1. Identification, Authentication, Access Control & IAM
1.1. Active Directory Defense
1.1.1. Acalvio
1.1.2. Crowdstrike
1.1.3. SentinelOne
1.1.4. Varonis
1.2. Cloud Infrastructure Entitlement Management
1.2.1. Attivo Networks
1.2.2. Authomize
1.2.3. Britive
1.2.4. CyberArk
1.2.5. Ermetic
1.2.6. Horangi Cyber Security
1.2.7. Microsoft
1.2.8. Obsidian
1.2.9. Palo Alto Networks
1.2.10. SailPoint
1.2.11. Saviynt
1.2.12. Sonrai Security
1.2.13. Zscaler
1.3. Identity Threat Detection and Response (ITDR)
1.3.1. Authmind
1.3.2. Authomize
1.3.3. Cayosoft
1.3.4. CionSystems
1.3.5. Crowdstrike
1.3.6. Imanami
1.3.7. Lepide
1.3.8. ManageEngine
1.3.9. Microsoft (Defender for Cloud)
1.3.10. Netwrix
1.3.11. Oort
1.3.12. Plurilock
1.3.13. QOMPLX
1.3.14. Quest
1.3.15. Semperis
1.3.16. SentinelOne
1.3.17. Silverfort
1.3.18. Varonis
1.3.19. Varonis
1.3.20. Zohno
1.4. Zero Knowledge Proofs (ZKP)
1.4.1. Hardware Accelerators
1.4.1.1. ingonyama
1.4.2. ZKP Services
1.4.2.1. Nulink
2. Infrastructure Protection
2.1. Blockchain-Based Data Protection
2.1.1. Acronis
2.2. Enterprise SIGINT
2.2.1. AirEye
2.2.2. Hawkeye360
2.2.3. Loch Technologies
2.2.4. xScape
2.3. Zero Trust Network Access (ZTNA)
2.3.1. Absolute Software
2.3.2. Akamai
2.3.3. Appgate
2.3.4. Banyan Security
2.3.5. Barracuda
2.3.6. Bitglass
2.3.7. Blackberry
2.3.8. Cato Networks
2.3.9. Check Point
2.3.10. Cisco
2.3.11. Cloudflare
2.3.12. Cyolo
2.3.13. Forcepoint
2.3.14. Fortinet
2.3.15. Instasafe
2.3.16. Ivanti
2.3.17. Netscope
2.3.18. Okta
2.3.19. Palo Alto Networks
2.3.20. Pulse Secure
2.3.21. Sophos
2.3.22. Symantec
2.3.23. Verizon
2.3.24. Versa Networks
2.3.25. Zscaler
3. Internet of Things (IoT/OT)
3.1. Access Control
3.1.1. Sensify Security
3.2. Anomaly Detection
3.2.1. InfluxData
3.3. Authentication
3.3.1. Device Authority
3.3.2. Sensify Security
3.3.3. Trusfort
3.4. Automotive
3.4.1. Argus Cyber Security
3.4.2. Karamba Security
3.4.3. ProvenCore
3.4.4. Security Innovation
3.5. Embedded Security
3.5.1. ProvenCore
3.5.2. Security Innovation
3.5.3. Sequitur Labs
3.6. Encryption
3.6.1. Rubicon
3.7. Gateways
3.7.1. Bayshore Networks
3.7.2. Xage Security
3.7.3. Huawei
3.8. Industrial Control Systems (ICS/SCADA)
3.8.1. Network Traffic Inspection
3.8.1.1. Claroty
3.8.1.2. CyberX
3.8.1.3. Dragos
3.8.1.4. Indegy
3.8.1.5. Nexdefense
3.8.1.6. Sentryo
3.8.2. Firewall
3.8.2.1. Check Point Software
