
1. Cloud Security
1.1. Cloud Firewall Management & Orchaestration
1.1.1. Check Point Software
1.1.2. Cisco
1.1.3. CloudPassage
1.1.4. Dome9
1.1.5. Hillstone Networks
1.1.6. Huawei
1.1.7. Illumio
1.1.8. Palo Alto Networks
1.1.9. Redcannon Security
1.1.10. VMware
1.1.11. XRoads Networks
1.1.12. vArmour
2. Identity and Access Management (IAM)
2.1. AD/Unix bridge
2.1.1. Centrify
2.2. Enterprise single sign-on (ESSO)
2.3. Externalized authorization management (EAM)
2.3.1. Axiomatics
2.3.2. Dell Quest (BitKoo)
2.4. IAM as a Service
2.4.1. Centrify
2.4.2. IBM (Formerly Lighthouse Security)
2.4.3. Identity Automation
2.4.4. Intel
2.4.5. Okta
2.4.6. Password Bank
2.4.7. Ping Identity
2.4.8. Sailpoint
2.4.9. Symplifyed
2.4.10. iWelcome
2.5. Identity governance and administration
2.5.1. CA Technologies
2.5.2. IBM Security
2.5.3. Oracle
2.5.4. RSA (Aveksa)
2.6. Privileged account management (PAM)
2.6.1. BeyondTrust
2.6.2. Lieberman Software
2.6.3. Cyber Ark
2.6.4. Dell
2.6.5. Centrify
2.7. Public Certificate Authorities
2.7.1. Comodo
2.7.2. Geotrust
2.7.3. Godaddy
2.7.4. Symantec (Formerly VeriSign)
2.8. User Authentication
2.8.1. Tokens
2.8.1.1. OOB authentication
2.8.1.1.1. SMS
2.8.1.1.2. Voice
2.8.1.1.3. Push
2.8.1.1.4. Email
2.8.1.1.5. Social media
2.8.1.2. OTP tokens
2.8.1.2.1. OTP hardware tokens
2.8.1.2.2. OTP software tokens for smart phones
2.8.1.3. X.509 tokens
2.8.1.4. Other tokens
2.8.1.4.1. ANECT AS - ALUCID
2.8.2. Contextual authentication
2.8.3. KBA
2.8.3.1. It's Me Security
2.8.3.1.1. http://www.itsmesecurity.com/
2.8.4. Biometrics
2.8.4.1. Behavioral
2.8.4.1.1. Typing rhythm/keystroke dynamics
2.8.4.1.2. Voice recognition
2.8.4.2. Biological
2.8.4.2.1. Face recognition
2.8.4.2.2. Fingerprint
2.8.5. Wide-focus vendors
2.8.5.1. Alladin-RD
2.8.5.2. CA Technologies
2.8.5.3. Entrust
2.8.5.4. HID Global
2.8.5.5. RSA
2.8.5.5.1. Adaptive Auth
2.8.5.6. SafeNet
2.8.5.7. Symantec
2.8.5.8. Technology Nexus
2.8.5.9. VASCO
2.9. User Privilege Management
2.9.1. Appsense
2.9.1.1. http://www.appsense.com/
2.9.2. Ariella
2.9.2.1. http://www.arellia.com/
2.9.3. Avectco
2.9.3.1. http://www.avecto.com/
2.9.4. BeyondTrust
2.9.4.1. http://www.beyondtrust.com/
2.9.5. CionSystems
2.9.6. CrossIdeas
2.9.6.1. http://www.crossideas.com/
2.9.7. Centrify
2.9.7.1. http://www.centrify.com/
2.9.8. Dell
2.9.8.1. http://www.quest.com/desktop-authority-management-suite/
2.9.9. Lieberman Software
2.9.9.1. http://www.liebsoft.com/
2.9.10. Viewfinity
2.9.10.1. http://www.viewfinity.com/
3. Infrastructure Protection
3.1. Active Directory Defense
3.1.1. Aorato
3.1.1.1. http://www.aorato.com/
3.2. Appliance Based Malware Sandboxes
3.2.1. AhnLab
3.2.2. CheckPoint Software
3.2.3. ContentKeeper
3.2.4. Cyphort
3.2.5. Damballa
3.2.6. FireEye
3.2.7. HBGary
3.2.8. LastLine
3.2.9. Intel Security
3.2.9.1. ValidEDGE
3.2.10. Palo Alto Networks
3.2.11. RSA
3.2.11.1. Security Analytics (Formerly Netwitness)
3.2.11.1.1. Spectrum
3.2.12. Trend Micro
3.2.13. WINS TECHNET LTD
3.2.13.1. http://www.wins21.co.kr/
3.3. Cloud-Based Remote Access
3.3.1. BubblewRapp
3.3.2. Pertino
3.4. DNS-based Threat Prevention/Detection
3.4.1. Standalone Appliances
3.4.1.1. Efficient IP
3.4.1.2. Infoblox
3.4.2. DNS Services
3.4.2.1. Comodo
3.4.2.2. Neustar
3.4.2.3. OpenDNS
3.4.2.4. Symantec
3.4.3. Firewalls
3.4.3.1. Palo Alto Networks
3.5. Denial of Service Protection
3.5.1. Appliances
3.5.1.1. Arbor Networks
3.5.1.1.1. Prevail APS
3.5.1.2. Check Point Software
3.5.1.2.1. DDos Protector
3.5.1.3. Corero
3.5.1.4. Fortinet
3.5.1.5. Genie Networks
3.5.1.5.1. ATM Appliances
3.5.1.6. NSFOCUS
3.5.1.7. Radware
3.5.1.8. WINS TECHNET LTD
3.5.1.8.1. http://www.wins21.co.kr/
3.5.2. Security as a Service
3.5.2.1. HTTP/HTTPS Only
3.5.2.1.1. DOSArrest
3.5.2.1.2. Cloudflare
3.5.2.2. MultiProtocol/Network
3.5.2.2.1. Akamai
3.5.2.2.2. Black Lotus
3.5.2.2.3. Cloud Flare
3.5.2.2.4. F5
3.5.2.2.5. Incapsula
3.5.2.2.6. Link11
3.5.2.2.7. Neustar
3.5.2.2.8. NexusGuard
3.5.2.2.9. Verisign Inc
3.5.3. Clean Pipe Services
3.5.3.1. AT&T
3.5.3.2. Verizon
3.6. Network Access Control (NAC)
3.6.1. Host Based
3.6.1.1. Symantec
3.6.1.2. Intel Security
3.6.2. Network Based
3.6.2.1. Forescout
3.6.2.2. Cisco
3.6.2.3. Bradford Networks
3.6.2.4. Milton Security Group
3.7. Network Anonymization & Consumer VPN Services
3.7.1. AnchorFree Hotspot Shield
3.7.2. Anonymize.net
3.7.3. CyberGhost
3.7.4. GoldenFrog
3.7.5. HMA ProVPN
3.7.5.1. TorVPN
3.7.6. Okayfreedom
3.7.7. OpenVPN Shield Exchange
3.7.8. Private Wifi
3.7.9. Tor
3.8. Network Behavior Analysis/Network Forensics
3.8.1. Network Behavior and Advanced Threat Analytics
3.8.1.1. Arbor Networks
3.8.1.2. Boeing
3.8.1.2.1. http://www.boeing.com/defense/cybersecurity-information-management/
3.8.1.3. Cyber adAPT
3.8.1.4. Darktrace
3.8.1.5. EMC
3.8.1.6. Lancope
3.8.1.7. Light Cyber
3.8.1.8. Novetta Solutions
3.8.1.8.1. http://www.novetta.com/commercial/novetta-advanced-analytics/cyber-analytics/
3.8.1.9. PacketSled
3.8.1.10. RedJack
3.8.1.11. Splunk
3.8.1.12. Taasera
3.8.1.13. Trustport
3.8.1.13.1. Threat Intelligence
3.8.1.14. Vectra Networks
3.8.2. Network Monitoring, Network Behavior & Metadata Extraction Appliances
3.8.2.1. Damballa
3.8.2.2. ExtraHop Networks
3.8.2.2.1. No-Net Flow Support
3.8.2.3. Genie Networks
3.8.2.4. GreatBay Software
3.8.2.5. Kindsight
3.8.2.6. Light Cyber
3.8.3. Network-Based Threat Intelligence Enforcement Appliances
3.8.3.1. Centripetal Networks
3.8.3.2. Check Point Software
3.8.3.3. Norse Corp
3.8.3.3.1. Darkwatch
3.8.4. Surveillance/Lawful Intercept
3.8.4.1. Cybersift
3.8.4.1.1. http://www.cybersift.net/sifter10app.html
3.8.4.2. Decision Group INC
3.8.4.2.1. http://www.edecision4u.com/index.html
3.8.4.3. IP Fabrics
3.8.4.4. InveaTech
3.8.4.4.1. https://www.invea.com/en/products-and-services/li-system
3.8.4.5. KLOS
3.8.4.5.1. http://www.klos.com/applications/lawful-intercept/
3.8.4.6. NEXT Computing
3.8.4.6.1. http://www.nextcomputing.com/products/packet-capture-systems
3.8.4.7. Radisys
3.8.4.7.1. http://www.radisys.com/products/network-appliance/
3.8.4.8. Utimaco
3.8.4.8.1. https://lims.utimaco.com/utimaco-lims/
3.9. Network Firewalls
3.9.1. Carrier Firewalls
3.9.2. Enterprise Firewalls
3.9.2.1. Multifunction Enterprise Firewalls
3.9.2.1.1. Check Point Software
3.9.2.1.2. Cisco
3.9.2.1.3. Fortinet
3.9.2.1.4. Palo Alto Networks
3.9.2.2. Stateful Inspection - Traditional Firewalls
3.9.2.2.1. Cisco
3.9.2.2.2. Meraki
3.9.2.2.3. HP
3.9.2.2.4. Huawei
3.9.2.2.5. Check Point Software
3.9.3. Multi-Funtion SMB Firewalls
3.9.3.1. 443 Networks
3.9.3.2. Check Point Software
3.9.3.3. CheckPoint
3.9.3.4. Cisco
3.9.3.5. Clavister
3.9.3.6. Endian
3.9.3.7. Fortinet
3.9.3.8. Hillstone Networks
3.9.3.9. PineApp
3.9.3.9.1. http://www.pineapp.com/
3.9.3.10. Sangfor
3.9.3.11. Sonicwall
3.9.3.12. Sophos
3.9.3.13. Trustwave
3.9.3.14. Untangle
3.9.3.15. WINS TechNet LTD
3.9.3.15.1. http://www.wins21.co.kr/
3.9.3.16. WatchGuard
3.9.4. Open Source & Community
3.9.4.1. IPTables
3.9.4.2. IPchains
3.9.4.3. PFSense
3.9.4.4. Untangle
3.9.5. Router Firewalls
3.10. Network Intrusion Prevention
3.10.1. Predictive Modeling
3.10.1.1. Trustpipe
3.10.1.2. Cyactive
3.10.2. IBM
3.10.3. Signature Based
3.10.3.1. WINS TECHNET LTD
3.10.3.1.1. http://www.wins21.co.kr/
3.10.3.2. Open Source
3.10.3.2.1. Snort
3.10.3.3. Intel Security
