Design – TAG Cyber LLC Finance – M&T Bank Administration – navitend Research – TAG Cyber LLC Lead Author – Dr. Edward G. Amoroso Researchers – Liam Baglivo, Matt Amoroso, Miles McDonald Facilities – WeWork, NYC TAG Cyber LLC P.O. Box 260, Sparta, New Jersey 07871 Copyright © 2018 TAG Cyber LLC. All rights reserved. This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to request permission from the publisher, so long as the content is neither changed nor attributed to a different source. Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience, expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and recommendations contained and described herein. Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors, methods, instructions, recommendations, or ideas contained in any aspect of the 2018 TAG Cyber Security Annual volumes. The opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time without notice.
September 2018 To the Reader: This 2018 TAG Cyber Security Annual – Volume 3, Cyber Security Handbook and Reference Guide is offered as an update to last year’s guide. It is designed to support window-shopping of our industry under the hood of a single PDF document. Yes, it has too many omissions, and random inaccuracies, and occasional typos – but tens of thousands of readers report it as an indispensable resource. My favorite analogy likens this volume to a Barron’s Guide for the Cyber Security Industry. Liam Baglivo, Matt Amoroso, and Miles McDonald spent many hundreds and hundreds of hours going through every listing and updating contents based on mergers, acquisitions, changes in control, new offerings, and on and on. As this document goes to print, I suspect they are about as relieved to see it finished as any three researchers might allow themselves to be. And yet, they know that it is nowhere near finished by any means. We fully intend to keep it updated more frequently than last year. To that end, we are adding more graduate research assistants to improve the completeness and accuracy of this document. Our goal is to offer a more dynamically updated PDF download that includes more listings. I’m embarrassed to admit this, but we have over two hundred companies that are still being evaluated for inclusion. I’ll bet half of them will be added in the next few weeks and months. My apologies if your company is not here. That was not our intent. The selection criteria, by the way, is quite simple: If we deem a given company as providing a viable product or service that is mostly focused on dealing with cyber security or compliance, then we tried to include their information here. Judgment calls were necessary for companies that are clearly not in the cyber security industry, but that might include something useful to our community. It was subjective, and probably wrong on many occasions. If you would like your company to be considered for inclusion in our report, go ahead and drop us a note in the contact tab on our website at https://www.tag-cyber.com/. We will add you to the list and try to get in touch as quickly as we can. Dr. Edward G. Amoroso Chief Executive Officer, TAG Cyber LLC Fulton Street Station on Broadway
Above Security
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, PCI DSS/Compliance, Security Training, Pen Testing Brief Overview Above Security delivers customized managed and IT security services including NIDS, HIDS, and log analysis for protecting enterprise customer infrastructure. Headquarters Above Security – World Headquarters 955 Michele-Bohec Boulevard, Suite 244 Blainville, Quebec Canada J7C 5J6 Tel: (450) 430 – 8166 Executives Ray Georges Chehata, President and CEO of Above Security, has extensive business consulting experience, including a decade as a senior manager at Bank of Montreal. Tim McCreight, former CISO for the government of Alberta joins as the director of consulting. History Founded in 1999, the company is headquartered in Quebec, Canada with offices in Chevy Chase, Maryland; Sierre, Switzerland; and Dubai, United Arab Emirates (UAE). It has grown to support networks of 250 private and governmentowned organizations in nearly 40 countries. Above Security received $2.5M of Series A venture funding in 2004. Above Security is a Hitachi Group Company. Key Acquisitions Seccuris (2015) – Managed Security Key Competitors Bell Canada, eSentire Products and Services Above Security offers managed security and consulting services that can be grouped as follows: • Managed Security Services – Includes traditional MSS, IDS (NIDS and HIDS) and IPS services, log management, and event correlation. The services are based on Arkangel, the company’s proprietary managed security surveillance solution for IDS and IPS. Services are supported by security operations centers in Switzerland and Canada. • Compliance – Includes focus on PCI DSS and ISO 27001. • Technical Audit – Involves intrusion tests, architecture reviews, and forensic investigations. • Governance – Includes focus on security policies, business continuity planning, and disaster recovery planning. • Training – Includes secure development workshops, ISO 2700 training, and security awareness programs. Website https://www.abovesecurity.com/
ABR-PROM (Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions, Security Consulting Brief Overview ABR-PROM provides value added reseller (VAR) security solutions and IT outsourcing to customers in Poland. Headquarters ABR-PROM Sp. z.o.o. Smolna 1D, Sopot Poland Tel: (058) 301 70 55 [emailprotected] Executives Romuald Pestka serves as Owner of ABR-PROM. He served previously as owner of EKO-INFO and PROM. History Founded in 2000 by Romuald Pestka, the company is headquartered in Poland. Key Competitors Optiv Products and Services ABR-PROM provides value added reseller (VAR) and IT outsourcing consulting solutions to customers in Poland since 2000. The company has a relationship with SecPoint, which offers a range of vulnerability scanner, unified threat management (UTM) firewall, WiFi password management, and related information security solutions and products. Website https://www.abr.com.pl/
Absio
Absolute Software
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Email Security Brief Overview Absio provides a data security solution that allows organizations and private users to securely store and share email messages and data externally, while maintaining control of its use. Headquarters Absio Corporation 8740 Lucent Boulevard Suite 101 Highlands Ranch, Colorado 80129 Tel: 720) 836 – 1222 Executives Rob Kilgore serves as President and Chief Executive Officer of Absio. He was previously CEO of WealthTouch. History Dan Kruger founded Absio in 2009. The small, privately held company is headquartered in Colorado. Absio received $4.75M in venture financing in December 2014. Key Competitors Voltage, Symantec, McAfee Products and Services Absio allows organizations and users to maintain control of how their data is used, as it is stored and shared externally. Absio’s data security solution includes two components: Absio Message and Absio Engine. Users establish service identities on the Absio network and can request other users to add them to their trusted contact list. The Absio Engine automatically manages the cryptography required to ensure privacy in any subsequent communication. Absio Message is designed to look like a regular email client and can be deployed for either personal or organization use. Absio Dispatch is a plug-in secure email application for Microsoft Outlook. Absio Message is now called Dispatch Website https://www.absio.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Data Leakage Prevention Brief Overview Absolute Software provides persistent endpoint security and management solutions for computers, portable devices, and data. Headquarters Absolute Software 1055 Dunsmuir Street PO Box 49211 Vancouver, British Columbia V7X 1K8 Canada Executives Geoff Haydon, CEO and Director of Absolute Software since 2014, was previously COO of EMC Asia Pacific and Japan. History Absolute Software was founded in 1993 focused on tracking, management, and securing of mobile computers. The company became publicly traded on the Toronto Stock Exchange in 2000. Absolute Software is headquartered in Canada with offices in Austin, Texas; Reading, UK; and Kuala Lumpur. Key Acquisitions LiveTime (2012) – IT Help Desk Palisade Systems (2013) – DLP Key Competitors Symantec, McAfee Products and Services Absolute Software provides a range of endpoint security and management products that can be grouped as follows: • Absolute Persistence – Involves patented technology built into tens of millions of devices at the firmware or BIOS level to detect and notify users of significant changes. • Endpoint Security – Absolute Compliance provides the ability to persistently track and secure endpoints within a single, cloud-based console. • Endpoint Management – Absolute Management allows for persistent asset management, mobile device management (MDM), and securing of endpoints from a console. • Service Management – Absolute Service is an IT Service Management (ITSM) solution. • Theft Management – Computrace Mobile Theft Management safeguards iPad and iPad mini devices from loss and theft. • Absolute LoJack – Software-based theft recovery service for consumers and home users. Website https://www.absolute.com/
Acalvio
Accenture
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention Brief Overview Acalvio uses virtualization to create a deceptive network for hiding and protecting key assets. Headquarters Acalvio 2520 Mission College Boulevard, Suite 110 Santa Clara, California 95054 Tel: (408) 913 – 6160 Executives Ram Varadarajan serves as Co-Founder and CEO of Acalvio. History Founded by Ram Varadarajan and Raj Gopalakrishna and headquartered in Santa Clara, the company has presence in India. Acalvio acquired the assets of Shadow Networks. Key Competitors FireEye, Intel, Attivo Products and Services Acalvio, in conjunction with Shadow Networks, provides a virtualized environment based on software defined networks that uses deception to perform the following: • Detect Advanced Persistent Threats • Deceive and Disrupt Attacks • Leverage Virtualization The technology is based on five years of US Governmentfunded research and development, and used at the Department of Defense. Their new product, Shadowplex, is a comprehensive distributed deception platform built on patented technology seeking to scale, automation, and authenticity with ease. Website https://www.acalvio.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Information Assurance, Managed Security Services, Research and Development Brief Overview Accenture provides global professional services, consulting, and outsourced services, including cyber security. Headquarters Accenture 1345 Avenue of the Americas New York, New York 10105 Accenture Global Headquarters Dublin, Ireland Executives Pierre Nanterme has served as Chairman and CEO of Accenture since 2011. History Accenture traces its roots to Anderson Consulting. The public company, which reported roughly $30B in revenue in 2014, claims to be the largest independent technology services provider, serving clients in more than 120 countries across 40 industries. Key Acquisitions FusionX (2015) – Cyber Risk Management Cloud Sherpas (2015) – Cloud Risk Control (2010) – Consulting Key Competitors Deloitte, EY Products and Services Accenture offers global consulting, professional services, and outsourced services across multiple industry groups. The business is categorized into the following groups: • Communications, Media, and Technology • Financial Services • Health and Public Sector The business is split roughly evenly into consulting and outsourcing. Cyber security risk management services are offered via the FusionX acquisition in 2015. Accenture Labs is located in Northern Virginia, and provides expert cyber security support to the Accenture team of roughly 2,000 cyber security consultants located worldwide. Website https://www.accenture.com/
Accellion
AccessData
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing Brief Overview Accellion supports secure cloud-based mobile file sharing and collaboration for teams and enterprise organizations. Headquarters Accellion Corporate Headquarters 1804 Embarcadero Road Suite 200 Palo Alto, California 94303 Tel: (650) 485 – 4300 Executives Jonathan Yaron serves as CEO, former founder, chairman, and CEO of Enigma, a service lifecycle management company, for 21 years. History Nikhil Jhingan and S Mohan co-founded Accellion in 1999. The company remains privately held and maintains a technology and engineering center in Singapore. Baring Private Equity Partners Asia and Riverwood Capital provided Series C funding. The company has received $13.41 in total funding through mid-2016. Key Competitors HPE Voltage, MobileIron Products and Services Accellion provides a solution for teams and enterprise groups to securely share files, including mobile across cloud infrastructure. CISO teams can direct use of the Accellion solution as an alternative to FTP. Accellion’s flagship next generation mobile file sharing and collaboration platform offering is called kiteworks and is available as follows: • kiteworks for Enterprise – Includes support for mobile file sharing, mobile collaboration, mobile productivity, mobile pricing, on-line collaboration, secure file transfer, file sync, FTP replacement, content connectors, and enterprise IT and security support. • kiteworks for Teams – Includes support for teams in industries such as advertising, architecture, engineering, construction, consumer products, education, energy, media and entertainment, financial services, government, healthcare, legal, pharmaceutical, and technology. Website https://www.accellion.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics, Incident Response Brief Overview AccessData provides a suite data forensics products and services for cyber security and related purposes including eDiscovery. Headquarters AccessData 588 West 400 South Suite 350 Lindon, Utah 84042 Tel: (801) 377 – 5410 Executives Victor Limongelli serves as CEO of AccessData, former CEO of Guided Software. Mike Stevens serves as COO of AccessData. History AccessData was founded in 1987. The company has offices in Washington, New York, Houston, San Francisco, UK, and Australia. Broadridge Financial acquired AccessData in 2009. Sorenson Capital provided funding in 2013. The company reported $25M in debt financing in 2013. Key Competitors Enclave Forensics, Magnet Forensics Products and Services AccessData supports eDiscovery and digital forensics for law enforcement, government, and enterprise customers. AccessData’s eDiscovery and security forensics products and services can be grouped as follows: • Digital Forensics – Includes the Forensic Toolkit (FTK), Mobile Forensics Examiner Plus (MPE+), AccessData Lab, SilentRunner Mobile, and related products. • Litigation Support – Includes AD eDiscovery and related capabilities. • Cyber Security – Includes CIRT, SilentRunner Sentinel, and related enterprise security capabilities. • InSight Platform – Involves a continuous, automated incident response platform. Supporting services are offered in the areas of digital forensics, litigation support, and incident response. The company also offers training toward the AccessData Certified Examiner (ACE) program certification. Website https://www.accessdata.com/
AccessIT Group
Accunet
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview AccessIT provides IT security and infrastructure solutions for customers through VAR partnerships with major technology providers. Headquarters AccessIT Group – Corporate Office 2000 Valley Forge Circle Suite 106 King of Prussia, Pennsylvania 19406 Tel: (610) 783 – 5200 Executives Joe Luciano, CEO of AccessIT Group, is a graduate of FairleighDickinson University. David Hark serves as President and CFO of AccessIT Group. History AccessIT Group was founded in 2001 by a group of IT security professionals. The company is headquartered in Pennsylvania with locations across New York, New Jersey, and Maryland. Key Competitors Alpine Security, Conquest Security Products and Services AccessIT Group provides value added resale (VAR) of IT security solutions in the following areas: • Vulnerability assessments • Application security • Wireless services • Threat mapping assessments • Penetration testing • Incident response • Demon dialing • Social engineering • Training services • Compliance audits AccessIT Group offers its InspectIT solution, which involves vulnerability assessment of a range of IP addresses. Technology partners include F5, McAfee , Check Point, and Blue Coat. Website https://www.accessitgroup.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Accunet provides a range of value added security solutions to complement its storage, network, risk, virtualization, and mobility offerings Headquarters Accunet 20 Park Plaza Boston, Massachusetts 02116 Executives Alan Dumas serves as Founder and President of Accunet. He was previously VP of Sales for Vertex. History Founded in 1997, the private company is headquartered in New England with offices in New York, Washington, Atlanta, Miami, and Los Angeles. Key Competitors Optiv Products and Services Accunet provides a suite of value added security solutions that can be grouped as follows: • Network and Endpoint Security • Identity and Access Management • Web and Messaging Security • Security and Vulnerability Management • Governance, Risk, and Compliance Technology partners include Blue Coat, Cisco, F5, McAfee , Juniper, Palo Alto Networks, RSA, SafeNet, Tanium, Agiliance, Attivo, Avecto, FireEye, Fortinet, Symantec, ZixCorp, and many others. Website https://www.accunetsolutions.com/
ACL
ACROS Security
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview ACL provides products and services focused on governance, risk, and compliance (GRC), enterprise compliance monitoring, and data analysis. Headquarters ACL Head Office ACL Services, Ltd. Suite 1500, 980 Howe Street Vancouver, BC Canada V6Z 0C8 Tel: (604) 669 – 4225 Executives Laurie Schultz, CEO and President of ACL, held previous executive positions with Intuit, Sage North America, KPMG, and Telus. History ACL was founded in 1987 and is headquartered in Vancouver, Canada. The firm announced Laurie Schultz as its CEO in 2012, and has begun shifting toward virtual, cloud based services with its 2011 acquisition of Workpapers.com. Key Acquisitions Workpapers.com (2011) Key Competitors RSA Archer, MetricStream Products and Services ACL provides products and services to security organizations with GRC and related audit requirements in support of their mission. ACL offers three product solutions for enterprise customers: • GRC – This product includes a framework for managing GRC data via a reports manager, risk management component, and other features for visualization and assessment of GRC data. • Enterprise Continuous Monitoring – ACL’s Enterprise Continuous Monitoring (ECM) solution is powered by ACL Analytics Exchange technology to provide immediate insights into data via extraction, visualization, and reporting. • Data Analysis – This product is designed for risk and control groups to help find risk breakdown, exceptions, and control weaknesses. Website https://www.acl.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Security Consulting Brief Overview ACROS Security is a Slovenian provider of penetration testing and related information security, application assessment, and research services. Headquarters ACROS, d.o.o. Makedonska ulica 113 SI-2000 Maribor Slovenia Tel: +386 2 3000 280 [emailprotected] Executives Mitja Kolsek serves as CEO and CTO of ACROS Security. History ACROS Security is a family owned, self-funded company located in Slovenia. The company’s Website includes a convenient local time translation from Slovenia to other parts of the globe. Key Competitors Sentor Products and Services ACROS Security provides security services in the following areas: • ACROS Application Security Analysis • ACROS Penetration Test • Security Consulting ACROS provides its professional services to financial institutions, software vendors, online service providers, virtualization solution providers, and other segments. Website https://www.acros.si/
Active Risk
Acumin
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview Active Risk, part of Sword, provides a range of GRC and enterprise risk management solutions for the enterprise. Headquarters Active Risk EMEA Headquarters 1 Grenfell Road Maidenhead Berks SL6 1HN United Kingdom USA Headquarters 13221 Woodland Park Road, Suite 440 Herndon, Virginia 20171 Executives Tony Allen is CEO of the Sword Group. Nick Scully serves as Chief Operating Officer for Sword Active Risk. He previously held roles with CA, SAP, and Lawson Software. History Active Risk Manager was originally launched in 2001. The Sword Group acquired Active Risk in 2013. The company has offices in USA, UK, and Australia with partnerships in the Middle East. Key Competitors EY (Integrc) Products and Services Active Risk provides GRC and ERM solutions via its Active Risk Manager (ARM) software package. ARM includes the following: • ARM Core • ARM Risk Express • ARM Risk Performance Manager • ARM Apps • ARM Risk Connectivity • ARM Unplugged • ARM Integrations The platform includes automated alerts, dashboard reporting, direct and indirect loss management functions, advanced risk scoring, and risk prioritization support. Website https://www.sword-activerisk.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Acumin provides executive search and technical recruiting services for cyber security positions. Headquarters Acumin Consulting Ltd. Octavia House 50 Banner Street London, EC1Y 8ST Tel: +44 (0)20 7987 3838 US Headquarters in New Jersey: (646) 513 – 4166 Executives Simon Hember serves as Founder and Managing Director of Acumin. Martin Jerrold serves as non-executive Managing Director of Acumin. History Founded by Simon Hember and Chris Batten in 1998, Acumin is part of the Red Snapper Group. Acumin is headquartered in the UK, but has presence in New Jersey. The firm provides search and also consulting services with emphasis on cyber security. Key Competitors Alta Associates, CyberSN Products and Services Acumin provides traditional search and recruiting services for individuals and companies, with focus on cyber security and a special emphasis on the UK and mainland Europe. The company supports candidates with interests in new positions as well as clients with hiring needs. Security focus spans across many sectors including information security, penetration testing, governance and compliance, technical security, pubic sector security, business continuity, sales engineering, sales and marketing, and executive management. Website https://www.acumin.com/
Acunetix
AdaptiveMobile
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management, Web Security Brief Overview Acunetix provides a Web security scanner that focuses on detection of well-known and advanced exploitable vulnerabilities in Web applications. Headquarters Acunetix (UK) 101 Finsbury Pavement Moorgate London EC2A 1RS UK Executives Chris Martin serves as CEO, former general manager at Acunetix. History Founded in 2004 by Nick Galea, Acunetix released its first vulnerability-scanning tool in 2005. The privately held company has offices in the UK and Malta. Key Competitors Qualys, Sucuri Products and Services Acunetix offers a heuristic, non-signature-based, Web Vulnerability Scanner (WVS) for identifying exploitable vulnerabilities in Web applications. WVS is based on the AcuSensor Technology from Acunetix that detects well-known and advanced exploitable vulnerabilities associated with SQL injection, cross-site scripting, directory traversal, and other security problems. The tool includes a plug-in for WordPress, which is a common target for designers of DDOS botnets. Website https://acunetix.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview AdaptiveMobile provides carrier-grade mobile security threat detection, security intelligence, and security suite tools. Headquarters AdaptiveMobile Corporate Headquarters Ferry House, 48-52 Lower Mount Street Dublin 2 Ireland Tel: +353 (1) 524 9000 Executives Brian Collins, CEO of AdaptiveMobile since 2009, held previous positions with Telenor International, Pacific Bell, Etisalat, and Google. History AdaptiveMobile was founded by Brendan Dillon and Gareth MacLachan in 2003 and is headquartered in Dublin with regional support in the US, Canada, Latin America, UK, Middle East, Africa, Asia, India, and Europe. Funding has been provides via $5.7M of Series A support from Enterprise Ireland and Intel Capital, as well as $14M of Series B support from Doughty Hanson Technology Ventures, Intel Capital, and Noor Financial Investment. Key Competitors Lookout, Pulse Secure Products and Services AdaptiveMobile offers a suite of mobile security solutions for both in-network and cloud use by enterprise customers and individuals in the following areas: • Advanced Threat Detection • Dark Data Forensics • Actionable Intelligence • Messaging Security • Web Protection • Traffic Retention • Regulatory Compliance • WiFi Controls • Mobile Security Management • Parental Controls • Embedded Controls AdaptiveMobile launched its Enterprise Mobile Security Management suite in 2014 focused on providing operators with the ability to offer mobile security services to their customers. The company claims that its products are use to protect over one billion consumer and enterprise customers worldwide. Website https://www.adaptivemobile.com/
Ad Novum
Advent IM
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Web Application Firewall Brief Overview Ad Novum provides security engineering and development services, as well as offering security products such as the Nevis reverse proxy and WAF. Headquarters Ad Novum Informatik AG Roentgenstrasse 22 8005 Zurich Tel: +41 44 272 61 11 Executives Chris Tanner serves as CEO of Ad Novum, beginning in 1995 – with a brief period of exception from 2004 to 2008. History Founded in 1988 and headquartered in Zurich, the company has grown to 450 employees in 4 countries. Key Competitors Imperva, Barracuda Products and Services Ad Novum provides security services in the areas of security engineering, identity and access management, security infrastructure and architecture, secure enterprise content management, and single sign-on (SSO). Security products include the following: • Nevis Security Suite – Includes authentication, reverse proxy and WAF, identity management, and reporting service • EBPP Validator Proxy – Checks content from billing companies for potentially dangerous content • Security Stack for SAP – Protects the communication chain in end-to-end security for SAP. The company has a deep commitment to writing the finest software, so while not specifically focused on cyber security, the tools developed at AdNovum are high quality in terms of software design and code. Website https://www.adnovum.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Security Training Brief Overview Advent IM provides knowledge-based holistic information and physical security consulting and training services for enterprise customers in the UK. Headquarters Advent IM Headquarters 5 Coombs Wood Court Steel Park Road Halesowen West Midlands United Kingdom B62 8BF Tel: +44 0121 559 6699 Executives Mike Gillespie, managing director at Advent IM, serves as a member of the Centre for Strategic Cyberspace + Security Science (CSCSS) Select Intelligence Committee on Cyber Intelligence. History Advent IM is a private limited company headquartered in the UK and founded in 2002. Key Competitors Kindus Solutions, Hedgehog Security Products and Services Advent IM offers a range of consulting services in the following areas: • Information Security • CLAS (CESG Listed Advisor Scheme) Consultancy • Data Protection • PCI Consultancy • MySecurity Manager • Business Continuity • Physical Security • G-Cloud Procurement • Advent School Security Cyber Essentials Consulting The company offers several public and private courses on security, including one located at the company’s local training facilities in the Midlands in the UK. Website https://www.advent-im.com.uk/
Adventium Labs
Aegis Identity
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security R&D Brief Overview Adventium solves hard problems in cyber security research and development (R&D) with emphasis on automated reasoning. Headquarters Adventium Labs 111 Third Avenue South Suite 100 Minneapolis, Minnesota 55401 Tel: (612) 843 – 4445 Executives Kyle Nelson, Co-Owner and Chief Executive Officer of Adventium Labs, previously spent fourteen years at Honeywell’s corporate research laboratories. History Brian Isle founded Adventium Labs in 2002. The privately held company is headquartered in Minneapolis. Key Competitors SRI International, TaaSera Products and Services Adventium Labs solves the hardest research and development problems in cyber security, system engineering, and automated reasoning. Adventium Labs is involved in a range of research and development projects focused on resource optimization, interactive neuroscience education, intelligent routing based on experience, satellite fault tolerant hypervisors, and other high tech projects. Adventium Labs products and services include the following: • CARINAE – Scalable Cyber Defense Analysis • DRED – Detection and Response Embedded Device • EVALFASTER – Efficient Vulnerability Assessments • FUSED – Formal United System Engineering Development Language • MiCART – Mixed Criticality, Real-Time Virtualization Support • VCD-IA – Virtual Cyber Defense Introspection Appliance • XEBHRA – Virtualized Multi-Domain Information Sharing Website https://www.adventiumlabs.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Aegis Identity, now merged with Code Rebel, provides identity and access management solutions focused on the needs of the education marketplace. Headquarters Aegis Identity 750 West Hampden Avenue, #500 Englewood, Colorado 80110-2167 Tel: (303) 222 – 1060 Executives Bob Lamvik, Co-founder and CEO of Aegis Identity, is a former Sun Microsystems executive. History Founded in 2011, the company was created to focus on the needs of education and is headquartered in Colorado. Aegis Identity Software merged with Code Rebel in March 2016. Key Competitors Fischer Products and Services The company provides two main identity management products, TridentHE and TridentK12, which focus on the needs of the education marketplace. The products are openstandards compliant, with the ability to support role-based access management, automated workflow, delegated administration and approvals, password management, and reconciliation. The company also supports open source projects such as Shibboleth. Website https://www.aegisidentity.com/
AEP (Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Hardware/Embedded Security, Voice Security Brief Overview Ultra Electronics AEP provides a range of security products and hardware security modules (HSMs) for data and voice protection using encryption and other means. Headquarters AEP (Head Office) Knaves Beech Business Centre Loudwater High Wycombe Buckinghamshire, HP10 9UT United Kingdom Tel: +44 (0) 1628 642 600 Ultra Electronics HQ: 419 Bridport Road Greenford Middlesex UB6 8UA England Tel: +44 (0)208 813 4545 Executives Rakesh Sharma serves as CEO of Ultra Electronics. History Ultra Electronics is a mature firm founded in 1920, operating worldwide, and servicing defense, energy, financial, and other industries. The company is listed on the London Stock Exchange. AEP is a specialist business unit within Ultra Electronics. Key Competitors SafeNet (Gemalto), Yubico Products and Services Ultra Electronic AEP offers a range of products including high assurance HSMs that are focused on allowing end users to connect securely to their corporate applications. Ultra Electronic AEP products can be grouped as follows: • Ultra Communications – Secure Communications – Includes a range of multi-purpose platforms for controlling latency, end-to-end management, and other functions for voice and data networks. • Ultra Encrypt – Network Security – Includes a range of encryption solutions for VPN, OTA re-keying, and other network functions. • Ultra Safe – Hardware Security Modules (HSM) – Involves high assurance HSMs for key generation, key signing, key storage, and other cryptographic functions. • Ultra Payments – Payment Solutions – Includes international payment processing solutions for financial applications. Website https://www.ultra-aep.com/
Agari
(Alpha Version 1.0 – 09/01/16 – Vendor Approval) TAG Cyber Controls Email Security, Brand Protection, Infrastructure Security Brief Overview Agari enables businesses, including banks and social media networks, to secure their enterprise and customers from advanced email phishing attacks. Headquarters Agari 100 S. Ellsworth Avenue, Fourth Floor San Mateo, California 94401 Tel: (650) 627-7667 Executives Ravi Khatod assumed the role of CEO of Agari in 2016, after serving as COO of Bromium. Pat Peterson, Founder & Executive Chairman of Agari, has an extensive background in email technology, services and security. Markus Jakobsson, Chief Scientist of Agari, is a security researcher with a background in phishing, crimeware and mobile security, at organizations including PayPal, Xerox PARC and RSA Security. History Pat Peterson, Cisco Fellow, founded Agari in 2009 to secure the email channel with email security technologies he helped develop at Cisco as part of the IronPort team. Agari has financial backing from Alloy Ventures, Battery Ventures, First Round Capital, Greylock Partners, Norwest Venture Partners and Scale Venture Partners. Norwest Venture Partners led a $22M Series D round with Agari in 2016. Agari is headquartered in San Mateo, California, and has an office in the UK. Key Competitors ReturnPath Products and Services The Agari Email Trust Platform, deployed extensively by companies and government agencies, is designed to stop phishing by identifying the true sender of emails. The Agari proprietary analytics engine and email telemetry network provide visibility into more than 10 billion email messages per day across 3 billion mailboxes. The Agari platform powers Agari Enterprise Protect, which help organizations protect themselves from advanced spear phishing attacks, and Agari Customer Protect, which protects consumers from email attacks that spoof enterprise brands. Agari is deployed by large companies (i.e., Fortune 1000), as well as the world’s leading social media networks, to protect their enterprise, partners and customers from advanced email phishing attacks. Website https://www.agari.com/
Aggeios
AgileBits
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Aggeios provides managed IT infrastructure and related VAR security services to enterprise customers in the Middle East. Headquarters Aggeios PO Box 5697, Safat 13057 2nd Floor, AlHouti Tower Opp.Ahli United Bank, Kuwait City, Kuwait Tel: +965 22457083 Executives Bader Al-Hammadi is Managing Partner of Aggeios. Manoj Chandran, Managing Director and Technical Director of Aggeios, has worked with various financial institutions in India. History Aggeios was established in 2009 and is headquartered in Kuwait City, Kuwait. Key Competitors Optiv Products and Services In addition to managed network services and managed data center capabilities, Aggeios provides the following security services for customers in the Middle East: • Audit Preparation • Security Audit • CIO Services • Security Consulting • Awareness Training The company also offers a range of complementary products in the areas of virtualization, IT security/SIEM, storage, network monitoring, WAN optimization, and email support. Website https://www.aggeios.com/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Password/Privilege Management, Data Encryption Brief Overview AgileBits provides a range of security applications for password protection and file encryption. Headquarters AgileBits 208 Adelaide Street West Toronto, Ontario M5H1W7, Canada Executives Jeff Shiner, CEO of AgileBits, was formerly partner and technology business unit lead at Rosetta, as well as a developer for IBM Canada. History Roustem Karimov and Dave Teare co-founded AgileBits in 2005. The company is headquartered in Toronto and remains privately held. Key Competitors Authentify, AnchorID Products and Services AgileBits creates premier security applications such as 1Password for many different platforms, with special emphasis on applications for mobile devices. AgileBits provides two applications: • 1Password – Supports storage and sync of passwords on multiple devices using Dropbox and strong cryptography. The tool also creates strong, unique passwords for all of a user’s accounts. • Vault – Supports creation of encrypted vaults on various different operating system platforms to protect files. Website https://www.agilebits.com/
AhnLab
Ahope
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools Brief Overview AhnLab provides anti-virus and related security products for small, medium, and large enterprise customers, as well as consumers. Headquarters AhnLab Inc. 220, Pangyoyeok-ro, Bundang-gu, Seongnam-si, Gyeonggi-do, Korea Tel: +82 31 722 8000 Executives Hongsun Kim, CEO, holds a Ph. D. in Computer Engineering from Purdue University and held positions at Samsung Electronics. History Founded in 1995, AhnLab is the oldest computer security firm in South Korea. Since its inception, the company has grown, now operating globally with enterprise and consumer customers around the world. The firm has major operations in Japan, China, and the Netherlands. It trades on the KOSDAQ exchange. Key Competitors Kaspersky, ESET Products and Services As South Korea’s largest cyber security company, the firm played a key role in its country’s national defense against major cyber attacks against the financial and broadcasting industry. In addition, with the high level of Internet connectedness for Korean citizens, AhnLab has developed a great deal of experience and expertise dealing with cyber attacks. The AhnLab Malware Defense System (MDS) is designed to reduce the risk of a targeted Advanced Persistent Threat (APT). AhnLab MDS is an enterprise product combining cloud analytics with prevention for both advanced persistent threats (APTs) and distributed denial of service (DDOS) attacks. It does this via real-time detection of malware and filtering of network traffic. Specifically, the AhnLab Smart Defense (ASD) and Dynamic Content Analysis (DCA) components monitor files for attacks that employ nonexecutable files. Operationally, the malware analysis follows a progression from signature-based analysis to other behavioral technologies, including support from cloud intelligence and the ability to perform many of the security functions directly in the cloud. Website https://www.ahnlab.com/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Mobile Security, PKI Solutions, Security Consulting Brief Overview Ahope provides mobile security and network related products as well as consulting. Headquarters 1st Floor, Hotel Prince Annex, 11-8, 22gil Toegye-ro, Jung-gu, Seoul, South Korea Tel. +82.2.556.4801 Executives Yeonwoo Kim serves as the CEO of Ahope. Yeonwoo graduated from the Pohang University of Science and Technology in 2002. History Founded in 1996 Ahope struggled to gain traction until 2012. From 2012 to 2015 Ahope focussed on continuing development of their APP Shield and AUSMS products as well as expanding their business globally, opening an office in Tokyo in 2015. In 2016 Ahope participated in the RSA conference and has since received notable contracts for mobile security and consulting. Products and Services App Shields: Ahope uses code obfuscation, encryption, and other various techniques in the attempy to prevent reverse engineering on mobile apps. The product claims to react in real time and detect and prevent an app from running in vulnerable environments. Smart Wifi: This product enables the use of Wifi and #G/LTE at the same time to provide better service quality. AUSMS: (Ahope unified security management system) provides information on the security status and data flows of clients connected to a server. Website https://www.ahope.com/
Airbus Defence/Space
Akamai
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Information Assurance Brief Overview Airbus Defence and Space includes a communication, intelligence, and security division, which provides cyber security/information assurance-related services. Headquarters Airbus Group 4, rue du Groupe d’Or BP 90112 Blagnac Cedex, 31703 France Executives Tom Enders serves as CEO of the Airbus Group. Dirk Hoke serves as Head of Airbus Defence and Space, Communications, Intelligence, and Security. Francois Lavaste serves as Head of CyberSecurity for Airbus Defence and Space History Airbus has evolved since 1974 with the development of the A300 wide body jet into a large multinational corporation employing 63,000 people. The Cassidian Group, formerly part of the EADS Group, was focused in areas related to cyber security, and was consolidated in 2014, along with the other Defense and Spaces businesses in EADS, into the Airbus Defence and Space Group. The EADS Group was also renamed the Airbus Group. Key Competitors Boeing, Lockheed Martin Products and Services Airbus serves the aerospace industry, including providing aircraft manufacturing, as well as providing Defense and space support which includes cyber security. The Airbus Defence and Space Communication, Intelligence, and Security group focuses specifically with its Airbus Defence and Space CyberSecurity Group in the following areas: • Secure Mobile Radio • Satellite • Border Security • C4ISR • Defence Systems • Cyber Security • Geo Information Airbus also operates a separate subsidiary company called Stormshield that provides unified threat management products and services in Europe. Website https://airbusdefenceandspace.com
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls DDOS Security, Infrastructure Security, Web Application Firewall Brief Overview Akamai provides content distribution networking (CDN), DDOS, and related security solutions for Internet-based web and application hosting sites. Headquarters Akamai Technologies, Inc. 150 Broadway Cambridge MA 02142 Executives Tom Leighton, Founder and CEO of Akamai, is generally regarded as the father of content distribution networking. History Jonathan Selig, Randall Kaplan, Tom Leighton, and Daniel Lewin founded Akamai in 1998. The company enjoyed considerable market success through the Internet dot-com era. More recently, the company has re-emerged as a major player in cloud computing and content distribution, with particular emphasis on reducing cyber security risk from Internet-based attacks as part of its acquisition of Prolexic. Key Acquisitions Bloxx (2015) – Web Filtering Prolexic (2013) – DDOS security Soha Systems (2016) -- VPN Key Competitors AT&T, Verizon, Verisign, Trustwave Products and Services Akamai utilizes content distribution networking and related technologies as the basis for web application acceleration and optimization, cloud security intelligence, and protection against DDOS attacks. Akamai’s cloud security solutions are built on the Akamai intelligent platform and are arranged as follows: • DDOS – This is the cloud-computing platform focused on DDOS attacks. It has been integrated with the Prolexic carrier-agnostic network-based DDOS filtering platform obtained in 2013. • Cloud Security Intelligence – Uses the Kona client reputation function and delivered via Kona Rule Set. • Web Application Firewall – This function provides enhanced application-level security in the cloud. • Enhanced DNS – The eDNS solution protects primary DNS servers from typical attacks such as cache poisoning. • Site Shield – This protects public-facing Websites from DDOS attacks, which is important because Akamai’s CDN relies on the public Internet for content updates. Akamai focuses on integrating its cloud security solutions with Web performance, media delivery, cloud networking, and network operator services onto one Akamai Intelligent Platform. Website https://www.akamai.com/
Alert Enterprise
Alert Logic
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Governance, Risk, and Compliance, Managed Security Services Brief Overview Alert Enterprise provides infrastructure protection through governance, risk, and compliance (GRC) management, situational awareness, and continuous monitoring. Headquarters Alert Enterprise Corporate Headquarters 4350 Starboard Drive Fremont, California 94538 Tel: (510) 440 – 0840 Executives Jasvir Gil, Founder and CEO of Alert Enterprise, was previously Founder and CEO of Virsa Systems until its acquisition by SAP. He served as an executive at SAP until 2007. History Alert Enterprise was founded in 2007 by the same team that founded Virsa Systems. This includes Jasvir Gil, Kaval Kaur, and Srini Kakkera. The company, which has received investment from Sufi, Opus Capital, and Kleiner Perkins Caulfield & Byers, has offices in France, India, and Singapore. Key Competitors RSA (Archer) Products and Services Alert Enterprise provides IAM, GRC, and compliance solutions that span IT, operations, and physical access controls. Alert Enterprise offers two main product suites: • Enterprise Guardian – This GRC suite links SAP and other IT applications with physical access control systems and SCADA operational systems. • Enterprise Sentry – This suite integrates IT security with other infrastructure controls including physical access control, badging systems, log management, IDPS, and scanning. Specific modules within the product suites include AlertAccess (user access lifecycle management), AlertIdentity (identity store and lifecycle management), AlertRoles (enterprise role lifecycle management), AlertSSO, AlertAudit, and AlertPlatform. Website https://www.alertenterprise.com/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Web Application Firewall, Security Information Event Management, Governance, Risk, and Compliance, Managed Security Services Brief Overview Alert Logic provides a hosted “security as a service” platform that offers intrusion prevention, log management, and related protections for enterprise customers. Headquarters Alert Logic Inc. 1776 Yorktown, 7th Floor Houston, Texas 77056 Tel: (877) 484 – 8383 Executives Gray Hall, Chairman and CEO of Alert Logic, joined the company in 2009 and is a twenty-year veteran of the IT industry, having held previous positions with VeriCenter and IBM. History Misha Govshteyn co-founded Alert Logic in 2002. The private firm has since grown considerably since and has received several rounds of funding from Draper Fisher Jurvetson, Access Venture Partners, Covera Ventures, Mercury Fund, OCA Ventures, and Welsh, Carson, Anderson, & Stowe. Alert Logic has an office in Cardiff, UK. Key Acquisitions Critical Watch (2015) – Governance, Risk, and Compliance Click Security (2015) – Security Analytics Key Competitors Imperva Products and Services Alert Logic offers managed security services using virtualized, security-in-the-cloud infrastructure for enterprise customers. The company also offers a compliance monitoring and reporting service for businesses. As such, Alert Logic provides a range of virtualized, “security-in-the-cloud” enterprise security products grouped as follows: • Managed Cloud Security • Vulnerability Management • Network Threat Detection • Web Application Security • Log Correlation and Analysis Solutions are offered through Amazon Web Services, other cloud infrastructure, on-premise, and across hybrid infrastructure. Website https://www.alertlogic.com/
Alertsec
AlgoSec
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview Alertsec offers full disk encryption as a cloud service to ensure that only authorized users can access your computers. Headquarters Alertsec Inc. 5 Loudon Street, SW Suite 8 Leesburg, Virginia 20175 Tel: (888) 473 – 7022 Executives Ebba Blitz serves as CEO of Alertsec. She has served on the Board of the company since its inception. History Alertsec was founded as a spin-off of Pointsec in 2005, before Pointsec was acquired by Checkpoint two years later. The private company has offices in the US, UK, and Sweden. Key Competitors Check Point Products and Services Alertsec offers full disk encryption with pre-boot authorization controls using Checkpoint’s Endpoint Security software. The “laptop encryption as a service” solution includes media encryption, port control, compliance checking, anti-malware, program control, and firewall capabilities. The solution is offered as a monthly subscription with full capability in the cloud, using Web-based management and administration tools. Website https://www.alertsec.com/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform Brief Overview AlgoSec provides a suite of enterprise firewall management tools for policy, configuration, and analysis of rules, configuration, and design. Headquarters AlgoSec Inc. 65 Challenger Rd, Suite 320 Ridgefield Park, NJ 07660 USA Tel: +1 (888) 358 - 3696 Executives Yuval Baron, Founder and CEO of AlgoSec, was previously founder of Actelis, a company focused on optimizing network performance on copper links. History Yuval Baron and Avishal Wood co-founded AlgoSec in 2004, with focus on providing streamlined firewall operations and management. The company included former researchers from Bell Laboratories. The company remains private, and has since grown to serve over 1000 customers in 50 different countries. Key Competitors Tufin Products and Services AlgoSec streamlines and automates firewall management tasks including policy rule submission, analysis, design, and management. AlgoSec provides several complementary tools to assist in the integration and proper operation of enterprise applications with the firewall. AlgoSec uses its patented Deep Policy Inspection (DPI) technology to provide a security management suite for firewalls based on the following components: • AlgoSec Security Management Solution – Involves combination of AlgoSec components into an integrated platform. • AlgoSec BusinessFlow – This component allows firewall administrators and application owners to monitor application connectivity status, graphically represent and manage application flows, and troubleshoot issues with applications traversing firewalls. • AlgoSec FireFlow – This component automates security policy lifecycle management and workflow to include design, risk assessment, firewall rule implementation, and audit. • AlgoSec Firewall Analyzer – This component allows administrators to streamline and automate firewall policy and configuration information. AlgoSec provides its suite as an appliance that can be easily integrated into an enterprise environment. Website https://www.algosec.com/
Allgress
AllThatSoft
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance, Vulnerability Management Brief Overview Allgress provides a suite of products and solutions focused on governance, risk, and compliance (GRC) and vulnerability management. Headquarters Allgress, Inc. 111 Lindbergh Avenue Suite F Livermore, California 94551 Tel: (925) 579 – 0002 Executives Gordon Shevlin, Founder and CEO of Allgress, was previously co-founder of SiegeWorks, which was eventually acquired by FishNet Security. History Gordon Shevlin and Jeff Bennett co-founded Allgress in 2008. In 2012, it reported roughly 30 employees with about $6M in funding, primarily from its founders. Key Competitors RSA (Archer), ACL, Alert Enterprise Products and Services Allgress brings business intelligence to risk, security, and compliance management. Allgress’ GRC product suite, which can be run from premises or in the cloud, uses visual “heat maps” to present compliance and vulnerability information based on corporate “revenue centers.” The Allgress product suite can be grouped as follows: • Risk Analysis – The Allgress Business Risk Intelligence Module provides a comprehensive view of security and risk profile using heat maps and compliance reports based on collected business intelligence and metrics. • Security and Compliance Assessment – The Allgress Security and Compliance Assessment Module supports assessments with rich charting and visual depiction of compliance issues and gaps. • Vulnerability Management – The Allgress Vulnerability Management Module provides visual depictions of key vulnerability metrics for mission critical systems. • Incident Management – The Allgress Incident Management Module provides a centralized document collection site with information gathering templates toward a unified repository for incident response. • Policy and Procedures – The Allgress Policy and Procedures Module provide framework templates to implement a comprehensive security program. The Allgress solution is available for use on Amazon Web Services. It is also integrated with Lumeta’s network discovery platform. Website https://www.allgress.com/
(Alpha Version 0.1 – 07/29/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview AllThatSoft provides mobile application security primarily through their product, AppServo. Headquarters 649 Mission Street, Suite #201 San Francisco, CA 94105 United States Executives Seoung Rag Choi serves as the CEO of AllThatSoft. History In 2015 AllThatSoft patented the code obfuscation technology that would later become AppServo. Appservo was launched in February 2017. Products and Services AppServo is the technology that drives most of what AllThatSoft provides. The solution utilizes self randomization, code splitting, and self modifying to make it a sufficient solution for code obfuscation and application security. The product is constantly being adjusted to fit a changing market, especially in regards to the internet of things. Website https://www.allthatsoft.com/
AlienVault
Allegro Software
(Alpha Version 0.1 – 06/08/17– Vendor Approval) TAG Cyber Controls Security Information Event Management, Threat Intelligence, Security Analytics Brief Overview AlienVault offers a unified security management platform that leverages an open and collaborative threat-sharing model for continuous, updated threat intelligence and analytics. Over 4,000 customers use the USM platform worldwide for threat detection, incident response and compliance management. Headquarters AlienVault 1875 S. Grant Street Suite 200 San Mateo, California 94402 Tel: (855) 425-4367 Executives Barmak Meftah serves as President and CEO of AlienVault. Roger Thornton serves as CTO of the company. History Julio Casal and Dominique Karg co-founded AlienVault in 2007. Trident Capital, Kleiner Perkins Caulfield & Byers, Institutional Venture Partners, GGV Capital, Intel Capital, Jackson Square Ventures, Adara Venture Partners, Top Tier Capital, and Correlation Ventures back the privately held company. Headquartered in San Mateo, Calif., the company has offices in Cork, Ireland; Austin, TX and Madrid, Spain. Key Competitors HPE, IBM, internally developed tools Products and Services AlienVault has three enterprise cyber security product offerings: • AlienVault’s Unified Security Management (USM) platform includes five essential security capabilities, built-in and orchestrated through a single management interface. USM is updated continuously with the AlienVault Labs Threat Intelligence subscription. • OSSIM, AlienVault’s Open Source Security Information and Event Management (SIM) project. • Open Threat Exchange (OTX), introduced in 2012, is the world’s first truly open and collaborative threat intelligence community. AlienVault continuously updates both the USM product and the OSSIM project with threat data collected from the Open Threat Exchange, with more than 47,000 participants in 140 countries, who contribute over 4 million artifacts each day to the OTX community. In addition, AlienVault continuously and automatically updates the commercial USM product with AlienVault Labs Threat Intelligence for targeted detection and actionable guidance to respond to the latest threats. Website https://www.alienvault.com/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls ICS/IoT Security, Hardware/Embedded Security Brief Overview Allegro Software provides software resources to developers for embedded devices, including solutions for embedded device security. Headquarters Allegro Software Development Corporation 1740 Massachusetts Avenue Boxborough, Massachusetts 01719 Tel: (978) 264 – 6600 Executives Bob Van Andel, President and CEO of Allegro Software Development Corporation, has extensive experience in diverse applications ranging from embedded systems and communications protocols to racetrack results monitoring and UFO location tracking. History Allegro Software Development Corporation was founded in 1996 to focus on management of network devices using Internet technologies. RomPager was its first product, which enabled device management using Web browser interfaces. The company has since grown, including being selected to provide UPnP/DLNA support for Microsoft in its Media Center Extender SDK, which led to its use in XBOX-360. The company has offices in Massachusetts, Japan, and Korea. Key Competitors Intel Products and Services Allegro Software Development Corporation brings Internet and Web technologies to software developers for the provision of software resources, including management and security, for embedded devices. The security-related products offered by Allegro Software Development Corporation for embedded devices include the following: • RomPager Secure Toolkit – An embedded SSL/TLS server • RomWebClient Secure Toolkit – An embedded SSL/TLS client • RomDTLS Toolkit – An embedded DTLS client and server • Embedded FIPS Cryptography – Supports adding FIPScompliant crypto • Embedded Cryptographic Libraries – Adds additional sophisticated crypto • Hardware Crypto Harness – Offloads intense crypto calculations • RomCert Toolkit – Automated certificate management for embedded systems • Rom SShell Toolkit – Embedded SSH client and server • RomRadius Toolkit – Embedded Radius client • RomPlug DTCP and WMDRM Toolkits – Embedded link protection Website https://www.allegrosoft.com/
Alliant Technologies Now TenFour (Alpha Version 1.0 – 08/24/17– Vendor Approval)
TAG Cyber Controls IT Infrastructure Utility, Network Security Solutions
Brief Overview TenFour delivers global private domain IT infrastructure-as-a-service for enterprise customers using an IT Infrastructure Utility model, including cyber security solution offerings.
