Emerging Security Markets & Technologies - by Lawrence Pingree

马上开始. 它是免费的哦
注册 使用您的电邮地址
Emerging Security Markets & Technologies - by Lawrence Pingree 作者: Mind Map: Emerging Security Markets & Technologies - by Lawrence Pingree

1. Identification, Authentication, Access Control & IAM

1.1. Active Directory Defense

1.1.1. Acalvio

1.1.2. Crowdstrike

1.1.3. SentinelOne

1.1.4. Varonis

1.2. Cloud Infrastructure Entitlement Management

1.2.1. Attivo Networks

1.2.2. Authomize

1.2.3. Britive

1.2.4. CyberArk

1.2.5. Ermetic

1.2.6. Horangi Cyber Security

1.2.7. Microsoft

1.2.8. Obsidian

1.2.9. Palo Alto Networks

1.2.10. SailPoint

1.2.11. Saviynt

1.2.12. Sonrai Security

1.2.13. Zscaler

1.3. Identity Threat Detection and Response (ITDR)

1.3.1. Authmind

1.3.2. Authomize

1.3.3. Cayosoft

1.3.4. CionSystems

1.3.5. Crowdstrike

1.3.6. Imanami

1.3.7. Lepide

1.3.8. ManageEngine

1.3.9. Microsoft (Defender for Cloud)

1.3.10. Netwrix

1.3.11. Oort

1.3.12. Plurilock

1.3.13. QOMPLX

1.3.14. Quest

1.3.15. Semperis

1.3.16. SentinelOne

1.3.17. Silverfort

1.3.18. Varonis

1.3.19. Varonis

1.3.20. Zohno

1.4. Zero Knowledge Proofs (ZKP)

1.4.1. Hardware Accelerators

1.4.1.1. ingonyama

1.4.2. ZKP Services

1.4.2.1. Nulink

2. Infrastructure Protection

2.1. Blockchain-Based Data Protection

2.1.1. Acronis

2.2. Enterprise SIGINT

2.2.1. AirEye

2.2.2. Hawkeye360

2.2.3. Loch Technologies

2.2.4. xScape

2.3. Zero Trust Network Access (ZTNA)

2.3.1. Absolute Software

2.3.2. Akamai

2.3.3. Appgate

2.3.4. Banyan Security

2.3.5. Barracuda

2.3.6. Bitglass

2.3.7. Blackberry

2.3.8. Cato Networks

2.3.9. Check Point

2.3.10. Cisco

2.3.11. Cloudflare

2.3.12. Cyolo

2.3.13. Forcepoint

2.3.14. Fortinet

2.3.15. Instasafe

2.3.16. Ivanti

2.3.17. Netscope

2.3.18. Okta

2.3.19. Palo Alto Networks

2.3.20. Pulse Secure

2.3.21. Sophos

2.3.22. Symantec

2.3.23. Verizon

2.3.24. Versa Networks

2.3.25. Zscaler

3. Internet of Things (IoT/OT)

3.1. Access Control

3.1.1. Sensify Security

3.2. Anomaly Detection

3.2.1. InfluxData

3.3. Authentication

3.3.1. Device Authority

3.3.2. Sensify Security

3.3.3. Trusfort

3.4. Automotive

3.4.1. Argus Cyber Security

3.4.2. Karamba Security

3.4.3. ProvenCore

3.4.4. Security Innovation

3.5. Embedded Security

3.5.1. ProvenCore

3.5.2. Security Innovation

3.5.3. Sequitur Labs

3.6. Encryption

3.6.1. Rubicon

3.7. Gateways

3.7.1. Bayshore Networks

3.7.2. Xage Security

3.7.3. Huawei

3.8. Industrial Control Systems (ICS/SCADA)

