Security Operations & Incident Response - by Lawrence Pingree

Começar. É Gratuito
ou inscrever-se com seu endereço de e-mail
Security Operations & Incident Response - by Lawrence Pingree por Mind Map: Security Operations & Incident Response - by Lawrence Pingree

1. Security Information and Event Management (SIEM), Log Management & Analytics

1.1. Application Security Intelligence Engine

1.1.1. SAP

1.1.1.1. iT-Cube Systems

1.2. Log Management

1.2.1. EventTracker

1.2.2. IGLOO Security

1.2.3. Intel Security

1.2.3.1. McAfee Enterprise Log Manager

1.2.4. Kiwi Syslog Server

1.2.5. LogEntries

1.2.6. LogRythm

1.2.7. LogZilla

1.2.8. Logscape

1.2.9. Open Source

1.2.9.1. Elasticsearch (ELK Stack)

1.2.9.2. SEC (Simple Event Correlator)

1.2.9.3. OSSIM

1.2.9.3.1. http://trac.osgeo.org/ossim/

1.2.9.4. Syslog-NG

1.2.9.5. Octopussy

1.2.9.5.1. http://www.octopussy.pm/

1.2.10. Sawmill

1.2.11. Splunk

1.2.12. Sumo Logic

1.2.13. Tripwire

1.2.14. XpoLog

1.3. SIEM

1.3.1. AlienVault

1.3.1.1. OSSIM

1.3.2. CorreLog

1.3.3. Cybonet

1.3.4. EventTracker

1.3.5. Fortinet

1.3.6. HP

1.3.6.1. Arcsight

1.3.7. Hexis Cyber Solutions

1.3.7.1. Hawkeye AP

1.3.8. IBM

1.3.8.1. Q1Radar

1.3.9. IGLOO Security

1.3.10. LogPoint

1.3.10.1. http://www.logpoint.com/en/

1.3.11. LogRythm

1.3.12. LogZilla

1.3.13. McAfee

1.3.13.1. NitroSecurity

1.3.14. Novell

1.3.14.1. Sentinel

1.3.15. RSA

1.3.15.1. Envision

1.3.16. Sensage

1.3.17. Solarwinds

1.3.18. Splunk

1.3.19. Sqrrl

1.3.20. Tibco

1.3.20.1. Loglogic

1.3.21. eIQnetworks

1.4. Security Analytics

1.4.1. Anomaly Analytics

1.4.1.1. CTILab

1.4.1.2. eMite

1.4.1.3. Greylog

1.4.1.4. Intel

1.4.1.5. Niddel

1.4.1.6. Prelert

1.4.1.7. Security Onion

1.4.1.8. Theta Ray

1.4.1.9. Versive

1.4.2. User and Entity Behavior Analytics (UEBA)

1.4.2.1. Bae Systems Applied Intelligence

1.4.2.2. Bay Dynamics

1.4.2.3. Caspida

1.4.2.4. Click Security

1.4.2.5. CTILab

1.4.2.6. Darktrace

1.4.2.7. Detex Systems

1.4.2.8. Exabeam

1.4.2.9. FICO

1.4.2.10. Fortscale

1.4.2.11. GuruCul

1.4.2.12. HPE

1.4.2.12.1. Formerly Niara

1.4.2.12.2. HAVEn

1.4.2.13. IBM

1.4.2.13.1. Infosphere BIG Insights

1.4.2.14. Intellinx

1.4.2.15. Interset

1.4.2.16. Lockheed Martin

1.4.2.17. Logtrust

1.4.2.18. Microsoft

1.4.2.18.1. Acquired Aorato

1.4.2.19. Mobile System 7

1.4.2.20. Novetta Solutions

1.4.2.21. Oracle

1.4.2.22. Palerra

1.4.2.23. Platfora

1.4.2.24. Rapid7

1.4.2.25. Raytheon

1.4.2.26. Reveelium

1.4.2.27. SAS Institute

1.4.2.28. Secureonix

1.4.2.29. Splunk

1.4.2.30. Veriato