Headquarters TenFour 360 Mt. Kemble Avenue Morristown, New Jersey 07960 Tel: (973) 267-5236
Executives Bruce Flitcroft, Founder and CEO of Tenfour is a leader in engineering IT infrastructure solutions that are transforming business and technology models so the organizations can innovate in the Digital Age. Flitcroft is also Founder and CEO of Red Forge, the sister company of TenFour. He previously ran AlphaNet.
History Headquartered in Morristown, NJ, Tenfour was founded in 1998 as an IT integrator, under the name Alliant Technologies. In 2012, based on years of experience as well as significant R&D investment, the company began building an IT infrastructure utility company designed with greater agility, reliability and network security. TenFour, as it was rebranded in 2017, is accelerating change in all industries, starting with commercial and then expanding to government and regulated markets. TenFour solutions are engineered by Red Forge, which develops software, systems and tools that next generation service providers need to deliver services to enterprises that will power their digital business.
Key Competitors Verizon, CenturyLink, IBM, CSC Products and Services TenFour delivers a range of private domain WAN, LAN, data center, unified communications and collaboration, and network security solutions in an IT Infrastructure-as-a-service utility model. It has taken all the core IT infrastructure that was previously “uncloudable”—from routers, switches and firewalls to phones, WiFi, cameras and IoT devices—and deliver them as a utility service. Just as other utilities deliver per-unit pricing, TenFour’s IT infrastructure is delivered in IT Units (ITUs) with embedded services including all the design, implementation, monitoring, repair and administration of each unit. This also includes foundational security features that are always present, including Syslog for network infrastructure management, configuration change management, IPsec VPN, 802.11X for wired and wireless LAN, AAA, compliance reporting, among other features. TenFour additional security features are integrated into the company’s reference architectures, including access control policies, mobile device containment, network admission control, on-premises firewalls, intrusion prevention, server local firewalls, network embedded firewalls, IPAM, DNS services, DHCP, Netflow security analysis, web security, malware protection, and data loss prevention in the cloud, among other capabilities. TenFour’s IT Infrastructure Utility service allows for delivery of security services through devices at Layer Four and below through a managed interface for use at the Application Layer. Through this IT Infrastructure Utility managed interface, lower level security services such as DDOS protection can interact with higher-level applications such as a SIEM. TenFour works with leading technology vendors including Cisco and is a program member with AT&T Partner Exchange.
Website http://tenfour.com/
Allot Communications (Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview Allot Communications provides network monitoring, IP service optimization, network monetization, and security solutions. Headquarters Allot Communications 22 Hanagar Street, Industrial Zone B Hod-Hasharon, 45240 Israel Executives Erez Antebi serves as CEO, former CEO of Gilat Satellite networks. History Founded in 1996 and headquartered in Israel, the company has presence around the world with regional headquarters I the US and France. The public company trades on the NASDAQ. Key Acquisitions Oversi Networks (2012) Ortiva Wireless (2012) Esphion (2008) NetReality (2002) Key Competitors APCON, Blue Coat, Akamai Products and Services Allot Communications provides network monitoring, optimization, and related solutions for ISPs including security support in the following areas: • Web Security • Network Security • Network and User Analytics • Traffic Management • Anomaly Detection • Traffic Detection Allot solutions are designed for service providers, as well as cloud and enterprise. Website https://www.allot.com/
Allstream
AlphaGuardian
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services Brief Overview Allstream is a Canadian telecommunications company offering a range of voice, IP, and unified communications, including managed security services. Headquarters Allstream Head Office 200 Wellington Street West, Suite 1400 Toronto, Ontario M5V 3G2 Tel: (416) 345 – 2000 Executives Michael Strople serves as President of Allstream. History Tracing its original roots back to 1967, Allstream was formed from a division of MTS Allstream into MTS Inc. and Allstream in 2012. The company is headquartered in Toronto with offices across Ontario, Quebec, British Columbia, Alberta, New Brunswick, and Nova Scotia. Key Competitors Rogers, Bell Canada Products and Services The managed security services offered by Allstream include the following capabilities: • Managed Security – Includes network IPS, firewall management, log monitoring, vulnerability management, SIM on-demand, host IPS, log retention, WAF, and Web app scanning services. • Threat Intelligence – Includes vulnerability feeds, advisory feeds, threat feeds, live intelligence briefings, Microsoft updates, weekly threat summaries, emerging threat tips, malware analysis, and attacker databases. • Security and Risk Consulting – Includes compliance and certification support, test and assessment, incident response and forensics, program development, architecture and implementation, and residency services The company delivers its enterprise MSS services in close partnership with Dell SecureWorks. Website https://www.allstream.com/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Infrastructure Security Brief Overview AlphaGuardian provides solutions for data center and infrastructure security management. Headquarters AlphaGuardian 111 Deerwood, Suite 200 San Ramon, California 94583 Tel: (925) 421 – 0030 Executives Bob Hunter, Co-founder and CEO of AlphaGuardian, was the founder of NetBrowser Communications and TrendPoint Systems. History Founded by Bob Hunter and his son Zach in 2012, the company is headquartered in San Ramon. Key Competitors APC (Schneider Electric) Products and Services The data center and infrastructure security solution offered by AlphaGuardian is called RackGuardian. In additional to offering rack power analytics, rack environment analytics, and physical security controls, the product also provides cyber security defense features. These protections include self-learning analytics to detect vandalism or other attempts to connect to systems. Notifications and alarms are generated and can be provided via mobile interfaces. The company is also offering a tool called CyberGuardian that offers complementary capability. Website https://www.alphaguardian.net/
Alpine Cyber Solutions
Alta Associates
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Alpine Cyber Solutions offers cyber security services, security architecture, infrastructure engineering, and technical training for business customers. Headquarters Alpine Cyber Solutions Pottstown, Pennsylvania 19465 Tel: (484) 791 – 2971 Executives Scott Avvento, CEO and Chief Cyber Architect of Alpine Cyber Solutions since 2013, was previously a staff cyber architect at Si, and also senior information assurance engineer at Lockheed Martin. History Scott Avvento and Steve Pressman co-founded Alpine Cyber Solutions in 2013. The company is headquartered in Pottstown, Pennsylvania. Key Competitors GuidePoint Security Products and Services Alpine Cyber Solutions offers a range of cyber security consulting solutions including the following: • Incident response • Vulnerability analysis • Virtualization, cloud, and mobility services • Staff augmentation • Security product integration • Value added resale (VAR) The Alpine services are offered through partnerships with security technology vendors such as Bit9, Blue Coat, Core Security, Checkpoint, FireEye, SMS Passcode, Splunk, and VMware. The small company focuses on business customers located from New York to Baltimore, with emphasis on the Philadelphia market. Website https://www.alpinecyber.com/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Alta Associates provides executive search capabilities and support in the area of cyber security. Headquarters Alta Associates 8 Bartles Corner Road #21 Flemington, New Jersey 08822 Tel: (908) 806 – 8442 Executives Joyce Brocaglia serves as Founder, CEO, and President of Alta Associates. History Joyce Brocaglia founded the boutique search agency in 1986. The company is headquartered in New Jersey. Key Competitors Korn Ferry, CyberSN Products and Services The executive search areas of focus for Alta Associates can be grouped into the following candidate capability areas: • Cyber Security – Includes security operations and engineering, forensics and investigations, and incident response. • Information Security – Includes CISO organizations, business continuity, and security architecture and strategy. • IT Risk Management – Includes third party vendor risk, GRC support, and IT risk. • Specialty Searches – Includes Big Data, privacy, and security practice leader searches Website https://www.altaassociates.com/
Altep
Alus Outsourcing
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics, Data Destruction Brief Overview Altep provides digital forensic services with an associated consulting practice focused on cyber security. Headquarters Altep Corporate Headquarters 7450 Remcon Circle El Paso, Texas 79912 Tel: (915) 533 – 8722 Executives Roger Miller serves as President and CEO of Altep. History Founded in 1994, the company is headquartered in El Paso with presence in Dallas, Phoenix, Seattle, Atlanta, Palm Beach Gardens, Red Bank, Bentonville, Houston, Chicago, Palo Alto, San Francisco, Dublin, and London. Key Competitors TCS Forensics, LIFARS Products and Services In addition to legal and discovery oriented digital forensic services, Altep also provides a range of cyber security consulting services that can be grouped as follows: • Computer system security analysis • Penetration Testing • Incident Investigation and Breach Notification • Data Destruction • Data De-identification Website https://www.altep.com/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Alus Outsourcing provides value added reseller (VAR) security solutions to customers in Brazil. Headquarters Alus Outsourcing Rua Major Quedinho 11, Conj 808 Cep: 01050-030 Centro Sao Paolo, Brazil Tel: +55 (11) 3256 4433 [emailprotected] Executives No information is available on management. History The company is headquartered in Sao Paulo, Brazil. Key Competitors Optiv Products and Services In addition to its range of IT and outsourcing services, Alus Outsourcing also offers information security solutions including firewalls, UTM, and Anti-Virus products. The company offers outsourcing, security monitoring, penetration testing, and related value added security solutions for enterprise and global customers located in Brazil and the surrounding region. Partners include CheckPoint, Core Security, EgoSecure, Microsoft, Stonesoft, Cyberoam, Kaspersky, and Google. Website https://www.alus.com.br/
Alvea Services
Aman Information Security
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls (Alpha Version 0.1 – 06/09/17 – No Vendor Approval) VAR Security Solutions TAG Cyber Controls Brief Overview VAR Security Solutions ALVEA Services provides aggregated managed IT security and business continuity solutions through channel partners. Brief Overview Aman Information Security provides a range of value added Headquarters information security services and IT solutions in Qatar. ALVEA Services Suffolk House Headquarters Fordham Road Aman Information Security Newmarket 6-C, Al-Kuwari Building Suffolk Al-Sadd Street CB8 7AA P.O. Box 200245 Tel: +44 (0) 1638 569 889 Doha – Qatar Tel: +974 44424111 Executives Stephan Link serves as Founder and CEO of Executives COMPUTERLIINKS. Nashiet Aloudeh serves as General Manager of Aman Information Security. History The company was launched in 2010 within the History COMPUTERLINKS group to meet the growing market The company is headquartered in Qatar and is 100% owned demands for security. ALVEA Services is headquartered in and operated by Qatari staff. Suffolk in the UK. Key Competitors Key Competitors Optiv Accumuli Products and Services Products and Services Aman Information Security provides a range of value added ALVEA Services provides a range of aggregated IT managed security consulting services that can be grouped as follows: security solutions for business customers. ALVEA’s portfolio of premise and cloud-based security services can be grouped • Professional Security Services – Includes ISO 27001, as follows: penetration testing, and training • Technology Security Solutions – Includes multi-factor • Anti-Virus – Centrally managed Anti-Virus solution for authentication, secure USB, and surveillance systems PCs, mobile devices, and MACs. • IT Solutions – Includes unified communications • Authentication – Involves provision of a multi-factor Identity-as-a-Service (Iaas) solution The company maintains partnerships with security • Cloud Attached Storage – Shared storage, data companies such as Sophos, Avaya, imation, Redseal, protection, and collaboration support Infowatch, Cisco, Splunk, SafeNet, NetApp, Samsung, Silver • Cloud Based Infrastructure – Provides tools to provision Peak, Positive Technologies, and Huawei. all or part of an IT infrastructure into the cloud • DNS Managed Service – Offers DNS support, security, Website and infrastructure for business https://www.aman-infosec.com/ • Managed Content and Application Delivery – Include Web traffic filtering, local caching, and other services • Managed Network Security – Includes managed firewall, IDPS, VPN, Web filtering, and other services. • Satellite Broadband – Uses HYLAS 1 satellite to provide Internet connectivity across the UK and Ireland The company has a close relationship with Flexiant, delivering cloud orchestration solutions together. Website https://www.alveaservices.com/
Amazon Web Services
Amgine Securus
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Infrastructure Security, Secure File Sharing, Content Protection, Identity and Access Management Brief Overview Amazon Web Services (AWS) offers a range of cloud services, including virtualized security products arranged as a marketplace for users of AWS services. Headquarters Amazon.com 1200 12th Avenue, South, Ste. 1200 Seattle, Washington 98144 Tel: (206) 266 – 1000 Executives Jeff Bezos serves as Founder and CEO of Amazon.com. History In 2003, Chris Pinkham and Benjamin Black presented a paper describing Amazon’s vision for Web services. Within four years, 180,000 developers had signed up to use AWS virtual services. Key Competitors IBM, Microsoft, Box, Dropbox Products and Services Amazon Web Services (AWS) solutions in the area of cyber security involve providing virtual protections for AWS services and users. To this end, AWS provides a range of virtual services for compute (including EC2), networking, CDN, storage, database, deployment, management, and application services. Specific AWS services focused on security include the following: • Amazon Identity and Access Management (IAM) – Provides an authentication infrastructure for users of AWS services. • CloudWatch – Provides a management and monitoring service for users of the AWS suite. The security marketplace available on AWS provides the most power for users. A rich set of vendors including Ping Identity, Splunk, Sumo Logic, Tenable, Porticor, Dome9, Check Point Software, Sophos, CloudCheckr, Alert Logic, Tinfoil Security, Trend Micro, Deep Security, and many others. These products are offered as virtual software packages that can be embedded in the AWS cloud environment. Website https://aws.amazon.com/
(Alpha Version 0.1 – 07/29/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence, Digital Forensics Brief Overview Amgine Securus offers products and services to help security teams respond to threats both with tools to help secure your network as well as to provide enhanced security training. Headquarters 5 Teheran-ro 33-gil, Gangnam-gu Seoul, South Korea Tel: +82-70-8859-7103 Executives Cho, Ryang Hyun serves as the CEO. History Since 2013 Amgine has been acquiring prizes, certifications, and nominations including being nominated as a cyber security leader by Cyber Defense Magazine in 2016. Products and Services Threatshift is a unified system designed to improve a user’s ability to respond to APTs. Trapwall is an easily deployable honeynet. nTouch is a service to improve your company internally. It allows you to plan phisihing training and manage security awareness for your team. Website http://www.amgine.co.kr/en/company-2
AnchorFree
Anomali
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls VPN/Secure Access Brief Overview AnchorFree provides a virtual private network (VPN) for secure web browsing, especially in public WiFi hotspots. Headquarters AnchorFree 155 Constitution Dr Menlo Park, CA 94025 Tel: (408) 744 – 1002 Executives David Gorodyansky, Founder and CEO of AnchorFree, was recently featured in Forbes magazine as one of its most promising CEOs under the age of 35. History David Gorodyansky founded AnchorFree in 2005. The company has received several rounds of funding, with a total of $63 million, from Goldman Sachs and many prominent angel investors including Ester Dyson, Bert Roberts (former MCI Chairman), and Doug Maine (former IBM CFO). Key Competitors Anonymizer Products and Services AnchorFree provides private web browsing for its users in public locations such as WiFi hotspots. AnchorFree offers its Hotspot Shield VPN solution as a free download supported by advertisements and also as a paid subscription solution without ads. The Hotspot Shield product provides users with the ability to access all sites globally, while maintaining security and privacy. It is available for Android and iOS as well. The product runs by default in an “always on” mode so that every request from an Internet-connected app or browser will use the AnchorFree VPN. The company claimed over 60 million downloads by 2012. Website https://www.anchorfree.com/
(Alpha Version 0.1 – 06/10/17– No Vendor Approval) TAG Cyber Controls Threat Intelligence, Security Analytics Brief Overview Anomali, formerly Threat Stream, provides a threat intelligence platform that translates multi-source acquisition to actionable operations. Headquarters Anomali 808 Winslow St Redwood City, California 94063 Tel: (844) 4-THREATS Executives Hugh Njemanze, CEO of Anomali, previously co-founded ArcSight. History Founded by Greg Martin in 2013, the company has raised $26.3M in three rounds of funding from Google Ventures, Paladin Capital Group, Tom Reilly, Hugh Njemanze, General Catalyst Group, and Institutional Venture Partners. Threat Stream changed its name to Anomali in 2016. Key Competitors RSA Products and Services The Anomali SaaS-based, crowd-sourced platform provides support for combining and integrating data sources and threat feeds into third-party integration including Hadoop, firewalls, intrusion detection systems, and SIEMs. The platform provides a base for security analytics, threat management, security integration, and security collaboration. Anomali introduced Anomali Reports and Harmony Breach Analytics in 2016. Website https://www.anomali.com/
Anonymizer
Antiy Labs
(Alpha Version 0.1 – 06/10/17– No Vendor Approval) TAG Cyber Controls VPN/Secure Access Brief Overview Anonymizer provides personal VPN service for keeping online Internet access private. Headquarters Anonymizer Inc. 9276 Scranton Road, #600 San Diego, California 92121 Tel: (800) 921 – 2414 Executives Lance Cottrell, Founder and President of Anonymizer, was the original author of the Mixmaster anonymous remailer. History Lance Cottrell founded Anonymizer in 1995 naming his company originally Infonex Internet. The name was changed to Anonymizer in 1997. Abraxas Corporation acquired Anonymizer in 2008; Cubic acquired the company in 2010 for $124 million, Ntrepid acquired Anonymizer in 2010. Key Competitors AnchorFree Products and Services Anonymizer provides privacy for on-line browsing and Internet access, especially in public WiFi hotspots. Anonymizer’s personal VPN service, Anonymizer Universal, provides connectivity with unlimited bandwidth, secure WiFi access, anonymous Web browsing, on-line content access without censorship, and IP address masking via a random IP address between users and the Anonymizer servers. The product works on Windows, Mac, Android, and Linux. Anonymizer Universal. A business solution for anonymity, Ntrepid ION Collection Solutions, is provided through Ntrepid, a sister company of Anonymizer. Website https://www.anonymizer.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools Brief Overview Antiy Labs provides an anti-virus SDK engine and nextgeneration anti-virus services for PC and mobile malware. Headquarters Antiy Labs P.O. Box 898 Harbin, 150001 China Executives Xinguang Xiao serves as Chief Architect at Antiy Labs, and is a member of the Information Security Committee of the Internet Society of China. History Antiy Labs was founded in 2000. The Chinese company is one of the first anti-virus solution companies in the world. Key Competitors Kaspersky Products and Services Antiy Labs provides a next-generation anti-virus engine toolkits for solution providers to combat malware on PCs and mobile devices. The Antiy Labs anti-virus engine solution (including its Ghostbuster solution) offerings is available in a professional for-pay version as well as in free download, and can be grouped as follows: • AVL SDK for Mobile – Offers anti-virus solutions for mobile security products or services. • AVL SDK for Network – Offers anti-virus capability for network devices include firewalls, UTM systems, routers, and so on. • Supporting Services – Antiy Labs offers a range of open malware cloud detection, backend automatic malware analysis, and other services. Website https://www.antiy.net/
ANX Acquired by OpenText
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, PCI DSS/Compliance, Secure File Sharing Brief Overview ANX provides a range of managed compliance and collaboration services including PCI DSS compliance and secure connectivity. Headquarters ANX 2000 Town Center, Suite 2050 Southfield, Michigan 48075 Tel: (877) 488 – 8269 Executives Mark L Barrenechea serves as President and CEO of ANX. History Founded in 1999, the company is headquartered near Detroit and helps business secure and exchange information and be compliant in the automotive, retail, and healthcare sectors. Key Acquisitions S2S Communications – 2010 Positive Networks (VPN Division) – 2009 Key Competitors Trustwave Products and Services The range of managed compliance and collaboration services offered by ANX includes the following: • PCI Compliance • HIPAA Compliance • Secure Connectivity • CAD/PLM Support & Software • EDI Managed Services • Secure Health Information Exchange • Supply Chain Collaboration • Transaction Delivery Website https://www.anx.com/
Aon (Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Cyber Insurance, Security Consulting Brief Overview Aon provides risk management and insurance brokerage services, including cyber insurance. Headquarters Aon Global Headquarters The Aon Centre The Leadenhall Building 122 Leadenhall Street London England Executives Gregory Case serves as President and CEO of Aon. Anthony Belfiore serves as CISO of Aon. History Aon was created in 1982 when Ryan Insurance Group merged with the Combined Insurance Company of America. Aon has 72,000 employees working in more than 120 countries. The company trades on the NYSE. Key Competitors Marsh Products and Services Aon provides products and services in the following categories: • Risk Solutions – Incudes various types of business insurance and assessment, including cyber risk insurance. • Reinsurance – Includes analytics and related business risk services. • Human Resources – Supports a variety of HR services for business. Website https://www.aon.com/
APCON
Apperian an Arxan Co.
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview APCON provides network-monitoring solutions for data center security and optimization. Headquarters APCON 9255 SW Pioneer Court Wilsonville, Oregon 97070 Tel: (503) 682 – 4050 Executives Richard Rauch serves as Founder, President, and CEO of APCON. History Founded in 1993 by Richard Rauch, the company has grown to support customers in forty different countries. Key Competitors SolarWinds Products and Services APCON provides a range of network monitoring solutions in the following areas: • Network Monitoring Switch • Taps and Bypass Switches • Monitoring Software • Monitoring Technology These hardware and software solutions are designed to provide insights into live network traffic for the purposes of visibility, troubleshooting, assurance, security, and compliance. Website https://www.apcon.com/
Acquired by Arxan (Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview Apperian provides a range of mobile app management solutions including mobile app security. Headquarters Apperian 321 Summer Street Boston, Massachusetts 02210 Tel: (617) 477 – 8740 Executives Mark Lorion now searves as president and general manager. History Founded in 2009, the company is headquartered in Boston. CommonAngels Ventures, North Bridge Venture Partners & Growth Equity, Bessemer Venture Partners, Kleiner Perkins Caufield & Byers, iFund, LaunchCapital provided $28M in venture funding through Series A and four venture rounds. In total, through 2016, the company received $39.4M in six rounds from seven investors. Key Competitors MobileIron, Appthority, Mocana Products and Services Apperian provides a range of mobile app management solutions including enterprise app stores, mobile app distribution, mobile app wrapping, mobile app security, mobile app testing, mobile enterprise integration, and mobile content management. The security focus involves protection of mobile apps and content. The tool provides security management policies for mobile administrators for data encryption, copy/paste protection, authentication, and applevel VPN support. Website https://www.apperian.com/
Applied Control Solutions Applicure (Alpha Version 0.1 – 06/10/17– No Vendor Approval) TAG Cyber Controls Security Consulting, Security Training Brief Overview Applied Control Solutions provides technical consulting, books, and resources related to the cyber protection of industrial control, SCADA, and related operational technology-based systems and critical infrastructure. Headquarters Applied Control Solutions [emailprotected] Tel: (408) 253 – 7934 Executives Joseph Weiss serves as principal of Applied Control Solutions. History Applied Control Solutions is Joseph Weiss’ cyber security consulting company. Key Competitors SCADAhacker Products and Services Applied Control Solutions provides consulting, books, and word-class resources on the protection of SCADA, industrial control systems, and Internet of Things (IoT). Joe Weiss is one of the world’s leading authorities in these areas with the background and experience required to advise purveyors of many of the world’s most critically important systems. Joe is a frequent lecturer on the topic, and has testified numerous times in Washington to help lawmakers better undertand this important topic. His books are essential for anyone desiring to better understand the technical challenges in this increasingly tough area. Website https://www.realtimeacs.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Web Application Firewall Brief Overview Applicure provides a Web application firewall (WAF) solution for enterprise customers. Headquarters Applicure Technologies 4 HaRakun Ramat Gan Israel Executives David Allouch is Co-Founder and CTO of Applicure. Yaacov Sherban was formerly CEO of Applicure, having now become head of MobileU. History David Allouch and Moshe Basol co-founded in 2004. The small private company is headquartered in Israel. Key Competitors Barracuda, Imperva Products and Services Applicure’s Web application firewall (WAF) flagship product, dotDefender, includes the following capabilities and features for protecting Websites from external and internal attacks: • Enterprise class security • Supports hosting, enterprise, and SMB • Provides centralized management console • Includes an Open API for integration Website https://www.applicure.com/
Applied Magnetics Lab
ApplyLogic
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Data Destruction Brief Overview Applied Magnetics Lab provides a range of data destruction products for hard drives and other media. Headquarters Applied Magnetics Lab, Inc. 401 Manor Street, York, PA 17401 Tel (717) 430-2774 Executives Charles Castronovo serves as President of Applied Magnetics Lab. History Applied Magnetics Lab was founded in 1973 and the small company is privately held. Key Competitors Data Devices International, Garner Products Products and Services Applied Magnetics Lab focuses on providing products for data destruction on physical media. Applied Magnetics provides data destruction and related products grouped as follows: • AML Infostroyer 151 – destroys data from optical media • AML Infostroyer 201 – NSA-approved media destruction • Infostroyer 101 – Destruction of CDs • AML Disk Erasing Paddle –Magnetic erasing • Magnastroyer AML MS1 – Magnetic media erasing devices • Speak Easy – Disables microphones and speaker/earpiece for wireless devices. Website https://www.appliedmagnetics.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Information Assurance Brief Overview ApplyLogic provides IT, network, program management, and cyber security/information assurance services to Federal Government customers. Headquarters ApplyLogic Consulting Group LLC 8300 Greensboro Drive, Suite 800 McLean, Virginia 22102 Tel: (703) 794 – 2106 Executives J. Jeff Ramella, Founder of ApplyLogic, previously served in technical and leaderships roles with US Courts, American Management Systems, DHS, and TSA. Andrew Sweet serves as Vice President of Operations and Business Development. History Founded by J. Jeff Ramella in 2004, ApplyLogic is a veteranowned, small business, headquartered in McLean. Key Competitors SAIC Products and Services ApplyLogic offers IT, network, and program management solutions for Federal Government customers. In addition, the company provides cyber security solutions in the following areas: • Incident Response, Security Operations, and Forensics • Security Assessment and Policy Design • Security Infrastructure Integration • Vulnerability and Penetration Testing • Security Architecture Design Website https://www.applylogic.com/
AppRiver
AppSec Labs
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Email Security Brief Overview AppRiver provides a virtual, software-as-a-service (SaaS), cloud-based platform for anti-Spam, hosted Exchange, email encryption, and Web security. Headquarters AppRiver Headquarters 1101 Gulf Breeze Parkway Suite 200 Gulf Breeze, Florida 32561 Tel: (850) 932 – 5338 Executives Michael Murdoch, Co-Founder and CEO of AppRiver, was previously co-founder of WaveNet. History Michael Murdoch and Joel Smith co-founded AppRiver in 2002. The private company has its headquarters in Florida, as well as offices in Austin and Switzerland. The company claims 45,000 business customers supporting over eight million mailboxes. Key Competitors Clearswift, Symantec Products and Services The AppRiver SaaS platform is available as a virtual, cloudbased suite, and can be grouped as follows: • Spam and Virus Protection – The SecureTide product filters email in the cloud for Spam and viruses in the cloud. • Web Protection - The SecureSurf product provides virtual Web filtering and content protection. • Email Encryption – The CiperPost Pro product provides email encryption. • Secure Hosted Exchange – Hosted email with SecureTide integration. • Office 365 Plus – Provides Office 365 tools • Email Continuity Service – Always-on support for email continuity. • Hosted SharePoint – Provides hosted SharePoint services. • Migration Services – Supports users moving to AppRiver virtual services • DNS Hosting - Includes DDOS protection for DNS • Email Threat Intelligence – Helps identify malicious domains and URLs in real time. Website https://www.appriver.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Application Security, Penetration Testing, Security Training Brief Overview AppSec Labs provides application security services including design, analysis, training, and assurance. Headquarters AppSec Labs Maanit St 10 Kfar Saba, 44288 Israel Tel: +972 (0)9-7485005 [emailprotected] Executives Erez Metula, head of AppSec Labs, is author of the book, “Managed Code Rootkits.” History Erez Metula founded AppSec Labs in 2010. The small private company is headquartered in Israel. Key Competitors Cigital, NCC Group Products and Services AppSec Labs provides a range of expert application security services including the following: • Application Security Training • Application Code Review • Penetration Testing • Compliance Testing • Application Security Training • Mobile Security Including Penetration Testing The company also provides application security tools including AppUse, CORS tester, and iNalyzer. Website https://www.appsec-labs.com/
Appthority
Aqua Security
(Alpha Version 1.0 – 09/06/17 – Vendor Approval) TAG Cyber Controls Mobile Security, Application Security Brief Overview Appthority provides enterprise mobile threat protection, combining deep threat intelligence, tailored risk assessment and remediation, and integration with enterprise security ecosystems. Headquarters Appthority 535 Mission Street, 20th Floor San Francisco, California 94105 Tel: (855) 346 – SAFE Executives Anne Bonaparte serves as CEO of Appthority. Domingo Guerra serves as Co-Founder and President History Anthony Bettini, Domingo Guerra, and Kevin Watkins cofounded Appthority in 2011. The small, private company received Series A funding in 2012 from Venrock and US Venture Partners. Through mid-2016, the company has received a total of $27.25M in funding through two rounds, adding Trident Capital and Blue Coat in the B round. Headquartered in San Francisco, Appthority has sales offices in Washington D.C, and London. Key Competitors Checkpoint, Lookout Products and Services Appthority helps organizations ensure mobile security in an era of BYOD and IT consumerization. It does so by delivering automated and scalable threat defense and app reputation analysis, app security testing, device risk analysis, mobile threat assessment, and compliance management. Malicious and risky app behaviors are detected through static analysis of the binary code and dynamic behavioral analysis via code emulation or execution. The Appthority solution integrates with major EMMs including AirWatch and MobileIron. The Appthority on-device mobile agents for iOS and Android provide proactive threat detection, expedited device remediation, and employee self-remediation options. The service is offered via a cloud-based platform that supports Android and iOS devices and leverages our database of over 4 million analyzed public and private apps. Website https://www.appthority.com/
(Alpha Version 0.1 – 07/29/17 – Vendor Approval) TAG Cyber Controls Cloud Security, Application Security Brief Overview Aqua Security focuses on providing protection for virtual environments such as Docker. Headquarters Aqua Security Software Ltd. 20 Menachem Begin Rd. Ramat Gan, Israel 52700 Tel: +972-3-688-8799 Executives Dror Davidoff serves as the CEO. He has more than 20 years experience in management, marketing, and business development in the enterprise software space. History The company was founded when a group of IT Security veterans from companies such as Intel, CA Technologies, and Imperva recognized a growing opportunity as containerized, virtual envirionments became more and more prevalent. Key Competitors Twistlock Products and Services The Aqua Security Container Security Platform is broken up into three main components. The Aqua Command Center sits in your network to help manage al of your container environments. The Aqua Enforcer sits inside of your container environment to provide runtime protection and automated security. Finally Aqua Cyber Intelligence uses machine learning to improve the protection provided. Website https://www.aquasec.com/
ARAMA TECH
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview ARAMA TECH provides governance, risk, and compliance (GRC) solutions including focus on security management and process. Headquarters ARAMA TECH Wildenborchlaan 13 3207 ZA Spikenisse The Netherlands Tel: +31 10 3401964 Executives John Troch serves as Managing Director, Owner, and CEO of ARAMA TECH. History ARAMA TECH was founded in 1999 and adopted its current name in 2007. The private, Dutch firm is a MANAIA TECH Company. Key Competitors Conversant, LockPath, TraceSecurity Products and Services ARAMA TECH offers GRC and security management solutions in close cooperation and partnership with the RSA Archer team. Specific areas of focus include: • GRC and Information Management – Includes centralized, automated management of GRC and information security tied closely to the use of the RSA Archer GRC product. • Process and Solution Implementation – Focuses on processes related to compliance, policy, risk management, and security function protections. • Security Assessment – Provides active security risk management through assessment of architecture, processes, networks, and applications. • Project Management – Involves management of GRC, security projects, and related initiatives. Website https://www.aramatech.com/
Arbor Networks (Alpha Version 1.0 – 09/05/17 – Vendor Approval) TAG Cyber Controls DDoS Security, Network Visibility Brief Overview Arbor Networks provides an enterprise and service provider products and services for network-based mitigation of realtime distributed denial of service (DDoS) threats. Headquarters Arbor Networks, Inc. 76 Blanchard Road Burlington, Massachusetts 01803 Executives Anil Singhal serves as CEO of NETSCOUT, the parent company of Arbor Networks. Brian McCann serves as President of NETSCOUT’s security business unit. Darren Anstee serves as CTO of Arbor Networks. History Arbor was established in 2000 based on work done at the University of Michigan with funding from the Defense Advanced Research Projects Agency (DARPA). The company operates with nearly 600 employees around the world. In 2014, the company was acquired NETSCOUT and today operates as the security division. Key Acquisitions Packetloop (2014) – Security Analytics Key Competitors Radware, Akamai (Prolexic), F5 Products and Services Arbor Networks provides platforms for DDoS protection. Arbor’s products and services can be grouped as follows: • Arbor Cloud – DDoS service that integrates on-premise and cloud-based protection. • Arbor APS – The on-premise enterprise DDOS protection platform. • Arbor SP – This service provider-oriented platform includes Arbor SP, which provides comprehensive network visibility and reporting while Arbor TMS provides real-time surgical mitigation of traffic during an attack. • Arbor Spectrum – Leverages packet capture and flow instrumentation, powerful search capabilities and smart workflows to quickly investigate and validate advanced threats. Arbor Networks is one of the largest and most prominent vendors of DDoS protection in the world. Arbor’s portfolio of DDoS protection products and services is designed to meet the multi-dimensional needs of organizations, from emerging growth companies to the largest enterprise and service providers. Arbor also provides advanced global traffic intelligence, and network visibility. Website https://www.arbornetworks.com/
Arcon
Arctic Wolf Networks
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, VAR Security Solutions Brief Overview Arcon is a managed security services provider serving enterprise customers in Latin America. Headquarters Arcon SCN Gd. 02 BI A – salas 502, 503, 504 70.712-900 Corporate Financial Center Tel: +55 61 3329-6081 Executives Marcelo Barcellos serves as CEO of Arcon Managed Security Services. History Founded in 1995, Arcon has locations in Brazil, Rio de Janeiro, Sao Paulo, and Belem. Vijilan Security is a spin-off from Arcon. Key Competitors Alestra, Telefonica, Entel Products and Services Arcon is a Latin American Managed Security Services Provider offering the following enterprise services: • Managed Security Services – Includes support from three security operations centers • Managed Security Monitoring – Focuses on log management and analysis • Value Added Resale – Delivered via technologies from partners Technical solutions areas included in the Arcon portfolio include SSO, IAM, BYOD, endpoint security disk encryption, MDM, patching, policy, vulnerability management, application security testing, DLP, firewall, APT protection, DDOS, IPS, secure Web gateway, and many other areas. Website https://www.arcon.com.br/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Security Information Event Management, Incident Response Brief Overview Arctic Wolf Networks provides a concierge security-as-aservice (SaaS) cloud-based SIEM and incident response solutions for business customers. Headquarters Arctic Wolf Networks, Inc. 111 West Evelyn Avenue Suite 115 Sunnyvale, California 94086 Tel: (888) 272 – 8429 Executives Brian NeSmith, CEO of Arctic Wolf Networks, was formerly CEO of CacheFlow, which eventually became Blue Coat Systems. History Brian NeSmith and Kim Tremblay founded Arctic Wolf Networks in 2012. The private company has offices in California and Canada. Lightspeed Ventures and Redpoint Ventures provide financial support. Key Competitors AlienVault, HPE ArcSight, Black Stratus, AccelOps Products and Services Arctic Wolf Networks focuses on providing virtual, SIEM and incident response solutions for organizations without the resources to build a team of security analysts. Arctic Wolf Network’s offering is referred to as a concierge solution because it provides live Concierge Security Engineers (CSEs) for customers of the virtual service. The product is built on three pillars: • SIEM as a Service • Concierge Security Engineers • Actionable Security Intelligence Arctic Wolf Networks focuses its actionable security intelligence using behavioral analysis, threat detection, inventory, and traffic flow analysis. Website https://www.arcticwolf.com/
Area 1 Security
Armjisoft
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention Brief Overview Area 1 Security is a start-up security focused on preemptive defense against targeted phishing attacks based on behavioral analysis. Headquarters Area 1 Security Redwood City, California Executives Oran Falkowitz serves as Founder and CEO of Area 1 Security. He is a former co-founder of Sqrrl. History Founded by former members of NSA Oren Falkowitz, Blake Darche, and Phil Syme in 2014, the company has received $8.0M in venture funding from Cowboy Ventures, First Round Capital, Kleiner Perkins Caulfield & Byers, and Allegis Capital. Ray Rothrock from RedSeal Networks and Derek Smith from Shape Security are also investors. Icon Ventures provided $15M in Series B funding in 2015. Key Competitors Proofpoint, PhishMe Products and Services Area 1 Security is a stealth mode start-up focused on preemptive detection and prevention of targeted phishing attacks based on behavioral analytics. The proposed softwareas-a-service solution is described as collecting data from disparate places and analyzing it to prevent phishing attacks. The solution focuses on the delivery mechanism to make sure malware-laden email never actually enters into an organization. The platform is billed as the world’s first antiphishing solution. Website https://www.area1security.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Content Protection Brief Overview Armjisoft provides a range of digital rights management (DRM) solutions for license protection, watermarking, and related protections. Headquarters Armjisoft Digital Rights Management Systems, Inc. 15 Cliff Street New York, New York 10038 Tel: (347) 535 – 4451 Executives No information is available about executive management at Armjisoft. History Founded in 2002, the private company is headquartered in New York City. Key Competitors DRM-X Products and Services Armjisoft provides a digital rights management (DRM) solution for information-based systems. The flagship Armjisoft product is called OwnerGuard that protects Adobe Flash SWF and FLV, Adobe PDF, Microsoft Office, AutoCAD, CHM, and MP3. Specific capabilities include licensing protection watermarking, USB drive binding, Active Directory integration, and automatic deployment. Website https://www.armjisoft.com/
Armor
Aruvio
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview Armor provides secure cloud hosting with several layers of enterprise-grade functional security and compliance capabilities. Headquarters Armor 2360 Campbell Creek Boulevard Suite 525 Richardson, Texas 75082 Tel: (877) 262 - 3473 Executives Chris Drake serves as the CEO. History Chris Drake, current CEO of Armor, founded Firehost in 2009. The company has roughly 200 employees serving customers from data centers in Dallas, Phoenix, Singapore, London, and Amsterdam. The company has received several rounds of Venture funding including a Series E in 2014 from the Stephens Group. Firehost rebranded as Armor in 2015. Key Competitors Rackspace, Microsoft Products and Services Armor allows configuration of cloud capabilities for enterprise-grade security. Specifically, Armor provides protection for cloud services against the most common cyber attacks such as SQL injections, cross site scripting, directory traversal, and other attacks. It does so through layered security including physical, perimeter, network, server, application, and administrative protections. The company offers cloud solutions that are compliant with HIPAA via HITRUST, PCI DSS Level 1, SSAE 16, and ISO 27001 certifications. Website https://www.armor.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview Aruvio provides an enterprise governance, risk, and compliance (GRC) platform on the Salesforce cloud. Headquarters Aruvio, Inc. 6055 Southard Trace Cumming, Georgia 30040 Tel: (855) 927 – 8846 Executives Palaniswamy “Raj” Rajan, Chairman of Aruvio, was previously founder of Vigilar. Rajesh Unadkat now serves as CEO, former leader at AOL. History Founded in 2006, Aruvio was acquired by Virima Technologies in 2013. Aruvio is headquartered in Cumming, Georgia with offices in Atlanta and Santa Clara. Key Competitors RSA (Archer) Products and Services Aruvio provides a cloud-based governance, risk, and compliance (GRC) solution that includes the following capabilities: • Risk Management – Includes policy, third-party, controls, compliance, and incident management • SaaS Deployment – No hardware required for deployment into the Aruvio platform, hosted in the Salesforce cloud • Streamlined Workflow – includes a Unified Compliance Framework Browser and a Standards Comparison Tool Website https://www.aruvio.com/
Arxan
Ascentor
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Application Security, Mobile Security, Content Protection Brief Overview Arxan Technologies provides run-time application protection solutions against tampering, reverse engineering, malware insertion, and piracy on mobile, desktop, server, and embedded platforms. Headquarters Arxan Technologies Headquarters 650 California St Suite 2750 San Francisco, CA 94108 Tel: (301) 968 – 4290 Executives Joe Sander was appointed CEO of Arxan Technologies in 2015. History Mikhail Atallah and Hoi Chang co-founded Arxan Technologies in 2001 with an initial focus on defense antitamper solutions. The company sold its defense technology unit to Microsemi in 2010. TA Associates, EDF Ventures, Paladin Capital Group, Legend Ventures, and Trident Capital provided Venture and Series C rounds of funding for the company. Arxan is headquartered in Maryland with offices in the UK and Japan. Key Competitors Lookout, Pulse Secure Products and Services Arxan Technologies focuses on providing technology solutions to protect against tampering, reverse engineering, malware insertion, and piracy on mobile, desktop, server, and embedded platforms. Specifically, Arxan Technologies offers a Mobile Application Integrity Protection Suite for mobile platforms, as well as comparable suite offerings for desktop, server, and embedded systems. These suites consist of the following component software products: • GuardIT – Secures Windows, Linux, Java, and Mac desktop and server applications. • EnsureIT – Protects mobile applications and embedded code with support for Android and iOS. • TransformIT – Secures cryptographic keys. • BindIT – Provides enhanced software piracy protection. The Arxan products are embedded into application binary code to provide the security, piracy, and tamper resistance functions. The company also offers professional services in the area of security deployment to software. Website https://www.arxan.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Ascentor provides information risk management (IRM) consulting services for business and government customers. Headquarters Ascentor Ltd 5 Wheatstone Court, Davy Way Waterwells Business Park, Quedgeley, Gloucester, Gloucestershire, GL2 2AQ Tel: 01452 881712 Executives Dave James, Managing Director of Ascentor, has been providing IRM consultancy to commercial and government customers since 2004. History Dave James, Paddy Keating, and Steve Maddison founded Ascentor in 2004. The company is based in the UK and is a member of the Malvern Cyber Security cluster. Key Competitors Assure Technical, PA Consulting Group, Portcullis Products and Services Ascentor provides IRM security consultancy for businesses in the area of information risk health checks, IRM assessment for enterprise and projects, IRM standards, and IRM awareness for executives. The company provides consultancy for public sector customers in the areas of cyber and IA for central government, IA for wider pubic sector, public services network projects, and IRM awareness for public sector employees. The company provides consultancy for government suppliers in the areas of IRM for government suppliers, IA consultation, accreditation support, and IRM awareness for executives. Website https://www.ascentor.co.uk/
Asgard Group
Asgent
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Wireless Security, Digital Forensics Brief Overview Asgard Group provides a range of wireless RF-based and communications security solutions for counterintelligence and cyber investigations. Headquarters Asgard Group LLC 305 S. Andrews Avenue, Suite 505 Fort Lauderdale, Florida 33301 Tel: (800) 380 – 4075 Executives Larry Day is the current Director of Asgard Group. He cofounded the LLC and has 32 years of experience in mission critical systems design. History Asgard Group is a veteran-owned, minority-owned small business. The company is headquartered in Fort Lauderdale. Key Competitors RF Security Group Products and Services Asgard Group provides solutions for RF-based communications security threats based on its CYBER-TSCM methodology with emphasis in the following areas: • Counterintelligence – Includes technical surveillance and countermeasures physical security • WiFi and Cellular Security – Includes cellular/wireless situational awareness and cognitive mobile security • Cybersecurity – Includes IT assets and wireless enabled, as well as networks and endpoints • Cyber Investigations – Includes forensics, network planning, and optimization tools The company also provides travel planning and briefings, threat assessment, SCIF planning, and related areas. Website https://www.asgardgroupllc.com/
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Asgent provides network security and value added reseller (VAR) solutions for small and medium sized businesses, primarily in Japan. Headquarters Asgent 6-4 Akashicho Chuo-ku, Tokyo 104-0044 Japan Tel: 81-3-6853-7401 Executives Takahiro Sugimoto, CEO of Asgent, has served as President and Director of the company since its inception in 1997. History Asgent was established on November 10, 1997. It recently reported roughly 73 employees. Key Competitors Optiv Products and Services Asgent’s network security product and VAR offerings for small and medium sized businesses, primarily in Japan, rely heavily on vendor partnerships and can be grouped as follows: • Security Policy – This includes two offerings called M@gicPolicyCoSMO and RA2 art of risk. • Gateway Security – This includes value added resale of Checkpoint, Fortinet, Solace, SafeNet, and Websense products. • Mail Security – This includes the BRODIAEA safeAttach product. • Management – This includes value added resale of RSA, NetInsightl, and HPE products. Technology partners include Check Point, Damballa, Gemalto, HPE, Imperva, NetInsight, OrangeSoft, RSA, Solace Systems, Swivel, ViaScope, and Votiro. Website https://www.asgent.com/
Ashton Search Group (Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Ashton Search Group provides technical and engineering search and recruiting with cyber security opportunities from the firm’s large defense client base.