3.8.2.2. Forcepoint
3.8.2.3. Fortinet
3.8.2.4. Radiflow
3.8.3. Remote Access
3.8.3.1. Claroty
3.9. Power Monitoring
3.9.1. PFP Cybersecurity
3.10. Radio
3.10.1. Bastille
3.11. Risk and Compliance
3.11.1. VDOO
3.12. Operating System
3.12.1. ProvenCore
4. Risk, Compliance and Security Management
4.1. Security Ratings & Insurance
4.1.1. Security Ratings
4.1.1.1. Bitsight Technologies
4.1.1.2. FICO
4.1.1.3. Gooann
4.1.1.4. Guidewire Software
4.1.1.5. Prevalent
4.1.1.6. SecurityScoreCard
4.1.2. Cyber Risk Insurance
4.1.2.1. Balsiger Insurance
4.1.2.2. CyberWrite
4.1.2.3. HSB Group
4.1.2.4. Philadelphia Insurance Companies
4.1.2.5. Tennant Risk Services
4.1.2.6. The Hartford
4.1.2.7. Travelers
4.2. Digital Risk Protection Services
4.2.1. BlueVoyant
4.2.2. CybelAngel
4.2.3. CyberInt
4.2.4. Digital Shadows
4.2.5. IntSights
4.2.6. PhishLabs
4.2.7. Recorded Future
4.2.8. RiskIQ
4.2.9. SafeGuard Cyber
4.2.10. ZeroFOX
5. Security Operations & Incident Response
5.1. AI Assisted SOC
5.1.1. BlinkOps
5.1.2. Bricklayer.ai
5.1.3. Dropzone.ai
5.1.4. Method Security
5.1.5. Microsoft
5.1.6. SalemCyber
5.1.7. SevenAI
5.1.8. StrikeReady
5.1.9. Wraithwatch
5.2. Cloud Incident Response Automation (CIRA)
5.2.1. Binalyze
5.2.2. Cado Security
5.2.3. Cado Security, Binalyze, F-Response, Mitiga, Magnet Forensics, Paraben
5.2.4. F-Response
5.2.5. Magnet Forensics
5.2.6. Mitiga
5.2.7. Paraben
5.3. Continuous Threat and Exposure Management
5.3.1. Cyber Asset Attack Surface Management
5.3.1.1. AirTrack Software
5.3.1.2. AppNovi
5.3.1.3. Armis
5.3.1.4. Axonius
5.3.1.5. Balbix
5.3.1.6. Brinqa
5.3.1.7. CoalFire
5.3.1.8. Cyberpion
5.3.1.9. CyCognito
5.3.1.10. DigitalShadows
5.3.1.11. Dragonfly Cyber
5.3.1.12. FireCompass
5.3.1.13. HackerOne
5.3.1.14. JupiterOne
5.3.1.15. LookingGlass Cyber
5.3.1.16. Microsoft
5.3.1.17. Netspi
5.3.1.18. New Push
5.3.1.19. Noetic Cyber
5.3.1.20. NorthStar.io
5.3.1.21. Palo Alto Networks
5.3.1.22. Panaseer
5.3.1.23. Pentera
5.3.1.24. Performata
5.3.1.25. Randori
5.3.1.26. RunZero
5.3.1.27. Sevco Security
5.3.1.28. TemplarBit
5.3.2. External ASM (EASM)
5.3.2.1. Assetnote
5.3.2.2. Censys
5.3.2.3. Crowdstrike
5.3.2.4. CyCognito
5.3.2.5. Darktrace
5.3.2.6. FireCompass
5.3.2.7. IBM (Formerly Randori)
5.3.2.8. Immuniweb
5.3.2.9. LookingGlass Cyber
5.3.2.10. Mandiant
5.3.2.11. Palo Alto Networks
5.3.2.12. Performata
5.3.2.13. Recorded Future
5.3.2.14. Reflectiz