1.4.2.31. ZoneFox

1.4.3. Endpoint User Monitoring

2. Security Operations, Analytics and Reporting

2.1. Security Incident Response Platforms (SIRP)

2.1.1. Agiliance

2.1.2. DFLabs

2.1.3. Demisto

2.1.4. EMC(RSA)

2.1.5. Empow

2.1.6. Fido

2.1.7. Microsoft

2.1.7.1. Formerly Hexadite

2.1.8. ID Experts

2.1.9. Proofpoint

2.1.10. ServiceNow

2.1.11. Siemplify

2.1.12. Syncurity

2.1.13. IBM Resilient

2.1.13.1. Formerly Resilient Systems

2.2. Security Operations Automation Platforms (SOAPS)

2.2.1. Ayehu

2.2.2. Cyberbit

2.2.3. Cybersponse

2.2.4. Demisto

2.2.5. DFLabs

2.2.6. empow security

2.2.7. Fireye

2.2.8. Microsoft

2.2.9. IBM

2.2.10. Komand

2.2.11. LogicHub

2.2.12. Phantom Cyber

2.2.13. Siemplify

2.2.14. Swimlane

2.2.15. Syncurity

2.3. Security Orchestration, Automation and Response (SOAR)

2.3.1. Anomali

2.3.2. AtarLabs

2.3.3. Ayehu

2.3.4. BrazenCloud

2.3.5. Cyber Observer

2.3.6. Cybersponse

2.3.7. Cybraics

2.3.8. Cydarm

2.3.9. D3 Security

2.3.10. DFLabs

2.3.11. EclecticIQ

2.3.12. EMC(RSA)

2.3.13. IBM

2.3.14. Microsoft

2.3.15. Palo Alto networks

2.3.16. Proofpoint

2.3.17. Resolve Systems

2.3.18. Revelstoke

2.3.19. ServiceNow

2.3.20. Siemplify

2.3.21. Splunk

2.3.21.1. Formerly Phantom

2.3.22. Swimlane

2.3.23. Syncurity

2.3.24. ThreatConnect

2.3.25. ThreatQuotient

2.3.26. Tines

2.3.27. WitFoo

2.4. Threat Intelligence

2.5. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

2.5.1. Crowdsourced Application Security Testing Platforms

2.5.1.1. Hyver

2.5.1.2. Applause

2.5.1.3. Bugcrowd

2.5.1.4. BugFinders

2.5.1.5. Cobalt

2.5.1.6. Crowdtesters

2.5.1.7. HackerOne

2.5.2. Managed Penetration Testing Services

2.5.2.1. Cenzic

2.5.2.2. WhiteHatSecurity

2.5.3. Penetration Testing Software

2.5.3.1. Core Security

2.5.3.2. Rapid7

2.5.3.2.1. Metasploit Pro

2.5.3.2.2. Metasploit Express

2.5.3.3. Trustwave

2.5.4. Threat and Vulnerability Management (TVM)

2.5.4.1. Acuity Risk Management

2.5.4.2. Agiliance

2.5.4.3. BeyondTrust

2.5.4.4. Core Security

2.5.4.5. CTILab

2.5.4.6. Cybersponse

2.5.4.7. DFLabs

2.5.4.8. EMC(RSA)

2.5.4.9. Exodus Intelligence

2.5.4.10. Kenna Security

2.5.4.11. Kornic Glory

2.5.4.12. Lithik

2.5.4.13. NopSec

2.5.4.14. Recorded Future

2.5.4.15. RedSeal

2.5.4.16. Revolver RiskVision

2.5.4.17. Risk Based Security

2.5.4.18. RiskSense

2.5.4.19. Siemplify

2.5.4.20. Skybox Security

2.5.4.21. Swimlane

2.5.4.22. Vicarius

2.5.5. Vulnerability Assessment

2.5.5.1. Software as a Service

2.5.5.1.1. Vulnerability Management

2.5.5.1.2. Phish Testing/Management