Aspect Security
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Application Security, Security Training Brief Overview Aspect Security provides training, software testing and analysis, and security consulting services to its clients with emphasis on mobile applications. Headquarters Headquarters Ashton Search Group Aspect Security 17 Mill Neck Lane 9175 Guilford Rd. Pittsford, New York Columbia, MD 21046 Tel: (585) 249 – 9674 Tel: (301) 604-4882 Executives Executives Thomas Moore serves as a Senior Recruiter for Ashton Search John Pavone, CEO of Aspect Security, has concentrated solely Group. on security for the past twenty years. History History Ashton Search Group provides a range of US nationwide Jeff Williams and Dave Wichers, current COO, co-founded search and recruiting services. Aspect Security in 2002. The private firm has its headquarters in Columbia, Maryland. Key Competitors CyberSN Key Competitors Cigital, IANS Products and Services Ashton Search Group provides search and recruiting services Products and Services for technical and engineering positions nationwide in the US. Aspect Security provides expert assistance to its clients in Cyber Security focus areas include software engineers, assuring security in applications, particularly mobile apps. electrical engineers, engineering managers, and project This is done through training, eLearning, code analysis, test, managers with hands-on network security experience. The and related consultation. Aspect Security’s professional company also serves the defense industry and DHS in services are grouped as follows: particular. Positions that require clearances are covered as well. • Training – This includes instructor-led sessions as well as a curriculum of eLearning courses. Website • Mobile Applications – This includes mobile app https://www.ashtonsearchgroup.com/ verification, architecture reviews, and related security services. • Security Foundations – This includes client assistance in establishing a secure base of policies, practices, and technology. • Additional Services – Aspect Security also provides consultation services for implementation, verification, and management. Website https://www.aspectsecurity.com/
ASPG
Assevero
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Mainframe Security Brief Overview Advanced Software Products Group (ASPG) provides a range of security products focused on mainframe systems, data security, and access management. Headquarters ASPG Inc. Corporate Headquarters 3185 Horseshoe Drive South Naples, Florida 34104 Tel: (239) 649 – 1548 Executives Cathryn Thompson serves as President and CEO of ASPG. History ASPG has been offering software solutions and support to customers since 1986. The company is headquartered in Florida. Key Competitors IBM, Enforcive Products and Services ASPG focuses on offering a range of software products in the area of mainframe management, data security, and access management. ASPG solutions are available in the following categories: • Systems – Includes products with emphasis on mainframe systems. Specific products include CIM (Easy ICF catalog administration for z/OS operating systems), CommandCICS (conversion from macro to command level environment), and other system management functions. • Data Security – Includes a range of encryption and password products. Specific offerings include MegaCryption (encryption support for data at rest), Cryptomon (data center and mainframe cryptography), ERQ (custom security administration for RACF), and other tools. • Access Management – Includes a centralized, enterprisewide password reset tool. Website https://www.aspg.com/
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Information Assurance, Security Recruiting Brief Overview Assevero provides a range of information assurance, security recruiting, and security consulting services focused on government customers. Headquarters Assevero Security Consulting, LLC 1997 Annapolis Exchange Parkway, Suite 300 Annapolis, Maryland 21401 Tel: (855) 4ASSEVERO Executives Mike Covert serves as Founder and CEO of Assevero. History Mike Covert founded Assevero in 2006. The private, veteranowned, small business is headquartered in Annapolis, but operates its staff mostly virtually. Key Competitors KEYW, Alta Associates Products and Services Specific services offered by Assevero include the following: • Cyber Recruiting Services • Cyber Consulting Services • Cyber Security Solutions • Cyber Warfare Support The company operates via set of contract vehicles in government including IAAI, SeaPort-e, NSETS II, and GSA Schedule 70. Website https://www.assevero.com/
Assure Technical
Assuria
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Assure Technical provides a range of cyber and physical security consulting services including training. Headquarters Assure Technical Wyche Innovation Centre Walwyn Road Upper Colwall Malvern WR13 6PL United Kingdom Tel: +44 (0) 1684 252 770 Executives Pete Rucinski, Managing Director of Assure Technical, was previously head of technical security solutions at 3SDL. History Assure Technical was established in 2011 and is a member of the Malvern Cyber Security cluster. Vicki Rucinski is founding director and head of marketing of Assure Technical. Key Competitors InnovaSec, Advent IM Products and Services Assure Technical is located in Malvern and offers a range of cyber and physical security consulting services for businesses in the UK. Services include the following: • Physical Security Consultation – Includes audit, procurement, and project support • Cyber Security Consultation – Includes penetration testing, cyber security assessments, risk analysis, forensic services, and mobility security • TSCM Counter Surveillance Services – Includes facility sweeps • Technical Surveillance – Includes support for tracking, CCTV, and airborne surveillance. • Communications – Support for microwave, satellite, and mobile services • Training – Physical, cyber, and technical surveillance course. Website https://www.assuretechnical.com/
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions, Security Consulting, Security Information Event Management Brief Overview Assuria provides security solutions, security software, and managed SIEM services supporting security operations and enterprise security needs. Headquarters Assuria Limited – UK Headquarters Reading Enterprise Centre, University of Reading, Earley Gate, Whiteknights Road Reading, Berkshire RG6 6BU, UK Tel +44 (0) 118 935 7395 Executives Terry Pudwell, CEO of Assuria, was previously an executive with ISS following their acquisition of March Information Systems, which he founded. History Assuria was established in 2004 by executives responsible for the development of the Security Manager at March Information Systems. The small private company has been headquartered at the University of Reading in the UK, and has received financial backing from BAE Systems. Key Competitors Dell SecureWorks, GuidePoint Solutions Products and Services Assuria focuses on providing security software products and services to support security operation centers and enterprise customers. The specific security products and services provided by Assuria include the following: • Assuria Log Manager – This product is an on-premise, appliance, or managed SIEM with automated collection and management of logs and security events. • CyberSense Enterprise Scanner – Provides vulnerability assessment, configuration assurance, and compliance management on the enterprise. • CyberSense Object Scanner – Provides deep file inspection for malicious content. • Assuria Auditor – Provides a combined configuration and vulnerability scanner, inventory reporting tool, compliance assessment capability, and change detection tool. Assuria also provides a suite of services for strategy and planning, compliance, exploitation, managed services, training, and private SOC services. Website https://www.assuria.com/
AssurIT
AsTech Consulting
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Information Assurance Brief Overview AssurIT is an information technology (IT) services and solutions provider that specializes in cyber security. Headquarters AssurIT Consulting Group 11325 Random Hills Road Suite 360 Fairfax, Virginia 22030 Tel: (703) 225 – 3305 Executives Sunny Tuteja, Founder, President, and CEO of AssurIT Consulting Group, LLC, has several years experience supporting Federal Government agencies with their cyber security needs. History Sunny Tuteja founded AssurIT Consulting Group in 2013. The small, minority-owned business is a certified Small Disadvantaged Business (SDB) in the Federal Government SDB program. Key Competitors Renaissance Systems Inc., Axxum, Veris Group Products and Services The cyber security solution, services, and consulting offered by AssurIT include the following: • Continuous Monitoring • C&A, A&A • Vulnerability Scanning • Program Management • Policy Development • POA&M Management • Penetration Testing • FISMA Compliance • RMF Implementation • Identity Management • Security Awareness Training • Cloud Security Website https://www.assuritconsulting.com/
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview AsTech provides a range of security consulting services in the areas of discovery, remediation, software development, and training. Headquarters AsTech 71 Stevenson Street Suite 1425 San Francisco, California 94105 Tel: (888) 777 – 5995 Executives Greg Reber, Founder and CEO of AsTech Consulting, started his career as an aerospace engineer. History Greg Reber founded AsTech in 1997. The private company reported a 90% year-over-year increase in 2010. Key Competitors NCC Group, Cigital Products and Services AsTech’s security consulting solutions include emphasis on software developers and can be grouped as follows: • Discovery – Includes source code assessment, penetration testing, hybrid assessments, and security architecture assessment. • Remediation – Includes training in remediation and associated consultation. • Training – Includes training in secure development, PCI compliance, and OWASP Top 10. • SDLC – Includes consulting on software process for security. Website https://www.astechconsulting.com/
Ataata
A10 Networks
(Alpha Version 0.1 – 08/28/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview Ataata seeks to reduce human error through more engaging security training methods. Headquarters Arlington, Virginia Executives Michael Madon serves as the CEO. Formerly with RedOwl, Michael has also testified in front of Congress about cyber security issues. History Ataata was founded in 2016. Key Competitors Security Mentor, CFISA Products and Services Ataata provides a solution for security training that focusses on keeping employees engaged. Their platform is marketed as smart, funny, engaging, responsive, helpful, and fun. Website https://www.ataata.com
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls DDOS Security Brief Overview A10 Networks provides a range of network acceleration and application support products including security and DMZ optimization. Headquarters A10 Networks 3 West Plumeria Drive San Jose, California 95134 Tel: (408) 325 – 8668 Executives Lee Chen, Founder and CEO of A10 Networks, was also founding member of Centillion Networks, as well as holding management and technical positions at Apple Computer. Terrance Gareau, former Prolexic principal research scientist was hired by A10 Networks in 2014 to lead its DDOS research work. History Lee Chen and Raj Kumar founded A10 Networks in 2004. The company has grown to 600 employees and had an initial public offering (IPO) in March 2014 raising $187.5M. Key Competitors Blue Coat, F5 Products and Services A10 Networks provides network acceleration and optimization solutions which includes security and DMZ optimization capability. A10 Networks’ security solutions are based on the Thunder Threat Protection System (TPS), which offers firewall load balancing, DDOS mitigation, WAF, traffic steering, DNS application firewall (DAF) and SSL intercept. These security features are embedded into the A10 Networks Thunder platform. Website https://www.a10networks.com/
A3sec
Atlantic Data Forensics
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Security Information Event Management Brief Overview A3Sec provides a range of IT security solutions and professional services including security information event management (SIEM) capabilities from AlienVault. Headquarters A3Sec C/ Aravaca, 6 2° Piso Derecha 28040 Madrid, Espana Tel: +34 915330978 Executives Javier Lopez-Tello, Director TELDAT Group, was former Director General of AlienVault Spain and LATAM. History A3Sec was established in 2012 as a spin-off of AlienVault. The company is part of the TELDAT Group. Key Competitors Trustwave Products and Services A3Sec provides a range of professional services in the area of IT security and specifically SIEM solutions, with emphasis on AlienVault. A3Sec specialize in OSSIM-based open source SIEM capabilities using AlienVault’s platform. Services specifically are available in the following areas: • SIEM and network security products through partnerships with companies such as AlienVault • Monitoring and traffic visibility solutions • Professional services • Training and certifications Website https://www.a3sec.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics Brief Overview Atlantic Data Forensics provides data forensics, eDiscovery, cybercrime, and expert testimony services. Headquarters Atlantic Data Forensics 7310 Esquire CT Elkridge, MD 21075 Tel: (410) 540 – 9000 Executives Brian Dykstra, President and CEO of Atlantic Data Forensics, was the CIO and Director of Professional Education and a founding member of Mandiant. History Founded in 2007, the small data forensics company is headquartered in Columbia, Maryland. The company focuses on clients in the Baltimore, New York City, Washington, Philadelphia, Northern Virginia, and Washington areas. Key Competitors AccessData Products and Services Atlantic Data Forensics provides data forensics solutions in the following areas: • Digital Forensics • Cybercrime • eDiscovery • Expert Testimony Website https://www.atlanticdf.com
Atomicorp
Atredis Partners
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Atomicorp provides advanced security protections for Linux and Windows servers. Headquarters Atomicorp 14121 Parke Long Ct., Suite 220 Chantilly, Virginia 20151 Tel: (703) 299 – 6667 Executives Michael Shinn, former computer security and forensics expert for the White House, serves as CEO of Atomicorp. He was a contributor to NetRanger at WheelGroup. History Founded in 2007, Atomicorp is a privately held part of the Prometheus Global family, a cyber security consulting firm. Key Competitors Symantec, F-Secure Products and Services Atomicorp provides a set of server protections for endpoint operating systems including Linux and Windows. Features embedded in the product include security event log support, security rules support, automated reporting, and hardened operating system kernel functionality. Specific offerings include Atomic Secured for Linux, OSSEC Commercial, AS/L for Reverse Proxies, Nucleus PHP, Real-time Goroot, and ModSecurity Rules. Website https://www.atomicorp.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Security Consulting Brief Overview Atredis Partners provides software security research, embedded security, and penetration testing services. Headquarters Atredis Partners St. Louis, Boston, Houston, Tulsa Executives Josh Thomas, Founding Partners of Atredis Partners, was previously with Accuvant and MITRE. Nathan Keltner, Founding Partner of Atredis Partners, was previously with FishNet. Shawn Moyer, Founding Partner of Atredis Partners, was previously with Accuvant and IBM. Charles Holmes, Founding Partner of Atredis Partners, was previously with MITRE. History Founded in 2013, the founding partners are active in the hacking community with presentations at conferences such as BlackHat. Key Competitors NCC Group, Nisos Group Products and Services Atredis Partners provides security-consulting services in the following areas: • Software Security Research – Incudes software runtime and binary analysis, source code audit and code review, advanced Web application penetration testing, and mobile application penetration testing. • Embedded Security – Includes embedded security research, medical and embedded assessment, and smart grid penetration testing. • Advanced Penetration Testing – Includes red team penetration testing and attack simulation, advanced network penetration testing, and advanced host penetration testing. Website https://www.atredis.com/
atsec
AT&T
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Mainframe Security, Penetration Testing Brief Overview atsec provides laboratory and consulting services in the area of information security. Headquarters atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, Texas 78759 Tel: (512) 615 – 7300 Executives Sal la Pietra, President and CEO of atsec, was previously an executive with IBM, running the IBM European Security Center of Excellence in Munich. History Sal la Pietra, Staffan Persson, and Helmut Kurth founded atsec in 2000, and is headquartered in Austin, Texas with offices in Munich, Germany; Danderyd, Sweden; Bangkok, Thailand; and Beijing, China. Key Competitors IBM Products and Services The services provided by atsec can be grouped as follows: • Product Evaluation and Testing – Includes Common Criteria, FIPS 140-2 testing and consultation, cryptographic algorithm testing, Security Content Automation Protocol (SCAP), NIST Personal Identity Verification Program (NPIVP) testing, GSA Personal Identity Verification evaluation (FIPS 201), and Transport Worker Identity Credentials (TWIC) laboratory services. • Compliance and Audit – Includes ISO/IEC 27001, Open Trusted Technology Provider Standard (O-TTPS), and FISMA certification support. • Consulting and Training – Vendor test data for GSA FIPS 201, embedded systems, hardware security testing and analysis, mainframe penetration testing, PCI consulting, and training. Website https://www.atsec.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, DDOS Security, Email Security, Infrastructure Security, Network Monitoring, VPN/Secure Access, Mobile Security, Threat Intelligence, Penetration Testing, PCI DSS/Compliance, Information Assurance, Security Consulting, Security R&D Brief Overview AT&T is a major tier 1 global service provider offering a range of managed and network-based security services to business customers. Headquarters AT&T, 208 South Akard Street, Dallas, Texas 75202 Executives Randall Stephenson serves as Chairman and CEO of AT&T. John Donovan runs infrastructure and strategy for AT&T. Bill O’Hern serves as CSO of AT&T. History AT&T has always been a major player in cyber security with its responsibility to protect telecommunications infrastructure in the US. Its first foray into managed security came in the mid-1990’s with a managed firewall service. AT&T purchased Verisign’s professional service team focused primarily on payment card industry (PCI) compliance. Key Competitors Verizon, T-Mobile, Sprint Products and Services AT&T offers global security services to complement its ISP, mobility, and related services. AT&T offers a range of managed and network-based security services for businesses, government, and consumers in the following areas: • CPE MSS Services – Includes managed firewall, IDS/IPS, and related DMZ functions, usually as CPE appliances managed through the AT&T Global Customer Support Center (GCSC) in Raleigh, North Carolina. • Network-Based Security – Includes DDOS defense protections, Web security, Email security filtering, and network-based firewall services embedded in AT&T’s network service offerings including its enterprise VPN. • Threat Management Services – Includes the SETA (Security Event and Threat Assessment) service using AT&T’s data analysts. • Mobile Security – Includes pre-loaded Lookout security on Android mobile devices, as well as parental control services. • Secure Remote Access – Includes managed token authentication for two-factor security. • Security Professional Services – Emphasis on PCI compliance consulting. • Customized Cyber Security Solutions (Government) – Provided through a dedicated team of Government Solutions professionals. Website https://www.att.com/
Attachmate Now Micro Focus
(Alpha Version 0.1 – 09/01/16 – No Vendor Approval) TAG Cyber Controls Secure File Transfer, Mainframe Security Brief Overview Attachmate focuses on a variety of enterprise products and services, including its mainframe and secure file transfer tools. Headquarters Attachmate Corporate Headquarters 705 5th Avenue South Suite 1100 Seattle, Washington 98104 Tel: (206) 217 – 7100 Executives Jeff Hawn, Chairman and CEO of Attachmate, held previous senior executive positions at JMI and BMC. History Frank Pritt and Julia Pritt founded Attachmate in 1982 to focus on IBM terminal emulation. Over the next decade and a half, the company grew organically and through acquisition into one of the largest PC software companies in the world. The company suffered through the technology sector issues in 2001, and went through several rounds of reduction and divesting. Attachmate merged with Micro Focus in 2014. Francisco Partners, Golden Gate Capital, Elliott Management, and Thomas Bravo are investors in the Attachmate Group. Key Acquisitions NetIQ (2015) – IAM, Security Management Novell (2014) – Software Key Competitors IBM Products and Services Attachmate, and its owned MicroFocus, arranges its security offerings into the following groupings: • Centralized Security – Includes identity management, authorization, and other controls required for secure access to the mainframe • File Sync and Share – Provides tools for sharing files inside private clouds • Web Enablement – Includes tools for supporting Web enablement of in-house technologies Website https://www.attachmate.com/
Attack Research (Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Security Training, PCI DSS/Compliance Brief Overview Attack Research provides a range of security consulting, assessment, and training services. Headquarters Attack Research 30 Bonnie View Drive Los Alamos, New Mexico 87544 Tel: (505) 672 – 6416 [emailprotected] Executives Anothony Clark serves as CEO of Attack Research. History Val Smith founded Attack Research in 2008 after deciding to leave his previous malware research company. Attack Research Key Competitors Vulnerability Research Labs Products and Services Attack Research offers security professional services that can be grouped as follows: • Security Training • Security Assessment • Security Readiness • Security Response The company provides a collective umbrella for threat and vulnerability researchers to cooperate as a community. Website https://wwwattackresearch.com/
Attivo Networks
Auconet
(Alpha Version 1.0 – 09/5/17 – Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention Brief Overview Attivo Networks provides deception-based threat detection, attack analysis, forensics, and an incident response platform for automated threat blocking and quarantine. Headquarters Attivo Networks 47697 Westinghouse Drive Fremont, California 94539 Tel: (510) 623 – 1000 Executives Tushar Kothari, CEO of Attivo Networks, has twenty-five years experience in business and finance. Carolyn Crandall, CMO and Sarah Ashburn, SVP of Sales and Customer Success. History Founded in 2011, the company is headquartered in California with offices in Bangalore, India and Dubai, UAE. Bain Capital provided $8M in Series A funding in 2015. $15M in Series B round funding in 2017, made up by major investors including Omidyar Technology Ventures, Bain Capital Ventures, Trident Capital Cybersecurity and Macnica Ventures, a corporate venture arm of Macnica, Inc.. Key Competitors Illusive Networks, TrapX Products and Services
(Alpha Version 0.1 – 07/30/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Auconet provides a scalable ITOM platform called BICS that does not lock you into vendor specific engagements. Headquarters Auconet, Inc. One Market St. Spear Tower, 35th Floor San Francisco, CA 94105 Tel: 415 855-1000 Executives Frank Winter is the CEO of Auconet. History In 1998 a team of German Engineers with experience in IT Operations founded Auconet. Key Competitors ServiceNow BMC Software Products and Services Auconet BICS (Business Infrastructure Control Solution) provides visbility of your entire network, policy control, and granular control of infrastructure. The solution is scalable to over 1 million devices and can be deployed on premise, in the cloud, or in a hybrid network. Website https://auconet.com/
The Attivo Networks ThreatDefend™ Deception Platform uses deception decoys, luring techniques, and bait to deceive an attacker into revealing themselves, being scanned, and forensically analyzed. Features include: • Lateral movement and credential theft detection within user networks, data centers, cloud, and specialized environments such as ICS-SCADA, IoT, POS, telecom, and SWIFT environments • Detection for all threat vectors including targeted, stolen credential, Active Directory, man-in-the-middle, insider, and ransomware (detection and slowing of attack by 25X of a non-deception drive) • No signatures or database look up; zero day and new malware strains are efficiently detected; Agentless endpoint deception lures • Analysis engine analyzes attack, raises substantiated alerts and provides forensics and integrations with prevention systems to automatically block, quarantine, and threat hunt attackers. • ThreatPath assesses credential vulnerabilities, policies, and misconfigurations to show paths to critical assets • ThreatOps provides incident response playbooks; policy based work flow automation and response The Attivo Networks ThreatDefend Deception and Response Platform collects attack information from BOTsink attack analysis, SIEM, memory forensics, and other means to query suspect events and forensically analyze the attack. This supports accelerating incident response and forensics for corporate investigators and law enforcers, and supporting quarantine for IP with prevention system automation.
