco

3.8.4.8.1. https://lims.utimaco.com/utimaco-lims/

3.9. Network Firewalls

3.9.1. Carrier Firewalls

3.9.2. Enterprise Firewalls

3.9.2.1. Multifunction Enterprise Firewalls

3.9.2.1.1. Check Point Software

3.9.2.1.2. Cisco

3.9.2.1.3. Fortinet

3.9.2.1.4. Palo Alto Networks

3.9.2.2. Stateful Inspection - Traditional Firewalls

3.9.2.2.1. Cisco

3.9.2.2.2. Meraki

3.9.2.2.3. HP

3.9.2.2.4. Huawei

3.9.2.2.5. Check Point Software

3.9.3. Multi-Funtion SMB Firewalls

3.9.3.1. 443 Networks

3.9.3.2. Check Point Software

3.9.3.3. CheckPoint

3.9.3.4. Cisco

3.9.3.5. Clavister

3.9.3.6. Endian

3.9.3.7. Fortinet

3.9.3.8. Hillstone Networks

3.9.3.9. PineApp

3.9.3.9.1. http://www.pineapp.com/

3.9.3.10. Sangfor

3.9.3.11. Sonicwall

3.9.3.12. Sophos

3.9.3.13. Trustwave

3.9.3.14. Untangle

3.9.3.15. WINS TechNet LTD

3.9.3.15.1. http://www.wins21.co.kr/

3.9.3.16. WatchGuard

3.9.4. Open Source & Community

3.9.4.1. IPTables

3.9.4.2. IPchains

3.9.4.3. PFSense

3.9.4.4. Untangle

3.9.5. Router Firewalls

3.10. Network Intrusion Prevention

3.10.1. Predictive Modeling

3.10.1.1. Trustpipe

3.10.1.2. Cyactive

3.10.2. IBM

3.10.3. Signature Based

3.10.3.1. WINS TECHNET LTD

3.10.3.1.1. http://www.wins21.co.kr/

3.10.3.2. Open Source

3.10.3.2.1. Snort

3.10.3.3. Intel Security

3.10.3.4. IBM

3.10.3.5. HP

3.10.3.5.1. TippingPoint

3.10.3.6. Fortinet

3.10.3.7. Enterasys

3.10.3.8. Cisco

3.10.3.8.1. Sourcefire

3.10.3.9. CheckPoint

3.10.3.10. AlienVault

3.10.3.10.1. Snort

3.11. Network-Based Advanced Threat Protection

3.11.1. Advanced Threat Intelligence

3.11.1.1. LookingGlass

3.11.1.2. OpenDNS

3.11.1.3. Norse Corp

3.11.2. Firewalls with File Sandbox Capabilities

3.11.2.1. Barracuda

3.11.2.2. Check Point Software

3.11.2.3. Fortinet

3.11.2.4. Juniper Networks

3.11.2.5. Palo Alto Networks

3.11.2.6. Sophos

3.11.2.7. Watchguard

3.11.3. Virtual Execution Assessment

3.11.3.1. Cloud Based

3.11.3.1.1. Netwitness

3.11.3.1.2. CrowdStrike

3.11.3.1.3. Cisco

3.11.4. Virtualization & Emulation Sandbox Standalone Appliances

3.11.4.1. AhnLab

3.11.4.2. Bluecoat

3.11.4.3. Check Point Software

3.11.4.3.1. Emulator Blade

3.11.4.4. Cisco

3.11.4.4.1. ThreatGrid

3.11.4.5. Cyphort

3.11.4.6. Damballa

3.11.4.7. FireEye

3.11.4.7.1. Malware Analysis Appliance

3.11.4.8. Fortinet

3.11.4.8.1. FortiSandbox

3.11.4.9. General Dynamics

3.11.4.9.1. Fidelis Security Systems

3.11.4.10. Intel Security

3.11.4.10.1. McAfee Advanced Threat Detection Appliance

3.11.4.11. Lastline

3.11.4.12. Palo Alto Networks

3.11.4.12.1. WildFire

3.11.4.13. Techguard Security

3.11.4.14. ThreatTrack

3.11.4.14.1. Email Only

3.11.4.15. Trend Micro

3.11.4.15.1. Deep Discovery

3.11.4.16. VMRay

3.12. SCADA Monitoring

3.12.1. PFP Cybersecurity

3.13. SSL Inspection Appliances

3.13.1. A10 Networks

3.13.2. Bluecoat

3.13.3. ResolutionOne

3.13.4. VSS Monitoring

3.13.5. SourceFire

3.14. Software Defined Network Perimeter

3.14.1. Tempered Networks

3.14.2. Unisys Stealth

3.14.3. Vidder

3.15. Virtual Private Networking (VPN/SSL VPN)

3.15.1. IPSec VPN Concentrators

3.15.1.1. Certes Networks

3.15.1.2. CheckPoint Software

3.15.1.3. Cisco

3.15.1.4. Mako Networks

3.15.2. Layer 2 Encryption

3.15.2.1. Certes Networks

3.15.3. Layer 4 Encryption

3.15.3.1. Certes Networks

3.15.4. SSL VPN

3.15.4.1. AhnLab

3.15.4.2. Array Networks

3.15.4.3. Barracuda Networks

3.15.4.4. Cisco

3.15.4.5. Citrix

3.15.4.6. F5 Networks

3.15.4.7. Hillstone Networks

3.15.4.8. Juniper

3.15.4.9. NetGear

3.15.4.10. Sonicwall

3.15.4.11. Stonesoft

3.15.4.12. WatchGuard

3.16. Web/Email Protection

3.16.1. Secure Email Gateways

3.16.1.1. Bluecoat

3.16.1.2. Fortinet

3.16.1.3. GWAVA

3.16.1.4. Intel Security

3.16.1.5. Proofpoint

3.16.1.6. Sonicwall

3.16.1.7. Symantec

3.16.1.8. Trustwave

3.16.1.9. Websense

3.16.1.10. iBoss

3.16.2. Secure Web Gateways

3.16.2.1. Bluecoat

3.16.2.2. ContentKeeper

3.16.2.3. GWAVA

3.16.2.4. Intel Security

3.16.2.5. Symantec

3.16.2.6. Trustwave

3.16.2.7. Websense

3.16.2.8. iBoss

3.16.3. Security as a Service

3.16.3.1. Web & Email SaaS

3.16.3.1.1. Appriver

3.16.3.1.2. Barracuda

3.16.3.1.3. Bitglass

3.16.3.1.4. Cisco

3.16.3.1.5. Intel Security

3.16.3.1.6. Spamina

3.16.3.1.7. Symantec

3.16.3.1.8. Total Defense

3.16.3.1.9. TotalDefense

3.16.3.1.10. Websense

3.16.3.1.11. Zscaler

3.16.3.2. Web Only

3.16.3.2.1. ContentKeeper

3.16.3.2.2. OpenDNS

3.16.3.3. Email Only

3.16.3.3.1. Agari

4. Data and Collaboration Security

4.1. Data Governance and Classification

4.1.1. Expert Source

4.1.1.1. http://www.expertsource.in/index.php

4.1.2. HP

4.1.3. IBM

4.1.4. Informatica

4.1.5. Nuix

4.1.6. Somansa

4.1.7. Titus

4.1.8. boldonjames

4.2. Data Loss Prevention (DLP)

4.2.1. Endpoint

4.2.1.1. Data Classification and Tracking

4.2.1.1.1. Banyan Solutions

4.2.1.1.2. BoldonJames

4.2.1.1.3. Digital Guardian

4.2.1.1.4. HP

4.2.1.1.5. IBM

4.2.1.1.6. Mach1 Development

4.2.1.1.7. MinerEye

4.2.1.1.8. Nuix

4.2.1.1.9. SecureIslands

4.2.1.1.10. Smartlogic

4.2.1.1.11. Titus

4.2.1.1.12. Varonis

4.2.1.2. Mobile

4.2.1.2.1. Symantec

4.2.1.2.2. Websense

4.2.1.2.3. SecureIslands

4.2.1.3. Windows

4.2.1.3.1. Absolute Software

4.2.1.3.2. CA Technologies

4.2.1.3.3. Digital Guardian

4.2.1.3.4. GTB Technologies

4.2.1.3.5. Infowatch

4.2.1.3.6. Intel Security

4.2.1.3.7. RSA

4.2.1.3.8. SecureIslands

4.2.1.3.9. Somansa

4.2.1.3.10. Symantec

4.2.1.3.11. Trustwave

4.2.1.3.12. Watchful Software

4.2.1.3.13. Websense

4.2.1.3.14. Zecurion

4.2.2. Network

4.2.2.1. Code Green Networks

4.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)