3.8.1. Network Traffic Inspection

3.8.1.1. Claroty

3.8.1.2. CyberX

3.8.1.3. Dragos

3.8.1.4. Indegy

3.8.1.5. Nexdefense

3.8.1.6. Sentryo

3.8.2. Firewall

3.8.2.1. Check Point Software

3.8.2.2. Forcepoint

3.8.2.3. Fortinet

3.8.2.4. Radiflow

3.8.3. Remote Access

3.8.3.1. Claroty

3.9. Power Monitoring

3.9.1. PFP Cybersecurity

3.10. Radio

3.10.1. Bastille

3.11. Risk and Compliance

3.11.1. VDOO

3.12. Operating System

3.12.1. ProvenCore

4. Risk, Compliance and Security Management

4.1. Security Ratings & Insurance

4.1.1. Security Ratings

4.1.1.1. Bitsight Technologies

4.1.1.2. FICO

4.1.1.3. Gooann

4.1.1.4. Guidewire Software

4.1.1.5. Prevalent

4.1.1.6. SecurityScoreCard

4.1.2. Cyber Risk Insurance

4.1.2.1. Balsiger Insurance

4.1.2.2. CyberWrite

4.1.2.3. HSB Group

4.1.2.4. Philadelphia Insurance Companies

4.1.2.5. Tennant Risk Services

4.1.2.6. The Hartford

4.1.2.7. Travelers

4.2. Digital Risk Protection Services

4.2.1. BlueVoyant

4.2.2. CybelAngel

4.2.3. CyberInt

4.2.4. Digital Shadows

4.2.5. IntSights

4.2.6. PhishLabs

4.2.7. Recorded Future

4.2.8. RiskIQ

4.2.9. SafeGuard Cyber

4.2.10. ZeroFOX

5. Security Operations & Incident Response

5.1. AI Assisted SOC

5.1.1. BlinkOps

5.1.2. Bricklayer.ai

5.1.3. Dropzone.ai

5.1.4. Method Security

5.1.5. Microsoft

5.1.6. SalemCyber

5.1.7. SevenAI

5.1.8. StrikeReady

5.1.9. Wraithwatch

5.2. Cloud Incident Response Automation (CIRA)

5.2.1. Binalyze

5.2.2. Cado Security

5.2.3. Cado Security, Binalyze, F-Response, Mitiga, Magnet Forensics, Paraben

5.2.4. F-Response

5.2.5. Magnet Forensics

5.2.6. Mitiga

5.2.7. Paraben

5.3. Continuous Threat and Exposure Management

5.3.1. Cyber Asset Attack Surface Management

5.3.1.1. AirTrack Software

5.3.1.2. AppNovi

5.3.1.3. Armis

5.3.1.4. Axonius

5.3.1.5. Balbix

5.3.1.6. Brinqa

5.3.1.7. CoalFire

5.3.1.8. Cyberpion

5.3.1.9. CyCognito

5.3.1.10. DigitalShadows

5.3.1.11. Dragonfly Cyber

5.3.1.12. FireCompass

5.3.1.13. HackerOne

5.3.1.14. JupiterOne

5.3.1.15. LookingGlass Cyber

5.3.1.16. Microsoft

5.3.1.17. Netspi

5.3.1.18. New Push

5.3.1.19. Noetic Cyber

5.3.1.20. NorthStar.io

5.3.1.21. Palo Alto Networks

5.3.1.22. Panaseer

5.3.1.23. Pentera

5.3.1.24. Performata

5.3.1.25. Randori

5.3.1.26. RunZero

5.3.1.27. Sevco Security

5.3.1.28. TemplarBit

5.3.2. External ASM (EASM)

5.3.2.1. Assetnote

5.3.2.2. Censys

5.3.2.3. Crowdstrike

5.3.2.4. CyCognito

5.3.2.5. Darktrace

5.3.2.6. FireCompass

5.3.2.7. IBM (Formerly Randori)

