Emerging Security Markets & Technologies

Get Started. It's Free
or sign up with your email address
Rocket clouds
Emerging Security Markets & Technologies by Mind Map: Emerging Security Markets & Technologies

1. Application Security

1.1. Runtime Application Self-Protection (RASP)

1.1.1. Arxan

1.1.2. BrixBits

1.1.3. Contrast Security

1.1.4. Hdiv Security

1.1.5. HP

1.1.6. Immunio

1.1.7. Inside Secure

1.1.8. LayeredInsight

1.1.9. OneASP

1.1.10. Prevoty

1.1.11. Promon

1.1.12. SecuPi

1.1.13. Signal Sciences

1.1.14. Tcell

1.1.15. Veracode

1.1.16. Virsec

1.1.17. Waratek

1.1.18. whiteCryption

1.1.19. WhiteHat Security

1.2. Enterprise App-Layer Protection

1.2.1. SecuPI

1.3. AI-Based Applicaton Threat Defense

1.3.1. CyKick Labs

1.3.2. Elastic Beam

1.3.3. LastWall

1.3.4. Signal Sciences

1.3.5. Spherical Defence

1.3.6. TemplarBit

1.3.7. Threat-X

1.3.8. WallArm

2. Data & Collaboration Security

2.1. Big Data Security

2.1.1. BlueTalon

2.2. Enclave-based Key Storage

2.2.1. Fortanix

2.3. Network-Based Data Cleansing

2.3.1. DataStealth

2.3.1.1. http://www.datexdatastealth.com/

2.4. PII Discovery

2.4.1. BigID

3. Identification, Authentication, Access Control & IAM

3.1. User Authentication

3.1.1. Behavioral Authentication

3.1.1.1. Behaviosec

3.1.1.2. BioCatch

3.1.1.3. Google

3.1.1.3.1. Trust API

3.1.1.4. ThreatMetrix

3.1.1.5. Trusona

4. Infrastructure Protection

4.1. Cloud Security

4.1.1. Hyperscale Container-based Firewalls

4.1.1.1. Juniper Networks

4.1.1.2. ShieldX

4.1.1.3. Public Cloud

4.1.1.3.1. Risk and Security Orchestration

4.1.2. Cloud Workload Protection Platforms (CWPP)

4.1.2.1. Alcide

4.1.2.2. Amazon

4.1.2.3. Aporeto

4.1.2.4. Aqua Security

4.1.2.5. Bitdefender

4.1.2.6. Bracket Computing

4.1.2.7. Capsule8

4.1.2.8. Carbon Black

4.1.2.9. Check Point Software

4.1.2.9.1. Formerly Dome9

4.1.2.10. Cisco

4.1.2.11. Cloud Raxak

4.1.2.12. CloudAware

4.1.2.13. CloudPassage

4.1.2.14. CrowdStrike

4.1.2.15. Edgewise

4.1.2.16. GuardiCore

4.1.2.17. Hytrust

4.1.2.18. Illumio

4.1.2.19. Kaspersky Lab

4.1.2.20. Lacework

4.1.2.21. Layered Insight

4.1.2.22. McAfee

4.1.2.23. Microsoft

4.1.2.24. NeuVector

4.1.2.25. Polyverse

4.1.2.26. Qingteng

4.1.2.27. Security Code

4.1.2.28. Sophos

4.1.2.29. StackRox

4.1.2.30. Symantec

4.1.2.31. Threat Stack

4.1.2.32. Trend Micro

4.1.2.33. Tripwire

4.1.2.34. Twistlock

4.1.2.35. Virsec

4.1.2.36. VMware

4.2. Online Fraud Prevention

4.2.1. SheerID

4.3. Secure Web Gateways

4.3.1. Remote Browser-Isolation (remote dom)

4.3.1.1. Amune

4.3.1.1.1. https://amune.org/security

4.3.1.2. Apozy

4.3.1.3. Aurionpro

4.3.1.4. Authentic8

4.3.1.5. DigitalGuardian

4.3.1.6. Dispel

4.3.1.7. Ericom

4.3.1.8. LightPoint Security

4.3.1.9. Menlo Security

4.3.1.10. Randed

4.3.1.11. Symantec

4.3.1.11.1. Formerly Fireglass

4.3.1.12. Weblife

4.4. Software Defined Perimeter (SDP)

4.4.1. BlackRidge Networks

4.4.2. Block Armour

4.4.3. Certes Networks