Website https://www.attivonetworks.com
Audit Square
Aujas Networks
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management, Governance, Risk, and Compliance Brief Overview Audit Square provides a Microsoft Windows security, configuration, and audit assessment tools for desktops and servers. Headquarters Audit Square – DCIT, a.s. Kodanska 1441/46 100 10 Praha 10 Czech Republic Tel: +420 234 066 115 Executives Karel Miko serves as Founder and Director at Audit Square. History Founded in 2013, Audit Square operates as DCIT and is headquartered in the Czech Republic. Key Competitors Microsoft, Symantec Products and Services Audit Square provides a tool for security auditors to assess security, configuration, and audit compliance of Microsoft Windows systems. Reports are generated for both desktops and servers in PDF and editable Office formats. Assessments are provided that are designed to include more detailed information than common vulnerability scanners. The tools is available for on-premise and public cloud-based enterprise deployment. Website https://www.auditsquare.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Vulnerability Management Brief Overview Aujas Networks provides security solutions in risk and vulnerability management, data protection, and identity and access management. Headquarters Aujas Networks Pvt. Ltd. #595, 4th Floor, 15th Cross 24th Main, 1st Phase, JP Nagar, Bangalore – 560 078 Aujas Information Risk Services – East Coast 2500 Plaza 5, Harborside Financial Center 185 Hudson Street Jersey City, New Jersey 07311 Tel: (201) 633 – 4745 Executives Srinivas Rao, co-founder and CEO of Aujas Networks, was previously executive director at Network Solutions and COO at NetSol Technologies. History Srinivas Rao, Sameer Shelke, and Navin Kotian co-founded Aujas Networks in 2008. The company received$3M in Series A funding from IDG Ventures India in 2008, additional $2.6M Series A funding from IDG Ventures India in 2011, and $5.4M in Series B funding from IvyCap Ventures, Rajasthan Venture Capital Fund, and IDG Ventures India in 2013. The company has grown to over 160 professionals supporting 300 clients in 23 countries. Key Competitors Information Risk Management, Next Labs Products and Services Aujas Network focuses on providing security solutions in risk and vulnerability management, data protection, and identity and access management. The company provides security risk management solutions in the areas of cloud (including a partnership with Amazon Web Services), mobile, open source, and applications for customers in the following areas: • Risk Management Frameworks • Identity Management and Data Protection • Privileged Identity Management • Secure Development and Release • Virtual Security Office • E-Factory • AppSec on Demand • RSA Archer Center of Excellence Website https://www.aujas.com/
Aura Information Security
Aurora Information Security & Risk
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, Penetration Testing Brief Overview Aura Information Security offers a range of information security consulting and managed security services for enterprise customers. Headquarters Aura Information Security 162 Victoria Street West Tel: +64 4 894 3755 Executives Scott Bartlett serves as CEO of Kordia. Peter Bailey serves as GM of Aura Information Security. History Andy Prow founded Aura in 2001 as a boutique Web development shop, focusing solely on information security since 2006. The company, with a staff of roughly 30, is headquartered in Wellington, New Zealand with offices in Auckland, New Zealand and Melbourne, Australia. Kordia acquired Aura Information Security in 2015 resulting in the leading New Zealand cyber security company. Key Competitors NCC Group Products and Services Aura Information Security provides a range of security consulting and resale services in the following areas: • Penetration Testing • Red Team, Code Review • Mobile Testing • Virtual Security officer • Incident Response • Security Training The company also provides managed security services, through the following platforms: • Redshield – DDOS and WAF protection for cloud Web applications • Redeye – Managed scanning service • Blackeye – Protection for Diverse DDOS (3DOS) Website https://www.aurainfosec.com/ https://www.kordia.co.nz/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Aurora Information Security & Risk provides a range of security consulting solutions for enterprise customers. Headquarters Aurora Information Security & Risk 45 Rockefeller Center 630 Fifth Avenue, 20th Floor New York, New York 10111 Tel: (212) 537 – 9397 Executives Matthew Ferrante, Founder of Aurora Information Security & Risk, was previously a Director with Barclays and also a former Special Agent with the US Secret Service. History Founded by Michael Ferrante and headquartered in New York, the company also has presence in London. Key Competitors Trustwave Products and Services Aurora Information Security & Risk provides a range of security consulting and DLP solutions for enterprise customers including the following: • Quick Read Expert Security Services – Identifies business risk • Business Asset Protection Assessment – Assesses control framework effectiveness • DLP, eDiscovery, and Red Team Services – External or in-source capabilities • Phoenix Security Assurance Program – Security plan assessment Website https://www.aurorasecurity.com/
Authentic8
Authentify
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Authentic8 uses cloud-based secure container technology to protect web apps for users and developers. Headquarters Authentic8 Inc. 1953 Landings Drive Mountain View, California 94043 Tel: (650) 409 - 6139 Executives Scott Petry, Co-Founder and CEO of Authentic8, was previously co-founder of Postini. History Scott Petry and Ramesh Rajagopal, both former Postini executives, founded Authentic8 in 2010. The firm remains private and is supported by funding from The Foundry Group. Key Competitors Invincea, Bromium Products and Services Authentic8 provides secure, controlled access to web aps and content for users and developers. It does so by providing a cloud-based browser that is disposable, and that leaves no residual evidence of data on the client device after a browsing session has closed. Authentic8’s product called Silo is a disposable, secure container for controlled access to web apps and content. The product includes support for single sign-on, as well as enforcement of security policies in a device independent manner. The product is positioned for two primary user communities. First, it is targeted for users of web apps, either inside an enterprise or on some cloud service. Second, it is positioned for web app developers who can publish their web app securely to device owners. The product is disposable, in the sense that the cloud-based virtual browser instance is discarded from the local device after the browsing session has completed. Website https://www.authentic8.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Authentify, part of Early Warning, provides telephony-based, out-of-band, multi-factor authentication for on-line services. Headquarters Authentify Inc. Headquarters 8745 West Higgins Road, Suite 240 Chicago, Illinois 60631 Tel: (773) 243 – 0300 Executives Peter Tapling, Co-Founder, President, and CEO of Authentify, held previous executive positions with Aurigin Systems and NetDox. History Peter Tapling co-founded Authentify in 1999. The company included celebrated hacker Kevin Mitnick in their RSA Conference booth in 2001 to market their new product. The company is headquartered in Chicago. It holds several key US and International patents. Early Warning, a risk and fraud prevention company, acquired Authentify in 2015. Key Acquisitions Hawk and Seal (2011) Key Competitors Duo Security, SecuTech Products and Services Authentify uses familiar telephony services to provide multifactor authentication for on-line services. Specifically, Authentify’s xFA product places telephone calls or sends SMS text messages to customer’s phones with the following capabilities: • Account Registration or Activation • Transaction Authentication • Order Confirmation • One-Time-Password (OTP) Issuance • Voice Biometric • Password Reset Website https://www.authentify.com/
AuthLite
AuthRocket
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview AuthLite provides Windows two-factor authentication using a USB key and associated password. Headquarters AuthLite, LLC 2605 Farragut Drive Springfield, Illinois 62704 Tel: (888) 449 – 2448 Executives Gregory Bell serves as Manager at Collective Software. History Part of Collective Software, the company is headquartered in Illinois. Key Competitors Duo Security, Authentify Products and Services Auth Lite, part of Collective Software, provides a two-factor authentication system that utilizes a small USB key along with an associated password. Users login by inserting the key and then offering an associated password. Enterprise security teams can replace their Windows enterprise password systems with this stronger authentication scheme. The solution integrates with Windows and can be deployed via Group Policy. No drivers are required because the AuthLite key emulates a USB keyboard. Website https://www.authlite.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview AuthRocket provides a user management API to support its authentication as a service. Headquarters AuthRocket P.O. Box 974 Littleton, Colorado 80160 Executives Tom Morgan heads up AuthRocket. History The company does not have much information available on the Internet about its location and history. Key Competitors Auth0, Stormpath Products and Services AuthRocket provides user management APIs that allow for authentication as a service capability. The user management APIs support development via a JSON-flavored REST API. Login pages can be hosted for customers, and social logins can be supported including Facebook and Google with only a couple of clicks. User management allows real time searches, management of user information, password resets, and many other functions. Website https://www.authrocket.com/
Authy
Auth0
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Authy provides a two-factor authentication solution for users, developers, and enterprise. Headquarters Twilio/Authy Headquarters 645 Harrison Street, Third Floor San Francisco, California 94107 Executives Daniel Palacio, Founder of Authy, previously worked for Microsoft on the Windows Security Team and at IOActive as a penetration tester. Jeff Lawson serves as CEO of Twilio. History Salesforce.com, Aaron Levie, Sam Yagan, CrunchFund, Startcaps ventures, Idealab, Winklevoss Capital, and AngelList originally backed Authy with $3.8M in funding. Twilio acquired the company in 2015. Key Competitors Duo Security, Authentify Products and Services Authy provides users with an app that offers a second factor token for stronger authenticated access to cloud, systems, and apps. The app requires that you enter your mobile phone number and to register an account via your email address. The company uses the mobile number to register a PIN. Once users invoke the app, tokens are automatically synchronized and downloaded for use. This process can be done for centralizing Google authenticator accounts, as well as Facebook and Dropbox. Website https://www.authy.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Two-Factor Authentication Brief Overview Auth0 provides a product that allows developers to add identity federation to their apps. Headquarters Auth0 HQ 10900 NE 8th St #700 Bellevue, WA 98004 [emailprotected] Executives Eugenio Pace, co-founder and CEO of Auth0, held several positions with Microsoft previously. History Eugenio Pace and Matias Woloski co-founded Auth0 in 2012 with the goal of democratizing identity federation for app developers. The company remains small with less than 10 employees. Key Competitors ForgeRock Products and Services Auth0 simplifies identity management by eliminating all friction in identity architectures. The Auth0 product offers the following attributes and features for app developers: • SSO for Enterprise Users – Allows for connecting to enterprise authentication systems. • SSO with Popular Apps – Supports Box, Dropbox, Salesforce, Office365, Google Apps, SharePoint, and other apps. • SSO for Social Users – Authenticates customers with Facebook, Twitter, Gmail, Live ID, LinkedIn, PayPal, GitHub, and other social services. • Auth0 as a Service – Auth0 can be run on Amazon, Azure, Heroku, Joyent, or other cloud providers. • Open SDK – Uses an open platform to federate apps with a few lines of code; supports ASP.NET, MVC, Webpi, Java, Ruby, iOS, Android, Windows, and Windows Phone. Website https://www.auth0.com/
Autonomic Software
Avanan
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Autonomic Software provides endpoint management and security plug-ins integrated with McAfee ePO to support update and patching. Headquarters Autonomic Software 4185 Blackhawk Plaza Circle suite 102 Danville, California 94506 Tel: (925) 820 – 8020 Executives Tony Gigliotti serves as President of North American Sales. History Founded in 2003, the company is headquartered in California with support for global sales. Key Competitors Tanium, Lumension Products and Services Autonomic Software provides endpoint management and security plug-ins integrated with McAfee ePO. The solution is available in four product options: • Patch and Application Manager – Patch compliance from a single console with reporting and support for third parties • Endpoint Manager – White listing, black listing, license management, access control, and other options • Power Manager – Reduces energy consumption Website https://www.autonomic-software.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview Avanon provides cloud access security for SaaS offerings including Office365, Google, and Box. Headquarters Avanan 242 W 30th St Suite 404 New York, New York 10001 Executives Gil Friedrich serves as CEO of Avanon. History Founded in 2014 by former members of Forescout, the company is dual headquartered in New York City and Tel Aviv. Key Competitors Symantec, Netskope Products and Services Avanon provides cloud security solutions as follows: • Shadow IT – Controls and manages access to public cloud services from the enterprise • Data Leakage – Real-time enforcement and prevention of acceidental sharing of confidential files • Antivirus Protection – Scans public cloud, email, and sharing traffic • Advanced Threat Protection – Protects enterprise from cloud via shared intelligence • Data Sanitization – Sanitizes files before they are opened to prevent malware • File Encryption – Controls and automates protection of files via SaaS encryption Website https://www.avanon.com/
Avast
Avatier
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools Brief Overview Avast provides an endpoint solution that includes Anti-Virus and related security functions. Headquarters Avast Software Trianon Office Building Budejovicka 1518/13a 140 00, Prague 4 Czech Republic Tel: 00 420 274 005 77 Executives Vincent Steckler, CEO of Avast since 2009, was previously Senior Vice President of Worldwide Consumer Sales at Symantec. History Avast traces its root to 1988, when Czech researchers Eduard Kucera and Pavel Baudis teamed up to combat the Vienna Virus. Twenty-five years later, the company claims 200 million PCs under its protection. Key Acquisitions Secure.me (2013) – Social Jumpshot (2013) – PC Performance Remotium (2015) – Enterprise mobility Key Competitors Kaspersky, Symantec, ESET Products and Services The mission addressed by Avast involves providing endpoint anti-virus and malware protection with emphasis on providing free anti-virus software around the globe. Avast’s suite of security solutions for desktop and mobile devices that can be grouped as follows: • Avast! Premier • Avast! Internet Security • Avast! Anti-Virus (Pro/Free) • Avast! Mobile Security • Avast! Mobile Backup • Avast! SecureLine VPN • Avast! Anti-Theft The company also offers a range of antimalware products for servers in the enterprise. The secure.me division of Avast focuses on securing social. The former Jumpshot product (renamed GrimeFighter) involves making PCs performance better. Website https://www.avast.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Password/Privilege Management Brief Overview Avatier provides identity management software, services, and audit controls for enterprise customers. Headquarters Avatier Corporation 4733 Chabot Drive Suite 201 Pleasanton, California 94588 Tel: (800) 609 – 8610 Executives Nelson Cicchitto, Founder, Chairman, and CEO of Avatier Corporation, History Nelson Cicchitto founded Avatier in 1995. The company has roughly one hundred employees, located in their San Ramon, California as well as in offices in Chicago, Illinois; Dallas, Texas; Dublin, Ireland; London, UK; Munich, Germany; New York, New York; Singapore; Sydney, Australia; and Alexandria, Virginia Key Competitors IBM, Oracle, CA Products and Services Avatier provides identity management software, services, and audit controls through the Avatier Identity Management Suite (AIMS), which includes functionality in the following areas: • User Provisioning – Includes the Identity Enforcer, which automated user provisioning, and the Group Requestor, which allows the business to request groups and members as required. • Access Governance – Includes compliance auditing functions, as well as the Group Enforcer, which automates group policy enforcement. • Service Catalog – Includes a service catalog to allow business users to request the services they need, as well as a workflow manager, which automates request approvals. • Password Management – Includes a password station to synchronize enterprise passwords, apply 2F, offer selfservice password resets, and provides for single sign-on. Website https://www.avatier.com/
Avecto
AvePoint
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Password/Privilege Management, Identity and Access Management, Endpoint Security Brief Overview Avecto focuses on providing Windows-based privilege management for desktops and servers. Headquarters Avecto Limited Building One Trident Business Park Styal Road Manchester Airport M22 5XB United Kingdom Executives Mark Austin, CEO of Avecto, previously held the CTO position at AppSense. History Mark Austin and Paul Kenyon founded Avecto after both men left AppSense. The company is headquartered in the UK and is registered in England and Wales. Avecto has offices in the US as well. Key Competitors CyberArk, Thycotic Products and Services Avecto focuses its Defendpoint products and associated services on helping organizations reduce the risk associated with their Windows environments. Avecto’s Privilege Guard provides enterprise class privilege management for Windows desktops and servers. The product integrates and is compatible with McAfee ePO as well as Microsoft SQL Reporting Services. Defendpoint is now available for Mac computers as well. Website https://www.avecto.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance, Secure File Sharing Brief Overview AvePoint provides governance, risk, and compliance solutions for Microsoft enterprise and cloud deployments. Headquarters AvePoint US Headquarters Harborside Financial Center, Plaza 10 3 Second Street, 9th Floor Jersey City, New Jersey 07311 Tel: (201) 793 – 1111 Executives TJ Jiang serves as cofounder and co-CEO of AvePoint. He publishes a blog on the company’s Website. History Co-founded by Kai Gong and TJ Jiang in 2001, the company has grown into a large, global corporation. AvePoint remains privately held and is backed by Goldman Sachs. The company has US offices in Bellevue, Campbell, Chicago, Irving, Richmond, Washington, Toronto, and Ottawa. It also has substantive presence in Europe, Middle East, Africa, Asia, and Australia. Key Competitors Vera, Sophos Products and Services Avepoint provides a range of governance, risk, and compliance solutions for Microsoft enterprise and cloud deployments. Focus includes SharePoint and Office 365. Specific products include: • AvePoint Compliance • AvePoint Hybrid Management • AvePoint Mobility & Productivity • AvePoint Online Services • DocAve Governance Automation • DocAve Software Website https://www.avepoint.com/
AVeS
AVG
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Security Consulting Brief Overview AVeS provides a range of IT consulting focused on digital information and information security. Headquarters AVeS First Floor, Unit A4 & A5 White Thorn Office Park 606 Kudu Street Allen’s Nek, 1737 Johannesburg Tel: +217 11 475 2407 Executives Charl Ueckermann serves as Managing Director of AVeS. History AVeS is headquartered in Johannesburg and provides services to clients across South Africa. Key Competitors Cyber Security Africa Products and Services AVeS provides consulting services that include information security offerings as follows: • Endpoint Security • Perimeter Security • Database Security • Vulnerability Assessment • Penetration Testing • Security Architecture and Compliance The company maintains partnerships with security technology companies such as Symantec, McAfee , Barracuda, Panda Security, VMware, Microsoft, Dell, Trustwave, SolarWinds, Ruckus, Kaspersky, ESET, IP-Guard, and MiFi. AVeS offers a range of training and boot camp services including ESET remote administration. Website https://www.aves.co.za/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools, Mobile Security Brief Overview AVG provides anti-virus and malware protection for PCs and mobile devices. Headquarters AVG Technologies, N.V. Headquarters Gatwickstraat 9 – 39 1043 GL Amsterdam Netherlands Executives Gary Kovacs, CEO of AVG, was previously CEO of Mozilla, where he led the development of the Firefox browser. History AVG was founded in 1991, and has grown to more than 1000 employees in fourteen offices worldwide (US, Germany, Czech Republic, France, and Ireland) supporting over 177 million users. Key Acquisitions PrivacyChoice (2013) Key Competitors Intel, Trend Micro, Kaspersky Products and Services AVG provides privacy, protection, and performance support for PCs, Macs, and mobile devices. AVG’s Anti-Virus and Internet security products can be grouped as follows: • AVG Products for the PC – This suite includes AVG AntiVirus, AVG Internet Security, AVG PC TuneUp, and AVG PrivacyFix. The company offers a popular free Anti-Virus solution for PCs. • AVG Products for the Mac – Suite includes AVG Cleaner for Mac, AVG Anti-Virus for Mac, and AVG PrivacyFix. • AVG Products for Mobile and Tablet – Suite includes apps for Android, iOS and Windows mobile. The company also provides business edition solutions including file server security and a managed workplace product. AVG products are supported through research and development in AVG Labs. Website https://www.avg.com/
Avira
Avnet
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools, Endpoint Security, Mobile Security Brief Overview Avira provides anti-virus and malware protection for home and business computer systems. Headquarters Avira Operations GmbH & Co. KG Kaplaneiweg 1 | 88069 Tettang | Germany Tel: +49 (0) 7542-500 0 [emailprotected] Executives Travis Witteveen, CEO of Avira since 2013, was previously COO of Avira as well as SVP of Sales and Global Operations at F-Secure. History Tjark Auerbach founded Avira in 1986, presumably in a garage in Germany. To this day, he remains the majority shareholder in the private company. Over the years, Avira has grown to one of the largest anti-virus companies in the world with 100 million users and 500 employees worldwide. Key Competitors Kaspersky, Symantec, Trend Micro Products and Services Avira provides anti-virus solutions for home and business users. The Avira Anti-Virus product suite can be grouped as follows: • For Personal Use – This includes the Avira Internet Security Suite, Avira Family Protection Suite, and System Speedup. Avira offers a free product for download as well. • For Business Use – This includes Avira Professional Security, Avira Endpoint Security, and Avira Small Business Security Suite. All offers include workstation protection, with different levels of support for servers and email. Avira offers VPN and Vault solutions for iOS and Android. The company performs R&D in its Avira Virus Lab. Website https://www.avira.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing, PCI DSS/Compliance Brief Overview Avnet provides security-consulting services with emphasis on helping companies secure their databases. Headquarters Avnet 46 Ha’Macabim Road Rishon Le-Tzion P.O. 16027, zip 75060, Israel Tel: 972 – 3 – 9560074 [emailprotected] Executives Igal Cohen, CEO of Avnet, was former CEO of Xor Technologies, as well as serving as Lieutenant Colonel in the IDF Intelligence computer center. History Arie Hasson, current Director of Avnet, founded the company in 1999. The company employs a growing set of security professionals and is headquartered in Israel. Key Competitors Comsec Consulting, BugSec Products and Services Avnet focuses its security consulting services on compliance, data breach prevention, penetration testing, application security, system infrastructure, PCI DSS compliance, ISO 27799 Health Informatics, and IT projects security. Avnet maintains an Attack Team to support its testing activity. Website https://www.avnet.co.il/
Axiomatics
AxonAI
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Axiomatics provides a suite of attribute-based access control and dynamic authorization solutions based on the XACML 3.0 standard. Headquarters Axiomatics AB Box 2157 103 14 Stockholm Visiting Address: Västmannagatan 4 11124 Stockholm Tel: +46 (0) 8 515 10 240 Executives Niklas Jakobsson serves as the CEO. Niklas has over 15 years of experience at various companies including Sun Microsystems. History Babek Sadighi founded Axiomatics in 2006. It remains privately held and is supported by funding from the Swedish technology investment firm Monterro. Key Competitors Jericho Group Products and Services Axiomatics provides XACML (eXtensible Access Control Markup Language) 3.0-based access control and authorization solutions to enterprise customers. Axiomatics offers its solutions via its Policy Management Suite, consisting of the following three main components: • Axiomatics Policy Server (APS) – This is the access control system that allows users to manage, simulate, and enforce policies written in XACML. • Axiomatics Policy Auditor (APA) – This component includes a web-based interface for analyzing policies via an audit and validation process. • Axiomatics Reverse Query (ARQ) – This component is designed to make XACML policy-based authorization decisions easier for huge data sets. This component aligns the Axiomatics Policy Management Suite with Big Data applications. Axiomatics Professional Services – Axiomatics offers a range of professional services for developers and users interested in XACML-based solutions. Website https://www.axiomatics.com/
(Alpha Version 0.1 – 06/25/17 - No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Axon Ghost Sentinel provides artificial intelligence-based “swarm technology” with applicability to anomaly detection, situational awareness, and monitoring. Headquarters AxonAI, Inc. 2 South Main St, Suite 501 Harrisonburg, VA 22802 Executives Mark Slonecker serves as President and CEO of AxonAI. History Originally, Axon Ghost Sentinel (AGS) the company shifted its emphasis to artificial intelligence-based analytics. Key Competitors Palantir Products and Services AxonAI provides artificial intelligence-based solutions in the following areas: • Axon:OS – Provides a single computational engine for information decision making • Axon:Investigation – Provides knowledge extraction for human machine collaboration • Axon:Risk – Supports rick profiles for real time data Website https://www.axonai.com/
Axxum Technologies
Axway
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions, Information Assurance, Security Consulting Brief Overview Axxum Technologies is an IT security services and solutions company focused on government customers. Headquarters Axxum Technologies LLC 8300 Greensboro Drive Suite 800, #166 McLean, Virginia 22102 Tel: (703) 287 – 8757 Executives Martha Mims serves as Owner and CEO of Axxum Technologies since 2006. History Axxum Technologies, established in 2006, is a woman-owned, small, disadvantaged business (SDB) and 8(a) certified company located in the Washington, DC area. Key Competitors AssurIT, Veris, CyberData Products and Services Axxum Technologies provides a range of IT solutions including the following focus areas: • Cyber Security Services • Risk Management • Information Assurance • IV&V • Systems Engineering • Help Desk Support The company is both SBA certified, as well as ISO 9001:2008 certified and services GSA, DHS, and other Federal oriented clients. Website https://www.axxumtech.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing Brief Overview Axway provides a suite of solutions that govern and secure the flow of data across the enterprise, B2B communities, cloud infrastructure, and mobile devices. Headquarters Axway 6811 East Mayo Boulevard Suite 400 Phoenix, Arizona 85054 Tel: (480) 627 – 1800 Executives Christopher Fabre, serves as CEO of Axway. History Axway focuses on Digital Business Enablement. It was founded in 1996 as a spin-off from the Sopra Group. The company, which employs 1,650 people in 20 countries worldwide, and reported $230M revenue in 2008, is registered in France, and headquartered in Arizona. The company trades on Euronext. Key Acquisitions Cyclone Commerce (2005) Actis (German subsidiary of Atos Origin) (2006) Tumbleweed Communications Corporation (2008) Key Competitors Accellion Products and Services Axway focuses on securing and governing the flow of data in the context of business interactions. Axway’s product suite can be grouped as follows: • Axway 5 – This suite provides governance of data flow across partner communities, within the enterprise, in the cloud, and between mobile devices with emphasis on integration, API management, community management, visibility, policy, identity management, and security compliance. The suite includes Axway Sentinel. • Axway Cloud Services – Axway serves as a data flow broker in the context of cloud infrastructure. • Axway API Management Solutions – Addresses API management and governance including support for analytics. • Axway API Gateway – Provides comprehensive API security and identity management with support for audit, monitoring, and reporting. Website https://www.axway.com/
Azorian Cyber Security
BAE Systems
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Digital Forensics Brief Overview Azorian Cyber Security provides a range of cyber security services for enterprise customers. Headquarters Azorian Cyber Security 1824 Woodmoor Drive Suite 101 Monument, Colorado 80132 Tel: (877) 321 – 9360 Executives Charles Tendell, Founder and CEO of Azorian Cyber Security, is a decorated Iraqi War Veteran, and co-host of a syndicated radio show called “Computer America.” History Founded by Charles Tendell in 2012, Azorian Cyber Security is headquartered near Denver and serves customers across the United States. Key Competitors Denver Cyber Security Products and Services Azorian’s provides cyber security services in the following areas: • Penetration Testing – Includes offensive security, compliance testing, and corporate active defense. • Threat Intelligence – Includes actionable cyber security threat intelligence reports for customers • Training – Cyber security training for enterprise customers • Computer Forensics – Forensic support • Reputation Management – Management of reputation on social networks, blog platforms and other online forums • Consumer Security – Includes a range of security services for individual consumers. Website https://www.azoriancybersecurity.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Information Assurance, Threat Intelligence, PCI DSS/Compliance Brief Overview BAE Systems Inc. offers cyber security and information assurance solutions, with the Department of Defense as a major customer. Headquarters BAE Systems Inc. (US) Farnborough, United Kingdom Tel: (301) 838 – 6000 Executives Jerry DeMuro serves as Managing Director of BAE Systems Inc. History BAE Systems Inc. is a subsidiary of the British multinational defense, security, and aerospace company BAE Systems plc. Detica was formed in 1971 as Smith Associates, focused on defense matters for the UK Government. It was renamed Detica in 2001 and acquired by BAE systems in 2008. Key Acquisitions Detica (2008) OASYS (2010) Stratsec (2010) Norkom Technologies (2011) ETI/AS (2011) – Communications Security SilverSky (2014) – Email and network security Key Competitors Boeing, SAIC Products and Services BAE Systems focuses on providing multinational defense, security, and aerospace solutions including cyber security. BAE Systems’ Detica Applied Intelligence unit provides cyber security solutions focused on secure mobility, consulting, IT security, risk and compliance, and Big Data security in the following areas: • CyberReveal – Involves cyber security monitoring solutions for malicious threats. • NetReveal – Involves enterprise risk management to detect insider and fraud activity. • SecureServe – Involves encrypted, filtered, secure data sharing across the enterprise. • DataRetain – Involves compressed, secure storage of data. • StreamShield – Business intelligence and content filtering solution for ISPs. Website https://www.baesystems.com/
Baffle
BalaBit
(Alpha Version 0.1 – 07/30/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview Baffle seeks to provide encryption on data at all times including the times when the data is being processed. Headquarters 3945 Freedom Circle, Suite 540 Santa Clara, CA 95054 Executives Ameesh Divatia serves as the CEO of Baffle. Products and Services The BaffleShield is delivered as a cloud centric service where it can manage all aspects of enterprise data encryption including key management. The goal of this product is to make data breaches irrelevant by keeping data encrypted at all times. Even if stolen with legitimate IT credentials the encrypted data would be useless to the hacker. The backbone of this service is patent-pending technology that allows arbitrary computation on encrypted data. Website https://baffle.io/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring, Security Analytics Brief Overview BalaBit offers real-time, intelligence-based network security analytics. Headquarters BalaBit Aliz Street 2. H-117 Budapest Tel: +36 30 594 4277 US Address: 5 Penn Plaza, 19th Floor New York, NY 10005 Executives Zoltan Gyorko, Co-Founder and CEO of BalaBit, worked as a system administrator and project manager at BalaBit, and led the Hungarian Linux User Group for three years. History A group of six Hungarian individuals founded BalaBit in 1996 to build an application layer firewall called Zorp. Success with the product led to more products and expansion into other countries, including a subsidiary office in Munich. Key Competitors LogRhythm Products and Services BalaBit provides leading products globally in the areas of activity monitoring, trusted logging, and proxy-based application gateways. BalaBit’s products can be grouped as follows: • Contextual Security Intelligence Suite – Includes tools for detecting, investigating and responding to threats in real-time based on user and risk intelligence. • Blindspotter – Tool for real-time user behavioral analytics and real-time prevention of malicious activities (Shell Control Box). Website https://www.balabit.com
Bambenek Consulting
Bandura
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Bambenek Consulting provides a range of cybersecurity consulting including IT forensics. Headquarters Bambenek Consulting 313 N Mattis Ave. Suite 113A Champaign, Illinois 61821 Tel: (217) 493 – 0760 Executives John Bambenek serves as Founder and Chief Forensic Examiner of Bambenek Consulting. He began his career at Ernst & Young. History Founded in 2011, the company is located in Champaign and Schaumburg. Key Competitors Trustwave Products and Services Bambenek Consulting provides IT and security consulting that includes the following: • IT Incident Response • Cybercrime Investigations • Digital Forensic Examination • Malware Analysis • Risk Assessments • Cybersecurity Intelligence • Vulnerability Analysis • Penetration Testing • Web Application Vulnerability Checking • Managed Security Services • Firewall and IDS • Wireless Network Auditing Website https://www.bambenekconsulting.com/
(Alpha Version 0.1 – 07/30/17 – No Vendor Approval) TAG Cyber Controls IDPS, NAC, Security Training Brief Overview Bandura provides a product that they call “the firewall’s firewall” which improves your network’s ability to filter attacks. Headquarters Bandura Systems 8 Market Place, suite 300 Baltimore, MD 21202 Executives Suzanne Magee serves as the CEO of Bandura. History Bandura was founded by Suzanne Magee after she had spent over 15 years providing cyber security support for the federal government. Key Competitors SolarWinds Products and Services Poliwall provides more advanced filtering than your standard firewall to help reduce the encumberance your firewall is subjected to by the sheer volume of threats. It also provides an easy way to block entire country IP ranges. Policloud provides the Poliwall services in a cloud environment. Website https://bandurasystems.com
Banff Cyber
Barclay Simpson
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Web Security Brief Overview Banff Cyber provides a solution for Web defacement along with complementary security consulting offers. Headquarters Banff Cyber 79 Ayer Rajah Crescent #01-03 Singapore 139955 Tel: +65 6710 5128 Executives Matthias Chin, Founder of Banff Cyber, worked previously for Pacific Internet, Singapore Computer Systems, ST Electronics, and Cisco. History Founded by Mattias Chin in 2012, the privately held company is headquartered in Singapore. Key Competitors Sucuri Products and Services Banff Cyber provides a Web defacement product called WebOrion that addresses the problem of Website hacking. The solution polls a URL and downloads HTML for signs of defacement. The company also offers a range of security consulting that includes training, cyber security strategy, security operations, vulnerability assessment, and incident response. Website https://www.banffcyber.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Barclay Simpson provides IT security and audit search and recruitment services in the UK and around the world. Headquarters Barclay Simpson Bridewell Gate 9 Bridewell Place London EC4V 6AW United Kingdom +44 (0) 20 7936 2601 New York: (212) 786 - 7490 Executives Adrian Simpson serves as Managing Director of Barclay Simpson in London. History Barclay-Simpson has offices in London, Hong Kong, Singapore, Dubai, and New York with clients located across the world. Key Competitors TriSecure Products and Services Barclay Simpson provides search and recruitment services in the UK with emphasis on internal audit, market risk, resilience, IT audit, compliance, legal, Op risk, financial crime, treasury, credit risk, information security, corporate security, technology risk, and IT/cyber security. Website https://www.barclaysimpson.com/
Barkly
Barracuda Networks
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Barkly provides an endpoint security solution that collects real time data to prevent malware attacks. Headquarters Barkly Protects Inc. 115 Broad Street 5th Floor Boston, Massachusetts 02110 Tel: (617) 488 – 9400 Executives Mike Duffy serves as CEO of Barkly. History Jack Danahy and Mike Duffy co-founded Barkly in 2013. The company is headquartered in Boston. Barkly obtained $12.5M in venture funding in 2015 in a round led by New Enterprise Associates. Key Competitors Intel, Cylance Products and Services Barkly offers an endpoint security solution called endpoint inoculation, which focuses on stopping malware from infecting user systems. The Barkly agent is downloaded to the target endpoint system and the software provides real-time protection. The software pulls real-time data from the user space, operating system, and data being passed to the CPU for evidence of compromise. The Barkly Rapidvisor uses technology to protect itself from attempts to modify its location on disc and memory. Website https://www.barkly.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform, Email Security, Web Application Firewall, Unified Threat Management, Web Security, VPN/Secure Access Brief Overview Barracuda Networks offers enterprise email security, web security, and traditional and next-generation firewall and SSL/VPN products with emphasis on small and medium businesses. Headquarters Barracuda Networks 3175 Winchester Boulevard Campbell, California 95008 Tel: (408) 342 – 5400 Executives William “BJ” Jenkins, President and CEO of Barracuda Networks since 2012, was previously President of EMC’s Backup Recovery Systems (BRS) Division. History Zachary Levow, Dean Drako, and Michael Perone co-founded Barracuda Networks in 2002. After a decade of both organic and acquisition growth in the security space, with funding from Focus Ventures, Sequoia Capital and Francisco Partners, the company went public in 2013. Key Acquisitions SignNow (2013) Purewire (2009) Yosemite Technologies (2009) BitLeap (2008) Netcontinuum (2007) Key Competitors CheckPoint, Palo Alto Networks Products and Services Barracuda products are grouped into security, storage, and application delivery categories. The Barracuda appliance and cloud-based security product and service offerings, designed with the needs of small and medium businesses in mind, can be grouped as follows: • Email Security – This product includes the Barracuda Spam Firewall and Barracuda Email Security Service. • Web Security – This product includes Barracuda Web Filter and Barracuda Web Security Service. • Network Security – This includes the Barracuda family of firewalls including its Next Generation and SSL VPN products. • Application Security – This includes the Barracuda Web Application Firewall product. Website https://www.barracudanetworks.com/
Bastille
Bay Dynamics
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Wireless Security Brief Overview Bastille provides a solution for scanning enterprise wireless air space for airborne threats with emphasis on IoT security. Headquarters Bastille Networks 1000 Marietta Street, #224 Atlanta, Georgia 30318 Tel: (800) 530 – 3341 Executives Chris Risley, serves as CEO of Bastille, was formerly CEO of Defense.net. History Founded in 2014 by Chris Rouland, the company received $11.5M in venture funding through three rounds from seven investors including Bessemer Venture Partners, Christopher Rouland (Founder), David Cowan, John Huntz, Tom Noonan, and Keel Funds. Key Competitors Asgard, RF Security Group Products and Services Bastille offers a solution for monitoring the air space of an enterprise looking for evidence of airborne threats such as blacklisted programs like spyware. The method uses proprietary software and sensor technology to scan air space and provide visibility for security teams into every emitting device on a premise. The approach is intended to prevent RF data leakage and to provide a solution for all mobile and IoT devices to ensure proper protection of enterprise data. Website https://www.bastille.io/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Bay Dynamics provides solutions for creating actionable risk intelligence from collected enterprise security data. Headquarters Bay Dynamics – San Francisco 595 Market Street, Suite 1300 San Francisco, California 94105 Bay Dynamics – New York 99 hudson Street, 6th Floor New York, New York 10013 Tel: (415) 912 – 3130 Executives Ferris Rifai is Co-Founder and CEO of Bay Dynamics. History Ferris Rifai and Ryan Stolte co-founded Bay Dynamics in 2001. The private company has offices in San Francisco and New York. The company raised $8M of Series A funding from Comcast Ventures in 2014. Key Competitors Click, RiskLens Products and Services Bay Dynamics’ security analytics products can be grouped as follows: • Risk Fabric – Designed to work with existing security monitoring systems adding intelligence, contextual analysis, and behavioral risk scoring to track meaningful deviations from the norm in order to alert enterprises to indicators of compromise and potential breach. The system works with RSA Archer, CA, Lookingglass, FireEye, HPE, McAfee , Microsoft, Qualys, RedSeal, RSA, Symantec, Veracode, and Websense. • IT Analytics Server – Provides a browser and device independent HTML Cube Browser for visualizing and interacting with data indexed by OLAP cubes. • IT Analytics for Symantec – Includes support for Symantec endpoint protection and other products. Website https://www.baydynamics.com/
Bayshore Networks
Beachhead
(Alpha Version 1.0 – 09/05/17 – Vendor Approval) TAG Cyber Controls ICS/IoT Security Brief Overview Visibility, control, and protection for industrial Operational Technology. Incorporating threat intelligence, and deep filtration, Bayshore parses OT protocol content and context, validating commands and parameters. Bayshore can allow, alert, and/or enforce policy at line speed – allowing whitelisted communication while blocking or modifying unauthorized communication and commands. Headquarters Bayshore Networks Two Democracy Center 6903 Rockledge Dr. Suite 910 Bethesda, MD 20817 Tel: (301) 493-5424 Executives Michael Dager serves as CEO of Bayshore Networks. He was previously CEO of Arxan Technologies, which provides mobile device security solutions. Francis Cianfrocca serves as Founder and Chief Scientist of Bayshore Networks. History Bayshore incorporated in 2012 with a round of seed funding from high net worth individuals and a billion-dollar hedge fund. In 2016, the Company received Series A financing from Trident Capital Cybersecurity, Yokogawa, Samsung Next, and GGV Capital. Key Competitors Claroty, GE Wurldtek, Radiflow, Waterfall Products and Services Bayshore’s Industrial Cyber Protection Platform provides Visibility, Protection, and Connection capabilities and features in a single tightly integrated, extensible and scalable architecture including: • Discovery – automated identification and inventory of OT environment delivers visibility and reporting • Detection – real-time monitoring and deep content filtration of industrial protocols identifies anomalies and policy violations • Prevention – active alerting and optional blocking of offending communication and commands prevent cyber threats from affecting targeted objects and data • Optimization - Conversion of industrial data into formats consumable by business analytics • Innovation – Extending protection outside the plant, Bayshore can establish trusted communication channels with outside entities Website https://www.bayshorenetworks.com/
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Mobile Security Brief Overview Beachhead Solutions provides subscription services to secure and manage mobile devices through a Web-based interface. Headquarters Beachhead Solutions 1150 S. Bascom Avenue, STE 7 San Jose, California 95128 Tel: (408) 496 – 6936 Executives Jim Obot, Co-Founder and CEO of Beachhead Solutions, previously led two companies: fusionOne and Omnisky. History Co-founded by Jim Obot in 2003, the small private company is headquartered in San Jose. Key Competitors MobileIron Products and Services Beachhead Solutions provides subscription services to secure and manage mobile devices through a Web-based interface. Beachhead Solutions offers its SimplySecure product suite, which is grouped as follows: • SimplySecure Management System • SimplySecure Phones and Tablets • SimplySecure PCs and Macs • SimplySecure USB Storage The platform includes a configurable Web-based mobile device management (MDM) tool to secure the mobile devices in an organization, including BYOD. The product offers password and security policy enforcement, encryption, status and risk reporting, data access elimination data wipe, and security response. Website https://www.beachheadsolutions.com/
Bee Ware
Behaviosec
(Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls Web Application Firewall Brief Overview Bee Ware offers a Web application firewall (WAF), application filtering, intrusion prevention, and authentication management system. Headquarters Bee Ware SA 6 rue de la Cristallerie 92310 Sèvres France Tel: +33 (0)1 74 90 50 90 Executives Marc Vaillant, CEO of Bee Ware since 2010, was previously CEO of Criston Software as well as Vice President of HP’s European Business Unit. History Bee Ware has been located in France since 2002, and the private company has received funding from Sofinnova Partners and Amundi Private Equity Funds. DenyAll acquired Bee Ware in 2014. Key Competitors Barracuda Networks Products and Services Bee Ware provides security solutions that focus on Web applications. This is accomplished via a WAF product and supporting features on a common iSuite platform. Bee Ware’s Web security products and services are based on the iSuite security Platform and include the following features: • Web Application Firewall (WAF) • Web Services Firewall • Wen Access Management • Common Correlation and Computational Platform • iSuite for Amazon Web Service (AWS) Website https://www.bee-ware.net/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Behaviosec provides a biometric authentication solution based on behavioral attributes such as typing and clicking patterns. Headquarters Behaviometrics AB Västra Trädgårdsgatan 11 111 53 Stockholm, Sweden US Headquarters in Palo Alto – [emailprotected] Executives Neil Costigan, CEO of Behaviosec, was co-founder and CTO at Celo Communications and VP at GEMPLUS. History Olov Renberg, and Peter Nordstrom co-founded Behaviosec in 2007 from research at Sweden’s Lulea Technical University. Conor Venture Partners, Partner Invest Norr, and other seed investors provided a round of venture funding in 2011. The eleven-person company was one of the seven start-ups in the first edition of Accenture’s FinTech Lab in 2013. It is located in Lulea with presence in Stockholm, US, and Germany. Key Competitors Balabit, SecureAuth Products and Services Behaviosec’s biometric authentication products can be grouped as follows: • BehavioAion – Provides continuous and active behavioral authentication for enterprise users that adapts to usage and is transparent. • BehavioMobile – Provides biometric behavioral authentication to mobile apps with simple integration. • BehavioWeb – Provides continuous verification for protected Web sign-in and transactions to reduce fraud and support forensics. Website https://www.behaviosec.com/
Belkasoft
Bell Canada