4.2.2.3. RSA (EMC)

4.2.2.4. Symantec

4.2.3. Secure Email Gateway

4.2.3.1. Cisco

4.2.3.2. Symantec

4.2.3.3. Intel Security

4.2.3.4. Somansa

4.2.4. Secure Web Gateway

4.2.4.1. Intel Security

4.2.4.2. Symantec

4.2.4.3. Somansa

4.2.5. Security as a Service

4.2.5.1. Consumer

4.2.5.1.1. Reputation.com

4.2.5.1.2. Social Fortress

4.2.5.1.3. PwnedList

4.2.5.2. Enterprise

4.2.5.2.1. Social Fortress

4.2.5.2.2. Google Apps

4.2.5.2.3. ZixCorp

4.3. Database Security

4.3.1. Database Audit and Protection

4.3.1.1. Application Security, Inc

4.3.1.2. BeyondTrust

4.3.1.3. Fortinet

4.3.1.4. GreenSQL

4.3.1.5. IBM

4.3.1.6. IRI

4.3.1.6.1. Oracle

4.3.1.6.2. SQL Server

4.3.1.7. Imperva

4.3.1.8. Intel Security

4.3.1.9. Mentis Software

4.3.1.10. Oracle Corp

4.3.1.11. PentaSecurity

4.3.1.12. Warevalley

4.3.2. Database Activity Monitoring

4.3.2.1. DB Networks

4.3.2.2. Somansa

4.4. Encrypted USB Storage

4.4.1. Apricorn

4.4.2. Datalocker

4.4.3. Integral Memory

4.4.4. IronKey

4.4.5. Kingston

4.4.6. Virbatim

4.5. Encryption/Tokenization

4.5.1. Cloud/SAAS Encryption

4.5.1.1. Appliances

4.5.1.1.1. Office365

4.5.1.1.2. Ciphercloud

4.5.1.1.3. Afore Solutions

4.5.1.1.4. Perspecsys

4.5.1.2. Software

4.5.1.2.1. BoxCryptor

4.5.1.2.2. CloudMask

4.5.1.2.3. PrivateCore

4.5.1.2.4. Trend Micro

4.5.1.2.5. Viivo

4.5.1.2.6. Voltage Security

4.5.1.3. Software as a Service

4.5.1.3.1. Trend Micro

4.5.1.3.2. SooKasa

4.5.1.3.3. SafeNet

4.5.2. Data masking

4.5.2.1. Oracle

4.5.3. Database

4.5.3.1. SafeNet

4.5.3.2. Dark Matter Labs

4.5.3.3. Vormetric

4.5.4. File/Folder

4.5.4.1. Covertix

4.5.4.1.1. http://www.covertix.com/

4.5.4.2. IBM

4.5.4.2.1. Mainframe

4.5.4.3. SecureIslands

4.5.4.4. Sophos

4.5.4.4.1. SafeGuard Enterprise (Utimaco)

4.5.4.5. Symantec (PGP)

4.5.4.6. Vormetric

4.5.4.7. WinMagic

4.5.4.7.1. SecureDoc

4.5.5. Mobile Storage/USB

4.5.5.1. IronKey

4.5.6. Tokenization

4.5.6.1. Protegrity

4.5.7. Whole Disk

4.5.7.1. Intel Security

4.5.7.2. Symantec (PGP)

4.5.7.3. CheckPoint Software

4.5.7.4. Encryption Management

4.5.7.4.1. Wave Systems

4.5.7.5. WinMagic

4.5.7.5.1. SecureDoc

4.5.7.6. Microsoft

4.5.7.6.1. Bitlocker

4.5.7.7. Sophos

4.5.7.7.1. SafeGuard Enterprise (Utimaco)

4.5.7.8. Trustwave

4.5.7.8.1. DataControl

4.5.7.9. Vormetric

4.5.8. Big Data

4.5.8.1. Gazzang

4.5.8.2. Vormetric

4.5.9. Email

4.5.9.1. ZixCorp

4.5.9.2. Encryptics

4.5.9.2.1. https://www.encryptics.com/default.aspx

4.5.10. Cryptographic Providers

4.5.10.1. RSA

4.5.10.2. Quintessence

4.5.10.3. Microsoft

4.6. File Analysis Software

4.6.1. Acaveo

4.6.2. Active Navigation

4.6.3. AvePoint

4.6.4. Beyond Recognition

4.6.5. Bloomberg

4.6.6. CommVault

4.6.7. Condrey

4.6.8. Covertix

4.6.9. DataGlobal

4.6.10. DataGravity

4.6.11. Equivio

4.6.12. HP

4.6.12.1. Control Point

4.6.13. HiSoftware

4.6.14. IBM

4.6.14.1. StoreIQ

4.6.15. Identifty Finder

4.6.16. Imperva

4.6.17. Index Engines

4.6.18. Kazoup

4.6.19. NTP Software

4.6.20. Novell

4.6.21. Nuix

4.6.22. Proofpoint

4.6.23. Stealthbits

4.6.24. Varonis

4.6.25. WatchDox

4.6.26. Whitebox Security

4.6.27. ZyLab

5. Application Security

5.1. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

5.1.1. Network Vulnerability Assessment (On Premise)

5.1.1.1. Core Security

5.1.1.2. Digital Defense

5.1.1.3. Fortinet

5.1.1.4. Intel Security

5.1.1.4.1. McAfee Vulnerability Manager (Foundstone)

5.1.1.5. NSAuditor

5.1.1.6. Ncircle

5.1.1.7. Netasq

5.1.1.8. Outpost24

5.1.1.9. Qualys

5.1.1.10. Rapid 7

5.1.1.10.1. Nexspose

5.1.1.11. Trustwave

5.1.2. Managed Penetration Testing Services

5.1.2.1. WhiteHatSecurity

5.1.2.2. Cenzic

5.1.3. Penetration TestingSoftware

5.1.3.1. Core Security

5.1.3.2. Rapid7

5.1.3.2.1. Metasploit Pro

5.1.3.2.2. Metasploit Express

5.1.3.3. Trustwave

5.1.4. Software as a Service

5.1.4.1. Vulnerability Management

5.1.4.1.1. Trustwave

5.1.4.1.2. Qualys

5.1.4.1.3. Outpost24

5.1.4.1.4. Intel Security

5.1.4.1.5. Digital Defense

5.1.4.2. Phish Testing/Management

5.1.4.2.1. Phishme

5.1.5. Vulnerability Reporting/Tracking

5.1.5.1. Risk IO

5.1.6. Vulnerability Research

5.1.6.1. CSC

5.1.6.2. HP

5.1.6.2.1. DV Labs

5.1.6.3. HotWAN

5.1.6.4. Intel Security

5.1.6.5. SecNiche Labs

5.1.6.6. Sourcefire VRT

5.1.6.7. Symantec

5.1.6.8. VRLSec

5.1.6.9. Vupen

5.1.7. Vulnerability Resolution and Prioritization Platforms

5.1.7.1. RiskIO

5.1.7.2. Secure Decisions

5.1.7.3. Synack

5.1.7.4. ThreadFix

5.2. Web Application Firewalls (WAF) & Application Security

5.2.1. Web Application Firewalls

5.2.1.1. Virtualized Appliances

5.2.1.1.1. A10 Networks

5.2.1.1.2. AlertLogic

5.2.1.1.3. Amazon AWS

5.2.1.1.4. Barracuda Networks

5.2.1.1.5. BeeWare

5.2.1.1.6. Ergon Informatik AG

5.2.1.1.7. Forum Systems

5.2.1.1.8. Imperva

5.2.1.1.9. PentaSecurity

5.2.1.2. Physical Appliances

5.2.1.2.1. A10 Networks

5.2.1.2.2. AdNovum

5.2.1.2.3. AlertLogic

5.2.1.2.4. Anchiva

5.2.1.2.5. Barracuda Networks

5.2.1.2.6. BeeWare

5.2.1.2.7. BugSec

5.2.1.2.8. Cisco

5.2.1.2.9. Citrix

5.2.1.2.10. DBAPPSecurity

5.2.1.2.11. DPtech

5.2.1.2.12. Dell Sonicwall

5.2.1.2.13. DenyAll

5.2.1.2.14. Ergon Informatik

5.2.1.2.15. F5

5.2.1.2.16. Fortinet

5.2.1.2.17. Forum Systems

5.2.1.2.18. HP

5.2.1.2.19. Imperva

5.2.1.2.20. NSFocus

5.2.1.2.21. PentaSecurity

5.2.1.2.22. Positive Technologies

5.2.1.2.23. RadWare

5.2.1.2.24. Riverbed

5.2.1.2.25. Trustwave

5.2.1.2.26. WINS TECHNET LTD

5.2.1.3. Software

5.2.1.3.1. AdNovum

5.2.1.3.2. Apache

5.2.1.3.3. DenyAll

5.2.1.3.4. ERGON Informatik AG

5.2.1.3.5. Forum Systems

5.2.1.3.6. Juniper

5.2.1.3.7. Microsoft IIS

5.2.1.3.8. Open Source

5.2.1.3.9. Positive Security

5.2.1.3.10. Riverbed

5.2.1.3.11. Trustifier

5.2.1.3.12. WebScurity

5.2.1.4. Managed Services

5.2.1.4.1. Dell Secureworks

5.2.1.4.2. AT&T

5.2.1.4.3. Verizon Business

5.2.2. Software as a Service

5.2.2.1. Akamai

5.2.2.1.1. Kona

5.2.2.2. AlertLogic

5.2.2.3. ArmorLogic

5.2.2.4. BinarySec

5.2.2.5. CloudFlare

5.2.2.5.1. http://www.cloudflare.com

5.2.2.6. FireBlade

5.2.2.7. Incapsula

5.2.2.7.1. http://www.incapsula.com

5.2.2.8. Qualys

5.2.2.9. Securi

5.2.2.10. Soha

5.2.2.10.1. http://soha.io/

5.2.3. Web Threat Disruption Technology

5.2.3.1. Software

5.2.3.1.1. NuCaptcha

5.2.3.1.2. NuData

5.2.3.2. Appliances

5.2.3.2.1. Juniper

5.2.3.2.2. Shape Security

5.2.3.3. Open Source

5.2.3.3.1. Google Hack Honeypot