4.4.4. Cyxtera

4.4.5. Instasafe

4.4.6. Meta Networks

4.4.7. SAFE-T

4.4.8. Saife Inc!

4.4.9. Tempered Networks

4.4.10. Unisys Stealth

4.4.11. Verizon

4.4.12. Waverly Labs

4.4.13. Zscaler

5. BlockChain

5.1. Asset Integrity

5.1.1. Guardtime

5.2. Authentication

5.2.1. NuID

5.3. Encryption

5.3.1. REMME

5.4. Hardware Wallets

5.4.1. Ledger

5.5. Software Defined Perimeter

5.5.1. Block Armour

6. Internet of Things (IoT/OT)

6.1. Access Control

6.1.1. Sensify Security

6.2. Anomaly Detection

6.2.1. InfluxData

6.3. Authentication

6.3.1. Device Authority

6.3.2. Device Authority

6.3.3. Sensify Security

6.3.4. Trusfort

6.4. Automotive

6.4.1. Argus Cyber Security

6.4.2. Karamba Security

6.4.3. ProvenCore

6.4.4. Security Innovation

6.5. Embedded Security

6.5.1. ProvenCore

6.5.2. Security Innovation

6.6. Encryption

6.6.1. Rubicon

6.7. Gateways

6.7.1. Bayshore Networks

6.7.2. Xage Security

6.7.3. Huawei

6.8. Industrial Control Systems (ICS/SCADA)

6.8.1. Network Traffic Inspection

6.8.1.1. Claroty

6.8.1.2. CyberX

6.8.1.3. Dragos

6.8.1.4. Indegy

6.8.1.5. Nexdefense

6.8.1.6. Sentryo

6.8.2. Firewall

6.8.2.1. Check Point Software

6.8.2.2. Forcepoint

6.8.2.3. Fortinet

6.8.2.4. Radiflow

6.8.3. Remote Access

6.8.3.1. Claroty

6.9. Power Monitoring

6.9.1. PFP Cybersecurity

6.10. Radio

6.10.1. Bastille

6.11. Risk and Compliance

6.11.1. VDOO

6.12. Operating System

6.12.1. ProvenCore

7. Risk, Compliance and Security Management

7.1. Security Ratings & Insurance

7.1.1. Security Ratings

7.1.1.1. Bitsight Technologies

7.1.1.2. FICO

7.1.1.3. Gooann

7.1.1.4. Guidewire Software

7.1.1.5. Prevalent

7.1.1.6. SecurityScoreCard

7.1.2. Cyber Risk Insurance

7.1.2.1. Balsiger Insurance

7.1.2.2. CyberWrite

7.1.2.3. HSB Group

7.1.2.4. Philadelphia Insurance Companies

7.1.2.5. Tennant Risk Services

7.1.2.6. The Hartford

7.1.2.7. Travelers

7.2. Cloud Security Posture Management

7.2.1. Alert Logic

7.2.2. Amazon

7.2.2.1. AWS Security Hub, Trusted Advisor, AWS Config, and AWS Control Tower

7.2.3. Azure

7.2.3.1. Security Center

7.2.4. Bitglass

7.2.5. BMC

7.2.6. Caveonix

7.2.7. Cavirin

7.2.8. Check Point Software

7.2.9. Cloud Conformity

7.2.10. CloudAware

7.2.11. CloudCheckr

7.2.12. Cloudneeti

7.2.13. Cloudnosys

7.2.14. CloudPassage

7.2.15. Cloudvisory

7.2.16. Crowdstrike

7.2.17. DivvyCloud

7.2.18. Fugue

7.2.19. Google Cloud

7.2.19.1. Security Command Center

7.2.20. Lacework

7.2.21. McAfee

7.2.22. NetSkope

7.2.23. Oracle

7.2.24. Palo Alto Networks

7.2.25. Palo Alto Networks

7.2.26. Saviynt

7.2.27. Sonrai

7.2.28. Sophos

7.2.29. Symantec

7.2.30. Threat Stack

7.2.31. Turbot

7.2.32. VMware

8. Security Operations & Incident Response

8.1. Application Security Event Analytics

8.1.1. IDECSI

8.2. Attack Path Modeling, Breach and Attack Simulation

8.2.1. AttackIQ

8.2.2. Attivo Networks

8.2.3. Balbix

8.2.4. Core Security

8.2.5. Cymulate

8.2.6. Illusive Networks