5.3.2.8. Immuniweb

5.3.2.9. LookingGlass Cyber

5.3.2.10. Mandiant

5.3.2.11. Palo Alto Networks

5.3.2.12. Performata

5.3.2.13. Recorded Future

5.3.2.14. Reflectiz

5.3.2.15. Team Cymru

5.3.2.16. Upguard

5.4. Cyber Defense Program Optimization (CDPO)

5.4.1. Bluelava

5.4.2. Cardinal Ops

5.4.3. Enveedo

5.4.4. Holisticyber

5.4.5. Onyxia

5.4.6. Posturity

5.4.7. Rivial

5.4.8. SeeMetrics

5.4.9. Trustmapp

5.4.10. Veriti

5.4.11. XM Cyber

5.5. Cyber Ranges

5.5.1. Cloud Range

5.5.2. CYBER RANGES

5.5.3. Cyberbit

5.5.4. Cyrin

5.5.5. IBM

5.5.6. Immersive Labs

5.5.7. Keysight

5.5.8. RangeForce

5.5.9. Simspace

5.6. Intelligence/Data Feeds/Software & Services

5.6.1. Collaborative Threat Investigation Platforms

5.6.1.1. BAE Systems Detica

5.6.1.1.1. Cybereveal

5.6.1.2. Maltego

5.6.1.3. NC4

5.6.1.4. Palentir

5.6.1.4.1. Cyber

5.6.2. Open Source Threat & Data Mining

5.6.2.1. ThreatCrowd.org

5.6.2.2. ThreatMiner.org

5.6.3. Security Intelligence and Data Analysis Platforms

5.6.3.1. Trellix

5.6.3.1.1. Security Orchestrator

5.6.3.2. Palentir

5.6.4. Threat Intelligence Platforms (TIPs)

5.6.4.1. Anomali

5.6.4.2. BAE Systems

5.6.4.3. Comilion

5.6.4.4. CTILab

5.6.4.5. Cyjax

5.6.4.6. Eclectic IQ

5.6.4.7. Infoblox

5.6.4.8. Lockheed Martin

5.6.4.9. Lookingglass Cyber Solutions

5.6.4.10. Microsoft

5.6.4.10.1. Interflow

5.6.4.11. NC4

5.6.4.11.1. Soltra

5.6.4.12. Pulsedive

5.6.4.13. Service Now (Formerly Brightpoint)

5.6.4.14. Synopsys

5.6.4.15. ThreatConnect

5.6.4.16. ThreatQuotient

5.6.4.17. TruStar

5.6.4.18. Zeneth

5.6.5. Threat Intelligence Services

5.6.5.1. Human Intelligence - HUMINT (Strategic)

5.6.5.1.1. Attacker Tactics, Techniques and Procedures

5.6.5.1.2. Brand & Attack Target Monitoring

5.6.5.1.3. Credential Theft

5.6.5.1.4. Cybersquatting

5.6.5.1.5. External Data Loss & Risk Monitoring

5.6.5.1.6. Social Media, User Forum and External Threat Monitoring

5.6.5.2. Machine-Based (Tactical)

5.6.5.2.1. Anti-Phishing

5.6.5.2.2. Anti-Spam

5.6.5.2.3. Domain Name Monitoring/DGA Feeds

5.6.5.2.4. File Reputation

5.6.5.2.5. Indicators of Compromise (Feeds)

5.6.5.2.6. IP Blacklists

5.6.5.2.7. IP Reputation Feeds

5.6.5.2.8. Malicious Hashes

5.6.5.2.9. TI Feed Aggregation

5.6.5.2.10. Vulnerabilities and Exploits

5.6.5.2.11. Web Malware

5.7. Penetration Testing as a Service (PTaaS)

5.7.1. BreachLock

5.7.2. Cobalt.io

5.7.3. CyberTest

5.7.4. Edgescan

5.7.5. Guidepoint

5.7.6. Hackerone

5.7.7. strobes.co

