
1. Moving Target Defense
1.1. Memory
1.1.1. Morphisec
1.2. Network
1.2.1. CryptoniteNXT
1.2.2. Kameleon Security
1.3. Applications
1.3.1. General Apps
1.3.1.1. Polyverse
1.3.1.2. RunSafe Security
1.3.2. Mobile Apps
1.3.2.1. Everspin Global
1.4. Operating Systems
1.4.1. Polyverse
2. Advanced Content Disarming and Reconstruction (CDR)
2.1. Forcepoint
2.2. Fortinet
2.3. Garrison Technology
2.4. Glasswall
2.5. OPSWAT
2.5.1. https://www.opswat.com/products/metascan/
2.6. Sasa Software
2.7. Symantec
2.8. Votiro
3. Application Security
3.1. Runtime Application Self-Protection (RASP)
3.1.1. Arxan
3.1.2. BrixBits
3.1.3. Contrast Security
3.1.4. Hdiv Security
3.1.5. HP
3.1.6. Immunio
3.1.7. Inside Secure
3.1.8. LayeredInsight
3.1.9. OneASP
3.1.10. Prevoty
3.1.11. Promon
3.1.12. SecuPi
3.1.13. Signal Sciences
3.1.14. Tcell
3.1.15. Veracode
3.1.16. Virsec
3.1.17. Waratek
3.1.18. whiteCryption
3.1.19. WhiteHat Security
3.2. Enterprise App-Layer Protection
3.2.1. SecuPI
3.3. AI-Based Applicaton Threat Defense
3.3.1. CyKick Labs
3.3.2. Elastic Beam
3.3.3. LastWall
3.3.4. Signal Sciences
3.3.5. Spherical Defence
3.3.6. TemplarBit
3.3.7. Threat-X
3.3.8. WallArm
3.4. Moving Target Defense
3.4.1. Applications
3.4.1.1. General Apps
3.4.1.1.1. Polyverse
3.4.1.1.2. RunSafe Security
3.4.1.2. Mobile Apps
3.4.1.2.1. Everspin Global
4. Data & Collaboration Security
4.1. Big Data Security
4.1.1. BlueTalon
4.2. Enclave-based Key Storage
4.2.1. Fortanix
4.3. Network-Based Data Cleansing
4.3.1. DataStealth
4.3.1.1. http://www.datexdatastealth.com/
4.4. PII Discovery
4.4.1. BigID
5. Identification, Authentication, Access Control & IAM
5.1. User Authentication
5.1.1. Behavioral Authentication
5.1.1.1. Behaviosec
5.1.1.2. BioCatch
5.1.1.3. Google
5.1.1.3.1. Trust API
5.1.1.4. ThreatMetrix
5.1.1.5. Trusona
6. Infrastructure Protection
6.1. Cloud Security
6.1.1. Hyperscale Container-based Firewalls
6.1.1.1. Juniper Networks
6.1.1.2. ShieldX
6.1.1.3. Public Cloud
6.1.1.3.1. Risk and Security Orchestration
6.2. Online Fraud Prevention
6.2.1. SheerID
6.3. Secure Web Gateways
6.3.1. Remote Browser-Isolation (remote dom)
6.3.1.1. Amune
6.3.1.1.1. https://amune.org/security
6.3.1.2. Apozy
6.3.1.3. Aurionpro
6.3.1.4. Authentic8
6.3.1.5. DigitalGuardian
6.3.1.6. Dispel
6.3.1.7. Ericom
6.3.1.8. LightPoint Security
6.3.1.9. Menlo Security
6.3.1.10. Randed
6.3.1.11. Symantec
6.3.1.11.1. Formerly Fireglass
6.3.1.12. Weblife
6.4. Software Defined Perimeter (SDP)
6.4.1. BlackRidge Networks
6.4.2. Block Armour
6.4.3. Certes Networks
6.4.4. Cyxtera
6.4.5. Instasafe
6.4.6. Meta Networks
6.4.7. SAFE-T
6.4.8. Saife Inc!
6.4.9. Tempered Networks
6.4.10. Unisys Stealth
6.4.11. Verizon
6.4.12. Waverly Labs
6.4.13. Zscaler
6.5. Blockchain-Based Data Protection
6.5.1. Acronis
7. BlockChain
7.1. Asset Integrity
7.1.1. Guardtime
7.2. Authentication
7.2.1. NuID
7.3. Encryption
7.3.1. REMME
7.4. Hardware Wallets
7.4.1. Ledger
7.5. Software Defined Perimeter
