Cyber Security Handbook and Reference Guide - Gigamon
[Pages:810]Lead Author ? Ed Amoroso Researchers ? Matt Amoroso, Felix Andersen, Liam Baglivo, Ana Bolsoni, Shawn Hopkins, Miles McDonald, Ankit Parekh, Pratik Patel, Stan Quintana, Tim Steinberg Media ? Matt Amoroso, Laura Fanelli, Miles McDonald Detailed Copy Editing ? Shawn Hopkins Finance ? M&T Bank Design ? Alicia Amoroso, Miles McDonald, Rich Powell Administration ? navitend Facilities ? WeWork, NYC
TAG Cyber LLC P.O. Box 260, Sparta, New Jersey 07871
Copyright ? 2019 TAG Cyber LLC. All rights reserved.
This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to request permission from the publisher, so long as the content is neither changed nor attributed to a different source.
Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience, expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and recommendations contained and described herein.
Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors, methods, instructions, recommendations, or ideas contained in any aspect of the 2018 TAG Cyber Security Annual volumes. The opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time without notice.
September 18, 2018
To the Reader:
This year's updated Volume 3 of our 2019 TAG Cyber Security Annual is the result of our growing team of expert researchers working each day ? since last year's report issuance ? to identify, update, and maintain an impossiblylong list of cyber security vendors. I'm proud of the amazing TAG Cyber team for their fine efforts, and I hope their intense work saves you valuable time, effort, and money in your own source selection research. That's been our goal for Volume 3 since Day One: To assist, and to support you ? the cyber security professional.
We hesitate to call this a fully-comprehensive work, simply because each day seems to bring several new cyber security vendors to the market. The moment this document is pushed to our roughly 54 free-download sites in midSeptember of 2018, a dozen great new cyber security companies will have been born. So, we do our best to include everything we can find. And we keep searching and pushing to include more and more cyber security companies to our list. We do this for you, every day of every week.
Another great challenge is the day-to-day flurry of mergers, acquisitions, and yes ? dissolutions of cyber security companies that must be tracked. It's a tricky process, because when two great companies combine, such as AlienVault and AT&T, the decision must be made whether to keep both as separate entries, or to combine them into one new one. In the end, it's a total judgment call. Generally, we try to keep them separate for as long as security professionals might continue to view them separately. But we don't always get this right.
People ask me every day if this list is automated and I feel like I'm apologizing when I say no. We do not crawl sites, and we do not launch botnets to find companies. We do it the old-fashioned way ? with fingers to keyboard, and with shoe leather to pavement. (We make sure manually, for example, that we are a super-set of the RSA Conference vendor sponsors.) What this means is that when we list a company, a human being on our staff has checked to make sure that a real company exists. We get this right ? most of the time.
As we announce every year, if you are a cyber security vendor and you are not listed here, then please drop me an email at eamoroso@tag-. I will do my best to set up a brief discussion, and might even blog about you as well. If you follow me on LinkedIn (Edward Amoroso) or Twitter (@hashtag_cyber), then you are already familiar with these types of articles and the cadence for their issuance. We also have created hours and hours (and more hours) of video interviews with cyber luminaries, which you can check out on our TAG Cyber YouTube Channel.
So, welcome to this 2019 TAG Cyber Security Annual ? Volume 3. The listings are free as always, so we hope you save barrels of money by not having to pay external researchers. Most of these fancy industry analyst companies will charge you a small fortune for this type of information (when they are not too busy throwing darts at some dumb quadrant). Use the money you save by not paying them, to buy pizza for your team ? for the next decade.
Dr. Edward G. Amoroso Chief Executive Officer, TAG Cyber LLC Fulton Street on Broadway
1.
ABR-PROM ? VAR
40.
AlphaGuardian ?
2.
Absio ? Messaging
Infrastructure
3.
Absolute Software ?
41.
Alpine Cyber Solutions ?
Endpoint
VAR
4.
Acalvio ? IDS
42.
Alta Associates ?
5.
Accenture ? Consulting
Recruiting
6.
Accellion ? Sharing
43.
Altep ? Forensics
7.
AccessData ? Forensics
44.
Alus Outsourcing ? VAR
8.
AccessIT Group ? VAR
45.
Alvea Services ? Services
9.
Accunet ? VAR
46.
Aman Info Security ?