5.3.2.15. Team Cymru
5.3.2.16. Upguard
5.4. Cyber Defense Program Optimization (CDPO)
5.4.1. Bluelava
5.4.2. Cardinal Ops
5.4.3. Enveedo
5.4.4. Holisticyber
5.4.5. Onyxia
5.4.6. Posturity
5.4.7. Rivial
5.4.8. SeeMetrics
5.4.9. Trustmapp
5.4.10. Veriti
5.4.11. XM Cyber
5.5. Cyber Ranges
5.5.1. Cloud Range
5.5.2. CYBER RANGES
5.5.3. Cyberbit
5.5.4. Cyrin
5.5.5. IBM
5.5.6. Immersive Labs
5.5.7. Keysight
5.5.8. RangeForce
5.5.9. Simspace
5.6. Intelligence/Data Feeds/Software & Services
5.6.1. Collaborative Threat Investigation Platforms
5.6.1.1. BAE Systems Detica
5.6.1.1.1. Cybereveal
5.6.1.2. Maltego
5.6.1.3. NC4
5.6.1.4. Palentir
5.6.1.4.1. Cyber
5.6.2. Open Source Threat & Data Mining
5.6.2.1. ThreatCrowd.org
5.6.2.2. ThreatMiner.org
5.6.3. Security Intelligence and Data Analysis Platforms
5.6.3.1. Trellix
5.6.3.1.1. Security Orchestrator
5.6.3.2. Palentir
5.6.4. Threat Intelligence Platforms (TIPs)
5.6.4.1. Anomali
5.6.4.2. BAE Systems
5.6.4.3. Comilion
5.6.4.4. CTILab
5.6.4.5. Cyjax
5.6.4.6. Eclectic IQ
5.6.4.7. Infoblox
5.6.4.8. Lockheed Martin
5.6.4.9. Lookingglass Cyber Solutions
5.6.4.10. Microsoft
5.6.4.10.1. Interflow
5.6.4.11. NC4
5.6.4.11.1. Soltra
5.6.4.12. Pulsedive
5.6.4.13. Service Now (Formerly Brightpoint)
5.6.4.14. Synopsys
5.6.4.15. ThreatConnect
5.6.4.16. ThreatQuotient
5.6.4.17. TruStar
5.6.4.18. Zeneth
5.6.5. Threat Intelligence Services
5.6.5.1. Human Intelligence - HUMINT (Strategic)
5.6.5.1.1. Attacker Tactics, Techniques and Procedures
5.6.5.1.2. Brand & Attack Target Monitoring
5.6.5.1.3. Credential Theft
5.6.5.1.4. Cybersquatting
5.6.5.1.5. External Data Loss & Risk Monitoring
5.6.5.1.6. Social Media, User Forum and External Threat Monitoring
5.6.5.2. Machine-Based (Tactical)
5.6.5.2.1. Anti-Phishing
5.6.5.2.2. Anti-Spam
5.6.5.2.3. Domain Name Monitoring/DGA Feeds
5.6.5.2.4. File Reputation
5.6.5.2.5. Indicators of Compromise (Feeds)
5.6.5.2.6. IP Blacklists
5.6.5.2.7. IP Reputation Feeds
5.6.5.2.8. Malicious Hashes
5.6.5.2.9. TI Feed Aggregation
5.6.5.2.10. Vulnerabilities and Exploits
5.6.5.2.11. Web Malware
5.7. Penetration Testing as a Service (PTaaS)
5.7.1. BreachLock
5.7.2. Cobalt.io
5.7.3. CyberTest
5.7.4. Edgescan
5.7.5. Guidepoint
5.7.6. Hackerone
5.7.7. strobes.co
5.7.8. TrollEye Security
5.7.9. NetSpi
5.8. Security Search
5.8.1. Cyclops Security
6. ML and GenAI Security
6.1. AI TRISM
