1. Identification, Authentication, Access Control & IAM
1.1. Active Directory Defense
1.1.1. Acalvio
1.1.2. Crowdstrike
1.1.3. SentinelOne
1.1.4. Varonis
1.1.5. Semperis
1.2. Cloud Infrastructure Entitlement Management
1.2.1. Attivo Networks
1.2.2. Authomize
1.2.3. Britive
1.2.4. CyberArk
1.2.5. Ermetic
1.2.6. Horangi Cyber Security
1.2.7. Microsoft
1.2.8. Obsidian
1.2.9. Palo Alto Networks
1.2.10. SailPoint
1.2.11. Saviynt
1.2.12. Sonrai Security
1.2.13. Zscaler
1.3. Identity Threat Detection and Response (ITDR)
1.3.1. Authmind
1.3.2. Authomize
1.3.3. Cayosoft
1.3.4. CionSystems
1.3.5. Crowdstrike
1.3.6. Imanami
1.3.7. Lepide
1.3.8. ManageEngine
1.3.9. Microsoft (Defender for Cloud)
1.3.10. Netwrix
1.3.11. Oort
1.3.12. Plurilock
1.3.13. QOMPLX
1.3.14. Quest
1.3.15. Semperis
1.3.16. SentinelOne
1.3.17. Silverfort
1.3.18. Varonis
1.3.19. Varonis
1.3.20. Zohno
1.4. Zero Knowledge Proofs (ZKP)
1.4.1. Hardware Accelerators
1.4.1.1. ingonyama
1.4.2. ZKP Services
1.4.2.1. Nulink
2. Infrastructure Protection
2.1. Blockchain-Based Data Protection
2.1.1. Acronis
2.1.2. Via Science
2.2. Enterprise SIGINT
2.2.1. AirEye
2.2.2. Hawkeye360
2.2.3. Loch Technologies
2.2.4. xScape
2.3. Zero Trust Network Access (ZTNA)
2.3.1. Absolute Software
2.3.2. Akamai
2.3.3. Appgate
2.3.4. Banyan Security
2.3.5. Barracuda
2.3.6. Bitglass
2.3.7. Blackberry
2.3.8. Cato Networks
2.3.9. Check Point
2.3.10. Cisco
2.3.11. Cloudflare
2.3.12. Cyolo
2.3.13. Forcepoint
2.3.14. Fortinet
2.3.15. Instasafe
2.3.16. Ivanti
2.3.17. Netscope
2.3.18. Okta
2.3.19. Palo Alto Networks
2.3.20. Pulse Secure
2.3.21. Sophos
2.3.22. Symantec
2.3.23. Verizon
2.3.24. Versa Networks
2.3.25. Zscaler
3. Internet of Things (IoT/OT)
3.1. Access Control
3.1.1. Sensify Security
3.2. Anomaly Detection
3.2.1. InfluxData
3.3. Authentication
3.3.1. Device Authority
3.3.2. Sensify Security
3.3.3. Trusfort
3.4. Automotive
3.4.1. Argus Cyber Security
3.4.2. Karamba Security
3.4.3. ProvenCore
3.4.4. Security Innovation
3.5. Embedded Security
3.5.1. ProvenCore
3.5.2. Security Innovation
3.5.3. Sequitur Labs
3.6. Encryption
3.6.1. Rubicon
3.7. Gateways
3.7.1. Bayshore Networks
3.7.2. Xage Security
3.7.3. Huawei
3.8. Industrial Control Systems (ICS/SCADA)
3.8.1. Network Traffic Inspection
3.8.1.1. Claroty
3.8.1.2. CyberX
3.8.1.3. Dragos
3.8.1.4. Indegy
3.8.1.5. Nexdefense
3.8.1.6. Sentryo
3.8.2. Firewall
3.8.2.1. Check Point Software
3.8.2.2. Forcepoint
3.8.2.3. Fortinet
3.8.2.4. Radiflow
3.8.3. Remote Access
3.8.3.1. Claroty
3.9. Power Monitoring
3.9.1. PFP Cybersecurity
3.10. Radio
3.10.1. Bastille
3.10.2. Epiq
3.10.3. Distributed Spectrum
3.11. Risk and Compliance
3.11.1. VDOO
3.12. Operating System
3.12.1. ProvenCore
4. ML and GenAI Security
4.1. AI and Data Science Consulting
4.1.1. 7EDGE
4.1.2. Addepto
4.1.3. Azati
4.1.4. Boston Consulting Group
4.1.5. Cambridge Consultants