5.3. Web Application Security

5.3.1. Code Review Products

5.3.1.1. HP

5.3.1.2. IBM

5.3.2. Scanning Services

5.3.2.1. Cenzic

5.3.2.2. Controlscan

5.3.2.3. High-Tech Bridge

5.3.2.4. McAfee Secure

5.3.2.5. Qualys

5.3.2.6. Trustwave

5.3.2.7. WebSecurify

5.3.2.8. WhiteHat Security

5.3.3. Scanning Software

5.3.3.1. Open Source

5.3.3.1.1. Arachni Scanner

5.3.3.1.2. Subgraph

5.3.3.1.3. W3af

5.3.3.1.4. Wapiti

5.3.3.1.5. Watcher

5.3.3.2. Commercial

5.3.3.2.1. Accunetix

5.3.3.2.2. BeyondTrust

5.3.3.2.3. Cenzic

5.3.3.2.4. HP

5.3.3.2.5. MavitunaSecurity

5.3.3.2.6. NTObjectives

5.3.3.2.7. Nstalker

5.3.3.2.8. Portswigger

5.3.3.2.9. Syhunt

6. Endpoint Security

6.1. Anti-Malware

6.1.1. Eastern Europe

6.1.1.1. Czech Republic

6.1.1.1.1. Avast

6.1.1.1.2. TrustPort

6.1.1.2. Denmark

6.1.1.2.1. BullGuard

6.1.1.3. Netherlands

6.1.1.3.1. AVG

6.1.1.4. Romania

6.1.1.4.1. Bitdefender

6.1.1.5. Slovakia

6.1.1.5.1. ESET

6.1.2. Emerging Asia/Pacific

6.1.2.1. India

6.1.2.1.1. eScan

6.1.2.1.2. K7 Computing

6.1.3. Latin America

6.1.3.1. Spain

6.1.3.1.1. Optenet

6.1.4. Mature Asia/Pacific

6.1.4.1. China

6.1.4.1.1. Qihoo

6.1.4.1.2. Rising International Software

6.1.4.2. South Korean

6.1.4.2.1. AhnLab

6.1.4.2.2. BKAV

6.1.4.2.3. ESTsoft

6.1.5. Middle East and Africa

6.1.5.1. Israel

6.1.5.1.1. Check Point Software

6.1.6. North America

6.1.6.1. Cyren

6.1.6.2. MalwareBytes

6.1.6.3. Intel Security

6.1.6.4. Microsoft

6.1.6.5. PC Pitstop

6.1.6.6. Roboscan

6.1.6.7. Symantec

6.1.6.8. ThreatTrack Security

6.1.6.9. Total Defense

6.1.6.10. Trend Micro

6.1.7. Russia

6.1.7.1. Kaspersky

6.1.8. Western Europe

6.1.8.1. Austria

6.1.8.1.1. Ikarus Security

6.1.8.2. Finland

6.1.8.2.1. F-Secure

6.1.8.3. Germany

6.1.8.3.1. Avira

6.1.8.3.2. G-Data

6.1.8.3.3. Kromtech

6.1.8.4. Norway

6.1.8.4.1. Norman

6.1.8.5. United Kingdom

6.1.8.5.1. Sophos

6.1.8.6. Poland

6.1.8.6.1. Arcabit

6.2. Endopoint Sandboxes and Virtualized Containers

6.2.1. Endpoint Sandboxes

6.2.1.1. Panda

6.2.1.1.1. www.panda.com

6.2.1.2. Sandboxie

6.2.1.2.1. http://www.sandboxie.com/

6.2.1.3. Bitdefender

6.2.1.3.1. www.bitdefender.com

6.2.1.4. Bluecoat

6.2.1.4.1. NormanShark

6.2.2. Type-0 Hypervisors

6.2.2.1. Lynxworks

6.2.2.1.1. http://www.lynuxworks.com/

6.2.2.2. Zirtu

6.2.3. Browser-Isolation (remote dom)

6.2.3.1. Amune

6.2.3.1.1. https://amune.org/security

6.2.3.2. Armor5

6.2.3.3. Menlo Security

6.2.3.4. Spikes Security

6.2.4. Process Isolation/Virtualization

6.2.4.1. Invincea

6.2.4.2. Bromium

6.3. Endpoint Intrusion Prevention

6.3.1. Arkoon

6.3.1.1. StormShield

6.3.2. BeyondTrust

6.3.3. IBM

6.3.4. Landesk

6.3.5. McAfee

6.3.6. Safensoft

6.3.7. Symantec

6.4. Enterprise Mobility Mangement Suites

6.4.1. Absolute Software

6.4.2. AMware

6.4.2.1. Airwatch

6.4.3. Blackberry

6.4.4. Citrix

6.4.5. Globo

6.4.6. Good Technologies

6.4.7. IBM

6.4.8. Landesk

6.4.9. MobileIron

6.4.10. Mojave

6.4.10.1. https://www.mojave.net/

6.4.11. SAP

6.4.12. Sophos

6.4.13. Soti

6.4.14. Symantec

6.4.15. Tangoe

6.5. File Integrity Monitoring

6.5.1. Open Source

6.5.1.1. 1. AIDE

6.5.1.2. 2. Trend Micro

6.5.1.2.1. 1. OSSEC

6.5.1.3. 3. Samhain

6.5.1.4. 4. Osiris

6.5.1.5. 5. Integrit

6.5.1.6. 6. Tripwire

6.5.2. Commercial

6.5.2.1. Imperva

6.5.2.2. Intel Security

6.5.2.3. Tripwire

6.6. Malware Analysis

6.6.1. Botnets

6.6.1.1. spyeyetracker.abuse.ch

6.6.2. Internet Identity

6.6.3. Malware Patrol

6.6.4. SpamHaus

6.6.5. Team Cymru

6.6.6. ThreatGrid

6.6.7. VirusTotal

6.6.8. zeustracker.abuse.ch

6.6.9. JoeSecurity

6.6.10. Shadowserver

6.7. Mobile Device Management

6.7.1. Absolute Software

6.7.2. Beachhead Security

6.7.3. Blackberry

6.7.4. Citrix

6.7.5. Globo

6.7.6. Good Technologies

6.7.7. IBM

6.7.8. Landesk

6.7.9. MobileIron

6.7.10. Mojave

6.7.10.1. https://www.mojave.net/

6.7.11. SAP

6.7.12. Sophos

6.7.13. Soti

6.7.14. Symantec

6.7.15. Tangoe

6.7.16. VMware

6.7.16.1. Airwatch

6.8. Policy Assessment and System Configuration Management

6.8.1. BMC

6.8.1.1. BMC Server Automation

6.8.2. IBM

6.8.2.1. IBM Endpoint Manager

6.8.3. Intel Security

6.8.3.1. Policy Auditor

6.8.4. RedHat

6.8.4.1. OpenSCAP

6.8.5. Saint

6.8.5.1. Saint Security

6.8.6. Tripwire

6.8.6.1. Tripwire Enterprise

6.9. Sandboxing/MicroVM

6.9.1. Norman Sandbox

6.9.2. Bromium

6.9.3. Bufferzone

6.9.4. Invincea

6.9.5. SandBoxie

6.10. Exploit Technique Prevention Software

6.10.1. CyActive

6.10.2. Malwarebytes Anti-Exploit

6.10.3. Microsoft

6.10.3.1. EMET

6.10.4. Palo Alto Networks

6.10.4.1. Endpoint

6.10.5. ViRobot APT Shield

6.10.6. Microsoft EMET - FREE

7. Market Logistics & Supply Chain

7.1. Cloud Service Brokerages

7.1.1. Bitnami

7.1.2. Ensim

7.1.2.1. http://www.ensim.com/

7.1.3. Gravitant

7.1.4. Jamcracker

7.1.4.1. http://www.jamcracker.com/

7.1.5. StandingCloud

7.2. Distribution/Channel

7.2.1. VARs, Resellers

7.2.1.1. China

7.2.1.1.1. Rainbow Tech

7.2.1.1.2. Broad Sky Innovation Technology

7.2.1.1.3. Qast Software Group

7.2.1.1.4. Macrosea

7.2.1.2. Eastern Europe

7.2.1.2.1. CZECH Republic

7.2.1.2.2. Poland

7.2.1.3. Emerging Asia Pacific

7.2.1.3.1. India

7.2.1.3.2. Indonesia

7.2.1.3.3. Malasia

7.2.1.3.4. Thailand

7.2.1.3.5. Philippines

7.2.1.4. Eurasia

7.2.1.4.1. Russian Federation

7.2.1.4.2. Kazakhstan

7.2.1.4.3. Ukraine

7.2.1.5. Latin America

7.2.1.5.1. Brazil

7.2.1.5.2. Chile

7.2.1.5.3. Columbia

7.2.1.5.4. Costa Rica

7.2.1.5.5. Ecuador

7.2.1.5.6. Bolivia

7.2.1.5.7. Venezuela

7.2.1.5.8. Cuba

7.2.1.5.9. Argentina

7.2.1.5.10. Buenos Aires

7.2.1.5.11. Mexico

7.2.1.5.12. Peru

7.2.1.6. Mature Asia Pacific

7.2.1.6.1. Australia

7.2.1.6.2. Japan

7.2.1.6.3. Singapore

7.2.1.7. Middle East and North Africa

7.2.1.7.1. Turkey

7.2.1.7.2. Israel

7.2.1.7.3. Saudi Arabia

7.2.1.7.4. South Africa

7.2.1.7.5. India

7.2.1.7.6. United Arab Emirates

7.2.1.8. North America

7.2.1.8.1. United States

7.2.1.8.2. Canada

7.2.1.9. Sub-Sahara Africa

7.2.1.9.1. South Africa

7.2.1.10. Western Europe

7.2.1.10.1. France

7.2.1.10.2. Germany

7.2.1.10.3. Italy

7.2.1.10.4. Netherlands

7.2.1.10.5. Spain

7.2.1.10.6. United Kingdom

7.2.1.11. WorldWide

7.2.1.11.1. AT&T

7.2.1.11.2. Verizon Business

7.2.2. Distributors

7.2.2.1. China

7.2.2.1.1. AVNet

7.2.2.1.2. B & Data Technology Co. Ltd.

7.2.2.1.3. Beijing Advazone Electronic Limited Comp

7.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.