5.7.8. TrollEye Security

5.7.9. NetSpi

5.8. Security Search

5.8.1. Cyclops Security

6. ML and GenAI Security

6.1. AI TRISM

6.1.1. AI Application Security

6.1.1.1. Bosh AISheild

6.1.1.2. CalypsoAI

6.1.1.3. HiddenLayer

6.1.2. GenAI Runtime Defense (GARD)

6.1.2.1. ArthurAI

6.1.2.2. Bosch AI Shield

6.1.2.3. Calypso.ai

6.1.2.4. Cloudflare

6.1.2.5. Knostic

6.1.2.6. Lasso Security

6.1.2.7. LLMShield

6.1.2.8. lunar.dev

6.1.2.9. Motific

6.1.2.10. Palo Alto Networks

6.1.2.11. tmryk

6.1.2.12. TrojAI

6.1.2.13. ZeroTrusted.ai

6.1.3. Model Monitoring

6.1.3.1. Abzu

6.1.3.2. Amruta Inc

6.1.3.3. Arize AI

6.1.3.4. ArthurAI

6.1.3.5. DreamQuark

6.1.3.6. Fairly.ai

6.1.3.7. Fiddler

6.1.3.8. Giskard

6.1.3.9. Kyndi

6.1.3.10. Robust Intelligence

6.1.3.11. Seldon Technologies

6.1.3.12. SolasAI

6.1.3.13. Superwise

6.1.3.14. TMRYK

6.1.3.15. TrojAI

6.1.3.16. Truera

6.1.4. Model Ops

6.1.4.1. Aporia

6.1.4.2. Cnvrg.io

6.1.4.3. HPE

6.1.4.4. Iguazio

6.1.4.5. ModelOp

6.1.4.6. Modzy

6.1.4.7. Mona

6.1.4.8. One Data

6.1.4.9. tmryk

6.1.4.10. Valohai

6.1.4.11. Verta

6.1.5. Privacy & Data Security

6.1.5.1. Anonos

6.1.5.2. DivePlane

6.1.5.3. Ederlabs

6.1.5.4. Enveil

6.1.5.5. Gretel

6.1.5.6. Hazy

6.1.5.7. LLMShield

6.1.5.8. Mostly AI

6.1.5.9. Plurilock

6.1.5.10. Private AI

6.1.5.11. Protopia AI

6.1.5.12. Securiti

6.2. AI Platforms

6.2.1. Ask Sage

6.2.1.1. Data Encryption

6.2.2. Azure AI

6.2.2.1. Prompt Filtering

6.2.2.2. Data Grounding/Retrieval

6.2.2.3. Data Encryption at Rest

6.2.3. Google

6.2.4. HuggingFace

6.3. Secure Code Copilots

6.3.1. Alphacode

6.3.2. Amazon Codewhisperer

6.3.3. Ask Codi

6.3.4. Bito

6.3.5. Captain Stack

6.3.6. CodeGeex

6.3.7. Codeium

6.3.8. Fossa

6.3.9. Github

6.3.10. GPT-Code-Clippy (GPT-CC)

6.3.11. IntelliCode

6.3.12. Replit

6.3.13. Tabnine

6.3.14. YouCompleteMe

6.4. AI and Data Science Consulting

6.4.1. 7EDGE

6.4.2. Addepto

6.4.3. Azati

6.4.4. Boston Consulting Group

6.4.5. Cambridge Consultants

6.4.6. Dataroot Labs

6.4.7. Datatech.ai

6.4.8. Deeper Insight

6.4.9. ExaWizards

6.4.10. EY

6.4.11. Fayrix

6.4.12. IBM

6.4.13. Infosys

6.4.14. Leeway Hertz

6.4.15. Markovate

6.4.16. Quantum Black

6.4.17. Sirius

6.4.18. Skienda

6.4.19. Telstra Purple

7. Managed Attribution

7.1. Authentic8

7.2. Dispel.io

7.3. nTrepid

7.4. Replica

7.5. Zero Point Security

7.6. Dispersive.io

8. Preemptive Cyber Defense (PCD)

8.1. Applications

8.1.1. General Apps

8.1.1.1. Polyverse