4.1.6. Dataroot Labs
4.1.7. Datatech.ai
4.1.8. Deeper Insight
4.1.9. ExaWizards
4.1.10. EY
4.1.11. Fayrix
4.1.12. IBM
4.1.13. Infosys
4.1.14. Leeway Hertz
4.1.15. Markovate
4.1.16. Quantum Black
4.1.17. Sirius
4.1.18. Skienda
4.1.19. Telstra Purple
4.2. Model Ops
4.2.1. Aporia
4.2.2. Cnvrg.io
4.2.3. HPE
4.2.4. Iguazio
4.2.5. ModelOp
4.2.6. Modzy
4.2.7. Mona
4.2.8. One Data
4.2.9. tmryk
4.2.10. Valohai
4.2.11. Verta
4.2.12. AI Platforms
4.2.12.1. Ask Sage
4.2.12.1.1. Data Encryption
4.2.12.2. Aggregators, Edge & Decentralized Networks
4.2.12.2.1. Akash Network
4.2.12.2.2. OpenRouter
4.2.12.2.3. Vercel AI SDK/Gateway
4.2.12.2.4. Hyperbolic
4.2.12.2.5. Hugging Face
4.2.12.2.6. Cloudflare
4.2.12.3. Frontier & Proprietary Model Providers
4.2.12.3.1. Meta
4.2.12.3.2. Mistral AI
4.2.12.3.3. xAI
4.2.12.3.4. Anthropic
4.2.12.3.5. DeepSeek
4.2.12.3.6. Cohere
4.2.12.3.7. AI21 Labs
4.2.12.3.8. Upstage
4.2.12.4. High-Performance & Hardware-Optimized Providers
4.2.12.4.1. Groq
4.2.12.4.2. Cerebras Systems
4.2.12.4.3. Sambanova.ai
4.2.12.4.4. SiliconFlow
4.2.12.4.5. Graphcore Cloud
4.2.12.4.6. Intel
4.2.12.4.7. AMD
4.2.12.5. Enterprise Integrated Cloud Platforms
4.2.12.5.1. Amazon
4.2.12.5.2. Alibaba Cloud
4.2.12.5.3. Baidu
4.2.12.5.4. Databricks
4.2.12.5.5. Google
4.2.12.5.6. IBM
4.2.12.5.7. Microsoft
4.2.12.5.8. Oracle Cloud
4.2.12.5.9. Snowflake
4.2.12.5.10. Salesforce
4.2.12.6. GPU-as-a-Service & Orchestration
4.2.12.6.1. CoreWeave
4.2.12.6.2. DigitalOcean
4.2.12.6.3. LamdaLabs
4.2.12.6.4. Koyeb
4.2.12.6.5. Modal
4.2.12.6.6. Nebius AI
4.2.12.6.7. RunPod
4.2.12.6.8. Scaleway
4.2.12.7. Serverless Open-Model Hosting
4.2.12.7.1. Baseten
4.2.12.7.2. DeepInfra
4.2.12.7.3. Fireworks AI
4.2.12.7.4. Featherless AI
4.2.12.7.5. Novita AI
4.2.12.7.6. Lepton AI
4.2.12.7.7. OctoAI
4.2.12.7.8. Together AI
4.2.12.7.9. Replicate
4.3. AI Security Ecosystem
4.3.1. Unified Agentic Defense Platforms
4.3.1.1. Aim Security
4.3.1.2. BigID
4.3.1.3. Calypso AI
4.3.1.4. Check Point
4.3.1.5. Cyera
4.3.1.6. HiddenLayer
4.3.1.7. Knostic
4.3.1.8. Lumia Security
4.3.1.9. Microsoft
4.3.1.10. Noma Security
4.3.1.11. Palo Alto Networks
4.3.1.12. SentinelOne
4.3.1.13. Witness AI
4.3.2. AI Posture (AI-SPM)
4.3.2.1. Arthur AI
4.3.2.2. Cato Networks
4.3.2.3. Cadea AI
4.3.2.4. Cranium AI
4.3.2.5. Calypso AI
4.3.2.6. Cyata
4.3.2.7. Geordie
4.3.2.8. Defakto Security
4.3.2.9. DeepKeep
4.3.2.10. Noma Security
4.3.2.11. Neuraltrust
4.3.2.12. Pillar Security
4.3.2.13. Wallarm
4.3.2.14. Silverfort
4.3.2.15. Zenity
4.3.3. Adversarial Testing (Red Teaming)
4.3.3.1. Noma Security
4.3.3.2. Cyera
4.3.3.3. DeepKeep
4.3.3.4. Enkrypt AI
4.3.3.5. F5
4.3.3.6. Lasso Security
4.3.3.7. Palo Alto Networks
4.3.3.8. SentinelOne
4.3.3.9. ZioSec
4.3.4. Identity and Access
4.3.4.1. Teleport
4.3.4.2. Oasis Security
4.3.4.3. Defakto Security
4.3.4.4. Astrix Security
4.3.4.5. Cyberark
4.3.4.6. Silverfort