6.1.1. AI Application Security
6.1.1.1. Bosh AISheild
6.1.1.2. CalypsoAI
6.1.1.3. HiddenLayer
6.1.2. GenAI Runtime Defense (GARD)
6.1.2.1. ArthurAI
6.1.2.2. Bosch AI Shield
6.1.2.3. Calypso.ai
6.1.2.4. Cloudflare
6.1.2.5. Knostic
6.1.2.6. Lasso Security
6.1.2.7. LLMShield
6.1.2.8. lunar.dev
6.1.2.9. Motific
6.1.2.10. Palo Alto Networks
6.1.2.11. tmryk
6.1.2.12. TrojAI
6.1.2.13. ZeroTrusted.ai
6.1.3. Model Monitoring
6.1.3.1. Abzu
6.1.3.2. Amruta Inc
6.1.3.3. Arize AI
6.1.3.4. ArthurAI
6.1.3.5. DreamQuark
6.1.3.6. Fairly.ai
6.1.3.7. Fiddler
6.1.3.8. Giskard
6.1.3.9. Kyndi
6.1.3.10. Robust Intelligence
6.1.3.11. Seldon Technologies
6.1.3.12. SolasAI
6.1.3.13. Superwise
6.1.3.14. TMRYK
6.1.3.15. TrojAI
6.1.3.16. Truera
6.1.4. Model Ops
6.1.4.1. Aporia
6.1.4.2. Cnvrg.io
6.1.4.3. HPE
6.1.4.4. Iguazio
6.1.4.5. ModelOp
6.1.4.6. Modzy
6.1.4.7. Mona
6.1.4.8. One Data
6.1.4.9. tmryk
6.1.4.10. Valohai
6.1.4.11. Verta
6.1.5. Privacy & Data Security
6.1.5.1. Anonos
6.1.5.2. DivePlane
6.1.5.3. Ederlabs
6.1.5.4. Enveil
6.1.5.5. Gretel
6.1.5.6. Hazy
6.1.5.7. LLMShield
6.1.5.8. Mostly AI
6.1.5.9. Plurilock
6.1.5.10. Private AI
6.1.5.11. Protopia AI
6.1.5.12. Securiti
6.2. AI Platforms
6.2.1. Ask Sage
6.2.1.1. Data Encryption
6.2.2. Azure AI
6.2.2.1. Prompt Filtering
6.2.2.2. Data Grounding/Retrieval
6.2.2.3. Data Encryption at Rest
6.2.3. Google
6.2.4. HuggingFace
6.3. Secure Code Copilots
6.3.1. Alphacode
6.3.2. Amazon Codewhisperer
6.3.3. Ask Codi
6.3.4. Bito
6.3.5. Captain Stack
6.3.6. CodeGeex
6.3.7. Codeium
6.3.8. Fossa
6.3.9. Github
6.3.10. GPT-Code-Clippy (GPT-CC)
6.3.11. IntelliCode
6.3.12. Replit
6.3.13. Tabnine
6.3.14. YouCompleteMe
6.4. AI and Data Science Consulting
6.4.1. 7EDGE
6.4.2. Addepto
6.4.3. Azati
6.4.4. Boston Consulting Group
6.4.5. Cambridge Consultants
6.4.6. Dataroot Labs
6.4.7. Datatech.ai
6.4.8. Deeper Insight
6.4.9. ExaWizards
6.4.10. EY
6.4.11. Fayrix
6.4.12. IBM
6.4.13. Infosys
6.4.14. Leeway Hertz
6.4.15. Markovate
6.4.16. Quantum Black
6.4.17. Sirius
6.4.18. Skienda
6.4.19. Telstra Purple
7. Managed Attribution
7.1. Authentic8
7.2. Dispel.io
7.3. nTrepid
7.4. Replica
7.5. Zero Point Security
7.6. Dispersive.io
8. Preemptive Cyber Defense (PCD)
8.1. Applications
8.1.1. General Apps
8.1.1.1. Polyverse
8.1.1.2. RunSafe Security
8.1.1.3. Jscrambler
8.1.1.4. RunSafe Security
8.1.2. Mobile Apps
8.1.2.1. Everspin Global
8.1.3. APIs