3.10.3.4. IBM
3.10.3.5. HP
3.10.3.5.1. TippingPoint
3.10.3.6. Fortinet
3.10.3.7. Enterasys
3.10.3.8. Cisco
3.10.3.8.1. Sourcefire
3.10.3.9. CheckPoint
3.10.3.10. AlienVault
3.10.3.10.1. Snort
3.11. Network-Based Advanced Threat Protection
3.11.1. Advanced Threat Intelligence
3.11.1.1. LookingGlass
3.11.1.2. OpenDNS
3.11.1.3. Norse Corp
3.11.2. Firewalls with File Sandbox Capabilities
3.11.2.1. Barracuda
3.11.2.2. Check Point Software
3.11.2.3. Fortinet
3.11.2.4. Juniper Networks
3.11.2.5. Palo Alto Networks
3.11.2.6. Sophos
3.11.2.7. Watchguard
3.11.3. Virtual Execution Assessment
3.11.3.1. Cloud Based
3.11.3.1.1. Netwitness
3.11.3.1.2. CrowdStrike
3.11.3.1.3. Cisco
3.11.4. Virtualization & Emulation Sandbox Standalone Appliances
3.11.4.1. AhnLab
3.11.4.2. Bluecoat
3.11.4.3. Check Point Software
3.11.4.3.1. Emulator Blade
3.11.4.4. Cisco
3.11.4.4.1. ThreatGrid
3.11.4.5. Cyphort
3.11.4.6. Damballa
3.11.4.7. FireEye
3.11.4.7.1. Malware Analysis Appliance
3.11.4.8. Fortinet
3.11.4.8.1. FortiSandbox
3.11.4.9. General Dynamics
3.11.4.9.1. Fidelis Security Systems
3.11.4.10. Intel Security
3.11.4.10.1. McAfee Advanced Threat Detection Appliance
3.11.4.11. Lastline
3.11.4.12. Palo Alto Networks
3.11.4.12.1. WildFire
3.11.4.13. Techguard Security
3.11.4.14. ThreatTrack
3.11.4.14.1. Email Only
3.11.4.15. Trend Micro
3.11.4.15.1. Deep Discovery
3.11.4.16. VMRay
3.12. SCADA Monitoring
3.12.1. PFP Cybersecurity
3.13. SSL Inspection Appliances
3.13.1. A10 Networks
3.13.2. Bluecoat
3.13.3. ResolutionOne
3.13.4. VSS Monitoring
3.13.5. SourceFire
3.14. Software Defined Network Perimeter
3.14.1. Tempered Networks
3.14.2. Unisys Stealth
3.14.3. Vidder
3.15. Virtual Private Networking (VPN/SSL VPN)
3.15.1. IPSec VPN Concentrators
3.15.1.1. Certes Networks
3.15.1.2. CheckPoint Software
3.15.1.3. Cisco
3.15.1.4. Mako Networks
3.15.2. Layer 2 Encryption
3.15.2.1. Certes Networks
3.15.3. Layer 4 Encryption
3.15.3.1. Certes Networks
3.15.4. SSL VPN
3.15.4.1. AhnLab
3.15.4.2. Array Networks
3.15.4.3. Barracuda Networks
3.15.4.4. Cisco
3.15.4.5. Citrix
3.15.4.6. F5 Networks
3.15.4.7. Hillstone Networks
3.15.4.8. Juniper
3.15.4.9. NetGear
3.15.4.10. Sonicwall
3.15.4.11. Stonesoft
3.15.4.12. WatchGuard
3.16. Web/Email Protection
3.16.1. Secure Email Gateways
3.16.1.1. Bluecoat
3.16.1.2. Fortinet
3.16.1.3. GWAVA
3.16.1.4. Intel Security
3.16.1.5. Proofpoint
3.16.1.6. Sonicwall
3.16.1.7. Symantec
3.16.1.8. Trustwave
3.16.1.9. Websense
3.16.1.10. iBoss
3.16.2. Secure Web Gateways
3.16.2.1. Bluecoat
3.16.2.2. ContentKeeper
3.16.2.3. GWAVA
3.16.2.4. Intel Security
3.16.2.5. Symantec
3.16.2.6. Trustwave
3.16.2.7. Websense
3.16.2.8. iBoss
3.16.3. Security as a Service
3.16.3.1. Web & Email SaaS
3.16.3.1.1. Appriver
3.16.3.1.2. Barracuda
3.16.3.1.3. Bitglass
3.16.3.1.4. Cisco
3.16.3.1.5. Intel Security
3.16.3.1.6. Spamina
3.16.3.1.7. Symantec
3.16.3.1.8. Total Defense
3.16.3.1.9. TotalDefense
3.16.3.1.10. Websense
3.16.3.1.11. Zscaler
3.16.3.2. Web Only
3.16.3.2.1. ContentKeeper
3.16.3.2.2. OpenDNS
3.16.3.3. Email Only
3.16.3.3.1. Agari
4. Data and Collaboration Security
4.1. Data Governance and Classification
4.1.1. Expert Source
4.1.1.1. http://www.expertsource.in/index.php
4.1.2. HP
4.1.3. IBM
4.1.4. Informatica
4.1.5. Nuix
4.1.6. Somansa
4.1.7. Titus
4.1.8. boldonjames
4.2. Data Loss Prevention (DLP)
4.2.1. Endpoint
4.2.1.1. Data Classification and Tracking
4.2.1.1.1. Banyan Solutions
4.2.1.1.2. BoldonJames
4.2.1.1.3. Digital Guardian
4.2.1.1.4. HP
4.2.1.1.5. IBM
4.2.1.1.6. Mach1 Development
4.2.1.1.7. MinerEye
4.2.1.1.8. Nuix
4.2.1.1.9. SecureIslands
4.2.1.1.10. Smartlogic
4.2.1.1.11. Titus
4.2.1.1.12. Varonis
4.2.1.2. Mobile
4.2.1.2.1. Symantec
4.2.1.2.2. Websense
4.2.1.2.3. SecureIslands
4.2.1.3. Windows
4.2.1.3.1. Absolute Software
4.2.1.3.2. CA Technologies
4.2.1.3.3. Digital Guardian
4.2.1.3.4. GTB Technologies
4.2.1.3.5. Infowatch
4.2.1.3.6. Intel Security
4.2.1.3.7. RSA
4.2.1.3.8. SecureIslands
4.2.1.3.9. Somansa
4.2.1.3.10. Symantec
4.2.1.3.11. Trustwave
4.2.1.3.12. Watchful Software
4.2.1.3.13. Websense
4.2.1.3.14. Zecurion
4.2.2. Network
4.2.2.1. Code Green Networks
4.2.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)
4.2.2.3. RSA (EMC)
4.2.2.4. Symantec
4.2.3. Secure Email Gateway
4.2.3.1. Cisco
4.2.3.2. Symantec
4.2.3.3. Intel Security
4.2.3.4. Somansa
4.2.4. Secure Web Gateway
4.2.4.1. Intel Security
4.2.4.2. Symantec
4.2.4.3. Somansa
4.2.5. Security as a Service
4.2.5.1. Consumer
4.2.5.1.1. Reputation.com
4.2.5.1.2. Social Fortress
4.2.5.1.3. PwnedList
4.2.5.2. Enterprise
4.2.5.2.1. Social Fortress
4.2.5.2.2. Google Apps
4.2.5.2.3. ZixCorp
4.3. Database Security
4.3.1. Database Audit and Protection
4.3.1.1. Application Security, Inc
4.3.1.2. BeyondTrust
4.3.1.3. Fortinet
4.3.1.4. GreenSQL
4.3.1.5. IBM
4.3.1.6. IRI
4.3.1.6.1. Oracle
4.3.1.6.2. SQL Server
4.3.1.7. Imperva
4.3.1.8. Intel Security
4.3.1.9. Mentis Software
4.3.1.10. Oracle Corp
4.3.1.11. PentaSecurity
4.3.1.12. Warevalley
4.3.2. Database Activity Monitoring
4.3.2.1. DB Networks
4.3.2.2. Somansa
4.4. Encrypted USB Storage
4.4.1. Apricorn
4.4.2. Datalocker
4.4.3. Integral Memory
4.4.4. IronKey
4.4.5. Kingston
4.4.6. Virbatim
4.5. Encryption/Tokenization
4.5.1. Cloud/SAAS Encryption
4.5.1.1. Appliances
4.5.1.1.1. Office365
4.5.1.1.2. Ciphercloud
4.5.1.1.3. Afore Solutions
4.5.1.1.4. Perspecsys
4.5.1.2. Software
4.5.1.2.1. BoxCryptor
4.5.1.2.2. CloudMask
4.5.1.2.3. PrivateCore
4.5.1.2.4. Trend Micro
4.5.1.2.5. Viivo
4.5.1.2.6. Voltage Security
4.5.1.3. Software as a Service
4.5.1.3.1. Trend Micro
4.5.1.3.2. SooKasa
4.5.1.3.3. SafeNet
4.5.2. Data masking
4.5.2.1. Oracle
4.5.3. Database
4.5.3.1. SafeNet
4.5.3.2. Dark Matter Labs
4.5.3.3. Vormetric
4.5.4. File/Folder
4.5.4.1. Covertix
4.5.4.1.1. http://www.covertix.com/
4.5.4.2. IBM
4.5.4.2.1. Mainframe
4.5.4.3. SecureIslands
4.5.4.4. Sophos
4.5.4.4.1. SafeGuard Enterprise (Utimaco)
4.5.4.5. Symantec (PGP)
4.5.4.6. Vormetric
4.5.4.7. WinMagic
4.5.4.7.1. SecureDoc
4.5.5. Mobile Storage/USB
4.5.5.1. IronKey
4.5.6. Tokenization
4.5.6.1. Protegrity
4.5.7. Whole Disk
4.5.7.1. Intel Security
4.5.7.2. Symantec (PGP)
4.5.7.3. CheckPoint Software
4.5.7.4. Encryption Management
4.5.7.4.1. Wave Systems
4.5.7.5. WinMagic
4.5.7.5.1. SecureDoc
4.5.7.6. Microsoft
4.5.7.6.1. Bitlocker
4.5.7.7. Sophos
4.5.7.7.1. SafeGuard Enterprise (Utimaco)
4.5.7.8. Trustwave
4.5.7.8.1. DataControl
4.5.7.9. Vormetric
4.5.8. Big Data
4.5.8.1. Gazzang
4.5.8.2. Vormetric
4.5.9. Email
4.5.9.1. ZixCorp
4.5.9.2. Encryptics
4.5.9.2.1. https://www.encryptics.com/default.aspx
4.5.10. Cryptographic Providers
4.5.10.1. RSA
4.5.10.2. Quintessence
4.5.10.3. Microsoft
4.6. File Analysis Software
4.6.1. Acaveo
4.6.2. Active Navigation
4.6.3. AvePoint
4.6.4. Beyond Recognition
4.6.5. Bloomberg
4.6.6. CommVault
4.6.7. Condrey
4.6.8. Covertix
4.6.9. DataGlobal
4.6.10. DataGravity
4.6.11. Equivio
4.6.12. HP
4.6.12.1. Control Point
4.6.13. HiSoftware
4.6.14. IBM
4.6.14.1. StoreIQ
4.6.15. Identifty Finder
4.6.16. Imperva
4.6.17. Index Engines
4.6.18. Kazoup
4.6.19. NTP Software
4.6.20. Novell
4.6.21. Nuix
4.6.22. Proofpoint
4.6.23. Stealthbits
4.6.24. Varonis
4.6.25. WatchDox
4.6.26. Whitebox Security
4.6.27. ZyLab
5. Application Security
5.1. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)
