tag-cyber-security-annual-cyber-security-handbook-and-reference-guide-vol-3

Telechargé par Saidi Seddik
Lead Author – Ed Amoroso
Researchers – Matt Amoroso, Felix Andersen, Liam Baglivo, Ana Bolsoni, Shawn Hopkins, Miles McDonald, Ankit Parekh,
Pratik Patel, Stan Quintana, Tim Steinberg
Media Matt Amoroso, Laura Fanelli, Miles McDonald
Detailed Copy Editing – Shawn Hopkins
Finance – M&T Bank
Design – Alicia Amoroso, Miles McDonald, Rich Powell
Administration – navitend
Facilities – WeWork, NYC
TAG Cyber LLC
P.O. Box 260, Sparta, New Jersey 07871
Copyright © 2019 TAG Cyber LLC. All rights reserved.
This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to
request permission from the publisher, so long as the content is neither changed nor attributed to a different source.
Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security
industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience,
expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and
recommendations contained and described herein.
Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or
organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors,
methods, instructions, recommendations, or ideas contained in any aspect of the 2018 TAG Cyber Security Annual volumes. The
opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject
to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time
without notice.
!
September 18, 2018
To the Reader:
This year’s updated Volume 3 of our 2019 TAG Cyber Security Annual is the result of our growing team of expert
researchers working each day – since last year’s report issuance – to identify, update, and maintain an impossibly-
long list of cyber security vendors. I’m proud of the amazing TAG Cyber team for their fine efforts, and I hope their
intense work saves you valuable time, effort, and money in your own source selection research. That’s been our goal
for Volume 3 since Day One: To assist, and to support you the cyber security professional.
We hesitate to call this a fully-comprehensive work, simply because each day seems to bring several new cyber
security vendors to the market. The moment this document is pushed to our roughly 54 free-download sites in mid-
September of 2018, a dozen great new cyber security companies will have been born. So, we do our best to include
everything we can find. And we keep searching and pushing to include more and more cyber security companies to
our list. We do this for you, every day of every week.
Another great challenge is the day-to-day flurry of mergers, acquisitions, and yes – dissolutions of cyber security
companies that must be tracked. It’s a tricky process, because when two great companies combine, such as
AlienVault and AT&T, the decision must be made whether to keep both as separate entries, or to combine them into
one new one. In the end, it’s a total judgment call. Generally, we try to keep them separate for as long as security
professionals might continue to view them separately. But we don’t always get this right.
People ask me every day if this list is automated and I feel like I’m apologizing when I say no. We do not crawl
sites, and we do not launch botnets to find companies. We do it the old-fashioned way – with fingers to keyboard,
and with shoe leather to pavement. (We make sure manually, for example, that we are a super-set of the RSA
Conference vendor sponsors.) What this means is that when we list a company, a human being on our staff has
checked to make sure that a real company exists. We get this right – most of the time.
As we announce every year, if you are a cyber security vendor and you are not listed here, then please drop me an
email at eamoroso@tag-cyber.com. I will do my best to set up a brief discussion, and might even blog about you as
well. If you follow me on LinkedIn (Edward Amoroso) or Twitter (@hashtag_cyber), then you are already familiar
with these types of articles and the cadence for their issuance. We also have created hours and hours (and more
hours) of video interviews with cyber luminaries, which you can check out on our TAG Cyber YouTube Channel.
So, welcome to this 2019 TAG Cyber Security Annual – Volume 3. The listings are free as always, so we hope you
save barrels of money by not having to pay external researchers. Most of these fancy industry analyst companies
will charge you a small fortune for this type of information (when they are not too busy throwing darts at some
dumb quadrant). Use the money you save by not paying them, to buy pizza for your teamfor the next decade.