8.1.3.1. HOPR
8.1.4. Application Mesh
8.1.4.1. Hopr.co
8.1.4.2. Cloudflare
8.1.5. Mobile Apps
8.1.5.1. Everspin Global
8.2. Data Security
8.2.1. Nexitech
8.2.2. Hypersphere
8.3. Deception
8.3.1. Active Directory
8.3.1.1. Acalvio
8.3.1.2. Proofpoint
8.3.1.3. SentinelOne
8.3.2. Distributed Deception Platforms
8.3.2.1. Acalvio
8.3.2.2. Blumira
8.3.2.3. CommVault
8.3.2.4. CounterCraft
8.3.2.5. Cybersense.ai
8.3.2.6. Cynet
8.3.2.7. Defensys
8.3.2.8. Fidelis Cybersecurity
8.3.2.9. Fortinet
8.3.2.10. Labyrinth.tech
8.3.2.11. PacketViper
8.3.2.12. Rapid7
8.3.2.13. Seedata.io
8.3.2.14. SentinelOne
8.3.2.15. Thinkst Canary
8.3.2.16. Zscaler
8.3.3. Endpoint
8.3.3.1. Cybertrap
8.3.3.2. DeceptiveBytes
8.3.3.3. Minerva Labs
8.4. Kubernetes
8.4.1. R6 Security
8.5. Memory
8.5.1. Anjuna
8.5.2. Arms Cyber Defense
8.5.3. Intel
8.5.4. Morphisec
8.6. Network
8.6.1. CryptoniteNXT
8.6.2. Dispel.io
8.6.3. Dispersive.io
8.6.4. scatr.it
8.7. Operating Systems
8.7.1. Runsafe Security
8.8. Secure Computation
8.8.1. Agita Labs
8.8.2. Kameleon Security
8.8.3. Polyverse
9. Application Security
9.1. API Defense
9.1.1. Cequence Security
9.1.2. Google Cloud
9.1.3. Imperva
9.1.4. L7Defense
9.1.5. Mulesoft
9.1.6. Noname Security
9.1.7. Salt.Security
9.1.8. Signal Sciences
9.1.9. SignalSciences
9.1.10. Spherical Defence
9.1.11. Spherical Defense
9.1.12. WallArm
9.1.13. Securelayer7
9.2. API Security Scanners
9.2.1. Acunetix
9.2.2. Akto
9.2.3. Aptori.dev
9.2.4. Astra
9.2.5. Brightsec
9.2.6. Checkmarx
9.2.7. Contrast Security
9.2.8. Firetail.io
9.2.9. HostedScan
9.2.10. Intruder.io
9.2.11. Levo.ai
9.2.12. Portswigger
9.2.13. Probely
9.2.14. Rapid7
9.2.15. Securelayer7
9.2.16. Wallarm
9.3. Application Security Posture Management (ASPM)
9.3.1. Apiiro
9.3.2. ArmorCode
9.3.3. Bionic
9.3.4. Brinqa
9.3.5. Data Theorum
9.3.6. Dazz
9.3.7. Enso Security
9.3.8. Kenna Security
9.3.9. Kondukto
9.3.10. Maverix
9.3.11. Nucleus
9.3.12. Ox Security
9.3.13. Oxeye
9.3.14. Rezilion
9.3.15. Synopsys (Code Dx)
9.3.16. Tromzo
9.3.17. Wabbi
9.4. Automated Moving Target Defense
9.4.1. Applications
9.4.1.1. Application Mesh
9.4.1.1.1. Hopr.co
9.4.1.1.2. Cloudflare
9.4.1.2. General Apps
9.4.1.2.1. RunSafe Security
9.4.1.2.2. Jscrambler
9.4.1.3. Mobile Apps
9.4.1.3.1. Everspin Global
9.5. Composable Security APIs
9.5.1. Abuse.ch (URLHAUS)
9.5.2. Alienvault
9.5.3. Amazon
9.5.4. Avira
9.5.5. Bitdefender
