Emerging Security Markets & Technologies

Laten we beginnen. Het is Gratis
of registreren met je e-mailadres
Emerging Security Markets & Technologies Door Mind Map: Emerging Security Markets & Technologies

1. Moving Target Defense

1.1. Memory

1.1.1. Morphisec

1.2. Network

1.2.1. CryptoniteNXT

1.2.2. Kameleon Security

1.3. Applications

1.3.1. General Apps

1.3.1.1. Polyverse

1.3.1.2. RunSafe Security

1.3.2. Mobile Apps

1.3.2.1. Everspin Global

1.4. Operating Systems

1.4.1. Polyverse

2. Advanced Content Disarming and Reconstruction (CDR)

2.1. Forcepoint

2.2. Fortinet

2.3. Garrison Technology

2.4. Glasswall

2.5. OPSWAT

2.5.1. https://www.opswat.com/products/metascan/

2.6. Sasa Software

2.7. Symantec

2.8. Votiro

3. Application Security

3.1. Runtime Application Self-Protection (RASP)

3.1.1. Arxan

3.1.2. BrixBits

3.1.3. Contrast Security

3.1.4. Hdiv Security

3.1.5. HP

3.1.6. Immunio

3.1.7. Inside Secure

3.1.8. LayeredInsight

3.1.9. OneASP

3.1.10. Prevoty

3.1.11. Promon

3.1.12. SecuPi

3.1.13. Signal Sciences

3.1.14. Tcell

3.1.15. Veracode

3.1.16. Virsec

3.1.17. Waratek

3.1.18. whiteCryption

3.1.19. WhiteHat Security

3.2. Enterprise App-Layer Protection

3.2.1. SecuPI

3.3. AI-Based Applicaton Threat Defense

3.3.1. CyKick Labs

3.3.2. Elastic Beam

3.3.3. LastWall

3.3.4. Signal Sciences

3.3.5. Spherical Defence

3.3.6. TemplarBit

3.3.7. Threat-X

3.3.8. WallArm

4. Data & Collaboration Security

4.1. Big Data Security

4.1.1. BlueTalon

4.2. Enclave-based Key Storage

4.2.1. Fortanix

4.3. Network-Based Data Cleansing

4.3.1. DataStealth

4.3.1.1. http://www.datexdatastealth.com/

4.4. PII Discovery

4.4.1. BigID

5. Identification, Authentication, Access Control & IAM

5.1. User Authentication

5.1.1. Behavioral Authentication

5.1.1.1. Behaviosec

5.1.1.2. BioCatch

5.1.1.3. Google

5.1.1.3.1. Trust API

5.1.1.4. ThreatMetrix

5.1.1.5. Trusona

6. Infrastructure Protection

6.1. Cloud Security

6.1.1. Hyperscale Container-based Firewalls

6.1.1.1. Juniper Networks

6.1.1.2. ShieldX

6.1.1.3. Public Cloud

6.1.1.3.1. Risk and Security Orchestration

6.1.2. Cloud Workload Protection Platforms (CWPP)

6.1.2.1. Alcide

6.1.2.2. Amazon

6.1.2.3. Aporeto

6.1.2.4. Aqua Security

6.1.2.5. Bitdefender

6.1.2.6. Bracket Computing

6.1.2.7. Capsule8

6.1.2.8. Carbon Black

6.1.2.9. Check Point Software

6.1.2.9.1. Formerly Dome9

6.1.2.10. Cisco

6.1.2.11. Cloud Raxak

6.1.2.12. CloudAware

6.1.2.13. CloudPassage

6.1.2.14. CrowdStrike

6.1.2.15. Edgewise

6.1.2.16. GuardiCore

6.1.2.17. Hytrust

6.1.2.18. Illumio

6.1.2.19. Kaspersky Lab

6.1.2.20. Lacework

6.1.2.21. Layered Insight

6.1.2.22. McAfee

6.1.2.23. Microsoft

6.1.2.24. NeuVector

6.1.2.25. Polyverse

6.1.2.26. Qingteng

6.1.2.27. Security Code

6.1.2.28. Sophos

6.1.2.29. StackRox

6.1.2.30. Symantec

6.1.2.31. Threat Stack

6.1.2.32. Trend Micro

6.1.2.33. Tripwire

6.1.2.34. Twistlock

6.1.2.35. Virsec

6.1.2.36. VMware

6.2. Online Fraud Prevention

6.2.1. SheerID

6.3. Secure Web Gateways

6.3.1. Remote Browser-Isolation (remote dom)

6.3.1.1. Amune

6.3.1.1.1. https://amune.org/security

6.3.1.2. Apozy

6.3.1.3. Aurionpro

6.3.1.4. Authentic8