Dr. Edward G. Amoroso
Chief Executive Officer, TAG Cyber LLC
Fulton Street on Broadway
!!
!
1. ABR-PROM*"!#$%!*
2. Absio*"!&'(()*+,*!*
3. Absolute*Software*"!
-,./0+,1!!
4. Acalvio*"!234!
5. Accenture*"!50,(671+,***
6. Accellion*!48)9+,**
7. AccessData*–*:09',(+;(**
8. AccessIT*Group*"!#$%!*
9. Accunet*"!#$%*
10. ACL*"!<%5!*
11. ACROS*Security*"!
=','19)1+0,**
12. ActiveRisk*–*50,(671+,*!*
13. Acumin*"!%';96+1+,*!*
14. Acunetix*!4;),,+,***
15. AdaptiveMobile*"!&0>+7'**
16. Ad*Novum*"!=90.6;1(*
17. Advent*IM*"!50,(671+,**
18. Adventium*Labs*"!%?3*
19. Aegis*Identity*"!2.',1+1@***
20. AEP*"!A)9.B)9'!***
21. Agari*–!-C)+7!*
22. Aggeios*"!4'9D+;'(*
23. AgileBits*"!=)((B09.(E!
-,;9@/1+0,*
24. AhnLab*"!$#*
25. Ahope*"!&4E!=F2*
26. Airbus*Defence/Space*"!
2$*
27. Akamai*"!33G4**
28. Alert*Enterprise*"!<%5*
29. Alert*Logic*"!5706.!*
30. Alertsec*"!-,;9@/1+0,!*
31. AlgoSec*"!:+9'B)77!*
32. Allegro*Software*"*
254H20I*
33. Allgress*"!<%5!**
34. AllThatSoft!J!&4!
35. AlienVault*"!I89')1!*
36. AllClear*ID*"!5@>'9!
2,(69),;'*
37. Alliant*Tech*"!#$%**
38. Allot*Communications!"!
&0,+109+,*!**
39. Allstream*"!&44!*
40. AlphaGuardian*"!
2,K9)(196;169'!*
41. Alpine*Cyber*Solutions*–!
#$%!*
42. Alta*Associates*"!
%';96+1+,*!*
43. Altep*"!:09',(+;(!**
44. Alus*Outsourcing*"!#$%!*
45. Alvea*Services*"!4'9D+;'(!*
46. Aman*Info*Security*"!
50,(671+,*!*
47. Amazon*Web*Services*"!
5706.!*
48. Amgine*Securus*"*I89')1E!
:09',(+;(*
49. AnchorFree*"!L90B(+,**
50. Anodot*"!$,)7@1+;(E!
M'1B09N!&0,+109+,**
51. Anomali*J*I89')1*
52. Anonymizer*"!L90B(+,*!**
53. Anonyome*Labs*"!:9)6.E!
O')N)*'!=9'D',1+0,*
54. Antiy*Labs*"!$#*
55. ANX*"!=52!**
56. Aon*"!2,(69),;'E!
50,(671+,**
57. APCON!"!&0,+109+,*!!*
58. Appdome*J!&0>+7'*
59. Apperian*"!&0>+7'*
60. AppGuard*J!-,./0+,1!*
61. Applicure*"!P$:!*
62. Applied*Control*
Solutions*"!50,(671+,*E!
I9)+,+,**
63. Applied*Magnetics*Lab*"!
3'(196;1!*
64. Applied*Risk*"!254H20I*
65. ApplyLogic*"!2$!*
66. AppRiver*"!-C)+7!*
67. AppSec*Labs*"!
$//7+;)1+0,(!*
68. Appthority*"!&0>+7'!*
69. Aqua*Security*J!5706.*
70. ARAMA*TECH*"!<%5!**
71. Arbor*Networks!"!33G4!*
72. Arcon*"!&44=!*
!
73. Arctic*Wolf*Networks*"!
42-&!***
74. Area*1*Security*"!I89')1!*
75. Argus*Cyber*Security*-*
20I*
76. *Armjisoft*"!3%&!*
77. Armor*"!5706.*
78. Aruvio*"!<%5!*
79. Arxan*"!$//7+;)1+0,(!*
80. Ascentor*"!50,(671+,*!*
81. Asgard*Group*"!P+9'7'((!*
82. Asgent*J!M'1B09N!!*
83. Ashton*Search*Group*"!
%';96+1!*
84. Aspect*Security*"!$//!4';!*
85. ASPG*"!&)+,K9)C'!*
86. Assevero*"!2$!*
87. Assure*Technical*"!
50,(671+,*!*
88. Assured*Information*
Security*J!I9)+,+,*E!
#67,'9)>+7+1@!&),Q*
89. Assuria*"!42-&**
90. AssurIT*–*50,(671+,*!*
91. Astech*Consulting*–*
50,(671+,*!*
92. Ataata*J!I9)+,+,**
93. A10*Networks*"!3&R!*
94. A3sec*"!42-&!*
95. Atlantic*Data*Forensics*"!
:09',(+;(!*
96. Atomicorp*"!-,./0+,1!*
97. Atredis*Partners*"!
50,(671+,***
98. A3Sec*"!42-&!**
99. atsec*"!50,(671+,*!*
100. AT&T*"!&44!!!*
101. Attachmate*(now*
MicroFocus)*"!:9)6.!**
102. Attack*Research*"!
50,(671+,*!**
103. Attivo*Networks*"!I89')1!*
104. Auconet*J!-,./0+,1!
105. Audit*Square*"!
#67,'9)>+7+1@!*
106. Aujas*Networks*"!<%5!*
107. Aura*Information*
Security*–!50,(671+,*!*
108. aurionPro*"!2$&E!<%5*
109. Aurora*Information*
Security*"!50,(671+,*!*
110. Authentic8*"!P$:!*
111. Authentify*"!
$618',1+;)1+0,*
112. AuthLite!"!$618',1+;)1+0,!***
113. AuthRocket*"!
$618',1+;)1+0,!*
114. Authy*"!$618',1+;)1+0,!*
115. Auth0*"!2.',1+1@!*
116. Autonomic*Software*"!
-,./0+,1*
117. Avanan*J!5706.*
118. Avast*"!$#!*
119. Avatier*!2.',1+1@!*
120. Avecto*"!=9+D+7'*'*
121. AvePoint*"!<%5!!*
122. Averon*"!S:$*
123. Averail*"!&0>+7'!*
124. AVeS*"!50,(671+,*!*
125. AV*Europe*"!$#!*
126. AVG*"!$#!*
127. Avira*"!$#!*
128. Avnet*"!50,(671+,*!*
129. Awake*Security*"!23?=E!
2MI-OO2<-M5-*
130. Axiomatics*"!$;;'((!*
131. AxonAI"!4$*
132. Axxum*Technologies*"!2I!
4';69+1@!*
133. Axway*"!<%5!*
134. Azorian*Cyber*Security*"!
50,(671+,*!*
135. BAE*Systems*"!2$!*
136. Baffle*J!-,;9@/1+0,*
137. BalaBit!"!:+9'B)77!*
138. Bambenek*Consulting*"!
50,(671+,*!*
139. Bandura*–*23=4E!M$5*
140. Banff*Cyber!"!P'>!
4';69+1@!*
141. Barclay*Simpson*"!
%';96+1+,**
1 / 810 100%
La catégorie de ce document est-elle correcte?
Merci pour votre participation!

Faire une suggestion

Avez-vous trouvé des erreurs dans linterface ou les textes ? Ou savez-vous comment améliorer linterface utilisateur de StudyLib ? Nhésitez pas à envoyer vos suggestions. Cest très important pour nous !