Security Operations & Incident Response - by Lawrence Pingree

登録は簡単!. 無料です
または 登録 あなたのEメールアドレスで登録
Security Operations & Incident Response - by Lawrence Pingree により Mind Map: Security Operations & Incident Response - by Lawrence Pingree

1. Digital Forensics/eDiscovery

1.1. Content, File and Endpoint Forensics

1.1.1. eDiscovery

1.1.1.1. Access Data

1.1.1.2. Autonomy

1.1.1.3. Barracuda Networks

1.1.1.4. Clearwell

1.1.1.5. FTI Technology

1.1.1.6. Guidance Software

1.1.1.7. Kazeon

1.1.1.8. kCura

1.1.2. Mobile Devices

1.1.2.1. BlackBagTech

1.1.2.2. Cellebrite

1.1.2.3. Compelson Labs

1.1.2.4. Guidance Software

1.1.2.5. MSAB

1.1.2.6. NowSecure

1.1.2.7. Oxygen Forensics

1.1.2.8. Paraben Corporation

1.1.3. Endpoint Computing Systems

1.1.3.1. Access Data

1.1.3.2. ADF Solutions

1.1.3.2.1. http://www.adfsolutions.com/

1.1.3.3. ArxSys

1.1.3.4. BlackBag Technologies

1.1.3.5. BrazenCloud

1.1.3.6. CRU Inc

1.1.3.6.1. Ditto Forensic FieldStation

1.1.3.7. Cyfir

1.1.3.8. Guidance Software

1.1.3.9. Magnet Forensics

1.1.3.9.1. http://www.magnetforensics.com/

1.1.3.10. Nuix

1.1.3.11. OSForensics

1.1.3.12. Paraben Corporation

1.1.3.13. WindowsScope

1.1.3.14. X-Ways Forensics

1.1.4. Email Examination

1.1.4.1. Systools Software

1.1.4.1.1. MailXaminer

1.1.4.2. Nuix

1.1.5. Digital Forensics Case Management

1.1.5.1. Axxera

1.1.5.1.1. http://www.axxera4n6.com/index.html

1.1.5.2. D3 Security

1.1.5.2.1. https://www.d3security.com/products/it-forensics-software/

1.1.5.3. Digital Investigation Manager

1.1.5.3.1. http://digitalinvestigationmanager.com/

1.1.5.4. Guidance Software

1.1.5.4.1. https://www2.guidancesoftware.com/products/Pages/encase-enterprise/case-management.aspx

1.1.5.5. Intaforensiscs

1.1.5.5.1. http://www.intaforensics.com/software/lima-product-suite/

1.1.5.6. Sentinel Data

1.1.5.6.1. http://sentineldata.com/atlas-digital-forensic-case-management/

1.1.5.7. Sirentech

1.1.5.7.1. http://www.sirentec.com/

1.1.5.8. Wynyard Group

1.1.5.8.1. https://www.wynyardgroup.com/us/solutions/digital-evidence-investigator/