7.2.2.1.5. Digital China Technology LTD.

7.2.2.1.6. Ecs China

7.2.2.1.7. Edvance Technology (China) Limited

7.2.2.1.8. Huagai

7.2.2.1.9. M.Tech (Shanghai) Co., Ltd.

7.2.2.1.10. Shanghai S-I Information Tech. Ltd

7.2.2.1.11. Sinogrid Information Technology Ltd.

7.2.2.1.12. Sky Faith International Enterprise

7.2.2.2. Emerging Asia Pacific

7.2.2.2.1. India

7.2.2.2.2. Indonesia

7.2.2.2.3. Thailand

7.2.2.3. Eurasia

7.2.2.3.1. Russian Federation

7.2.2.3.2. Kazakhstan

7.2.2.4. Mature Asia Pacific

7.2.2.4.1. Singapore

7.2.2.4.2. Japan

7.2.2.4.3. South Korea

7.2.2.4.4. Australia

7.2.2.5. Middle East and South Africa

7.2.2.5.1. United Arab Emirates

7.2.2.5.2. South Africa

7.2.2.6. North America

7.2.2.6.1. Canada

7.2.2.6.2. United States

7.2.2.7. Sub-Sahara Africa

7.2.2.7.1. South Africa

7.2.2.8. Western Europe

7.2.2.8.1. United Kingdom

7.2.2.8.2. Germany

7.2.2.9. Worldwide

7.2.2.9.1. AVNet

7.2.2.9.2. Ingram Micro

7.2.2.9.3. Tech Data

7.2.2.9.4. Westcon

7.2.2.10. Latin America

7.2.2.10.1. Mexico

7.2.2.10.2. Brazil

7.2.3. Reseller Programs

7.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm

7.2.4. Logistics/Deal Registration

7.2.4.1. Connectwise

7.3. Government Cyberwarrior (Personnel Estimates)

7.3.1. United States

7.3.1.1. NSA

7.3.1.1.1. Cyberwarrior Stats

7.3.1.2. Department of Defense

7.3.1.2.1. US Airforce

7.3.1.2.2. US Navy

7.3.1.2.3. DISA

7.3.2. Iran

7.3.2.1. 4500

7.3.3. Israel

7.3.3.1. Unit 8200

7.3.3.1.1. 5000

7.3.4. North Korea

7.3.4.1. 1000

7.4. Hardware and Chip Security

7.4.1. AMD

7.4.1.1. TPM

7.4.2. Cavium

7.4.2.1. Multi-Core Processors

7.4.3. Flow Processors

7.4.3.1. Netronome

7.4.4. Intel

7.4.4.1. TPM

7.4.4.2. Data Execution Protection

7.5. Investment

7.5.1. ETFs

7.5.1.1. PureFunds

7.5.1.1.1. SYM:HACK

7.5.2. Venture Capitalists

7.5.2.1. Trident Capital

7.5.2.2. Andreesen Horowitz

7.6. Managed Service Enablement

7.6.1. Chartec

7.6.2. Jamcracker

7.7. Marketing/PR/AR

7.7.1. Marketing/Branding Agencies

7.7.1.1. Hill and Knowlton

7.7.1.1.1. http://www.hkstrategies.com/

7.7.1.2. MetaDesign

7.7.1.2.1. http://www.metadesign.com/san-francisco

7.7.1.3. Ogilvy & Mather

7.7.1.4. Tailfin Marketing Communications

7.7.1.5. Toolbox Studios

7.7.2. Market Destinations (Sites)

7.7.2.1. CRN

7.7.2.2. Hak5

7.7.2.3. MSPMentor

7.7.2.4. Madison Logic

7.7.2.5. SCmagazine

7.7.2.6. TheVarGuy

7.7.3. Web Site Design

7.7.3.1. Baytech Web Design

7.7.3.1.1. http://www.baytechwebdesign.com/

7.7.3.2. EU Design Studios

7.7.3.2.1. http://eudesignstudio.com/

7.7.4. Creative Services

7.7.4.1. Gig Productions

7.7.4.1.1. http://www.gigpros.com/index.php

7.7.4.2. Duarte

7.7.4.2.1. http://www.duarte.com/

7.7.4.3. Text 100

7.7.4.3.1. http://www.text100.com/

7.7.4.4. Initiate Marketing

7.7.4.4.1. http://www.getinitiated.ca/

7.7.5. Campaign/Engagement

7.7.5.1. WCG World

7.7.5.1.1. http://wcgworld.com/

7.7.6. Analyst & Public Relations

7.7.6.1. KTCpr

7.7.6.1.1. http://www.kahn-travel.com/

7.7.6.2. Madison Alexander PR

7.7.6.2.1. http://www.madisonalexanderpr.com/

7.7.6.3. Marc Gendron PR

7.7.6.3.1. http://www.mgpr.info/

7.7.6.4. Schwartz Communications

7.7.6.4.1. http://www.schwartzmsl.com/

7.7.6.5. Spalding Communications

7.7.6.6. Text 100

7.7.6.6.1. http://www.text100.com/

7.7.7. Marketing Videos

7.7.7.1. Epipheo

7.7.7.1.1. http://www.epipheo.com/

7.8. OEMs & System Integrators

7.8.1. Appliance Integrators

7.8.1.1. Accton

7.8.1.1.1. http://www.accton.com/

7.8.1.2. Advantech

7.8.1.2.1. http://www.advantech.com/

7.8.1.3. Celestica

7.8.1.3.1. http://www.celestica.com/

7.8.1.4. Dan-el Technologies Ltd.

7.8.1.4.1. http://www.danel.co.il/

7.8.1.5. Flextronics

7.8.1.5.1. http://www.flextronics.com/

7.8.1.6. Plexus

7.8.1.6.1. http://www.plexus.com/

7.8.2. Base Appliances

7.8.2.1. Advantech

7.8.2.2. Amax

7.8.2.3. Cas Well

7.8.2.4. Iron Systems

7.8.2.5. Lanner

7.8.2.6. Portwell

7.8.2.7. Tilera

7.8.3. Cards

7.8.3.1. Netronome

7.8.3.2. Tilera

7.8.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection

7.8.4. Encryption Acceleration

7.8.4.1. Intel

7.8.4.1.1. VPRO

7.8.4.2. Safenet

7.8.4.2.1. Luna PCI

7.8.5. MSSP Appliances

7.8.5.1. 443 Networks

7.8.6. Threat Intelligence

7.8.6.1. IP Reputation

7.8.6.1.1. Norse Corp

7.8.6.1.2. Cyren

7.8.6.1.3. WebRoot Brightcloud

7.8.6.2. IP Block Lists

7.8.6.2.1. WebRoot Brightcloud

7.8.6.2.2. Norse Corp

7.8.6.2.3. Cyren

7.8.6.3. Fraud

7.8.6.3.1. Internet Fraud Alert

7.8.6.3.2. National Cyber-Forensics and Training Alliance

7.8.6.4. File Reputation

7.8.6.4.1. Findthatfile

7.8.6.5. Anti-Phishing

7.8.6.5.1. Cyren

7.8.6.6. Malicious URL

7.8.6.6.1. Cyren

7.8.6.6.2. Findthatfile

7.8.6.7. Indicators of Compromise

7.8.6.7.1. FireEye

7.8.6.7.2. Proofpoint

7.8.6.7.3. Wapack labs

7.8.6.8. Vulnerability Research

7.8.6.8.1. Telus Security Labs

7.8.6.8.2. Vupen

7.8.6.9. DNS DGA Feeds

7.8.6.9.1. Farsight Security

7.8.7. Security Related Chips & CPUs

7.8.7.1. Broadcom

7.8.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection

7.8.7.2. Cavium

7.8.7.2.1. http://www.cavium.com

7.8.7.3. Lionic

7.8.7.3.1. http://www.lionic.com/

7.8.7.4. Netronome

7.8.7.4.1. http://www.netronome.com

7.8.7.5. Tilera

7.8.7.5.1. http://www.tilera.com/products/processors

7.8.7.6. Intel

7.8.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH

7.8.8. Software

7.8.8.1. Social Network Content Control

7.8.8.1.1. NetboxBlue

7.8.8.2. URL Categorization

7.8.8.2.1. Cyren

7.8.8.2.2. Ikarus

7.8.8.2.3. Malware

7.8.8.2.4. Webroot Brightcloud

7.8.8.2.5. Zvelo

7.8.8.3. Advanced Threat Protection - Virtual Execution Engines

7.8.8.3.1. ContentKeeper

7.8.8.3.2. Threat Track Security

7.8.8.4. Image Recognition

7.8.8.4.1. Image Analyzer

7.8.8.5. AntiMalware

7.8.8.5.1. Antiy

7.8.8.5.2. Avira

7.8.8.5.3. Bitdefender

7.8.8.5.4. Commtouch

7.8.8.5.5. Cyren

7.8.8.5.6. ESet

7.8.8.5.7. Fortinet

7.8.8.5.8. GFI

7.8.8.5.9. Ikarus

7.8.8.5.10. Kaspersky

7.8.8.5.11. Intel Security

7.8.8.5.12. Norman

7.8.8.5.13. OPSWAT

7.8.8.5.14. QuickHeal

7.8.8.5.15. Zillya

7.8.8.5.16. ZonerAntiVirus

7.8.8.6. Encryption

7.8.8.6.1. Transport

7.8.8.7. Optical Character Recognition

7.8.8.7.1. Abbyy

7.8.8.8. File Content Decoding/Analysis/Fingerprinting

7.8.8.8.1. HP Autonomy

7.8.8.8.2. Attivio

7.8.8.8.3. GTB Technologies

7.8.8.9. Voice Recognition

7.8.8.9.1. STC

7.8.8.9.2. Nuance

7.8.8.10. Network Stack

7.8.8.10.1. IPV4/6

7.8.8.10.2. Deep Packet Inspection

7.8.8.10.3. SDN

7.8.8.11. Anti-Spam/Phishing

7.8.8.11.1. APWG

7.8.8.11.2. BrandProtect

7.8.8.11.3. Cyren

7.8.8.11.4. Ikarus

7.8.8.11.5. Internet Fraud Alert

7.8.8.11.6. ReturnPath

7.8.8.11.7. WebRoot Brightcloud

7.8.8.12. Intrusion Detection/Prevention Signatures

7.8.8.12.1. Proofpoint

7.8.8.13. Content Extraction & Search

7.8.8.13.1. Oracle

7.8.8.14. Endpoint Security and Management

7.8.8.14.1. OPSWAT

7.8.8.15. Advanced Content Disarming and Reconstruction

7.8.8.15.1. OPSWAT

7.8.8.16. IT Service Management

7.8.8.16.1. ITRP

7.9. Product Certification/Assurance

7.9.1. ICSA Labs

7.9.2. Common Criteria for Information Technology Security Evaluation (CCITSE)

7.9.2.1. EAL1 through EAL7

7.9.2.1.1. Booz Allen Hamilton

7.9.2.1.2. COACT

7.9.2.1.3. CSC

7.9.2.1.4. CygnaCom Solutions

7.9.2.1.5. Infogard Laboratories

7.9.2.1.6. SAIC

7.9.2.1.7. atsec information security

7.10. Product Testing

7.10.1. Anti-Malware Testing

7.10.1.1. AV-Test

7.10.1.2. Av-Comparatives

7.10.1.3. VirusBTN

7.10.2. Cryptographic Testing

7.10.2.1. NIST

7.10.2.1.1. FIPS 140-2

7.10.3. Generic Product Testing, Certification and Accreditation

7.10.3.1. Certifications

7.10.3.1.1. North America

7.10.3.1.2. European Union

7.10.3.2. Testing

7.10.3.2.1. United Kingdom

7.10.3.2.2. North America

7.10.4. Sponsored Product Review/Testing

7.10.4.1. Delta Testing LTD

7.10.4.2. Dennis Labs

7.10.4.3. Miercom

7.10.4.4. NSS Labs

7.10.4.5. Network Testing Labs

7.10.4.6. Tolly Group

7.10.4.7. West Coast Labs

7.10.5. Singapore

7.10.5.1. iDA

7.10.5.1.1. http://www.ida.gov.sg/Policies-and-Regulations/Industry-and-Licensees/Standards-and-Quality-of-Service/Singapore-Common-Criteria-evaluation-and-certification-Scheme