4.3.5. Model Governance & Monitoring
4.3.5.1. ActiveFence
4.3.5.2. Apex
4.3.5.3. Aim Security
4.3.5.4. airia
4.3.5.5. AI Shield
4.3.5.6. CalypsoAI
4.3.5.7. Check Poiint (Lakera)
4.3.5.8. Databricks
4.3.5.9. Enkrypt AI
4.3.5.10. Hidden Layer
4.3.5.11. IBM
4.3.5.12. Knostic
4.3.5.13. Lasso Security
4.3.5.14. Palo Alto Networks (Prompt)
4.3.5.15. Pillar Security
4.3.5.16. PointGuardAI
4.3.6. Model Monitoring
4.3.6.1. Abzu
4.3.6.2. Amruta Inc
4.3.6.3. Arize AI
4.3.6.4. ArthurAI
4.3.6.5. DreamQuark
4.3.6.6. Fairly.ai
4.3.6.7. Fiddler
4.3.6.8. Giskard
4.3.6.9. Kyndi
4.3.6.10. Robust Intelligence
4.3.6.11. Seldon Technologies
4.3.6.12. SolasAI
4.3.6.13. Superwise
4.3.6.14. TMRYK
4.3.6.15. TrojAI
4.3.6.16. Truera
4.3.7. Privacy & Data Security
4.3.7.1. Anonos
4.3.7.2. DivePlane
4.3.7.3. Ederlabs
4.3.7.4. Enveil
4.3.7.5. Gretel
4.3.7.6. Hazy
4.3.7.7. LLMShield
4.3.7.8. Mostly AI
4.3.7.9. Plurilock
4.3.7.10. Private AI
4.3.7.11. Protopia AI
4.3.7.12. Securiti
4.3.8. Runtime (prompt firewall)
4.3.8.1. ArthurAI
4.3.8.2. Akto
4.3.8.3. Aim Security
4.3.8.4. Bosch AI Shield
4.3.8.5. Calypso.ai
4.3.8.6. Cisco
4.3.8.7. Cranium
4.3.8.8. CredoAI
4.3.8.9. Cloudflare
4.3.8.10. Collibra
4.3.8.11. F5
4.3.8.12. Enkrpyt AI
4.3.8.13. Jazz Security
4.3.8.14. lunar.dev
4.3.8.15. Lasso Security
4.3.8.16. Microsoft
4.3.8.17. Mindguard
4.3.8.18. NeuralTrustAI
4.3.8.19. Pillar Security
4.3.8.20. PointGuardAI
4.3.8.21. Robust Intelligence
4.3.8.22. TrojAI
4.3.8.23. Tumeryk
4.3.8.24. Veeam (Securiti)
4.3.8.25. WitnessAI
4.3.8.26. Zenity
4.3.8.27. Zerotrusted.ai
4.3.8.28. Zscaler
4.3.9. Secure Code Copilots
4.3.9.1. Alphacode
4.3.9.2. Amazon Codewhisperer
4.3.9.3. Ask Codi
4.3.9.4. Aim Security
4.3.9.5. Bito
4.3.9.6. Black Duck Assist
4.3.9.7. Captain Stack
4.3.9.8. CodeGeex
4.3.9.9. Codeium
4.3.9.10. Cycode
4.3.9.11. Fortify Software
4.3.9.12. Fossa
4.3.9.13. Github
4.3.9.14. GPT-Code-Clippy (GPT-CC)
4.3.9.15. IntelliCode
4.3.9.16. Legit Security
4.3.9.17. Ox Security
4.3.9.18. Pillar Security
4.3.9.19. Replit
4.3.9.20. Snyk
4.3.9.21. Tabnine
4.3.9.22. YouCompleteMe
4.3.10. AI Security (Enterprise browser)
4.3.10.1. Magic Mirror Security
4.3.10.2. Lasso Security
4.3.10.3. Island Security
4.3.10.4. Crowdstrike
4.4. Assessment Frameworks
4.4.1. NIST AI Risk Management Framework (AI RMF 1.0 & 2.0)
4.4.1.1. Organizations needing a flexible, non-certifiable roadmap.
4.4.2. ISO/IEC 42001 (AIMS)
4.4.2.1. Regulated industries needing formal certification.
4.4.3. MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems)
4.4.3.1. Red teams and security analysts mapping active threats.
4.4.4. OWASP Top 10 for LLM Applications
4.4.4.1. Developers building LLM-integrated softwar
4.4.5. Microsoft AI Red Teaming Framework
4.4.5.1. Guide for conducting "red team" exercises on AI systems to identify security, safety, and ethical failures before deployment.
