Emerging Security Markets & Technologies

Get Started. It's Free
or sign up with your email address
Rocket clouds
Emerging Security Markets & Technologies by Mind Map: Emerging Security Markets & Technologies

1. Advanced Content Disarming and Reconstruction (CDR)

1.1. OPSWAT

1.1.1. https://www.opswat.com/products/metascan/

1.2. Votiro

1.3. Garrison Technology

1.4. Fortinet

1.5. Symantec

1.6. Glasswall

1.7. Sasa Software

2. Application Security

2.1. Runtime Application Self-Protection (RASP)

2.1.1. Arxan

2.1.2. BrixBits

2.1.3. Contrast Security

2.1.4. Hdiv Security

2.1.5. HP

2.1.6. Immunio

2.1.7. Inside Secure

2.1.8. LayeredInsight

2.1.9. OneASP

2.1.10. Prevoty

2.1.11. Promon

2.1.12. SecuPi

2.1.13. Signal Sciences

2.1.14. Tcell

2.1.15. Veracode

2.1.16. Virsec

2.1.17. Waratek

2.1.18. whiteCryption

2.1.19. WhiteHat Security

2.2. Enterprise App-Layer Protection

2.2.1. SecuPI

2.3. AI-Based Applicaton Threat Defense

2.3.1. CyKick Labs

2.3.2. Elastic Beam

2.3.3. LastWall

2.3.4. Signal Sciences

2.3.5. Spherical Defence

2.3.6. TemplarBit

2.3.7. Threat-X

2.3.8. WallArm

3. Data & Collaboration Security

3.1. Big Data Security

3.1.1. BlueTalon

3.2. Enclave-based Key Storage

3.2.1. Fortanix

3.3. Network-Based Data Cleansing

3.3.1. DataStealth

3.3.1.1. http://www.datexdatastealth.com/

3.4. PII Discovery

3.4.1. BigID

4. Identification, Authentication, Access Control & IAM

4.1. User Authentication

4.1.1. Behavioral Authentication

4.1.1.1. Behaviosec

4.1.1.2. BioCatch

4.1.1.3. Google

4.1.1.3.1. Trust API

4.1.1.4. ThreatMetrix

4.1.1.5. Trusona

5. Infrastructure Protection

5.1. Cloud Security

5.1.1. Hyperscale Container-based Firewalls

5.1.1.1. Juniper Networks

5.1.1.2. ShieldX

5.1.1.3. Public Cloud

5.1.1.3.1. Risk and Security Orchestration

5.1.2. Cloud Workload Protection Platforms (CWPP)

5.1.2.1. Alcide

5.1.2.2. Amazon

5.1.2.3. Aporeto

5.1.2.4. Aqua Security

5.1.2.5. Bitdefender

5.1.2.6. Bracket Computing

5.1.2.7. Capsule8

5.1.2.8. Carbon Black

5.1.2.9. Check Point Software

5.1.2.9.1. Formerly Dome9

5.1.2.10. Cisco

5.1.2.11. Cloud Raxak

5.1.2.12. CloudAware

5.1.2.13. CloudPassage

5.1.2.14. CrowdStrike

5.1.2.15. Edgewise

5.1.2.16. GuardiCore

5.1.2.17. Hytrust

5.1.2.18. Illumio

5.1.2.19. Kaspersky Lab

5.1.2.20. Lacework

5.1.2.21. Layered Insight

5.1.2.22. McAfee

5.1.2.23. Microsoft

5.1.2.24. NeuVector

5.1.2.25. Polyverse

5.1.2.26. Qingteng

5.1.2.27. Security Code

5.1.2.28. Sophos

5.1.2.29. StackRox

5.1.2.30. Symantec

5.1.2.31. Threat Stack

5.1.2.32. Trend Micro

5.1.2.33. Tripwire

5.1.2.34. Twistlock

5.1.2.35. Virsec

5.1.2.36. VMware

5.2. Online Fraud Prevention

5.2.1. SheerID

5.3. Secure Web Gateways

5.3.1. Remote Browser-Isolation (remote dom)

5.3.1.1. Amune

5.3.1.1.1. https://amune.org/security

5.3.1.2. Apozy

5.3.1.3. Aurionpro

5.3.1.4. Authentic8

5.3.1.5. DigitalGuardian

5.3.1.6. Dispel

5.3.1.7. Ericom

5.3.1.8. LightPoint Security

5.3.1.9. Menlo Security

5.3.1.10. Randed

5.3.1.11. Symantec