8.1.1.2. RunSafe Security

8.1.1.3. Jscrambler

8.1.1.4. RunSafe Security

8.1.2. Mobile Apps

8.1.2.1. Everspin Global

8.1.3. APIs

8.1.3.1. HOPR

8.1.4. Application Mesh

8.1.4.1. Hopr.co

8.1.4.2. Cloudflare

8.1.5. Mobile Apps

8.1.5.1. Everspin Global

8.2. Data Security

8.2.1. Nexitech

8.2.2. Hypersphere

8.3. Deception

8.3.1. Active Directory

8.3.1.1. Acalvio

8.3.1.2. Proofpoint

8.3.1.3. SentinelOne

8.3.2. Distributed Deception Platforms

8.3.2.1. Acalvio

8.3.2.2. Blumira

8.3.2.3. CommVault

8.3.2.4. CounterCraft

8.3.2.5. Cybersense.ai

8.3.2.6. Cynet

8.3.2.7. Defensys

8.3.2.8. Fidelis Cybersecurity

8.3.2.9. Fortinet

8.3.2.10. Labyrinth.tech

8.3.2.11. PacketViper

8.3.2.12. Rapid7

8.3.2.13. Seedata.io

8.3.2.14. SentinelOne

8.3.2.15. Thinkst Canary

8.3.2.16. Zscaler

8.3.3. Endpoint

8.3.3.1. Cybertrap

8.3.3.2. DeceptiveBytes

8.3.3.3. Minerva Labs

8.4. Kubernetes

8.4.1. R6 Security

8.5. Memory

8.5.1. Anjuna

8.5.2. Arms Cyber Defense

8.5.3. Intel

8.5.4. Morphisec

8.6. Network

8.6.1. CryptoniteNXT

8.6.2. Dispel.io

8.6.3. Dispersive.io

8.6.4. scatr.it

8.7. Operating Systems

8.7.1. Runsafe Security

8.8. Secure Computation

8.8.1. Agita Labs

8.8.2. Kameleon Security

8.8.3. Polyverse

9. Application Security

9.1. API Defense

9.1.1. Cequence Security

9.1.2. Google Cloud

9.1.3. Imperva

9.1.4. L7Defense

9.1.5. Mulesoft

9.1.6. Noname Security

9.1.7. Salt.Security

9.1.8. Signal Sciences

9.1.9. SignalSciences

9.1.10. Spherical Defence

9.1.11. Spherical Defense

9.1.12. WallArm

9.1.13. Securelayer7

9.2. API Security Scanners

9.2.1. Acunetix

9.2.2. Akto

9.2.3. Aptori.dev

9.2.4. Astra

9.2.5. Brightsec

9.2.6. Checkmarx

9.2.7. Contrast Security

9.2.8. Firetail.io

9.2.9. HostedScan

9.2.10. Intruder.io

9.2.11. Levo.ai

9.2.12. Portswigger

9.2.13. Probely

9.2.14. Rapid7

9.2.15. Securelayer7

9.2.16. Wallarm

9.3. Application Security Posture Management (ASPM)

9.3.1. Apiiro

9.3.2. ArmorCode

9.3.3. Bionic

9.3.4. Brinqa

9.3.5. Data Theorum

9.3.6. Dazz

9.3.7. Enso Security

9.3.8. Kenna Security

9.3.9. Kondukto

9.3.10. Maverix

9.3.11. Nucleus

9.3.12. Ox Security

9.3.13. Oxeye

9.3.14. Rezilion

9.3.15. Synopsys (Code Dx)

9.3.16. Tromzo

9.3.17. Wabbi

9.4. Automated Moving Target Defense

9.4.1. Applications

9.4.1.1. Application Mesh

9.4.1.1.1. Hopr.co

9.4.1.1.2. Cloudflare

9.4.1.2. General Apps

9.4.1.2.1. RunSafe Security

9.4.1.2.2. Jscrambler

9.4.1.3. Mobile Apps

9.4.1.3.1. Everspin Global

9.5. Composable Security APIs