6.3.1.5. DigitalGuardian

6.3.1.6. Dispel

6.3.1.7. Ericom

6.3.1.8. LightPoint Security

6.3.1.9. Menlo Security

6.3.1.10. Randed

6.3.1.11. Symantec

6.3.1.11.1. Formerly Fireglass

6.3.1.12. Weblife

6.4. Software Defined Perimeter (SDP)

6.4.1. BlackRidge Networks

6.4.2. Block Armour

6.4.3. Certes Networks

6.4.4. Cyxtera

6.4.5. Instasafe

6.4.6. Meta Networks

6.4.7. SAFE-T

6.4.8. Saife Inc!

6.4.9. Tempered Networks

6.4.10. Unisys Stealth

6.4.11. Verizon

6.4.12. Waverly Labs

6.4.13. Zscaler

6.5. Blockchain-Based Data Protection

6.5.1. Acronis

7. BlockChain

7.1. Asset Integrity

7.1.1. Guardtime

7.2. Authentication

7.2.1. NuID

7.3. Encryption

7.3.1. REMME

7.4. Hardware Wallets

7.4.1. Ledger

7.5. Software Defined Perimeter

7.5.1. Block Armour

8. Internet of Things (IoT/OT)

8.1. Access Control

8.1.1. Sensify Security

8.2. Anomaly Detection

8.2.1. InfluxData

8.3. Authentication

8.3.1. Device Authority

8.3.2. Sensify Security

8.3.3. Trusfort

8.4. Automotive

8.4.1. Argus Cyber Security

8.4.2. Karamba Security

8.4.3. ProvenCore

8.4.4. Security Innovation

8.5. Embedded Security

8.5.1. ProvenCore

8.5.2. Security Innovation

8.5.3. Sequitur Labs

8.6. Encryption

8.6.1. Rubicon

8.7. Gateways

8.7.1. Bayshore Networks

8.7.2. Xage Security

8.7.3. Huawei

8.8. Industrial Control Systems (ICS/SCADA)

8.8.1. Network Traffic Inspection

8.8.1.1. Claroty

8.8.1.2. CyberX

8.8.1.3. Dragos

8.8.1.4. Indegy

8.8.1.5. Nexdefense

8.8.1.6. Sentryo

8.8.2. Firewall

8.8.2.1. Check Point Software

8.8.2.2. Forcepoint

8.8.2.3. Fortinet

8.8.2.4. Radiflow

8.8.3. Remote Access

8.8.3.1. Claroty

8.9. Power Monitoring

8.9.1. PFP Cybersecurity

8.10. Radio

8.10.1. Bastille

8.11. Risk and Compliance

8.11.1. VDOO

8.12. Operating System

8.12.1. ProvenCore

9. Risk, Compliance and Security Management

9.1. Security Ratings & Insurance

9.1.1. Security Ratings

9.1.1.1. Bitsight Technologies

9.1.1.2. FICO

9.1.1.3. Gooann

9.1.1.4. Guidewire Software

9.1.1.5. Prevalent

9.1.1.6. SecurityScoreCard

9.1.2. Cyber Risk Insurance

9.1.2.1. Balsiger Insurance

9.1.2.2. CyberWrite

9.1.2.3. HSB Group

9.1.2.4. Philadelphia Insurance Companies

9.1.2.5. Tennant Risk Services

9.1.2.6. The Hartford

9.1.2.7. Travelers

9.2. Cloud Security Posture Management

9.2.1. Alert Logic

9.2.2. Amazon

9.2.2.1. AWS Security Hub, Trusted Advisor, AWS Config, and AWS Control Tower

9.2.3. Azure

9.2.3.1. Security Center

9.2.4. Bitglass

9.2.5. BMC

9.2.6. Caveonix

9.2.7. Cavirin

9.2.8. Check Point Software

9.2.9. Cloud Conformity

9.2.10. CloudAware

9.2.11. CloudCheckr

9.2.12. Cloudneeti

9.2.13. Cloudnosys

9.2.14. CloudPassage

9.2.15. Cloudvisory

9.2.16. Crowdstrike

9.2.17. DivvyCloud

9.2.18. Fugue

9.2.19. Google Cloud

9.2.19.1. Security Command Center

9.2.20. Lacework

9.2.21. McAfee

9.2.22. NetSkope

9.2.23. Oracle

9.2.24. Palo Alto Networks

9.2.25. Palo Alto Networks

9.2.26. Saviynt

9.2.27. Sonrai

9.2.28. Sophos

9.2.29. Symantec

9.2.30. Threat Stack

9.2.31. Turbot

9.2.32. VMware

10. Security Operations & Incident Response

10.1. Application Security Event Analytics

10.1.1. IDECSI

10.2. Attack Path Modeling, Breach and Attack Simulation