2.5.5.2. Network-Based Vulnerability Assessment (On Premise)

2.5.5.2.1. Core Security

2.5.5.2.2. CTILab

2.5.5.2.3. Cybonet

2.5.5.2.4. Digital Defense

2.5.5.2.5. Fortinet

2.5.5.2.6. McAfee

2.5.5.2.7. Ncircle

2.5.5.2.8. Netasq

2.5.5.2.9. NSAuditor

2.5.5.2.10. Outpost24

2.5.5.2.11. Qualys

2.5.5.2.12. RandomStorm

2.5.5.2.13. Rapid 7

2.5.5.2.14. Trustwave

2.5.5.3. Mainframe Vulnerability Assessment

2.5.5.3.1. Key Resources Inc. (KRI)

2.5.5.4. Agent-Based Vulnerability Assessment

2.5.5.4.1. BeyondTrust

2.5.5.4.2. Qualys

2.5.5.4.3. Secunia

2.5.5.4.4. Tenable

2.5.6. Vulnerability Correlation

2.5.6.1. Code DX

2.5.6.2. Core Security

2.5.6.3. Cybric

2.5.6.4. Denim Group

2.5.6.4.1. ThreadFix

2.5.6.5. Kenna Security

2.5.6.6. Kenna Security

2.5.6.7. Neuralys

2.5.6.8. NopSec

2.5.6.9. NopSec

2.5.6.10. Nucleus Security

2.5.6.11. RiskSense

2.5.6.12. Secure Decisions

2.5.7. Vulnerability Research

2.5.7.1. CSC

2.5.7.2. HP

2.5.7.2.1. DV Labs

2.5.7.3. HotWAN

2.5.7.4. McAfee

2.5.7.5. SecNiche Labs

2.5.7.6. Sourcefire VRT

2.5.7.7. Symantec

2.5.7.8. VRLSec

2.5.7.9. Vupen

3. Threat Deception Technologies

3.1. Distributed Deception Platforms

3.1.1. Amgine Securus

3.1.2. Atomic Software Solutions

3.1.2.1. HoneyBot

3.1.3. Attivo Networks

3.1.4. Chaitin

3.1.5. CounterCraft

3.1.6. CyberFog

3.1.7. CyberTrap

3.1.8. Cymmetria

3.1.9. Fidelis Cybersecurity

3.1.10. FormalTech

3.1.11. Illusive Networks

3.1.12. JeeSeen

3.1.13. KeyFocus

3.1.14. SmokeScreen

3.1.15. Thinkst Applied Research (Canary)

3.1.16. TrapX

3.1.17. Vision Space Technologies

3.2. Files

3.2.1. Allure Security Technology

3.2.2. WatchPoint

3.3. Malware Anti-Evasion

3.3.1. Minerva Labs

3.4. Network

3.4.1. Hillstone Networks

3.4.2. PacketViper

3.4.3. Percipient Networks

3.4.4. Ridgeback Network Defense

3.4.5. Shadow Networks

3.5. Open Source

3.5.1. Honeypots

3.5.1.1. Database Honeypots

3.5.1.1.1. Delilah

3.5.1.1.2. ESpot

3.5.1.1.3. Elastic Honey

3.5.1.1.4. MongoDB-HoneyProxy

3.5.1.1.5. NoSQLpot

3.5.1.1.6. mysql

3.5.1.2. ICS/Scada

3.5.1.2.1. Conpot

3.5.1.2.2. gridpot

3.5.1.2.3. scada-honeynet

3.5.1.2.4. GasPot

3.5.1.3. Web honeypots

3.5.1.3.1. Bukkit Honeypot

3.5.1.3.2. EoHoneypotBundle

3.5.1.3.3. Glastopf

3.5.1.3.4. Google Hack Honeypot

3.5.1.3.5. HonneyPotter

3.5.1.3.6. Laravel Application Honeypot

3.5.1.3.7. Nodepot

3.5.1.3.8. Servletpot

3.5.1.3.9. Shadow Daemon

3.5.1.3.10. basic-auth-pot

3.5.1.3.11. django-admin-honeypot

3.5.1.3.12. phpmyadmin_honeypot

3.5.1.3.13. servlet