1.1.6. Memory Forensics

1.1.6.1. FireEye

1.1.6.2. Guidance Software

1.1.6.3. Volatility Framework

1.1.6.4. WindowsScope

1.1.6.5. BrazenCloud

1.2. Forensic File & Data Analysis Tools

1.2.1. Cellebrite

1.2.2. Cyfir

1.2.3. Intella

1.2.4. Magnet Forensics

1.2.5. Nuix

1.2.6. Systools Software

1.3. eDiscovery Services

1.3.1. Robert Half

1.3.2. Advanced Discovery

1.4. eDiscovery Software

1.4.1. AccessData

1.4.2. Guidance Software

1.4.3. Nuix

1.4.4. Symantec

2. Fraud Prevention/Web Malware Monitoring

2.1. Fraud/Bot/Webscrape Prevention

2.1.1. Software

2.1.1.1. CallSign

2.1.1.2. Digital Resolve

2.1.1.3. Elastic Beam

2.1.1.4. FeedZai

2.1.1.5. IBM (Formerly Trusteer)

2.1.1.6. Intellinx

2.1.1.7. RSA (EMC)

2.1.1.8. ShieldSquare

2.1.2. Appliances

2.1.2.1. Distil Networks

2.1.2.2. Elastic Beam

2.1.2.3. Imperva

2.1.2.4. RSA (EMC)

2.1.2.5. Shape Security

2.1.2.6. White Ops

2.1.3. Software as a Service

2.1.3.1. Akamai

2.1.3.2. BioCatch

2.1.3.2.1. http://www.biocatch.com/

2.1.3.3. BotScout

2.1.3.4. CallSign

2.1.3.5. Digital Resolve

2.1.3.6. Imperva

2.1.3.7. FeedZai

2.1.3.8. Guardian Analytics

2.1.3.8.1. ACH/Wire Transaction Monitoring

2.1.3.9. iovation

2.1.3.10. Kount

2.1.3.11. MarkMonitor

2.1.3.12. namogoo

2.1.3.13. NuData Security

2.1.3.14. Shape Security

2.1.3.15. ShieldSquare

2.1.3.16. Signifyd

2.1.3.17. LexisNexus (Formerly ThreatMetrix)

2.1.3.18. White Ops

2.1.3.19. X-Cart

2.1.3.20. Zenedge

2.1.4. Virtual Appliances

2.1.4.1. Distil Networks

2.1.4.2. Elastic Beam

2.1.4.3. Imperva

2.1.4.4. ShieldSquare

2.2. Website & Ad Malware Monitoring

2.2.1. Ad-Juster

2.2.2. Globalsign

2.2.2.1. Leverages Hackalert

2.2.3. Hackalert

2.2.4. McAfee

2.2.4.1. Siteadvisor

2.2.5. QualysGuard

2.2.6. RiskIQ

2.2.7. Sucuri

2.2.8. The Media Trust

3. Incident Response Legal Services

3.1. Information Law Group

3.2. FoleyHoag

3.3. Ropes & Gray

3.4. Kroll

4. Security Information and Event Management (SIEM), Log Management & Analytics

4.1. Application Security Intelligence Engine

4.1.1. SAP

4.1.1.1. iT-Cube Systems

4.2. Log Management

4.2.1. EventTracker

4.2.2. IGLOO Security

4.2.3. Intel Security

4.2.3.1. McAfee Enterprise Log Manager

4.2.4. Kiwi Syslog Server

4.2.5. LogEntries

4.2.6. LogRythm

4.2.7. LogZilla

4.2.8. Logscape

4.2.9. Open Source

4.2.9.1. Elasticsearch (ELK Stack)

4.2.9.2. SEC (Simple Event Correlator)

4.2.9.3. OSSIM

4.2.9.3.1. http://trac.osgeo.org/ossim/

4.2.9.4. Syslog-NG

4.2.9.5. Octopussy

4.2.9.5.1. http://www.octopussy.pm/

4.2.10. Sawmill

4.2.11. Splunk