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics Brief Overview Belkasoft provides digital forensic investigations software solutions for law enforcement, military, and business. Headquarters Belkasoft Lunacharskogo 33 Off. 14N St. Petersburg, 198207 Russian Federation U.S 1016 Middle Ave #6 Menlo Park CA 94025 Executives Yuri Gubanov serves as CEO and Owner of Belkasoft. History Founded in 2002, the company is headquartered in Russia. Key Competitors Guidance Software, Kaspersky Products and Services Belkasoft provides digital forensic investigations software solutions for law enforcement, military, and business. The Belkasoft Evidence Center and Belkasoft Acquisition and Analysis Suite products offer support for collecting and analyzing digital evidence. Belkasoft analyzes hard drives, live RAM captures, page and hibernation files, Windows registry, virtual machine content, forensic disk images, Android, iOS, , UFED, JTAG, and chip-off dumps. Belkasoft offers its own BlackBerry scripting language, generates reports, and also covers many user endpoint software agents including browsers, email, games, etc. Website https://www.belkasoft.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, DDOS Security, PCI DSS/Compliance Brief Overview Bell Canada offers a full range of wired and wireless telecommunication services, including managed security. Headquarters Bell Canada Corporate Office Headquarters 1000 Rue De La Gauchetiere Ouest Bureau 3700 Montreal, QC H3B 4Y7 Canada Tel: (866) 317 – 3382 Executives George Cope serves as President and CEO of Bell Canada. History The Bell Canada Company was established in 1880, and remains the largest communications company in Canada. Key Competitors Rogers, Verizon, AT&T Products and Services In addition to telecommunications services, the managed security portfolio of Bell Canada addresses the needs of small, medium, and large businesses and includes the following: • Email and Web Security – Detects and mitigates threats and viruses in email and web-based content. • Consulting and Professional Services – Provides expert assistance to business with cyber security challenges. • Managed Firewall Services – Provides a managed premise-based firewall along with comprehensive management and monitoring. • Managed Network Security For Content – Involves monitoring of content traveling through a customer’s network for evidence of malicious attack. • Managed DDOS Protection Service – Provides networkbased protection from DDOS attacks. Website https://www.bell.ca/
Benchmark Executive Search (Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Benchmark Executive Search provides search and recruiting services with focus areas in cyber security. Headquarters Benchmark Executive Search 1984 Isaac Newton Square Reston, Virginia 20190 Tel: (703) 728 - 8506 Executives Jeremy King serves as President and Co-founder of Benchmark Executive Search. History Benchmark Executive Search was co-founded by Jeremy King in 2007. Key Competitors Alta Associates Products and Services Benchmark Executive Search provides search and recruiting services with practices in the following areas: • Cyber Security – Includes IT and physical security. • Secure Communications – Includes telecommunications and networking • Government Contractors and System Integrators • Big Data Analytics and Cloud Website https://www.benchmarkes.com/
BETTER (Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview BETTER provides mobile security and mobile app security protection through a lightweight endpoint agent. Headquarters BETTER Mobile Security Inc. 79 Madison Ave, 2nd Floor New York, New York 10016 Tel: (877) 710 – 5636 Executives Senai Ahderom, Co-founder and CEO of BETTER, is a graduate of Yale University. History BETTER was founded by Azi Cohen and Senai Ahderom cofounded BETTER. The company is headquartered in New York with an office in Stamford, Connecticut. It received $2.51M in two rounds from three investors including HBS Alumni Angels, Laconia Ventures, and New York Angels. Key Competitors Lookout, MobileIron Products and Services BETTER provides mobile endpoint management and security protection through a lightweight agent on the device. The agent checks all inbound and outbound traffic for evidence of threats. Specific products offered by BETTER include: • Real Time Threat Prevention • Mobile App Analyzer • Mobile App Shield • Mobile Device Configuration Control The BETTER capability is targeted for IoT, enterprise, and consumer markets to reduce mobile security risk. Website https://www.better.mobi/
Beyond Security
BeyondTrust
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management, Application Security Brief Overview Beyond Security provides a range of vulnerability assessment and security testing solutions for networks, applications, systems, and software. Headquarters Beyond Security Headquarters 19925 Stevens Creek Boulevard Cupertino, California 95014 Tel: (408) 329 – 6041 Executives Aviram Jenik, CEO of Beyond Security, has seventeen years of experience in computer security, including team and project leadership roles in several start-ups before co-founding Beyond Security. History Aviram Jenik and Noam Rathaus co-founded Beyond Security in 1999. The SecuriTeam group within Beyond Security quickly established a reputation through its popular Website that offers details on vulnerabilities. The privately held company, which recently reported roughly 30 employees, is headquartered in California with its R&D center in Israel. Key Competitors Lumeta, Tripwire, Intel, Symantec Products and Services Beyond Security provides solutions for organizations to identify, assess, and manage vulnerabilities and weaknesses in its networks, applications, systems, and software. Beyond Security’s security solution offerings for vulnerability and security test and assessment, including tools for security fuzz testing, can be grouped as follows: • Network Testing – Includes the AVDS automated scanning tool for network vulnerability management based on information and capabilities provided by the Beyond Security’s SecuriTeam. • Software Testing – Includes the beSTORM platform for assessing the security of software. • Web Application Scanning – Includes the WSSA (Web Server Security Assessment) tool. • Compliance Services – Focuses on PCI compliance requirements. • MSP Services - Focuses on solutions in support of Managed Security Service providers. Website https://www.beyondsecurity.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Password/Privilege Management, Identity and Access Management, Web Security Brief Overview BeyondTrust offers a range of enterprise security products with focus on privilege and identity management for servers and other IT software. Headquarters BeyondTrust Corporate Headquarters 5090 North 40th Stret, Suite 400 Phoenix, Arizona 85018 (800) 234 – 9072 Executives Kevin Hickey, President and CEO of BeyondTrust, came to the company by way their acquisition of eEye, where he served as CEO and Chairman. History The company began its operation as Symark, which was founded by Bob Summers and Doug Yarrow in 1985 as a VAX/VMS software utility company. The company focused its efforts on UNIX systems and renamed one of their products PowerBroker, a name that remains on their flagship privilege and identity management solutions today. In 2009, Symark acquired BeyondTrust, which was then offering complementary capabilities for Windows systems. The new combined company became BeyondTrust. Recent acquisitions include the vulnerability management company eEye Digital Security. Key Acquisitions Likewise Software (2011) eEye Digital Security (2012) Blackbird Group (2012) Key Competitors Avecto, Centrify, Qualys Products and Services BeyondTrust products are grouped as follows: • PowerBroker Privilege and Identity Management – This family of products provides privilege and identity management capabilities for enterprise servers, UNIX and Linux operating systems, databases, active directory, file systems, SQL servers, Google Apps, and other IT software. PowerBroker is also available for desktop, virtualization, and VMware. • Retina Vulnerability Management – The Retina family of products provides threat management console, network security scanning, endpoint protection, Web, and mobile security capabilities. Website https://www.beyondtrust.com/
BHC Laboratory
BicDroid
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Security Training Brief Overview BHC Laboratory provides independent security consultation and advice for business customers. Headquarters BHC Laboratory LLC Mustamae tee 6B, 102621 Tallinn, Estonia Tel: 372 600 2444 [emailprotected] Executives Andrus Kivisaar serves as CEO of BHC Laboratory. History Lauri Almann co-founded BHC Laboratory in 2012. The company is headquartered in Estonia. Key Competitors Guardtime Products and Services BHC Laboratory provides security advisory services and security products that can be grouped as follows: • SecurityFLASH – Standard security assessment methodology • CIPEX 2.0 – Strategic cyber security exercise management and facilitation • Forensics – Analysis, discovery, and recovery services • Specially Tailored Assessment Projects – Custom analysis of VPN, Website, desktop, compliance, and other areas • SecureMAIL – Customized security product for email. • Data Leak Prevention – Custom DLP product Website https://www.bhclab.com/
(Alpha Version 0.1 – 07/30/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview BicDroid seeks to use machine learning to encrypt your data and provide data control in a way that makes sense based on your needs. Headquarters 180 Northfield Dr. W Waterloo, ON, N2L 0C7 Canada Tel: 1-519-573-0096 Executives Dr. En-hui Yang serves as the President and CEO of BicDroid. He is also an eminently recognized researcher in information theory, data compression, and information security boasting a compendium of patents. Key Competitors SequoiaDB Corporation Products and Services Bicdroid works by focusing on what you know about your own organization and data rather than assume it is like any other data. They claim this approach keeps your data more secure to avoid playing catch up with new threats that appear everyday. QDocument – Server data encryption. BicDroid QM – Secure messaging platform. Website https://www.bicdroid.com/
Big Switch Networks
BillGuard
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Network Monitoring Brief Overview Big Switch Networks is a software-defined networking solution provider with support for in-line security service chaining. Headquarters Big Switch Networks 3965 Freedom Circle, Suite 300 Santa Clara, California 95054 Tel: (650) 269 – 5235 Executives Doug Murray serves as CEO of Big Switch Networks. He was previously SVP with Juniper. History Co-founded by Guido Appenzeller and Kyle Forster in 2010, the company is headquartered in Santa Clara, with presence in Tokyo. Index Ventures, Khosla Ventures, Greylock Partners, Intel Capital, Morgenthaler Ventures, Redpoint, Silver Lake Waterman, and TriplePoint Ventures provided $94.3M in venture funding through a Series C round in January 2016. Key Competitors Cisco, Juniper Products and Services Big Switch Networks provides a range of software-defined network (SDN) solutions. The company offers solutions in the following areas: • SDN Big Monitoring Fabric – Includes LTE monitoring, data center visibility, and DMZ security tool chaining. • SDN Big Cloud Fabric – Supports OpenStack, VMware, and Container networking. The SDN security tool chaining solution allows for creation of DMZ functionality in-line with virtual networking. Website https://www.bigswitch.com/
Acquired by Prosper Marketplace
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Identity Protection Brief Overview BillGuard, now part of Prosper, provides personal security that alerts customers to possible scams, billing errors, and hidden fees. Headquarters BillGuard – New York Office 1515 Broadway, 11th Floor New York, New York 10036 Israel Office 32 Rothschild Boulevard, 2nd Floor Tel Aviv, Israel Executives Yaron Samid, Co-Founder and CEO of BillGuard, was previously founder of Pando, a P2P CDN company. History Yaron Samid and Raphael Ouzan founded BillGuard in 2010 with $3M in seed funding from Bessemer Venture Partners, Founder Collective, SV Angel, IA Ventures, Social Leverage, and Yaron Galai. The company received another round of venture funding from Khosla Ventures, Founder’s Fund, and Innovation Endeavors. Prosper Marketplace, a peer-to-peer lender, acquired the company in 2015. Key Competitors OnGuard Online Products and Services BillGuard help consumers avoid scams, billing errors, and hidden fees in their personal finance. BillGuard’s personal finance application is intended to help consumers prevent security fraud to their personal finance. The application uses credit card and debit card transactions, data analytic support, complaints to the Consumer Financial Protection Bureau, and a crowd-sourced network to determine which charges should be brought to its customer’s attention via email and smartphone push alerts. BillGuard offers a free iPhone app. It also focuses on so-called “grey charges” which are deceptive and unwanted charges to a credit card. Website https://www.billguard.com/
Billington Cyber Security BINAR10 (Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview Billington Cyber Security provides a range of media, publications, forums, conferences, and services about the cyber security field Headquarters Billington Cyber Security Tel: (877) 811 – 5066 Executives Thomas Billington, CEO of Billington Cyber Security, spent two decades at major media companies such as Thomson Reuters, Reader’s Digest, Walt Disney, and The Bureau of National Affairs. History Thomas Billington founded the company in 2010. Key Competitors SANS, IANS Products and Services Billington Cyber Security provides a range of unique, expert forums, media, and other services to advance and support the field of cyber security, with emphasis on Washington-based issues and Federal Government participants. The company’s primary offering is a series of forums and summits involving high profile speakers, often with significant backgrounds in the Federal Government and critical infrastructure companies. Billington Cyber Security is currently expanding its services into adjacent sector such as automotive and industrial control. Website https://www.billingtoncybersecurity.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing Brief Overview BINAR10 offers security services including penetration testing, ethical hacking, and open source security. Headquarters BINAR10 Lima, Peru Tel: +51 1 2265995 Executives Geffrey Velasquez performs research and product development at BINAR10. He is reachable on LinkedIn. Roberto Molano is a consultant at BINAR10 available on LinkedIn. History BINAR10 was established in 2005 and is located in Lima, Peru. Key Competitors SGS Peru Products and Services BINAR10 offers security services in the following categories: • Ethical Hacking – Includes Web applications and infrastructure • Open Source Security – Includes focus on mission critical systems • Information Security – Includes support for compliance such as ISO 270001 Website https://www.binar10.com/
BinarySEC
Biscom
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Web Security, Managed Security Services Brief Overview BinarySEC provides a managed security solution to reduce the threat of attacks to Websites. Headquarters BinarySEC SAS 4, rue Franck Camille Cadet L’Etang-Salé, -- 97427 France Executives Richard Touret, President and Co-founder of BinarySEC, has over a decade of experience in business development. History Founded in 2007 by Michael Vergoz and Richard Touret, the company drew on research started in 2001. The company worked in partnership with University Research Group IREMIA to develop its artificial intelligence-based engine for detecting cross-site scripting. The company has received investment support from Venture Capital Firm Reunion Developpement, as well as Viveris Management and Caisse des Depots et Consignations. The company also launched EasyWAF as a related offer. Key Competitors Websense (Raytheon), Beyond Security Products and Services BinarySEC provides a Security-as-a-Service solution for Web security. Protections focus on known and unknown attacks, as well as content acceleration and Web management. Abnormal traffic is blocked by the BinarySEC solution before it reaches Web servers in order to reduce the potential for data theft, denial of service, identity theft, and new attacks from the Web. BinarySEC also offers EasyWAF, for securing Websites. Website https://www.binarysec.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing Brief Overview Biscom provides secure file sharing, secure fax, and enterprise file synchronization solutions. Headquarters Biscom 321 Billerica Road Chelmsford, Massachusetts 01824 Tel: (800) 477 – 2472 Executives S.K. Ho serves as Founder and Chairman of Biscom. Bill Ho serves as CEO. He studied at Stanford, Harvard, and MIT. History S.K. Ho founded Biscom in 1986. He was formerly Director of Engineering with Wang Laboratories. The company is headquartered in Massachusetts with a satellite office in Taiwan. Key Competitors Comilion, Covertix Products and Services Biscom provides a range of secure fax server and cloud fax solutions for the enterprise. The company also provides secure file transfer with FIPS 140-2 and AES encryption support. In addition, Biscom offers file sync and sharing with secure access, collaboration, and support for IT management. Website https://www.biscom.com/
Bishop Fox
Bitcrack
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing, Wireless Security Brief Overview Bishop Fox provides cyber security consulting, assessment, and testing services to enterprise customers. Headquarters Bishop Fox 8240 S. Kyrene Road Suite A-113 Phoenix, Arizona 85284 Tel: (480) 621 – 8967 Executives Francis Brown, Partner at Bishop Fox, was previously employed with Honeywell International and Ernst & Young. Vincent Liu, Partner at Bishop Fox, was previously employed with Honeywell International, Ernst & Young, and the National Security Agency. History Francis Brown and Vincent Liu co-founded Bishop Fox as Stach & Liu in 2005. The privately held company is headquartered in Phoenix. Key Competitors Bitcrack, Clone Systems Products and Services Bishop Fox provides assessment and testing services, as well as expert cyber security consulting services for enterprise customers. The partners are active in the security and hacking community as speakers and authors. The team utilizes RFID tools for hacking, Google hacking tools, home security system hacking tools, and SharePoint hacking tools. Website https://www.bishopfox.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Governance, Risk, and Compliance, Penetration Testing Brief Overview Bitcrack provides a range of security consulting services for business customers including penetration testing. Headquarters Bitcrack Cyber Security Pty Ltd. 8B Gibson Drive UCCLEUCHSANDTON 2066 South Africa Tel: +27(0)11 258 8914 [emailprotected] Executives Lloyd Kumbemba serves as CEO of Bitcrack. History The company, which was incorporated in 2011, is headquartered in South Africa. Its team has over 28 years combined experience in IT. Key Competitors NCC Group Products and Services Bitcrack provides a range of cyber security consulting services in the following areas: • Penetration testing • Application security • Web application security assessments • IT governance, risk, and compliance • Social engineering assessments • Security policy reviews, designs, and workshops • Security architecture • On-site/off-site security staff for operations, management and support The company also provides a range of specialist services including password cracking and recovery, active directory password analysis, pot-attack investigations, and wireless network auditing. Cloud services are also available for vulnerability scanning, email protection, and DDOS protection. Website https://www.bitcrack.net/
Bitdefender
Bitglass
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools, Mobile Security Brief Overview Bitdefender provides Anti-Virus solutions for home users, small and medium business, and enterprise. Headquarters Bitdefender (SOFTWIN) Bulevardul Dimitrie Pompeiu, nr. 10A Cladirea CONECT 1 Bucharest, 014251 Romania Executives Florin Talpes, CEO of Bitdefender, was previously founder of SOFTWIN, the biggest Romanian software and services firm. History Romanian software and services company SOFTWIN created Bitdefender in 2001. The private company spun off from SOFTWIN in 2007. Key Competitors AVG, Kaspersky Products and Services Bitdefender provides Anti-Virus solutions for home users, small and medium businesses, and enterprise devices and systems. Bitdefender Anti-Virus products, which have a reputation for being inexpensive, can be grouped as follows: • Anti-Virus Software for Home Users – Includes Bitdefender Total Security, Bitdefender Internet Security, Bitdefender Anti-Virus Plus, Bitdefender Sphere (protects all devices), Bitdefender Anti-Virus for Mac, and Bitdefender Mobile Security for Android. • Small and Medium Business (SMB) and Enterprise Solutions – Includes Bitdefender Small Office Security, Bitdefender GravityZone (unified control for virtual, physical, and mobile), and Bitdefender for Amazon Web Services. Website https://bitdefender.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview Bitglass provides a cloud access security broker for protected mobile access to public cloud services. Headquarters Bitglass Headquarters 655 Campbell Technology Parkway, Suite 225 Campbell, California 95008 Executives Nat Kausik, CEO of Bitglass, was previously CEO of Asterpix, as well as CEO of FineGround and Arcot Systems. History Founded in 2013 by industry veterans, the company is based in Silicon Valley and backed by venture capitalists, NEA, Norwest, and Singtel Innov8. The company has received a total of $35.05M in venture funding through two rounds in 2013 and 2014. Key Competitors CipherCloud Products and Services Bitglass provides a cloud access security broker (CASB) for protected mobile access to public clouds including Google Apps, Salesforce.com, Office 365, Exchange, Box, Dropbox, ServiceNow, and Any App. The solution works by a series of forward and reverse proxies to protect data from any device. Cloud encryption and single-sign on (SSO) are additional features. Website https://www.bitglass.com/
Bitium
BitSec
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Password/Privilege Management Brief Overview Bitium provides a cloud-based platform for managing passwords, users, and SaaS application access. Headquarters Bitium 2448 Main Street Santa Monica, California 90405 Executives Scott Kriz serves as Co-Founder and CEO of Bitium. History Founded in 2012 by Scott Kriz and Erik Gustavson, the company has received $8.9M in funding, including a Seed round led by Resolute.vc in 2013 and a Series A round in 2014. Additional investors include Double M Partners, Lazerow Venture, and Polaris Partners. Key Competitors Okta Products and Services Bitium provides a range of cloud and SaaS application identity and access management capabilities with the following features: • Single Sign-On (SSO) • Real-Time Application and User Management • Password Management • Two-Factor Authentication • Directory Integration • Reporting and Compliance Website https://www.bitium.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics, Security Training Brief Overview BitSec Global Forensics consults with government and law enforcement agencies to help detect, prevent, and investigate cyber crime and terrorism. Headquarters BitSec Global Forensics 136 State Street Suite 210 Augusta, Maine 04330 Tel: (877) 272 – 1417 Executives Michael Webber, Founder and CEO of BitSec Global Forensics, was previously a senior consultant to the U.S. Department of State as well as a special investigator for the Maine Officer of the Attorney General. Eric Austin serves as COO of BitSec. History Michael Webber founded BitSec Global Forensics in 2005. The small private company is headquartered in Maine. Key Competitors AccessData, Enclave Forensics Products and Services BitSec provides forensics-related consultancy services for law enforcement, government, and related groups to help prevent, detect, investigate, and mitigate cyber crime and cyber terrorism. Areas of focus for the company include: • Expert Services – Includes providing assistance through case work with assessment of technology, expert testimony, and other services • Government Solutions – Includes bundled solutions from EnCase, F-Response, HBGary Responder, Nuix, X1 Discovery, and Voom Technolog • Training and Curriculum Design – Includes instructorled programs with continuing education credits. • Cyber Security – Includes consultation in all aspects of cyber security • Digital Forensics – Involves court-approved techniques for discovery and storage • Electronic Discovery – Based on forensic precision, legal accuracy, and defensible eDiscovery plans Website https://www.bitsecglobalforensics.com/
Bitshield Security
BitSight
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Security Training, Penetration Testing Brief Overview Bitshield security provides IT security consulting services and professional training for customers in the Philippines. Headquarters Bitshield Security 500 Shaw Zentrum Shaw Boulevard Mandaluyong, 1550 Metro Manila, Philippines Tel: +632 571 3681 Executives Jimmy Tinio, Founder and President of Bitshield Security, was previously an executive with Globaltek Asia. History Jimmy Tinio founded Bitshield Security in 2008. The small security consulting company emphasizes teaming amongst its staff and is located in the Philippines. Key Competitors SGS Philippines Products and Services Bitshield Security offers IT security consulting and training services that can be grouped as follows: • Vulnerability assessment and penetration testing • Threat management service • ISMS audit process • Source code review • ISO 2000: IT Service Management • PCI DSS assessment • Information security policies development • Data center assessment • ISO 27001/27002 compliance review • Heartbleed vulnerability verification • Point of sales (POS) systems security • IT security audit and training workshops Website https://www.bitshieldsecurity.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview BitSight provides a security posture assessment and rating for organizations based on their visible behavior. Headquarters BitSight Technologies 125 CambridgePark Drive Suite 204 Cambridge, Massachusetts 02140 Tel: (617) 245 – 0469 Executives Shaun McConnon, CEO of BitSight since 2012, previously took Raptor Systems public after which it was acquired by Axent, and later Symantec. History Nagarjuna Venna and Stephen Boyer co-founded BitSight Technologies in 2011. The company has received $24M in Series A Funding from Flybridge Capital Partners and Commonwealth Capital Ventures, along with Seed Round funding from Globespan Capital Partners and Menlo Ventures. The company received $23M in Series B funding in 2015 from a group of investors including Menlo Ventures, Comcast Ventures, and others. Key Acquisitions AnubisNetworks (2014) – Portugese threat intelligence Key Competitors Security Scorecard Products and Services BitSight produces a security rating for businesses that provides a measure of their externally visible security effectiveness. The rating is based on strategically placed sensors, which are used to collect information. The rating takes into account suspicious behaviors, participation in DDOS attacks or botnets, and other visible factors, which are analyzed for severity, frequency, duration, and confidence to produce the BitSight SecurityRating, which ranges from 250 – 900, just like FICO/consumer credit ratings). Website https://www.bitsight.com/
BI2 Technologies
Bivio Networks
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview BI2 Technologies offers a suite of biometric identification and intelligence solutions. Headquarters BI2 Technologies 488 State Road, Suite 1 Plymouth, Massachusetts 02360 Tel: (508) 224 1600 Executives Sean Mullin serves as President and CEO of BI2 Technologies. History Co-founded in 2005 by Peter Flynn, the privately held company is headquartered in Massachusetts. Key Competitors Cross Match Technologies, Daon Products and Services BI2 Technologies offers multi-modal biometric intelligence and identification solutions as software applications and IT hardware to enable use of iris biometric information for identifying a person. Specific products include the following: • IRIS – Inmate Identification and Recognition System for inmates and visitors to prisons. • SORIS – National system to identify sex offenders • MORIS – Handheld biometric device using iPhone • The CHILD Project – Nationwide registry of children • Senior Safety Net – Senior citizen database • Sea ID – Identification for maritime, cruise, and port industries • Iscientia – Factory employee identification Website https://www.bi2technologies.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview Bivio Networks provides deep packet inspection (DPI) for cyber security, surveillance, and network monitoring. Headquarters Bivio Networks Inc. 4457 Willow Road, Suite 240 Pleasanton, California 94588 Tel: (925) 924 – 8600 Executives Elan Amir, Executive Chairman of Bivio, was previously CTO for OmniSky. Keith Glover, President of Bivio, was previously with Proxim. History Founded in 2000, Bivio Networks received $40.8 million in six rounds of venture funding from Storm Ventures, InterWest Partners, Venrock, Goldman Sachs, Silver Creek Ventures, and CrossTechnology Venture Partners from 2000 to 2008. The company remains privately held and is headquartered in California. Key Competitors IronNet, NIKSUN Products and Services Bivio provides its 7000 Series and 8000i Series Cyber Security Application Platforms, which are high performance, fully programmable network appliances that provide high speed packet processing hardware with a software platform for analysis. The product supports government, military, law enforcement, network operator, and service provider customers. Website https://www.bivionetworks.com/
Blackberry
Black Duck Software
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Mobile Security, IoT/ICS Security, Secure File Sharing, Voice Security Brief Overview Blackberry is a mobile technology company supporting enterprise, messaging, devices, IoT and secure communications. Headquarters Blackberry 220 University Avenue E. Waterloo, Ontario Canada N2K 0A7 Executives John Chen serves as Chairman and CEO of BlackBerry. He was previously Chairman and CEO of Sybase for fifteen years. History Founded in 1984, Blackberry is a Canadian firm that helped invent secure enterprise mobile device usage. The company trades on the Toronto Stock Exchange. Most of its present enterprise security capability has been obtained through strategic acquisitions of Certicom, Encription, Secusmart, Good Technologies, and Watchdox. Key Acquisitions Encription (2016) – Security Consulting Good Technologies (2015) – Mobile Device Management Fixmo (2014) – Mobile Security (acquired by Good) Watchdox (2015) – Secure File Sharing Secusmart (2014) – Voice Security Key Competitors Google, Apple Products and Services Blackberry’s suite of enterprise security-specific offerings can be grouped as follows: • Unified Endpoint Management • Mobile Device Management • Secure Enterprise File Sync and Share • Mobile Application Management • Secure Voice and Messaging • Secure IoT Blackberry also offers networked crisis communications through its AdHoc unit. Website https://www.blackberry.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Application Security, Endpoint Security, Open Source Security Brief Overview Black Duck Software provides application security, container security, and compliance for open source software management. Headquarters Black Duck Software 800 District Avenue, Suite 221 Burlington, Massachusetts 01803 Tel: (781) 891 – 5100 Executives Lou Shipley serves as President and CEO of Black Duck Software. He is a veteran of five previous Massachusetts startups including Avid and VMTurbo. History Founded by Douglas Levin, and headquartered in Massachusetts, the company has presence in Silicon Valley, Germany, UK, and Japan. Key Competitors Red Hat Products and Services Black Duck Software provides application security, container security, and compliance support through its product suite, which is arranged as follow: • Hub – Open source security management to find and fix vulnerabilities in code • Protex – Automated open source security compliance platform • Code Center – Automated open source selection and governance Website https://www.blackducksoftware.com/
Blackfoot
Blackmere Consulting
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, PCI DSS/Compliance Brief Overview Blackfoot provides a range of security consultants including risk, PCI, security awareness, and other areas. Headquarters Blackfoot UK Limited 1st Floor, 99 Bishopsgate, London EC2M 3XD Tel: 0845 805 2409 Executives Colin Watson, Andre Janse Van Rensburg, Michael Kemp, Dave Marsh, and Howard Scott are the experienced consultants that make up Blackfoot. History The consulting firm is headquartered in the UK. Key Competitors Advent IM, Red Island Products and Services Blackfoot provides a range of security consulting based on advising, assessing, and assuring. Services include risk, security, & compliance training, scoping, PCI DSS, policy development, incident response planning, security awareness training, third party risk management, virtual risk, security, & compliance, application security, architecture review, external vulnerability scanning, and firewall security assessment. Website https://www.blackfootuk.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Blackmere Consulting provides talent acquisition and executive search with a practice in cyber security. Headquarters Blackmere Consulting Idaho Falls, Idaho Tel: (208) 932 – 2750 Executives Domini Clark serves as Director of Strategy for Blackmere Consulting, as well as head of InfoSec Connect. History Blackmere Consulting is headquartered in Idaho. Key Competitors CyberSN Products and Services Blackmere Consulting provides specialized talent acquisition and executive search services with an emphasis in the following areas: • Information Security and Enterprise Risk • Technical Specialists • ERP • Infrastructure Website https://www.blackmereconsulting.com/
BlackRidge
(Alpha Version 1.0 – 09/05/17 – Vendor Approval) TAG Cyber Controls Cloud Security, Infrastructure Security, DDoS Security, Secure Access Brief Overview BlackRidge provides network segmentation and cloud and server isolation by authenticating network traffic at the transport layer. Headquarters 10615 Professional Circle, Suite 201 Reno, NV 89521 Tel: +1-855-807-8776 Engineering Office Marist College Hancock Center 0002 3399 North Road P0ughkeepsie, NY 12601 Executives Bob Graham serves as the Chairman, CEO, and President of BlackRidge and was previously an executive at Sun Microsystems and Adaptec. John Hayes is CTO and co-founder and was previously a founder of Alteon WebSystems. History The company was founded in 2010 by Bob Graham and John Hayes, and initially funded by the Department of Defense. Key Acquisitions None Key Competitors Cisco TrustSec, Illumio, and vArmour Products and Services Blackridge products are built on top of patented technology that looks at the first packet in a TCP connection. This allows the products to authenticate users and devices, resolve identities, and enforce policies.
• • •
BlackRidge TAC Gateways Blackridge TAC Endpoints
Blackridge Enterprise Manager Website https://www.blackridge.us/
BlackStratus (Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Information Event Management Brief Overview BlackStratus provides SIEM products and related services with emphasis on managed service providers as well as enterprise customers. Headquarters BlackStratus Corporate Headquarters 1551 South Washington Avenue Piscataway, New Jersey 08854 Tel: (732) 393 – 6000 [emailprotected] Executives Dale Cline, CEO of BlackStratus, held previous positions with Network Associates, MediaPath, and Microsoft. History The company was founded in 1999 as NetForensics, and changed its name in 2012 to BlackStratus, commensurate with its increased focus on cloud and security-as-a-service offerings for managed service providers. Key Acquisitions High Tower Software (2009) Key Competitors HPE ArcSight, IBM, Trustwave Products and Services BlackStratus offers a cloud-based SIEM solution that is used for “security-as-a-service” offerings by managed service providers. The platform is based on its SIM One Technology and includes the following: • LOG Storm Appliances – Combines SIEM and event log management that is low cost and simple to deploy. • SIEM Storm – Enterprise-grade software that is more powerful and allows for centralized gathering, correlation, and reporting of security activities across complex and distributed systems. • BlackStratus MSP Solutions – Offers midsize and large global MSPs with a platform for delivering security and compliance managed security services to their clients. The company offers several tiers of support for enterprise and MSP customers including its CYBERShark platform for SMB. Website https://www.blackstratus.com/
Bloombase
BlueData Software
(Alpha Version 0.1 – 07/31/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, DLP, PCI, GRC Brief Overview Bloombase provides solutions to help organizations encrypt their data and prevent data exfiltration threats. Headquarters 1300 Island Drive Redwood City, CA 94065 Tel: 1.855.256.6622 Executives Sean Xiang serves as the CEO. History Bloombase was founded in 2012. Key Competitors Clipperz Products and Services Bloombase provides a variety of services and products to help organization with encryption and to mitigate data exfiltration. They also provide assistance with various compliance concerns such as PCI. Website https://www.bloombase.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview BlueData Software is a stealth mode start-up providing secure, Big Data private clouds for enterprise. Headquarters BlueData Software 3979 Freedom Circle, Suite 850 Santa Clara, California 95054 Tel: 650-450-4067 Executives Kumar Sreekanti, Co-Founder and CEO of BlueData Software, was previously Vice President of R&D at VMware, where he was responsible for storage and availability in the cloud infrastructure business unit. History Kumar Sreekanti and Tom Phelan co-founded BlueData Software in 2012. Data Collective provided $4M of seed funding in 2013 and Atlantic Bridge, Ignition Partners, Data Collective, Amplify Partners, and Intel Capital provided Series B funding of $15M in September, 2013. Intel led a $20M round of investment in 2015. Key Competitors AWS, Microsoft, Box Products and Services BlueData Software provides secure, Big Data private clouds for enterprise. As a stealth mode startup, big BlueData Software has not provided details on its product offerings as of 2014. The only information available is that the company will focus on secure, Big Data private clouds for the enterprise. Website https://www.bluedata.com/
Blue Lance
Blueliv
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview Blue Lance provides enterprise solutions, products, and services in support of security governance, compliance, and audit. Headquarters Blue Lance, Inc. 410 Pierce Street Houston, Texas 77002 (713) 255 – 4800 Executives Umesh Verma, CEO of Blue Lance, began his career as an environmental engineer at Brown & Root. History Founded by Umesh Verma in 1985, Blue Lance was the first company to provide enterprise security solutions on MS-DOS and Novell operating systems. It is more recently focused on open repositories to accept feeds from every operating systems and applications. Key Competitors RSA (Archer) Products and Services Blue Lance provides solutions, platforms, and services that assist the enterprise in the assurance of proper security governance. The driving force behind such governance is successful security compliance and audit. Specific capabilities include the following: • Blue Lance Automated Cyber Governance Solutions – These are automated and managed services that assist an organization with its cyber security governance assurance, oversight, confluence, auditing, and dashboard requirements. • Blue Lance LT Auditor+ - This is the flagship Blue Lance solution that is embedded in the operating system with support for Windows, SLES/OS, SUSE Linux, Redhat, and Novell Netware. The product provides continuous monitoring and produces detailed reports for security team members and auditors. • Blue Lance Services – Blue Lance also provides a set of services for strategy and needs analysis, technical support, custom design and development, reviews, and analysis. Website https://www.bluelance.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence Brief Overview Blueliv provides an end-to-end cloud-based cyber threat intelligence solution that protects companies from malicious attacks. Headquarters Blueliv Pujades 51–55 5th Floor Barcelona, 08005, Spain Tel: +34 933096100 Executives Daniel Solis, Founder and CEO of Blueliv, was previously Director of Information Protection at KPMG. History Daniel Solis founded Blueliv in 2009. The private company is based in Spain and received $3.2M Venture Round funding from Kibo Ventures, Telefonica Ventures, and Roger Casals. Key Competitors NCC Group Products and Services Blueliv offers an end-to-end cloud-based platform for cyber threat intelligence that includes three layers: • Ingest Layer – Networks of ingest engines are used to collect threat data from the Internet focused on Twitter feeds, underground sites, crime servers, and mobile social networks. • Analysis Layer – Big Data technologies are used with machine learning algorithms to correlate and analyze collected data. • Representation Layer – Customers utilize the data analysis via client-facing dashboards and enterprise security APIs. The Blueliv platform offers real-time continuous monitoring, APT detection, and scalability. Website https://www.blueliv.com/
BlueRISC
BlueTalon
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Hardware/Embedded Security, Endpoint Security, Security R&D Brief Overview BlueRISC provides hardware-assisted endpoint security for anti-tamper and cyber protection. Headquarters BlueRISC, Inc. (Main Office) 400 Amity Street, Suite 1 Amherst, Massachusetts 01002 Tel: (413) 359 – 0599 Executives Csaba Andras Moritz, Founder, Chairman, and Chief Strategist of BlueRISC, has close affiliations with MIT and University of Massachusetts at Amherst. History Csaba Andras Moritz, Mani Krishna, and Israel Koren, all professors at the University of Massachusetts at Amherst, founded BlueRISC in 2002. The Office of the Secretary of Defense, the US Air Force, the National Science Foundation, and private funding supported the development of BlueRISC’s technology. Key Competitors Intel Products and Services BlueRISC focuses on providing hardware-assisted trusted components for cyber security. The BlueRISC product suite includes the following: • TrustGUARD Solution with ExpressCard – Provides security tools on a hardware card for use in laptops or any system with an ExpressCard 34 or 54 slot. • WindowsSCOPE Toolkit for Threat Analysis – A GUIbased tool for analyzing Windows kernel with the ability to provide snapshots of memory. • TrustGUARD Mobile – Hardware security platform for Android devices that comes with development toolkit. • TrustGUARD Solution with PCIe Board – Hardware security solution for servers with PCIe slots. • TrustGUARD Solution/IP for Embedded Security Applications – Hardware security designed for embedded systems. Website https://www.bluerisc.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Data Security Brief Overview BlueTalon provides security and access solutions for Hadoop Big Data applications and infrastructure. Headquarters BlueTalon Data Systems, Inc. 541 Jefferson Avenue, Suite 202 Redwood City, California 94063 Executives Eric Tilenius, CEO of BlueTalon, was previously with Scale Venture Partners, as well as General Manager for Zynga. History Founded in 2013 by Pratik Verma, the company received $8M in funding from Data Collective, Biosys Capital, Bloomberg Beta, The Stanford StartX Fund, Divergent Ventures, and Berggruen Holdings through Series A in 2015. Key Competitors Cloudera (Gazzang) Products and Services BlueTalon provides a security solution that is installed into an existing Hadoop cluster with access to the enterprise LDAP. BlueTalon then becomes aware of any resource within the cluster that requires security and access protection. BlueTalon enables role, attribute, and purpose-based data access policies form one application. The tool ensures minimal performance impact and provides operational reporting and auditing. Website https://www.bluetalon.com/
Bluink
BluVector
(Alpha Version 0.1 – 07/31/17 – No Vendor Approval) TAG Cyber Controls 2FA, Password Management Brief Overview Bluink seeks to make password management easier by using your phone for authentication. Headquarters 230-18 Louisa St. Ottawa ON K1R 6Y6 Canada Executives Steve Borza serves as the CEO of Bluink. He has worked with biometric technologies and their applications for identity and as encryption solutions. History Founded in 2010, Bluink set out to make identity and access management more seure while also making it simpler. Key Competitors Duo Products and Services Bluink is an all-in-one password manaegement and authentication service. After creating a one-time strong password for the service, Bluink allows you to log in to any of your password protected services. There are options to enable biometrics as well. Website https://bluink.ca/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention, Network Monitoring Brief Overview BluVector provides an advanced threat detection and network-monitoring platform for the enterprise. Headquarters BluVector / Acuity Corporation 4501 North Fairfax Drive Arlington, Virginia 22203 [emailprotected] Tel: 571 565 2100 Executives Kris Lovejoy, President of BluVector, served previously as CISO and head of security products at IBM. History Founded in 2015, BluVector is private with headquarters in Virginia. It is part of the Acuity Corporation. Key Competitors IronNet, FireEye Products and Services BluVector provides an advanced threat detection product that collects packets on an enterprise network at high speed and analyzes them for the presence of advanced attack. Features include: • Support for STIX/TAXII • Two dozen file types for Windows, Linux, and PDF • IPv4/IPv6 Website https://www.bluvectorcyber.com/
Boeing
Boldon James
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Information Assurance Brief Overview In addition to Boeing’s commercial airplane business, it includes a business focused on Defense, Space, and Security. Within this unit, Boeing provides cyber security solutions with strong emphasis on Federal Government solutions. Headquarters Boeing Corporate Headquarters Office 100 North Riverside Chicago, Illinois 60606 Executives Dennis Muilenburg. serves as Chairman and CEO of the Boeing Corporation. History Boeing employs more than 169,000 people in the United States and over 65 different countries. The public company boasts 140,000 employees with college degrees, including 35,000 advanced degrees. In addition to its vast portfolio of airplanes and defense aviation, the company also focuses on Defense, Space, and Security. Symantec acquired Boeing’s commercial cyber security unit in 2015. Key Acquisitions Narus (2010) Key Competitors Lockheed Martin, Northrop Grumman Products and Services In addition to its commercial airplane business, Boeing supports defense, space, and security initiatives with emphasis on the Federal Government. Boeing’s Cyber Security solutions utilize its Cyber Engagement Center as the basis for the following offers: • VSOC – The Boeing VSOC Enterprise Event Manager provides a single, comprehensive view for managing security of mission-critical operations. The product includes support for processes, workflows, and business logic necessary to respond in real-time to alarms and alerts. • NarusInsight – Boeing NarusInsight is a real-time, network-based traffic intelligence and security application. • TAC – Boeing TAC analysis software supports situational awareness through rapid retrieval of data to correlate and analyze trends and items of interest. • Secure Mobile Enterprise – Boeing Secure Mobile Enterprise provides protection support for mobile device deployments. Website https://www.boeing.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Secure File Sharing Brief Overview Boldon James provides data classification, secure messaging, and a range of related security products. Headquarters Boldon James Worldwide HQ Cody Technology Park Ively Road Farnborough Hampshire GU14 0LX United Kingdom Tel: +44 (0) 1270 507800 Executives Martin Sugden, CEO of Boldon James, led the management buyout of Boldon James backed by ISIS Equity Partners. History Founded in 1985, Boldon James is privately held and headquartered in the United Kingdom. Boldon James is a QinetiQ company. Key Competitors Digital Guardian, TITUS Products and Services Boldon James provides a range of data classification, militarygrade secure messaging, mainframe connectivity, multidirectory viewing, and guards/gateways. The data classification products include labeling for Office, Email, Exchange, CAD, Notes, Files, SharePoint, Mobile, and other areas. Military messaging includes SAFEmail Messaging (High and Medium Grades), SAFEoffice, SAFEmail, and other areas. Website https://www.boldonjames.com/
Bomgar
Boole Server
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls VPN/Secure Access Brief Overview Bomgar provides secure remote access through firewalls without the need for a separate VPN. Headquarters Bomgar 578 Highland Colony Parkway Paragon Centre, Suite 300 Ridgeland, Mississippi 39157 Executives Matt Dirks serves as CEO of Bomgar. History Founded in 2003, Bomgar is privately held with offices in Atlanta, Jackson, Washington, Frankfurt, London, Paris, and Singapore. The company acquired password management technology from Pitbull Software in 2015. Key Competitors Cisco, Juniper Products and Services Bomgar provides two product solutions for customers: • Secure Remote Support – Provides remote support to any mobile device. • Privileged Access Management – Controls, monitors, and manages access to critical systems by third-party companies Bomgar offers its products as either on-premise appliances or as virtual on-demand solutions in the cloud. Website https://www.bomgar.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Data Leakage Prevention, Secure File Sharing Brief Overview Boole Server provides data security and DLP through its encryption and support for sharing. Headquarters Boole Server Via Rutilia 10/8 20141 Milan – Italy Tel: +39 02 8738 3213 Executives Valerio Pastore is Founder and President of Boole Server. Paolo Ardemagni, CEO of Boole Server, has contributed to the development of many IT security companies. History Valerio Pastore founded Boole Server in 2008. The private Italian company also has offices in France and the UK. Investors include IQTranslate.com, Victory Holdings, and Comprendium Holding. Key Competitors Digital Guardian, CipherCloud Products and Services The Boole Server encryption product offers data leakage prevention (DLP) protection of confidential files, data sharing between work groups, integration with common applications such as Office and SharePoint, monitoring of access and use of encrypted files, and compatibility with all devices including tablets, smartphones, and laptops. The technology is based on data encryption, private cloud, file sharing, watermarking, and secure messenger capabilities. The main components are the Server (core component), Web client, agent, mail encryptor, and SharePoint Connector. The company also offers BooleBox for secure file sharing and sync. Website https://www.booleserver.com/
Booz Allen Hamilton
Bouju