3.5.1.3.14. shockpot

3.5.1.3.15. smart-Honeypot

3.5.1.3.16. stack-honeypot

3.5.1.3.17. wordpot

3.5.1.3.18. wp-smart-honeypot

3.5.1.4. Service honepots

3.5.1.4.1. Ensnare

3.5.1.4.2. Honeyprint

3.5.1.4.3. Honeypy

3.5.1.4.4. RDPy

3.5.1.4.5. Tom's Honeypot

3.5.1.4.6. honeyntp

3.5.1.4.7. honeypot-camera

3.6. Software

3.6.1. KeyFocus

3.6.1.1. http://www.keyfocus.net/kfsensor/

3.6.2. Broadcom

3.7. Web

3.7.1. CyberTrap

3.7.1.1. http://www.cybertrap.com/

3.8. Endpoint Agent

3.8.1. Attivo networks

3.8.2. Minerva Labs

3.8.3. Broadcom

4. Malware Analysis

4.1. Botnets

4.1.1. spyeyetracker.abuse.ch

4.2. Internet Identity

4.3. Malware Patrol

4.4. SpamHaus

4.5. Team Cymru

4.6. ThreatGrid

4.7. VirusTotal

4.8. zeustracker.abuse.ch

4.9. JoeSecurity

4.10. Shadowserver

5. Malware Detection & Analysis

5.1. Malware Analysis as a Service

5.1.1. Free Services

5.1.1.1. Malwr

5.1.1.1.1. https://malwr.com/

5.1.1.2. Virustotal

5.1.1.2.1. https://www.virustotal.com/

5.1.1.3. Jotti

5.1.1.3.1. http://virusscan.jotti.org/en

5.1.2. Intezer

5.1.3. ReversingLabs

5.1.4. ThreatGrid

5.2. Sandbox Software

5.2.1. GFI

5.2.1.1. GFI Sandbox

5.2.2. Joesecurity

5.2.2.1. Joe Sandbox

5.2.3. Payload Security

5.2.3.1. http://www.payload-security.com/products/vxstream-sandbox

5.3. Deep Learning

5.3.1. Endpoint

5.3.1.1. Deep Instinct

5.3.1.2. Senseon

5.3.2. Network

5.3.2.1. Bluehexagon

5.3.2.2. Bluevector

5.3.3. Collaboration Suites

5.3.3.1. Bitdam

5.4. File Analysis

5.4.1. Inquest

5.4.2. Intezer

5.4.3. ReversingLabs

6. Threat Deception Technologies

6.1. Distributed Deception Platforms

6.1.1. Amgine Securus

6.1.2. Atomic Software Solutions

6.1.2.1. HoneyBot

6.1.3. Attivo Networks

6.1.4. Chaitin

6.1.5. CounterCraft

6.1.6. CyberFog

6.1.7. CyberTrap

6.1.8. Fidelis Cybersecurity

6.1.9. Illusive Networks

6.1.10. JeeSeen

6.1.11. KeyFocus

6.1.12. SmokeScreen

6.1.13. Thinkst Applied Research (Canary)

6.1.14. TrapX

6.1.15. Vision Space Technologies

6.2. Files

6.2.1. Allure Security Technology

6.2.2. WatchPoint

6.3. Malware Anti-Evasion

6.3.1. Minerva Labs

6.4. Network

6.4.1. Hillstone Networks

6.4.2. PacketViper

6.4.3. Percipient Networks

6.4.4. Ridgeback Network Defense

6.4.5. Shadow Networks

6.5. Open Source

6.5.1. Honeypots

6.5.1.1. Database Honeypots

6.5.1.1.1. Delilah

6.5.1.1.2. ESpot

6.5.1.1.3. Elastic Honey

6.5.1.1.4. MongoDB-HoneyProxy

6.5.1.1.5. NoSQLpot

6.5.1.1.6. mysql

6.5.1.2. ICS/Scada

6.5.1.2.1. Conpot

6.5.1.2.2. gridpot

6.5.1.2.3. scada-honeynet

6.5.1.2.4. GasPot