10.2.1. AttackIQ

10.2.2. Attivo Networks

10.2.3. Balbix

10.2.4. Core Security

10.2.5. Cymulate

10.2.6. Illusive Networks

10.2.7. RedSeal

10.2.8. SafeBreach

10.2.9. Skybox

10.2.10. Verodin

10.2.11. XM Cyber

10.3. Intelligence/Data Feeds/Software & Services

10.3.1. Collaborative Threat Investigation Platforms

10.3.1.1. BAE System Detica

10.3.1.1.1. Cybereveal

10.3.1.2. IKANow

10.3.1.3. Maltego

10.3.1.4. NC4

10.3.1.5. Palentir

10.3.1.5.1. Cyber

10.3.2. Open Source Threat & Data Mining

10.3.2.1. ThreatCrowd.org

10.3.2.2. ThreatMiner.org

10.3.3. Security Intelligence and Data Analysis Platforms

10.3.3.1. FireEye

10.3.3.1.1. Security Orchestrator

10.3.3.2. Palentir

10.3.4. Threat Intelligence Platforms (TIPs)

10.3.4.1. Anomali

10.3.4.2. BAE Systems

10.3.4.3. Comilion

10.3.4.4. CTILab

10.3.4.5. Cyjax

10.3.4.6. Eclectic IQ

10.3.4.7. Infoblox

10.3.4.8. Lockheed Martin

10.3.4.9. Lookingglass Cyber Solutions

10.3.4.10. Microsoft

10.3.4.10.1. Interflow

10.3.4.11. NC4

10.3.4.11.1. Soltra

10.3.4.12. Pulsedive

10.3.4.13. Service Now (Formerly Brightpoint)

10.3.4.14. Synopsys

10.3.4.15. ThreatConnect

10.3.4.16. ThreatQuotient

10.3.4.17. TruStar

10.3.4.18. Zeneth

10.3.5. Threat Intelligence Services

10.3.5.1. Human Intelligence - HUMINT (Strategic)

10.3.5.1.1. Attacker Tactics, Techniques and Procedures

10.3.5.1.2. Brand & Attack Target Monitoring

10.3.5.1.3. Credential Theft

10.3.5.1.4. Cybersquatting

10.3.5.1.5. External Data Loss & Risk Monitoring

10.3.5.1.6. Social Media, User Forum and External Threat Monitoring

10.3.5.2. Machine-Based (Tactical)

10.3.5.2.1. Anti-Phishing

10.3.5.2.2. Anti-Spam

10.3.5.2.3. Domain Name Monitoring/DGA Feeds

10.3.5.2.4. File Reputation

10.3.5.2.5. Indicators of Compromise (Feeds)

10.3.5.2.6. IP Blacklists

10.3.5.2.7. IP Reputation Feeds

10.3.5.2.8. Malicious Hashes

10.3.5.2.9. TI Feed Aggregation

10.3.5.2.10. Vulnerabilities and Exploits

10.3.5.2.11. Web Malware

10.4. Malware Detection & Analysis

10.4.1. Malware Analysis as a Service

10.4.1.1. Free Services

10.4.1.1.1. Malwr

10.4.1.1.2. Virustotal

10.4.1.1.3. Jotti

10.4.1.2. Intezer

10.4.1.3. ReversingLabs

10.4.1.4. ThreatGrid

10.4.2. Sandbox Software

10.4.2.1. GFI

10.4.2.1.1. GFI Sandbox

10.4.2.2. Joesecurity

10.4.2.2.1. Joe Sandbox

10.4.2.3. Payload Security

10.4.2.3.1. http://www.payload-security.com/products/vxstream-sandbox

10.4.3. Deep Learning

10.4.3.1. Endpoint

10.4.3.1.1. Deep Instinct

10.4.3.1.2. Senseon

10.4.3.2. Network

10.4.3.2.1. Bluehexagon

10.4.3.2.2. Bluevector

10.4.3.3. Collaboration Suites

10.4.3.3.1. Bitdam

10.4.4. File Analysis

10.4.4.1. Inquest

10.4.4.2. Intezer

10.4.4.3. ReversingLabs

11. Threat Deception Technologies

11.1. Distributed Deception Platforms

11.1.1. Amgine Securus

11.1.2. Atomic Software Solutions

11.1.2.1. HoneyBot

11.1.3. Attivo Networks

11.1.4. Chaitin

11.1.5. CounterCraft

11.1.6. CyberFog

11.1.7. CyberTrap

11.1.8. Cymmetria

11.1.9. Fidelis Cybersecurity

11.1.10. FormalTech

11.1.11. Illusive Networks

11.1.12. JeeSeen

11.1.13. KeyFocus

11.1.14. SmokeScreen

11.1.15. Thinkst Applied Research (Canary)