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Information Assurance, Threat Intelligence Brief Overview Booz Allen Hamilton provides a range of management and technology consulting services, including cyber security consulting. Headquarters Booz Allen Hamilton Headquarters 8283 Greensboro Drive McLean, Virginia 22102 Tel: (703) 902 – 5000 Executives Horacio Rozanski serves as President and CEO of Booz Allen Hamilton. History Booz Allen Hamilton reported $5.7B in revenue and 24,000 staff members in 2014. The pubic company is headquartered in Virginia and trades on the NYSE. Key Competitors CSC, IBM Products and Services Booz Allen’s cyber security management and technology consulting solutions, which are targeted at government, international, and business customers, are provided in three areas: • Innovation, Research, and Development – Focuses on staying one step ahead of would-be cyber attackers. • Architecture and Standards – Focuses on integrating solutions into cyber architectures with emphasis on building in security. • Technology Solutions – Involves solutions using systems that provide secure content management, intrusion detection, monitoring, encryption, and authentication. Website https://www.boozallen.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Brand Protection Brief Overview Bouju provides solutions for enterprise brand protection including IP protection via data collection and analysis. Headquarters Bouju One Embarcadero Center 38th Floor #3810 San Francisco, CA 94111 Tel: (310) 443 – 4158 Executives David Razavi, CEO of Bouju, was previously CTO of Onestop Internet as well as VP of Engineering at Traffic Marketplace. History Founded in 2012, the company is headquartered in Los Angeles. The Amidi Group provided a round of funding for Bouju in 2014. Key Competitors Reputation.com Products and Services Bouju provides Software-as-a-Service (SaaS) solutions for enterprise brand protection based on identification of problems via real-time data collection, assessment via advanced proprietary search technologies, and enforcement via cease and desist processing. The solution is useful for IP protection offing legal, brand, marketing, and enterprise support. Capabilities include brand reputation, brand monitoring, anti-counterfeiting, and trademark protection. Website https://www.bouju.com/
Boxcryptor
Bracket Computing
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Cloud Security Brief Overview Boxcryptor provides file encryption tools for use with public cloud services such as Dropbox and Google Drive. Headquarters Boxcryptor Secomba GmbH Werner-von-Siemens-Str.6 86159 Augsburg Germany Executives Andrea Pfundmeier serves as CEO of Boxcryptor. History Founded in 2011, the company is headquartered in Germany and has been supported by investments from Agile Partners. Key Competitors CipherCloud Products and Services Boxcryptor provides encryption tools for Windows, Mac OS X, Chrome, iOS, Android, Windows Phone Windows RT, and Blackberry 10. Encrypted files can be shared with other Boxcryptor users as well as creating public cloud folders with the encrypted files. Website https://www.boxcryptor.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview Bracket Computing provides an enterprise grade secure infrastructure for multiple clouds with embedded security and control. Headquarters Bracket Computing 150 W Evelyn Ave #200 Mountain View, CA 94041 Tel: (408) 469 – 4500 Executives Tom Gillis, CEO of Bracket Computing, was previously VP of Marketing at IronPort as well as VP/GM of Media at IBEAM Broadcasting. History Founded in 2011 by Tom Gillis and Jason Lango, Bracket Computing is headquartered in Sunnyvale and has received $85.3M in venture funding through Series A and B rounds by Allegis Capital, Sutter Hill Ventures, Norwest Venture Partners, Andreessen Horowitz, Qualcomm, Artic Ventures, and General Electric. More recently the investment has been increased to a total of $130M through mid-2016. Key Competitors Catbird, Illumio, CloudPassage Products and Services Bracket Computing provides an enterprise-grade computing infrastructure capability that includes a cloud virtualization layer, computing infrastructure, and management control plane. The security is provided across multiple clouds by a Bracket Computing Cell, which encapsulates applications and data in a fully encrypted virtual system. Specific security features include extension of security policies across providers, multi-layered security, and state-of-the-art encryption support. Website https://www.brkt.com/
Bradford Networks
Brainloop
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Network Access Control, Network Monitoring Brief Overview Bradford Networks provides network access control (NAC) solutions through its Network Sentry product and associated services. Headquarters Bradford Networks 374 congress Street, Suite 502 Boston, MA 02210 Tel: 866 – 990 – 3799 Executives Rob Scott, CEO of Bradford Networks, was named 2002 Entrepreneur of the Year by Ernst & Young. History Bradford Networks was founded in 1999. The private company has received Venture Round, Series A, and Series B funding from Updata Partners and Windspeed Ventures. Key Competitors ForeScout Products and Services Bradford Networks uses security technology to deliver network access control (NAC) solutions for enterprise networks including mobile. Bradford Networks flagship solution is its Network Sentry, which delivers network access control (NAC) to perform pre-connect risk assessments for every device trying to connect to a network including BYOD mobile devices. Network Sentry does not depend on 802.1x specific hardware. It is built on the SmartEdge platform, which supports next-generation NAC based on endpoint and network visibility. The company’s offer has been popular with college campuses. Website https://www.bradfordnetworks.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing Brief Overview Brainloop offers solutions for companies to securely collaborate and control information with external partners. Headquarters Brainloop AG (Headquarters) Franziskanerstr. 14 81669 Munich, Germany Tel: +49 (89) 444699 0 Executives Thomas Deutschmann, CEO of Brainloop AG, was previously CEO of Update Software AG. History Brainloop was established in 2000 and is headquartered in Germany. The company has offices in Vienna, Austria; Zug, Switzerland; London, UK; and Acton, Massachusetts. Key Competitors CORISECIO, Kerio Products and Services The Brainloop solution is a virtual, software-as-a-service platform for secure collaboration amongst different groups and partners. The platform uses AES-256 encryption with Web-based access from anywhere to store and transmit documents to users. The platform provides project-based collaboration with automatic version management. The platform is tamper-proof and supports business audit requirements. Two-factor authentication is required for access and company security policy support is included as well. Website https://www.brainloop.com/
Brandon Becker
BrandProtect
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Brandon Becker provides search and recruiting services for professionals in the areas of networking, cloud, security, and virtualization. Headquarters Brandon Becker 78 Daly Road East Northport, New York 11731 Tel: (631) 864 – 2650 Executives Bob Levitt serves as founder and President of Brandon Becker. History Brandon Becker has been in business for over 20 years placing 650 top professionals across various industries. Key Competitors Korn Ferry Products and Services Brandon Becker provides search and recruiting services for professionals in the following areas: • Networking • Hardware Security • Software Security • Cloud • Virtualization The company claims successful engagements with NIKSUN, Skybox Security, and Trustwave. Website https://www.brandonbecker.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Brand Protection Brief Overview BrandProtect offers social media monitoring for the purpose of risk detection and threat mitigation for enterprise. Headquarters BrandProtect Executive Office 5090 Explorer Drive, Suite 203 Toronto, Ontario Canada L4W 4T9 Tel: (905) 271 – 3725 Executives Roberto Drassinower, CEO and President of BrandProtect, was previously founder of DME Consulting. History Colin Silver and Leslie Goldsmith co-founded Brandimensions in 2001. Renamed BrandProtect, the private company is headquartered in Canada. Key Competitors ZeroFOX Products and Services BrandProtect offers a range of enterprise and business solutions for risk and threat mitigation to on-line brand. Specific solutions include the following: • Anti-Phishing – Includes detection and mitigation on online fraudulent phishing campaigns. • Brand Abuse Protection – Uses search identifiers to locate brand violations and misuse. • Social Media Monitoring – Includes monitoring of major social media services for risks. • Mobile App Monitoring – Provides searches of app stores for detection of fraudulent mobile apps. • bankSMART – Focuses on on-line banking • MLO and Agent Validation – Focuses on MLO (mortgage loan originator), dealer, and agent risks. Website https://www.brandprotect.com/
Bricata
Bridgen Group
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention Brief Overview Bricata offers next-generation intrusion prevention appliances and cloud solutions. Headquarters Bricata 9190 Red Branch Road, Suite D Columbia, Maryland 21045 [emailprotected] Executives John Trauth serves as CEO/President and Co-Founder of Bricata. He was previously President of Cybertap and Merlin International. History John Trauth and Randy Stephens co-founded Bricata. The company is headquartered in Maryland. The small start-up received $100K in funding from the state of Maryland. The company is hiring employees in the DC area. Key Competitors Cisco Products and Services Bricata offers its ProAccel next generation intrusion prevention solution. Delivered as an appliance, the product uses a multi-threaded engine for high performance, covering speeds from 500 Mbps to 42 Gbps. The sensor provides deep threat visibility and is supported by comprehensive data management and analytics. ProAccel is also available as a virtualized software solution for enterprise VM/cloud environments. Website https://www.bricata.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Bridgen Group provides search and recruiting services with emphasis on cyber response technology. Headquarters Bridgen Group The Crescent 100 Crescent Court, 17th Floor Dallas, Texas 75201 Tel: (855) 568 – 7900 103 Bauer Place, Suite 4 Waterloo, Ontario N2L 6B5 Executives Julie Bridgen serves as Managing Director of Bridgen Group. History Bridgen Group, established in 2014, is a Donaldson & James affiliate company with presence in Ontario and Dallas. Key Competitors CyberSN, Alta Associates Products and Services Bridgen Group provides search and recruiting services with emphasis on senior to C-level cyber security searches. Specific positions previously recruiting include CIO, CTO, CISO, Disaster Recovery Analyst, Forensic Investigator, Security Architect, Web Penetration Tester, Source Code Auditor, and Intrusion Detection Specialist. Website https://www.donaldsonjames.com/
Bridgeway Security Solutions (Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Bridgeway Security Solutions is a consultative information security reseller offering support and guidance for businesses, especially in the UK. Headquarters Bridgeway Security Solutions Bridge House, Buckingway Business Park Anderson Road Cambridge, Cambridgeshire CB24 4UQ United Kingdom Tel: +44 (0) 1223 97 90 90 Executives Jason Holloway, Founder and CEO of Bridgeway Security Solutions, was formerly head of EMEA sales for SanDisk. History Jason Holloway founded Bridgeway Security Solutions in 2012. The company is headquartered in Cambridge with an office in Falkirk, Scotland. Key Acquisitions Vioptim (2012) Key Competitors IT Security Experts, Intellect Security Products and Services The primary areas of focus for Bridgeway Security Solutions involve client anti-malware, digital certificate management, email archiving and continuity, encryption key management, full disk encryption, identity and access management, log management, mobile device management, and mobile device security. These services are provided through value added resale of solutions from Accellion, JanusNet, LogRhythm, Mimecast, MobileIron, Outpost24, ScanSafe, Venafi, Metacompliance, and Wave. Website https://www.bridgewaysecurity.com/
BrightPoint Security Acquired by ServiceNow
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence, Security Analytics Brief Overview BrightPoint Security, formerly Vorstack, provides real-time warning and analytic information related to threats based on peer collaboration, federation, and correlation techniques. Headquarters BrightPoint Security Corporation 5150 El Camino Real Los Altos, California 94022 Tel: (650) 539 - 9224 Executives Anne Bonaparte, President and CEO of BrightPoint Security, was previously CEO of Solidcore Systems. History Joe Eandi and Andreas Haugsnes founded Vorstack in 2011. The company remains privately held and is supported by funding through Lucas Venture Group, TechOperators Venture Capital, Aligned Partners, and Founder Collective. Vorstack rebranded as BrightPoint Security in 2015. Key Competitors Palantir, FireEye Products and Services BrightPoint Security focuses on reducing the threat of cyber attacks through federated data and collaboration amongst security peer groups with the intention of improving live indications and warning information. BrightPoint provides a simple, online configuration console for cloud-based sharing and federation of threat information amongst peers. The idea is that by sharing data about threats in real-time in the cloud, peer groups can collaborate more effectively to stop security threats. Website https://www.brightpointsecurity.com/
Brinqa
Bromium
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance, Security Analytics Brief Overview Brinqa provides an integrated GRC platform for performing risk analytics and placing risk into business context. Headquarters Brinqa Headquarters 4505 Spicewood Springs Road Suite 304 Austin, Texas 78759 Tel: (512) 372 – 1004 Executives Amad Fida, CEO of Brinqa, was previously co-founder and vice president of engineering at Vaau, which was acquired by Sun Microsystems. History Amad Fida and Hilda Perez co-founded Brinqa in 2008 to focus on Sarbanes-Oxley and regulatory compliance support. The company, which is headquartered in Austin with additional offices in Los Angeles and Jersey City, shifted its emphasis to risk analytics. Key Competitors RSA (Archer) Products and Services Brinqa allows C-level executives to make more informed decisions about risk. The Brinqa Risk Analytics product is the flagship platform offered by the company. It provides for data aggregation, measurement, remediation, and reporting of risk data. It includes support for prioritization of remediation efforts and achievement of real-time risk reporting. Additional features in the platform include pre-built contextaware risk models, aggregation of data from internal and external sources, automated risk correlation, and tools for trending and forecasting. Website https://www.brinqa.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Bromium provides an enterprise security suite that enables endpoints to protect themselves using CPU-based isolation, while continuously monitoring and correlating activity across all endpoints to enable the organization to protect itself, detect and respond to targeted attacks and attempted breaches, in real time. Headquarters Bromium HQ 20813 Stevens Creek Boulevard Cupertino, California 95014 Tel: (408) 598 – 3623 [emailprotected] Executives Ian Pratt, co-founder and CEO of Bromium, was previously CoFounder and Chief Scientist of XenSource. Simon Crosby, cofounder of Bromium, was co-founder and CTO of XenSource History Gaurav Banga, Simon Crosby, and Ian Pratt founded Bromium in 2010. It is privately held and is backed by Andreessen Horowitz, Ignition Capital, Highland Capital Partners, Intel Capital, Meritech, and Lightspeed Venture Partners. Key Competitors CrowdStrike, Cylance, Sentinel One, Cybereason Products and Services Bromium offers an advanced endpoint protection platform that leverages endpoint CPU virtualization technology called micro-virtualization to protect endpoints by seamlessly hardware isolating the execution of untrusted content. Microvirtualization also enables tamper-proof monitoring of the endpoint. Endpoints share forensic details of each attack in real-time before self-remediating to eliminate the attack. The platform automatically and continuously hunts for indications of each detected attack across all endpoints and servers in real-time to detect breaches. The solution automates the expensive and time-consuming task of enterprise-wide protection, detection and response. When an endpoint isolates and identifies malware in a micro-VM it alerts in realtime. Alerts contain precise information that enable an automated response: identifying the attack, and blocking access to infected sites and C&C servers and searching for signs of the breach across all endpoints. Bromium is deployed and managed via one-click deployment. The solution includes policy orchestration, and powerful threat analysis tools. It supports Windows and Mac OSX endpoints. Website https://www.bromium.com/
BT
Buddha Labs
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, DDOS Security, Infrastructure Security Brief Overview BT provides broadband, television, phone, and Internet products, including managed security services for businesses. Headquarters BT Center – Head Office 81 Newgate Street London, EC1A 7AJ Tel: 020 7356 5000 Executives Gavin Patterson serves as CEO of the BT Group. Sir Michael Rake serves as Chairman. History The company traces its roots to the Electric Telegraph Company incorporated in 1846 in the UK. Key Acquisitions Counterpane (2006) Key Competitors AT&T, CSC, Verizon, Orange Business Systems Products and Services BT provides telecommunications services, including managed security. The specific managed and professional security services offered by BT to its business customers are based on the acquisition of Counterpane Internet Security, founded by Bruce Schneier. The services can be grouped as follows: • BT Assure DDOS Mitigation • BT Assure Managed Firewall • BT Assure Threat Monitoring • BT Assure Managed Cloud • BT Assure Intrusion Prevention • BT Assure Cyber Defense Consulting • BT Assure Message Scanning • BT Assure Ethical Hacking Services • BT Assure Public Key Infrastructure • BT Assure Security Device Management Website https://www.btplc.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Cloud Security, Web Security Brief Overview Buddha Labs provides IT security and automated, hardened images for public, private, and hybrid clouds including Amazon Web Services. Headquarters Buddha Labs 270-F N El Camino Real #504 Encitas, CA 92024 Tel: (760) 487 – 8460 Executives Vincent Passaro, Founder and CEO of Buddha Labs, spent five years in the US Army, and held positions with Fotis Networks and Booz Allen Hamilton. History Vincent Passaro founded Buddha Labs in 2013. The small private company is headquartered in California. Key Competitors Trend Micro Products and Services Buddha Labs provides IT security solutions for the cloud in the following areas: • Hardened Amazon Machine Images – Involves prehardened images for Amazon Web Services to support security compliance. • Penetration Testing – Involves expert security analysis to reduce targeted security risk. • Web Security – Applies real world techniques to secure web applications and support compliance requirements such as FEDRAMP. Website https://www.buddhalabs.com/
BUFFERZONE
Buguroo
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview BUFFERZONE provides an endpoint container security solution that addresses advanced malware, zero-day threats, and drive-by attacks. Headquarters BUFFERZONE 4 Derech Hashalom Street Tel Aviv Israel Tel: (646) 432 – 6848 Tel: +972 3 6444012 Executives Israel Levy, CEO of BUFFERZONE, was previously Founder and CEO of ControlGuard, which was acquired by Cryptzone. History Israel Baharav and Eyal Dotan co-founded the company in 2003, which was formerly known as Trustware. The private company is headquartered in Israel. Key Competitors Bromium, Invincea Products and Services BUFFERZONE provides an endpoint container solution that offers separation for browsers and other tools from advanced threats. The solution also isolates attachments and removable media with the goal of producing alarms when suspicious activity is detected. The tool makes use of advanced analytics as well as a safe bridge for moving information into and out of containers. Website https://www.bufferzonesecurity.com/
(Alpha Version 0.1 – 08/04/17 – No Vendor Approval) TAG Cyber Controls Fraud Prevention Brief Overview Buguroo offers a variety of solutions for fraud prevention. They take advantage of deep learning, biometrics, and real time response to distinguish themselves from other vendors. Headquarters USA 1250 Borregas Avenue Sunnyvale, CA 94089 Tel: (+1) 650 285-2408 Madrid Calle Anabel Segura, 16 Edificio 3 Planta 1 Alcobendas, 28108 Tel: (+34) 91 229 43 49 Executives Jesús Sánchez-Aguilera serves as the CEO of Buguroo. History Buguroo was founded in 2010 in Madrid. Key Competitors Cyota, Verid Products and Services Buguroo has two main lines of security solutions: bugFraud – Which is and online fraud preventition solution that uses deep learning to detect and prevent emerging threats to digital banking users. bugScout – Which is a source code analysis tool used to detect potential risks in source code. Website https://www.buguroo.com/
Bugcrowd
BugSec
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Bug Bounty Support Brief Overview Bugcrowd provides a platform that provides support for managed bug bounty programs. Headquarters Bugcrowd 921 Front Street First Floor San Francisco, California 94111 Tel: (650) 260 – 8443 Executives Casey Ellis, Co-Founder and CEO of Bugcrowd, was previously a principal at Tall Poppy Group and a mentor at Pushstart. History Casey Ellis, Sergei Belakomen, and Chris Raethke, all security researchers from Australia, launched Bugcrowd in 2012 after having graduated from the Sydney-based Startmate accelerator program in 2011. The small startup company has received funding from Costanoa Venture Capital, Rally Ventures, Paladin Capital Group, and Blackbird Ventures. Key Competitors Synack Products and Services Bugcrowd focuses on enhancing the reporting of vulnerabilities by companies through bug bounty programs. The Bugcrowd platform supports vulnerability disclosure by streamlining vulnerability submissions and communication through a Web interface hosted encrypted in the Amazon cloud. The platform provides a way to collect metrics on reported information and to keep sensitive exploit data out of corporate in-boxes. The platform also provides a means for collecting and managing a point system for reimbursing researchers reporting vulnerabilities. Website https://www.bugcrowd.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Security Consulting, Security Training Brief Overview BugSec offers a range of information security services and products for enterprise customers. Headquarters BugSec Ltd. 11 Moshe Levi St. (UMI Building) Office 503, 5th Floor Rishon, Lezion 75070 Israel Tel: +972 3 9622655 Executives Ronen Carmona serves as CEO of BugSec. History Eyan Gruner, Boaz Zilber, and Idan Amir co-founded BugSec in 2005. All three of the co-founders went on to found Versafe in 2009, which was later acquired by F5. The small private company is headquartered in Israel. BugSec recently created Cynet in response to the growing APT challenge. Key Competitors SafeBreach, Cyberis Products and Services BugSec offers a suite of security-related products and services for penetration testing, anti-phishing, secure development, and risk assessment that can be grouped as follows: • Security Services – Includes security hardening, outsourcing, penetration testing, risk assessments, secure development, and training. • Security Products – Includes support for F5 Versafe, BugSec Sec2Pro solution, and the BugSec WebSniper Web Application Firewall. The BugSec Sec2Pro product provides a Notifier feature, which provides pop-up guidelines. • Security Research – This work is supported by the BugSec R&D team • Security Training – Includes awareness training to reduce phishing risk. Website https://www.bugsec.com/
BullGuard
Burns and McDonnell
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools, Mobile Security Brief Overview BullGuard provides Internet security, anti-virus, and malware protection for endpoint devices. Headquarters BullGuard Ltd 9 Devonshire Square London, UK EC2M 4YF Executives Paul Lipman, CEO of BullGuard, held previous positions with iSheriff and Total Defense. History BullGuard, launched by Morten Lund in 2002, is a privately held company with headquartered in London, as well as offices in Denmark, Romania, Australia, Belgium, America (San Francisco), Sweden, and Germany. Key Competitors Kaspersky Products and Services BullGuard provides endpoint anti-virus and malware protection for PCs and mobiles. The company’s Internet security, anti-virus, and malware protection suite includes the following: • BullGuard Premium Protection – Provides malware, identity theft, financial fraud, and on-line data leak protection, as well as security coverage for social media usage. • BullGuard Internet Security – Inspects systems for malware and provides a range of services including antivirus, parental controls, firewall, Spam filter, safe browsing, and vulnerability scanning. • BullGuard Anti-Virus – Includes anti-virus, safe browsing, and Spam filtering functions. • BullGuard Identity Protection – Continually monitors the web and social networks for evidence of personal data being misused. Also provides social media protection. • BullGuard Mobile Security – Provides basic mobile security protections for Android, Window Mobile, Symbian, or BlackBerry. Website https://www.bullguard.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Burns and McDonnell makes available a vast array of engineering services in many different areas including integrated security focused on compliance. Headquarters Burns and McDonnell World Headquarters 9400 Ward Parkway Kansas City, Missouri 64114 Tel: (816) 333 – 9400 Executives Ray Kowalik serves as CEO of Burns and McDonnell. History Chris Burns and Robert McDonnell founded the company in 1898. The company has grown over the decades to 2,200 employee-owners providing more then 350 different engineering services. Key Competitors Booz Allen Hamilton Products and Services Burns and McDonnell provides a range of Integrated Security Solutions for its customers including focus in the following areas: • Cyber Security Compliance – Includes physical security, cyber security, structural security, and regulatory compliance. • Information Security Projects – Includes special programs for the Pentagon, Marine Corps, USCENTCOM, and others. The company also specializes in providing compliance services for power and utility grid companies for NERC Critical Infrastructure Protection. The company’s Security Consulting Services Group has also developed security operations centers (SOCs) for customers. Website https://www.burnsmcd.com/
BWise
CA Technologies
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview BWise offers governance, risk, and compliance software solutions to support risk management, control, compliance, and audit. Headquarters Nasdaq BWise (HQ) Rietbeemdenborch 14-18 5241 LG Rosmalen The Netherlands Tel: +31 73 646 4911 Executives Peter de Verdier serves as VP of Market Technology, Chief Operating Officer for BWise. History The company has been part of Nasdaq since 2012, with headquarters in The Netherlands and offices in New York, Australia, Singapore, Sweden, France, UK, and Germany. Key Competitors MetricStream Products and Services BWise offers the following GRC solutions: • BWise Integrated GRC Platform (Corporate, Financial, and Process Management) • BWise Internal Control (SOX, SOD, Continuous Monitoring) • BWise Internal Audit (Analytics) • BWise IT GRC • BWise Risk Management • BWise Sustainability • BWise Compliance and Policy Management The company also offers a range of services including software-as-a-service platforms, implementation methodologies, business consulting, and BWise Academy training. Website https://www.bwise.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Password/Privilege Management, Two-Factor Authentication, Identity and Access Management, Data Encryption, Web Security, Mainframe Security Brief Overview CA Technologies provides a suite of IT management products and services, including solutions for securing data and identities. Headquarters CA Technologies, One CA Plaza Islandia, New York 11749 Executives Michael Gregoire has served as CEO of CA since 2013. History CA Technologies is a publicly traded company with 2013 revenues of $4.64B and 13,600 employees. Key Acquisitions Xceedium (2015) – IAM Arcot Systems (2010) Layer7 (2013) Netegrity (2004) Orchestria (2009) SilentRunner (2003) Key Competitors HPE, IBM Products and Services CA Technologies provides IT management products and services including solutions for securing data and identities. The CA Technologies security product and service portfolio includes the following solutions: • Advanced Authentication – Involves a flexible and scalable solution that integrates risk-based and multifactor authentication methods. • Layer 7 API Security and Management – Involves comprehensive set of solutions that externalize APIs for mobile apps, BYOD, cloud, and other technologies. • Data Protection – Includes CA DataMinder (solution for protecting critical data) and CA Email Control for Enterprise (security control for email). • Identity Management and Governance – Involves comprehensive support for identity management and governance in the enterprise. • Mobile Security – Includes mobile device security, mobile app security, and mobile content security focused on enabling BYOD, providing end-to-end security for mobile access, and securely manage data in the cloud. • Secure SSO and Access Management – Provides access management functions through CA SiteMinder (secure SSO), CA SiteMinder Federation (partnership administration), and CA CloudMinder SSO (SSO for private and public cloud). Website https://www.ca.com/
CACI
Caliber Security Partners
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Information Assurance Brief Overview CACI provides Federal Government customers with a comprehensive range of information solutions and services including cyber security and information assurance. Headquarters CACI International Inc. 1100 North Glebe Road Arlington, Virginia 22201 Tel: (703) 841 – 7800 Executives Kenneth Asbury has served as CEO of CACI since 2013. History CACI was founded in 1962, focused on simulation software. The company has been public on the NYSE since 1968 and reported $3.7B in revenue in 2013. Headquartered in Arlington, the company has more than 120 offices. Key Competitors SAIC, CSC, Booz Allen Hamilton Products and Services CACI provides information solutions and services, including cyber security, to Federal Government customers. CACI’s cyber security-related solutions and services for Federal Government include the following: • Biometrics and Identity Solutions – Includes staff with deep expertise in supporting US Government identity management and authentication. • Cyberspace Solutions – Addresses tactical and strategic components of US Government cyber operations. • Integrated Security Solutions – The Integrated Security Solutions (ISS) team helps prevent and mitigate threats to national security. Many of CACI’s other solutions in IT and Network, Knowledge Management, and Investigations and Litigations Support include cyber security as well. The company competes actively for Federal Government contracts and its portfolio of contracts drives its work program. Website https://www.caci.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Security Recruiting Brief Overview Caliber Security Partners provides security technical and strategic advisory services, as well as staffing services, for enterprise customers. Headquarters Caliber Security Partners 19011 Woodinville Snohomish Road NE Suite 250 Woodinville, Washington 98072 Tel: (888) 759 – 6225 Executives Tab Pierce, President of Caliber Security Partners, was previously the founder of The Zyon Group. History Tab Pierce founded Caliber Security Partners in 2010. The privately held company recently reported roughly 50 employees and is headquartered in Bothell, Washington. Key Acquisitions Concise Consulting Group (2012) Third Defense (2013) Key Competitors Déjà vu Security Products and Services Caliber Security Partners provides expert professional services in the areas of technology and strategic advice for security and executive teams. Caliber Security Partners offers a Security Process Management Suite (SPM) with four web applications designed to help an organization manage its security program: Risk Communicator, Service Manager, Vuln Tracker, and Metrics Manager. Website https://www.calibersecurity.com/
Calyptix Security
Capgemini
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Unified Threat Management Brief Overview Calyptix Security provides network security including UTM firewalls and VOIP security for small and medium sized businesses. Headquarters Calyptix Security Corporation 5701 Westpark Drive, Suite 201 Charlotte, North Carolina 28217 Tel: (800) 650 – 8930 Executives Ben Yarbrough serves as CEO of Calyptix Security. History Founded in 2002, Calyptix Security is headquartered in North Carolina. Key Competitors Fortinet Products and Services The Calyptix Security AccessEnforcer product provides network security capabilities for small and medium sized businesses that includes the following features: • UTM Firewall • GUI-Based Management • Automatic Updates • VPN Unlimited • Web Filtering • Email Filtering • Intrusion Detection and Prevention • Quality of Service for VOIP Website https://www.calyptix.com/
(Alpha Version 0.1 – 08/04/17 – No Vendor Approval) TAG Cyber Controls Consulting Brief Overview Capgemini is one of the world’s largest providers of technology consulting, outsourcing, and professional services with almost 190,000 employees in over 40 countries. Headquarters Application Services France Direction Générale 5/7 rue Frédéric Clavel 92 150 Suresnes Tel: +33 1 49 67 30 00 Executives Paul Hermelin serves as the group chairman and CEO. Paul has fifteen years of experience working for the French government, primarily in finance. History Capgemini is a French company founded by Serge Kampf in 1967. In the year 2000 Capgemini announced a merger with Ernst and Young Consulting. Key Competitors Infosys, TCS Products and Services Capgemini provides a wide variety of business solutions and services - everytthing from supply chain management to cybersecurity consulting. Website https://www.capgemini.com/
Capita Identity Solutions Capstone Security (Alpha Version 0.1 – 06/26/16 – No Vendor Approval) TAG Cyber Controls Identity Protection Brief Overview Capita provides identity verification products with emphasis on age checking for on-line services. Headquarters Capita/Intelligent-ID Churchward House Fire Fly Avenue Swindon Wiltshire SN2 2EY UK Tel: +44(0) 844 225 0055 Executives Andy Parker serves as Managing Director of Capita. History Capita is a public company headquartered in the UK. It acquired Intelligent-ID in 2015. Key Competitors Experian Products and Services Capita’s security-related solutions focus on Know-YourCustomer (KYC) and identity verification categorized as follows: • Authenticate Desktop – Configurable Web-based desktop portal access providing a means to conduct ID and/or age verification. • Authenticate Gateway – Seamless API interface to multiple data sources for ID and/or age verification. • Authenticate Batch Offline service carrying our ID and/or age verification using batch records at a time. • Enhanced Interaction – Human intervention within customer registration process for higher-risk use cases such as non-UK verifications. • BSMaRT – Web-based application for screening, monitoring, and alerting. • SAVI – Desktop portal for anti-money laundering and customer due diligence. Website https://www.capitaidentitysolutions.co.uk/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Application Security Brief Overview Capstone Security offers services in the area of application security, regulatory compliance, and security assessments. Headquarters Capstone Security 3429 5th Street SE Suite 32 Washington, DC 20032 Tel: (240) 449 – 4082 Executives James Ford serves as Principal Consultant at Capstone Security. History The small private company is headquartered in Washington and includes several financial services firms as its clients. Key Competitors Nisos Group Products and Services Capstone Security provides application, regulatory, and penetration testing services for its clients. Capstone Security offers security services in the following areas: • Application Security – Includes penetration testing of apps, threat modeling, code reviews, and policy creation. • Regulatory Compliance – Includes support for FISMA, PCI, FERPA GLBA, HIPPAA, and SOX compliance. • Security Assessment– Includes assessment of risk by teams of security consultants. Website https://www.capstonesecurity.com/
Capsule8
Carahsoft
(Alpha Version 0.1 – 08/22/17 – No Vendor Approval) TAG Cyber Controls Intrusion Prevention, Incident Response Brief Overview Capsule8 provides container-aware, real-time threat protection for Linux. Headquarters Capsule8 81 Prospect Street Brooklyn, NY 11201 Executives John Viega serves as Co-Founder and CEO of Capsule8. He was previously Executive Vice President for BAE Systems Applied Intelligence and SilverSky. History Founded in 2016, this private company has received $2.5M in funding and is headquartered in New York. Key Competitors Corelight Products and Services Capsule8 offers a platform for threat prevention and response that brings security to the entire Linux-based production environment, to detect and shut down attacks in real-time. The Capsule8 platform provides increased visibility, real-time threat preventions, automated attack resilience, and investigation and recovery. Website https://www.capsule8.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions, Information Assurance Brief Overview Carahsoft provides value added solutions including security and information assurance for the Federal Government. Headquarters Carahsoft 1860 Michael Faraday Drive, Suite 100 Reston, Virginia 20190 Tel: (703) 871 – 8500 Executives Craig Abod serves as CEO of Carahsoft. History The company has grown in ten years to $2.45B in revenue. It is headquartered in Reston and focused on Federal Government customers. Key Competitors IBM, CSC Products and Services The company provides solutions in the areas of Big Data, cloud computing, geospatial, and cyber security. Cyber security focus areas include DLP, proactive defense, continuous monitoring, endpoint security, and IAM. Partners supporting cyber security solutions include Core Security, VMware, Symantec, F5, Splunk, and FireEye. Website https://www.carahsoft.com/
Carbon Black
Carve Systems
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Endpoint security Brief Overview Carbon Black (previously Bit9 + Carbon Black) provides continuous monitoring of endpoints and servers toward malware protection, real-time visibility, threat detection, incident response, and forensic investigation. Headquarters Carbon Black 1100 Winter St. Waltham, Massachusetts 02451 Tel: (617) 393 – 7400 Executives Patrick Morley, President and CEO of CarbonBlack, was previously COO of Corel, as well as CEO of Imprivata Corporation. History Bit9 was founded in 2003. The company has had five rounds of funding from Atlas Venture, Highland Capital Partners, Kleiner Perkins Caufield & Byers, .406 Ventures, Sequoia Capital, and Paramount Pictures. The company has its EMEA Headquarters in London. Bit9 acquired Carbon Black in 2014. Key Acquisitions VisiTrend (2015) – Cyber analytics Key Competitors Intel, Tanium, FireEye, Symantec Products and Services Carbon Black’s endpoint and server continuous monitoring and malware protection platform is based on three core technologies: Bit9 Real-Time Sensor and Recorder – Alwayson visibility from deployed endpoints and servers about the files, executions, and system resources; Bit9 Real-Time Enforcement Engine –Mitigation based on policy and autosend of malicious files to FireEye and Palo Alto Networks WildFire; and Bit9 Cloud Services – The Bit9 Software Reputation Service crawls the Internet for software to calculate trust ratings and reputation scoring. Carbon Black’s endpoint security protection solution includes two main components: Carbon Black Continuous Endpoint Monitoring – Involves the always-on collection of information from the endpoint about execution events, file system modifications, registry modifications, network connections, and other observable factors; and Carbon Black Threat Intelligence – Involves support for collaboration and cooperation with existing intelligence sharing feeds and communities including iSIGHT Partners (FireEye) and US CERT. Website https://www.carbonblack.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Security Consulting, ICS/IoT Security Brief Overview Carve Systems provides security consulting and penetration testing services for IoT devices. Headquarters Carve Systems LLC 38 E. Ridgewood Avenue, #110 Ridgewood, New Jersey 07450-3808 Tel: (201) 632 – 4322 Executives Mike Zusman is Founder of Carve Systems. He was previously with Intrepidus, ADP, and Whale. History Founded in 2011 by Mike Zusman, the small company is headquartered in New Jersey. Key Competitors NCC Group Products and Services Carve Systems provides information security and risk management solutions for companies of all sizes including small and medium sized businesses. Specific solutions include the following: • Assessment Services – Includes application and product security, embedded devices, IoT, code review, cryptographic review, and Web application. • Enterprise Services – Includes risk assessment, secure software development lifecycle, and Web application. • Continual Risk Assessment – Focused on eliminating gaps and maintaining compliance. Website https://www.carvesystems.com/
Catbird (Alpha Version 0.1 – 06/26/17 – No Vendor Approval)
Cato Networks
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls TAG Cyber Controls Cloud Security Cloud Security Brief Overview Brief Overview Cato Networks provides cloud-based and enterprise-grade Catbird focuses on Software-Defined Segmentation and secure networking. Security for the Hybrid IT Infrastructure. Catbird’s software suite of products was designed to provide visibility into and Headquarters protection of private clouds and virtual Data Centers, and is Cato Networks LTD available for both VMware and OpenStack. 3 Rothschild Boulevard, Psagot Tower, 7th Floor Tel Aviv 6688106 Headquarters Israel Catbird Inc. 1800 Green Hills Road, Suite 113 Executives Scotts Valley, California 95066 Shlomo Kramer serves as Co-Founder and CEO of Cato Tel: (866) 682 – 0080 Networks. He is co-founder of Check Point and was inducted into the InfoSec Hall of Fame in 2013. Executives David Keasey, CEO of Catbird, was previously an executive History with Terremark, CyberTrust and Verizon. Shlomo Kramer and Gur Shatz co-founded Cato Networks in 2015. Investors include USVP and Aspect Ventures. The History company has presence in Tel Aviv and Alpharetta, Georgia. Catbird was formed in 2000, recapitalizing and bringing in a new leadership team in 2013 with funding by Medina Capital Key Competitors and Lachman Goldman Partners. Company revenue is Cloud Passage estimated to be $3M - $5M with an employee base of ~50. Received recent funding from Medina Capital Partners (led by Products and Services former Terremark executives.) Cato Networks provides cloud-based network security with the following capabilities: Key Competitors Illumio, vArmour, CloudPassage • Cato Cloud – Global optimized and secure enterprise network backbone built on a global networks of points Products and Services of presence (POP). Catbird is a pioneer and leader in Software-defined • Cloud Networks – Network security as a service via tight Segmentation and Security for the Hybrid IT integration of enterprise networking and network Infrastructure. Catbird’s software suite of products was security in the cloud. designed from the ground up to provide visibility into and • Security Services – Traffic encryption, next generation protection of private clouds and virtual Data Centers, and is firewall, VPN access, WAN security, application control, available for both VMware and OpenStack. URL filtering, and cloud-based management. • Catbird Insight automatically and continuously discovers Website all assets in virtual fabric, allows the grouping of these https://www.catonetworks.com/ assets into logical Catbird TrustZones and visualizes asset relationships and the east-west traffic flows between them for improved analytics. • Catbird Secure enables automated enforcement of flexible security policies across Catbird TrustZones. The platform detects and alerts on potential security incidents, initiates corrective enforcement actions and provides instant compliance reporting for major standards and mandates. Website https://www.catbird.com/
Caveon
Cavirin
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics, Web Fraud Prevention Brief Overview Caveon provides digital forensics and security audit services to help schools prevent test fraud. Headquarters Caveon 6905 S 1300 E #468 Midvale, Utah 84047 Tel: (801) 208 – 0103 Executives David Foster, Chairman and CEO of Caveon, was previously with Novell, and later founded Galton Technologies. History Caveon was founded in 2004 and is headquartered in Utah. Key Competitors Rid Fraud Products and Services Caveon provides a range of digital forensics and test solutions for schools and other organizations that can be grouped as follows: • Caveon Security Audit – Independent security audit of testing by experts • Caveon Web Patrol – Software and services that ensure security of test programs • Caveon Data Forensics – Platform that provides reporting on test drift, test scores, and who may be compromising tests. • Caveon Secure Exam Development & Support – Ensures test security • Caveon Investigative Services – Provides investigations for test incidents • Caveon Security Screen – Statistical analysis of test scores Website https://www.caveon.com/
(Alpha Version 0.1 – 08/07/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview Cavirin provides various services to help manage hybrid cloud environments. Headquarters 5201 Great America Pkwy Suite 419 Santa Clara, CA 95054 Tel: 1-408-200-3544 Executives Dr. Rao Papolu serves as the CEO and Chairman. History Cavirin was founded in 2012 on technology originally invented at Bell Labs. Key Competitors Skybot, newScale Products and Services The services provided by Cavirin are broken up into the following: For busineses - Cavirin offers security assessments for enterprise, mid market, and any saas expenses. For environments – Cavirin offers consulting and management for all the major cloud environmetns as well as hybrid environments. For industry - Various services such as cyber insurance are also provided. Website https://www.cavirin.com/
CDW
Celestix
(Alpha Version 0.1 – 08/07/17 – No Vendor Approval) TAG Cyber Controls VAR Brief Overview CDW is a multi-brand technology solutions provider to business government, education, and healthcare organizations in the United States, Canada, and the United Kingdom. Headquarters Executive Office 75 Tri-State International Lincolnshire, IL 60069 Tel: 847.465.6000 Executives Thomas E. Richards serves as the Chairman and CEO. History CDW was founded in 1984 by Michael Krasny after he realized there was a market for brokering IT products. Key Competitors Insight Enterprises Products and Services CDW offers a variety of business IT services. They also sell consumer products directly to market. Website https://www.cdw.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls VPN/Secure Access, Web Security, Two-Factor Authentication Brief Overview Celestix provides solutions for secure remote access connectivity to cloud and distributed offices, with additional capabilities such as Web security. Headquarters Celestix Networks 3125 Skyway Court Fremont, California 94539 Tel: (510) 668 – 0700 Executives Yong Thye Lin, CEO of Celestix, was previously Co-Founder of AIMS Lab Pte in Singapore. History Yong Thye Lin founded Celestix in 1999. The company is headquartered in California with offices in Reading, UK; Singapore; and Tokyo, Japan. Key Competitors Cisco, Juniper, Duo Security Products and Services Celestix provides secure remote access connectivity products that can be grouped as follows: • Cloud Edge Security (E Series) – Consists of an appliance that provides secure remote access and cloud connectivity. • DirectAccess (DAX Series) – Provides direct access to the corporate environment from the Internet with alwayson management, group policy enforcement, and IPSec support for remote access without the need for a separate VPN. • Two-Factor Authentication (HOTPin) – Involves tokenless two-factor authentication with mobile, SMS, IM or QR code. • Unified Access (WSA Series) – Supports market for secure access to Microsoft’s Forefront Unified Access Gateway 2010 (UAG) via SSL VPN, DirectAccess, SSTP, and RDP. • Threat Management (MSA Series) – Consists of a comprehensive secure Web gateway for Web-based threat protection and UTM. • Client Automation (BMC Series) – Supports repeater function required for large-scale patch management via the BMC BladeLogic patch management system. Website https://www.celestix.com/
Cellcrypt
Cellebrite
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Voice Security Brief Overview Cellcrypt provides a voice security application for trusted mobile communications on Android, iOS, BlackBerry, and Microsoft. Headquarters Cellcrypt 8500 Leesburg Pike Vienna, VA 22182 Tel: (703) 879 – 3328 Executives Richard Greco is Chairman and CEO of Cellcrypt. He is also Chairman and CEO of Treasure Investments. History The Cellcrypt founded began developing core encryption and communications technology in 2005. The company partners with Verizon as Voice Cypher Ultra. Cellcrypt is headquartered in Virginia with presence in London and Latin America. Key Competitors Koolspan, Silent Circle Products and Services Cellcrypt provides secure mobile voice with focus on strong encryption (AES-256 and RC4-384) and multiple network interoperability. The company also offers secure conferencing capability and secures PBX services. The technology is based on cCore NG Crypto which is designed to modular and FIPS 140-2 compliant. Website https://www.cellcrypt.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics Brief Overview Cellebrite provides mobile solutions with emphasis on the instore retail experience. The company includes a mobile forensics division that provides technology to support law enforcement. Headquarters Cellebrite 94, Derech Em Hamoshavot St. Petah Tivka, 49130 Israel Executives Ron Serber and Yossi Carmil serve as co-CEOs of Cellebrite. History Cellebrite is a wholly owned subsidiary of the Sun Corporation, a publicly traded company based in Japan. Cellebrite was established in 1999 with emphasis on the mobility business. The company is headquartered in Israel with offices in Parsippany, NJ and Paderborn, Germany. The mobile forensics division was established in 2007. Key Competitors 4Discovery, Guidance Software Products and Services Cellebrite provides mobile expertise for in-store retail and mobile forensics. The company’s mobile forensics division focuses on extraction, decoding, and analysis of data from mobile devices with support for a wide array of technologies including BlackBerry, Android, iOS, Nokia, portable GPS, tablet, Chinese chipset, and feature phones. The company also supports operations for physical extraction, file system extraction, logical extraction, decoding, and analysis. The Cellebrite Universal Forensic Extraction Device (UFED) is its flagship product. Website https://www.cellebrite.com/