9.5.1. Abuse.ch (URLHAUS)

9.5.2. Alienvault

9.5.3. Amazon

9.5.4. Avira

9.5.5. Bitdefender

9.5.6. BrightCloud (OpenText)

9.5.7. CISA (Automated Intelligence Sharing - AIS)

9.5.8. Domaintools

9.5.9. Fingerbank

9.5.10. Flare

9.5.11. Google (Virustotal)

9.5.12. Infraguard

9.5.13. Intel 471

9.5.14. MISP

9.5.15. Okta

9.5.16. OpenPhish

9.5.17. Pangea Security

9.5.18. Ping Identity

9.5.19. Proofpoint (Emerging Threats)

9.5.20. ReversingLabs

9.5.21. Sophos

9.5.22. Spamhaus

9.5.23. Stairwell

9.5.24. VMray

9.6. Open Source Vulnerability Management

9.6.1. Seal.Security

9.6.2. Tidelift

10. BlockChain

10.1. Asset Integrity

10.1.1. Guardtime

10.2. Authentication

10.2.1. NuID

10.3. Blockchain Security Monitoring

10.3.1. Hypernative.io

10.4. BlockChain Surveillence and Analytics

10.4.1. Ankrscan

10.4.2. Bitquery

10.4.3. Chainalysis

10.4.4. CipherTrace

10.4.5. Coinmetrics

10.4.6. Cyvers.ai

10.4.7. Elementus

10.4.8. elliptic.co

10.4.9. Lukka

10.4.10. Messari.io

10.4.11. Trmlabs

10.5. Encryption

10.5.1. REMME

10.6. Fraud Prevention

10.6.1. Cube3.ai

10.6.2. Blockaid

10.7. Hardware Wallets

10.7.1. CoolWallet

10.7.2. Ellipal

10.7.3. KeepKey

10.7.4. Ledger

10.7.5. PrivacyPros

10.7.6. SafePal

10.7.7. ShiftCrypto

10.7.8. Trezor.io

10.8. Software Defined Perimeter

10.8.1. Block Armour

10.9. Web3 Security

10.9.1. Blockaid

10.9.2. Cyvers.ai

10.9.3. Dedge Security

10.9.4. Hexagate

10.9.5. Hypernative

10.9.6. Metatrust Labs

10.9.7. OpenZeppelin

10.9.8. SolidarityScan

11. Cloud and SaaS Security

11.1. Cloud and SaaS Native Application Protection (CSNAP)

11.1.1. Cloud Infrastructure Entitlement Management (CIEM)

11.1.1.1. ARCON

11.1.1.2. Authomize

11.1.1.3. Britive

11.1.1.4. CyberArk

11.1.1.5. Ermetic

11.1.1.6. Horangi Cyber Security

11.1.1.7. Microsoft (CloudKnox Security)

11.1.1.8. Orca Security

11.1.1.9. Palo Alto Networks

11.1.1.10. SailPoint

11.1.1.11. Saviynt

11.1.1.12. SentinelOne (Attivo Networks)

11.1.1.13. Sonrai Security

11.1.1.14. Sysdig

11.1.1.15. Uptycs

11.1.1.16. Wiz

11.1.1.17. Zscaler

11.1.2. Cloud Management

11.1.2.1. Amazon AWS

11.1.2.2. Azure

11.1.2.3. Cyclops

11.1.2.4. DevSpace

11.1.2.5. Exoscale

11.1.2.6. Google GCP

11.1.2.7. Kubevious

11.1.2.8. Platform9

11.1.2.9. Qovery

11.1.2.10. Rancher

11.1.3. Cloud Security Posture Management (CSPM)

11.1.3.1. Alert Logic

11.1.3.2. AlienV

11.1.3.3. Carbon Black

11.1.3.4. Check Point

11.1.3.5. Cisco

11.1.3.6. F-Secure