5.1.1. Network Vulnerability Assessment (On Premise)
5.1.1.1. Core Security
5.1.1.2. Digital Defense
5.1.1.3. Fortinet
5.1.1.4. Intel Security
5.1.1.4.1. McAfee Vulnerability Manager (Foundstone)
5.1.1.5. NSAuditor
5.1.1.6. Ncircle
5.1.1.7. Netasq
5.1.1.8. Outpost24
5.1.1.9. Qualys
5.1.1.10. Rapid 7
5.1.1.10.1. Nexspose
5.1.1.11. Trustwave
5.1.2. Managed Penetration Testing Services
5.1.2.1. WhiteHatSecurity
5.1.2.2. Cenzic
5.1.3. Penetration TestingSoftware
5.1.3.1. Core Security
5.1.3.2. Rapid7
5.1.3.2.1. Metasploit Pro
5.1.3.2.2. Metasploit Express
5.1.3.3. Trustwave
5.1.4. Software as a Service
5.1.4.1. Vulnerability Management
5.1.4.1.1. Trustwave
5.1.4.1.2. Qualys
5.1.4.1.3. Outpost24
5.1.4.1.4. Intel Security
5.1.4.1.5. Digital Defense
5.1.4.2. Phish Testing/Management
5.1.4.2.1. Phishme
5.1.5. Vulnerability Reporting/Tracking
5.1.5.1. Risk IO
5.1.6. Vulnerability Research
5.1.6.1. CSC
5.1.6.2. HP
5.1.6.2.1. DV Labs
5.1.6.3. HotWAN
5.1.6.4. Intel Security
5.1.6.5. SecNiche Labs
5.1.6.6. Sourcefire VRT
5.1.6.7. Symantec
5.1.6.8. VRLSec
5.1.6.9. Vupen
5.1.7. Vulnerability Resolution and Prioritization Platforms
5.1.7.1. RiskIO
5.1.7.2. Secure Decisions
5.1.7.3. Synack
5.1.7.4. ThreadFix
5.2. Web Application Firewalls (WAF) & Application Security
5.2.1. Web Application Firewalls
5.2.1.1. Virtualized Appliances
5.2.1.1.1. A10 Networks
5.2.1.1.2. AlertLogic
5.2.1.1.3. Amazon AWS
5.2.1.1.4. Barracuda Networks
5.2.1.1.5. BeeWare
5.2.1.1.6. Ergon Informatik AG
5.2.1.1.7. Forum Systems
5.2.1.1.8. Imperva
5.2.1.1.9. PentaSecurity
5.2.1.2. Physical Appliances
5.2.1.2.1. A10 Networks
5.2.1.2.2. AdNovum
5.2.1.2.3. AlertLogic
5.2.1.2.4. Anchiva
5.2.1.2.5. Barracuda Networks
5.2.1.2.6. BeeWare
5.2.1.2.7. BugSec
5.2.1.2.8. Cisco
5.2.1.2.9. Citrix
5.2.1.2.10. DBAPPSecurity
5.2.1.2.11. DPtech
5.2.1.2.12. Dell Sonicwall
5.2.1.2.13. DenyAll
5.2.1.2.14. Ergon Informatik
5.2.1.2.15. F5
5.2.1.2.16. Fortinet
5.2.1.2.17. Forum Systems
5.2.1.2.18. HP
5.2.1.2.19. Imperva
5.2.1.2.20. NSFocus
5.2.1.2.21. PentaSecurity
5.2.1.2.22. Positive Technologies
5.2.1.2.23. RadWare
5.2.1.2.24. Riverbed
5.2.1.2.25. Trustwave
5.2.1.2.26. WINS TECHNET LTD
5.2.1.3. Software
5.2.1.3.1. AdNovum
5.2.1.3.2. Apache
5.2.1.3.3. DenyAll
5.2.1.3.4. ERGON Informatik AG
5.2.1.3.5. Forum Systems
5.2.1.3.6. Juniper
5.2.1.3.7. Microsoft IIS
5.2.1.3.8. Open Source
5.2.1.3.9. Positive Security
5.2.1.3.10. Riverbed
5.2.1.3.11. Trustifier
5.2.1.3.12. WebScurity
5.2.1.4. Managed Services
5.2.1.4.1. Dell Secureworks
5.2.1.4.2. AT&T
5.2.1.4.3. Verizon Business
5.2.2. Software as a Service
5.2.2.1. Akamai
5.2.2.1.1. Kona
5.2.2.2. AlertLogic
5.2.2.3. ArmorLogic
5.2.2.4. BinarySec
5.2.2.5. CloudFlare
5.2.2.5.1. http://www.cloudflare.com
5.2.2.6. FireBlade
5.2.2.7. Incapsula
5.2.2.7.1. http://www.incapsula.com
5.2.2.8. Qualys
5.2.2.9. Securi
5.2.2.10. Soha
5.2.2.10.1. http://soha.io/
5.2.3. Web Threat Disruption Technology
5.2.3.1. Software
5.2.3.1.1. NuCaptcha
5.2.3.1.2. NuData
5.2.3.2. Appliances
5.2.3.2.1. Juniper
5.2.3.2.2. Shape Security
5.2.3.3. Open Source
5.2.3.3.1. Google Hack Honeypot
5.3. Web Application Security
5.3.1. Code Review Products
5.3.1.1. HP
5.3.1.2. IBM
5.3.2. Scanning Services
5.3.2.1. Cenzic
5.3.2.2. Controlscan
5.3.2.3. High-Tech Bridge
5.3.2.4. McAfee Secure
5.3.2.5. Qualys
5.3.2.6. Trustwave
5.3.2.7. WebSecurify
5.3.2.8. WhiteHat Security
5.3.3. Scanning Software
5.3.3.1. Open Source
5.3.3.1.1. Arachni Scanner
5.3.3.1.2. Subgraph
5.3.3.1.3. W3af
5.3.3.1.4. Wapiti
5.3.3.1.5. Watcher
5.3.3.2. Commercial
5.3.3.2.1. Accunetix
5.3.3.2.2. BeyondTrust
5.3.3.2.3. Cenzic
5.3.3.2.4. HP
5.3.3.2.5. MavitunaSecurity
5.3.3.2.6. NTObjectives
5.3.3.2.7. Nstalker
5.3.3.2.8. Portswigger
5.3.3.2.9. Syhunt
6. Endpoint Security
6.1. Anti-Malware
6.1.1. Eastern Europe
6.1.1.1. Czech Republic
6.1.1.1.1. Avast
6.1.1.1.2. TrustPort
6.1.1.2. Denmark
6.1.1.2.1. BullGuard
6.1.1.3. Netherlands
6.1.1.3.1. AVG
6.1.1.4. Romania
6.1.1.4.1. Bitdefender
6.1.1.5. Slovakia
6.1.1.5.1. ESET
6.1.2. Emerging Asia/Pacific
6.1.2.1. India
6.1.2.1.1. eScan
6.1.2.1.2. K7 Computing
6.1.3. Latin America
6.1.3.1. Spain
6.1.3.1.1. Optenet
6.1.4. Mature Asia/Pacific
6.1.4.1. China
6.1.4.1.1. Qihoo
6.1.4.1.2. Rising International Software
6.1.4.2. South Korean
6.1.4.2.1. AhnLab
6.1.4.2.2. BKAV
6.1.4.2.3. ESTsoft
6.1.5. Middle East and Africa
6.1.5.1. Israel
6.1.5.1.1. Check Point Software
6.1.6. North America
6.1.6.1. Cyren
6.1.6.2. MalwareBytes
6.1.6.3. Intel Security
6.1.6.4. Microsoft
6.1.6.5. PC Pitstop
6.1.6.6. Roboscan
6.1.6.7. Symantec
6.1.6.8. ThreatTrack Security
6.1.6.9. Total Defense
6.1.6.10. Trend Micro
6.1.7. Russia
6.1.7.1. Kaspersky
6.1.8. Western Europe
6.1.8.1. Austria
6.1.8.1.1. Ikarus Security
6.1.8.2. Finland
6.1.8.2.1. F-Secure
6.1.8.3. Germany
6.1.8.3.1. Avira
6.1.8.3.2. G-Data
6.1.8.3.3. Kromtech
6.1.8.4. Norway
6.1.8.4.1. Norman
6.1.8.5. United Kingdom
6.1.8.5.1. Sophos
6.1.8.6. Poland
6.1.8.6.1. Arcabit
6.2. Endopoint Sandboxes and Virtualized Containers
6.2.1. Endpoint Sandboxes
6.2.1.1. Panda
6.2.1.1.1. www.panda.com
6.2.1.2. Sandboxie
6.2.1.2.1. http://www.sandboxie.com/
6.2.1.3. Bitdefender
6.2.1.3.1. www.bitdefender.com
6.2.1.4. Bluecoat
6.2.1.4.1. NormanShark
6.2.2. Type-0 Hypervisors
6.2.2.1. Lynxworks
6.2.2.1.1. http://www.lynuxworks.com/
6.2.2.2. Zirtu
6.2.3. Browser-Isolation (remote dom)
6.2.3.1. Amune
6.2.3.1.1. https://amune.org/security
6.2.3.2. Armor5
6.2.3.3. Menlo Security
6.2.3.4. Spikes Security
6.2.4. Process Isolation/Virtualization
6.2.4.1. Invincea
6.2.4.2. Bromium
6.3. Endpoint Intrusion Prevention
6.3.1. Arkoon
6.3.1.1. StormShield
6.3.2. BeyondTrust
6.3.3. IBM
6.3.4. Landesk
6.3.5. McAfee
6.3.6. Safensoft
6.3.7. Symantec
6.4. Enterprise Mobility Mangement Suites
6.4.1. Absolute Software
6.4.2. AMware
6.4.2.1. Airwatch
6.4.3. Blackberry
6.4.4. Citrix
6.4.5. Globo
6.4.6. Good Technologies
6.4.7. IBM
6.4.8. Landesk
6.4.9. MobileIron
6.4.10. Mojave
6.4.10.1. https://www.mojave.net/
6.4.11. SAP
6.4.12. Sophos
6.4.13. Soti
6.4.14. Symantec
6.4.15. Tangoe
6.5. File Integrity Monitoring
6.5.1. Open Source
6.5.1.1. 1. AIDE
6.5.1.2. 2. Trend Micro
6.5.1.2.1. 1. OSSEC
6.5.1.3. 3. Samhain
6.5.1.4. 4. Osiris
6.5.1.5. 5. Integrit
6.5.1.6. 6. Tripwire
6.5.2. Commercial
6.5.2.1. Imperva
6.5.2.2. Intel Security
6.5.2.3. Tripwire
6.6. Malware Analysis
6.6.1. Botnets
6.6.1.1. spyeyetracker.abuse.ch
6.6.2. Internet Identity
6.6.3. Malware Patrol
6.6.4. SpamHaus
6.6.5. Team Cymru
6.6.6. ThreatGrid
6.6.7. VirusTotal
6.6.8. zeustracker.abuse.ch
6.6.9. JoeSecurity
6.6.10. Shadowserver
6.7. Mobile Device Management
6.7.1. Absolute Software
6.7.2. Beachhead Security
6.7.3. Blackberry
6.7.4. Citrix
6.7.5. Globo
6.7.6. Good Technologies
6.7.7. IBM
6.7.8. Landesk
6.7.9. MobileIron
6.7.10. Mojave
6.7.10.1. https://www.mojave.net/
6.7.11. SAP
6.7.12. Sophos
6.7.13. Soti
6.7.14. Symantec
6.7.15. Tangoe
6.7.16. VMware
6.7.16.1. Airwatch
6.8. Policy Assessment and System Configuration Management
6.8.1. BMC
6.8.1.1. BMC Server Automation
6.8.2. IBM
6.8.2.1. IBM Endpoint Manager
6.8.3. Intel Security
6.8.3.1. Policy Auditor
6.8.4. RedHat
6.8.4.1. OpenSCAP