4.2.12. Sumo Logic

4.2.13. Tripwire

4.2.14. XpoLog

4.3. SIEM

4.3.1. AlienVault

4.3.1.1. OSSIM

4.3.2. CorreLog

4.3.3. Cybonet

4.3.4. EventTracker

4.3.5. Fortinet

4.3.6. HP

4.3.6.1. Arcsight

4.3.7. Hexis Cyber Solutions

4.3.7.1. Hawkeye AP

4.3.8. IBM

4.3.8.1. Q1Radar

4.3.9. IGLOO Security

4.3.10. LogPoint

4.3.10.1. http://www.logpoint.com/en/

4.3.11. LogRythm

4.3.12. LogZilla

4.3.13. McAfee

4.3.13.1. NitroSecurity

4.3.14. Novell

4.3.14.1. Sentinel

4.3.15. RSA

4.3.15.1. Envision

4.3.16. Sensage

4.3.17. Solarwinds

4.3.18. Splunk

4.3.19. Sqrrl

4.3.20. Tibco

4.3.20.1. Loglogic

4.3.21. eIQnetworks

4.4. Security Analytics

4.4.1. Anomaly Analytics

4.4.1.1. CTILab

4.4.1.2. eMite

4.4.1.3. Greylog

4.4.1.4. Intel

4.4.1.5. Niddel

4.4.1.6. Prelert

4.4.1.7. Security Onion

4.4.1.8. Theta Ray

4.4.1.9. Versive

4.4.2. User and Entity Behavior Analytics (UEBA)

4.4.2.1. Bae Systems Applied Intelligence

4.4.2.2. Bay Dynamics

4.4.2.3. Caspida

4.4.2.4. Click Security

4.4.2.5. CTILab

4.4.2.6. Darktrace

4.4.2.7. Detex Systems

4.4.2.8. Exabeam

4.4.2.9. FICO

4.4.2.10. Fortscale

4.4.2.11. GuruCul

4.4.2.12. HPE

4.4.2.12.1. Formerly Niara

4.4.2.12.2. HAVEn

4.4.2.13. IBM

4.4.2.13.1. Infosphere BIG Insights

4.4.2.14. Intellinx

4.4.2.15. Interset

4.4.2.16. Lockheed Martin

4.4.2.17. Logtrust

4.4.2.18. Microsoft

4.4.2.18.1. Acquired Aorato

4.4.2.19. Mobile System 7

4.4.2.20. Novetta Solutions

4.4.2.21. Oracle

4.4.2.22. Palerra

4.4.2.23. Platfora

4.4.2.24. Rapid7

4.4.2.25. Raytheon

4.4.2.26. Reveelium

4.4.2.27. SAS Institute

4.4.2.28. Secureonix

4.4.2.29. Splunk

4.4.2.30. Veriato

4.4.2.31. ZoneFox

4.4.3. Endpoint User Monitoring

5. Security Operations, Analytics and Reporting

5.1. Security Incident Response Platforms (SIRP)

5.1.1. Agiliance

5.1.2. DFLabs

5.1.3. Demisto

5.1.4. EMC(RSA)

5.1.5. Empow

5.1.6. Fido

5.1.7. Microsoft

5.1.7.1. Formerly Hexadite

5.1.8. ID Experts

5.1.9. Proofpoint

5.1.10. ServiceNow

5.1.11. Siemplify

5.1.12. Syncurity

5.1.13. IBM Resilient

5.1.13.1. Formerly Resilient Systems

5.2. Security Operations Automation Platforms (SOAPS)

5.2.1. Ayehu

5.2.2. Cyberbit

5.2.3. Cybersponse

5.2.4. Demisto

5.2.5. DFLabs

5.2.6. empow security

5.2.7. Fireye

5.2.8. Microsoft

5.2.9. IBM

5.2.10. Komand

5.2.11. LogicHub

5.2.12. Phantom Cyber

5.2.13. Siemplify

5.2.14. Swimlane

5.2.15. Syncurity

5.3. Security Orchestration, Automation and Response (SOAR)

5.3.1. Anomali

5.3.2. AtarLabs

5.3.3. Ayehu

5.3.4. BrazenCloud

5.3.5. Cyber Observer

5.3.6. Cybersponse