7.11. Cloud Service Brokerages

7.12. Security Conferences

7.12.1. North America

7.12.1.1. United States

7.12.1.1.1. RSA

7.12.1.1.2. Gartner

7.12.1.1.3. Cornerstones of Trust

7.12.1.1.4. Annual Security Conference

7.12.1.1.5. SecurityBsides

7.12.1.1.6. ShmooCon

7.12.2. Europe

7.12.2.1. United Kingdom

7.12.2.1.1. RSA Conference

7.12.2.1.2. Gartner

7.12.2.2. Russia

7.12.2.2.1. Infosecurity Russia

7.12.3. Emerging Asia Pacific

7.12.4. Mature Asia Pacific

7.12.4.1. Australia

7.12.4.1.1. Gartner

7.12.4.2. Singapore

7.12.4.2.1. RSA

7.13. Staffing/Recruiting/Executive Search

7.13.1. Millard Group

7.13.2. Lynch Bowie Group

7.13.3. Robert Half

7.14. User Interface

7.14.1. Consulting

7.14.1.1. User Interface

7.14.1.1.1. BlinkUX

7.14.1.1.2. Sasa Technologies

7.14.1.1.3. Dabapps

7.14.1.2. Customer Survey

7.14.1.2.1. Techvalidate

7.14.2. HTML5 Visualization Libraries

7.14.2.1. Data-Driven Documents

7.14.2.1.1. http://d3js.org/

7.14.2.2. AngularJS

7.14.2.2.1. https://angularjs.org/

8. Security Operations & Incident Response

8.1. Forensics/eDiscovery

8.1.1. Forensic Products

8.1.1.1. eDiscovery

8.1.1.1.1. Clearwell

8.1.1.1.2. Kazeon

8.1.1.1.3. Guidance Software

8.1.1.1.4. Access Data

8.1.1.1.5. Autonomy

8.1.1.1.6. kCura

8.1.1.1.7. FTI Technology

8.1.1.1.8. Barracuda Networks

8.1.1.2. Mobile Devices

8.1.1.2.1. Cellebrite

8.1.1.2.2. Paraben

8.1.1.2.3. Oxygen

8.1.1.2.4. ViaForensics

8.1.1.3. Endpoint Computing Systems

8.1.1.3.1. Access Data

8.1.1.3.2. BlackBag

8.1.1.3.3. Cyfir

8.1.1.3.4. Guidance Software

8.1.1.3.5. Magnet Forensics

8.1.1.3.6. Nuix

8.1.1.3.7. OSForensics

8.1.1.3.8. Paraben

8.1.1.3.9. Xways Forensics

8.1.1.4. Forensics as a Service (FaaS)

8.1.1.4.1. CloudShark

8.1.1.5. Email Examination

8.1.1.5.1. Systools Software

8.1.1.5.2. Nuix

8.1.1.6. Forensic File & Data Analysis Tools

8.1.1.6.1. Cyfir

8.1.1.6.2. Intella

8.1.1.6.3. Magnet Forensics

8.1.1.6.4. Nuix

8.1.1.6.5. Systools Software

8.1.2. Network Forensics Tools (NFT)

8.1.2.1. Flow Analysis/Metadata Extraction

8.1.2.1.1. Arbor Networks

8.1.2.1.2. IBM

8.1.2.1.3. Lancope

8.1.2.1.4. LogRythm

8.1.2.1.5. Intel Security NBA

8.1.2.2. Forensic Capture with User Surveillance & Security Threat Analytics

8.1.2.2.1. Access Data

8.1.2.2.2. BlueCoat

8.1.2.2.3. EMC

8.1.2.2.4. FireEye

8.1.2.2.5. Fluke Networks

8.1.2.2.6. IBM

8.1.2.2.7. IP Fabrics

8.1.2.2.8. JDSU (Network Instruments)

8.1.2.2.9. LightCyber

8.1.2.2.10. NetAgent

8.1.2.2.11. NetResec

8.1.2.2.12. NetScout

8.1.2.2.13. Niksun

8.1.2.2.14. Novetta Solutions

8.1.2.2.15. Nuix

8.1.2.2.16. Packetsled

8.1.2.2.17. Riverbed

8.1.2.2.18. SS8

8.1.2.2.19. nPulse Technologies

8.1.2.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring

8.1.2.3.1. Emulex

8.1.2.3.2. Packetsled

8.1.2.3.3. WildPackets

8.1.2.4. Network Packet Brokers

8.1.2.4.1. Adara

8.1.2.4.2. Apcon

8.1.2.4.3. Arista Networks

8.1.2.4.4. Cubro

8.1.2.4.5. Gigamon

8.1.2.4.6. IXIA

8.1.2.4.7. Interface Masters Technologies

8.1.2.4.8. JDSU

8.1.2.4.9. NetOptics

8.1.2.4.10. NetScout

8.1.2.4.11. VSS Monitoring

8.1.2.5. Network Taps

8.1.2.5.1. Optical

8.1.2.6. Raw Network Packet Capture

8.1.2.6.1. Apcon

8.1.2.6.2. Arbor Networks

8.1.2.6.3. Comworth

8.1.2.6.4. WireShark

8.1.2.6.5. NTOP.org

8.1.3. Incident Response Management Software

8.1.3.1. SaaS

8.1.3.1.1. Co3 Systems

8.1.3.2. Software

8.1.3.2.1. DF Labs

8.1.4. eDiscovery Services

8.1.4.1. Robert Half

8.1.4.2. Advanced Discovery

8.1.5. eDiscovery Software

8.1.5.1. AccessData

8.1.5.2. Guidance Software

8.1.5.3. Nuix

8.1.5.4. Symantec

8.2. Security Incident Response Platforms (SIRP)

8.2.1. CSG Invotas

8.2.2. Cybersponse

8.2.3. DFLabs

8.2.4. Fido

8.2.5. Hexadite

8.2.6. Phantom Cyber

8.2.7. Proofpoint

8.2.8. Resilient Systems

8.2.9. ID Experts

8.3. Incident Response Collaboration Software

8.3.1. Resilient Systems

8.4. Incident Response Legal Services

8.4.1. Information Law Group

8.5. Security Information and Event Management (SIEM), Log Management & Analytics

8.5.1. Application Security Intelligence Engine

8.5.1.1. SAP

8.5.1.1.1. iT-Cube Systems

8.5.2. Log Management

8.5.2.1. EventTracker

8.5.2.2. IGLOO Security

8.5.2.3. Intel Security

8.5.2.3.1. McAfee Enterprise Log Manager

8.5.2.4. Kiwi Syslog Server

8.5.2.5. LogEntries

8.5.2.6. LogRythm

8.5.2.7. Logscape

8.5.2.8. Open Source

8.5.2.8.1. Elasticsearch (ELK Stack)

8.5.2.8.2. SEC (Simple Event Correlator)

8.5.2.8.3. OSSIM

8.5.2.8.4. Syslog-NG

8.5.2.8.5. Octopussy

8.5.2.9. Sawmill

8.5.2.10. Splunk

8.5.2.11. Sumo Logic

8.5.2.12. Tripwire

8.5.2.13. XpoLog

8.5.3. SIEM

8.5.3.1. AlienVault

8.5.3.1.1. OSSIM

8.5.3.2. CorreLog

8.5.3.3. EventTracker

8.5.3.4. HP

8.5.3.4.1. Arcsight

8.5.3.5. Hexis Cyber Solutions

8.5.3.5.1. Hawkeye AP

8.5.3.6. IBM

8.5.3.6.1. Q1Radar

8.5.3.7. IGLOO Security

8.5.3.8. LogPoint

8.5.3.8.1. http://www.logpoint.com/en/

8.5.3.9. LogRythm

8.5.3.10. Intel Security

8.5.3.10.1. NitroSecurity

8.5.3.11. Novell

8.5.3.11.1. Sentinel

8.5.3.12. RSA

8.5.3.12.1. Envision

8.5.3.13. Sensage

8.5.3.14. Solarwinds

8.5.3.15. Splunk

8.5.3.16. Sqrrl

8.5.3.17. Tibco

8.5.3.17.1. Loglogic

8.5.3.18. eIQnetworks

8.5.4. Security Analytics

8.5.4.1. Anomaly Analytics

8.5.4.1.1. Intel

8.5.4.1.2. Theta Ray

8.5.4.1.3. Prelert

8.5.4.2. User and Entity Behavior Analytics (UEBA)

8.5.4.2.1. Bay Dynamics

8.5.4.2.2. Darktrace

8.5.4.2.3. Exabeam

8.5.4.2.4. Fortscale

8.5.4.2.5. Gurcul

8.5.4.2.6. HP

8.5.4.2.7. IBM

8.5.4.2.8. Interset

8.5.4.2.9. Microsoft

8.5.4.2.10. Niara

8.5.4.2.11. Platfora

8.5.4.2.12. Secureonix

8.5.5. Threat Investigation and Analysis Platforms

8.5.5.1. BAE System Detica

8.5.5.1.1. Cybereveal

8.5.5.2. IKANow

8.5.5.3. Maltego

8.5.5.4. Palentir

8.5.5.4.1. Cyber

8.5.6. User and Entity Behavior Analytics (UEBA)

8.5.6.1. Bae Systems Applied Intelligence

8.5.6.2. Bay Dynamics

8.5.6.3. Caspida

8.5.6.4. Click Security

8.5.6.5. Exabeam

8.5.6.6. FICO

8.5.6.7. Fortscale

8.5.6.8. GuruCul

8.5.6.9. IBM

8.5.6.10. Intellinx

8.5.6.11. Lockheed Martin

8.5.6.12. Logtrust

8.5.6.13. Mobile System 7

8.5.6.14. Novetta Solutions

8.5.6.15. Oracle

8.5.6.16. Raytheon

8.5.6.17. SAS Institute

8.5.6.18. Secureonix

8.5.6.19. Splunk

9. Managed Security Services

9.1. Indirect Providers

9.1.1. Emerging Asia Pacific

9.1.1.1. India

9.1.1.1.1. CSS Corp PVT