4.4.6. Google SAIF
4.4.6.1. Enterprises looking for operational best practices
4.4.7. BSI (Germany) AI Cloud Service Compliance Criteria Catalogue (AIC4)
4.4.7.1. Focuses on the security of AI models specifically when deployed in cloud environments.
5. Managed Attribution
5.1. Authentic8
5.2. Dispel.io
5.3. nTrepid
5.4. Replica
5.5. Zero Point Security
5.6. Dispersive.io
6. Risk, Compliance and Security Management
6.1. Security Ratings & Insurance
6.1.1. Security Ratings
6.1.1.1. Bitsight Technologies
6.1.1.2. FICO
6.1.1.3. Gooann
6.1.1.4. Guidewire Software
6.1.1.5. Prevalent
6.1.1.6. SecurityScoreCard
6.1.2. Cyber Risk Insurance
6.1.2.1. Balsiger Insurance
6.1.2.2. CyberWrite
6.1.2.3. HSB Group
6.1.2.4. Philadelphia Insurance Companies
6.1.2.5. Tennant Risk Services
6.1.2.6. The Hartford
6.1.2.7. Travelers
6.2. Digital Risk Protection Services
6.2.1. BlueVoyant
6.2.2. CybelAngel
6.2.3. CyberInt
6.2.4. Digital Shadows
6.2.5. IntSights
6.2.6. PhishLabs
6.2.7. Recorded Future
6.2.8. RiskIQ
6.2.9. SafeGuard Cyber
6.2.10. ZeroFOX
7. Security Operations & Incident Response
7.1. AI-SOC
7.1.1. BlinkOps
7.1.2. Bricklayer.ai
7.1.3. Cotool
7.1.4. Dropzone.ai
7.1.5. Method Security
7.1.6. Microsoft
7.1.7. SalemCyber
7.1.8. SevenAI
7.1.9. StrikeReady
7.1.10. Wraithwatch
7.1.11. Vincilogic
7.2. Cloud Incident Response Automation (CIRA)
7.2.1. Binalyze
7.2.2. Cado Security
7.2.3. Cado Security, Binalyze, F-Response, Mitiga, Magnet Forensics, Paraben
7.2.4. F-Response
7.2.5. Magnet Forensics
7.2.6. Mitiga
7.2.7. Paraben
7.3. Continuous Threat and Exposure Management
7.3.1. Cyber Asset Attack Surface Management
7.3.1.1. AirTrack Software
7.3.1.2. AppNovi
7.3.1.3. Armis
7.3.1.4. Axonius
7.3.1.5. Balbix
7.3.1.6. Brinqa
7.3.1.7. CoalFire
7.3.1.8. Cyberpion
7.3.1.9. CyCognito
7.3.1.10. DigitalShadows
7.3.1.11. Dragonfly Cyber
7.3.1.12. FireCompass
7.3.1.13. HackerOne
7.3.1.14. JupiterOne
7.3.1.15. LookingGlass Cyber
7.3.1.16. Microsoft
7.3.1.17. Netspi
7.3.1.18. New Push
7.3.1.19. Noetic Cyber
7.3.1.20. NorthStar.io
7.3.1.21. Palo Alto Networks
7.3.1.22. Panaseer
7.3.1.23. Pentera
7.3.1.24. Performata
7.3.1.25. Randori
7.3.1.26. RunZero
7.3.1.27. Sevco Security
7.3.1.28. TemplarBit
7.3.2. External ASM (EASM)
7.3.2.1. Assetnote
7.3.2.2. Censys
7.3.2.3. Crowdstrike
7.3.2.4. CyCognito
7.3.2.5. Darktrace
7.3.2.6. FireCompass
7.3.2.7. IBM (Formerly Randori)
7.3.2.8. Immuniweb
7.3.2.9. LookingGlass Cyber
7.3.2.10. Mandiant
7.3.2.11. Palo Alto Networks
7.3.2.12. Performata
7.3.2.13. Recorded Future
7.3.2.14. Reflectiz
7.3.2.15. Team Cymru
7.3.2.16. Upguard
7.4. Cyber Defense Program Optimization (CDPO)
7.4.1. Bluelava
7.4.2. Cardinal Ops
7.4.3. Enveedo
7.4.4. Holisticyber
7.4.5. Onyxia
7.4.6. Posturity
7.4.7. Rivial
7.4.8. SeeMetrics
7.4.9. Trustmapp
7.4.10. Veriti
7.4.11. XM Cyber
7.5. Cyber Ranges
7.5.1. Cloud Range
7.5.2. CYBER RANGES
7.5.3. Cyberbit
7.5.4. Cyrin
7.5.5. IBM
7.5.6. Immersive Labs
7.5.7. Keysight
7.5.8. RangeForce
7.5.9. Simspace
7.6. Intelligence/Data Feeds/Software & Services
7.6.1. Collaborative Threat Investigation Platforms
7.6.1.1. BAE Systems Detica