6.8.5. Saint
6.8.5.1. Saint Security
6.8.6. Tripwire
6.8.6.1. Tripwire Enterprise
6.9. Sandboxing/MicroVM
6.9.1. Norman Sandbox
6.9.2. Bromium
6.9.3. Bufferzone
6.9.4. Invincea
6.9.5. SandBoxie
6.10. Exploit Technique Prevention Software
6.10.1. CyActive
6.10.2. Malwarebytes Anti-Exploit
6.10.3. Microsoft
6.10.3.1. EMET
6.10.4. Palo Alto Networks
6.10.4.1. Endpoint
6.10.5. ViRobot APT Shield
6.10.6. Microsoft EMET - FREE
7. Market Logistics & Supply Chain
7.1. Cloud Service Brokerages
7.1.1. Bitnami
7.1.2. Ensim
7.1.2.1. http://www.ensim.com/
7.1.3. Gravitant
7.1.4. Jamcracker
7.1.4.1. http://www.jamcracker.com/
7.1.5. StandingCloud
7.2. Distribution/Channel
7.2.1. VARs, Resellers
7.2.1.1. China
7.2.1.1.1. Rainbow Tech
7.2.1.1.2. Broad Sky Innovation Technology
7.2.1.1.3. Qast Software Group
7.2.1.1.4. Macrosea
7.2.1.2. Eastern Europe
7.2.1.2.1. CZECH Republic
7.2.1.2.2. Poland
7.2.1.3. Emerging Asia Pacific
7.2.1.3.1. India
7.2.1.3.2. Indonesia
7.2.1.3.3. Malasia
7.2.1.3.4. Thailand
7.2.1.3.5. Philippines
7.2.1.4. Eurasia
7.2.1.4.1. Russian Federation
7.2.1.4.2. Kazakhstan
7.2.1.4.3. Ukraine
7.2.1.5. Latin America
7.2.1.5.1. Brazil
7.2.1.5.2. Chile
7.2.1.5.3. Columbia
7.2.1.5.4. Costa Rica
7.2.1.5.5. Ecuador
7.2.1.5.6. Bolivia
7.2.1.5.7. Venezuela
7.2.1.5.8. Cuba
7.2.1.5.9. Argentina
7.2.1.5.10. Buenos Aires
7.2.1.5.11. Mexico
7.2.1.5.12. Peru
7.2.1.6. Mature Asia Pacific
7.2.1.6.1. Australia
7.2.1.6.2. Japan
7.2.1.6.3. Singapore
7.2.1.7. Middle East and North Africa
7.2.1.7.1. Turkey
7.2.1.7.2. Israel
7.2.1.7.3. Saudi Arabia
7.2.1.7.4. South Africa
7.2.1.7.5. India
7.2.1.7.6. United Arab Emirates
7.2.1.8. North America
7.2.1.8.1. United States
7.2.1.8.2. Canada
7.2.1.9. Sub-Sahara Africa
7.2.1.9.1. South Africa
7.2.1.10. Western Europe
7.2.1.10.1. France
7.2.1.10.2. Germany
7.2.1.10.3. Italy
7.2.1.10.4. Netherlands
7.2.1.10.5. Spain
7.2.1.10.6. United Kingdom
7.2.1.11. WorldWide
7.2.1.11.1. AT&T
7.2.1.11.2. Verizon Business
7.2.2. Distributors
7.2.2.1. China
7.2.2.1.1. AVNet
7.2.2.1.2. B & Data Technology Co. Ltd.
7.2.2.1.3. Beijing Advazone Electronic Limited Comp
7.2.2.1.4. Beijing HolyZone Technology Co.,Ltd.
7.2.2.1.5. Digital China Technology LTD.
7.2.2.1.6. Ecs China
7.2.2.1.7. Edvance Technology (China) Limited
7.2.2.1.8. Huagai
7.2.2.1.9. M.Tech (Shanghai) Co., Ltd.
7.2.2.1.10. Shanghai S-I Information Tech. Ltd
7.2.2.1.11. Sinogrid Information Technology Ltd.
7.2.2.1.12. Sky Faith International Enterprise
7.2.2.2. Emerging Asia Pacific
7.2.2.2.1. India
7.2.2.2.2. Indonesia
7.2.2.2.3. Thailand
7.2.2.3. Eurasia
7.2.2.3.1. Russian Federation
7.2.2.3.2. Kazakhstan
7.2.2.4. Mature Asia Pacific
7.2.2.4.1. Singapore
7.2.2.4.2. Japan
7.2.2.4.3. South Korea
7.2.2.4.4. Australia
7.2.2.5. Middle East and South Africa
7.2.2.5.1. United Arab Emirates
7.2.2.5.2. South Africa
7.2.2.6. North America
7.2.2.6.1. Canada
7.2.2.6.2. United States
7.2.2.7. Sub-Sahara Africa
7.2.2.7.1. South Africa
7.2.2.8. Western Europe
7.2.2.8.1. United Kingdom
7.2.2.8.2. Germany
7.2.2.9. Worldwide
7.2.2.9.1. AVNet
7.2.2.9.2. Ingram Micro
7.2.2.9.3. Tech Data
7.2.2.9.4. Westcon
7.2.2.10. Latin America
7.2.2.10.1. Mexico
7.2.2.10.2. Brazil
7.2.3. Reseller Programs
7.2.3.1. http://www.crn.com/partner-program-guide/ppg2013.htm
7.2.4. Logistics/Deal Registration
7.2.4.1. Connectwise
7.3. Government Cyberwarrior (Personnel Estimates)
7.3.1. United States
7.3.1.1. NSA
7.3.1.1.1. Cyberwarrior Stats
7.3.1.2. Department of Defense
7.3.1.2.1. US Airforce
7.3.1.2.2. US Navy
7.3.1.2.3. DISA
7.3.2. Iran
7.3.2.1. 4500
7.3.3. Israel
7.3.3.1. Unit 8200
7.3.3.1.1. 5000
7.3.4. North Korea
7.3.4.1. 1000
7.4. Hardware and Chip Security
7.4.1. AMD
7.4.1.1. TPM
7.4.2. Cavium
7.4.2.1. Multi-Core Processors
7.4.3. Flow Processors
7.4.3.1. Netronome
7.4.4. Intel
7.4.4.1. TPM
7.4.4.2. Data Execution Protection
7.5. Investment
7.5.1. ETFs
7.5.1.1. PureFunds
7.5.1.1.1. SYM:HACK
7.5.2. Venture Capitalists
7.5.2.1. Trident Capital
7.5.2.2. Andreesen Horowitz
7.6. Managed Service Enablement
7.6.1. Chartec
7.6.2. Jamcracker
7.7. Marketing/PR/AR
7.7.1. Marketing/Branding Agencies
7.7.1.1. Hill and Knowlton
7.7.1.1.1. http://www.hkstrategies.com/
7.7.1.2. MetaDesign
7.7.1.2.1. http://www.metadesign.com/san-francisco
7.7.1.3. Ogilvy & Mather
7.7.1.4. Tailfin Marketing Communications
7.7.1.5. Toolbox Studios
7.7.2. Market Destinations (Sites)
7.7.2.1. CRN
7.7.2.2. Hak5
7.7.2.3. MSPMentor
7.7.2.4. Madison Logic
7.7.2.5. SCmagazine
7.7.2.6. TheVarGuy
7.7.3. Web Site Design
7.7.3.1. Baytech Web Design
7.7.3.1.1. http://www.baytechwebdesign.com/
7.7.3.2. EU Design Studios
7.7.3.2.1. http://eudesignstudio.com/
7.7.4. Creative Services
7.7.4.1. Gig Productions
7.7.4.1.1. http://www.gigpros.com/index.php
7.7.4.2. Duarte
7.7.4.2.1. http://www.duarte.com/
7.7.4.3. Text 100
7.7.4.3.1. http://www.text100.com/
7.7.4.4. Initiate Marketing
7.7.4.4.1. http://www.getinitiated.ca/
7.7.5. Campaign/Engagement
7.7.5.1. WCG World
7.7.5.1.1. http://wcgworld.com/
7.7.6. Analyst & Public Relations
7.7.6.1. KTCpr
7.7.6.1.1. http://www.kahn-travel.com/
7.7.6.2. Madison Alexander PR
7.7.6.2.1. http://www.madisonalexanderpr.com/
7.7.6.3. Marc Gendron PR
7.7.6.3.1. http://www.mgpr.info/
7.7.6.4. Schwartz Communications
7.7.6.4.1. http://www.schwartzmsl.com/
7.7.6.5. Spalding Communications
7.7.6.6. Text 100
7.7.6.6.1. http://www.text100.com/
7.7.7. Marketing Videos
7.7.7.1. Epipheo
7.7.7.1.1. http://www.epipheo.com/
7.8. OEMs & System Integrators
7.8.1. Appliance Integrators
7.8.1.1. Accton
7.8.1.1.1. http://www.accton.com/
7.8.1.2. Advantech
7.8.1.2.1. http://www.advantech.com/
7.8.1.3. Celestica
7.8.1.3.1. http://www.celestica.com/
7.8.1.4. Dan-el Technologies Ltd.
7.8.1.4.1. http://www.danel.co.il/
7.8.1.5. Flextronics
7.8.1.5.1. http://www.flextronics.com/
7.8.1.6. Plexus
7.8.1.6.1. http://www.plexus.com/
7.8.2. Base Appliances
7.8.2.1. Advantech
7.8.2.2. Amax
7.8.2.3. Cas Well
7.8.2.4. Iron Systems
7.8.2.5. Lanner
7.8.2.6. Portwell
7.8.2.7. Tilera
7.8.3. Cards
7.8.3.1. Netronome
7.8.3.2. Tilera
7.8.3.2.1. http://www.tilera.com/solutions/L7-deep-packet-inspection
7.8.4. Encryption Acceleration
7.8.4.1. Intel
7.8.4.1.1. VPRO
7.8.4.2. Safenet
7.8.4.2.1. Luna PCI
7.8.5. MSSP Appliances
7.8.5.1. 443 Networks
7.8.6. Threat Intelligence
7.8.6.1. IP Reputation
7.8.6.1.1. Norse Corp
7.8.6.1.2. Cyren
7.8.6.1.3. WebRoot Brightcloud
7.8.6.2. IP Block Lists
7.8.6.2.1. WebRoot Brightcloud
7.8.6.2.2. Norse Corp
7.8.6.2.3. Cyren
7.8.6.3. Fraud
7.8.6.3.1. Internet Fraud Alert
7.8.6.3.2. National Cyber-Forensics and Training Alliance
7.8.6.4. File Reputation
7.8.6.4.1. Findthatfile
7.8.6.5. Anti-Phishing
7.8.6.5.1. Cyren
7.8.6.6. Malicious URL
7.8.6.6.1. Cyren
7.8.6.6.2. Findthatfile
7.8.6.7. Indicators of Compromise
7.8.6.7.1. FireEye
7.8.6.7.2. Proofpoint
7.8.6.7.3. Wapack labs
7.8.6.8. Vulnerability Research
7.8.6.8.1. Telus Security Labs
7.8.6.8.2. Vupen
7.8.6.9. DNS DGA Feeds
7.8.6.9.1. Farsight Security
7.8.7. Security Related Chips & CPUs
7.8.7.1. Broadcom
7.8.7.1.1. http://www.broadcom.com/products/Security/Deep-Packet-Inspection
7.8.7.2. Cavium
7.8.7.2.1. http://www.cavium.com