9.1.1.1.2. Happiest Minds

9.1.1.1.3. SunGard Availability Services

9.1.1.1.4. Ecomnets India PVT. LTD

9.1.2. Europe

9.1.2.1. BT Global Services

9.1.2.2. Dell SecureWorks

9.1.2.3. Germany

9.1.2.3.1. Link11 GMBH

9.1.2.3.2. IPsoft

9.1.2.4. HP

9.1.2.5. Happiest Minds

9.1.2.5.1. Advanced Malware Protection

9.1.2.5.2. Application Activity Monitoring

9.1.2.5.3. Compliance Reporting

9.1.2.5.4. Database Activity Monitoring

9.1.2.5.5. File Integrity Monitoring

9.1.2.5.6. Log Management

9.1.2.5.7. Managed DLP

9.1.2.5.8. Network Forensics

9.1.2.5.9. SIEM

9.1.2.5.10. Unified Threat Management

9.1.2.5.11. Vulnerability Assessment

9.1.2.6. Integralis

9.1.2.7. Navisite

9.1.2.7.1. Mobile Device Management

9.1.2.8. Open Systems

9.1.2.9. Open Systems

9.1.2.10. Orange Business Services

9.1.2.11. SecureData

9.1.2.11.1. Firewall

9.1.2.11.2. IDS/IPS

9.1.2.11.3. SIEM

9.1.2.11.4. Data Loss Prevention

9.1.2.11.5. Secure Web Gateway

9.1.2.11.6. Secure Email Gateway

9.1.2.11.7. VPN/Remote Access

9.1.2.12. SunGard Availability Services

9.1.2.12.1. Firewalls

9.1.2.12.2. IAM

9.1.2.12.3. Intrusion Prevention

9.1.2.12.4. SIEM

9.1.2.12.5. Unified Threat Management

9.1.2.12.6. VPN

9.1.2.12.7. Web Application Firewall

9.1.2.13. Symantec

9.1.2.14. T-Systems

9.1.2.15. Tata Communications

9.1.2.16. Telefonica

9.1.2.16.1. DDoS Protection Service

9.1.2.16.2. Email Encryption

9.1.2.16.3. Email Security Gateway

9.1.2.16.4. Firewall Management

9.1.2.16.5. IAM

9.1.2.16.6. Intrusion Detection

9.1.2.16.7. Intrusion Prevention

9.1.2.16.8. Log Management

9.1.2.16.9. SIEM

9.1.2.16.10. Vulnerability Assessment

9.1.2.16.11. Web Security Gateway

9.1.2.16.12. Anti-Fraud

9.1.2.17. Verizon Business

9.1.2.17.1. Anti-DDoS

9.1.2.17.2. Email Security

9.1.2.17.3. Endpoint Protection

9.1.2.17.4. Firewall Management

9.1.2.17.5. Intrusion Detection

9.1.2.17.6. Intrusion Prevention

9.1.2.17.7. SIEM

9.1.2.17.8. Vulnerability Assessment

9.1.2.17.9. Web Security

9.1.2.18. Wipro

9.1.2.18.1. Email Security Gateway

9.1.2.18.2. Endpoint Security

9.1.2.18.3. Firewall Management

9.1.2.18.4. Fraud Management/Anti-Money Laundering

9.1.2.18.5. GRC

9.1.2.18.6. IAM

9.1.2.18.7. Intrusion Detection

9.1.2.18.8. Intrusion Prevention

9.1.2.18.9. SIEM

9.1.2.18.10. User Access Management

9.1.2.18.11. Web Security Gateway

9.1.3. Global Providers

9.1.3.1. AT&T

9.1.3.1.1. DDos Protection

9.1.3.1.2. Email/Data Encryption Services

9.1.3.1.3. Endpoint Anti-Virus

9.1.3.1.4. Endpoint Patch Management

9.1.3.1.5. Endpoint Policy Compliance

9.1.3.1.6. Mobile Device Security

9.1.3.1.7. Secure Email Gateway

9.1.3.1.8. Security Device Management

9.1.3.1.9. Web Application Firewall

9.1.3.1.10. Web Gateway (URL & Malware Filtering)

9.1.3.2. BEW Global

9.1.3.2.1. Data Loss Prevention

9.1.3.2.2. Web Security Gateway

9.1.3.2.3. Email Security Gateway

9.1.3.2.4. SIEM

9.1.3.2.5. Vulnerability Assessment

9.1.3.3. BT

9.1.3.4. Dell Secureworks

9.1.3.4.1. Advanced Malware Protection

9.1.3.4.2. Email Security Gateway

9.1.3.4.3. Firewall Management

9.1.3.4.4. Host IPS

9.1.3.4.5. IDS/IPS

9.1.3.4.6. Log Management

9.1.3.4.7. Log Retention

9.1.3.4.8. SIEM

9.1.3.4.9. Threat Intelligence

9.1.3.4.10. Unified Threat Management

9.1.3.4.11. Vulnerability Assessment

9.1.3.4.12. Web Application Firewall

9.1.3.4.13. Web Application Vulnerability Assessment

9.1.3.5. Dimension Data

9.1.3.6. HP

9.1.3.6.1. Access Managment

9.1.3.6.2. Data Loss Prevention

9.1.3.6.3. Email Security Gateway

9.1.3.6.4. Endpoint Encryption

9.1.3.6.5. Endpoint Protection

9.1.3.6.6. Intrusion Detection

9.1.3.6.7. Intrusion Prevention

9.1.3.6.8. Managed Incident Response

9.1.3.6.9. Remote Access Management

9.1.3.6.10. SIEM

9.1.3.6.11. Vulnerability Assessment

9.1.3.6.12. Web Application Vulnerability Assessment

9.1.3.6.13. Web Security Gateway

9.1.3.7. IBM

9.1.3.7.1. Email Security Gateway

9.1.3.7.2. Endpoint Patch Management

9.1.3.7.3. Endpoint Policy Management

9.1.3.7.4. Endpoint Protection

9.1.3.7.5. Firewall Management

9.1.3.7.6. IAM

9.1.3.7.7. Intrusion Detection

9.1.3.7.8. Intrusion Prevention

9.1.3.7.9. Log Management

9.1.3.7.10. Mobile Device Security

9.1.3.7.11. SIEM

9.1.3.7.12. Unified Threat Management

9.1.3.7.13. Vulnerability Assessment

9.1.3.7.14. Web Security Gateway

9.1.3.7.15. Web Vulnerability Assessment

9.1.3.8. Telstra

9.1.3.9. Verizon Business

9.1.3.9.1. Anti-DDoS

9.1.3.9.2. Email Security

9.1.3.9.3. Endpoint Protection

9.1.3.9.4. Firewall Management

9.1.3.9.5. Intrusion Detection

9.1.3.9.6. Intrusion Prevention

9.1.3.9.7. SIEM

9.1.3.9.8. Vulnerability Assessment

9.1.3.9.9. Web Security

9.1.4. Greater China

9.1.4.1. Hong Kong

9.1.4.1.1. Network Box

9.1.4.1.2. Netswitch

9.1.4.2. BEW Global

9.1.4.2.1. Data Loss Prevention

9.1.4.2.2. Web Security Gateway

9.1.4.2.3. Email Security Gateway

9.1.4.2.4. SIEM

9.1.4.2.5. Vulnerability Assessment

9.1.4.3. Beijing

9.1.4.3.1. Netswitch

9.1.5. Latin America

9.1.5.1. Brazil

9.1.5.1.1. Arcon

9.1.5.1.2. Netcentrics

9.1.5.1.3. RealProtect

9.1.5.1.4. UOL Diveo

9.1.6. Mature Asia Pacific

9.1.6.1. Australia

9.1.6.1.1. Tesserent

9.1.6.1.2. Verizon

9.1.6.2. Singapore

9.1.6.2.1. e-Cop

9.1.6.2.2. NTT Singapore

9.1.6.2.3. Happiest Minds

9.1.6.2.4. Singtel

9.1.6.2.5. NCS Group

9.1.7. Middle East and North Africa

9.1.7.1. Saudi Arabia

9.1.7.2. United Arab Emirates

9.1.7.2.1. Du Telecom

9.1.7.2.2. Tata Communications

9.1.7.2.3. Dell Secureworks

9.1.7.2.4. Dimension Data

9.1.8. North America

9.1.8.1. Canada

9.1.8.1.1. Above Security

9.1.8.1.2. Bell Canada

9.1.8.1.3. EWA

9.1.8.1.4. Happiest Minds

9.1.8.1.5. Netpulse

9.1.8.1.6. OneStone (Formerly Seccuris)

9.1.8.1.7. SecureData

9.1.8.1.8. SentryMetrics

9.1.8.1.9. SunGard Availability Services

9.1.8.1.10. Virtual Guardian

9.1.8.2. United States

9.1.8.2.1. AT&T

9.1.8.2.2. Above Security

9.1.8.2.3. Alert Logic

9.1.8.2.4. Allstream

9.1.8.2.5. CGI

9.1.8.2.6. CSC

9.1.8.2.7. CSS Corp

9.1.8.2.8. CentraComm

9.1.8.2.9. CenturyLink- Savvis

9.1.8.2.10. Clone Systems

9.1.8.2.11. Compucom Systems

9.1.8.2.12. Cosentry

9.1.8.2.13. Dell Secureworks

9.1.8.2.14. Earthlink

9.1.8.2.15. Esentire

9.1.8.2.16. HCL Technologies

9.1.8.2.17. HP

9.1.8.2.18. Happiest Minds

9.1.8.2.19. IBM

9.1.8.2.20. Leidos

9.1.8.2.21. LunarLine

9.1.8.2.22. Masergy Communications

9.1.8.2.23. Megapath