7.5.1. Block Armour
8. Internet of Things (IoT/OT)
8.1. Access Control
8.1.1. Sensify Security
8.2. Anomaly Detection
8.2.1. InfluxData
8.3. Authentication
8.3.1. Device Authority
8.3.2. Sensify Security
8.3.3. Trusfort
8.4. Automotive
8.4.1. Argus Cyber Security
8.4.2. Karamba Security
8.4.3. ProvenCore
8.4.4. Security Innovation
8.5. Embedded Security
8.5.1. ProvenCore
8.5.2. Security Innovation
8.5.3. Sequitur Labs
8.6. Encryption
8.6.1. Rubicon
8.7. Gateways
8.7.1. Bayshore Networks
8.7.2. Xage Security
8.7.3. Huawei
8.8. Industrial Control Systems (ICS/SCADA)
8.8.1. Network Traffic Inspection
8.8.1.1. Claroty
8.8.1.2. CyberX
8.8.1.3. Dragos
8.8.1.4. Indegy
8.8.1.5. Nexdefense
8.8.1.6. Sentryo
8.8.2. Firewall
8.8.2.1. Check Point Software
8.8.2.2. Forcepoint
8.8.2.3. Fortinet
8.8.2.4. Radiflow
8.8.3. Remote Access
8.8.3.1. Claroty
8.9. Power Monitoring
8.9.1. PFP Cybersecurity
8.10. Radio
8.10.1. Bastille
8.11. Risk and Compliance
8.11.1. VDOO
8.12. Operating System
8.12.1. ProvenCore
9. Risk, Compliance and Security Management
9.1. Security Ratings & Insurance
9.1.1. Security Ratings
9.1.1.1. Bitsight Technologies
9.1.1.2. FICO
9.1.1.3. Gooann
9.1.1.4. Guidewire Software
9.1.1.5. Prevalent
9.1.1.6. SecurityScoreCard
9.1.2. Cyber Risk Insurance
9.1.2.1. Balsiger Insurance
9.1.2.2. CyberWrite
9.1.2.3. HSB Group
9.1.2.4. Philadelphia Insurance Companies
9.1.2.5. Tennant Risk Services
9.1.2.6. The Hartford
9.1.2.7. Travelers
9.2. Cloud Security Posture Management
9.2.1. Alert Logic
9.2.2. Amazon
9.2.2.1. AWS Security Hub, Trusted Advisor, AWS Config, and AWS Control Tower
9.2.3. Azure
9.2.3.1. Security Center
9.2.4. Bitglass
9.2.5. BMC
9.2.6. Caveonix
9.2.7. Cavirin
9.2.8. Check Point Software
9.2.9. Cloud Conformity
9.2.10. CloudAware
9.2.11. CloudCheckr
9.2.12. Cloudneeti
9.2.13. Cloudnosys
9.2.14. CloudPassage
9.2.15. Cloudvisory
9.2.16. Crowdstrike
9.2.17. DivvyCloud
9.2.18. Fugue
9.2.19. Google Cloud
9.2.19.1. Security Command Center
9.2.20. Lacework
9.2.21. McAfee
9.2.22. NetSkope
9.2.23. Oracle
9.2.24. Palo Alto Networks
9.2.25. Palo Alto Networks
9.2.26. Saviynt
9.2.27. Sonrai
9.2.28. Sophos
9.2.29. Symantec
9.2.30. Threat Stack
9.2.31. Turbot
9.2.32. VMware
10. Security Operations & Incident Response
10.1. Application Security Event Analytics
10.1.1. IDECSI
10.2. Attack Path Modeling, Breach and Attack Simulation
10.2.1. AttackIQ
10.2.2. Attivo Networks
10.2.3. Balbix
10.2.4. Core Security
10.2.5. Cymulate
10.2.6. Forseeti
10.2.7. Illusive Networks
10.2.8. RedSeal
10.2.9. SafeBreach
10.2.10. Skybox
10.2.11. Verodin
10.2.12. XM Cyber
10.3. Intelligence/Data Feeds/Software & Services
10.3.1. Collaborative Threat Investigation Platforms
10.3.1.1. BAE System Detica
10.3.1.1.1. Cybereveal
10.3.1.2. IKANow
10.3.1.3. Maltego
10.3.1.4. NC4
10.3.1.5. Palentir
10.3.1.5.1. Cyber
10.3.2. Open Source Threat & Data Mining
10.3.2.1. ThreatCrowd.org
10.3.2.2. ThreatMiner.org