8.2.7. RedSeal

8.2.8. SafeBreach

8.2.9. Skybox

8.2.10. Verodin

8.2.11. XM Cyber

8.3. Intelligence/Data Feeds/Software & Services

8.3.1. Collaborative Threat Investigation Platforms

8.3.1.1. BAE System Detica

8.3.1.1.1. Cybereveal

8.3.1.2. IKANow

8.3.1.3. Maltego

8.3.1.4. NC4

8.3.1.5. Palentir

8.3.1.5.1. Cyber

8.3.2. Open Source Threat & Data Mining

8.3.2.1. ThreatCrowd.org

8.3.2.2. ThreatMiner.org

8.3.3. Security Intelligence and Data Analysis Platforms

8.3.3.1. FireEye

8.3.3.1.1. Security Orchestrator

8.3.3.2. Palentir

8.3.4. Threat Intelligence Platforms (TIPs)

8.3.4.1. Anomali

8.3.4.2. BAE Systems

8.3.4.3. Comilion

8.3.4.4. CTILab

8.3.4.5. Cyjax

8.3.4.6. Eclectic IQ

8.3.4.7. Infoblox

8.3.4.8. Lockheed Martin

8.3.4.9. Lookingglass Cyber Solutions

8.3.4.10. Microsoft

8.3.4.10.1. Interflow

8.3.4.11. NC4

8.3.4.11.1. Soltra

8.3.4.12. Pulsedive

8.3.4.13. Service Now (Formerly Brightpoint)

8.3.4.14. Synopsys

8.3.4.15. ThreatConnect

8.3.4.16. ThreatQuotient

8.3.4.17. TruStar

8.3.4.18. Zeneth

8.3.5. Threat Intelligence Services

8.3.5.1. Human Intelligence - HUMINT (Strategic)

8.3.5.1.1. Attacker Tactics, Techniques and Procedures

8.3.5.1.2. Brand & Attack Target Monitoring

8.3.5.1.3. Credential Theft

8.3.5.1.4. Cybersquatting

8.3.5.1.5. External Data Loss & Risk Monitoring

8.3.5.1.6. Social Media, User Forum and External Threat Monitoring

8.3.5.2. Machine-Based (Tactical)

8.3.5.2.1. Anti-Phishing

8.3.5.2.2. Anti-Spam

8.3.5.2.3. Domain Name Monitoring/DGA Feeds

8.3.5.2.4. File Reputation

8.3.5.2.5. Indicators of Compromise (Feeds)

8.3.5.2.6. IP Blacklists

8.3.5.2.7. IP Reputation Feeds

8.3.5.2.8. Malicious Hashes

8.3.5.2.9. TI Feed Aggregation

8.3.5.2.10. Vulnerabilities and Exploits

8.3.5.2.11. Web Malware

8.4. Malware Detection & Analysis

8.4.1. Malware Analysis as a Service

8.4.1.1. Free Services

8.4.1.1.1. Malwr

8.4.1.1.2. Virustotal

8.4.1.1.3. Jotti

8.4.1.2. ReversingLabs

8.4.1.3. ThreatGrid

8.4.2. Sandbox Software

8.4.2.1. GFI

8.4.2.1.1. GFI Sandbox

8.4.2.2. Joesecurity

8.4.2.2.1. Joe Sandbox

8.4.2.3. Payload Security

8.4.2.3.1. http://www.payload-security.com/products/vxstream-sandbox

8.4.3. Deep Learning

8.4.3.1. Endpoint

8.4.3.1.1. Deep Instinct

8.4.3.1.2. Senseon

8.4.3.2. Network

8.4.3.2.1. Bluehexagon

8.4.3.2.2. Bluevector

8.4.3.3. Collaboration Suites

8.4.3.3.1. Bitdam

9. Threat Deception Technologies

9.1. Distributed Deception Platforms

9.1.1. Amgine Securus

9.1.2. Atomic Software Solutions

9.1.2.1. HoneyBot

9.1.3. Attivo Networks

9.1.4. Chaitin

9.1.5. CounterCraft

9.1.6. CyberFog

9.1.7. CyberTrap

9.1.8. Cymmetria

9.1.9. Fidelis Cybersecurity

9.1.10. FormalTech

9.1.11. Illusive Networks

9.1.12. JeeSeen

9.1.13. KeyFocus

9.1.14. SmokeScreen

9.1.15. Thinkst Applied Research (Canary)

9.1.16. TrapX

9.1.17. Vision Space Technologies

9.2. Files

9.2.1. Allure Security Technology

9.2.2. WatchPoint

9.3. Malware Anti-Evasion