5.3.7. Cybraics

5.3.8. Cydarm

5.3.9. D3 Security

5.3.10. DFLabs

5.3.11. EclecticIQ

5.3.12. EMC(RSA)

5.3.13. IBM

5.3.14. Microsoft

5.3.15. Palo Alto networks

5.3.16. Proofpoint

5.3.17. Resolve Systems

5.3.18. Revelstoke

5.3.19. ServiceNow

5.3.20. Siemplify

5.3.21. Splunk

5.3.21.1. Formerly Phantom

5.3.22. Swimlane

5.3.23. Syncurity

5.3.24. ThreatConnect

5.3.25. ThreatQuotient

5.3.26. Tines

5.3.27. WitFoo

5.4. Threat Intelligence

5.5. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

5.5.1. Crowdsourced Application Security Testing Platforms

5.5.1.1. Hyver

5.5.1.2. Applause

5.5.1.3. Bugcrowd

5.5.1.4. BugFinders

5.5.1.5. Cobalt

5.5.1.6. Crowdtesters

5.5.1.7. HackerOne

5.5.2. Managed Penetration Testing Services

5.5.2.1. Cenzic

5.5.2.2. WhiteHatSecurity

5.5.3. Penetration Testing Software

5.5.3.1. Core Security

5.5.3.2. Rapid7

5.5.3.2.1. Metasploit Pro

5.5.3.2.2. Metasploit Express

5.5.3.3. Trustwave

5.5.4. Threat and Vulnerability Management (TVM)

5.5.4.1. Acuity Risk Management

5.5.4.2. Agiliance

5.5.4.3. BeyondTrust

5.5.4.4. Core Security

5.5.4.5. CTILab

5.5.4.6. Cybersponse

5.5.4.7. DFLabs

5.5.4.8. EMC(RSA)

5.5.4.9. Exodus Intelligence

5.5.4.10. Kenna Security

5.5.4.11. Kornic Glory

5.5.4.12. Lithik

5.5.4.13. NopSec

5.5.4.14. Recorded Future

5.5.4.15. RedSeal

5.5.4.16. Revolver RiskVision

5.5.4.17. Risk Based Security

5.5.4.18. RiskSense

5.5.4.19. Siemplify

5.5.4.20. Skybox Security

5.5.4.21. Swimlane

5.5.4.22. Vicarius

5.5.5. Vulnerability Assessment

5.5.5.1. Software as a Service

5.5.5.1.1. Vulnerability Management

5.5.5.1.2. Phish Testing/Management

5.5.5.2. Network-Based Vulnerability Assessment (On Premise)

5.5.5.2.1. Core Security

5.5.5.2.2. CTILab

5.5.5.2.3. Cybonet

5.5.5.2.4. Digital Defense

5.5.5.2.5. Fortinet

5.5.5.2.6. McAfee

5.5.5.2.7. Ncircle

5.5.5.2.8. Netasq

5.5.5.2.9. NSAuditor

5.5.5.2.10. Outpost24

5.5.5.2.11. Qualys

5.5.5.2.12. RandomStorm

5.5.5.2.13. Rapid 7

5.5.5.2.14. Trustwave

5.5.5.3. Mainframe Vulnerability Assessment

5.5.5.3.1. Key Resources Inc. (KRI)

5.5.5.4. Agent-Based Vulnerability Assessment

5.5.5.4.1. BeyondTrust

5.5.5.4.2. Qualys

5.5.5.4.3. Secunia

5.5.5.4.4. Tenable

5.5.6. Vulnerability Correlation

5.5.6.1. Code DX

5.5.6.2. Core Security

5.5.6.3. Cybric

5.5.6.4. Denim Group

5.5.6.4.1. ThreadFix

5.5.6.5. Kenna Security

5.5.6.6. Kenna Security

5.5.6.7. Neuralys

5.5.6.8. NopSec

5.5.6.9. NopSec

5.5.6.10. Nucleus Security

5.5.6.11. RiskSense

5.5.6.12. Secure Decisions

5.5.7. Vulnerability Research

5.5.7.1. CSC