7.6.1.1.1. Cybereveal
7.6.1.2. Maltego
7.6.1.3. NC4
7.6.1.4. Palentir
7.6.1.4.1. Cyber
7.6.2. Open Source Threat & Data Mining
7.6.2.1. ThreatCrowd.org
7.6.2.2. ThreatMiner.org
7.6.3. Security Intelligence and Data Analysis Platforms
7.6.3.1. Trellix
7.6.3.1.1. Security Orchestrator
7.6.3.2. Palentir
7.6.4. Threat Intelligence Platforms (TIPs)
7.6.4.1. Anomali
7.6.4.2. BAE Systems
7.6.4.3. Comilion
7.6.4.4. CTILab
7.6.4.5. Cyjax
7.6.4.6. Eclectic IQ
7.6.4.7. Infoblox
7.6.4.8. Lockheed Martin
7.6.4.9. Lookingglass Cyber Solutions
7.6.4.10. Microsoft
7.6.4.10.1. Interflow
7.6.4.11. NC4
7.6.4.11.1. Soltra
7.6.4.12. Pulsedive
7.6.4.13. Service Now (Formerly Brightpoint)
7.6.4.14. Synopsys
7.6.4.15. ThreatConnect
7.6.4.16. ThreatQuotient
7.6.4.17. TruStar
7.6.4.18. Zeneth
7.6.5. Threat Intelligence Services
7.6.5.1. Human Intelligence - HUMINT (Strategic)
7.6.5.1.1. Attacker Tactics, Techniques and Procedures
7.6.5.1.2. Brand & Attack Target Monitoring
7.6.5.1.3. Credential Theft
7.6.5.1.4. Cybersquatting
7.6.5.1.5. External Data Loss & Risk Monitoring
7.6.5.1.6. Social Media, User Forum and External Threat Monitoring
7.6.5.2. Machine-Based (Tactical)
7.6.5.2.1. Anti-Phishing
7.6.5.2.2. Anti-Spam
7.6.5.2.3. Domain Name Monitoring/DGA Feeds
7.6.5.2.4. File Reputation
7.6.5.2.5. Indicators of Compromise (Feeds)
7.6.5.2.6. IP Blacklists
7.6.5.2.7. IP Reputation Feeds
7.6.5.2.8. Malicious Hashes
7.6.5.2.9. TI Feed Aggregation
7.6.5.2.10. Vulnerabilities and Exploits
7.6.5.2.11. Web Malware
7.7. Penetration Testing as a Service (PTaaS)
7.7.1. BreachLock
7.7.2. Cobalt.io
7.7.3. CyberTest
7.7.4. Edgescan
7.7.5. Guidepoint
7.7.6. Hackerone
7.7.7. strobes.co
7.7.8. TrollEye Security
7.7.9. NetSpi
7.8. Security Search
7.8.1. Cyclops Security
8. Preemptive Cyber Defense (PCD)
8.1. Applications
8.1.1. General Apps
8.1.1.1. Polyverse
8.1.1.2. RunSafe Security
8.1.1.3. Jscrambler
8.1.1.4. RunSafe Security
8.1.2. Mobile Apps
8.1.2.1. Everspin Global
8.1.3. APIs
8.1.3.1. HOPR
8.1.4. Application Mesh
8.1.4.1. Hopr.co
8.1.4.2. Cloudflare
8.1.5. Mobile Apps
8.1.5.1. Everspin Global
8.2. Data Security
8.2.1. Nexitech
8.2.2. Hypersphere
8.3. Deception
8.3.1. Active Directory
8.3.1.1. Acalvio
8.3.1.2. Proofpoint
8.3.1.3. SentinelOne
8.3.2. Distributed Deception Platforms
8.3.2.1. Acalvio
8.3.2.2. Blumira
8.3.2.3. CommVault
8.3.2.4. CounterCraft
8.3.2.5. Cybersense.ai
8.3.2.6. Cynet
8.3.2.7. Defensys
8.3.2.8. Fidelis Cybersecurity
8.3.2.9. Fortinet
8.3.2.10. Labyrinth.tech
8.3.2.11. PacketViper
8.3.2.12. Rapid7
8.3.2.13. Seedata.io
8.3.2.14. SentinelOne
8.3.2.15. Thinkst Canary
8.3.2.16. Zscaler
8.3.3. Endpoint
8.3.3.1. Cybertrap
8.3.3.2. DeceptiveBytes
8.3.3.3. Minerva Labs
8.4. Kubernetes
8.4.1. R6 Security
8.5. Memory
8.5.1. Anjuna
8.5.2. Arms Cyber Defense
8.5.3. Intel
8.5.4. Morphisec
8.6. Network
8.6.1. CryptoniteNXT
8.6.2. Dispel.io
8.6.3. Dispersive.io
8.6.4. scatr.it
8.7. Operating Systems
8.7.1. Runsafe Security
8.8. Secure Computation
8.8.1. Agita Labs
8.8.2. Kameleon Security
8.8.3. Polyverse
8.9. Predictive Intelligence
8.9.1. Seclytics
8.9.2. BforeAI
9. Application Security