5.3.1.11.1. Formerly Fireglass

5.3.1.12. Weblife

5.4. Software Defined Perimeter (SDP)

5.4.1. BlackRidge Networks

5.4.2. Block Armour

5.4.3. Certes Networks

5.4.4. Cyxtera

5.4.5. Instasafe

5.4.6. Meta Networks

5.4.7. SAFE-T

5.4.8. Saife Inc!

5.4.9. Tempered Networks

5.4.10. Unisys Stealth

5.4.11. Verizon

5.4.12. Waverly Labs

5.4.13. Zscaler

6. BlockChain

6.1. Asset Integrity

6.1.1. Guardtime

6.2. Authentication

6.2.1. NuID

6.3. Encryption

6.3.1. REMME

6.4. Hardware Wallets

6.4.1. Ledger

6.5. Software Defined Perimeter

6.5.1. Block Armour

7. Internet of Things (IoT/OT)

7.1. Access Control

7.1.1. Sensify Security

7.2. Anomaly Detection

7.2.1. InfluxData

7.3. Authentication

7.3.1. Device Authority

7.3.2. Device Authority

7.3.3. Sensify Security

7.3.4. Trusfort

7.4. Automotive

7.4.1. Argus Cyber Security

7.4.2. Karamba Security

7.4.3. ProvenCore

7.4.4. Security Innovation

7.5. Embedded Security

7.5.1. ProvenCore

7.5.2. Security Innovation

7.6. Encryption

7.6.1. Rubicon

7.7. Gateways

7.7.1. Bayshore Networks

7.7.2. Xage Security

7.7.3. Huawei

7.8. Industrial Control Systems (ICS/SCADA)

7.8.1. Network Traffic Inspection

7.8.1.1. Claroty

7.8.1.2. CyberX

7.8.1.3. Dragos

7.8.1.4. Indegy

7.8.1.5. Nexdefense

7.8.1.6. Sentryo

7.8.2. Firewall

7.8.2.1. Check Point Software

7.8.2.2. Forcepoint

7.8.2.3. Fortinet

7.8.2.4. Radiflow

7.8.3. Remote Access

7.8.3.1. Claroty

7.9. Power Monitoring

7.9.1. PFP Cybersecurity

7.10. Radio

7.10.1. Bastille

7.11. Risk and Compliance

7.11.1. VDOO

7.12. Operating System

7.12.1. ProvenCore

8. Risk, Compliance and Security Management

8.1. Security Ratings & Insurance

8.1.1. Security Ratings

8.1.1.1. Bitsight Technologies

8.1.1.2. FICO

8.1.1.3. Gooann

8.1.1.4. Guidewire Software

8.1.1.5. Prevalent

8.1.1.6. SecurityScoreCard

8.1.2. Cyber Risk Insurance

8.1.2.1. Balsiger Insurance

8.1.2.2. CyberWrite

8.1.2.3. HSB Group

8.1.2.4. Philadelphia Insurance Companies

8.1.2.5. Tennant Risk Services

8.1.2.6. The Hartford

8.1.2.7. Travelers

8.2. Cloud Security Posture Management

8.2.1. Alert Logic

8.2.2. Amazon

8.2.2.1. AWS Security Hub, Trusted Advisor, AWS Config, and AWS Control Tower

8.2.3. Azure

8.2.3.1. Security Center

8.2.4. Bitglass

8.2.5. BMC

8.2.6. Caveonix

8.2.7. Cavirin

8.2.8. Check Point Software

8.2.9. Cloud Conformity

8.2.10. CloudAware

8.2.11. CloudCheckr

8.2.12. Cloudneeti

8.2.13. Cloudnosys

8.2.14. CloudPassage

8.2.15. Cloudvisory

8.2.16. Crowdstrike

8.2.17. DivvyCloud

8.2.18. Fugue

8.2.19. Google Cloud

8.2.19.1. Security Command Center

8.2.20. Lacework

8.2.21. McAfee

8.2.22. NetSkope

8.2.23. Oracle

8.2.24. Palo Alto Networks

8.2.25. Palo Alto Networks

8.2.26. Saviynt

8.2.27. Sonrai

8.2.28. Sophos

8.2.29. Symantec

8.2.30. Threat Stack

8.2.31. Turbot

8.2.32. VMware

9. Security Operations & Incident Response

9.1. Application Security Event Analytics

9.1.1. IDECSI

9.2. Attack Path Modeling, Breach and Attack Simulation

9.2.1. AttackIQ

9.2.2. Attivo Networks