Cellrox (Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview Cellrox provides a multi-persona mobile virtualization platform that encapsulates each persona within a secure zone to separate private and work usage. Headquarters Cellrox Ltd. 3 HaArd Street Tel-Aviv, 69710 Israel Tel: (972) 3 7444996 Executives Dror Nadler, CEO of Cellrox, was previously Vice President of Sales at Rapid7. History Cellrox, which was founded in 2011, is privately held and headquartered in Israel. The company received $4.7M in Series A funding from Runa Capital, Previz Ventures, and Columbia Technology Ventures. The Cellrox US offices are in Newton, Massachusetts. Key Competitors Sierra, Remotium Products and Services Cellrox provides multi-persona for Android mobile to separate private and work use into separate, virtual, secure zones. The Cellrox multi-persona capability provides secure zones that separate each persona, as well as a management system for IT departments to provision, manage, and update the software. By preventing exchange across the zone boundaries according to pre-configured policy standards, Cellrox can protect corporate and user data. The management system can reside on a dedicated server or can be hosted in the cloud. Website https://www.cellrox.com/
Center for Internet Security (Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview Center for Internet Security (CIS) is a non-profit organization focused on enhancing cyber security readiness and response of public and private organizations. Headquarters Center for Internet Security 31 Tech Valley Drive East Greenbush, New York 12061 Tel: (518) 266 – 3460 Executives John Gilligan serves as CEO of CIS. He was previously CIO of the US Air Force and US Department of Energy. History Will Pelgrin established CIS in 2000 as a spin-off of a New York State cyber security agency. The company is non-profit and focuses on multi-state awareness and readiness. Key Competitors DHS, US Cert Products and Services Center for Internet Security (CIS) focuses on enhancing cyber security readiness and response of public and private organizations. The primary services offered by The Center for Internet Security focus on the following areas: • Security Benchmarks – Provides standards and metrics for increasing security through tool and resource downloads. • Multi-State Information Sharing and Analysis – Serves as a focal point for the sharing of threat information between US State cyber response teams. • Trusted Purchasing Alliance – Provides cost-effective procurement support for state, local, and tribal government. • Integrated Intelligence Center – Helps develop and disseminate intelligence sharing products and solutions for public and private entities. Website https://www.cisecurity.org./
CenterTools (DriveLock) CENTRI (Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview CenterTools provides the DriveLock solution, which includes data loss prevention (DLP), encryption, and other endpoint security solutions. Headquarters CenterTools Software GmbH (HQ) MorikestraBe 28/3 71636 Ludwigsburg, Germany Tel: +49 (7141) 97178-0 Oregon Office: (503) 214 – 2887 Executives Mike Prieskorn serves as Managing Director and CEO of CenterTools. History The company is headquartered in Ludwigsburg, Germany with offices in Munich, Germany; Portland, Oregon; Cincinnati, Ohio; Cambridge, UK; Vienna, Austria; and Volketswil, Switzerland. Key Competitors Kaspersky, Trend Micro, ESET Products and Services The company’s flagship security product, DriveLock, provides the following capabilities: • Access control for drives, including disks, CD-ROMs, USB flash drives, and other media. • White list control for device protocols and types such as Bluetooth, Windows Mobile, BlackBerry, and so on. • Device usage policies based on many criteria such as manufacturer and time of day. • Automatic policy settings based on administratordefined profiles • Full disk encryption Website https://www.drivelock.com/
(Alpha Version 0.1 – 06/26/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview CENTRI provides an encryption-based solution for data protection. Headquarters CENTRI Technology Inc. 701 5th Avenue, Suite 550 Seattle, Washington 98104 Executives Vaughan Emery, CEO and President of CENTRI, has over twenty years of experience leading early stage companies. History Vaughan Emery founded CENTRI in 2010. To date, the company has received $52.5M in funding from FTV Capital and Neuberger Berman Private Equity. Key Acquisitions GraphScience (2015) Site Scout (2013) Real Cities (2008) Key Competitors Entrust Products and Services CENTRI offers its BitSmart software solution that combines advanced encryption with data optimization toward a comprehensive data protection solution. The product looks at data byte-by-byte to ensure end-to-end protection with the advantages of stream ciphers. The solution integrates data protection across existing applications, enterprise systems, cloud services, and mobility. Website https://www.centritechnology.com/
Centrify
Centripetal Networks
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Centrify provides an identity service across the data center, cloud, and mobile infrastructure with the goal of a single login for users and a central management scheme. Headquarters Centrify Corporation 3300 Tannery Way Santa Clara, California 95054 Tel: (669) 444 – 5200 Executives Tom Kemp, co-founder and CEO of Centrify, held previous executive, technical, and marketing positions at NetIQ, Compuware, EcoSystems Software, and Oracle. History Tom Kemp, Adam Au, and Paul Moore founded Centrify in 2004 with the goal of unifying identity management for the enterprise. The company remains privately held and is backed by Mayfield, Accel Partners, INVESCO Private Capital, Sigma West, and Index Ventures. The company claims over 5000 customers, including half of the Fortune 500. It has locations in California, Utah, Washington State, Brazil, UK, Dubai, Australia, and Japan. Key Competitors ForgeRock, Okta Products and Services Centrify offers a range of products, services, solutions, and resources that focus on single sign-on and mobile support for users, Active Directory and related enterprise component identity management capabilities, and privileged access controls. These solutions can be grouped as follows: Centrify Server Suite: • Standard Edition – Provides Active Directory-based authentication, access control, and role-based privilege management for Windows, Linux, and Unix. • Application Edition – Provides single sign-on for SAP, Apache, and J2EE/Java applications. Centrify User Suite: • SaaS Edition – Provides single sign-on for cloud apps and mobile devices. • Centrify for Samsung KNOX – Active Directory-based single sign-on and related mobile device management tools. Centrify also offers a range of training, certification, design, and related professional services for enterprise customers. Website https://www.centrify.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring, Threat Intelligence Brief Overview Centripetal Networks provides a real-time network protection solution that mitigates attacks at line-speed. Headquarters Centripetal Networks 2251 Corporate Park Drive, Suite 150 Herndon, Virginia 20171 Tel: (571) 252 – 5080 Executives Steven Rogers, Founder and CEO of Centripetal Networks, was previously CEO of Cryptek, Objective Communications, Cetacean Networks, and Rivulet Communications. Bill Crowell serves as Chairman of the Board of Directors or Centripetal Networks. History Founded in 2009, the private company is headquartered in Herndon with offices in New York and Boston. Key Competitors IronNet Products and Services Centripetal Networks provides network security solutions that can be grouped as follows: • Threat Intelligence Integration – Involves the Advanced Cyber Threat service • Proactive Network Defense – Involves the RuleGate threat intelligence appliance • Real-Time Visibility – Involves the QuickThreat visualization capability The company maintains partnerships with DarkTrace, FireEye, ThreatConnect, ThreatQuotient, AlienVault, CrowdStrike, IID, iSIGHT Partners (FireEye), ThreatTrack and Security. Website https://www.centripetalnetworks.com/
CenturyLink
Certes
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services Brief Overview CenturyLink is a telecommunications provider of Internet, TV, and voice, including a suite of managed security services for businesses. Headquarters CenturyLink Headquarters 100 CenturyLink Drive Monroe, Louisiana 71203 Tel: (318) 388 – 9000 Executives Glen Post serves as President and CEO of CenturyLink. David Mahon serves as CSO of CenturyLink. History CenturyLink is the second largest telecommunications company in the United States. It grew through acquisitions including Embarq, Qwest, Savvis, AppFog, and Tier 3. Key Acquisitions Tier-3 Level 3 Communications Seal Consulting, Inc. Key Competitors AT&T, Verizon Products and Services CenturyLink provides telecommunications services to business and individual customers, including a suite of managed security services for businesses. The managed security services offered by CenturyLink for its business customers include the following: • Managed Security Service – Includes emphasis on financial services, with support for threat protection, malware mitigation, Web filtering, Spam filtering, and other services. • Managed Firewall Services – Includes support for realtime perimeter and DMZ protection. • Email Defense – Protects business from Spam and virus attachment attacks in email. Includes support for the US government Enhanced Cyber Security (ECS) services • Professional Security Services – Includes a range of consulting, integration, and other professional service support capabilities for business and government. Website https://www.centurylink.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Cloud Security Brief Overview Certes Networks provides software-defined, encryptionbased security for enterprise applications. Headquarters Certes Networks Inc. 300 Corporate Center Drive Suite 140 Pittsburgh, Pennsylvania 15108 Tel: (412) 262 – 2571 Executives Paul German, CEO of Certes, has over 20 years of high technology experience. He is the founder of VoipSec and VP of EMEA. History The company is headquartered in Pittsburgh with presence in Asia Pacific, Central and Latin America, Europe, Middle East, and India. Key Competitors Entrust Products and Services Certes offers CryptoFlow, an automatic VPN solution that is application aware. The group VPN provides software-defined security with end-to-end traffic encryption. The platform provides support for key management and application security. Specific versions of the product include CryptoFlow Cloud, WAN, LAN, B2B, Mobile, Data Center Interconnect, and Network Encryption Starter Kit. Website https://www.certesnetworks.com/
Certified Security Solutions (CSS)
CertiPath
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls (Alpha Version 0.1 – 06/05/17 – No Vendor Approval) CA/PKI Solutions TAG Cyber Controls Brief Overview CA/PKI Solutions, Identity and Access Management, ICS/IoT CertiPath provides high assurance trusted authority services Security, Security Consulting in support of PKI infrastructure. Brief Overview Certified Security Solutions (CSS) provides security solutions Headquarters in the areas of PKI, encryption, and identity, with emphasis on CertiPath 11921 Freedom Drive, Suite 710 securing IoT. Reston, Virginia 20190 Tel: (855) 758 – 0075 Headquarters [emailprotected] Certified Security Solutions 6050 Oak Tree Boulevard Executives Independence, Ohio 44131 Shawn Hughes serves as CEO of CertiPath. He held previous Tel: (216) 785 – 2990 sales and marketing roles with IBM, NYNEX, and Compaq Computer. Executives Kevin von Keyserling, President and CEO of Certified Security History Solutions, was previously Vice President with Relera Founded in 2004, CertiPath was acquired by Crawley Hatfield Corporation. Capital and SHiRT LLC in 2013. History Key Competitors Established in 2001, the privately held company is Comodo headquartered in Ohio with satellite offices in Montreal, Ottawa, Portland, Irvine, Boston, New York, Atlanta, Tampa, Products and Services and Houston. CertiPath provides a PKI-based trust framework and identity services focused on the problem of identifying individuals Key Competitors seeking access. Products leverage the Trust Fabric, a secure Comodo interconnection of trusted partnerships that CertiPath spent a decade helping to create. Products include TrustMonitor, Products and Services Certified Security Solutions (CSS) offers professional services which monitors CA, SSL, and credentials; TrustValidator, which enables visual confirmation of digitally signed emails; and platform solutions in the areas of PKI for IoT, PKI TrustManager, which is a commercial smart card; and a range Managed Services, PKI Support, PKI Readiness Assessment, of identity services for federated trust, physical access, and PKI Design and Deployment, and Identity and Access system design. Management. CSS offers a Certificate Management System (CMS) platform for managing certificates. The company also Website focuses on IoT solutions with its VerdeTTo IoT Identity https://www.certipath.com/ Platform, which establishes trust for devices. Website https://www.css-security.com/
CGI
Checkmarx
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Information Assurance Brief Overview CGI provides global IT consulting, systems integration, and outsourcing, including a practice in cybersecurity. Headquarters CGI Head Office 1350 Rene-Levesque Boulevard West 15th Floor Montreal, Quebec H3G 1T4 Canada Tel: (514) 841 – 3200 Executives George D Schindler serves as CEO of CGI. History Founded in 1976 by Serge Godin and Andre Imbeau, the public company trades on the NYSE and is headquartered in Montreal. Key Competitors SAIC, Accenture, Tech Mahindra Products and Services CGI provides application services and business consulting to commercial and Federal customers. Within the business consulting area, the company provides cybersecurity services with emphasis on governance, security engineering, and managed security services. The company also specializes in risk management, compliance, data security, identity and access management, biometrics, cloud security, cyber insurance, and mobile security. Website https://www.cgi.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Application Security Brief Overview Checkmarx provides static code analysis solutions that identify potential security vulnerabilities in software. Headquarters Checkmarx Headquarters 5250 Old Orchard Road, Suite 300 Skokie, Illinois Checkmarx EMEA Azzrieli Towers Round Building Level 20 Menachem Begin St. Tel-Aviv, Israel 6701101 Executives Emmanuel Benzaquen, CEO of Checkmarx, was previously involved with several start-ups including ARC, Embedded Performance, and Intellicourt. History Maty Simon founded Checkmarx in 2006. The privately held company has received Venture Round funding from Ofer HiTech, Salesforce, and XT Investments. The company, which pioneered the concept of a query language-based approach to identifying vulnerabilities, claims customers in over thirty countries. The company received $84M in venture funding in 2015 from Insight Venture Partners. Key Acquisitions Codebashing (2017) Key Competitors Cigital Products and Services Checkmarx uses static code analysis to prevent software vulnerabilities in developed software. The Checkmarx Static Code Analysis (SCA) platform offers on-premise and cloud solutions for scanning, compliance, and risk management. Specific attributes of the platform include the following: • Static Code Analysis – Code is examined from the perspective of vulnerability detection • Multiple Supported Programming Languages – Includes Java, C#, .NET, C, C++, Visual Basic, VB NET, Flash, APEX, Ruby, Javascript, ASP, Perl, Android, Objective C, PL/SQL, and HTML5. • Application Security Testing • Visualization Website https://www.checkmarx.com/
Check Point Software
CheckRecipient
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform, Data Encryption, Intrusion Detection/Prevention, Web Security, Unified Threat Management, Endpoint Security, Mobile Security, Threat Intelligence Brief Overview Check Point provides a full range of next generation security products and services. Headquarters Check Point Software Technologies Ltd. 959 Skyway Road, Suite 300, San Carlos, California 94070 Executives Gil Shwed, Founder and CEO of Check Point Software Technologies, is considered inventor of the modern firewall. History Gil Shwed founded Check Point Software Technologies in 1993, eventually releasing the influential FireWall-1 product, one of the first commercial firewall products. The company went public in 1996 and reported revenues of $1.3B in 2012, up from much earlier revenues of just $10M in 1995. Key Acquisitions Lacoon Mobile (2015) – Mobile Security Key Competitors RSA, Palo Alto Networks, FireEye Products and Services CheckPoint Software provides the following products: • Security Appliances: Integrated hardware devices preinstalled with all essential software blades to produce a comprehensive security gateway solution. Includes NG Firewall, Next Generation Threat Prevention, NG Secure Web, and NG Data Protection. • Security Software Blades: Security module solutions that can be combined to form independent or bundled solutions. Specific blades include the following: Threat prevention, Security Gateway Software Blades for firewall, IPSec VPN, IPS, and URL filtering. • Virtualization Security: These are virtual appliances for Cloud Security and Mobile Operator Solutions. • Security Management Appliances: Smart-1 and SmartEvent Security management Appliances. • Software Blades: This includes the management components necessary to build a Check Point security gateway solution. Functions include compliance, network policy management, and endpoint policy. • Multi-Domain Security Management: This includes security management functions based on the Provider-1. • Endpoint Security Management: This includes Check Point Policy Management functions. • Endpoint Security Products: These include full disk encryption, media encryption, anti-malware and program control, firewall and compliance checking, remote access VPN, and mobile access blade. Website https://www.checkpoint.com/
(Alpha Version 0.1 – 07/18/17 – No Vendor Approval) TAG Cyber Controls Email Security Brief Overview CheckRecipient uses a software platform to monitor misaddressed emails and IP theft. Headquarters Check Recipient Limited 27 Hammersmith Grove, London W6 0NE 44 0 2080 685 223 Executives Tim Sadler, CEO and Co-Founder of Check Recipient, was named Forbes Europe 30 under 30 in technology. He was previously R&D engineer at GE and Trac Group Limited. History CheckRecipient was founded in 2013 by Tim Sadler, Tom Adams, and Ed Bishop. It is headquartered in London with offices in the Middle East and India Key Competitors Cloudmark Products and Services CheckRecipient provides the following products • Guardian: Analyzes data across the entire email network, maps data relationships, and detects patterns of behavior across the network. • Rulebuilder: Implements email communication rules, deploys rules to the firm, and detects when these rules are triggered. Website https://www.checkrecipient.com
Chertoff Group
China Telecom
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Information Assurance Brief Overview The Chertoff Group provides senior-level consultation and professional services to companies in the area of cyber security. The firm specializes in advising on mergers and acquisitions, security consulting, and business development, especially in the area of United States government interests. Headquarters Chertoff Group 1399 New York Avenue, NW Suite 900 Washington, DC 20005 (202) 552 – 5280 Executives Michael Chertoff, Chairman and Co-Founder of the Chertoff Group, is the former Secretary of Homeland Security. History Michael Chertoff, former Secretary of DHS and Chad Sweet, former chief of staff at DHS, founded the Chertoff Group in 2009. The firm has since grown to include an impressive roster of senior executives and experts in the area of cyber and global security. Senior executives at the Chertoff Group include former Director of the NSA Michael Hayden. Key Competitors Good Harbor Products and Services Businesses routinely seek advice, counsel, and professional services from experienced experts with the appropriate contacts and expertise to offer the best guidance. The Chertoff Group was founded precisely with this mission in mind. Since its inception in 2009, the company has grown to include many of the best minds in cyber and global security. Their core expertise and mission lie in three areas: security services, business development, and mergers and acquisitions. The Chertoff Group offers services to clients in the following areas: • Business Development – The Chertoff Group provides business development with emphasis on global risk management, data and cyber security, border protection, global commerce including supply chain security, biometrics and identity management, critical infrastructure protection, natural or man-made disaster preparedness, fraud prevention and investigation, intelligence and counter-terrorism, and chemical, biological, radiological, and nuclear (CBRN) security. • Mergers and Acquisitions – The Chertoff Group also provides M&A services with emphasis on market analysis, market intelligence, due diligence, budget and program reviews, forecast validation, customer background checks, management and cultural assessments, and investment banking issues. Website https://www.chertoffgroup.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services Brief Overview China Telecom is a large state-owned telecommunications provider of phone, Internet, mobile, and application services, including managed security. Headquarters China Telecom HQ No. 31, Financial Street Xicheng District, Beijing, PR China Post Code 100033 Tel: +86-10-58501800 Executives Yang Jie serves as CEO of China Telecom. History The company provides fixed line telephone services to 216 million people in China, as well as 43 million mobile subscribers. While the company is listed on the Hong Kong and New York Stock Exchanges, the Chinese Government retains majority ownership. Key Competitors China Mobile Products and Services China Telecom provides state-owned telecommunication services to businesses and individuals. This includes a suite of managed security services. The managed security service portfolio offered by China Telecom includes the following offerings: • Network Monitoring and Alert Service – Includes realtime monitoring of network security events, along with alerting of security events. • Security Event Management Service – Includes storage of security information and analysis of security events. • Security Emergency Response Service – Includes Hotline support, security emergency consulting, and assistance in security accidents. • Security Statement Management Service - Includes security analysis reporting and announcements. Website https://www.chinatelecom.com.cn/
Cigital Acquired by Synopsys
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Software Security, Application Security, Security Consulting, Penetration Testing Brief Overview Cigital provides consulting services in the areas of application and software security design, development, and maintenance. Headquarters Cigital Corporate Headquarters 21351 Ridgetop Circle, Suite 400 Dulles, Virginia 20166-6503 Tel: (703) 404 – 9293 Executives John Wyatt, Chairman and CEO of Cigital, was previously with James Martin & Co., MicroStrategy, and Ariel Research. Gary McGraw serves as CTO of Cigital. History Cigital was established in 1992 based on funding from DARPA and NASA. The company pioneered static analysis tools, eventually licensing the technology to Kleiner Perkins, which then was used as the basis for Fortify Software in 1999. The company received $50M in private equity funding from LLR Partners in 2013, cashing out previous investors. Key Competitors EY, Accenture, Veracode Products and Services Cigital provides expert assistance to companies in software and application security. Cigital offers the following products for developers, security teams, and organizations: • SecureAssist – Helps developers find and fix security problems during the coding process. • Enterprise Security Portal (ESP) – Provides security testing coverage for teams using Fortify or AppScan. • BuildSecure eLibrary – Delivers training company-wide in the area of software security. The company offers services in the following areas: • Security Testing as a Service • Application Development • Architecture Analysis • Code Review (Static Analysis) • Mobile Application Security • Penetration Testing (Dynamic Analysis) • Software Security Practices Cigital’s BSIMM (Building In Security Maturity Model) is a useful measuring tool for assessing the maturity of a software development organization. Website https://www.cigital.com/
Cimcor (Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, File Integrity Monitoring Brief Overview Cimcor provides a suite of file integrity monitoring and compliance solutions for the enterprise. Headquarters Cimcor Headquarters 8252 Virginia Street, Suite C Merrillville, Indiana 46410 Tel: (877) 4-CIMCOR Executives Robert Johnson III serves as President and CEO of Cimcor. History Founded in 1997, the company is incorporated and located in Indiana. Key Competitors Tripwire, Trustwave, SolarWinds, LogRhythm Products and Services Cimcor provides a solution for Cimtrak that includes file integrity monitoring capabilities for the enterprise. The solution detects when file and configurations are modified and provides guidance for immediate action. Cimtrak is available for enterprise servers, network devices, databases, Active Directory, POS systems, and VMware ESX/ESI Configurations. The company sells its product through a plethora of partners around the world. Cimcor also has a large Federal Government base of customers using CimTrak. Website https://www.cimcor.com/
CipherCloud
CipherGraph
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Data Leakage Prevention, Data Encryption Brief Overview CipherCloud offers an open platform that provides enhanced security for organizations to use cloud and virtual applications such as Salesforce.com. Specific security functions include encryption, data loss prevention, and malware detection. Headquarters CipherCloud Inc. 333 W. San Carlos Street, Suite 1100 San Jose, California 95110 (855) 5CI-PHER (855 – 524 – 7437) Executives Pravin Kothari, Founder, Chairman, and CEO of CipherCloud, was previously Founder and CTO of Agiliance, as well as CoFounder and VP of Engineering for ArcSight, which was eventually acquired by HP. History Pravin Kothari founded the company in 2010 based on his vision of how cloud and virtual security would evolve. The company has since grown considerably, and is backed by Andreessen-Horowitz, Index Ventures, and Deutsche Telecom. CipherCloud closed a Series B round of investment for $50M led by Transamerica Ventures with Delta Partners, Andreessen Horowitz, T-Ventures, and Deutsche Telecom Ventures. Headquartered in California, the company has presence in the UK, Australia, India, and Japan. Key Competitors CloudLock, CloudPassage Products and Services CipherCloud provides enhanced security, starting with encryption, for organizations that use cloud or virtual services such as Salesforce.com. CipherCloud’s platform solutions are offered as virtual appliances or in-the-cloud and can be grouped as follows: • CipherCloud for Salesforce – The CipherCloud Open Platform solution offers encryption, tokenization, activity monitoring, data loss prevention (DLP), and malware detection for sensitive customer data stored in Salesforce and Force.com. • CipherCloud for Salesforce Chatter – This addresses internal communications on Salesforce. • CipherCloud for Box – This involves the use of DLP to scan, detect, and mitigate risks for business collaboration and content sharing on Box. • CipherCloud for Office 365 – This solution addresses email, calendar, contact, and task information stored in Exchange Online and Hosted Exchange. • CipherCloud for Gmail, AnyApp, and Amazon Web Services Website https://www.ciphercloud.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, VPN/Secure Access Brief Overview CipherGraph provides secure cloud-based virtual private networking (VPN) services. Headquarters CipherGraph Headquarters 4900 Hopyard Road, Suite 100 Pleasanton, California 94588 Executives Jitender Sharan, Founder and CEO of CipherGraph, is a graduate of IIT Kanpur. History Jitender Sharan founded CipherGraph in 2011. The private company has received $340K in funding from investors. Key Competitors Google Products and Services CipherGraph provides secure cloud-based VPN services. CipherGraph’s cloud-based VPN products can be grouped as follows: • CipherGraph Cloud Access Gateway (CAG) – Involves gateway broker services for public and private clouds with support for encryption, mobile device access, integration with AD and LDAP, compliance support, 2FA, and subscription pricing. The service integrates directly with AWS. • CipherGraph Cloud Access Gateway VX (VPN): Virtual Appliance – Involves the CAG as a virtual appliance targeted toward datacenter or hybrid cloud-based organizations that choose for the datacenter to serve as the point of entry for all company apps. • CipherGraph iLB (Intelligent Load Balancer) – Offers fullfeatured load balancing for CAG and CAG VX to support high performance, failover, and load balancing. Website https://www.ciphergraph.com/
cirosec
Cisco Systems
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, VAR Security Solutions Brief Overview cirosec provides security consulting and information security support for enterprise customers in Germany. Headquarters Cirosec GmbH EdisonstraBe 21 74076 Heilbron Germany Tel: +49 7131 59455 0 Executives Stephan Strobel, Founder and Managing Partner of cirosec, was one of the founders of Centaur Communications. History Stephan Strobel founded cirosec in 2002. The company is headquartered in Heilbron, Germany. Key Competitors ERNW Products and Services Consulting firm, cirosec, offers a range of information security consultative services for its German clients that can be grouped as follows: • IT Security Management Consulting • Concepts, Reviews, and Analysis • Audits and Penetration Testing • Incident Response and Forensics • Implementation of Products and Solutions Website https://www.cirosec.de/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform, Intrusion Detection/Prevention, Email Security, Unified Threat Management, Web Security, Network Monitoring, VPN/Secure Access, Governance, Risk, and Compliance Brief Overview Cisco Systems provides a comprehensive suite of networking products including a portfolio of cyber security products and services. Headquarters Cisco Systems Headquarters 170 West Tasman Drive San Jose, California 95134 Executives Chuck Robbins serves as CEO of Cisco Systems. John Chambers serves as Chairman of the Board. History Founded in 1984, the company focused on building routers. After going public in 1990, the company continued to grow organically and through acquisitions. The growth of the Internet from 1996 to the present led to significant growth in Cisco, as it has become one of the largest and most successful networking companies in the world. Cisco’s cyber security portfolio has included the early PIX firewall, the WheelGroup NetRanger IDS, and the Cisco Guard. Key Acquisitions IronPort (2007), Securent (2007), ScanSafe (2009), Virtuata (2012), Cognitive Security (2013), SourceFire (2013) Neohapsis (2014), Lancope (2015), OpenDNS (2015), Pawaa (2015), CloudLock (2016), AppDynamics (2017) Key Competitors Juniper, ALU Products and Services Cisco includes an extensive range of cyber security enterprise products including the following: • Sourcefire Security Solutions –Next Generation IPS, Advanced Malware Protection, and FirePOWER • Security Solutions –Cognitive Threat Analytics, Threat Defense Solution • Secure Edge and Branch –Meraki MX Cloud Managed Security Appliance for UTM, ASA 5500-X Series NextGeneration Firewalls, ASA Next-Generation Firewall Services, and Intrusion Prevention System. • Secure Email and Web – Web Security, Email Security • Secure Data Center and Virtualization - Next-Generation Data Center Firewall, Cloud Firewall, IPS 4500 Series Sensors, and Virtual Security Gateway • Additional Secure Access, Mobility, and Physical Security In 2014, Cisco launched its Managed Threat Defense solution, which is an on-premises combination of hardware, software, and Cisco-provided security analytics. Website https://www.cisco.com/
The CISO Group
Citrix
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, PCI DSS/Compliance Brief Overview The CISO group offers information security consulting with an emphasis on PCI DSS compliance issues. Headquarters The CISO Group 1081 Holland Drive Boca Raton, Florida 33487 Tel: (561) 206 – 4512 1416 Little Raven Street Unit E Denver Colorado 80202 Executives Alan Shimel, Josh Karp, and Parker Yates are the managing partners for The CISO Group. History Alan Shimel and Josh Karp were previously executives with StillSecure, which was acquired by SilverSky. The CISO Group is a small partnership located in Florida and Colorado. Key Competitors Trustwave Products and Services The primary solutions offered by The CISO group include merchant PCI solutions, PCI gap analysis, and a range of security consulting services built around a methodology of discovery, organization, risk assessment, security policy, remediation, and verification. Website https://www.thecisogroup.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Secure File Sharing Brief Overview Citrix provides solutions for virtualization, networking, and cloud infrastructure, including security capabilities for virtual environments. Headquarters Citrix Strategic Headquarters 4988 Great America Parkway Santa Clara, California 95054 Tel: (800) 424 - 8749 Executives Kirill Tatarinov serves as President and CEO of Citrix. He was previously with Microsoft. History Founded in 1989, the company name was a combination of citrus (named after its Florida headquarters) and Unix. The company struggled financially through the early 1990’s, but went public in 1995. A close relationship with Microsoft, and many acquisitions, helped the company grow. The company, which reported revenues of $2.21B in 2011, maintains its operational headquarters in Fort Lauderdale, and offices in Europe, Middle East, Africa, India, Latin America, and the Caribbean. Key Acquisitions Netscaler (2005) Teros (2005) QuickTree (2007) ZenPrise (2012) Unidesk (2017) Key Competitors VMware Products and Services Citrix provides secure Workspace-as-a-Service solutions for virtualization, networking, and cloud infrastructure, including security. The primary cyber security-related solution offering from Citrix is its NetScaler hardware device or network appliance that provides Level 4 load balancing, firewall, proxy, and VPN support functions. Specific features offered as part of the NetScaler solution include high-speed load balancing, data compression, content caching, SSL acceleration, network optimization, application visibility, and application security. Platform models include Citrix NetScaler 7000, 9010, 10010, 12000, MPX 5500, MPX 7500, and others. Additional security capabilities offered by Citrix include Advanced Access Control and Password Manger. The company acquired mobile security start-up Zenprise in 2012, which offers mobile device management, and mobile security. The product will be integrated with the Citrix CloudGateway and MeWork solutions for managing mobile apps. Website https://www.citrix.com/
CIX Software
Clavister
(Alpha Version 0.1 – 08/22/17 – No Vendor Approval) TAG Cyber Controls Application Security Brief Overview CIX Software develops products focused on application behavioral analytics and real-time application self protection. Headquarters CIX Software 3 West 18th Street Weehawken, New Jersey 07086 Tel: (201) 766 – 2022 Executives Sameer Malhotra, Founder and CEO of CIX Software, was previously Vice President of Goldman Sachs and Senior Vice President of Bank of America Merrill Lynch. History CIX Software was founded in 2015 by Sameer Malhotra. This private company is headquartered in New Jersey. Key Competitors Code DX Products and Services CIX Software offers the BUSHIDO platform. It receives realtime data from applications and sends real-time responses. The platform has a machine learned profile, increased visibility, real-time analysis of behaviors, and workflow driven response. Website https://www.cixsoft.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform, VPN/Secure Access Brief Overview Clavister offers a range of network security solutions including firewall and VPN solutions for physical and virtual environments. Headquarters Clavister Sjogatan 6 J Ornslodsvik, SE-891 60 Sweden Tel: +46 660 29 92 00 Executives Johan Ohman serves as CEO of Clavister. He was previously CEO of NetEnt. John Vestberg, Co-Founder and CTO of Clavister, was previously sole proprietor conducting IT consultancy projects. History Peter Johansson, current Executive Vice Chairman of Clavister, and John Vestberg co-founded the company in 1997. The private company received Venture Round funding from SEB Venture Capital and Industrifonden. Key Competitors Palo Alto Networks, CheckPoint Products and Services Clavister delivers a full range of network security solutions for both physical and virtual networks. Clavister’s network security solution offerings are based on the Clavister cOS security network operating system and are available in either hardware appliance or virtualized software form. The Clavister solution targets the following environments: • Clavister cOS Core – Involves feature-rich network security services designed for enterprise and cloud environments. • Clavister cOS Stream – Involves high-performance network security capabilities focused on the needs of the telecommunication operations environment. Specific Clavister network security products include the Eagle Series (provides remote access firewall services), Lynx Series (provides industrial firewall capability), Wolf Series (provides support for data centers), and PolarBear Series (provides support for telecom). All products are managed via the InControl system and come with support for unified threat management (UTM). Website https://www.clavister.com/
Cleafy
Clearswift
(Alpha Version 0.1 – 07/18/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Cleafy protects web and mobile applications from tampering attempts and deploys countermeasures to guarantee data and content integrity. Headquarters Cleafy Via Simone Schiaffino 11/A 20158 Milan, Italy Tel: +39 02 87031661 USA 283 Franklin Street Boston, Massachusetts 02110 +1 (617) 936-0212 Executives Matteo Bogana serves as CEO and Co-Founder of Cleafy. History Cleafy was Founded in 2012 by Mattero Bogana and Nicolo Pastore. The private company is based in Milan, Italy Key Competitors Cylance Products and Services Cleafy provides a platform that protects web and mobile applications against attacks from compromised enpoints. It detects attacks such as MITB, MITM, RAT-in-the-browser, defuses the threat, anticipates attacks, and responds with remediation actions. Website https://www.cleafy.com/
Acquired by RUAG (Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Web Security, Email Security, Data Leakage Prevention Brief Overview Clearswift provides adaptive security protection for cloud, mobile, and email systems. Headquarters Clearswift UK – International HQ 1310 Waterside Arlington Business Park, Theale Reading, RG7 4SA, United Kingdom Tel: +44 (0) 118 903 8903 Tel: (Mt. Laurel, NJ) (865) 359 – 2360 Executives Heath Davies, CEO of Clearswift since 2012, has worked in many countries including UK, Europe, America, Australia, Vietnam, China, India, and South Africa. History Clearswift was established as NET-TEL in 1982, building the first mail client for MS-DOS in 1988. The company was rebranded as Clearswift in 2001 and has grown to over 230 employees. Lyceum Capital has backed the company since 2011. RUAG acquired Clearswift in 2016. Key Acquisitions Content Technologies (from Baltimore Technologies) (2002) Jedda Systems Pty Ltd (2013) Key Competitors Blue Coat, Fortinet Products and Services Clearswift provides adaptive security for cloud, mobile, and email through its various platforms. Clearswift offers a suite of product solutions using adaptive security for cloud, mobile, and email that can be grouped as follows: • Clearswift SECURE Email Gateway – Offers threat protection for inbound and outbound email focused on Spam, DLP, encryption, management, and adaptive redaction, • Clearswift SECURE Exchange Gateway – Integrates security protection with Exchange 2007, 2010, or 2013. • Clearswift SECURE Web Gateway – Monitors Web browsing and usage for threats, data leakage, and URL categorization. • Clearswift SECURE ICAP Gateway – Secure browsing experience – including a partnership with Blue Coat. • Clearswift SECURE File Gateway – Provides file content inspection to ensure DLP. • MIME Sweeper for SMTP – Email filtering technology on which Clearswift products are designed. • Clearswift Content Inspection Engine (SDK) – Provides SDK to the content inspection engine. Website https://www.clearswift.com/
Cloak Labs
Clone
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Secure File Sharing Brief Overview Cloak Labs provides end-to-end encryption of application data from the enterprise to partners. Headquarters Cloak Labs 12120 Foothill Lane Los Altos Hills, California 94022 Executives Michel Floyd, CEO of Cloak Labs, was previously Global CTO of YouGov Plc History Bob Miller and Mari Tangredi established CloudPrime in 2009 based on technology from Slam Dunk Networks. The small private company has received $2.2M in Series B funding from investors. The company changed its name from CloudPrime to Cloak Labs in 2014. Key Competitors Uniken Products and Services Cloak Labs provides end-to-end encryption for applications from the enterprise to partners. The company offers a cloudbased secure messaging system (as an alternative to VPN) for enterprise, desktop, and mobiles including the following products: • Cloak Labs Global Virtual Bus – Extends enterprise service bus from data center to partners • Cloak Labs Security Gateway – Provides end-to-end application encryption support Website https://www.cloaklabs.com/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, PCI DSS/Compliance Brief Overview Clone Systems is a managed security services provider that focuses on continuous monitoring, secure private cloud, security scanning, and consulting. Headquarters Clone Systems 1835 Market Street, Suite 535 Philadelphia, Pennsylvania 19103 Tel: (800) 414 0321 Executives George Nianios is founder and President of Clone Systems. Richard Daw was appointed Chief Operating Officer of the company in 2008. History Clone Systems was established in 1998 and is headquartered in Philadelphia. Key Competitors Trustwave, Solutionary (NTT) Products and Services Clone Systems managed and professional services can be grouped as follows: • Managed Security Services – Includes management and monitoring of firewalls, IPSs, WAFs, VPN IPSec, SSL, SIEM, HIDS, UTM, and Email Security. • Secure Private Cloud Solutions – Includes PCI Compliance for Cloud, HIGH Availability Services for Cloud, Disaster Recovery for Private Cloud, and Cloud Security Services. • Security Scanning Services – Includes penetration testing, Web app penetration testing, on-demand penetration testing, vulnerability scanning, and Web app vulnerability scanning. • Outsourced IT and Consulting – Includes security consulting, network design, disaster recovery, training, network operations center, network infrastructure, and server infrastructure. Website https://www.clone-systems.com/
Cloudera
CloudFlare
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Data Encryption Brief Overview Cloudera integrates security solutions including encryption into its Big Data Hadoop environment. Headquarters Cloudera Headquarters 1001 Page Mill Road, Building 3 Palo Alto, California 94304 Executives Thomas Reilly serves as CEO of Cloudera. He was previously VP and GM with HP. History Headquartered in Palo Alto, the company has presence in San Francisco, New York, North Carolina, Virginia, Georgia, Illinois, New Hampshire, Texas, India, Australia, South Korea, Singapore, France, Japan, UK, Hungary, and China. Cloudera went public in April 2017 Key Acquisitions Gazzang (2015) – Big Data Security Sense Platform (2016) Key Competitors Hortonworks Products and Services Cloudera enterprise products are focused on making Hadoop fast and secure. Hadoop Security in Cloudera, enhanced through acquisition of Gazzang, includes the following capabilities: • Compliance – Include Hadoop security compliance support • Management – Involves secure data management for Hadoop • Validation – Includes unified authentication and authorization • Visibility – Includes end-to-end visibility for security • Data Security – Protection of Big Data and associated metadata Website https://www.cloudera.com/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Web Security, Network Monitoring, DDOS Security, Infrastructure Security Brief Overview CloudFlare provides content distribution networking, domain name services, and network security. Headquarters CloudFlare Headquarters 101 Townsend Street San Francisco, California 94107 Executives Matthew Prince, Co-Founder and CEO of CloudFlare, was formerly CEO of Unspam Technologies, and is co-creator of Project Honey Pot. History Matthew Prince, Michelle Zatlyn, and Lee Holloway cofounded CloudFlare in 2009. The small company has received $2.1M in Series A funding from Venrock and Pelion Venture Partners, $20M in Series B funding from Venrock, New Enterprise Associates, and Pelion Venture partners, and $50M in Series C funding from New Enterprise Associates, Pelion Venture Partners, and Union Square Ventures. Key Acquisitions StopTheHacker (2014) Eager (2016) Key Competitors Shape Security, Akamai, VeriSign Products and Services CloudFlare provides acceleration, domain, and security services for Websites. The company’s products and services include CDN support, Website optimization, Web analytics, and Web apps. The company’s platform uses automatic learning techniques, threat reporting, and simple management tools to offer security-related features such as the following: • WAF Capability • DDOS Protection • SSL Acceleration and Encryption • Browser Integrity • Visitor Reputation • Block Lists and Trust Lists • Protection for SSH, Telnet, and FTP Ports • Collaborative Security Website https://www.cloudflare.com/
CloudLink
CloudLock
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Data Encryption Brief Overview CloudLink, previously Afore Solutions, provides a range of advanced data encryption and related security control solutions for cloud applications and systems Headquarters CloudLink 2680 Queensview Dr. #150 Ottawa, Ontario K2B 8J9 Canada Tel: (613) 224 – 5995 Executives Alex Berlin, Founder, President, and CEO of CloudLink, was previously co-founder of Ambercore Software. History Alex Berlin founded Afore Solutions in 2003. The company produced a hardware solution for virtualization that produced a VMWorld 2009 Conference Award. Since then, the company has moved toward a virtual appliance. In 2013, the company announced that it has received venture funding from BDC Venture Capital. The company changes its name to CloudLink in 2014. Key Competitors Porticor, CipherCloud Products and Services CloudLink provides encryption and related security controls for third-party cloud applications. The CloudLink Platform includes hardware or virtual appliances that connect internal private clouds running vSphere and vCloud Director to public cloud providers in order to create hybrid clouds. The link between the private and public clouds is encrypted with AES. The platform includes several functional components including the following: • CloudLink SecureVSA – Provides an agentless data-atrest encryption solution for VMware vSphere, Microsoft Hyper-V VMware, Amazon Web Services, and Azure virtual cloud. • CloudLink SecureVM – Provides security controls for encrypting virtual servers and desktops running in the cloud, independent of the cloud service provider. • CloudLink SecureFILE – Involves encryption of sensitive files with application-aware, fine-grained controls on how data is secured. • CloudLink SecureAPP – Involves an “application lockdown” for Microsoft Windows applications by persistently encrypting data. Amazon also offers Glacier services for secure storage and backup. Website https://www.cloudlinktech.com/
Acquired by Cisco (Alpha Version 0.1 – 07/18/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview CloudLock is a cloud security company focused on providing enterprise class security solutions for data in the cloud. Headquarters 203 Crescent Street Suite 105 Waltham, Massachusetts 02453 Tel: +1 (781) 996 - 4332 Executives Gil Zimmermann, CEO and Co-Founder at CloudLock, was previously CEO of Aprigo and Operations Manager at EMC Corporation. History Gil Zimmermann and Ron Zalkind founded CloudLock in 2007. The CloudLock platform was launched in 2011 and the company was acquired by Cisco in August 2016. Key Competitors CipherCloud Products and Services CloudLock offers a platform made to protect data in public cloud applications. The platform offers data security and compliance, threat protection, application discovery and control, integrations and orchestrations, and custom app security. Website https://www.cloudlock.com/
Cloudmark (Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Email Security, Mobile Messaging Security Brief Overview Cloudmark offers a range of messaging security products for service providers and businesses that reduce the risk of abuse, phishing, malware, and other risks. Headquarters Cloudmark Headquarters 128 King Street, Second Floor San Francisco, California 94107 Tel: (415) 543 – 1233 Executives Jason Donahue, CEO of Cloudmark, was previously with Acronis, Atlantis Computing, Meiosys, and ClearApp. History Vipul Ved Prakash and Jordan Ritter founded Cloudmark in 2001, establishing a novel means for users to vote on Spam known as Vipul’s Razor. The company is active in messaging security forums such as the Messaging Anti-Abuse Working group (MAAWG) and the Anti-Phishing Working Group. It remains privately held and is funded by FTV Capital, Summit Partners, and Ignition Partners. Key Acquisitions Bizanga (2010) Key Competitors Proofpoint, Agari, ReturnPath Products and Services Cloudmark addresses messaging abuse, threats, and security risks via platforms that focus on service providers and businesses. Their technology includes fingerprinting and other means for improving accuracy and reducing false positives. Cloudmark’s offerings target mobile operators, Internet service providers, hosting providers, broadband providers, and small/medium businesses. Their key technologies include advanced message fingerprinting, messaging policy control, trust evaluation, and global threat analysis with the goal of reducing Spam, phishing, and viruses in email and messaging. The Cloudmark platforms include the following: • Cloudmark Security Platform – This is a carrier-grade messaging security platform that detects and mitigates defined categories of abuse and threats across email, text, and social media services. • Cloudmark Authority – This platform provides active filtering of messaging abuse and threats based on fingerprinting and other techniques. • Cloudmark Sender Intelligence – This platform provides real-time sender intelligence and profiles for the purpose of establishing sender policies. Website https://www.cloudmark.com/