11.1.16. TrapX

11.1.17. Vision Space Technologies

11.2. Files

11.2.1. Allure Security Technology

11.2.2. WatchPoint

11.3. Malware Anti-Evasion

11.3.1. Minerva Labs

11.4. Network

11.4.1. Hillstone Networks

11.4.2. PacketViper

11.4.3. Percipient Networks

11.4.4. Ridgeback Network Defense

11.4.5. Shadow Networks

11.5. Open Source

11.5.1. Honeypots

11.5.1.1. Database Honeypots

11.5.1.1.1. Delilah

11.5.1.1.2. ESpot

11.5.1.1.3. Elastic Honey

11.5.1.1.4. MongoDB-HoneyProxy

11.5.1.1.5. NoSQLpot

11.5.1.1.6. mysql

11.5.1.2. ICS/Scada

11.5.1.2.1. Conpot

11.5.1.2.2. gridpot

11.5.1.2.3. scada-honeynet

11.5.1.2.4. GasPot

11.5.1.3. Web honeypots

11.5.1.3.1. Bukkit Honeypot

11.5.1.3.2. EoHoneypotBundle

11.5.1.3.3. Glastopf

11.5.1.3.4. Google Hack Honeypot

11.5.1.3.5. HonneyPotter

11.5.1.3.6. Laravel Application Honeypot

11.5.1.3.7. Nodepot

11.5.1.3.8. Servletpot

11.5.1.3.9. Shadow Daemon

11.5.1.3.10. basic-auth-pot

11.5.1.3.11. django-admin-honeypot

11.5.1.3.12. phpmyadmin_honeypot

11.5.1.3.13. servlet

11.5.1.3.14. shockpot

11.5.1.3.15. smart-Honeypot

11.5.1.3.16. stack-honeypot

11.5.1.3.17. wordpot

11.5.1.3.18. wp-smart-honeypot

11.5.1.4. Service honepots

11.5.1.4.1. Ensnare

11.5.1.4.2. Honeyprint

11.5.1.4.3. Honeypy

11.5.1.4.4. RDPy

11.5.1.4.5. Tom's Honeypot

11.5.1.4.6. honeyntp

11.5.1.4.7. honeypot-camera

11.6. Software

11.6.1. KeyFocus

11.6.1.1. http://www.keyfocus.net/kfsensor/

11.6.2. Specter

11.6.2.1. http://www.specter.com/

11.6.3. Symantec

11.7. Web

11.7.1. Shape Security

11.7.1.1. ShapeShifter

11.7.2. Juniper Networks

11.7.2.1. WebAppSecure

11.7.3. CyberTrap

11.7.3.1. http://www.cybertrap.com/

11.8. Endpoint Agent

11.8.1. Attivo networks

11.8.2. Minerva Labs

11.8.3. Symantec

12. Cloud Security

12.1. Cloud Workload Protection Platforms (CWPP)

12.1.1. Alcide

12.1.2. AlertLogic

12.1.3. Bitdefender

12.1.4. Bracket Computing

12.1.5. Capsule8

12.1.6. Carbon Black

12.1.7. Cavirin

12.1.8. Check Point Software

12.1.9. Cisco

12.1.10. CloudAware

12.1.11. Cloudcheckr

12.1.12. CloudPassage

12.1.13. CrowdStrike

12.1.14. Dome9

12.1.15. Edgewise Networks

12.1.16. GuardiCore

12.1.17. Harvest AI

12.1.18. HyTrust

12.1.19. Illumio

12.1.20. Kaspersky Lab

12.1.21. Lacework

12.1.22. McAfee

12.1.23. Microsoft

12.1.24. Palo Alto Networks

12.1.25. Polyverse

12.1.26. Qingteng

12.1.27. Security Code

12.1.28. SiftSecurity

12.1.29. Sophos

12.1.30. Symantec

12.1.31. Threat Stack

12.1.32. Trend Micro

12.1.33. Tripwire

12.1.34. Virsec

12.1.35. VMware

12.2. Cloud Security Posture Management (CSPM)

12.2.1. Alert Logic

12.2.2. Bitglass

12.2.3. BMC

12.2.4. Cavirin

12.2.5. Check Point Software

12.2.6. Cloud Conformity

12.2.7. CloudAware

12.2.8. CloudCheckr

12.2.9. Cloudneeti

12.2.10. Cloudnosys

12.2.11. CloudPassage

12.2.12. Cloudvisory

12.2.13. Crowdstrike

12.2.14. DivvyCloud

12.2.15. Fugue

12.2.16. Lacework

12.2.17. McAfee

12.2.18. Netskope

12.2.19. Oracle

12.2.20. Outpost24

12.2.21. Palo Alto Networks

12.2.22. Saviynt

12.2.23. Sonrai

12.2.24. Sophos

12.2.25. Spanugo

12.2.26. Symantec

12.2.27. Threat Stack

12.2.28. Turbot

12.2.29. Turbot

12.2.30. VMware