6.5.1.3. Web honeypots

6.5.1.3.1. Bukkit Honeypot

6.5.1.3.2. EoHoneypotBundle

6.5.1.3.3. Glastopf

6.5.1.3.4. Google Hack Honeypot

6.5.1.3.5. HonneyPotter

6.5.1.3.6. Laravel Application Honeypot

6.5.1.3.7. Nodepot

6.5.1.3.8. Servletpot

6.5.1.3.9. Shadow Daemon

6.5.1.3.10. basic-auth-pot

6.5.1.3.11. django-admin-honeypot

6.5.1.3.12. phpmyadmin_honeypot

6.5.1.3.13. servlet

6.5.1.3.14. shockpot

6.5.1.3.15. smart-Honeypot

6.5.1.3.16. stack-honeypot

6.5.1.3.17. wordpot

6.5.1.3.18. wp-smart-honeypot

6.5.1.4. Service honepots

6.5.1.4.1. Ensnare

6.5.1.4.2. Honeyprint

6.5.1.4.3. Honeypy

6.5.1.4.4. RDPy

6.5.1.4.5. Tom's Honeypot

6.5.1.4.6. honeyntp

6.5.1.4.7. honeypot-camera

6.6. Software

6.6.1. KeyFocus

6.6.1.1. http://www.keyfocus.net/kfsensor/

6.6.2. Specter

6.6.2.1. http://www.specter.com/

6.6.3. Symantec

6.7. Web

6.7.1. Shape Security

6.7.1.1. ShapeShifter

6.7.2. Juniper Networks

6.7.2.1. WebAppSecure

6.7.3. CyberTrap

6.7.3.1. http://www.cybertrap.com/

6.8. Endpoint Agent

6.8.1. Attivo networks

6.8.2. Minerva Labs

6.8.3. Symantec

7. Digital Forensics/eDiscovery

7.1. Content, File and Endpoint Forensics

7.1.1. eDiscovery

7.1.1.1. Access Data

7.1.1.2. Autonomy

7.1.1.3. Barracuda Networks

7.1.1.4. Clearwell

7.1.1.5. FTI Technology

7.1.1.6. Guidance Software

7.1.1.7. Kazeon

7.1.1.8. kCura

7.1.2. Mobile Devices

7.1.2.1. BlackBagTech

7.1.2.2. Cellebrite

7.1.2.3. Compelson Labs

7.1.2.4. Guidance Software

7.1.2.5. MSAB

7.1.2.6. NowSecure

7.1.2.7. Oxygen Forensics

7.1.2.8. Paraben Corporation

7.1.3. Endpoint Computing Systems

7.1.3.1. Access Data

7.1.3.2. ADF Solutions

7.1.3.2.1. http://www.adfsolutions.com/

7.1.3.3. ArxSys

7.1.3.4. BlackBag Technologies

7.1.3.5. BrazenCloud

7.1.3.6. CRU Inc

7.1.3.6.1. Ditto Forensic FieldStation

7.1.3.7. Cyfir

7.1.3.8. Guidance Software

7.1.3.9. Magnet Forensics

7.1.3.9.1. http://www.magnetforensics.com/

7.1.3.10. Nuix

7.1.3.11. OSForensics

7.1.3.12. Paraben Corporation

7.1.3.13. WindowsScope

7.1.3.14. X-Ways Forensics

7.1.4. Email Examination

7.1.4.1. Systools Software

7.1.4.1.1. MailXaminer

7.1.4.2. Nuix

7.1.5. Digital Forensics Case Management

7.1.5.1. Axxera

7.1.5.1.1. http://www.axxera4n6.com/index.html

7.1.5.2. D3 Security

7.1.5.2.1. https://www.d3security.com/products/it-forensics-software/

7.1.5.3. Digital Investigation Manager

7.1.5.3.1. http://digitalinvestigationmanager.com/

7.1.5.4. Guidance Software

7.1.5.4.1. https://www2.guidancesoftware.com/products/Pages/encase-enterprise/case-management.aspx