7.8.7.3. Lionic
7.8.7.3.1. http://www.lionic.com/
7.8.7.4. Netronome
7.8.7.4.1. http://www.netronome.com
7.8.7.5. Tilera
7.8.7.5.1. http://www.tilera.com/products/processors
7.8.7.6. Intel
7.8.7.6.1. http://ark.intel.com/products/71633/Intel-DH8900-PCH
7.8.8. Software
7.8.8.1. Social Network Content Control
7.8.8.1.1. NetboxBlue
7.8.8.2. URL Categorization
7.8.8.2.1. Cyren
7.8.8.2.2. Ikarus
7.8.8.2.3. Malware
7.8.8.2.4. Webroot Brightcloud
7.8.8.2.5. Zvelo
7.8.8.3. Advanced Threat Protection - Virtual Execution Engines
7.8.8.3.1. ContentKeeper
7.8.8.3.2. Threat Track Security
7.8.8.4. Image Recognition
7.8.8.4.1. Image Analyzer
7.8.8.5. AntiMalware
7.8.8.5.1. Antiy
7.8.8.5.2. Avira
7.8.8.5.3. Bitdefender
7.8.8.5.4. Commtouch
7.8.8.5.5. Cyren
7.8.8.5.6. ESet
7.8.8.5.7. Fortinet
7.8.8.5.8. GFI
7.8.8.5.9. Ikarus
7.8.8.5.10. Kaspersky
7.8.8.5.11. Intel Security
7.8.8.5.12. Norman
7.8.8.5.13. OPSWAT
7.8.8.5.14. QuickHeal
7.8.8.5.15. Zillya
7.8.8.5.16. ZonerAntiVirus
7.8.8.6. Encryption
7.8.8.6.1. Transport
7.8.8.7. Optical Character Recognition
7.8.8.7.1. Abbyy
7.8.8.8. File Content Decoding/Analysis/Fingerprinting
7.8.8.8.1. HP Autonomy
7.8.8.8.2. Attivio
7.8.8.8.3. GTB Technologies
7.8.8.9. Voice Recognition
7.8.8.9.1. STC
7.8.8.9.2. Nuance
7.8.8.10. Network Stack
7.8.8.10.1. IPV4/6
7.8.8.10.2. Deep Packet Inspection
7.8.8.10.3. SDN
7.8.8.11. Anti-Spam/Phishing
7.8.8.11.1. APWG
7.8.8.11.2. BrandProtect
7.8.8.11.3. Cyren
7.8.8.11.4. Ikarus
7.8.8.11.5. Internet Fraud Alert
7.8.8.11.6. ReturnPath
7.8.8.11.7. WebRoot Brightcloud
7.8.8.12. Intrusion Detection/Prevention Signatures
7.8.8.12.1. Proofpoint
7.8.8.13. Content Extraction & Search
7.8.8.13.1. Oracle
7.8.8.14. Endpoint Security and Management
7.8.8.14.1. OPSWAT
7.8.8.15. Advanced Content Disarming and Reconstruction
7.8.8.15.1. OPSWAT
7.8.8.16. IT Service Management
7.8.8.16.1. ITRP
7.9. Product Certification/Assurance
7.9.1. ICSA Labs
7.9.2. Common Criteria for Information Technology Security Evaluation (CCITSE)
7.9.2.1. EAL1 through EAL7
7.9.2.1.1. Booz Allen Hamilton
7.9.2.1.2. COACT
7.9.2.1.3. CSC
7.9.2.1.4. CygnaCom Solutions
7.9.2.1.5. Infogard Laboratories
7.9.2.1.6. SAIC
7.9.2.1.7. atsec information security
7.10. Product Testing
7.10.1. Anti-Malware Testing
7.10.1.1. AV-Test
7.10.1.2. Av-Comparatives
7.10.1.3. VirusBTN
7.10.2. Cryptographic Testing
7.10.2.1. NIST
7.10.2.1.1. FIPS 140-2
7.10.3. Generic Product Testing, Certification and Accreditation
7.10.3.1. Certifications
7.10.3.1.1. North America
7.10.3.1.2. European Union
7.10.3.2. Testing
7.10.3.2.1. United Kingdom
7.10.3.2.2. North America
7.10.4. Sponsored Product Review/Testing
7.10.4.1. Delta Testing LTD
7.10.4.2. Dennis Labs
7.10.4.3. Miercom
7.10.4.4. NSS Labs
7.10.4.5. Network Testing Labs
7.10.4.6. Tolly Group
7.10.4.7. West Coast Labs
7.10.5. Singapore
7.10.5.1. iDA
7.10.5.1.1. http://www.ida.gov.sg/Policies-and-Regulations/Industry-and-Licensees/Standards-and-Quality-of-Service/Singapore-Common-Criteria-evaluation-and-certification-Scheme
7.11. Cloud Service Brokerages
7.12. Security Conferences
7.12.1. North America
7.12.1.1. United States
7.12.1.1.1. RSA
7.12.1.1.2. Gartner
7.12.1.1.3. Cornerstones of Trust
7.12.1.1.4. Annual Security Conference
7.12.1.1.5. SecurityBsides
7.12.1.1.6. ShmooCon
7.12.2. Europe
7.12.2.1. United Kingdom
7.12.2.1.1. RSA Conference
7.12.2.1.2. Gartner
7.12.2.2. Russia
7.12.2.2.1. Infosecurity Russia
7.12.3. Emerging Asia Pacific
7.12.4. Mature Asia Pacific
7.12.4.1. Australia
7.12.4.1.1. Gartner
7.12.4.2. Singapore
7.12.4.2.1. RSA
7.13. Staffing/Recruiting/Executive Search
7.13.1. Millard Group
7.13.2. Lynch Bowie Group
7.13.3. Robert Half
7.14. User Interface
7.14.1. Consulting
7.14.1.1. User Interface
7.14.1.1.1. BlinkUX
7.14.1.1.2. Sasa Technologies
7.14.1.1.3. Dabapps
7.14.1.2. Customer Survey
7.14.1.2.1. Techvalidate
7.14.2. HTML5 Visualization Libraries
7.14.2.1. Data-Driven Documents
7.14.2.1.1. http://d3js.org/
7.14.2.2. AngularJS
7.14.2.2.1. https://angularjs.org/
8. Security Operations & Incident Response
8.1. Forensics/eDiscovery
8.1.1. Forensic Products
8.1.1.1. eDiscovery
8.1.1.1.1. Clearwell
8.1.1.1.2. Kazeon
8.1.1.1.3. Guidance Software
8.1.1.1.4. Access Data
8.1.1.1.5. Autonomy
8.1.1.1.6. kCura
8.1.1.1.7. FTI Technology
8.1.1.1.8. Barracuda Networks
8.1.1.2. Mobile Devices
8.1.1.2.1. Cellebrite
8.1.1.2.2. Paraben
8.1.1.2.3. Oxygen
8.1.1.2.4. ViaForensics
8.1.1.3. Endpoint Computing Systems
8.1.1.3.1. Access Data
8.1.1.3.2. BlackBag
8.1.1.3.3. Cyfir
8.1.1.3.4. Guidance Software
8.1.1.3.5. Magnet Forensics
8.1.1.3.6. Nuix
8.1.1.3.7. OSForensics
8.1.1.3.8. Paraben
8.1.1.3.9. Xways Forensics
8.1.1.4. Forensics as a Service (FaaS)
8.1.1.4.1. CloudShark
8.1.1.5. Email Examination
8.1.1.5.1. Systools Software
8.1.1.5.2. Nuix
8.1.1.6. Forensic File & Data Analysis Tools
8.1.1.6.1. Cyfir
8.1.1.6.2. Intella
8.1.1.6.3. Magnet Forensics
8.1.1.6.4. Nuix
8.1.1.6.5. Systools Software
8.1.2. Network Forensics Tools (NFT)
8.1.2.1. Flow Analysis/Metadata Extraction
8.1.2.1.1. Arbor Networks
8.1.2.1.2. IBM
8.1.2.1.3. Lancope
8.1.2.1.4. LogRythm
8.1.2.1.5. Intel Security NBA
8.1.2.2. Forensic Capture with User Surveillance & Security Threat Analytics
8.1.2.2.1. Access Data
8.1.2.2.2. BlueCoat
8.1.2.2.3. EMC
8.1.2.2.4. FireEye
8.1.2.2.5. Fluke Networks
8.1.2.2.6. IBM
8.1.2.2.7. IP Fabrics
8.1.2.2.8. JDSU (Network Instruments)
8.1.2.2.9. LightCyber
8.1.2.2.10. NetAgent
8.1.2.2.11. NetResec
8.1.2.2.12. NetScout
8.1.2.2.13. Niksun
8.1.2.2.14. Novetta Solutions
8.1.2.2.15. Nuix
8.1.2.2.16. Packetsled
8.1.2.2.17. Riverbed
8.1.2.2.18. SS8
8.1.2.2.19. nPulse Technologies
8.1.2.3. Forensic Network Recording/Behavior Analytics/Network Performance Monitoring
8.1.2.3.1. Emulex
8.1.2.3.2. Packetsled
8.1.2.3.3. WildPackets
8.1.2.4. Network Packet Brokers
8.1.2.4.1. Adara
8.1.2.4.2. Apcon
8.1.2.4.3. Arista Networks
8.1.2.4.4. Cubro
8.1.2.4.5. Gigamon
8.1.2.4.6. IXIA
8.1.2.4.7. Interface Masters Technologies
8.1.2.4.8. JDSU
8.1.2.4.9. NetOptics
8.1.2.4.10. NetScout
8.1.2.4.11. VSS Monitoring
8.1.2.5. Network Taps
8.1.2.5.1. Optical
8.1.2.6. Raw Network Packet Capture
8.1.2.6.1. Apcon
8.1.2.6.2. Arbor Networks
8.1.2.6.3. Comworth
8.1.2.6.4. WireShark
8.1.2.6.5. NTOP.org
8.1.3. Incident Response Management Software
8.1.3.1. SaaS
8.1.3.1.1. Co3 Systems
8.1.3.2. Software
8.1.3.2.1. DF Labs
8.1.4. eDiscovery Services
8.1.4.1. Robert Half
8.1.4.2. Advanced Discovery
8.1.5. eDiscovery Software
8.1.5.1. AccessData
8.1.5.2. Guidance Software
8.1.5.3. Nuix
8.1.5.4. Symantec
8.2. Security Incident Response Platforms (SIRP)
8.2.1. CSG Invotas
8.2.2. Cybersponse
8.2.3. DFLabs
8.2.4. Fido
8.2.5. Hexadite
8.2.6. Phantom Cyber
8.2.7. Proofpoint
8.2.8. Resilient Systems
8.2.9. ID Experts
8.3. Incident Response Collaboration Software
8.3.1. Resilient Systems
8.4. Incident Response Legal Services
8.4.1. Information Law Group
8.5. Security Information and Event Management (SIEM), Log Management & Analytics
8.5.1. Application Security Intelligence Engine
8.5.1.1. SAP
8.5.1.1.1. iT-Cube Systems
8.5.2. Log Management
8.5.2.1. EventTracker
8.5.2.2. IGLOO Security