9.5.6. BrightCloud (OpenText)
9.5.7. CISA (Automated Intelligence Sharing - AIS)
9.5.8. Domaintools
9.5.9. Fingerbank
9.5.10. Flare
9.5.11. Google (Virustotal)
9.5.12. Infraguard
9.5.13. Intel 471
9.5.14. MISP
9.5.15. Okta
9.5.16. OpenPhish
9.5.17. Pangea Security
9.5.18. Ping Identity
9.5.19. Proofpoint (Emerging Threats)
9.5.20. ReversingLabs
9.5.21. Sophos
9.5.22. Spamhaus
9.5.23. Stairwell
9.5.24. VMray
9.6. Open Source Vulnerability Management
9.6.1. Seal.Security
9.6.2. Tidelift
10. BlockChain
10.1. Asset Integrity
10.1.1. Guardtime
10.2. Authentication
10.2.1. NuID
10.3. Blockchain Security Monitoring
10.3.1. Hypernative.io
10.4. BlockChain Surveillence and Analytics
10.4.1. Ankrscan
10.4.2. Bitquery
10.4.3. Chainalysis
10.4.4. CipherTrace
10.4.5. Coinmetrics
10.4.6. Cyvers.ai
10.4.7. Elementus
10.4.8. elliptic.co
10.4.9. Lukka
10.4.10. Messari.io
10.4.11. Trmlabs
10.5. Encryption
10.5.1. REMME
10.6. Fraud Prevention
10.6.1. Cube3.ai
10.6.2. Blockaid
10.7. Hardware Wallets
10.7.1. CoolWallet
10.7.2. Ellipal
10.7.3. KeepKey
10.7.4. Ledger
10.7.5. PrivacyPros
10.7.6. SafePal
10.7.7. ShiftCrypto
10.7.8. Trezor.io
10.8. Software Defined Perimeter
10.8.1. Block Armour
10.9. Web3 Security
10.9.1. Blockaid
10.9.2. Cyvers.ai
10.9.3. Dedge Security
10.9.4. Hexagate
10.9.5. Hypernative
10.9.6. Metatrust Labs
10.9.7. OpenZeppelin
10.9.8. SolidarityScan
11. Cloud and SaaS Security
11.1. Cloud and SaaS Native Application Protection (CSNAP)
11.1.1. Cloud Infrastructure Entitlement Management (CIEM)
11.1.1.1. ARCON
11.1.1.2. Authomize
11.1.1.3. Britive
11.1.1.4. CyberArk
11.1.1.5. Ermetic
11.1.1.6. Horangi Cyber Security
11.1.1.7. Microsoft (CloudKnox Security)
11.1.1.8. Orca Security
11.1.1.9. Palo Alto Networks
11.1.1.10. SailPoint
11.1.1.11. Saviynt
11.1.1.12. SentinelOne (Attivo Networks)
11.1.1.13. Sonrai Security
11.1.1.14. Sysdig
11.1.1.15. Uptycs
11.1.1.16. Wiz
11.1.1.17. Zscaler
11.1.2. Cloud Management
11.1.2.1. Amazon AWS
11.1.2.2. Azure
11.1.2.3. Cyclops
11.1.2.4. DevSpace
11.1.2.5. Exoscale
11.1.2.6. Google GCP
11.1.2.7. Kubevious
11.1.2.8. Platform9
11.1.2.9. Qovery
11.1.2.10. Rancher
11.1.3. Cloud Security Posture Management (CSPM)
11.1.3.1. Alert Logic
11.1.3.2. AlienV
11.1.3.3. Carbon Black
11.1.3.4. Check Point
11.1.3.5. Cisco
11.1.3.6. F-Secure
11.1.3.7. FireEye
11.1.3.8. IBM Security
11.1.3.9. Kaspersky