7.1.5.5. Intaforensiscs

7.1.5.5.1. http://www.intaforensics.com/software/lima-product-suite/

7.1.5.6. Sentinel Data

7.1.5.6.1. http://sentineldata.com/atlas-digital-forensic-case-management/

7.1.5.7. Sirentech

7.1.5.7.1. http://www.sirentec.com/

7.1.5.8. Wynyard Group

7.1.5.8.1. https://www.wynyardgroup.com/us/solutions/digital-evidence-investigator/

7.1.6. Memory Forensics

7.1.6.1. FireEye

7.1.6.2. Guidance Software

7.1.6.3. Volatility Framework

7.1.6.4. WindowsScope

7.1.6.5. BrazenCloud

7.2. Forensic File & Data Analysis Tools

7.2.1. Cellebrite

7.2.2. Cyfir

7.2.3. Intella

7.2.4. Magnet Forensics

7.2.5. Nuix

7.2.6. Systools Software

7.3. eDiscovery Services

7.3.1. Robert Half

7.3.2. Advanced Discovery

7.4. eDiscovery Software

7.4.1. AccessData

7.4.2. Guidance Software

7.4.3. Nuix

7.4.4. Symantec

8. Fraud Prevention/Web Malware Monitoring

8.1. Fraud/Bot/Webscrape Prevention

8.1.1. Software

8.1.1.1. CallSign

8.1.1.2. Digital Resolve

8.1.1.3. Elastic Beam

8.1.1.4. FeedZai

8.1.1.5. IBM (Formerly Trusteer)

8.1.1.6. Intellinx

8.1.1.7. RSA (EMC)

8.1.1.8. ShieldSquare

8.1.2. Appliances

8.1.2.1. Distil Networks

8.1.2.2. Elastic Beam

8.1.2.3. Imperva

8.1.2.4. RSA (EMC)

8.1.2.5. Shape Security

8.1.2.6. White Ops

8.1.3. Software as a Service

8.1.3.1. Akamai

8.1.3.2. BioCatch

8.1.3.2.1. http://www.biocatch.com/

8.1.3.3. BotScout

8.1.3.4. CallSign

8.1.3.5. Digital Resolve

8.1.3.6. Imperva

8.1.3.7. FeedZai

8.1.3.8. Guardian Analytics

8.1.3.8.1. ACH/Wire Transaction Monitoring

8.1.3.9. iovation

8.1.3.10. Kount

8.1.3.11. MarkMonitor

8.1.3.12. namogoo

8.1.3.13. NuData Security

8.1.3.14. Shape Security

8.1.3.15. ShieldSquare

8.1.3.16. Signifyd

8.1.3.17. LexisNexus (Formerly ThreatMetrix)

8.1.3.18. White Ops

8.1.3.19. X-Cart

8.1.3.20. Zenedge

8.1.4. Virtual Appliances

8.1.4.1. Distil Networks

8.1.4.2. Elastic Beam

8.1.4.3. Imperva

8.1.4.4. ShieldSquare

8.2. Website & Ad Malware Monitoring

8.2.1. Ad-Juster

8.2.2. Globalsign

8.2.2.1. Leverages Hackalert

8.2.3. Hackalert

8.2.4. McAfee

8.2.4.1. Siteadvisor

8.2.5. QualysGuard

8.2.6. RiskIQ

8.2.7. Sucuri

8.2.8. The Media Trust

9. Incident Response Legal Services

9.1. Information Law Group

9.2. FoleyHoag

9.3. Ropes & Gray

9.4. Kroll

10. Attack Path Modeling, Breach and Attack Simulation

10.1. AttackIQ

10.2. Attivo Networks

10.3. Balbix

10.4. Core Security

10.5. Cymulate

10.6. Forseeti

10.7. Illusive Networks

10.8. RedSeal

