Cyber Security Handbook and Reference Guide - Gigamon

[Pages:810] Lead Author ? Ed Amoroso Researchers ? Matt Amoroso, Felix Andersen, Liam Baglivo, Ana Bolsoni, Shawn Hopkins, Miles McDonald, Ankit Parekh, Pratik Patel, Stan Quintana, Tim Steinberg Media ? Matt Amoroso, Laura Fanelli, Miles McDonald Detailed Copy Editing ? Shawn Hopkins Finance ? M&T Bank Design ? Alicia Amoroso, Miles McDonald, Rich Powell Administration ? navitend Facilities ? WeWork, NYC

TAG Cyber LLC P.O. Box 260, Sparta, New Jersey 07871

Copyright ? 2019 TAG Cyber LLC. All rights reserved.

This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to request permission from the publisher, so long as the content is neither changed nor attributed to a different source.

Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience, expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and recommendations contained and described herein.

Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors, methods, instructions, recommendations, or ideas contained in any aspect of the 2018 TAG Cyber Security Annual volumes. The opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time without notice.

September 18, 2018

To the Reader:

This year's updated Volume 3 of our 2019 TAG Cyber Security Annual is the result of our growing team of expert researchers working each day ? since last year's report issuance ? to identify, update, and maintain an impossiblylong list of cyber security vendors. I'm proud of the amazing TAG Cyber team for their fine efforts, and I hope their intense work saves you valuable time, effort, and money in your own source selection research. That's been our goal for Volume 3 since Day One: To assist, and to support you ? the cyber security professional.

We hesitate to call this a fully-comprehensive work, simply because each day seems to bring several new cyber security vendors to the market. The moment this document is pushed to our roughly 54 free-download sites in midSeptember of 2018, a dozen great new cyber security companies will have been born. So, we do our best to include everything we can find. And we keep searching and pushing to include more and more cyber security companies to our list. We do this for you, every day of every week.

Another great challenge is the day-to-day flurry of mergers, acquisitions, and yes ? dissolutions of cyber security companies that must be tracked. It's a tricky process, because when two great companies combine, such as AlienVault and AT&T, the decision must be made whether to keep both as separate entries, or to combine them into one new one. In the end, it's a total judgment call. Generally, we try to keep them separate for as long as security professionals might continue to view them separately. But we don't always get this right.

People ask me every day if this list is automated and I feel like I'm apologizing when I say no. We do not crawl sites, and we do not launch botnets to find companies. We do it the old-fashioned way ? with fingers to keyboard, and with shoe leather to pavement. (We make sure manually, for example, that we are a super-set of the RSA Conference vendor sponsors.) What this means is that when we list a company, a human being on our staff has checked to make sure that a real company exists. We get this right ? most of the time.

As we announce every year, if you are a cyber security vendor and you are not listed here, then please drop me an email at eamoroso@tag-. I will do my best to set up a brief discussion, and might even blog about you as well. If you follow me on LinkedIn (Edward Amoroso) or Twitter (@hashtag_cyber), then you are already familiar with these types of articles and the cadence for their issuance. We also have created hours and hours (and more hours) of video interviews with cyber luminaries, which you can check out on our TAG Cyber YouTube Channel.

So, welcome to this 2019 TAG Cyber Security Annual ? Volume 3. The listings are free as always, so we hope you save barrels of money by not having to pay external researchers. Most of these fancy industry analyst companies will charge you a small fortune for this type of information (when they are not too busy throwing darts at some dumb quadrant). Use the money you save by not paying them, to buy pizza for your team ? for the next decade.

Dr. Edward G. Amoroso Chief Executive Officer, TAG Cyber LLC Fulton Street on Broadway

1.

ABR-PROM ? VAR

40.

AlphaGuardian ?

2.

Absio ? Messaging

Infrastructure

3.

Absolute Software ?

41.

Alpine Cyber Solutions ?

Endpoint

VAR

4.

Acalvio ? IDS

42.

Alta Associates ?

5.

Accenture ? Consulting

Recruiting

6.

Accellion ? Sharing

43.

Altep ? Forensics

7.

AccessData ? Forensics

44.

Alus Outsourcing ? VAR

8.

AccessIT Group ? VAR

45.

Alvea Services ? Services

9.