9.1. API Defense
9.1.1. Cequence Security
9.1.2. Google Cloud
9.1.3. Imperva
9.1.4. L7Defense
9.1.5. Mulesoft
9.1.6. Noname Security
9.1.7. Salt.Security
9.1.8. Signal Sciences
9.1.9. SignalSciences
9.1.10. Spherical Defence
9.1.11. Spherical Defense
9.1.12. WallArm
9.1.13. Securelayer7
9.1.14. Impart Security
9.1.15. Equixly
9.2. API Security Scanners
9.2.1. Acunetix
9.2.2. Akto
9.2.3. Aptori.dev
9.2.4. Astra
9.2.5. Brightsec
9.2.6. Checkmarx
9.2.7. Contrast Security
9.2.8. Firetail.io
9.2.9. HostedScan
9.2.10. Intruder.io
9.2.11. Levo.ai
9.2.12. Portswigger
9.2.13. Probely
9.2.14. Rapid7
9.2.15. Securelayer7
9.2.16. Wallarm
9.3. Application Security Posture Management (ASPM)
9.3.1. Apiiro
9.3.2. ArmorCode
9.3.3. Bionic
9.3.4. Brinqa
9.3.5. Data Theorum
9.3.6. Dazz
9.3.7. Enso Security
9.3.8. Kenna Security
9.3.9. Kondukto
9.3.10. Maverix
9.3.11. Nucleus
9.3.12. Ox Security
9.3.13. Oxeye
9.3.14. Rezilion
9.3.15. Synopsys (Code Dx)
9.3.16. Tromzo
9.3.17. Wabbi
9.4. Automated Moving Target Defense
9.4.1. Applications
9.4.1.1. Application Mesh
9.4.1.1.1. Hopr.co
9.4.1.1.2. Cloudflare
9.4.1.2. General Apps
9.4.1.2.1. RunSafe Security
9.4.1.2.2. Jscrambler
9.4.1.3. Mobile Apps
9.4.1.3.1. Everspin Global
9.5. Composable Security APIs
9.5.1. Abuse.ch (URLHAUS)
9.5.2. Alienvault
9.5.3. Amazon
9.5.4. Avira
9.5.5. Bitdefender
9.5.6. BrightCloud (OpenText)
9.5.7. CISA (Automated Intelligence Sharing - AIS)
9.5.8. Domaintools
9.5.9. Fingerbank
9.5.10. Flare
9.5.11. Google (Virustotal)
9.5.12. Infraguard
9.5.13. Intel 471
9.5.14. MISP
9.5.15. Okta
9.5.16. OpenPhish
9.5.17. Pangea Security
9.5.18. Ping Identity
9.5.19. Proofpoint (Emerging Threats)
9.5.20. ReversingLabs
9.5.21. Sophos
9.5.22. Spamhaus
9.5.23. Stairwell
9.5.24. VMray
9.6. Open Source Vulnerability Management
9.6.1. Seal.Security
9.6.2. Tidelift
9.7. AI Application Security
9.7.1. Bug Fix/Vulnerability Remediation
9.7.1.1. AppSecure AI
9.7.1.2. Clover Security
9.7.1.3. Casco
9.7.1.4. Corgea
9.7.1.5. Gecko Security
9.7.1.6. MindFort
9.7.1.7. ProjectDiscovery
9.7.1.8. Prime Security
9.7.1.9. Pixee
9.7.1.10. Qwiet AI
9.7.1.11. Seal Security
9.7.1.12. Theorem
9.7.1.13. Winfunc
9.7.2. Autonomous Vulnerability Correlation
9.7.2.1. Mobb
9.7.3. App Detection and Response
9.7.3.1. Miggo
9.7.4. Bot Defense
9.7.4.1. Arcjet
9.7.5. Security Policy Guardrailing
9.7.5.1. Koi AI
10. Enterprise Browser Security
10.1. Browser Extensions for Security
10.1.1. Conceal.io
10.1.2. Ermes
10.1.3. Grip Security
10.1.4. Guard.io
10.1.5. Hackasecurity
10.1.6. HP
10.1.7. Inky
10.1.8. Keep Aware
10.1.9. Lasso Security
10.1.10. LayerX
10.1.11. Manage Engine
10.1.12. Perception Point
10.1.13. Red Access
10.1.14. Seraphic
10.1.15. Seraphic
10.1.16. Session Guardian
10.1.17. Slashnext
10.1.18. Trend Micro
10.2. Secure Enterprise Browsers
10.2.1. Brave for Enterprises
10.2.2. Crowdstrike
10.2.2.1. Seraphic Security
10.2.3. Firefox Enterprise
10.2.4. Google Enterprise Browser
10.2.5. Island.io
10.2.6. LayerX Security
10.2.7. Microsoft Edge
10.2.8. Palo Alto Networks
10.2.8.1. Prisma Access Enterprise Browser
10.2.9. Surf Security
10.2.10. Venn