5.5.7.2. HP

5.5.7.2.1. DV Labs

5.5.7.3. HotWAN

5.5.7.4. McAfee

5.5.7.5. SecNiche Labs

5.5.7.6. Sourcefire VRT

5.5.7.7. Symantec

5.5.7.8. VRLSec

5.5.7.9. Vupen

6. Threat Deception Technologies

6.1. Distributed Deception Platforms

6.1.1. Amgine Securus

6.1.2. Atomic Software Solutions

6.1.2.1. HoneyBot

6.1.3. Attivo Networks

6.1.4. Chaitin

6.1.5. CounterCraft

6.1.6. CyberFog

6.1.7. CyberTrap

6.1.8. Cymmetria

6.1.9. Fidelis Cybersecurity

6.1.10. FormalTech

6.1.11. Illusive Networks

6.1.12. JeeSeen

6.1.13. KeyFocus

6.1.14. SmokeScreen

6.1.15. Thinkst Applied Research (Canary)

6.1.16. TrapX

6.1.17. Vision Space Technologies

6.2. Files

6.2.1. Allure Security Technology

6.2.2. WatchPoint

6.3. Malware Anti-Evasion

6.3.1. Minerva Labs

6.4. Network

6.4.1. Hillstone Networks

6.4.2. PacketViper

6.4.3. Percipient Networks

6.4.4. Ridgeback Network Defense

6.4.5. Shadow Networks

6.5. Open Source

6.5.1. Honeypots

6.5.1.1. Database Honeypots

6.5.1.1.1. Delilah

6.5.1.1.2. ESpot

6.5.1.1.3. Elastic Honey

6.5.1.1.4. MongoDB-HoneyProxy

6.5.1.1.5. NoSQLpot

6.5.1.1.6. mysql

6.5.1.2. ICS/Scada

6.5.1.2.1. Conpot

6.5.1.2.2. gridpot

6.5.1.2.3. scada-honeynet

6.5.1.2.4. GasPot

6.5.1.3. Web honeypots

6.5.1.3.1. Bukkit Honeypot

6.5.1.3.2. EoHoneypotBundle

6.5.1.3.3. Glastopf

6.5.1.3.4. Google Hack Honeypot

6.5.1.3.5. HonneyPotter

6.5.1.3.6. Laravel Application Honeypot

6.5.1.3.7. Nodepot

6.5.1.3.8. Servletpot

6.5.1.3.9. Shadow Daemon

6.5.1.3.10. basic-auth-pot

6.5.1.3.11. django-admin-honeypot

6.5.1.3.12. phpmyadmin_honeypot

6.5.1.3.13. servlet

6.5.1.3.14. shockpot

6.5.1.3.15. smart-Honeypot

6.5.1.3.16. stack-honeypot

6.5.1.3.17. wordpot

6.5.1.3.18. wp-smart-honeypot

6.5.1.4. Service honepots

6.5.1.4.1. Ensnare

6.5.1.4.2. Honeyprint

6.5.1.4.3. Honeypy

6.5.1.4.4. RDPy

6.5.1.4.5. Tom's Honeypot

6.5.1.4.6. honeyntp

6.5.1.4.7. honeypot-camera

6.6. Software

6.6.1. KeyFocus

6.6.1.1. http://www.keyfocus.net/kfsensor/

6.6.2. Broadcom

6.7. Web

6.7.1. CyberTrap

6.7.1.1. http://www.cybertrap.com/

6.8. Endpoint Agent

6.8.1. Attivo networks

6.8.2. Minerva Labs

6.8.3. Broadcom

7. Malware Analysis

7.1. Botnets

7.1.1. spyeyetracker.abuse.ch

7.2. Internet Identity

7.3. Malware Patrol

7.4. SpamHaus

7.5. Team Cymru

7.6. ThreatGrid

7.7. VirusTotal

7.8. zeustracker.abuse.ch

7.9. JoeSecurity

7.10. Shadowserver

8. Attack Path Modeling, Breach and Attack Simulation

8.1. AttackIQ

8.2. Attivo Networks

8.3. Balbix

8.4. Core Security

8.5. Cymulate

8.6. Forseeti

8.7. Illusive Networks