Accunet ? VAR

46.

Aman Info Security ?

10.

ACL ? GRC

Consulting

11.

ACROS Security ?

47.

Amazon Web Services ?

Penetration

Cloud

12.

ActiveRisk ? Consulting

48.

Amgine Securus ? Threat,

13.

Acumin ? Recruiting

Forensics

14.

Acunetix ? Scanning

49.

AnchorFree ? Browsing

15.

AdaptiveMobile ? Mobile

50.

Anodot ? Analytics,

16.

Ad Novum ? Products

Network Monitoring

17.

Advent IM ? Consulting

51.

Anomali - Threat

18.

Adventium Labs ? R&D

52.

Anonymizer ? Browsing

19.

Aegis Identity ? Identity

53.

Anonyome Labs ? Fraud,

20.

AEP ? Hardware

Leakage Prevention

21.

Agari ? Email

54.

Antiy Labs ? AV

22.

Aggeios ? Services

55.

ANX ? PCI

23.

AgileBits ? Passwords,

56.

Aon ? Insurance,

Encryption

Consulting

24.

AhnLab ? AV

57.

APCON ? Monitoring

25.

Ahope ? MS, PKI

58.

Appdome - Mobile

26.

Airbus Defence/Space ?

59.

Apperian ? Mobile

IA

60.

AppGuard - Endpoint

27.

Akamai ? DDOS

61.

Applicure ? WAF

28.

Alert Enterprise ? GRC

62.

Applied Control

29.

Alert Logic ? Cloud

Solutions ? Consulting,

30.

Alertsec ? Encryption

Training

31.

AlgoSec ? Firewall

63.

Applied Magnetics Lab ?

32.

Allegro Software ?

Destruct

ICS/IoT

64.

Applied Risk ? ICS/IoT

33.

Allgress ? GRC

65.

ApplyLogic ? IA

34.

AllThatSoft - MS

66.

AppRiver ? Email

35.

AlienVault ? Threat

67.

AppSec Labs ?

36.

AllClear ID ? Cyber

Applications

Insurance

68.

Appthority ? Mobile

37.

Alliant Tech ? VAR

69.

Aqua Security - Cloud

38.

Allot Communications ?

70.

ARAMA TECH ? GRC

Monitoring

71.

Arbor Networks ? DDOS

39.

Allstream ? MSS

72.

Arcon ? MSSP

73.

74. 75.

76. 77. 78. 79. 80. 81. 82. 83.

84. 85. 86. 87.

88.

89. 90. 91.

92. 93. 94. 95.

96. 97.

98. 99. 100. 101.

102.

103. 104. 105.

106.

Arctic Wolf Networks ? SIEM Area 1 Security ? Threat

Argus Cyber Security IoT Armjisoft ? DRM Armor ? Cloud Aruvio ? GRC Arxan ? Applications Ascentor ? Consulting Asgard Group ? Wireless Asgent - Network Ashton Search Group ? Recruit Aspect Security ? App Sec ASPG ? Mainframe Assevero ? IA Assure Technical ? Consulting

Assured Information Security - Training, Vulnerability Man. Assuria ? SIEM AssurIT ? Consulting

Astech Consulting ? Consulting Ataata - Training A10 Networks ? DMZ A3sec ? SIEM Atlantic Data Forensics ? Forensics Atomicorp ? Endpoint Atredis Partners ? Consulting A3Sec ? SIEM atsec ? Consulting AT&T ? MSS

Attachmate (now MicroFocus) ? Fraud Attack Research ? Consulting Attivo Networks ? Threat Auconet - Endpoint Audit Square ? Vulnerability Aujas Networks ? GRC

107.

108. 109.

110. 111.

112. 113.

114. 115. 116.

117. 118. 119. 120. 121. 122. 123. 124. 125. 126. 127. 128. 129.

130. 131. 132.

133. 134.

135. 136. 137. 138.

139. 140.

141.