11.1.3.7. FireEye

11.1.3.8. IBM Security

11.1.3.9. Kaspersky

11.1.3.10. LogRhythm

11.1.3.11. McAfee

11.1.3.12. Palo Alto Networks

11.1.3.13. Qualys

11.1.3.14. Rapid7

11.1.3.15. Sophos

11.1.3.16. Splunk

11.1.3.17. Symantec

11.1.3.18. Tenable

11.1.3.19. Trend Micro

11.1.3.20. Wiz

11.1.4. Cloud Workload Protection (CWP)

11.1.4.1. Aqua Security

11.1.4.2. Bionic

11.1.4.3. BMC (Helix Cloud Security)

11.1.4.4. Caveonix

11.1.4.5. Check Point Software

11.1.4.6. Cyberark

11.1.4.7. Ermetic

11.1.4.8. F5

11.1.4.9. Fugue

11.1.4.10. Lacework

11.1.4.11. Microsoft (Defender for Cloud)

11.1.4.12. NetApp (Formerly CloudCheckr

11.1.4.13. nOps

11.1.4.14. Orca

11.1.4.15. Palo Alto Networks (Prisma Cloud)

11.1.4.16. Rapid7

11.1.4.17. RuneCast

11.1.4.18. Skyhigh Security

11.1.4.19. Sophos Cloud Optix

11.1.4.20. Sysdig

11.1.4.21. Tenable

11.1.4.22. Tenacity

11.1.4.23. Threat Stack

11.1.4.24. Trellix

11.1.4.25. Trend Micro

11.1.4.26. Turbot

11.1.4.27. Wiz

11.1.5. Data Provenance/Lineage

11.1.5.1. RKVST

11.1.5.2. Alation

11.1.5.3. Informatica

11.1.5.4. Octopai

11.1.6. Data Security

11.1.6.1. Data Security Posture Management

11.1.6.1.1. Concentric AI

11.1.6.1.2. Cyera

11.1.6.1.3. DIG Security

11.1.6.1.4. Flow Security

11.1.6.1.5. Laminar

11.1.6.1.6. Orca Security

11.1.6.1.7. Polar Security

11.1.6.1.8. Satori

11.1.6.1.9. Securiti.AI

11.1.6.1.10. Sentra

11.1.6.1.11. Symmetry Systems

11.1.6.1.12. Varonis

11.1.6.2. Isolation and Vaulting

11.1.6.2.1. Acronis

11.1.6.2.2. Cohesity

11.1.6.2.3. Commvault

11.1.6.2.4. Dell

11.1.6.2.5. Elastio

11.1.6.2.6. Rubric

11.1.6.2.7. Veeam

11.1.6.2.8. Veritas Technologies

11.1.6.3. Data Security Platforms

11.1.6.3.1. Cyera

11.1.6.3.2. IBM

11.1.6.3.3. Immuta

11.1.6.3.4. Okera

11.1.6.3.5. OneTrust

11.1.6.3.6. Prime Factors

11.1.6.3.7. Privacera

11.1.6.3.8. Privitar

11.1.6.3.9. Protegrity

11.1.6.3.10. Satori

11.1.6.3.11. SecuPi

11.1.6.3.12. TrustArc

11.1.6.3.13. Varonis

11.1.7. Kubernetes Security

11.1.7.1. Kubernetes Security Posture Management (KSPM)

11.1.7.1.1. Aqua Security

11.1.7.1.2. Armo Security

11.1.7.1.3. Buildpiper

11.1.7.1.4. Check Point Software

11.1.7.1.5. Orca Security

11.1.7.1.6. Runecast

11.1.7.1.7. Sysdig

11.1.7.2. Cloud Workload Protection (CWP)

11.1.7.2.1. Aqua Security

11.1.7.2.2. Crowdstrike

11.1.7.2.3. Microsoft

11.1.7.2.4. Palo Alto Networks

11.1.7.2.5. Redhat ACS

11.1.7.2.6. SentinelOne

11.1.7.2.7. Sophos (Capsule8)

11.1.7.2.8. SUSE (Neuvector)