9.2.3. Balbix

9.2.4. Core Security

9.2.5. Cymulate

9.2.6. Illusive Networks

9.2.7. RedSeal

9.2.8. SafeBreach

9.2.9. Skybox

9.2.10. Verodin

9.2.11. XM Cyber

9.3. Intelligence/Data Feeds/Software & Services

9.3.1. Collaborative Threat Investigation Platforms

9.3.1.1. BAE System Detica

9.3.1.1.1. Cybereveal

9.3.1.2. IKANow

9.3.1.3. Maltego

9.3.1.4. NC4

9.3.1.5. Palentir

9.3.1.5.1. Cyber

9.3.2. Open Source Threat & Data Mining

9.3.2.1. ThreatCrowd.org

9.3.2.2. ThreatMiner.org

9.3.3. Security Intelligence and Data Analysis Platforms

9.3.3.1. FireEye

9.3.3.1.1. Security Orchestrator

9.3.3.2. Palentir

9.3.4. Threat Intelligence Platforms (TIPs)

9.3.4.1. Anomali

9.3.4.2. BAE Systems

9.3.4.3. Comilion

9.3.4.4. CTILab

9.3.4.5. Cyjax

9.3.4.6. Eclectic IQ

9.3.4.7. Infoblox

9.3.4.8. Lockheed Martin

9.3.4.9. Lookingglass Cyber Solutions

9.3.4.10. Microsoft

9.3.4.10.1. Interflow

9.3.4.11. NC4

9.3.4.11.1. Soltra

9.3.4.12. Pulsedive

9.3.4.13. Service Now (Formerly Brightpoint)

9.3.4.14. Synopsys

9.3.4.15. ThreatConnect

9.3.4.16. ThreatQuotient

9.3.4.17. TruStar

9.3.4.18. Zeneth

9.3.5. Threat Intelligence Services

9.3.5.1. Human Intelligence - HUMINT (Strategic)

9.3.5.1.1. Attacker Tactics, Techniques and Procedures

9.3.5.1.2. Brand & Attack Target Monitoring

9.3.5.1.3. Credential Theft

9.3.5.1.4. Cybersquatting

9.3.5.1.5. External Data Loss & Risk Monitoring

9.3.5.1.6. Social Media, User Forum and External Threat Monitoring

9.3.5.2. Machine-Based (Tactical)

9.3.5.2.1. Anti-Phishing

9.3.5.2.2. Anti-Spam

9.3.5.2.3. Domain Name Monitoring/DGA Feeds

9.3.5.2.4. File Reputation

9.3.5.2.5. Indicators of Compromise (Feeds)

9.3.5.2.6. IP Blacklists

9.3.5.2.7. IP Reputation Feeds

9.3.5.2.8. Malicious Hashes

9.3.5.2.9. TI Feed Aggregation

9.3.5.2.10. Vulnerabilities and Exploits

9.3.5.2.11. Web Malware

9.4. Malware Detection & Analysis

9.4.1. Malware Analysis as a Service

9.4.1.1. Free Services

9.4.1.1.1. Malwr

9.4.1.1.2. Virustotal

9.4.1.1.3. Jotti

9.4.1.2. ReversingLabs

9.4.1.3. ThreatGrid

9.4.2. Sandbox Software

9.4.2.1. GFI

9.4.2.1.1. GFI Sandbox

9.4.2.2. Joesecurity

9.4.2.2.1. Joe Sandbox

9.4.2.3. Payload Security

9.4.2.3.1. http://www.payload-security.com/products/vxstream-sandbox

9.4.3. Deep Learning

9.4.3.1. Endpoint

9.4.3.1.1. Deep Instinct

9.4.3.1.2. Senseon

9.4.3.2. Network

9.4.3.2.1. Bluehexagon

9.4.3.2.2. Bluevector

9.4.3.3. Collaboration Suites

9.4.3.3.1. Bitdam

10. Threat Deception Technologies

10.1. Distributed Deception Platforms

10.1.1. Amgine Securus

10.1.2. Atomic Software Solutions

10.1.2.1. HoneyBot

10.1.3. Attivo Networks

10.1.4. Chaitin

10.1.5. CounterCraft

10.1.6. CyberFog

10.1.7. CyberTrap

10.1.8. Cymmetria

10.1.9. Fidelis Cybersecurity

10.1.10. FormalTech

10.1.11. Illusive Networks

10.1.12. JeeSeen

10.1.13. KeyFocus

10.1.14. SmokeScreen

10.1.15. Thinkst Applied Research (Canary)

10.1.16. TrapX

10.1.17. Vision Space Technologies

10.2. Files

10.2.1. Allure Security Technology

10.2.2. WatchPoint