8.5.2.3. Intel Security
8.5.2.3.1. McAfee Enterprise Log Manager
8.5.2.4. Kiwi Syslog Server
8.5.2.5. LogEntries
8.5.2.6. LogRythm
8.5.2.7. Logscape
8.5.2.8. Open Source
8.5.2.8.1. Elasticsearch (ELK Stack)
8.5.2.8.2. SEC (Simple Event Correlator)
8.5.2.8.3. OSSIM
8.5.2.8.4. Syslog-NG
8.5.2.8.5. Octopussy
8.5.2.9. Sawmill
8.5.2.10. Splunk
8.5.2.11. Sumo Logic
8.5.2.12. Tripwire
8.5.2.13. XpoLog
8.5.3. SIEM
8.5.3.1. AlienVault
8.5.3.1.1. OSSIM
8.5.3.2. CorreLog
8.5.3.3. EventTracker
8.5.3.4. HP
8.5.3.4.1. Arcsight
8.5.3.5. Hexis Cyber Solutions
8.5.3.5.1. Hawkeye AP
8.5.3.6. IBM
8.5.3.6.1. Q1Radar
8.5.3.7. IGLOO Security
8.5.3.8. LogPoint
8.5.3.8.1. http://www.logpoint.com/en/
8.5.3.9. LogRythm
8.5.3.10. Intel Security
8.5.3.10.1. NitroSecurity
8.5.3.11. Novell
8.5.3.11.1. Sentinel
8.5.3.12. RSA
8.5.3.12.1. Envision
8.5.3.13. Sensage
8.5.3.14. Solarwinds
8.5.3.15. Splunk
8.5.3.16. Sqrrl
8.5.3.17. Tibco
8.5.3.17.1. Loglogic
8.5.3.18. eIQnetworks
8.5.4. Security Analytics
8.5.4.1. Anomaly Analytics
8.5.4.1.1. Intel
8.5.4.1.2. Theta Ray
8.5.4.1.3. Prelert
8.5.4.2. User and Entity Behavior Analytics (UEBA)
8.5.4.2.1. Bay Dynamics
8.5.4.2.2. Darktrace
8.5.4.2.3. Exabeam
8.5.4.2.4. Fortscale
8.5.4.2.5. Gurcul
8.5.4.2.6. HP
8.5.4.2.7. IBM
8.5.4.2.8. Interset
8.5.4.2.9. Microsoft
8.5.4.2.10. Niara
8.5.4.2.11. Platfora
8.5.4.2.12. Secureonix
8.5.5. Threat Investigation and Analysis Platforms
8.5.5.1. BAE System Detica
8.5.5.1.1. Cybereveal
8.5.5.2. IKANow
8.5.5.3. Maltego
8.5.5.4. Palentir
8.5.5.4.1. Cyber
8.5.6. User and Entity Behavior Analytics (UEBA)
8.5.6.1. Bae Systems Applied Intelligence
8.5.6.2. Bay Dynamics
8.5.6.3. Caspida
8.5.6.4. Click Security
8.5.6.5. Exabeam
8.5.6.6. FICO
8.5.6.7. Fortscale
8.5.6.8. GuruCul
8.5.6.9. IBM
8.5.6.10. Intellinx
8.5.6.11. Lockheed Martin
8.5.6.12. Logtrust
8.5.6.13. Mobile System 7
8.5.6.14. Novetta Solutions
8.5.6.15. Oracle
8.5.6.16. Raytheon
8.5.6.17. SAS Institute
8.5.6.18. Secureonix
8.5.6.19. Splunk
9. Managed Security Services
9.1. Indirect Providers
9.1.1. Emerging Asia Pacific
9.1.1.1. India
9.1.1.1.1. CSS Corp PVT
9.1.1.1.2. Happiest Minds
9.1.1.1.3. SunGard Availability Services
9.1.1.1.4. Ecomnets India PVT. LTD
9.1.2. Europe
9.1.2.1. BT Global Services
9.1.2.2. Dell SecureWorks
9.1.2.3. Germany
9.1.2.3.1. Link11 GMBH
9.1.2.3.2. IPsoft
9.1.2.4. HP
9.1.2.5. Happiest Minds
9.1.2.5.1. Advanced Malware Protection
9.1.2.5.2. Application Activity Monitoring
9.1.2.5.3. Compliance Reporting
9.1.2.5.4. Database Activity Monitoring
9.1.2.5.5. File Integrity Monitoring
9.1.2.5.6. Log Management
9.1.2.5.7. Managed DLP
9.1.2.5.8. Network Forensics
9.1.2.5.9. SIEM
9.1.2.5.10. Unified Threat Management
9.1.2.5.11. Vulnerability Assessment
9.1.2.6. Integralis
9.1.2.7. Navisite
9.1.2.7.1. Mobile Device Management
9.1.2.8. Open Systems
9.1.2.9. Open Systems
9.1.2.10. Orange Business Services
9.1.2.11. SecureData
9.1.2.11.1. Firewall
9.1.2.11.2. IDS/IPS
9.1.2.11.3. SIEM
9.1.2.11.4. Data Loss Prevention
9.1.2.11.5. Secure Web Gateway
9.1.2.11.6. Secure Email Gateway
9.1.2.11.7. VPN/Remote Access
9.1.2.12. SunGard Availability Services
9.1.2.12.1. Firewalls
9.1.2.12.2. IAM
9.1.2.12.3. Intrusion Prevention
9.1.2.12.4. SIEM
9.1.2.12.5. Unified Threat Management
9.1.2.12.6. VPN
9.1.2.12.7. Web Application Firewall
9.1.2.13. Symantec
9.1.2.14. T-Systems
9.1.2.15. Tata Communications
9.1.2.16. Telefonica
9.1.2.16.1. DDoS Protection Service
9.1.2.16.2. Email Encryption
9.1.2.16.3. Email Security Gateway
9.1.2.16.4. Firewall Management
9.1.2.16.5. IAM
9.1.2.16.6. Intrusion Detection
9.1.2.16.7. Intrusion Prevention
9.1.2.16.8. Log Management
9.1.2.16.9. SIEM
9.1.2.16.10. Vulnerability Assessment
9.1.2.16.11. Web Security Gateway
9.1.2.16.12. Anti-Fraud
9.1.2.17. Verizon Business
9.1.2.17.1. Anti-DDoS
9.1.2.17.2. Email Security
9.1.2.17.3. Endpoint Protection
9.1.2.17.4. Firewall Management
9.1.2.17.5. Intrusion Detection
9.1.2.17.6. Intrusion Prevention
9.1.2.17.7. SIEM
9.1.2.17.8. Vulnerability Assessment
9.1.2.17.9. Web Security
9.1.2.18. Wipro
9.1.2.18.1. Email Security Gateway
9.1.2.18.2. Endpoint Security
9.1.2.18.3. Firewall Management
9.1.2.18.4. Fraud Management/Anti-Money Laundering
9.1.2.18.5. GRC
9.1.2.18.6. IAM
9.1.2.18.7. Intrusion Detection
9.1.2.18.8. Intrusion Prevention
9.1.2.18.9. SIEM
9.1.2.18.10. User Access Management
9.1.2.18.11. Web Security Gateway
9.1.3. Global Providers
9.1.3.1. AT&T
9.1.3.1.1. DDos Protection
9.1.3.1.2. Email/Data Encryption Services
9.1.3.1.3. Endpoint Anti-Virus
9.1.3.1.4. Endpoint Patch Management
9.1.3.1.5. Endpoint Policy Compliance
9.1.3.1.6. Mobile Device Security
9.1.3.1.7. Secure Email Gateway
9.1.3.1.8. Security Device Management
9.1.3.1.9. Web Application Firewall
9.1.3.1.10. Web Gateway (URL & Malware Filtering)
9.1.3.2. BEW Global
9.1.3.2.1. Data Loss Prevention
9.1.3.2.2. Web Security Gateway
9.1.3.2.3. Email Security Gateway
9.1.3.2.4. SIEM
9.1.3.2.5. Vulnerability Assessment
9.1.3.3. BT
9.1.3.4. Dell Secureworks
9.1.3.4.1. Advanced Malware Protection
9.1.3.4.2. Email Security Gateway
9.1.3.4.3. Firewall Management
9.1.3.4.4. Host IPS
9.1.3.4.5. IDS/IPS
9.1.3.4.6. Log Management
9.1.3.4.7. Log Retention
9.1.3.4.8. SIEM
9.1.3.4.9. Threat Intelligence
9.1.3.4.10. Unified Threat Management
9.1.3.4.11. Vulnerability Assessment
9.1.3.4.12. Web Application Firewall
9.1.3.4.13. Web Application Vulnerability Assessment
9.1.3.5. Dimension Data
9.1.3.6. HP
9.1.3.6.1. Access Managment
9.1.3.6.2. Data Loss Prevention
9.1.3.6.3. Email Security Gateway
9.1.3.6.4. Endpoint Encryption
9.1.3.6.5. Endpoint Protection
9.1.3.6.6. Intrusion Detection
9.1.3.6.7. Intrusion Prevention
9.1.3.6.8. Managed Incident Response
9.1.3.6.9. Remote Access Management
9.1.3.6.10. SIEM
9.1.3.6.11. Vulnerability Assessment
9.1.3.6.12. Web Application Vulnerability Assessment
9.1.3.6.13. Web Security Gateway
9.1.3.7. IBM
9.1.3.7.1. Email Security Gateway
9.1.3.7.2. Endpoint Patch Management
9.1.3.7.3. Endpoint Policy Management
9.1.3.7.4. Endpoint Protection
9.1.3.7.5. Firewall Management
9.1.3.7.6. IAM
9.1.3.7.7. Intrusion Detection
9.1.3.7.8. Intrusion Prevention
9.1.3.7.9. Log Management
9.1.3.7.10. Mobile Device Security
9.1.3.7.11. SIEM
9.1.3.7.12. Unified Threat Management
9.1.3.7.13. Vulnerability Assessment
9.1.3.7.14. Web Security Gateway
9.1.3.7.15. Web Vulnerability Assessment
9.1.3.8. Telstra
9.1.3.9. Verizon Business
9.1.3.9.1. Anti-DDoS
9.1.3.9.2. Email Security
9.1.3.9.3. Endpoint Protection
9.1.3.9.4. Firewall Management
9.1.3.9.5. Intrusion Detection
9.1.3.9.6. Intrusion Prevention
9.1.3.9.7. SIEM
9.1.3.9.8. Vulnerability Assessment
9.1.3.9.9. Web Security
9.1.4. Greater China
9.1.4.1. Hong Kong
9.1.4.1.1. Network Box
9.1.4.1.2. Netswitch
9.1.4.2. BEW Global
9.1.4.2.1. Data Loss Prevention
9.1.4.2.2. Web Security Gateway
9.1.4.2.3. Email Security Gateway
9.1.4.2.4. SIEM
9.1.4.2.5. Vulnerability Assessment
9.1.4.3. Beijing
9.1.4.3.1. Netswitch
9.1.5. Latin America
9.1.5.1. Brazil
9.1.5.1.1. Arcon
9.1.5.1.2. Netcentrics
9.1.5.1.3. RealProtect
9.1.5.1.4. UOL Diveo
9.1.6. Mature Asia Pacific
9.1.6.1. Australia
9.1.6.1.1. Tesserent
9.1.6.1.2. Verizon