10.2.10.1. Blue Border
10.2.11. Zoho
10.2.11.1. Ulaa
11. Collaboration Security
11.1. Abnormal Security
11.2. Check Point Software
11.3. Microsoft
11.4. SafeGuard Cyber
11.5. Slashnext
11.6. Trellix
11.7. Trend Micro
11.8. WithSecure
12. Disinformation Security
12.1. Deepfake Detection
12.1.1. Clarity.ai
12.1.2. Daon
12.1.3. Deepware
12.1.4. Duckduckgoose
12.1.5. Google SynthID
12.1.6. Illuminarty.ai
12.1.7. Intel (Fakecatcher)
12.1.8. Paravision
12.1.9. Reality Defender
12.1.10. Resemble.ai
12.1.11. Sensity.ai
12.1.12. Thehive.ai
12.1.13. Thesentinel.ai
12.1.14. Weverify.eu
12.2. Misinformation Detection
12.2.1. Blackbird.AI
12.2.2. Cyabra
12.2.3. FiveBlocks
12.2.4. Graphika
12.2.5. Logically.ai
12.2.6. NewsGuardtech
12.2.7. Recorded Future
12.2.8. OSavul
13. Cyber Physical
13.1. Video and Surveillance
13.1.1. saliencesecurity.ai
14. BlockChain
14.1. Asset Integrity
14.1.1. Guardtime
14.2. Authentication
14.2.1. NuID
14.3. Blockchain Security Monitoring
14.3.1. Hypernative.io
14.4. BlockChain Surveillence and Analytics
14.4.1. Ankrscan
14.4.2. Bitquery
14.4.3. Chainalysis
14.4.4. CipherTrace
14.4.5. Coinmetrics
14.4.6. Cyvers.ai
14.4.7. Elementus
14.4.8. elliptic.co
14.4.9. Lukka
14.4.10. Messari.io
14.4.11. Trmlabs
14.5. Encryption
14.5.1. REMME
14.6. Fraud Prevention
14.6.1. Cube3.ai
14.6.2. Blockaid
14.7. Hardware Wallets
14.7.1. CoolWallet
14.7.2. Ellipal
14.7.3. KeepKey
14.7.4. Ledger
14.7.5. PrivacyPros
14.7.6. SafePal
14.7.7. ShiftCrypto
14.7.8. Trezor.io
14.8. Software Defined Perimeter
14.8.1. Block Armour
14.9. Web3 Security
14.9.1. Blockaid
14.9.2. Cyvers.ai
14.9.3. Dedge Security
14.9.4. Hexagate
14.9.5. Hypernative
14.9.6. Metatrust Labs
14.9.7. OpenZeppelin
14.9.8. SolidarityScan
15. Cloud and SaaS Security
15.1. Cloud and SaaS Native Application Protection (CSNAP)
15.1.1. Cloud Infrastructure Entitlement Management (CIEM)
15.1.1.1. ARCON
15.1.1.2. Authomize
15.1.1.3. Britive
15.1.1.4. CyberArk
15.1.1.5. Ermetic
15.1.1.6. Horangi Cyber Security
15.1.1.7. Microsoft (CloudKnox Security)
15.1.1.8. Orca Security
15.1.1.9. Palo Alto Networks
15.1.1.10. SailPoint
15.1.1.11. Saviynt
15.1.1.12. SentinelOne (Attivo Networks)
15.1.1.13. Sonrai Security
15.1.1.14. Sysdig
15.1.1.15. Uptycs
15.1.1.16. Wiz
15.1.1.17. Zscaler
15.1.2. Cloud Management
15.1.2.1. Amazon AWS
15.1.2.2. Azure
15.1.2.3. Cyclops
15.1.2.4. DevSpace
15.1.2.5. Exoscale
15.1.2.6. Google GCP
15.1.2.7. Kubevious
15.1.2.8. Platform9
15.1.2.9. Qovery
15.1.2.10. Rancher
15.1.3. Cloud Security Posture Management (CSPM)
15.1.3.1. Alert Logic
15.1.3.2. AlienV
15.1.3.3. Carbon Black
15.1.3.4. Check Point
15.1.3.5. Cisco
15.1.3.6. F-Secure
15.1.3.7. FireEye
15.1.3.8. IBM Security
15.1.3.9. Kaspersky
15.1.3.10. LogRhythm
15.1.3.11. McAfee
15.1.3.12. Palo Alto Networks
15.1.3.13. Qualys
15.1.3.14. Rapid7
15.1.3.15. Sophos
15.1.3.16. Splunk
15.1.3.17. Symantec
15.1.3.18. Tenable
15.1.3.19. Trend Micro
15.1.3.20. Wiz
15.1.4. Cloud Workload Protection (CWP)
15.1.4.1. Aqua Security
15.1.4.2. Bionic
15.1.4.3. BMC (Helix Cloud Security)
15.1.4.4. Caveonix
15.1.4.5. Check Point Software
15.1.4.6. Cyberark