9.1.8.2.24. NCA - Network Computing Architects

9.1.8.2.25. Navisite

9.1.8.2.26. Netfortris

9.1.8.2.27. Nuspire Networks

9.1.8.2.28. Secure Designs

9.1.8.2.29. SilverSky (Formerly Stillsecure/Perimeter esecurity)

9.1.8.2.30. Solutionary

9.1.8.2.31. SunGard Availability Services

9.1.8.2.32. Sword and Shield

9.1.8.2.33. Symantec

9.1.8.2.34. Symantec

9.1.8.2.35. Tesserent

9.1.8.2.36. Trustwave

9.1.8.2.37. Verizon Business

9.1.8.2.38. Wipro

9.1.8.2.39. Rook Security

9.1.8.2.40. Netswitch

9.1.9. Sub-Sahara Africa

9.1.9.1. AccessKenya

9.1.9.1.1. Firewall

9.1.9.1.2. Endpoint Protection

9.1.9.1.3. Secure Web Gateway

9.2. Direct Tech Providers Managed Security

9.2.1. Asia Pacific

9.2.1.1. Australia

9.2.1.2. China

9.2.1.2.1. NSFOCUS

9.2.1.3. Singapore

9.2.2. Europe

9.2.2.1. GoGrid

9.2.2.1.1. Compliance Reporting (PCI, HIPAA)

9.2.2.1.2. Host IDS

9.2.2.1.3. Log Management

9.2.2.1.4. SIEM

9.2.2.1.5. Vulnerability Assessment

9.2.3. Global Providers

9.2.4. Middle East and North Africa

9.2.4.1. Saudi Arabia

9.2.4.2. United Arab Emirates

9.2.5. North America

9.2.5.1. United States

9.2.5.1.1. NSFOCUS

9.2.5.1.2. Check Point Software

9.2.5.1.3. Network Box

9.2.5.1.4. GoGrid

10. Security Consulting & Implementation

10.1. Providers by Region

10.1.1. Latin America

10.1.2. Mature Asia/Pacific

10.1.3. Middle East and North Africa

10.1.3.1. Saudi Arabia

10.1.3.1.1. GBM

10.1.3.1.2. PGI

10.1.4. North America

10.1.4.1. Accuvant

10.1.4.2. AppsecConsulting

10.1.4.3. CSC

10.1.4.4. Control Case

10.1.4.5. CrowdStrike

10.1.4.6. Dell Secureworks

10.1.4.7. Deloitte

10.1.4.8. Denim Group

10.1.4.9. Ernst & Young

10.1.4.10. FireEye

10.1.4.11. Fishnet

10.1.4.12. ForSythe Solutions

10.1.4.13. Grant Thornton

10.1.4.14. HP

10.1.4.15. IBM

10.1.4.16. IOActive

10.1.4.17. Leidos

10.1.4.18. Intel Security (Foundstone)

10.1.4.19. NTT Com Security

10.1.4.20. Neohapsis

10.1.4.21. PWC

10.1.4.22. Paladion Networks

10.1.4.23. Perimeter eSecurity

10.1.4.24. Protivity

10.1.4.25. SISA

10.1.4.26. Solutionary

10.1.4.27. Stroz Friedberg

10.1.4.28. Sungard

10.1.4.29. Sword and Shield

10.1.4.30. Symantec

10.1.4.31. Sysnet Global Solutions

10.1.4.32. Tevora Business Solutions

10.1.4.33. Trustwave

10.1.4.34. Verizon

10.1.4.35. WhiteHat Security

10.1.4.36. Zensar Technologies

10.1.5. Western Europe

10.1.5.1. Italy

10.1.5.1.1. KBE.it

10.1.5.1.2. Consulthink SPA

10.1.5.2. United Kingdom

10.1.5.2.1. FOX-IT

10.1.6. Greater China

10.1.7. South Africa

10.1.7.1. Cyanre

10.1.7.1.1. http://www.cyanre.co.za/

10.1.8. Governance

10.1.8.1. Accuvant

10.1.8.2. Fishnet Security

10.1.8.3. FOX-IT

10.1.8.4. Sec Consult

10.1.9. Eurasia

10.1.9.1. Russia

10.1.10. Emerging Asia/Pacific

10.1.11. Eastern Europe

10.1.12. Canada

10.1.12.1. Conexsys

10.2. Governance, Advisory, Assessment

10.2.1. Architecture and Design

10.2.2. Business Continuity

10.2.3. Compliance Review

10.2.4. Data Security Program

10.2.5. Governance

10.2.6. Governance, Compliance and Policy Design

10.2.6.1. Compliance Mandates

10.2.6.1.1. PCI

10.2.6.1.2. ISO

10.2.6.1.3. HITECH

10.2.6.1.4. HIPAA

10.2.7. People Centric Strategy

10.2.8. Policy Design

10.2.9. Program Assessment

10.2.10. Risk Assessment

10.2.11. Risk Management

10.2.11.1. Booz Allen Hamilton

10.2.11.2. Accuvant

10.2.11.3. Cloud Risks

10.2.11.4. On Premise Infrastructure

10.2.11.5. Business Risk

10.2.12. Security Program Development

10.2.12.1. Accuvant

10.2.12.2. Fishnet

10.2.12.3. FOX-IT

10.2.13. Strategy

10.3. Operations

10.3.1. Application Security

10.3.1.1. Web

10.3.1.1.1. AppSec Consulting

10.3.1.1.2. Denim Group

10.3.1.2. Mobile

10.3.1.2.1. AppSec Consulting

10.3.1.2.2. Denim Group

10.3.2. Application Security Vulnerability Assessement

10.3.3. Configuration Assessment

10.3.4. Device Security

10.3.5. Fraud, Identification and Privacy

10.3.6. Incident Response

10.3.6.1. Digital Forensics

10.3.6.1.1. Accuvant

10.3.6.1.2. Blackthorn Technologies

10.3.6.1.3. Dell Secureworks

10.3.6.1.4. Deloitte

10.3.6.1.5. E&Y

10.3.6.1.6. EY

10.3.6.1.7. FOX-IT

10.3.6.1.8. Fishnet Security

10.3.6.1.9. High Tech Bridge

10.3.6.1.10. PWC

10.3.6.1.11. TrustMatta

10.3.6.1.12. Sec Consult

10.3.6.2. Digital Investigations

10.3.6.2.1. FOX-IT

10.3.6.2.2. Deloitte

10.3.6.2.3. EY

10.3.6.2.4. Fishnet Security

10.3.6.2.5. PWC

10.3.7. Penetration Testing

10.3.7.1. AppSec Consulting

10.3.7.2. Core Security

10.3.7.3. Element Digital Security

10.3.7.4. FOX-IT

10.3.7.5. High Tech Bridge

10.3.7.6. Matasano Security

10.3.7.7. NCC Group

10.3.7.8. Rapid7

10.3.7.9. Secureworks

10.3.7.10. TrustMatta

10.3.7.11. WhiteHat Security

10.3.8. Remote Access

10.3.9. Secure Code Review

10.3.10. Threat Intelligence

10.3.11. Vulnerability Scan

10.4. Forensics

10.4.1. Forensics

10.4.1.1. Compliance & Investigative Analytics

10.4.1.2. Cybercrime & Data Breach

10.4.1.3. E-Discovery & Computer Forensics

10.4.1.4. Endpoint Forensics

10.4.1.5. Network Forensics

11. Risk, Compliance and Security Management

11.1. Firewall Workflow,Modeling & Change Management

11.1.1. Checkpoint Software

11.1.2. Firemon

11.1.3. ManageEngine

11.1.4. Redseal Networks

11.1.5. Skybox

11.1.6. Tufin

11.2. Regulations, Awareness and Training

11.2.1. Computer Based Training

11.2.1.1. Aujas

11.2.1.2. BeOne Development

11.2.1.3. Digital Defense

11.2.1.4. Fishnet Security

11.2.1.5. Inspired eLearning

11.2.1.6. Junglemap

11.2.1.7. KnowBe4

11.2.1.8. MediaPro

11.2.1.9. PhishMe

11.2.1.10. Phishline

11.2.1.11. Popcorn Training

11.2.1.12. Sans Institute

11.2.1.13. Scipp International

11.2.1.14. Secure Mentem

11.2.1.15. Security Innovation

11.2.1.16. Security Mentor

11.2.1.17. The Security Awareness Company

11.2.1.18. ThreatSim

11.2.1.19. Wombat Security Technologies

11.2.2. Educational, Awareness & News Outlets

11.2.2.1. Government Led

11.2.2.1.1. Information Sharing and Analysis Centers (ISACs)

11.2.2.2. Periodicals & Target Roles

11.2.2.2.1. Channel

11.2.2.2.2. CISO/CSO

11.2.2.2.3. Security Engineers/Analysts

11.2.3. Industry Standards/Groups

11.2.3.1. Standards

11.2.3.1.1. Technical

11.2.3.2. Industry Groups

11.2.3.2.1. Audit

11.2.3.2.2. General Security

11.2.3.2.3. Forensics

11.2.4. Regulations, Public Standards and Contractual Mandates

11.2.4.1. Global

11.2.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)

