|
ARCHIVED CONTENT
You are viewing ARCHIVED CONTENT released online between 1 April 2010 and 24 August 2018 or content that has been selectively archived and is no longer active. Content in this archive is NOT UPDATED, and links may not function.
Based on a compilation of research from analyst firms and industry expert reports in the security arena, the following “Top 150 Provider” list provides a short listing that may be useful in the consideration of security solutions.
This listing is taken directly from security provider mentions in selected key formal industry reports and surveys published in 2014. Where appropriate, the list has been adjusted for industry mergers and acquisitions, with the primary company listed as the recognized security provider.
Reports considered in the compilation include:
- 2013 “Red List” Security Innovation Survey, Justin Somaini, February 2014.
- Information Security – Wave 16, 451 Research, January 2014
- Selected Company Reviews – @ComplexD, Ongoing.
This listing certainly is not all inclusive of either research firms and/or capable vendors – but does provide an aggregate overview of notable vendors that several industry researchers and experts consider leading technology providers in the field of security.
Updated: 1/2/2015
The “Aggregated List”of Security Providers
Alphabetically Ordered
- 3VR – @3VR
- Adallom – @Adallom
- AccessData – @AccessDataGroup
- Agari – @AgariInc
- Amazon Web Services – @AWSCloud
- AppRiver – @AppRiver
- Appthority – @Appthority
- Armjishoft
- Averail – @AverailCorp
- Awareness Technologies – @InterGard
- Barracuda Networks @Barracuda
- BehavioSec – @BehavioSec
- Bit9 – @Bit9
- Bitglass – @Bitglass
- Bluebox – @BlueboxSec
- Blue Coat – @BlueCoat
- BluePoint Security – @BluePointSec
- Bracket Computing – @brkt
- Bromium – @Bromium
- Bugcrowd – @Bugcrowd
- Carbon Black – @GetCarbonBlack
- Check Point – @Checkpointsw
- CipherCloud – @CipherCloud
- CIPHER Security – @CipherSec
- Cirroscope – @Cirroscope
- Cisco – @CiscoSecurity
- Click Security – @ClickSecurity
- CloudMark – @CloudMark
- CloudPassage – @CloudPassage
- Comodo – @ComodoDesktop
- Contrast Security – @ContrastSecurity
- Core Security – @CoreSecurity
- CounterTack – @CounterTack
- Coverity – @Coverity
- CrowdStrike – @CrowdStrike
- CyberSponse – @CyberSponse
- Cylance – @Cylanceinc
- Cyphercor – @LoginTC
- Cyphort – @Cyphort
- Cyvera – @Cyvera_LTD
- CXOWare – @CXOWare
- Damballa – @DamballaInc
- Defense.net
- Dell – @DellSecureWorks
- docTrackr – @docTrackr
- Duo Security – @DuoSec
- Elastica – @ElasticaInc
- EnterasoftSecurity.com @OfficialEIS
- Embrane – @Embrane
- EMC – @EMCCorp
- Endgame – @EndgameInc
- ESET – @ESET
- Exabeam – @Exabeam
- F-Secure – @FSecure
- Filetrek – @Filetrek
- FireEye – @FireEye
- Forescout – @Forescout
- FortScale – @FortScale
- Gazzang – @Gazzang
- GFI – @GFISoftware
- General Dynamics
- Gluu – @GluuFederation
- Guidance Software – @EnCase
- HP – @HPNews
- Hytrust – @Hytrust
- IBM – @IBM
- Illumio – @Illumio
- Imprivata – @Imprivata
- Invincia – @Invincia
- Ionic – @IonicSecurity
- Iovation – @Iovation
- Juniper – @JuniperNetworks
- Kool Span – @KoolSpan1
- Lacoon – @LacoonSecurity
- Lancope – @Lancope
- LastLine – @LastLineInc
- LastPass – @LastPass
- LightCyber @LightCyber
- Lookout – @Lookout
- Malwarebytes – @Malwarebytes
- Mandiant – @Mandiant
- ManTech – ManTech
- Marble Security – @Marble_Security
- McAfee – @McAfeeBusiness
- MetaFlows – @MetaFlows
- Microsoft – @Microsoft
- Mojave Networks – @MojaveNet
- Moka5 – @MokaFive
- nCryptedCloud – @nCryptedCloud
- NetCitadel – @NetCitadel
- NetSkope – @NetSkope
- Nok Nok Labs – @NokNokLabs
- NorthNine – @North9Support
- ObserveIT – @ObserveIT
- Okta – @Okta
- OpenDNS – @OpenDNS
- Oracle – @Oracle
- PacketSled – @PacketSled
- Palamida – @Palamida_Inc
- Palo Alto Networks – @PalaAltoNtwks
- Panda Security – @Panda_Security
- Perspecsys – @Perpecsys
- Ping Identity – @PingIdentity
- PrivateCore – @PrivateCore
- ProofPoint – @ProofPoint_Inc
- Pwnieexpress – @Pwnieeexpress
- Rapid7 – @Rapid7
- Red Sky Alliance – @RedSkyAlliance
- Qualys – @Qualsys
- Risk I/O – @RiskIO
- RSA – @RSASecurity
- Safemonk – @SafeMonktopia
- Safenet – @SafeNetInc
- Seculert – @Seculert
- Secure Mentem – @SecureMentem
- Security Innovation – @SecInnovation
- Sentinel
- Shape Security – @ShapeSecurity
- SkyFence – @SkyfenceNet
- Skyhigh Networks – @SkyhighNetworks
- Solve Media – @SolveMedia
- Sophos – @Sophos_News
- SourceCleard – @SourceClear
- StillSecure – @StillSecure
- Stormpath – @GoStormpath
- Symantec – @Symantec
- Synack – @Synackinc
- SyferLock – @SyferLock
- Symplified – @Symplified
- Tanium – @Tanium
- Teneble – @TenableSecurity
- ThreatConnect – @ThreatConnect
- ThreatGrid – @ThreatGrid
- TraceVector
- Treadstone 71 – @Treadstone71LLC
- Trend Micro – @TrendMicro
- Trustlook – @TrustLook
- Trustwave – @Trustwave
- Unisys Stealth – @UnisysCorp
- Usable Security Systems
- V-Key – @VKey_Inc
- Varmour
- Vaultive – @Vaultive
- Venafi – @Venify
- Veracode – @Veracode
- viaForensics – @ViaForensics
- VMware – @VMware
- Voltage Security – @VoltageSecurity
- WatchGuard – @WatchGuardTech
- Webroot – @Webroot
- Websense – @Websense
- Xceedium – @Xceedium
- zScaler – @zScaler
Click here to recommend additional providers.
Source: Public Domain Research