10.
ACL ? GRC
Consulting
11.
ACROS Security ?
47.
Amazon Web Services ?
Penetration
Cloud
12.
ActiveRisk ? Consulting
48.
Amgine Securus ? Threat,
13.
Acumin ? Recruiting
Forensics
14.
Acunetix ? Scanning
49.
AnchorFree ? Browsing
15.
AdaptiveMobile ? Mobile
50.
Anodot ? Analytics,
16.
Ad Novum ? Products
Network Monitoring
17.
Advent IM ? Consulting
51.
Anomali - Threat
18.
Adventium Labs ? R&D
52.
Anonymizer ? Browsing
19.
Aegis Identity ? Identity
53.
Anonyome Labs ? Fraud,
20.
AEP ? Hardware
Leakage Prevention
21.
Agari ? Email
54.
Antiy Labs ? AV
22.
Aggeios ? Services
55.
ANX ? PCI
23.
AgileBits ? Passwords,
56.
Aon ? Insurance,
Encryption
Consulting
24.
AhnLab ? AV
57.
APCON ? Monitoring
25.
Ahope ? MS, PKI
58.
Appdome - Mobile
26.
Airbus Defence/Space ?
59.
Apperian ? Mobile
IA
60.
AppGuard - Endpoint
27.
Akamai ? DDOS
61.
Applicure ? WAF
28.
Alert Enterprise ? GRC
62.
Applied Control
29.
Alert Logic ? Cloud
Solutions ? Consulting,
30.
Alertsec ? Encryption
Training
31.
AlgoSec ? Firewall
63.
Applied Magnetics Lab ?
32.
Allegro Software ?
Destruct
ICS/IoT
64.
Applied Risk ? ICS/IoT
33.
Allgress ? GRC
65.
ApplyLogic ? IA
34.
AllThatSoft - MS
66.
AppRiver ? Email
35.
AlienVault ? Threat
67.
AppSec Labs ?
36.
AllClear ID ? Cyber
Applications
Insurance
68.
Appthority ? Mobile
37.
Alliant Tech ? VAR
69.
Aqua Security - Cloud
38.
Allot Communications ?
70.
ARAMA TECH ? GRC
Monitoring
71.
Arbor Networks ? DDOS
39.
Allstream ? MSS
72.
Arcon ? MSSP
73.
74. 75.
76. 77. 78. 79. 80. 81. 82. 83.
84. 85. 86. 87.
88.
89. 90. 91.
92. 93. 94. 95.
96. 97.
98. 99. 100. 101.
102.
103. 104. 105.
106.
Arctic Wolf Networks ? SIEM Area 1 Security ? Threat
Argus Cyber Security IoT Armjisoft ? DRM Armor ? Cloud Aruvio ? GRC Arxan ? Applications Ascentor ? Consulting Asgard Group ? Wireless Asgent - Network Ashton Search Group ? Recruit Aspect Security ? App Sec ASPG ? Mainframe Assevero ? IA Assure Technical ? Consulting
Assured Information Security - Training, Vulnerability Man. Assuria ? SIEM AssurIT ? Consulting
Astech Consulting ? Consulting Ataata - Training A10 Networks ? DMZ A3sec ? SIEM Atlantic Data Forensics ? Forensics Atomicorp ? Endpoint Atredis Partners ? Consulting A3Sec ? SIEM atsec ? Consulting AT&T ? MSS
Attachmate (now MicroFocus) ? Fraud Attack Research ? Consulting Attivo Networks ? Threat Auconet - Endpoint Audit Square ? Vulnerability Aujas Networks ? GRC
107.
108. 109.
110. 111.
112. 113.
114. 115. 116.
117. 118. 119. 120. 121. 122. 123. 124. 125. 126. 127. 128. 129.
130. 131. 132.
133. 134.
135. 136. 137. 138.
139. 140.
141.