11.2.4.1.2. NIST

11.2.4.2. Country/Region Specific

11.2.4.2.1. China

11.2.4.2.2. Singapore

11.2.4.2.3. European Union

11.2.4.2.4. United States

11.3. Legal and regulatory information governance

11.4. Privacy

11.5. Security Policy and Response Orchaestration Platforms

11.5.1. Proofpoint

11.5.2. CSG Invotas

11.6. Security Program and Governance

11.6.1. Fraud Prevention/Web Malware Monitoring

11.6.1.1. Fraud Prevention

11.6.1.1.1. Software

11.6.1.1.2. Appliances

11.6.1.1.3. Software as a Service

11.6.1.1.4. Virtual Appliances

11.6.1.2. Website & Ad Malware Monitoring

11.6.1.2.1. Ad-Juster

11.6.1.2.2. Globalsign

11.6.1.2.3. Hackalert

11.6.1.2.4. Intel Security

11.6.1.2.5. QualysGuard

11.6.1.2.6. RiskIQ

11.6.1.2.7. Sucuri

11.6.2. Governance, Risk and Compliance

11.6.2.1. eGRC

11.6.2.1.1. Software as a Service

11.6.2.1.2. Software

11.6.2.2. Compliance Oriented Private Cloud Hosting (COPCH)

11.6.2.2.1. Note: This list is not an attestation of compliance

11.6.2.3. itGRCM

11.6.2.3.1. Agiliance

11.6.2.3.2. Allgress

11.6.2.3.3. Blackthorn Technologies

11.6.2.3.4. Brinqa

11.6.2.3.5. ControlCase

11.6.2.3.6. DF Labs

11.6.2.3.7. EMC-RSA

11.6.2.3.8. LockPath

11.6.2.3.9. Lumension Security

11.6.2.3.10. Microsoft

11.6.2.3.11. Modulo

11.6.2.3.12. Nasdaq Bwise

11.6.2.3.13. Rsam

11.6.2.3.14. Software as a Service

11.6.2.3.15. Symantec

11.6.2.3.16. Telos

11.6.2.3.17. WCK GRC Software

11.6.2.4. Operational Risk Analytics

11.6.2.4.1. Algosec

11.6.2.4.2. Cytegic

11.6.2.4.3. Firemon

11.6.2.4.4. IBM

11.6.2.4.5. Redseal Networks

11.6.2.4.6. RiskIO

11.6.2.4.7. Skybox

11.6.2.4.8. Software Development Lifecycle

11.6.2.4.9. Solarwinds

11.6.2.4.10. Tufin

11.6.2.5. Cloud & Container Compliance Assessment

11.6.2.5.1. Cavirin

12. Emerging Security Markets & Technologies

12.1. Application Security

12.1.1. Runtime Application Self Protection

12.1.1.1. Metaforic

12.1.1.2. Arxan

12.2. Cloud Security

12.2.1. Cloud Protection Gateways

12.2.1.1. CipherCloud

12.2.1.2. Netskope

12.2.1.3. Perspecsys

12.2.1.4. Skyhigh Networks

12.2.1.5. Vaultive

12.2.2. Cloud Access Security Brokers

12.2.2.1. User Activity Monitoring

12.2.2.1.1. Adallom

12.2.2.1.2. Bitglass

12.2.2.1.3. Elastica

12.2.2.1.4. Harvest.ai

12.2.2.1.5. Imperva

12.2.2.1.6. Netscope

12.2.2.1.7. SkyHigh Networks

12.2.2.2. Data Loss Prevention

12.2.2.2.1. DLP-Lite

12.2.2.2.2. Harvest.ai

12.2.2.3. Encryption

12.2.2.3.1. SkyHigh Networks

12.2.2.3.2. Adallom

12.2.2.3.3. Managed Methods

12.2.2.4. Identity and Access Management

12.2.2.4.1. Centrify

12.2.2.4.2. Cloudiway

12.2.2.4.3. Okta

12.2.2.4.4. Ping

12.2.2.5. Access Control

12.2.2.5.1. Adallom

12.2.2.5.2. Bitglass

12.2.2.5.3. Elastica

12.2.2.5.4. FireLayers

12.2.2.5.5. Netskope

12.2.2.5.6. Skyfence

12.2.2.5.7. Managed Methods

12.2.3. Cloud Application Discovery

12.2.3.1. Ciphercloud

12.2.3.2. Elastica

12.2.3.3. Netskope

12.2.3.4. Skyhigh

12.3. Data Security

12.4. Endpoint Security

12.4.1. Endpoint Detection and Response

12.4.1.1. Agent-Based

12.4.1.1.1. Bit9

12.4.1.1.2. Cisco

12.4.1.1.3. Confer

12.4.1.1.4. Countertack

12.4.1.1.5. CrowdStrike

12.4.1.1.6. Cyberreason

12.4.1.1.7. Cylance

12.4.1.1.8. Digital Guardian

12.4.1.1.9. Dtex Systems

12.4.1.1.10. Endgame Systems

12.4.1.1.11. Fidelis Cybersecurity

12.4.1.1.12. FireEye

12.4.1.1.13. Forescout

12.4.1.1.14. Guidance Software

12.4.1.1.15. Hexis Cyber Solutions

12.4.1.1.16. Invincea

12.4.1.1.17. LogRhythm

12.4.1.1.18. NexThink

12.4.1.1.19. Panda Security

12.4.1.1.20. RSA (EMC)

12.4.1.1.21. SecDo

12.4.1.1.22. SentinelOne

12.4.1.1.23. Tanium

12.4.1.1.24. Triumfant

12.4.1.1.25. Ziften

12.4.1.2. Agentless

12.4.1.2.1. Cynet

12.4.1.2.2. Fidelis

12.4.1.2.3. ForeScout

12.4.1.2.4. Hexadite

12.4.1.2.5. Hexis Cyber Solutions

12.4.1.2.6. LightCyber

12.4.1.2.7. Outlier Security

12.4.1.2.8. Promisec

12.5. Identification, Authentication, Access Control & IAM

12.6. Internet of Things

12.7. Network & Infrastructure Security

12.7.1. Advanced Content Disarming (ACD)

12.7.1.1. Check Point Software

12.7.1.1.1. Threat Extraction

12.7.1.2. Glasswall

12.7.1.2.1. http://www.glasswallsolutions.com/

12.7.1.3. OPSWAT

12.7.1.4. Re-Sec

12.7.1.4.1. http://www.re-sec.com/

12.7.1.5. Sasa-Software

12.7.1.5.1. http://www.sasa-software.com/

12.7.1.6. Symantec

12.7.1.6.1. DisArm

12.7.1.7. TreSys

12.7.1.7.1. http://www.tresys.com/

12.7.1.8. Votiro

12.7.1.8.1. http://www.votiro.com/

12.7.2. Unauthorized Connection Prevention

12.7.2.1. Ensilo

12.7.3. Malware Infection Analysis and Monitoring Services

12.7.3.1. Lastline

12.7.3.1.1. Guardia

12.7.3.2. OpenDNS

12.7.3.3. Qualys

12.7.3.4. Seculert

12.7.4. Network Behavior and Analytics

12.7.4.1. Industrial Control Systems (ICS)

12.7.4.1.1. CyberX

12.8. Risk, Compliance and Security Management

12.8.1. Security Ratings & Insurance

12.8.1.1. Security Ratings

12.8.1.1.1. Bitsight Technologies

12.8.1.1.2. SecurityScoreCard

12.8.1.2. Cyber Risk Insurance

12.8.1.2.1. Balsiger Insurance

12.8.1.2.2. HSB Group

12.8.1.2.3. Philadelphia Insurance Companies

12.8.1.2.4. Tennant Risk Services

12.8.1.2.5. The Hartford

12.8.1.2.6. Travelers

12.9. Security Operations, Incident Response

12.9.1. Intelligence/Data Feeds/Software & Services

12.9.1.1. Security Intelligence and Data Analysis Platforms

12.9.1.1.1. CSG International

12.9.1.2. Threat Intelligence Platforms

12.9.1.2.1. BAE Systems

12.9.1.2.2. BrightPoint Security

12.9.1.2.3. Codenomicon

12.9.1.2.4. Comilion

12.9.1.2.5. Confer

12.9.1.2.6. IID

12.9.1.2.7. Lockheed Martin

12.9.1.2.8. Lookingglass Cyber Solutions

12.9.1.2.9. Palentir

12.9.1.2.10. Soltra

12.9.1.2.11. ThreatConnect

12.9.1.2.12. ThreatQuotient

12.9.1.2.13. ThreatStream

12.9.1.2.14. TruStar

12.9.1.3. Threat Intelligence Services

12.9.1.3.1. Human Intelligence - HUMINT (Strategic)

12.9.1.3.2. Machine-Based (Tactical)

12.9.2. Malware Analysis

12.9.2.1. Malware Analysis as a Service

12.9.2.1.1. Free Services

12.9.2.1.2. ReversingLabs

12.9.2.1.3. ThreatGrid

12.9.2.2. Sandbox Software

12.9.2.2.1. GFI

12.9.2.2.2. Joesecurity

12.9.2.2.3. Bluecoat

12.9.2.2.4. Payload Security

12.9.2.3. Firewalls

12.9.2.3.1. Palo Alto Networks

12.9.2.3.2. CheckPoint Software

12.9.2.3.3. Fortinet

12.9.3. Threat Deception Technologies

12.9.3.1. Decoy Endpoints

12.9.3.1.1. Atomic Software Solutions

12.9.3.1.2. Attivo Networks

12.9.3.1.3. Cymmetria

12.9.3.1.4. GuardiCore

12.9.3.1.5. KeyFocus

12.9.3.1.6. Specter

12.9.3.1.7. TrapX

12.9.3.2. Network

12.9.3.2.1. ForeScout

12.9.3.2.2. Shadow Networks

12.9.3.2.3. Juniper Networks

12.9.3.3. Open Source

12.9.3.3.1. Honeypot

12.9.3.4. Web

12.9.3.4.1. Shape Security

12.9.3.4.2. Juniper Networks

12.9.3.5. Active Endpoint

12.9.3.5.1. Javelin Networks

12.9.3.5.2. PreeDat Security

12.9.3.5.3. Preedat

12.10. Cross Domain Solutions

12.10.1. Advenica

12.10.1.1. ZoneGuard

12.10.1.2. SecuriRam

12.10.2. General Dynamics

12.10.2.1. TacGuard

12.10.2.2. Crossing Guard

12.10.2.3. NanoXD

12.10.3. LockHeed Martin

12.10.3.1. Trusted Manager