Aura Information Security ? Consulting aurionPro ? IAM, GRC

Aurora Information Security ? Consulting Authentic8 ? WAF Authentify ? Authentication AuthLite ? Authentication AuthRocket ? Authentication Authy ? Authentication Auth0 ? Identity Autonomic Software ? Endpoint Avanan - Cloud Avast ? AV Avatier ? Identity Avecto ? Privilege AvePoint ? GRC Averon ? 2FA Averail ? Mobile AVeS ? Consulting AV Europe ? AV AVG ? AV Avira ? AV Avnet ? Consulting Awake Security ? ID&P, INTELLIGENCE Axiomatics ? Access AxonAI? SA Axxum Technologies ? IT Security Axway ? GRC Azorian Cyber Security ? Consulting BAE Systems ? IA Baffle - Encryption BalaBit ? Firewall Bambenek Consulting ? Consulting Bandura ? IDPS, NAC Banff Cyber ? Web Security Barclay Simpson ? Recruiting

142. 143.

144. 145. 146.

147. 148.

149. 150. 151.

152.

153. 154.

155. 156. 157. 158. 159. 160.

161.

162. 163.

164.

165. 166.

167. 168. 169. 170. 171. 172.

173.

Barkly ? Endpoint Barracuda Networks ? Firewalls Bastille ? Industrial Bay Dynamics ? GRC Bayshore Networks ? Industrial Beachhead ? Mobile Behaviosec ? Authentication Belkasoft ? Forensics Bell Canada ? MSS Benchmark Exec Search ? Recruiting

Berkeley Varitronics Systems ? Hardware, Mobile BETTER ? Mobile

BeyondSecurity ? Scanning BeyondTrust ? Privilege BHC Lab ? Consulting BicDroid ? Encryption BigID ? GRC, Cloud BigPanda - SIEM Big Switch Networks ? Cloud

Billington CyberSecurity ? Training BINAR10 ? Info Sec

BinarySEC (Now Ingen Security) ? Web Security BioCatch - Fraud Prevention BIOWATCH ? 2FA Biscom ? Secure File Sharing Bishop Fox ? Consulting Bitcrack ? Consulting BitDefender ? AV Bitglass ? Cloud Bitium ? Cloud

Bit9 + Carbon Black ? Endpoint BitSec ? Forensics

174.

175.

176.

177.

178. 179.

180. 181.

182.

183. 184. 185. 186.

187.

188. 189. 190. 191. 192. 193. 194. 195. 196. 197.

198. 199.

200.

201. 202. 203.

204. 205.

Bitshield Security ? Consulting

BitSight Technologies ? Rating B12 Technologies ? Authentication Bivio Networks ? Net Analytics Blackberry - Mobile Black Duck Software ? Application Blackfoot ? Consulting Blackmere Consulting ? Recruiting BlackRidge TechnologyCloud BlackStratus ? SIEM Bloombase ? Encryption BlueCat ? NAC BlueCedar ? Mobile Security BlueData Software ? Cloud Blue Lance ? GRC Blueliv ? Threat BlueRISC ? Hardware BlueTalon ? Data Security BlueVoyant - MSS Bluink ? 2FA BluVector ? Attack Boeing ? IA Boldon James ? Messaging Bomgar ? VPN/Secure Access Boole Server ? Data Booz Allen Hamilton ? IA, Consulting BotDoc ? Secure File Sharing Bouju ? Brand Boxcryptor ? Cloud Bracket Computing ? Cloud Bradford Networks ? NAC Brainloop ? Sharing

206.

207.

208. 209. 210.

211.

212.

213. 214. 215.

216. 217. 218. 219. 220. 221. 222. 223.

224.

225.

226. 227.

228. 229.

230. 231.

232.

233. 234. 235. 236.

237.

Braintrace ? MSS, Vulnerability Brandon Becker ? Recruiting BrandProtect ? Brand Bricata ? Attack Bridgen Group ? Recruiting

Bridgeway Security Solutions ? VAR BrightPoint Security ? SIEM Brinqa ? GRC Bromium ? Endpoint BSI Cybersecurity ? Email, Training BT ? MSS Buddha Labs ? Cloud BUFFERZONE ? Endpoint Buguroo - Fraud Bugcrowd ? Bounty BugSec ? Bounty BullGuard ? AV Burns and McDonnell ? Consulting

BWise (Peter de Verdier ? VP) - GRC CA Technologies ? IT Security CACI ? IA

Caliber Security Partners ? Consulting Callsign ? 2FA. IAM Calyptix Security ? Net Security Capgemini ? Consulting

Capita Identity Solutions - Identity Capstone Security ? App Sec Capsule8 - IDP Carahsoft ? Consulting Carbon Black - Endpoint Carve Systems ? Consulting Catbird ? Cloud

238. 239. 240. 241.