15.1.4.7. Ermetic
15.1.4.8. F5
15.1.4.9. Fugue
15.1.4.10. Lacework
15.1.4.11. Microsoft (Defender for Cloud)
15.1.4.12. NetApp (Formerly CloudCheckr
15.1.4.13. nOps
15.1.4.14. Orca
15.1.4.15. Palo Alto Networks (Prisma Cloud)
15.1.4.16. Rapid7
15.1.4.17. RuneCast
15.1.4.18. Skyhigh Security
15.1.4.19. Sophos Cloud Optix
15.1.4.20. Sysdig
15.1.4.21. Tenable
15.1.4.22. Tenacity
15.1.4.23. Threat Stack
15.1.4.24. Trellix
15.1.4.25. Trend Micro
15.1.4.26. Turbot
15.1.4.27. Wiz
15.1.5. Data Provenance/Lineage
15.1.5.1. RKVST
15.1.5.2. Alation
15.1.5.3. Informatica
15.1.5.4. Octopai
15.1.6. Data Security
15.1.6.1. Data Security Posture Management
15.1.6.1.1. Concentric AI
15.1.6.1.2. Cyera
15.1.6.1.3. DIG Security
15.1.6.1.4. Flow Security
15.1.6.1.5. Laminar
15.1.6.1.6. Orca Security
15.1.6.1.7. Polar Security
15.1.6.1.8. Satori
15.1.6.1.9. Securiti.AI
15.1.6.1.10. Sentra
15.1.6.1.11. Symmetry Systems
15.1.6.1.12. Varonis
15.1.6.2. Isolation and Vaulting
15.1.6.2.1. Acronis
15.1.6.2.2. Cohesity
15.1.6.2.3. Commvault
15.1.6.2.4. Dell
15.1.6.2.5. Elastio
15.1.6.2.6. Rubric
15.1.6.2.7. Veeam
15.1.6.2.8. Veritas Technologies
15.1.6.3. Data Security Platforms
15.1.6.3.1. Cyera
15.1.6.3.2. IBM
15.1.6.3.3. Immuta
15.1.6.3.4. Okera
15.1.6.3.5. OneTrust
15.1.6.3.6. Prime Factors
15.1.6.3.7. Privacera
15.1.6.3.8. Privitar
15.1.6.3.9. Protegrity
15.1.6.3.10. Satori
15.1.6.3.11. SecuPi
15.1.6.3.12. TrustArc
15.1.6.3.13. Varonis
15.1.7. Kubernetes Security
15.1.7.1. Kubernetes Security Posture Management (KSPM)
15.1.7.1.1. Aqua Security
15.1.7.1.2. Armo Security
15.1.7.1.3. Buildpiper
15.1.7.1.4. Check Point Software
15.1.7.1.5. Orca Security
15.1.7.1.6. Runecast
15.1.7.1.7. Sysdig
15.1.7.2. Cloud Workload Protection (CWP)
15.1.7.2.1. Aqua Security
15.1.7.2.2. Crowdstrike
15.1.7.2.3. Microsoft
15.1.7.2.4. Palo Alto Networks
15.1.7.2.5. Redhat ACS
15.1.7.2.6. SentinelOne
15.1.7.2.7. Sophos (Capsule8)
15.1.7.2.8. SUSE (Neuvector)
15.1.7.2.9. Tigera
15.1.7.2.10. Trend Micro
15.1.7.2.11. Uptycs
15.1.7.2.12. Wiz
15.1.7.3. Kubernetes Runtime Security
15.1.7.3.1. Aqua Security
15.1.7.3.2. Araali Networks
15.1.7.3.3. Crowdstrike
15.1.7.3.4. DeepFactor
15.1.7.3.5. Kodem Security
15.1.7.3.6. KSOC
15.1.7.3.7. LightSpin Security
15.1.7.3.8. Operant.ai
15.1.7.3.9. Palo Alto Networks
15.1.7.3.10. Snyk
15.1.7.3.11. Sweet Security
15.1.7.3.12. Sysdig
15.1.7.3.13. ThreatX
15.1.7.3.14. Upwind Security
15.1.7.3.15. Wiz
15.1.7.4. API Defense
15.1.7.4.1. Microsoft Azure Firewall
15.1.7.4.2. Prophaze
15.1.7.4.3. Tigera
15.1.7.4.4. Wallarm
15.1.8. SaaS Management Platforms
15.1.8.1. Augmentt
15.1.8.2. Auvik
15.1.8.3. Beamy
15.1.8.4. Bettercloud
15.1.8.5. LeanIx
15.1.8.6. Lumos
15.1.8.7. Oomnitza
15.1.8.8. Productiv
15.1.8.9. Torii
15.1.8.10. Trelica
15.1.8.11. Zluri
15.1.8.12. Zylo
15.1.9. SaaS Security Posture Management (SSPM)
15.1.9.1. Adaptive Shield
15.1.9.2. Appomni
15.1.9.3. Asterisk Security
15.1.9.4. Atmosec
15.1.9.5. Axonius
15.1.9.6. DoControl
15.1.9.7. Obsidian Security
15.1.9.8. Privya
15.1.9.9. Reco.ai
15.1.9.10. Reveal Security
15.1.9.11. Valence Security
15.1.9.12. Wing Security