10.9. SafeBreach

10.10. Skybox

10.11. Veriti.ai

10.12. Verodin

10.13. XM Cyber

11. Intelligence/Data Feeds/Software & Services

11.1. Collaborative Threat Investigation Platforms

11.1.1. BAE Systems Detica

11.1.1.1. Cybereveal

11.1.2. Maltego

11.1.3. NC4

11.1.4. Palentir

11.1.4.1. Cyber

11.2. Open Source Threat & Data Mining

11.2.1. ThreatCrowd.org

11.2.2. ThreatMiner.org

11.3. Security Intelligence and Data Analysis Platforms

11.3.1. Trellix

11.3.1.1. Security Orchestrator

11.3.2. Palentir

11.4. Threat Intelligence Platforms (TIPs)

11.4.1. Anomali

11.4.2. BAE Systems

11.4.3. Comilion

11.4.4. CTILab

11.4.5. Cyjax

11.4.6. Eclectic IQ

11.4.7. Infoblox

11.4.8. Lockheed Martin

11.4.9. Lookingglass Cyber Solutions

11.4.10. Microsoft

11.4.10.1. Interflow

11.4.11. NC4

11.4.11.1. Soltra

11.4.12. Pulsedive

11.4.13. Service Now (Formerly Brightpoint)

11.4.14. Synopsys

11.4.15. ThreatConnect

11.4.16. ThreatQuotient

11.4.17. TruStar

11.4.18. Zeneth

11.5. Threat Intelligence Services

11.5.1. Human Intelligence - HUMINT (Strategic)

11.5.1.1. Attacker Tactics, Techniques and Procedures

11.5.1.1.1. Accenture

11.5.1.1.2. Blueliv

11.5.1.1.3. Digital Shadows

11.5.1.1.4. Dragos

11.5.1.1.5. FireEye

11.5.1.1.6. Flashpoint Intel

11.5.1.1.7. FOX-IT

11.5.1.1.8. Groupsense

11.5.1.1.9. Intel471

11.5.1.1.10. Intsights

11.5.1.1.11. IOActive

11.5.1.1.12. Secureworks

11.5.1.1.13. SenseCy

11.5.1.1.14. ShadowDragon

11.5.1.1.15. Surfwatch Labs

11.5.1.1.16. Treadstone 71

11.5.1.1.17. Wapack Labs

11.5.1.2. Brand & Attack Target Monitoring

11.5.1.2.1. Brand Protect

11.5.1.2.2. CTM360

11.5.1.2.3. Digital Shadows

11.5.1.2.4. DigitalStakeout

11.5.1.2.5. Flashpoint

11.5.1.2.6. Groupsense

11.5.1.2.7. Intsights

11.5.1.2.8. LookingGlass

11.5.1.2.9. Phishlabs

11.5.1.2.10. ShadowDragon

11.5.1.3. Credential Theft

11.5.1.3.1. AdvSTAR Laboratory

11.5.1.3.2. CTM360

11.5.1.3.3. IDAgent

11.5.1.3.4. SpyCloud

11.5.1.3.5. HackNotice

11.5.1.4. Cybersquatting

11.5.1.4.1. AdvSTAR Laboratory

11.5.1.4.2. Comlaude

11.5.1.4.3. CTM360

11.5.1.4.4. DomainTools

11.5.1.4.5. KeepAlert

11.5.1.4.6. Mark Monitor

11.5.1.4.7. RiskIQ

11.5.1.5. External Data Loss & Risk Monitoring

11.5.1.5.1. AdvSTAR Laboratory

11.5.1.5.2. CTM360

11.5.1.5.3. CybelAngel

11.5.1.5.4. Digital Shadows

11.5.1.5.5. DigitalStakeout

11.5.1.5.6. Groupsense

11.5.1.6. Social Media, User Forum and External Threat Monitoring

11.5.1.6.1. AdvSTAR Laboratory