10.3. Malware Anti-Evasion

10.3.1. Minerva Labs

10.4. Network

10.4.1. Hillstone Networks

10.4.2. PacketViper

10.4.3. Percipient Networks

10.4.4. Ridgeback Network Defense

10.4.5. Shadow Networks

10.5. Open Source

10.5.1. Honeypots

10.5.1.1. Database Honeypots

10.5.1.1.1. Delilah

10.5.1.1.2. ESpot

10.5.1.1.3. Elastic Honey

10.5.1.1.4. MongoDB-HoneyProxy

10.5.1.1.5. NoSQLpot

10.5.1.1.6. mysql

10.5.1.2. ICS/Scada

10.5.1.2.1. Conpot

10.5.1.2.2. gridpot

10.5.1.2.3. scada-honeynet

10.5.1.2.4. GasPot

10.5.1.3. Web honeypots

10.5.1.3.1. Bukkit Honeypot

10.5.1.3.2. EoHoneypotBundle

10.5.1.3.3. Glastopf

10.5.1.3.4. Google Hack Honeypot

10.5.1.3.5. HonneyPotter

10.5.1.3.6. Laravel Application Honeypot

10.5.1.3.7. Nodepot

10.5.1.3.8. Servletpot

10.5.1.3.9. Shadow Daemon

10.5.1.3.10. basic-auth-pot

10.5.1.3.11. django-admin-honeypot

10.5.1.3.12. phpmyadmin_honeypot

10.5.1.3.13. servlet

10.5.1.3.14. shockpot

10.5.1.3.15. smart-Honeypot

10.5.1.3.16. stack-honeypot

10.5.1.3.17. wordpot

10.5.1.3.18. wp-smart-honeypot

10.5.1.4. Service honepots

10.5.1.4.1. Ensnare

10.5.1.4.2. Honeyprint

10.5.1.4.3. Honeypy

10.5.1.4.4. RDPy

10.5.1.4.5. Tom's Honeypot

10.5.1.4.6. honeyntp

10.5.1.4.7. honeypot-camera

10.6. Software

10.6.1. KeyFocus

10.6.1.1. http://www.keyfocus.net/kfsensor/

10.6.2. Specter

10.6.2.1. http://www.specter.com/

10.6.3. Symantec

10.7. Web

10.7.1. Shape Security

10.7.1.1. ShapeShifter

10.7.2. Juniper Networks

10.7.2.1. WebAppSecure

10.7.3. CyberTrap

10.7.3.1. http://www.cybertrap.com/

10.8. Endpoint Agent

10.8.1. Minerva Labs

10.8.2. Symantec

11. Cloud Security

11.1. Cloud Workload Protection Platforms (CWPP)

11.1.1. Alcide

11.1.2. AlertLogic

11.1.3. Bitdefender

11.1.4. Bracket Computing

11.1.5. Capsule8

11.1.6. Carbon Black

11.1.7. Cavirin

11.1.8. Check Point Software

11.1.9. Cisco

11.1.10. CloudAware

11.1.11. Cloudcheckr

11.1.12. CloudPassage

11.1.13. CrowdStrike

11.1.14. Dome9

11.1.15. Edgewise Networks

11.1.16. GuardiCore

11.1.17. Harvest AI

11.1.18. HyTrust

11.1.19. Illumio

11.1.20. Kaspersky Lab

11.1.21. Lacework

11.1.22. McAfee

11.1.23. Microsoft

11.1.24. Palo Alto Networks

11.1.25. Polyverse

11.1.26. Qingteng

11.1.27. Security Code

11.1.28. SiftSecurity

11.1.29. Sophos

11.1.30. Symantec

11.1.31. Threat Stack

11.1.32. Trend Micro

11.1.33. Tripwire

11.1.34. Virsec

11.1.35. VMware

11.2. Cloud Security Posture Management (CSPM)

11.2.1. Alert Logic

11.2.2. Bitglass

11.2.3. BMC

11.2.4. Cavirin

11.2.5. Check Point Software

11.2.6. Cloud Conformity

11.2.7. CloudAware

11.2.8. CloudCheckr

11.2.9. Cloudneeti

11.2.10. Cloudnosys

11.2.11. CloudPassage

11.2.12. Cloudvisory

11.2.13. Crowdstrike

11.2.14. DivvyCloud

11.2.15. Fugue

11.2.16. Lacework

11.2.17. McAfee

11.2.18. Netskope

11.2.19. Oracle

11.2.20. Outpost24

11.2.21. Palo Alto Networks

11.2.22. Saviynt

11.2.23. Sonrai

11.2.24. Sophos

11.2.25. Spanugo

11.2.26. Symantec

11.2.27. Threat Stack

11.2.28. Turbot

11.2.29. Turbot

11.2.30. VMware