10.3.3. Security Intelligence and Data Analysis Platforms
10.3.3.1. FireEye
10.3.3.1.1. Security Orchestrator
10.3.3.2. Palentir
10.3.4. Threat Intelligence Platforms (TIPs)
10.3.4.1. Anomali
10.3.4.2. BAE Systems
10.3.4.3. Comilion
10.3.4.4. CTILab
10.3.4.5. Cyjax
10.3.4.6. Eclectic IQ
10.3.4.7. Infoblox
10.3.4.8. Lockheed Martin
10.3.4.9. Lookingglass Cyber Solutions
10.3.4.10. Microsoft
10.3.4.10.1. Interflow
10.3.4.11. NC4
10.3.4.11.1. Soltra
10.3.4.12. Pulsedive
10.3.4.13. Service Now (Formerly Brightpoint)
10.3.4.14. Synopsys
10.3.4.15. ThreatConnect
10.3.4.16. ThreatQuotient
10.3.4.17. TruStar
10.3.4.18. Zeneth
10.3.5. Threat Intelligence Services
10.3.5.1. Human Intelligence - HUMINT (Strategic)
10.3.5.1.1. Attacker Tactics, Techniques and Procedures
10.3.5.1.2. Brand & Attack Target Monitoring
10.3.5.1.3. Credential Theft
10.3.5.1.4. Cybersquatting
10.3.5.1.5. External Data Loss & Risk Monitoring
10.3.5.1.6. Social Media, User Forum and External Threat Monitoring
10.3.5.2. Machine-Based (Tactical)
10.3.5.2.1. Anti-Phishing
10.3.5.2.2. Anti-Spam
10.3.5.2.3. Domain Name Monitoring/DGA Feeds
10.3.5.2.4. File Reputation
10.3.5.2.5. Indicators of Compromise (Feeds)
10.3.5.2.6. IP Blacklists
10.3.5.2.7. IP Reputation Feeds
10.3.5.2.8. Malicious Hashes
10.3.5.2.9. TI Feed Aggregation
10.3.5.2.10. Vulnerabilities and Exploits
10.3.5.2.11. Web Malware
10.4. Malware Detection & Analysis
10.4.1. Malware Analysis as a Service
10.4.1.1. Free Services
10.4.1.1.1. Malwr
10.4.1.1.2. Virustotal
10.4.1.1.3. Jotti
10.4.1.2. Intezer
10.4.1.3. ReversingLabs
10.4.1.4. ThreatGrid
10.4.2. Sandbox Software
10.4.2.1. GFI
10.4.2.1.1. GFI Sandbox
10.4.2.2. Joesecurity
10.4.2.2.1. Joe Sandbox
10.4.2.3. Payload Security
10.4.2.3.1. http://www.payload-security.com/products/vxstream-sandbox
10.4.3. Deep Learning
10.4.3.1. Endpoint
10.4.3.1.1. Deep Instinct
10.4.3.1.2. Senseon
10.4.3.2. Network
10.4.3.2.1. Bluehexagon
10.4.3.2.2. Bluevector
10.4.3.3. Collaboration Suites
10.4.3.3.1. Bitdam
10.4.4. File Analysis
10.4.4.1. Inquest
10.4.4.2. Intezer
10.4.4.3. ReversingLabs
10.5. Attack Surface Management
10.5.1. 3wsecurity
10.5.2. Balbix
10.5.3. Bitsight
10.5.4. Cycognito
10.5.5. DigitalShadows
10.5.6. FireCompass
10.5.7. Immuniweb
10.5.8. Palo Alto Networks
10.5.9. Randori
10.5.10. Rapid7
10.5.11. RiskIQ
10.5.12. SecurityScorecard
10.5.13. UpGuard
11. Threat Deception Technologies
11.1. Distributed Deception Platforms
11.1.1. Amgine Securus
11.1.2. Atomic Software Solutions
11.1.2.1. HoneyBot
11.1.3. Attivo Networks
11.1.4. Chaitin
11.1.5. CounterCraft
11.1.6. CyberFog
11.1.7. CyberTrap
11.1.8. Cymmetria
11.1.9. Fidelis Cybersecurity
11.1.10. FormalTech
11.1.11. Illusive Networks
11.1.12. JeeSeen
11.1.13. KeyFocus
11.1.14. SmokeScreen
11.1.15. Thinkst Applied Research (Canary)
11.1.16. TrapX
11.1.17. Vision Space Technologies
11.2. Files
11.2.1. Allure Security Technology
11.2.2. WatchPoint
11.3. Malware Anti-Evasion
11.3.1. Minerva Labs