9.1.6.2. Singapore
9.1.6.2.1. e-Cop
9.1.6.2.2. NTT Singapore
9.1.6.2.3. Happiest Minds
9.1.6.2.4. Singtel
9.1.6.2.5. NCS Group
9.1.7. Middle East and North Africa
9.1.7.1. Saudi Arabia
9.1.7.2. United Arab Emirates
9.1.7.2.1. Du Telecom
9.1.7.2.2. Tata Communications
9.1.7.2.3. Dell Secureworks
9.1.7.2.4. Dimension Data
9.1.8. North America
9.1.8.1. Canada
9.1.8.1.1. Above Security
9.1.8.1.2. Bell Canada
9.1.8.1.3. EWA
9.1.8.1.4. Happiest Minds
9.1.8.1.5. Netpulse
9.1.8.1.6. OneStone (Formerly Seccuris)
9.1.8.1.7. SecureData
9.1.8.1.8. SentryMetrics
9.1.8.1.9. SunGard Availability Services
9.1.8.1.10. Virtual Guardian
9.1.8.2. United States
9.1.8.2.1. AT&T
9.1.8.2.2. Above Security
9.1.8.2.3. Alert Logic
9.1.8.2.4. Allstream
9.1.8.2.5. CGI
9.1.8.2.6. CSC
9.1.8.2.7. CSS Corp
9.1.8.2.8. CentraComm
9.1.8.2.9. CenturyLink- Savvis
9.1.8.2.10. Clone Systems
9.1.8.2.11. Compucom Systems
9.1.8.2.12. Cosentry
9.1.8.2.13. Dell Secureworks
9.1.8.2.14. Earthlink
9.1.8.2.15. Esentire
9.1.8.2.16. HCL Technologies
9.1.8.2.17. HP
9.1.8.2.18. Happiest Minds
9.1.8.2.19. IBM
9.1.8.2.20. Leidos
9.1.8.2.21. LunarLine
9.1.8.2.22. Masergy Communications
9.1.8.2.23. Megapath
9.1.8.2.24. NCA - Network Computing Architects
9.1.8.2.25. Navisite
9.1.8.2.26. Netfortris
9.1.8.2.27. Nuspire Networks
9.1.8.2.28. Secure Designs
9.1.8.2.29. SilverSky (Formerly Stillsecure/Perimeter esecurity)
9.1.8.2.30. Solutionary
9.1.8.2.31. SunGard Availability Services
9.1.8.2.32. Sword and Shield
9.1.8.2.33. Symantec
9.1.8.2.34. Symantec
9.1.8.2.35. Tesserent
9.1.8.2.36. Trustwave
9.1.8.2.37. Verizon Business
9.1.8.2.38. Wipro
9.1.8.2.39. Rook Security
9.1.8.2.40. Netswitch
9.1.9. Sub-Sahara Africa
9.1.9.1. AccessKenya
9.1.9.1.1. Firewall
9.1.9.1.2. Endpoint Protection
9.1.9.1.3. Secure Web Gateway
9.2. Direct Tech Providers Managed Security
9.2.1. Asia Pacific
9.2.1.1. Australia
9.2.1.2. China
9.2.1.2.1. NSFOCUS
9.2.1.3. Singapore
9.2.2. Europe
9.2.2.1. GoGrid
9.2.2.1.1. Compliance Reporting (PCI, HIPAA)
9.2.2.1.2. Host IDS
9.2.2.1.3. Log Management
9.2.2.1.4. SIEM
9.2.2.1.5. Vulnerability Assessment
9.2.3. Global Providers
9.2.4. Middle East and North Africa
9.2.4.1. Saudi Arabia
9.2.4.2. United Arab Emirates
9.2.5. North America
9.2.5.1. United States
9.2.5.1.1. NSFOCUS
9.2.5.1.2. Check Point Software
9.2.5.1.3. Network Box
9.2.5.1.4. GoGrid
10. Security Consulting & Implementation
10.1. Providers by Region
10.1.1. Latin America
10.1.2. Mature Asia/Pacific
10.1.3. Middle East and North Africa
10.1.3.1. Saudi Arabia
10.1.3.1.1. GBM
10.1.3.1.2. PGI
10.1.4. North America
10.1.4.1. Accuvant
10.1.4.2. AppsecConsulting
10.1.4.3. CSC
10.1.4.4. Control Case
10.1.4.5. CrowdStrike
10.1.4.6. Dell Secureworks
10.1.4.7. Deloitte
10.1.4.8. Denim Group
10.1.4.9. Ernst & Young
10.1.4.10. FireEye
10.1.4.11. Fishnet
10.1.4.12. ForSythe Solutions
10.1.4.13. Grant Thornton
10.1.4.14. HP
10.1.4.15. IBM
10.1.4.16. IOActive
10.1.4.17. Leidos
10.1.4.18. Intel Security (Foundstone)
10.1.4.19. NTT Com Security
10.1.4.20. Neohapsis
10.1.4.21. PWC
10.1.4.22. Paladion Networks
10.1.4.23. Perimeter eSecurity
10.1.4.24. Protivity
10.1.4.25. SISA
10.1.4.26. Solutionary
10.1.4.27. Stroz Friedberg
10.1.4.28. Sungard
10.1.4.29. Sword and Shield
10.1.4.30. Symantec
10.1.4.31. Sysnet Global Solutions
10.1.4.32. Tevora Business Solutions
10.1.4.33. Trustwave
10.1.4.34. Verizon
10.1.4.35. WhiteHat Security
10.1.4.36. Zensar Technologies
10.1.5. Western Europe
10.1.5.1. Italy
10.1.5.1.1. KBE.it
10.1.5.1.2. Consulthink SPA
10.1.5.2. United Kingdom
10.1.5.2.1. FOX-IT
10.1.6. Greater China
10.1.7. South Africa
10.1.7.1. Cyanre
10.1.7.1.1. http://www.cyanre.co.za/
10.1.8. Governance
10.1.8.1. Accuvant
10.1.8.2. Fishnet Security
10.1.8.3. FOX-IT
10.1.8.4. Sec Consult
10.1.9. Eurasia
10.1.9.1. Russia
10.1.10. Emerging Asia/Pacific
10.1.11. Eastern Europe
10.1.12. Canada
10.1.12.1. Conexsys
10.2. Governance, Advisory, Assessment
10.2.1. Architecture and Design
10.2.2. Business Continuity
10.2.3. Compliance Review
10.2.4. Data Security Program
10.2.5. Governance
10.2.6. Governance, Compliance and Policy Design
10.2.6.1. Compliance Mandates
10.2.6.1.1. PCI
10.2.6.1.2. ISO
10.2.6.1.3. HITECH
10.2.6.1.4. HIPAA
10.2.7. People Centric Strategy
10.2.8. Policy Design
10.2.9. Program Assessment
10.2.10. Risk Assessment
10.2.11. Risk Management
10.2.11.1. Booz Allen Hamilton
10.2.11.2. Accuvant
10.2.11.3. Cloud Risks
10.2.11.4. On Premise Infrastructure
10.2.11.5. Business Risk
10.2.12. Security Program Development
10.2.12.1. Accuvant
10.2.12.2. Fishnet
10.2.12.3. FOX-IT
10.2.13. Strategy
10.3. Operations
10.3.1. Application Security
10.3.1.1. Web
10.3.1.1.1. AppSec Consulting
10.3.1.1.2. Denim Group
10.3.1.2. Mobile
10.3.1.2.1. AppSec Consulting
10.3.1.2.2. Denim Group
10.3.2. Application Security Vulnerability Assessement
10.3.3. Configuration Assessment
10.3.4. Device Security
10.3.5. Fraud, Identification and Privacy
10.3.6. Incident Response
10.3.6.1. Digital Forensics
10.3.6.1.1. Accuvant
10.3.6.1.2. Blackthorn Technologies
10.3.6.1.3. Dell Secureworks
10.3.6.1.4. Deloitte
10.3.6.1.5. E&Y
10.3.6.1.6. EY
10.3.6.1.7. FOX-IT
10.3.6.1.8. Fishnet Security
10.3.6.1.9. High Tech Bridge
10.3.6.1.10. PWC
10.3.6.1.11. TrustMatta
10.3.6.1.12. Sec Consult
10.3.6.2. Digital Investigations
10.3.6.2.1. FOX-IT
10.3.6.2.2. Deloitte
10.3.6.2.3. EY
10.3.6.2.4. Fishnet Security
10.3.6.2.5. PWC
10.3.7. Penetration Testing
10.3.7.1. AppSec Consulting
10.3.7.2. Core Security
10.3.7.3. Element Digital Security
10.3.7.4. FOX-IT
10.3.7.5. High Tech Bridge
10.3.7.6. Matasano Security
10.3.7.7. NCC Group
10.3.7.8. Rapid7
10.3.7.9. Secureworks
10.3.7.10. TrustMatta
10.3.7.11. WhiteHat Security
10.3.8. Remote Access
10.3.9. Secure Code Review
10.3.10. Threat Intelligence
10.3.11. Vulnerability Scan
10.4. Forensics
10.4.1. Forensics
10.4.1.1. Compliance & Investigative Analytics
10.4.1.2. Cybercrime & Data Breach
10.4.1.3. E-Discovery & Computer Forensics
10.4.1.4. Endpoint Forensics
10.4.1.5. Network Forensics
11. Risk, Compliance and Security Management
11.1. Firewall Workflow,Modeling & Change Management
11.1.1. Checkpoint Software
11.1.2. Firemon
11.1.3. ManageEngine
11.1.4. Redseal Networks
11.1.5. Skybox
11.1.6. Tufin
11.2. Regulations, Awareness and Training
11.2.1. Computer Based Training
11.2.1.1. Aujas
11.2.1.2. BeOne Development
11.2.1.3. Digital Defense
11.2.1.4. Fishnet Security
11.2.1.5. Inspired eLearning
11.2.1.6. Junglemap
11.2.1.7. KnowBe4
11.2.1.8. MediaPro
11.2.1.9. PhishMe
11.2.1.10. Phishline
11.2.1.11. Popcorn Training
11.2.1.12. Sans Institute
11.2.1.13. Scipp International
11.2.1.14. Secure Mentem
11.2.1.15. Security Innovation
11.2.1.16. Security Mentor
11.2.1.17. The Security Awareness Company
11.2.1.18. ThreatSim
11.2.1.19. Wombat Security Technologies
11.2.2. Educational, Awareness & News Outlets
11.2.2.1. Government Led
11.2.2.1.1. Information Sharing and Analysis Centers (ISACs)
11.2.2.2. Periodicals & Target Roles
11.2.2.2.1. Channel
11.2.2.2.2. CISO/CSO
11.2.2.2.3. Security Engineers/Analysts
11.2.3. Industry Standards/Groups
11.2.3.1. Standards
11.2.3.1.1. Technical