Aura Information Security ? Consulting aurionPro ? IAM, GRC
Aurora Information Security ? Consulting Authentic8 ? WAF Authentify ? Authentication AuthLite ? Authentication AuthRocket ? Authentication Authy ? Authentication Auth0 ? Identity Autonomic Software ? Endpoint Avanan - Cloud Avast ? AV Avatier ? Identity Avecto ? Privilege AvePoint ? GRC Averon ? 2FA Averail ? Mobile AVeS ? Consulting AV Europe ? AV AVG ? AV Avira ? AV Avnet ? Consulting Awake Security ? ID&P, INTELLIGENCE Axiomatics ? Access AxonAI? SA Axxum Technologies ? IT Security Axway ? GRC Azorian Cyber Security ? Consulting BAE Systems ? IA Baffle - Encryption BalaBit ? Firewall Bambenek Consulting ? Consulting Bandura ? IDPS, NAC Banff Cyber ? Web Security Barclay Simpson ? Recruiting
142. 143.
144. 145. 146.
147. 148.
149. 150. 151.
152.
153. 154.
155. 156. 157. 158. 159. 160.
161.
162. 163.
164.
165. 166.
167. 168. 169. 170. 171. 172.
173.
Barkly ? Endpoint Barracuda Networks ? Firewalls Bastille ? Industrial Bay Dynamics ? GRC Bayshore Networks ? Industrial Beachhead ? Mobile Behaviosec ? Authentication Belkasoft ? Forensics Bell Canada ? MSS Benchmark Exec Search ? Recruiting
Berkeley Varitronics Systems ? Hardware, Mobile BETTER ? Mobile
BeyondSecurity ? Scanning BeyondTrust ? Privilege BHC Lab ? Consulting BicDroid ? Encryption BigID ? GRC, Cloud BigPanda - SIEM Big Switch Networks ? Cloud
Billington CyberSecurity ? Training BINAR10 ? Info Sec
BinarySEC (Now Ingen Security) ? Web Security BioCatch - Fraud Prevention BIOWATCH ? 2FA Biscom ? Secure File Sharing Bishop Fox ? Consulting Bitcrack ? Consulting BitDefender ? AV Bitglass ? Cloud Bitium ? Cloud
Bit9 + Carbon Black ? Endpoint BitSec ? Forensics
174.
175.
176.
177.
178. 179.
180. 181.
182.
183. 184. 185. 186.
187.
188. 189. 190. 191. 192. 193. 194. 195. 196. 197.
198. 199.
200.
201. 202. 203.
204. 205.
Bitshield Security ? Consulting
BitSight Technologies ? Rating B12 Technologies ? Authentication Bivio Networks ? Net Analytics Blackberry - Mobile Black Duck Software ? Application Blackfoot ? Consulting Blackmere Consulting ? Recruiting BlackRidge TechnologyCloud BlackStratus ? SIEM Bloombase ? Encryption BlueCat ? NAC BlueCedar ? Mobile Security BlueData Software ? Cloud Blue Lance ? GRC Blueliv ? Threat BlueRISC ? Hardware BlueTalon ? Data Security BlueVoyant - MSS Bluink ? 2FA BluVector ? Attack Boeing ? IA Boldon James ? Messaging Bomgar ? VPN/Secure Access Boole Server ? Data Booz Allen Hamilton ? IA, Consulting BotDoc ? Secure File Sharing Bouju ? Brand Boxcryptor ? Cloud Bracket Computing ? Cloud Bradford Networks ? NAC Brainloop ? Sharing
206.
207.
208. 209. 210.
211.
212.
213. 214. 215.
216. 217. 218. 219. 220. 221. 222. 223.
224.
225.
226. 227.
228. 229.
230. 231.
232.
233. 234. 235. 236.
237.
Braintrace ? MSS, Vulnerability Brandon Becker ? Recruiting BrandProtect ? Brand Bricata ? Attack Bridgen Group ? Recruiting
Bridgeway Security Solutions ? VAR BrightPoint Security ? SIEM Brinqa ? GRC Bromium ? Endpoint BSI Cybersecurity ? Email, Training BT ? MSS Buddha Labs ? Cloud BUFFERZONE ? Endpoint Buguroo - Fraud Bugcrowd ? Bounty BugSec ? Bounty BullGuard ? AV Burns and McDonnell ? Consulting
BWise (Peter de Verdier ? VP) - GRC CA Technologies ? IT Security CACI ? IA
Caliber Security Partners ? Consulting Callsign ? 2FA. IAM Calyptix Security ? Net Security Capgemini ? Consulting
Capita Identity Solutions - Identity Capstone Security ? App Sec Capsule8 - IDP Carahsoft ? Consulting Carbon Black - Endpoint Carve Systems ? Consulting Catbird ? Cloud
238. 239. 240. 241.