8.8. RedSeal

8.9. SafeBreach

8.10. Skybox

8.11. Veriti.ai

8.12. Verodin

8.13. XM Cyber

9. Intelligence/Data Feeds/Software & Services

9.1. Collaborative Threat Investigation Platforms

9.1.1. BAE Systems Detica

9.1.1.1. Cybereveal

9.1.2. Maltego

9.1.3. NC4

9.1.4. Palentir

9.1.4.1. Cyber

9.2. Open Source Threat & Data Mining

9.2.1. ThreatCrowd.org

9.2.2. ThreatMiner.org

9.3. Security Intelligence and Data Analysis Platforms

9.3.1. Trellix

9.3.1.1. Security Orchestrator

9.3.2. Palentir

9.4. Threat Intelligence Platforms (TIPs)

9.4.1. Anomali

9.4.2. BAE Systems

9.4.3. Comilion

9.4.4. CTILab

9.4.5. Cyjax

9.4.6. Eclectic IQ

9.4.7. Infoblox

9.4.8. Lockheed Martin

9.4.9. Lookingglass Cyber Solutions

9.4.10. Microsoft

9.4.10.1. Interflow

9.4.11. NC4

9.4.11.1. Soltra

9.4.12. Pulsedive

9.4.13. Service Now (Formerly Brightpoint)

9.4.14. Synopsys

9.4.15. ThreatConnect

9.4.16. ThreatQuotient

9.4.17. TruStar

9.4.18. Zeneth

9.5. Threat Intelligence Services

9.5.1. Human Intelligence - HUMINT (Strategic)

9.5.1.1. Attacker Tactics, Techniques and Procedures

9.5.1.1.1. Accenture

9.5.1.1.2. Blueliv

9.5.1.1.3. Digital Shadows

9.5.1.1.4. Dragos

9.5.1.1.5. FireEye

9.5.1.1.6. Flashpoint Intel

9.5.1.1.7. FOX-IT

9.5.1.1.8. Groupsense

9.5.1.1.9. Intel471

9.5.1.1.10. Intsights

9.5.1.1.11. IOActive

9.5.1.1.12. Secureworks

9.5.1.1.13. SenseCy

9.5.1.1.14. ShadowDragon

9.5.1.1.15. Surfwatch Labs

9.5.1.1.16. Treadstone 71

9.5.1.1.17. Wapack Labs

9.5.1.2. Brand & Attack Target Monitoring

9.5.1.2.1. Brand Protect

9.5.1.2.2. CTM360

9.5.1.2.3. Digital Shadows

9.5.1.2.4. DigitalStakeout

9.5.1.2.5. Flashpoint

9.5.1.2.6. Groupsense

9.5.1.2.7. Intsights

9.5.1.2.8. LookingGlass

9.5.1.2.9. Phishlabs

9.5.1.2.10. ShadowDragon

9.5.1.3. Credential Theft

9.5.1.3.1. AdvSTAR Laboratory

9.5.1.3.2. CTM360

9.5.1.3.3. IDAgent

9.5.1.3.4. SpyCloud

9.5.1.3.5. HackNotice

9.5.1.4. Cybersquatting

9.5.1.4.1. AdvSTAR Laboratory

9.5.1.4.2. Comlaude

9.5.1.4.3. CTM360

9.5.1.4.4. DomainTools

9.5.1.4.5. KeepAlert

9.5.1.4.6. Mark Monitor

9.5.1.4.7. RiskIQ

9.5.1.5. External Data Loss & Risk Monitoring

9.5.1.5.1. AdvSTAR Laboratory

9.5.1.5.2. CTM360

9.5.1.5.3. CybelAngel

9.5.1.5.4. Digital Shadows

9.5.1.5.5. DigitalStakeout

9.5.1.5.6. Groupsense

9.5.1.6. Social Media, User Forum and External Threat Monitoring

9.5.1.6.1. AdvSTAR Laboratory

9.5.1.6.2. Bluliv

9.5.1.6.3. Brand Protect

9.5.1.6.4. CTM360

9.5.1.6.5. Digital Shadows

9.5.1.6.6. DigitalStakeout

9.5.1.6.7. Groupsense

9.5.1.6.8. Intsights

9.5.1.6.9. ShadowDragon