11.1.3.10. LogRhythm
11.1.3.11. McAfee
11.1.3.12. Palo Alto Networks
11.1.3.13. Qualys
11.1.3.14. Rapid7
11.1.3.15. Sophos
11.1.3.16. Splunk
11.1.3.17. Symantec
11.1.3.18. Tenable
11.1.3.19. Trend Micro
11.1.3.20. Wiz
11.1.4. Cloud Workload Protection (CWP)
11.1.4.1. Aqua Security
11.1.4.2. Bionic
11.1.4.3. BMC (Helix Cloud Security)
11.1.4.4. Caveonix
11.1.4.5. Check Point Software
11.1.4.6. Cyberark
11.1.4.7. Ermetic
11.1.4.8. F5
11.1.4.9. Fugue
11.1.4.10. Lacework
11.1.4.11. Microsoft (Defender for Cloud)
11.1.4.12. NetApp (Formerly CloudCheckr
11.1.4.13. nOps
11.1.4.14. Orca
11.1.4.15. Palo Alto Networks (Prisma Cloud)
11.1.4.16. Rapid7
11.1.4.17. RuneCast
11.1.4.18. Skyhigh Security
11.1.4.19. Sophos Cloud Optix
11.1.4.20. Sysdig
11.1.4.21. Tenable
11.1.4.22. Tenacity
11.1.4.23. Threat Stack
11.1.4.24. Trellix
11.1.4.25. Trend Micro
11.1.4.26. Turbot
11.1.4.27. Wiz
11.1.5. Data Provenance/Lineage
11.1.5.1. RKVST
11.1.5.2. Alation
11.1.5.3. Informatica
11.1.5.4. Octopai
11.1.6. Data Security
11.1.6.1. Data Security Posture Management
11.1.6.1.1. Concentric AI
11.1.6.1.2. Cyera
11.1.6.1.3. DIG Security
11.1.6.1.4. Flow Security
11.1.6.1.5. Laminar
11.1.6.1.6. Orca Security
11.1.6.1.7. Polar Security
11.1.6.1.8. Satori
11.1.6.1.9. Securiti.AI
11.1.6.1.10. Sentra
11.1.6.1.11. Symmetry Systems
11.1.6.1.12. Varonis
11.1.6.2. Isolation and Vaulting
11.1.6.2.1. Acronis
11.1.6.2.2. Cohesity
11.1.6.2.3. Commvault
11.1.6.2.4. Dell
11.1.6.2.5. Elastio
11.1.6.2.6. Rubric
11.1.6.2.7. Veeam
11.1.6.2.8. Veritas Technologies
11.1.6.3. Data Security Platforms
11.1.6.3.1. Cyera
11.1.6.3.2. IBM
11.1.6.3.3. Immuta
11.1.6.3.4. Okera
11.1.6.3.5. OneTrust
11.1.6.3.6. Prime Factors
11.1.6.3.7. Privacera
11.1.6.3.8. Privitar
11.1.6.3.9. Protegrity
11.1.6.3.10. Satori
11.1.6.3.11. SecuPi
11.1.6.3.12. TrustArc
11.1.6.3.13. Varonis
11.1.7. Kubernetes Security
11.1.7.1. Kubernetes Security Posture Management (KSPM)
11.1.7.1.1. Aqua Security
11.1.7.1.2. Armo Security
11.1.7.1.3. Buildpiper
11.1.7.1.4. Check Point Software
11.1.7.1.5. Orca Security
11.1.7.1.6. Runecast
11.1.7.1.7. Sysdig
11.1.7.2. Cloud Workload Protection (CWP)
11.1.7.2.1. Aqua Security
11.1.7.2.2. Crowdstrike
11.1.7.2.3. Microsoft
11.1.7.2.4. Palo Alto Networks
11.1.7.2.5. Redhat ACS
11.1.7.2.6. SentinelOne
11.1.7.2.7. Sophos (Capsule8)
11.1.7.2.8. SUSE (Neuvector)
11.1.7.2.9. Tigera
11.1.7.2.10. Trend Micro