242. 243. 244. 245. 246. 247.
248. 249. 250. 251.
252. 253. 254.
255. 256.
257. 258. 259.
260. 261.
262. 263.
264. 265. 266. 267. 268. 269. 270.
271. 272. 273.
Cato Networks - Network Caveon ? Forensics Cavirin ? Cloud CBI ? Cloud, App Security, Training, Awareness CDW - VAR Celestix ? VPN Cellcrypt ? Voice Cellebrite ? Forensics Cellrox ? Mobile
Center for Internet Security ? Compliance CenterTools ? Endpoint CENTRI ? Encryption Centrify ? Identity Centripetal Networks ? Threat CenturyLink ? MSS Certes ? Application
Certified Security Solutions ? CA/PKI CertiPath ? CA/PKI Certivox ? Encryption, Authentication CGI Federal ? IA Checkmarx ? Software Check Point Software ? Firewall, IDS/IPS CheckRecipient - Email Chertoff Group ? Consulting China Telecom ? MSS Chronicle ? Threat Intelligence Cigital ? Software CimCor ? File CIPHER - MSS CipherCloud ? Cloud CipherGraph ? VPN cirosec ? Consulting Cisco Systems ? Net Security The CISO Group ? PCI Citadel Defense ? ICS/IoT Citrix ? Cloud
274.
275. 276. 277. 278.
279. 280. 281. 282. 283. 284. 285. 286. 287. 288. 289. 290. 291. 292. 293. 294.
295.
296.
297.
298. 299. 300. 301. 302.
303. 304. 305.
306. 307. 308.
309.
CIX Software ? App Security Clavister ? Net Security Cleafly - Endpoint Clearswift ? Email Clearwater Compliance GRC Cloak Labs - Encrpytion Clone ? MSS Cloudera - Cloud CloudFlare ? CDN CloudLink - Cloud CloudLock ? Cloud Cloudmark ? Email CloudMask - Cloud CloudPassage ? Cloud Cloudpath ? Mobile Coalfire ? GRC Cobalt ? Bug Bounty Coblue ? Training CodeDx ? Application Code42 ? Endpoint Code Green Networks ? DLP Codenomicon ? Penetration Cofense ? Email Security, Intelligence Collective Software ? Authentication Comda ? Authentication Comilion ? Sharing Comodo ? CA/PKI CompliancePoint ? GRC Comsec Consulting ? Consulting Confer ? Threat Conquest Security ? VAR ContentGuard ? Encryption ContentKeeper ? Gateway Content Raven ? File Content Security ? Consulting ContextIS ? Consulting
310.
311.
312. 313.
314.
315. 316. 317.
318. 319.
320. 321. 322.
323. 324. 325. 326. 327. 328. 329. 330. 331.
332. 333.
334. 335. 336.
337.
338. 339. 340. 341.
342. 343.
Context Relevant (now Versive, Inc.) ? Analytics
Contextual Security Solutions ? Consulting Continuum GRC - GRC Contrast Security ? App Sec
ControlPanelGRC, (or Symmetry) ? GRC ControlScan ? MSS Convercent ? GRC Corax Cyber Security ? Consulting Corero ? DDOS, IDS/IPS Corelight ? Network Monitoring Core Security ? Cloud CORISECIO ? Encryption CoroNet ? IAM, AntiMalware Correlog ? SIEM Corsa ? Network Security CoSoSys ? Endpoint CounterCraft - Monitoring CounterTack ? Endpoint Covata ? Sharing Covertix ? File Covisint ? Identity cPacket Networks Monitoring CriticalStart ? Services
Cross Match Technologies - Biometrics CrowdStrike ? Threat Crypteia Networks ? MSS Cryptography Research ? Encryption Cryptomathic ? Encryption, CA/PKI CryptoMove - Encryption CryptoNet ? Consulting CryptoSense ? Analytics CryptoTEC AG ? Encryption, CA/PKI Cryptosoft ? Encryption Cryptzone ? Access
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- west virginia state police 95th anniversary 1
- leveraging innovation to fight trafficking in human beings osce
- housing element city of oakland
- the age of analytics competing in a data driven world
- october 1 12 pioneer express
- portion of park sold for unnamed pharmacy thief river falls times
- cyber security handbook and reference guide gigamon