9.5.1.6.10. Silobreaker

9.5.1.6.11. Surfwatch Labs

9.5.1.6.12. Tempest Security

9.5.1.6.13. ZeroFOX

9.5.2. Machine-Based (Tactical)

9.5.2.1. Anti-Phishing

9.5.2.1.1. Agari

9.5.2.1.2. Bluliv

9.5.2.1.3. CTM360

9.5.2.1.4. Cyren

9.5.2.1.5. Fraudwatch International

9.5.2.1.6. Kaspersky

9.5.2.1.7. LookingGlass

9.5.2.1.8. Phishlabs

9.5.2.1.9. Phishme

9.5.2.1.10. Phishtank

9.5.2.1.11. SentryBay

9.5.2.1.12. Webroot

9.5.2.2. Anti-Spam

9.5.2.2.1. Agari

9.5.2.2.2. Free

9.5.2.3. Domain Name Monitoring/DGA Feeds

9.5.2.3.1. Bambenek Consulting

9.5.2.3.2. Farsight Security

9.5.2.3.3. ThreatBook

9.5.2.4. File Reputation

9.5.2.4.1. Bit9

9.5.2.4.2. McAfee

9.5.2.4.3. ReversingLabs

9.5.2.4.4. Symantec

9.5.2.4.5. Team Cymru

9.5.2.4.6. Virustotal

9.5.2.4.7. Webroot

9.5.2.4.8. mnemonic.no

9.5.2.5. Indicators of Compromise (Feeds)

9.5.2.5.1. Crowdstrike

9.5.2.5.2. Cyren

9.5.2.5.3. Infoblox

9.5.2.5.4. IOC Bucket

9.5.2.5.5. iSightPartners

9.5.2.5.6. Kaspersky

9.5.2.5.7. McAfee

9.5.2.5.8. mnemonic.no

9.5.2.5.9. SenseCy

9.5.2.5.10. ThreatBook

9.5.2.5.11. Treadstone 71

9.5.2.5.12. Verisign

9.5.2.5.13. Wapack Labs

9.5.2.6. IP Blacklists

9.5.2.6.1. Anti Hacker Alliance

9.5.2.6.2. Botscout

9.5.2.6.3. Cyren

9.5.2.6.4. Dshield

9.5.2.6.5. Kaspersky

9.5.2.6.6. Shadowserver

9.5.2.6.7. SpamHaus

9.5.2.6.8. Stop-Spam.org

9.5.2.6.9. Team Cymru

9.5.2.6.10. Webroot

9.5.2.6.11. hosts-file.net

9.5.2.6.12. mnemonic.no

9.5.2.6.13. ThreatBook

9.5.2.7. IP Reputation Feeds

9.5.2.7.1. BitSight Technologies

9.5.2.7.2. McAfee

9.5.2.7.3. Cisco (OpenDNS)

9.5.2.7.4. ReversingLabs

9.5.2.7.5. SURBL

9.5.2.7.6. Symantec

9.5.2.7.7. Team Cymru

9.5.2.7.8. The Media Trust

9.5.2.7.9. Trend Micro

9.5.2.7.10. WebRoot

9.5.2.7.11. ThreatBook

9.5.2.8. Malicious Hashes

9.5.2.8.1. ThreatBook

9.5.2.9. TI Feed Aggregation

9.5.2.9.1. Critical Stack

9.5.2.10. Vulnerabilities and Exploits

9.5.2.10.1. CXSecurity

9.5.2.10.2. Dragos

9.5.2.10.3. ExploitDB

9.5.2.10.4. Rapid7

9.5.2.10.5. Security Focus DB

9.5.2.11. Web Malware

9.5.2.11.1. Free URL/Domain/IP Lists

9.5.2.11.2. Website Malware Monitoring Services

9.5.2.11.3. Paid URL/Domain/IP Lists

10. Malware Detection & Analysis

10.1. Malware Analysis as a Service

10.1.1. Free Services

10.1.1.1. Malwr

10.1.1.1.1. https://malwr.com/

10.1.1.2. Virustotal

10.1.1.2.1. https://www.virustotal.com/

10.1.1.3. Jotti

10.1.1.3.1. http://virusscan.jotti.org/en

10.1.2. Intezer

10.1.3. ReversingLabs

10.1.4. ThreatGrid

10.2. Sandbox Software

10.2.1. GFI

10.2.1.1. GFI Sandbox