242. 243. 244. 245. 246. 247.

248. 249. 250. 251.

252. 253. 254.

255. 256.

257. 258. 259.

260. 261.

262. 263.

264. 265. 266. 267. 268. 269. 270.

271. 272. 273.

Cato Networks - Network Caveon ? Forensics Cavirin ? Cloud CBI ? Cloud, App Security, Training, Awareness CDW - VAR Celestix ? VPN Cellcrypt ? Voice Cellebrite ? Forensics Cellrox ? Mobile

Center for Internet Security ? Compliance CenterTools ? Endpoint CENTRI ? Encryption Centrify ? Identity Centripetal Networks ? Threat CenturyLink ? MSS Certes ? Application

Certified Security Solutions ? CA/PKI CertiPath ? CA/PKI Certivox ? Encryption, Authentication CGI Federal ? IA Checkmarx ? Software Check Point Software ? Firewall, IDS/IPS CheckRecipient - Email Chertoff Group ? Consulting China Telecom ? MSS Chronicle ? Threat Intelligence Cigital ? Software CimCor ? File CIPHER - MSS CipherCloud ? Cloud CipherGraph ? VPN cirosec ? Consulting Cisco Systems ? Net Security The CISO Group ? PCI Citadel Defense ? ICS/IoT Citrix ? Cloud

274.

275. 276. 277. 278.

279. 280. 281. 282. 283. 284. 285. 286. 287. 288. 289. 290. 291. 292. 293. 294.

295.

296.

297.

298. 299. 300. 301. 302.

303. 304. 305.

306. 307. 308.

309.

CIX Software ? App Security Clavister ? Net Security Cleafly - Endpoint Clearswift ? Email Clearwater Compliance GRC Cloak Labs - Encrpytion Clone ? MSS Cloudera - Cloud CloudFlare ? CDN CloudLink - Cloud CloudLock ? Cloud Cloudmark ? Email CloudMask - Cloud CloudPassage ? Cloud Cloudpath ? Mobile Coalfire ? GRC Cobalt ? Bug Bounty Coblue ? Training CodeDx ? Application Code42 ? Endpoint Code Green Networks ? DLP Codenomicon ? Penetration Cofense ? Email Security, Intelligence Collective Software ? Authentication Comda ? Authentication Comilion ? Sharing Comodo ? CA/PKI CompliancePoint ? GRC Comsec Consulting ? Consulting Confer ? Threat Conquest Security ? VAR ContentGuard ? Encryption ContentKeeper ? Gateway Content Raven ? File Content Security ? Consulting ContextIS ? Consulting

310.

311.

312. 313.

314.

315. 316. 317.

318. 319.

320. 321. 322.

323. 324. 325. 326. 327. 328. 329. 330. 331.

332. 333.

334. 335. 336.

337.

338. 339. 340. 341.

342. 343.

Context Relevant (now Versive, Inc.) ? Analytics

Contextual Security Solutions ? Consulting Continuum GRC - GRC Contrast Security ? App Sec

ControlPanelGRC, (or Symmetry) ? GRC ControlScan ? MSS Convercent ? GRC Corax Cyber Security ? Consulting Corero ? DDOS, IDS/IPS Corelight ? Network Monitoring Core Security ? Cloud CORISECIO ? Encryption CoroNet ? IAM, AntiMalware Correlog ? SIEM Corsa ? Network Security CoSoSys ? Endpoint CounterCraft - Monitoring CounterTack ? Endpoint Covata ? Sharing Covertix ? File Covisint ? Identity cPacket Networks Monitoring CriticalStart ? Services

Cross Match Technologies - Biometrics CrowdStrike ? Threat Crypteia Networks ? MSS Cryptography Research ? Encryption Cryptomathic ? Encryption, CA/PKI CryptoMove - Encryption CryptoNet ? Consulting CryptoSense ? Analytics CryptoTEC AG ? Encryption, CA/PKI Cryptosoft ? Encryption Cryptzone ? Access

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download