11.1.7.2.11. Uptycs
11.1.7.2.12. Wiz
11.1.7.3. Kubernetes Runtime Security
11.1.7.3.1. Aqua Security
11.1.7.3.2. Araali Networks
11.1.7.3.3. Crowdstrike
11.1.7.3.4. DeepFactor
11.1.7.3.5. Kodem Security
11.1.7.3.6. KSOC
11.1.7.3.7. LightSpin Security
11.1.7.3.8. Operant.ai
11.1.7.3.9. Palo Alto Networks
11.1.7.3.10. Snyk
11.1.7.3.11. Sweet Security
11.1.7.3.12. Sysdig
11.1.7.3.13. ThreatX
11.1.7.3.14. Upwind Security
11.1.7.3.15. Wiz
11.1.7.4. API Defense
11.1.7.4.1. Microsoft Azure Firewall
11.1.7.4.2. Prophaze
11.1.7.4.3. Tigera
11.1.7.4.4. Wallarm
11.1.8. SaaS Management Platforms
11.1.8.1. Augmentt
11.1.8.2. Auvik
11.1.8.3. Beamy
11.1.8.4. Bettercloud
11.1.8.5. LeanIx
11.1.8.6. Lumos
11.1.8.7. Oomnitza
11.1.8.8. Productiv
11.1.8.9. Torii
11.1.8.10. Trelica
11.1.8.11. Zluri
11.1.8.12. Zylo
11.1.9. SaaS Security Posture Management (SSPM)
11.1.9.1. Adaptive Shield
11.1.9.2. Appomni
11.1.9.3. Asterisk Security
11.1.9.4. Atmosec
11.1.9.5. Axonius
11.1.9.6. DoControl
11.1.9.7. Obsidian Security
11.1.9.8. Privya
11.1.9.9. Reco.ai
11.1.9.10. Reveal Security
11.1.9.11. Valence Security
11.1.9.12. Wing Security
12. Enterprise Browser Security
12.1. Browser Extensions for Security
12.1.1. Conceal.io
12.1.2. Ermes
12.1.3. Grip Security
12.1.4. Guard.io
12.1.5. Hackasecurity
12.1.6. HP
12.1.7. Inky
12.1.8. Keep Aware
12.1.9. Lasso Security
12.1.10. LayerX
12.1.11. Manage Engine
12.1.12. Perception Point
12.1.13. Red Access
12.1.14. Seraphic
12.1.15. Seraphic
12.1.16. Session Guardian
12.1.17. Slashnext
12.1.18. Trend Micro
12.2. Secure Enterprise Browsers
12.2.1. Island.io
12.2.2. Palo Alto Networks
12.2.3. Google Enterprise Browser
13. Collaboration Security
13.1. Abnormal Security
13.2. Check Point Software
13.3. Microsoft
13.4. SafeGuard Cyber
13.5. Slashnext
13.6. Trellix
13.7. Trend Micro
13.8. WithSecure
14. Disinformation Security
14.1. Deepfake Detection
14.1.1. Clarity.ai
14.1.2. Daon
14.1.3. Deepware
14.1.4. Duckduckgoose
14.1.5. Google SynthID
14.1.6. Illuminarty.ai
14.1.7. Intel (Fakecatcher)
14.1.8. Paravision
14.1.9. Reality Defender
14.1.10. Resemble.ai
14.1.11. Sensity.ai
14.1.12. Thehive.ai
14.1.13. Thesentinel.ai
14.1.14. Weverify.eu
14.2. Misinformation Detection
14.2.1. Blackbird.AI
14.2.2. Cyabra
14.2.3. FiveBlocks
14.2.4. Graphika
14.2.5. Logically.ai
14.2.6. NewsGuardtech
14.2.7. Recorded Future
14.2.8. OSavul