10.2.2. Joesecurity

10.2.2.1. Joe Sandbox

10.2.3. Payload Security

10.2.3.1. http://www.payload-security.com/products/vxstream-sandbox

10.3. Deep Learning

10.3.1. Endpoint

10.3.1.1. Deep Instinct

10.3.1.2. Senseon

10.3.2. Network

10.3.2.1. Bluehexagon

10.3.2.2. Bluevector

10.3.3. Collaboration Suites

10.3.3.1. Bitdam

10.4. File Analysis

10.4.1. Inquest

10.4.2. Intezer

10.4.3. ReversingLabs

11. Threat Deception Technologies

11.1. Distributed Deception Platforms

11.1.1. Amgine Securus

11.1.2. Atomic Software Solutions

11.1.2.1. HoneyBot

11.1.3. Attivo Networks

11.1.4. Chaitin

11.1.5. CounterCraft

11.1.6. CyberFog

11.1.7. CyberTrap

11.1.8. Fidelis Cybersecurity

11.1.9. Illusive Networks

11.1.10. JeeSeen

11.1.11. KeyFocus

11.1.12. SmokeScreen

11.1.13. Thinkst Applied Research (Canary)

11.1.14. TrapX

11.1.15. Vision Space Technologies

11.2. Files

11.2.1. Allure Security Technology

11.2.2. WatchPoint

11.3. Malware Anti-Evasion

11.3.1. Minerva Labs

11.4. Network

11.4.1. Hillstone Networks

11.4.2. PacketViper

11.4.3. Percipient Networks

11.4.4. Ridgeback Network Defense

11.4.5. Shadow Networks

11.5. Open Source

11.5.1. Honeypots

11.5.1.1. Database Honeypots

11.5.1.1.1. Delilah

11.5.1.1.2. ESpot

11.5.1.1.3. Elastic Honey

11.5.1.1.4. MongoDB-HoneyProxy

11.5.1.1.5. NoSQLpot

11.5.1.1.6. mysql

11.5.1.2. ICS/Scada

11.5.1.2.1. Conpot

11.5.1.2.2. gridpot

11.5.1.2.3. scada-honeynet

11.5.1.2.4. GasPot

11.5.1.3. Web honeypots

11.5.1.3.1. Bukkit Honeypot

11.5.1.3.2. EoHoneypotBundle

11.5.1.3.3. Glastopf

11.5.1.3.4. Google Hack Honeypot

11.5.1.3.5. HonneyPotter

11.5.1.3.6. Laravel Application Honeypot

11.5.1.3.7. Nodepot

11.5.1.3.8. Servletpot

11.5.1.3.9. Shadow Daemon

11.5.1.3.10. basic-auth-pot

11.5.1.3.11. django-admin-honeypot

11.5.1.3.12. phpmyadmin_honeypot

11.5.1.3.13. servlet

11.5.1.3.14. shockpot

11.5.1.3.15. smart-Honeypot

11.5.1.3.16. stack-honeypot

11.5.1.3.17. wordpot

11.5.1.3.18. wp-smart-honeypot

11.5.1.4. Service honepots

11.5.1.4.1. Ensnare

11.5.1.4.2. Honeyprint

11.5.1.4.3. Honeypy

11.5.1.4.4. RDPy

11.5.1.4.5. Tom's Honeypot

11.5.1.4.6. honeyntp

11.5.1.4.7. honeypot-camera

11.6. Software

11.6.1. KeyFocus

11.6.1.1. http://www.keyfocus.net/kfsensor/

11.6.2. Specter

11.6.2.1. http://www.specter.com/

11.6.3. Symantec

11.7. Web

11.7.1. Shape Security

11.7.1.1. ShapeShifter

11.7.2. Juniper Networks

11.7.2.1. WebAppSecure

11.7.3. CyberTrap

11.7.3.1. http://www.cybertrap.com/

11.8. Endpoint Agent

11.8.1. Attivo networks

11.8.2. Minerva Labs

11.8.3. Symantec