11.1.7.2.9. Tigera

11.1.7.2.10. Trend Micro

11.1.7.2.11. Uptycs

11.1.7.2.12. Wiz

11.1.7.3. Kubernetes Runtime Security

11.1.7.3.1. Aqua Security

11.1.7.3.2. Araali Networks

11.1.7.3.3. Crowdstrike

11.1.7.3.4. DeepFactor

11.1.7.3.5. Kodem Security

11.1.7.3.6. KSOC

11.1.7.3.7. LightSpin Security

11.1.7.3.8. Operant.ai

11.1.7.3.9. Palo Alto Networks

11.1.7.3.10. Snyk

11.1.7.3.11. Sweet Security

11.1.7.3.12. Sysdig

11.1.7.3.13. ThreatX

11.1.7.3.14. Upwind Security

11.1.7.3.15. Wiz

11.1.7.4. API Defense

11.1.7.4.1. Microsoft Azure Firewall

11.1.7.4.2. Prophaze

11.1.7.4.3. Tigera

11.1.7.4.4. Wallarm

11.1.8. SaaS Management Platforms

11.1.8.1. Augmentt

11.1.8.2. Auvik

11.1.8.3. Beamy

11.1.8.4. Bettercloud

11.1.8.5. LeanIx

11.1.8.6. Lumos

11.1.8.7. Oomnitza

11.1.8.8. Productiv

11.1.8.9. Torii

11.1.8.10. Trelica

11.1.8.11. Zluri

11.1.8.12. Zylo

11.1.9. SaaS Security Posture Management (SSPM)

11.1.9.1. Adaptive Shield

11.1.9.2. Appomni

11.1.9.3. Asterisk Security

11.1.9.4. Atmosec

11.1.9.5. Axonius

11.1.9.6. DoControl

11.1.9.7. Obsidian Security

11.1.9.8. Privya

11.1.9.9. Reco.ai

11.1.9.10. Reveal Security

11.1.9.11. Valence Security

11.1.9.12. Wing Security

12. Enterprise Browser Security

12.1. Browser Extensions for Security

12.1.1. Conceal.io

12.1.2. Ermes

12.1.3. Grip Security

12.1.4. Guard.io

12.1.5. Hackasecurity

12.1.6. HP

12.1.7. Inky

12.1.8. Keep Aware

12.1.9. Lasso Security

12.1.10. LayerX

12.1.11. Manage Engine

12.1.12. Perception Point

12.1.13. Red Access

12.1.14. Seraphic

12.1.15. Seraphic

12.1.16. Session Guardian

12.1.17. Slashnext

12.1.18. Trend Micro

12.2. Secure Enterprise Browsers

12.2.1. Island.io

12.2.2. Palo Alto Networks

12.2.3. Google Enterprise Browser

13. Collaboration Security

13.1. Abnormal Security

13.2. Check Point Software

13.3. Microsoft

13.4. SafeGuard Cyber

13.5. Slashnext

13.6. Trellix

13.7. Trend Micro

13.8. WithSecure

14. Disinformation Security

14.1. Deepfake Detection

14.1.1. Clarity.ai

14.1.2. Daon

14.1.3. Deepware

14.1.4. Duckduckgoose

14.1.5. Google SynthID

14.1.6. Illuminarty.ai

14.1.7. Intel (Fakecatcher)

14.1.8. Paravision

14.1.9. Reality Defender

14.1.10. Resemble.ai

14.1.11. Sensity.ai

14.1.12. Thehive.ai

14.1.13. Thesentinel.ai

14.1.14. Weverify.eu

14.2. Misinformation Detection

14.2.1. Blackbird.AI

14.2.2. Cyabra

14.2.3. FiveBlocks

14.2.4. Graphika

14.2.5. Logically.ai

14.2.6. NewsGuardtech

14.2.7. Recorded Future

14.2.8. OSavul