11.4. Network
11.4.1. Hillstone Networks
11.4.2. PacketViper
11.4.3. Percipient Networks
11.4.4. Ridgeback Network Defense
11.4.5. Shadow Networks
11.5. Open Source
11.5.1. Honeypots
11.5.1.1. Database Honeypots
11.5.1.1.1. Delilah
11.5.1.1.2. ESpot
11.5.1.1.3. Elastic Honey
11.5.1.1.4. MongoDB-HoneyProxy
11.5.1.1.5. NoSQLpot
11.5.1.1.6. mysql
11.5.1.2. ICS/Scada
11.5.1.2.1. Conpot
11.5.1.2.2. gridpot
11.5.1.2.3. scada-honeynet
11.5.1.2.4. GasPot
11.5.1.3. Web honeypots
11.5.1.3.1. Bukkit Honeypot
11.5.1.3.2. EoHoneypotBundle
11.5.1.3.3. Glastopf
11.5.1.3.4. Google Hack Honeypot
11.5.1.3.5. HonneyPotter
11.5.1.3.6. Laravel Application Honeypot
11.5.1.3.7. Nodepot
11.5.1.3.8. Servletpot
11.5.1.3.9. Shadow Daemon
11.5.1.3.10. basic-auth-pot
11.5.1.3.11. django-admin-honeypot
11.5.1.3.12. phpmyadmin_honeypot
11.5.1.3.13. servlet
11.5.1.3.14. shockpot
11.5.1.3.15. smart-Honeypot
11.5.1.3.16. stack-honeypot
11.5.1.3.17. wordpot
11.5.1.3.18. wp-smart-honeypot
11.5.1.4. Service honepots
11.5.1.4.1. Ensnare
11.5.1.4.2. Honeyprint
11.5.1.4.3. Honeypy
11.5.1.4.4. RDPy
11.5.1.4.5. Tom's Honeypot
11.5.1.4.6. honeyntp
11.5.1.4.7. honeypot-camera
11.6. Software
11.6.1. KeyFocus
11.6.1.1. http://www.keyfocus.net/kfsensor/
11.6.2. Specter
11.6.2.1. http://www.specter.com/
11.6.3. Symantec
11.7. Web
11.7.1. Shape Security
11.7.1.1. ShapeShifter
11.7.2. Juniper Networks
11.7.2.1. WebAppSecure
11.7.3. CyberTrap
11.7.3.1. http://www.cybertrap.com/
11.8. Endpoint Agent
11.8.1. Attivo networks
11.8.2. Minerva Labs
11.8.3. Symantec
12. Cloud Security
12.1. Cloud Workload Protection Platforms (CWPP)
12.1.1. Alcide
12.1.2. AlertLogic
12.1.3. Bitdefender
12.1.4. Bracket Computing
12.1.5. Capsule8
12.1.6. Carbon Black
12.1.7. Cavirin
12.1.8. Check Point Software
12.1.9. Cisco
12.1.10. CloudAware
12.1.11. Cloudcheckr
12.1.12. CloudPassage
12.1.13. CrowdStrike
12.1.14. Dome9
12.1.15. Edgewise Networks
12.1.16. GuardiCore
12.1.17. Harvest AI
12.1.18. HyTrust
12.1.19. Illumio
12.1.20. Kaspersky Lab
12.1.21. Lacework
12.1.22. McAfee
12.1.23. Microsoft
12.1.24. Palo Alto Networks
12.1.25. Polyverse
12.1.26. Qingteng
12.1.27. Security Code
12.1.28. SiftSecurity
12.1.29. Sophos
12.1.30. Symantec
12.1.31. Threat Stack
12.1.32. Trend Micro
12.1.33. Tripwire
12.1.34. Virsec
12.1.35. VMware
12.2. Cloud Security Posture Management (CSPM)
12.2.1. Accurics
12.2.2. Alert Logic
12.2.3. Bitglass
12.2.4. BMC
12.2.5. Cavirin
12.2.6. Check Point Software
12.2.7. CloudAware
12.2.8. CloudCheckr
12.2.9. Cloudneeti
12.2.10. Cloudnosys
12.2.11. CloudPassage
12.2.12. Cloudvisory
12.2.13. Concorse Labs
12.2.14. Crowdstrike
12.2.15. DivvyCloud
12.2.16. Fugue
12.2.17. Lacework
12.2.18. McAfee
12.2.19. Netskope
12.2.20. Oracle
12.2.21. Outpost24
12.2.22. Palo Alto Networks
12.2.23. Saviynt
12.2.24. Sonrai
12.2.25. Sophos
12.2.26. Spanugo
12.2.27. Symantec
12.2.28. Threat Stack
12.2.29. Trend Micro
12.2.30. Turbot
12.2.31. Turbot
12.2.32. VMware