9.3.1. Minerva Labs

9.4. Network

9.4.1. Hillstone Networks

9.4.2. PacketViper

9.4.3. Percipient Networks

9.4.4. Ridgeback Network Defense

9.4.5. Shadow Networks

9.5. Open Source

9.5.1. Honeypots

9.5.1.1. Database Honeypots

9.5.1.1.1. Delilah

9.5.1.1.2. ESpot

9.5.1.1.3. Elastic Honey

9.5.1.1.4. MongoDB-HoneyProxy

9.5.1.1.5. NoSQLpot

9.5.1.1.6. mysql

9.5.1.2. ICS/Scada

9.5.1.2.1. Conpot

9.5.1.2.2. gridpot

9.5.1.2.3. scada-honeynet

9.5.1.2.4. GasPot

9.5.1.3. Web honeypots

9.5.1.3.1. Bukkit Honeypot

9.5.1.3.2. EoHoneypotBundle

9.5.1.3.3. Glastopf

9.5.1.3.4. Google Hack Honeypot

9.5.1.3.5. HonneyPotter

9.5.1.3.6. Laravel Application Honeypot

9.5.1.3.7. Nodepot

9.5.1.3.8. Servletpot

9.5.1.3.9. Shadow Daemon

9.5.1.3.10. basic-auth-pot

9.5.1.3.11. django-admin-honeypot

9.5.1.3.12. phpmyadmin_honeypot

9.5.1.3.13. servlet

9.5.1.3.14. shockpot

9.5.1.3.15. smart-Honeypot

9.5.1.3.16. stack-honeypot

9.5.1.3.17. wordpot

9.5.1.3.18. wp-smart-honeypot

9.5.1.4. Service honepots

9.5.1.4.1. Ensnare

9.5.1.4.2. Honeyprint

9.5.1.4.3. Honeypy

9.5.1.4.4. RDPy

9.5.1.4.5. Tom's Honeypot

9.5.1.4.6. honeyntp

9.5.1.4.7. honeypot-camera

9.6. Software

9.6.1. KeyFocus

9.6.1.1. http://www.keyfocus.net/kfsensor/

9.6.2. Specter

9.6.2.1. http://www.specter.com/

9.6.3. Symantec

9.7. Web

9.7.1. Shape Security

9.7.1.1. ShapeShifter

9.7.2. Juniper Networks

9.7.2.1. WebAppSecure

9.7.3. CyberTrap

9.7.3.1. http://www.cybertrap.com/

9.8. Endpoint Agent

9.8.1. Minerva Labs

9.8.2. Symantec

10. Cloud Security

10.1. Cloud Workload Protection Platforms (CWPP)

10.1.1. Alcide

10.1.2. AlertLogic

10.1.3. Bitdefender

10.1.4. Bracket Computing

10.1.5. Capsule8

10.1.6. Carbon Black

10.1.7. Cavirin

10.1.8. Check Point Software

10.1.9. Cisco

10.1.10. CloudAware

10.1.11. Cloudcheckr

10.1.12. CloudPassage

10.1.13. CrowdStrike

10.1.14. Dome9

10.1.15. Edgewise Networks

10.1.16. GuardiCore

10.1.17. Harvest AI

10.1.18. HyTrust

10.1.19. Illumio

10.1.20. Kaspersky Lab

10.1.21. Lacework

10.1.22. McAfee

10.1.23. Microsoft

10.1.24. Palo Alto Networks

10.1.25. Polyverse

10.1.26. Qingteng

10.1.27. Security Code

10.1.28. SiftSecurity

10.1.29. Sophos

10.1.30. Symantec

10.1.31. Threat Stack

10.1.32. Trend Micro

10.1.33. Tripwire

10.1.34. Virsec

10.1.35. VMware

10.2. Cloud Security Posture Management (CSPM)

10.2.1. Alert Logic

10.2.2. Bitglass

10.2.3. BMC

10.2.4. Cavirin

10.2.5. Check Point Software

10.2.6. Cloud Conformity

10.2.7. CloudAware

10.2.8. CloudCheckr

10.2.9. Cloudneeti

10.2.10. Cloudnosys

10.2.11. CloudPassage

10.2.12. Cloudvisory

10.2.13. Crowdstrike

10.2.14. DivvyCloud

10.2.15. Fugue

10.2.16. Lacework

10.2.17. McAfee

10.2.18. Netskope

10.2.19. Oracle

10.2.20. Outpost24

10.2.21. Palo Alto Networks

10.2.22. Saviynt

10.2.23. Sonrai

10.2.24. Sophos

10.2.25. Spanugo

10.2.26. Symantec

10.2.27. Threat Stack

10.2.28. Turbot

10.2.29. Turbot

10.2.30. VMware