11.5.1.6.2. Bluliv

11.5.1.6.3. Brand Protect

11.5.1.6.4. CTM360

11.5.1.6.5. Digital Shadows

11.5.1.6.6. DigitalStakeout

11.5.1.6.7. Groupsense

11.5.1.6.8. Intsights

11.5.1.6.9. ShadowDragon

11.5.1.6.10. Silobreaker

11.5.1.6.11. Surfwatch Labs

11.5.1.6.12. Tempest Security

11.5.1.6.13. ZeroFOX

11.5.2. Machine-Based (Tactical)

11.5.2.1. Anti-Phishing

11.5.2.1.1. Agari

11.5.2.1.2. Bluliv

11.5.2.1.3. CTM360

11.5.2.1.4. Cyren

11.5.2.1.5. Fraudwatch International

11.5.2.1.6. Kaspersky

11.5.2.1.7. LookingGlass

11.5.2.1.8. Phishlabs

11.5.2.1.9. Phishme

11.5.2.1.10. Phishtank

11.5.2.1.11. SentryBay

11.5.2.1.12. Webroot

11.5.2.2. Anti-Spam

11.5.2.2.1. Agari

11.5.2.2.2. Free

11.5.2.3. Domain Name Monitoring/DGA Feeds

11.5.2.3.1. Bambenek Consulting

11.5.2.3.2. Farsight Security

11.5.2.3.3. ThreatBook

11.5.2.4. File Reputation

11.5.2.4.1. Bit9

11.5.2.4.2. McAfee

11.5.2.4.3. ReversingLabs

11.5.2.4.4. Symantec

11.5.2.4.5. Team Cymru

11.5.2.4.6. Virustotal

11.5.2.4.7. Webroot

11.5.2.4.8. mnemonic.no

11.5.2.5. Indicators of Compromise (Feeds)

11.5.2.5.1. Crowdstrike

11.5.2.5.2. Cyren

11.5.2.5.3. Infoblox

11.5.2.5.4. IOC Bucket

11.5.2.5.5. iSightPartners

11.5.2.5.6. Kaspersky

11.5.2.5.7. McAfee

11.5.2.5.8. mnemonic.no

11.5.2.5.9. SenseCy

11.5.2.5.10. ThreatBook

11.5.2.5.11. Treadstone 71

11.5.2.5.12. Verisign

11.5.2.5.13. Wapack Labs

11.5.2.6. IP Blacklists

11.5.2.6.1. Anti Hacker Alliance

11.5.2.6.2. Botscout

11.5.2.6.3. Cyren

11.5.2.6.4. Dshield

11.5.2.6.5. Kaspersky

11.5.2.6.6. Shadowserver

11.5.2.6.7. SpamHaus

11.5.2.6.8. Stop-Spam.org

11.5.2.6.9. Team Cymru

11.5.2.6.10. Webroot

11.5.2.6.11. hosts-file.net

11.5.2.6.12. mnemonic.no

11.5.2.6.13. ThreatBook

11.5.2.7. IP Reputation Feeds

11.5.2.7.1. BitSight Technologies

11.5.2.7.2. McAfee

11.5.2.7.3. Cisco (OpenDNS)

11.5.2.7.4. ReversingLabs

11.5.2.7.5. SURBL

11.5.2.7.6. Symantec

11.5.2.7.7. Team Cymru

11.5.2.7.8. The Media Trust

11.5.2.7.9. Trend Micro

11.5.2.7.10. WebRoot

11.5.2.7.11. ThreatBook

11.5.2.8. Malicious Hashes

11.5.2.8.1. ThreatBook

11.5.2.9. TI Feed Aggregation

11.5.2.9.1. Critical Stack

11.5.2.10. Vulnerabilities and Exploits

11.5.2.10.1. CXSecurity

11.5.2.10.2. Dragos

11.5.2.10.3. ExploitDB

11.5.2.10.4. Rapid7

11.5.2.10.5. Security Focus DB

11.5.2.11. Web Malware

11.5.2.11.1. Free URL/Domain/IP Lists

11.5.2.11.2. Website Malware Monitoring Services

11.5.2.11.3. Paid URL/Domain/IP Lists