11.2.3.2. Industry Groups
11.2.3.2.1. Audit
11.2.3.2.2. General Security
11.2.3.2.3. Forensics
11.2.4. Regulations, Public Standards and Contractual Mandates
11.2.4.1. Global
11.2.4.1.1. Payment Card Industry Data Security Standards (PCIDSS)
11.2.4.1.2. NIST
11.2.4.2. Country/Region Specific
11.2.4.2.1. China
11.2.4.2.2. Singapore
11.2.4.2.3. European Union
11.2.4.2.4. United States
11.3. Legal and regulatory information governance
11.4. Privacy
11.5. Security Policy and Response Orchaestration Platforms
11.5.1. Proofpoint
11.5.2. CSG Invotas
11.6. Security Program and Governance
11.6.1. Fraud Prevention/Web Malware Monitoring
11.6.1.1. Fraud Prevention
11.6.1.1.1. Software
11.6.1.1.2. Appliances
11.6.1.1.3. Software as a Service
11.6.1.1.4. Virtual Appliances
11.6.1.2. Website & Ad Malware Monitoring
11.6.1.2.1. Ad-Juster
11.6.1.2.2. Globalsign
11.6.1.2.3. Hackalert
11.6.1.2.4. Intel Security
11.6.1.2.5. QualysGuard
11.6.1.2.6. RiskIQ
11.6.1.2.7. Sucuri
11.6.2. Governance, Risk and Compliance
11.6.2.1. eGRC
11.6.2.1.1. Software as a Service
11.6.2.1.2. Software
11.6.2.2. Compliance Oriented Private Cloud Hosting (COPCH)
11.6.2.2.1. Note: This list is not an attestation of compliance
11.6.2.3. itGRCM
11.6.2.3.1. Agiliance
11.6.2.3.2. Allgress
11.6.2.3.3. Blackthorn Technologies
11.6.2.3.4. Brinqa
11.6.2.3.5. ControlCase
11.6.2.3.6. DF Labs
11.6.2.3.7. EMC-RSA
11.6.2.3.8. LockPath
11.6.2.3.9. Lumension Security
11.6.2.3.10. Microsoft
11.6.2.3.11. Modulo
11.6.2.3.12. Nasdaq Bwise
11.6.2.3.13. Rsam
11.6.2.3.14. Software as a Service
11.6.2.3.15. Symantec
11.6.2.3.16. Telos
11.6.2.3.17. WCK GRC Software
11.6.2.4. Operational Risk Analytics
11.6.2.4.1. Algosec
11.6.2.4.2. Cytegic
11.6.2.4.3. Firemon
11.6.2.4.4. IBM
11.6.2.4.5. Redseal Networks
11.6.2.4.6. RiskIO
11.6.2.4.7. Skybox
11.6.2.4.8. Software Development Lifecycle
11.6.2.4.9. Solarwinds
11.6.2.4.10. Tufin
11.6.2.5. Cloud & Container Compliance Assessment
11.6.2.5.1. Cavirin
12. Emerging Security Markets & Technologies
12.1. Application Security
12.1.1. Runtime Application Self Protection
12.1.1.1. Metaforic
12.1.1.2. Arxan
12.2. Cloud Security
12.2.1. Cloud Protection Gateways
12.2.1.1. CipherCloud
12.2.1.2. Netskope
12.2.1.3. Perspecsys
12.2.1.4. Skyhigh Networks
12.2.1.5. Vaultive
12.2.2. Cloud Access Security Brokers
12.2.2.1. User Activity Monitoring
12.2.2.1.1. Adallom
12.2.2.1.2. Bitglass
12.2.2.1.3. Elastica
12.2.2.1.4. Harvest.ai
12.2.2.1.5. Imperva
12.2.2.1.6. Netscope
12.2.2.1.7. SkyHigh Networks
12.2.2.2. Data Loss Prevention
12.2.2.2.1. DLP-Lite
12.2.2.2.2. Harvest.ai
12.2.2.3. Encryption
12.2.2.3.1. SkyHigh Networks
12.2.2.3.2. Adallom
12.2.2.3.3. Managed Methods
12.2.2.4. Identity and Access Management
12.2.2.4.1. Centrify
12.2.2.4.2. Cloudiway
12.2.2.4.3. Okta
12.2.2.4.4. Ping
12.2.2.5. Access Control
12.2.2.5.1. Adallom
12.2.2.5.2. Bitglass
12.2.2.5.3. Elastica
12.2.2.5.4. FireLayers
12.2.2.5.5. Netskope
12.2.2.5.6. Skyfence
12.2.2.5.7. Managed Methods
12.2.3. Cloud Application Discovery
12.2.3.1. Ciphercloud
12.2.3.2. Elastica
12.2.3.3. Netskope
12.2.3.4. Skyhigh
12.3. Data Security
12.4. Endpoint Security
12.4.1. Endpoint Detection and Response
12.4.1.1. Agent-Based
12.4.1.1.1. Bit9
12.4.1.1.2. Cisco
12.4.1.1.3. Confer
12.4.1.1.4. Countertack
12.4.1.1.5. CrowdStrike
12.4.1.1.6. Cyberreason
12.4.1.1.7. Cylance
12.4.1.1.8. Digital Guardian
12.4.1.1.9. Dtex Systems
12.4.1.1.10. Endgame Systems
12.4.1.1.11. Fidelis Cybersecurity
12.4.1.1.12. FireEye
12.4.1.1.13. Forescout
12.4.1.1.14. Guidance Software
12.4.1.1.15. Hexis Cyber Solutions
12.4.1.1.16. Invincea
12.4.1.1.17. LogRhythm
12.4.1.1.18. NexThink
12.4.1.1.19. Panda Security
12.4.1.1.20. RSA (EMC)
12.4.1.1.21. SecDo
12.4.1.1.22. SentinelOne
12.4.1.1.23. Tanium
12.4.1.1.24. Triumfant
12.4.1.1.25. Ziften
12.4.1.2. Agentless
12.4.1.2.1. Cynet
12.4.1.2.2. Fidelis
12.4.1.2.3. ForeScout
12.4.1.2.4. Hexadite
12.4.1.2.5. Hexis Cyber Solutions
12.4.1.2.6. LightCyber
12.4.1.2.7. Outlier Security
12.4.1.2.8. Promisec
12.5. Identification, Authentication, Access Control & IAM
12.6. Internet of Things
12.7. Network & Infrastructure Security
12.7.1. Advanced Content Disarming (ACD)
12.7.1.1. Check Point Software
12.7.1.1.1. Threat Extraction
12.7.1.2. Glasswall
12.7.1.2.1. http://www.glasswallsolutions.com/
12.7.1.3. OPSWAT
12.7.1.4. Re-Sec
12.7.1.4.1. http://www.re-sec.com/
12.7.1.5. Sasa-Software
12.7.1.5.1. http://www.sasa-software.com/
12.7.1.6. Symantec
12.7.1.6.1. DisArm
12.7.1.7. TreSys
12.7.1.7.1. http://www.tresys.com/
12.7.1.8. Votiro
12.7.1.8.1. http://www.votiro.com/
12.7.2. Unauthorized Connection Prevention
12.7.2.1. Ensilo
12.7.3. Malware Infection Analysis and Monitoring Services
12.7.3.1. Lastline
12.7.3.1.1. Guardia
12.7.3.2. OpenDNS
12.7.3.3. Qualys
12.7.3.4. Seculert
12.7.4. Network Behavior and Analytics
12.7.4.1. Industrial Control Systems (ICS)
12.7.4.1.1. CyberX
12.8. Risk, Compliance and Security Management
12.8.1. Security Ratings & Insurance
12.8.1.1. Security Ratings
12.8.1.1.1. Bitsight Technologies
12.8.1.1.2. SecurityScoreCard
12.8.1.2. Cyber Risk Insurance
12.8.1.2.1. Balsiger Insurance
12.8.1.2.2. HSB Group
12.8.1.2.3. Philadelphia Insurance Companies
12.8.1.2.4. Tennant Risk Services
12.8.1.2.5. The Hartford
12.8.1.2.6. Travelers
12.9. Security Operations, Incident Response
12.9.1. Intelligence/Data Feeds/Software & Services
12.9.1.1. Security Intelligence and Data Analysis Platforms
12.9.1.1.1. CSG International
12.9.1.2. Threat Intelligence Platforms
12.9.1.2.1. BAE Systems
12.9.1.2.2. BrightPoint Security
12.9.1.2.3. Codenomicon
12.9.1.2.4. Comilion
12.9.1.2.5. Confer
12.9.1.2.6. IID
12.9.1.2.7. Lockheed Martin
12.9.1.2.8. Lookingglass Cyber Solutions
12.9.1.2.9. Palentir
12.9.1.2.10. Soltra
12.9.1.2.11. ThreatConnect
12.9.1.2.12. ThreatQuotient
12.9.1.2.13. ThreatStream
12.9.1.2.14. TruStar
12.9.1.3. Threat Intelligence Services
12.9.1.3.1. Human Intelligence - HUMINT (Strategic)
12.9.1.3.2. Machine-Based (Tactical)
12.9.2. Malware Analysis
12.9.2.1. Malware Analysis as a Service
12.9.2.1.1. Free Services
12.9.2.1.2. ReversingLabs
12.9.2.1.3. ThreatGrid
12.9.2.2. Sandbox Software
12.9.2.2.1. GFI
12.9.2.2.2. Joesecurity
12.9.2.2.3. Bluecoat
12.9.2.2.4. Payload Security
12.9.2.3. Firewalls
12.9.2.3.1. Palo Alto Networks
12.9.2.3.2. CheckPoint Software
12.9.2.3.3. Fortinet
12.9.3. Threat Deception Technologies
12.9.3.1. Decoy Endpoints
12.9.3.1.1. Atomic Software Solutions
12.9.3.1.2. Attivo Networks
12.9.3.1.3. Cymmetria
12.9.3.1.4. GuardiCore
12.9.3.1.5. KeyFocus
12.9.3.1.6. Specter
12.9.3.1.7. TrapX
12.9.3.2. Network
12.9.3.2.1. ForeScout
12.9.3.2.2. Shadow Networks
12.9.3.2.3. Juniper Networks
12.9.3.3. Open Source
12.9.3.3.1. Honeypot
12.9.3.4. Web
12.9.3.4.1. Shape Security
12.9.3.4.2. Juniper Networks
12.9.3.5. Active Endpoint
12.9.3.5.1. Javelin Networks
12.9.3.5.2. PreeDat Security
12.9.3.5.3. Preedat
12.10. Cross Domain Solutions
12.10.1. Advenica
12.10.1.1. ZoneGuard
12.10.1.2. SecuriRam
12.10.2. General Dynamics
12.10.2.1. TacGuard
12.10.2.2. Crossing Guard
12.10.2.3. NanoXD
12.10.3. LockHeed Martin
12.10.3.1. Trusted Manager