CloudMask (Alpha Version 0.1 – 07/19/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview CloudMask is a SaaS solution that runs on user devices to intercept and analyze data to identify and encrypt sensitive information. Headquarters Ottawa, Ontario Tel: +1 (819) 282-1501 Executives Dr. Wael Aggan, CEO of CloudMask, previously started companies ViaSafe and TradeMerit. History CloudMask was founded in 2013 and is headquartered in Canada. Key Competitors CipherCloud, Skyhigh Networks Products and Services CloudMask provides end to end encryption on cloud based based apps such as Gmail, Google Drive, and Outlook. The platform is based on a subscription service that runs on enduser devices. Website https://www.cloudmask.com/
CloudPassage
Cloudpath
(Alpha Version 0.1 – 06/07/17 – Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview The CloudPassage Halo platform is purpose-built for broadly automated, portable, scalable, on-demand security and compliance. Delivered as a service, the Halo security orchestration engine includes automated security controls for instant visibility and continuous protection in any combination of data centers, private clouds and public clouds. Headquarters CloudPassage, 180 Townsend Street San Francisco, California 94107, Tel: (415) 886 - 3020 Executives Robert Thomas, former CEO of Infoblox, serves as CEO for CloudPassage. Carson Sweet, Co-Founder and CTO of CloudPassage, was previously an executive with RSA, where he focused on virtualization and cloud security. History Carson Sweet and Talli Somekh founded CloudPassage in 2010. The company remains privately held and is funded by Benchmark, Tenaya Capital, Musea Ventures, Benchmark Capital, Meritech Capital Partners, and Shasta Ventures. CloudPassage reported total funding of $91M through 2016. Key Competitors Illumio, Tripwire, Qualys Products and Services The CloudPassage Halo platform addresses workload protection, compromise detection, security at DevOps speed, micro-segmentation, automated compliance, and AWS EC2 security. CloudPassage Halo is built on the principles of abstraction, automation, orchestration, automatic scalability, and API enablement. Customers define security policy through the Halo portal or API and can automate security provisioning by using popular orchestration tools such as Chef, Puppet, and others. The ultra-lightweight Halo agent, deployed at the workload, picks up control commands from the Halo security orchestration engine and sends telemetry back to it. The Halo orchestration engine analyzes information gathered, giving security and compliance organizations visibility into their security posture. The Halo platform is comprised of three components: Halo Protect, Halo Segment and Halo Detect: • Halo Protect reduces the software attack surface of workloads by ensuring proper security configuration, discovering software vulnerabilities, and controlling administrative access. • Halo Segment reduces your network attack surface through traffic discovery, host firewall orchestration, and multi-factor network authentication. • Halo Detect alerts you to any workloads that have been compromised by monitoring the integrity of files including binaries and executables, and performing logbased intrusion detection. Website https://www.cloudpassage.com/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Mobile Security, Wireless Security Brief Overview Cloudpath, now part of the Ruckus Wireless Business Unit of Brocade, provides mobile device management and wireless security solutions supporting certificates for BYOD. Headquarters Ruckus Headquarters 300 West Java Drive Sunnyvale, California 94089 Executives Selina Lo is the CEO of Ruckus Wireless Business Unit at Brocade. History Founded by Kevin Koster in 2006, Cloudpath was built to support secure WiFi. Ruckus/Brocade acquired Cloudpath in 2015. Key Competitors Mobile Iron Products and Services Cloudpath, now part of Ruckus/Brocade, provides secure Wifi and mobile/wireless management and security solutions. The Cloudpath Enrollment System supports RADIUS and mobilecentric PKI capabilities for WiFi users. The company provides certificate solutions for BYOD programs to preclude the need for insecure passwords. Solutions are offered to deal with Active Directory credentials with BYOD, to support guests and contractors on enterprise networks, and to support selfservice onboarding of IT-owned mobile devices. Ruckus Wireless acquired Cloudpath in 2015. Website https://www.cloudpath.net/
Coalfire
Cobalt
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance, Penetration Testing, PCI DSS/Compliance Brief Overview Coalfire provides independent governance, risk, and compliance (GRC), audit, and penetration testing consultation and support. Headquarters Coalfire Headquarters 11000 Westmoor Circle, Suite 450 Westminster, Colorado 80021 Tel: (305) 554 – 6333 Executives Rick Dakin, Co-Founder, CEO, and Chief Security Strategist for Coalfire, died tragically in 2015 while hiking. Larry Jones, Chairman of the Board, now serves as CEO of Coalfire. History Founded in 2001, the company is headquartered in Colorado with offices in Atlanta Georgia; Boston, Massachusetts; Dallas, Texas; Denver, Colorado; Irvine, California; Las Vegas, Nevada; New York, New York; Orlando, Florida; Redwood City, California; Seattle, Washington; Washington, DC; and Manchester, UK. Key Competitors RSA Archer, MetricStream Products and Services Coalfire offers the following GRC consultation services for business clients: • Advisory Services • Audit and Assessment • Penetration Testing • Application Security These services are supported by Coalfire Labs. The company also offers a cloud-based Compliance-as-a-Service solution called Navis that supports PCI DSS and other standards. Website https://www.coalfire.com/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Bug Bounty Support, Penetration Testing Brief Overview Cobalt (previously known as CrowdCurity) provides a platform for companies to offer a vulnerability reward program. Headquarters Cobalt Labs 2403 16th Street San Francisco, California 94103 Executives Jacob Hansen, Co-Founder and CEO of Cobalt, held previous positions at Accenture. History Christian Hansen, Jakob Storm, Jacob Hansen, and Esben FriisJensen co-founded CrowdCurity in 2013. The company received debt funding of $470K in 2014 as well as private funding from Kima Ventures and Boost.vc. Key Competitors Synack Products and Services The Cobalt platform provides crowd-sourced Web security support for security testers. The purpose of the platform is to leverage the crowd to identify vulnerabilities before malicious hackers. Users of the Cobalt platform create rewards programs by defining scope and program rules. Testers then engage in tests via the published rules. Cobalt testing and participating members can provide recommendations about specific testers. The company includes a hall of fame, and also offers Bitcoin as a means for reimbursing testers for finding vulnerabilities in a site. Website https://www.cobalt.io/
Coblue
Code Dx
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Coblue offers a security benchmark platform that allows organizations to assess security posture. Headquarters Coblue Cyber Security BV Haaksbergerstraat 49 Hangelo Overijssel, Netherlands 7554 PA Executives The Coblue executive team includes Remco Bloemen, Michel Eppink, Yori Kamphuis, Friso Stoffer, Ivo Nouwens, and Arthur Melissen. History Coblue has its basis in Qubis, a software company founded in 2008. Coblue was officially launched in 2012. Coblue is a part of the SEACRES cluster of Dutch companies involved in cyber security. Key Competitors Securosis Products and Services Coblue offers cyber security solutions in the context of its Coable Benchmark Platform, which offers a means for organizations to assess and improve their security posture through inter-organizational collaboration, benchmarks, and knowledge exchange. Some of the benefits include benchmarking anonymously with peers, as well as measuring progress or degradation over time. Coblue also offers a range of training programs designed to increase awareness of security and hacking issues across an organization. Website https://www.coblue.eu/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Application Security Brief Overview Code Dx provides tools for static software testing of applications to reduce the likelihood of exploitable vulnerabilities. Headquarters Code Dx 6 Bayview Avenue Northpoint, New York 11758 Tel: (613) 759 – 3993 Executives Anita D’Amico serves as CEO of Code DX. She was previously with the Northrop Grumman Information Warfare team. History Code Dx was spun off from Applied Visions in 2015. Key Competitors Cigital Products and Services Code Dx provides a bundled Static Application Security Testing (SAST) suite, which has the following capabilities: • Dynamic security testing • Configurable security and quality rules • Normalized output into common severity scale • Manual entry of identified weaknesses • Browser-based interface • Maps to Common Weakness Enumeration (CWE) Website https://www.codedx.com/
Code42
Collective Software
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Code42 provides secure data protection including the Crashplan platform for endpoint backup. Headquarters Code42 100 Washington Avenue S, Suite 2000 Minneapolis, Minnesota 55414 Executives Joe Payne serves as CEO of Code42. Matthew Dornquast, Co-Founder of Code42, was previously chief scientist at Webhelp, CTO at Fallon McElligot, and founder/owner of Microworks. History Matthew Dornquast and Brian Bispala cofounded Code42 in 2001. The company employs roughly 400 staff and is headquartered in Minneapolis with offices in Sydney, Australia, and London, England. The company received $85M in Series B venture funding in 2015 led by JMI Equity and New Enterprise Associates. Key Competitors Druva, Symantec Products and Services Code42 offers CrashPlan data protection and endpoint backup products in the following areas: • CrashPlan for Home – Provides computer backup to the CrashPlan cloud for Windows, Mac, and Linux. • CrashPlan PRO for Business – Provides continuous backup for business. • CrashPlan PROe for Enterprise – Provides endpoint backup and restore, mobile file sync, and other features. • SharePlan for Enterprise – Offers enterprise-ready file sync and share capabilities. Website https://www.code42.com/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Collective Software provides USB and OAUTH-based twofactor authentication solutions. Headquarters Collective Software LLC 2605 Farragut Drive Springfield, Illinois 62704 Tel: (888) 449 – 2448 Executives Greg Bell serves as a manager at Collective Software and writes the company blog. History Collective Software describes itself at “the premier filter developer for Microsoft ISA/TMG Server platform.” The company attends the RSA Conference as a vendor. Key Competitors Duo Security Products and Services Collective Software offers two-factor authentication solutions, especially for Windows systems. These products include: • AuthLite – Low cost authentication for Windows, VPN, and Extranet • Captivate – Portal processing before access to the Internet • IsaScript – Custom Web filters • WebTOS – Network usage policy before login • LockoutGuard – Protection from lockout attacks • FlexForm – Login support for ISA/TMG • PageGuard – Automatic SSL switch • FlexAuth – SSO support for published Websites in ISA 2004 Website https://www.collectivesoftware.com/
Comda
Comilion
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication, Security Consulting, VAR Security Solutions Brief Overview Comda provides a range of IT security products and services including biometrics, access control, consulting, and VAR integration. Headquarters Comda ATDIM TECH PARK, Building #4 11th Floor Tel-Aviv 61580 Israel Executives Zeev Shetach serves as Founder and CEO of Coda. History Founded in 1985 by Zeev Shetach, the firm is privately held, located in Israel, and employs roughly 120 people. The company has two daughter companies: Comsign, which is a CA, and Comsigntrust, which provides automated signature systems. Key Competitors Avnet Products and Services Comda provides a range of IT security services including the following: • Biometric Authentication • Access Control Systems • PKI System Solutions The company provides security consulting and integration services with value added capability for complex projects. Website https://www.comda.co.il/
Technology integrated into Dell-EMC
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing Brief Overview Comilion provides decentralized solutions for secure collaboration and sharing both within an enterprise and between companies. Headquarters Comilion Israel Office Menachem Begin 48 Tel Aviv 661800 Israel Comilion New York Office 1 Penn Plaza, Suite 2527 New York, New York 10119 Executives Kobi Freedman, Founder and CEO of Comilion, participates in numerous Israeli and global policy workgroups on cyber defense. History Co-founded by Kobi Freedman and Guy Wertheim in 2013, the small private company is jointly headquartered in Tel Aviv and New York. Prominent international investment funds, the Swarth Group, and founders of Checkpoint, Imperva, and Trusteer back the company. Key Competitors Brainloop, BAE Systems Products and Services Comilion provides a solution for security collaboration and sharing within an enterprise and between companies via P2P sharing. The solution is decentralized, has built-in regulatory and compliance support, provides data ownership rights management, includes threat detection, and is fully automated. Website https://www.comilion.com/
Comodo
CompliancePoint
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls CA/PKI Solutions, Anti-Malware Tools, Penetration Testing Brief Overview Comodo provides a range of security software and SSL digital certificates for consumers and businesses. Headquarters Comodo 1255 Broad Street Clifton, New Jersey 07013 Tel: (888) 266 – 6361 Executives Melih Abdulhayoglu, President and CEO of Comodo, was previously CEO and Founder of AdTrustMedia. History Melih Abdulhayoglu founded Comodo in 1998 in the United Kingdom and relocated the company to the US in 2004. The privately held company, which has global offices in the United Kingdom, China, Japan, India, and Romania, is headquartered in New Jersey, Key Acquisitions DNS.com (2011) Surgate Labs (2014) Key Competitors GlobalSign Products and Services Comodo provides security software and SSL digital certificates via an active Certification Authority. Comodo offers security software, much of which is provided as free products for consumers, and SSL digital certificates in three areas: • Certification Authority – The Company operates an active Certification Authority for issuance of SSL certificates to secure transactions on websites. The Company specializes in low-cost SSL certificates with 128 and 256-bit encryption. • Enterprise Products – Comodo offers PCI Compliance scanning, corporate email certificates, email anti-Spam protection, PKI and authentication management, and endpoint security management. • Consumer Products – The Company offers an Internet Security package, with a free option, that includes a firewall, anti-virus, Wi-Fi security, and other features. They also offer secure email, cloud on-line storage, Comodo backup, and a range of PC support tools. Comodo Dragon Labs offers a range of penetration testing services for customers around the world. Website https://www.comodo.com/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Governance, Risk, and Compliance, Security Training, PCI DSS/Compliance Brief Overview CompliancePoint provides a range of compliance assessments, consulting, and managed IT. Headquarters CompliancePoint 4400 River Green Parkway, Suite 100 Duluth, Georgia 30096 Tel: (855) 670 – 8780 Executives Scott Frey serves as CEO of CompliancePoint. History The company focuses on direct marketing compliance ad general information security compliance. CompliancePoint is a division of PossibleNow. Key Acquisitions InfoSec Integrators (2011) Key Competitors TraceSecurity Products and Services CompliancePoint provides a range of services that can be grouped as follows: • Consulting Services – Includes security risk, PCI DSS, HIPAA, and SSAE. • Compliance Assessments – Includes security, implementation, training, operations, and IT. • Products – Includes compliance automation portal, PII finder, and file integrity monitor. Website https://www.compliancepoint.com/
Comsec Consulting
Confer
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, PCI DSS/Compliance Brief Overview Comsec Consulting provides a range of security professional services for business customers. Headquarters Comsec Consulting Headquarters Yegia Kapayim St. 21D P.O. Box 3474, Petach-Tikva Israel 49130 [emailprotected] Executives Jochanan Sommerfeld serves as Group CEO of Comsec Consulting. History Nissim Bar-El founded the Comsec Group in 1987. The private company is headquartered in Israel with offices in The Netherlands, Ukraine, Turkey, and Vietnam. Key Competitors Avnet, Argus Cyber Security Products and Services The security professional services offered by Comsec Consulting include the following: • Software Security • Infrastructure Security • GRC • Cyber Solutions • Cloud Security • Mobile Security • ICS • ERP Security • PCI DSS • Product Security Specific sectors focused on by Comsec Consulting across its vast global footprint in countries not well served by other security companies includes finance, public, energy, telecommunications, medical, industry, defense, and technology. Website https://www.comsecglobal.com/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Threat Intelligence Brief Overview Confer provides a sensor that is deployed to connect an enterprise to a cyber threat prevention network for early warning and attack detection. Headquarters Confer Technologies, Inc. 118 Turnpike Road #301 Southborough, Massachusetts 01772 Tel: (617) 992 – 9155 [emailprotected] Executives Mark Quinlivan, Co-Founder and CEO of Confer, was previously CEO of Carrier IQ, as well as holding previous positions at edocs and Lucent Technologies. History Mark Quinlivan, Paul Morville, and Jeff Kraemer co-founded Confer in 2013. The privately held company has received Series A financial backing from Foundation Capital, Matrix Parters and North Bridge Venture Partners. Key Competitors Cylance Products and Services Confer provides a cyber threat prevention network built on an open, threat sharing platform. The network relies on the sharing of information about attacks by its members with the ability to obtain and provide assistance from members to mitigate attacks to endpoints. This information is gathered by an always-on sensor deployed into the network with the option of sharing with other members. Current operating systems supported include Windows, OS X (Mac), and Android (mobile and tablets). Website https://www.confer.net/
Conquest Security
ContentGuard
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Conquest Security provides security services and solutions in conjunction with a set of security technology partners. Headquarters Conquest Security Inc. 267 Kentlands Boulevard, #800 Gaithersburg, Maryland 20878 Tel: (301) 960 – 4404 Executives Mark Williamson, Co-Founder, CEO, CTO, and Managing Partner of Conquest Security, worked previously for Tripwire, nCipher, and ISS. History Mark Williamson co-founded Conquest Security in 2005. The small SBA certified company is headquartered in Gaithersburg, Maryland. Key Competitors Optiv Products and Services Conquest Security offers a range of security solutions with partners including the following: • Next Generation Firewall – Offered in conjunction with Palo Alto Networks. • Firewall Security Management – Offered with Firemon • Mobile Enterprise – Offered with Intelligo • User Activity Monitoring – Offered in conjunction with ObserveIT • Compliance Automation Solutions – Offered with SignaCert • Integrated IT Management and Continuous Monitoring – Offered with ScienceLogic • Wireless Enhancement Products – Offered with Riverbed • Password Auditing and Recovery – Offered using Lophtcrack • Vulnerability Management – Offered with Cyber360 Website https://www.conquestsecurity.com/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Content Protection Brief Overview ContentGuard provides a range of digital rights management (DRM)-based content management technology solutions. Headquarters ContentGuard Legacy Town Center II 6900 North Dallas Parkway Suite 850 Plano, Texas 75024 Tel: (469) 331 – 9030 Executives James Baker serves as General Manager and Vice President of Licensing for ContentGuard. History Founded in 1998 out of Xerox PARC, the company is owned by Pendrell Corporation and Time Warner. The company relocated to Plano, Texas from California in 2014. Key Competitors docTrackr Products and Services ContentGuard’s privacy enhancing solution is based on more than 300 issued patents licensed to companies such as LG, Microsoft, Nokia, Panasonic, Sharp, Sony, Toshiba, and others. The product offers the following capabilities: • Creation of a guarded file (e.g., document, PDF, photo, screen shot) • Self-destruction of file content after opening based on a timer • Selection of viewers from address book by name or phone • Support for guarded view of email usage (e.g., control of intended view) • Verification of file access by mobile phone number Website https://www.contentguard.com/
ContentKeeper
Content Raven
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Web Security Brief Overview ContentKeeper provides Internet and Web filtering and security solutions for schools, enterprise, and government. Headquarters ContentKeeper Technologies (Head Office) 218 Northbourne Avenue, Braddon Canberra, ACT 2612 Australia Executives David Wigley, CEO of ContentKeeper, spent many years redesigning, developing, and maintaining the Australian Industry Development Corporation (AIDC) share market analysis system. History David Wigley, Peter Wigley, and Mark Riley co-founded ContentKeeper in 1997. The private company is headquartered in Australia and has had success in the educational institution marketplace. It has offices in Anaheim, India, and Thailand. Key Competitors Securly, Webroot Products and Services ContentKeeper provides security and filtering solutions to enforce acceptable usage policies for educational institutions and other groups. ContentKeeper’s security and filtering solutions can be grouped as follows: • Web Filtering – Involves traditional URL filtering, but includes advanced heuristics, content analysis, and packet inspection. • BYOD/Mobile Device Control – Provides active malware and filtering for BYOD mobile devices. • Granular Social Networking – Allows enforcement of more granular policies for social media and Web 2.0 applications including the ability to limit access to certain categories on sites such as Craigslist, or to control the ability to chat on services such as Facebook and Twitter. • Web Threat Protection – Combines Anti-Virus techniques with more advanced malware detection • HTTPS/SSL Security – Ensures that SSL traffic is only to websites with properly authenticated and valid SSL certificates. Website https://www.conentkeeper.com/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Content Protection, Secure File Sharing Brief Overview Content Raven provides cloud-based solutions for protecting the distribution of files to internal and external groups for enterprise customers. Headquarters Content Raven 550 Cochituate Road East Wing, 3rd Floor Framingham, Massachusetts 01701 Tel: (508) 786 – 0500 Executives Joe Moriarty serves as CEO of Content Raven. History Vasu Ram founded Content Raven in 2011. The company received $2M in Series A funding from MassVentures, HubAngels, LaunchPad, Sidecar Angels, and other individual investors. Key Competitors Documentum, Watchdox, Egnyte Products and Services Content Raven provides content protection solutions for enterprise customers and teams with the following features: • Access Options – Allows for configuring and setting options such as restricting viewing, remote wiping, and restricting downloading. • Unlimited File Distribution – Provides security for distribution of files via cloud-based storage with support for videos, Word docs, PDFs, images, and spreadsheets. • Secure Video Streaming – Allows for streaming of content to viewers via secure cloud distribution. • Dynamic Watermarks – Provides personal stamps on files to stop data leakage outside trusted groups. Website https://www.contentraven.com/
Content Security
ContextIS
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing, Application Security, PCI DSS/Compliance Brief Overview Content Security provides security consulting and professional services for enterprise customers. Headquarters Content Security – Sydney Office Level 1 Suite 1.02, 1 Epping Road, North Ryde, NSW 2113 Australia Tel: 1300 659 964 Executives Louis Abdilla, Phil Wurth, and Saaim Khan are managers with Content Security. History The privately held Australian company was founded in 2000, and has grown to support over 800 active customers. The company headquarters is in the Microsoft Building in North Ryde, Australia, near Sydney. The company has offices in Melbourne and Brisbane. Key Competitors Sense of Security Products and Services Content Security provides security consulting and professional services, primarily for customers in Australia, in the following areas: • Security Testing – Includes penetration testing, firewall auditing, and vulnerability assessment. • Security Support and Service – Includes priority support and managed security services. • Education and Training – Includes ethical hacker training • Security Solutions – The company works with clients to provide solutions in a variety of areas including: Data Protection and Management, Device Protection, Network Protection, and Web Protection. • Compliance and Advisory Services – Focuses on ISO 27001, PCI DSS, and Privacy Act consulting. Website https://www.contentsecurity.com.au/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Context Information Security (ContextIS), part of Babcock, provides security consulting and professional services for business clients. Headquarters ContextIS 11 Westferry Circus, London E14 4HD United Kingdon Tel: +44 (0)207 537 7515 Executives Mark Raeburn founded and now serves as CEO of Context IS. History Mark Raeburn founded ContextIS in 1998. The company has since expended its client base, reporting L10M in revenue in 2013, and now has offices in London, Cheltenham, Dusseldorf, and Melbourne. Babcock, a UK firm that specializes in engineering services, acquired ContextIS in December 2013 for a total of $52M. Key Competitors Praetorian, PA Consulting Group Products and Services ContextIS offers security consulting and professional services in the following areas: • Research – Involves provision of published technical white papers and tools, as well as tailored research for clients. • Response – Focuses on detection, response, understanding, and protection issues for clients. • Assurance – Includes services for penetration testing, security architecture and design, software engineering and security, and INFOSEC training. Website https://www.contextis.com/
Context Relevant Name change to Versive, Inc. (Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Context Relevant provides predictive data analytics to provide financial and security insights. Headquarters Context Relevant 999 Third Avenue, Suite 2100 Seattle, Washington 98101 Tel: (800) 980 – DATA Executives Joseph Polverari serves as CEO of Context Relevant. He was previously with Yodlee. History Founded by Stephen Purpura and Chris Metcalfe in 2012, the company is headquartered in Seattle with a presence in New York. Richard Clarke serves as an advisor and Board member. Madrona Venture Group, Vulcan Capital, Geoff Entress, Bloomberg Beta, Formation 8, Rolling Bay Ventures, WorkBench, Goldman Sachs, Bank of America Merrill Lynch, and New York Life Insurance Co provided $44M in Venture funding through Seed, Series A, and Series B rounds. Key Competitors RSA, IBM, Splunk Products and Services Context Relevant provides predictive analytics using machine learning for financial and security insights. The platform provides automated ingest and supports data analysis. The platform automatically takes data and runs through a variety of statistical models to provide intelligence. The platform is cloud-based. The system takes data at rest and learns from that, and performs bulk updates as new data comes in. Website https://www.contextrelevant.com/
Contextual Security Solutions (Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, PCI DSS/Compliance Brief Overview Contextual Security Solutions provides IT security, regulatory, and compliance consulting services for enterprise customers. Headquarters Contextual Security Solutions 5100 Poplar Avenue, 27th Floor Memphis, Tennessee 38137 Tel: (800) 513 – 6820 Executives Rick Merwin, co-founder, President, and CEO of Contextual Security Solutions, spent eight years as a Verizon Business account executive after thirteen years at FedEx. History Rick Merwin and Kevin Thomas co-founded Contextual Security Solutions in 2011. The small, privately held company is headquartered in Tennessee. Key Competitors Trustwave Products and Services Security consulting services offered by Contextual Security Solutions can be grouped as follows: • Assessment – Includes penetration testing, vulnerability assessment, Web application assessment, security awareness, firewall and router configuration review, mobile application assessment, and wireless security reviews. • Compliance – As a QSA, Contextual provides PCI DSS Compliance, Experian Compliance, and healthcare compliance. • Maintain – Includes its securityXtension program, for managing continued compliance and monitoring. Website https://www.contextualsecurity.com/
Contrast Security
ControlPanelGRC
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Application Security, Vulnerability Management Brief Overview Contrast Security provides a continuous application security tool to detect vulnerabilities and ensure compliance. Headquarters Contrast Security 240 3rd Street Los Altos, California 94022 Tel: (888) 371 – 1333 Executives Alan Naumann serves as Chairman, President, and CEO of Contrast Security. He was previously CEO at 41st Parameter until its acquisition by Experian. History Jeff Williams, Dave Wichers, and Arshan Dabirsiaghi founded Contrast Security in 2001 as a consulting company focused on secure and safe applications. After founding the Open Web Application Security Project (OWASP), Key Competitors Prevoty Products and Services Contrast Security provides application security vulnerability and compliance capability. The Contrast Security platform runs as an SaaS service or an on-premise software tool, where application owners register, execute, and the utilize platform features to discover vulnerabilities and compliance issues in their applications. Key features include: • Real-Time Vulnerability Detection – Includes the OWASP Top Ten application vulnerabilities • Actionable Code-Level Detection and Guidance – Provides stack and flow traces, library inventories, validation tools, and expert code-level guidance. Also automatically generates WAF rules. • Compliance Reporting – Generates PCI DSS, HIPAA, and other compliance reports. Website https://www.contrastsecurity.com/
Also Known As Symmetry (Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview ControlPanelGRC provides a suite of governance, risk, and compliance solutions suites for SAP. Headquarters Symmetry 400 South Executive Drive Brookfield, Wisconsin 53005 Tel: (888) SYM – CORP Executives Pete Stevenson serves as CEO of ControlPanelGRC. Christian Teeft serves as Chief Technology Officer of ControlPanelGRC. History Founded in 2009 as part of SymSoft Corporation, a spin-off of Milwaukee-based Symmetry Corporation, the SAP-focused company is headquartered in Milwaukee. Key Competitors SAI Global, ERPScan Products and Services ControlPanelGRC provides solution suites for SAP governance, risk, and compliance that can be grouped as follows: • Access Controls Suite – Includes risk analyzer, usage analyzer, emergency access manager, user and role manager, access certification manager, AutoAnalyzer, and HR analyzer. • Process Controls Suite – Includes procure to pay, order to cash, and other capabilities. • Security Acceleration Suite – Includes security QA, password manager, security troubleshooter, and user/role change analyzer. • Basis Controls Suite – Includes batch manager, reporting, alerting, and monitoring. Website https://www.controlpanelgrc.com/
ControlScan
Convercent
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, PCI DSS/Compliance, Web Application Firewall Brief Overview ControlScan provides a range of managed security services and compliance support solutions. Headquarters ControlScan 11475 Great Oaks Way, Suite 300 Alpharetta, Georgia 30022 Executives Joan Herbig serves as CEO of ControlScan. She was elected to the 2013 Board of Directors for the Electronic Transactions Association (ETA). History Founded in 2005, the company is headquartered in Georgia. Key Competitors Trustwave Products and Services ControlScan provides a range of managed security services for customers with emphasis on data security, compliance, and risk management. Solutions are available for securing business and Websites, and for testing security strength. Specific offerings include Security-as-a-Service, subscriptionbased cloud platform, certified security consulting, and managed security services. The company also supports PCI DSS security compliance. ControlScan include WAF functionality as part of its MSS and DDOS solutions. Website https://www.controlscan.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Governance, Compliance, and Risk Brief Overview Convercent provides a cloud-based platform to support governance, regulatory, and compliance (GRC), as well as investigative support for the enterprise. Headquarters Convercent 929 Broadway Denver, Colorado 80203 Tel: (800) 650 – 7005 Executives Patrick Quinlan, CEO of Convercent, was previously CEO of Rivet Software, which he grew from $240K to $12M in two years, leading to the company being listed as #60 on the Inc. 500 list in 2011. History Convercent was spawned from the existing Denver-based Business Controls, a bootstrapped fraud investigations firm with 14 employees and 300 enterprise and SMB customers. Patrick Quinlan, Philip Winterburn, and Barclay Friesen worked as co-founders to launch Convercent from that existing platform. The small private company has received seed funding from Azure Capital Partners, Mantucket Capital, and City National Bank. Key Competitors Aruvio, ControlCase, MetricStream Products and Services Convercent provides a suite of cloud-based solutions for enterprise compliance risk management. Convercent provides a cloud-based SaaS GRC platform with the following compliance features: • Automation – Includes an automated compliance risk management on the Convercent Compliance Center. • Management – Provides for integrated workflow management across compliance program initiatives. • Standards – Supports documentation of standards, procedures, and on-going communications • Monitoring – Includes continuous monitoring, auditing, and support for response with support for dashboard reporting. The company also offers a range of professional services including training, investigation support, best practices including organizational ethics, and on-site sessions. Website https://www.convercent.com/
Corax Cyber Security
Corero
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence, Governance, Risk, and Compliance Brief Overview Corax Cyber Security provides a range of security threat management and intelligence services using its Corax 360 cyber risk management platform. Headquarters Corax Cyber Security Ltd. 1 Fore Street London EC2Y 5EJ United Kingdom Tel: +44 203 608 9063 Corax Cyber Security 535 Mission Street San Francisco, California 94105 Tel: (415) 233 – 8402 Executives Jonathan Pope is Co-Founder and Managing Director of Corax Cyber Security. History Jonathan Pope and Tom Beale established Corax Cyber Security in 2013. The company is headquartered in the UK with an office in San Francisco. Key Competitors C3IA, Cyberis, Deep Secure Products and Services Corax Cyber Security delivers a range of security services through its Corax 360 cyber risk management platform. These services can be grouped as follows: • Risk Calculation Engine • Business Risk and Compliance • Data Research and Aggregation • Workflow • Third-Party Integrations Website https://www.coraxcyber.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls DDOS Security Brief Overview Corero offers DDOS and IPS appliances, which serve as an enterprise network’s on-premise “first line of defense.” SecureWatch services are offered for threat and related security support. Headquarters Corero – Hudson 225 Cedar Hill Street Suite 337 Marlborough, Massachusetts 01752 Corero – Highbridge Oxford Road Uxbridge UB8 1HR United Kingdom Tel: +44 (0) 845 021 3110 Executives Ashley Stephenson, CEO of Corero, was previously CEO of Reva Systems (acquired by Odin) and Xedia Corporation (acquired by Lucent). History Corero was founded in 2007, and acquired Top Layer Security in 2001. The company is listed on the AIM market of the London Stock Exchange. Headquartered in Massachusetts, the company has presence in the UK, Spain, France, Scotland, and Germany. Key Acquisitions Top Layer Security (2011) Key Competitors Radware, Arbor Products and Services Corero provides a “first line of defense” for an enterprise organization via its DDOS and IPS technologies. Corero’s products and services can be grouped as follows: • Corero DDOS Defense System (DDS) – This is an onpremise appliance system that rate limits, restricts access, enforces protocols, and prevents intrusions based on source IP addresses and signatures. • Corero Next Generation Intrusion Prevention System (IPS) – This IPS product uses Corero Network Security Analyzer (NSA) technology to detect threats. • Corero SecureWatch Security Services – These services complement the Corero DDOS and IPS solutions with threat analysis and related information and support. The company provides international support Website https://www.corero.com/
Corelight
Core Security
(Alpha Version 0.1 – 07/20/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring, Intrusion Detection Brief Overview Corelight offers a network visibility solution for information security professionals to help understand their network traffic and prevent attacks. Headquarters 111 New Montgomery Street 7th Floor San Francisco, California 94105 Tel: 510-281-0760 Executives Gregory Bell, CEO of Corlight, previously held leadership positions at Berkeley National Laboratory, Scientific Networking Division, and Us Department of Energy. History Corelight was founded in 2013 by Vern Paxson, Robin Sommer, and Seth Hall. Received a $9.2M series A funding Round in July 2017. Key Competitors Flowmon Products and Services Corlight offers the Corelight Sensor that runs on a custom OS based on the Linux Kernel. The device receives the traffic feeds from the network and exports the data stream and extracted files to a specified location. Their solution is built on Bro, an open source framework that provides real-time feedback of network traffic. Website https://www.corelight.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Vulnerability Management Brief Overview Core Security provides vulnerability and access risk management solutions. Headquarters Core Security Corporation 1000 Holcomb Woods Parkway, Suite 401 Roswell, Georgia 30076 Executives David Earhart serves as CEO of Core Security. He was previously with Damballa. History Courion was founded with funding from Paladin Capital Group, JMI Equity, and QuestMark Partners. It acquired Core Security in 2015 and rebranded under the acquired company’s name. Key Competitors ForgeRock, Okta Products and Services Core Security offers a Vulnerability Management and Access Risk Management platform, available on-premise or in the cloud, that includes a rich set of connectors to existing operating systems, directories, networks, databases, security systems, middleware, and applications such as ERP (SAP, Oracle, etc.) The platform provides support for the following enterprise customer features: • Access Risk Management – Allows enterprise customers to perform a full range of access risk functions. • IAM in the Cloud • Access Intelligence – Function that allows for assessment of possible violations of compliance. • Access Compliance – Allows for automated enforcement of access compliance requirements. • Role Management – Supports and automates role creation and on-going lifecycle role management. • User Account Provisioning – Allows for full automation of new hire, promotion/transfer, and other HR functions affecting identity and access. • Access Request – Provides a streamlined request interface for users to request access. • Password Management – Enforces consistently strong password policies and enables users to instantly and securely reset passwords on enterprise systems, applications, and other resources. Core Security also provides a range of professional services related to risk-based identity and access management requirements for enterprise customers. Core Security Labs provides advanced research for the company and its customers. Website https://www.coresecurity.com/
CORISECIO
CorreLog
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview CORISECIO uses open source software as the basis for encryption solutions in the area of services oriented architecture (SOA), cloud, and mobile. Headquarters CORISECIO GmbH Hans-bredow-Strasse 60 D-28307 Bremen, Germany Tel: +49 421 43841-0 Executives Bruno Quint, Co-Founder and CEO Of CORISECIO, has over twenty years in the IT industry including management positions with well-known European enterprises. History Bruno Quint and Elmar Eperiesi-Beck co-founded CORISECIO in 2003. The German company is headquartered in Darmstadt. Key Competitors Symantec, Trend Micro Products and Services All CORISECIO products are based on the open source secRT platform, an Eclipse Runtime Project. The product suite can be grouped as follows: • Cloud Security – Provide encryption for Dropbox and OneDrive to enable secure storage of documents in the cloud. • Document Encryption – Provides encryption of documents in the cloud through a Document Encryption Gateway solution. • Secure Collaboration – Supports secure collaboration to allow secure teamwork on encrypted email and documents with HTML5 DRM support for multiple platforms. • Encryption for SharePoint – Provides encryption support for SharePoint documents. Website https://www.corisecio.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Security Information Event Management, Mainframe Security Brief Overview CorreLog offers log management, security event correlation, and indexed search services. Headquarters CorreLog, Inc. Headquarters 1004 Collier Center Way, 1St Floor Naples, Florida 34110 Tel: (877) 267 – 7356 [emailprotected] Executives George Faucher, President and CEO of CorreLog, was previously president and CEO of SNMP Frameworks, Inc. History George Faucher founded CorreLog in 2011. The small private company is headquartered in Florida. Key Competitors LogRhythm Products and Services CorreLog offers a range of log management, correlation, and related security products including the following: • CorreLog Security Correlation Server/SIEM Log Management – Uses syslog and SNMP to collect and correlation information for Windows-based systems in the enterprise • CorreLog Agent for Window – Provides a Windows agent and toolkit • CorreLog Agent for z/OS with dbDefender – Supports IBM z/OS mainframe with dbDefender • CorreLog Agent for SAP – Support SAP • CorreLog SyslogNormalizer – Provides standardized reporting • CorreLog Syslog Defender – Delivers syslog messages with encryption and authentication • CorreLog Change Tracker – Supports audit, reporting, and configuration management CorreLog’s products are designed to provide PCI DSS, HIPAA, SOX, FIMA, GLBA, and NCUA compliance support. Website https://www.correlog.com/
CoSoSys
CounterCraft
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Data Leakage Prevention Brief Overview CoSoSys provides an endpoint security protection solution called Endpoint Protector that offers DLP, device control, and other features. Headquarters CoSoSys Gebhardstr. 7 Friedrichshafen, 88046 Germany Executives Roman Foeckl, Founder and CEO of CoSoSys, was involved in the original acquisition of CoSoSys by Astaro. History Roman Foeckl founded CoSoSys in 2004 and sold it to Astaro, which was then acquired by Sophos. Roman Foeckl and Michael Bauner then worked to take the company back private again in 2001. The company is headquartered in Germany with offices in Idaho and Romania. Key Competitors McAfee , RSA, Symantec Products and Services The Endpoint Protector solution provides a variety of security capabilities for endpoints including content aware protection for Windows and Mac (via Endpoint Protector 4); device control for Windows, Mac, and Linux; Mobile Device Management (for iOS and Android), and virtual/hardware appliances for on-premise and cloud DLP. The company’s MyEndpointProtector solution is 100% cloud managed and include the features of Endpoint Protector 4. In addition, the company provides an EasyLock cross platform data encryption solution for folders, hard drives, USB storage devices, cloud service uploads including Dropbox and iCloud, and burned CDs and DVDs. Website https://www.endpointprotector.com/
(Alpha Version 0.1 – 07/20/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring, Intrusion Detection Brief Overview CounterCraft is a provider of deception and counterintelligence products. Headquarters CounterCraft Paseo Mikeletegi 83, 20009, San Sebastian, Spain Executives David Barroso, CEO of CounterCraft, was previously CTO at ElevenPaths and e-crime Director at S21sec. History CounterCraft was founded in 2015 by Daniel Brett and David Barroso. The company raised $1.1M is funding in March of 2017. This private company is headquartered in Spain. Key Competitors Cymmetria Products and Services CounterCraft offers a deception platform that protects large enterprises by fooling attackers with decoy computers, false data, and fake identities. The platform is used to detect, study, and manipulate these attackers. Website https://www.countercraft.eu/
CounterTack
Covata
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Incident Response Brief Overview CounterTack focuses on endpoint security protections for the enterprise with the potential for active retaliation to attacks. Headquarters CounterTack 100 5th Avenue, First Floor Waltham, Massachusetts 02451-1208 Tel: (855) 893-5428 Executives Neal Creighton, CEO of CounterTack, was previously Founder, President, and CEO of GeoTrust until VeriSign acquired the company in 2006. Michael Davis, Chief Technology Officer of CounterTack and previously President of ExternalIT, is a well-known expert on hacking techniques. History The company, which was originally named NeuralIQ, relocated from Virginia to Waltham in 2011, and renamed itself CounterTack. It has since received over $67.44M in private investment. ALU provided $20M in Series B investment in 2014. Goldman Sachs, Fairhaven Capital Partners, EDBI, Mitsui, OnPoint Technologies, Razor’s Edge, Siemens, and Ten Eleven Ventures participated in funding. The company acquired ManTech Cyber Solutions in 2015. Key Acquisitions ManTech Cyber Solutions (2015) – Information Assurance Key Competitors McAfee , Tanium Products and Services CounterTack employs techniques such as enterprise-grade rootkit software and deployed agents on endpoints reporting back to a server to address malware infections. A novel implication of this approach is that in-progress, on-going attacks might be taken over by security teams as part of an active retaliation process – which is, in fact, the definition of the firm’s name. These techniques are wrapped in intelligence information from CounterTack’s knowledge library into an effective cyber security suite. CounterTack’s products are grouped as follows: • CounterTack Sentinel – This involves an enterprisegrade rootkit being installed on endpoint systems for the purpose of threat monitoring, analysis, and intelligencebased protection. • CounterTack Scout – This involves agents being embedded in endpoint systems that report back information to a CounterTack Scout server for the purpose of real-time analysis and more advanced cyber security protections. • Knowledge Library – This collection of so-called stateful compromise indicators (SCIs) is used as the basis for CounterTack’s cyber security intelligence capabilities. Website https://www.countertack.com/
(Alpha Version 0.1 – 06/10/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing Brief Overview Covata provides encryption-based secure file sharing solutions. Headquarters Covata Level 4 154-156 Clarence Street Sydney NWS 2000 Australia Tel: +61 2 8412 8200 Executives Ted Pretty is currently CEO of Covata. History Trent Telford founded Covata in 2007. The company re-listed on the ASX in November 2014. Headquartered in Australia, the company has offices in London, Washington, and San Francisco. Key Competitors Covertix, Intralinks Products and Services Covata focuses on solving security for the so-called Internet of Everything (IoE) through encryption and secure file sharing solutions and platforms. The company platforms are based on the combination of identity, policy, and key management. Safe Share provides support for sharing and storing data with risk mitigation and compliance support. The Covata Platform provides data-centric security across the enterprise and mobility-enabled cloud. Website https://www.covata.com/
Covertix
Covisint
(Alpha Version 0.1 – 06/11/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing Brief Overview Covertix provides a range of enterprise rights managed file security protection solutions. Headquarters USA office 650 Fifth Avenue, 31st Floor, New York, NY 10019 Tel: +1 (888) 618-9077 R&D office 2 HaNagar Street P. O. Box 7109, Kfar Saba, 4462532 Israel Tel: +972.9.765.7726 Executives Yoran Sirkis, CEO of Covertix, was previously managing partner at Comsec Innovation and CEO of Comsec Cyber Solutions. History Tzach Kaufmann and Alon Samia founded Covertix in 2007. The company has received $1M of Angle investment from The Office of the Chief Scientists of Israel, Kima Ventures, and Maayan Ventures. Key Competitors Watchdox Products and Services Covertix offers a suite of transparent file security and compliance products that include enterprise rights management protections such as file and cloud sharing, compliance solutions, data loss prevention, collaboration support, and encryption. The product suite including the following: • Smartcipher Enterprise – Focuses on protecting enterprise files. • Smartcipher Cloud – Monitors and protects files in Dropbox, Google Drive, Sky Drive, and Salesforce. • Smartcipher Collaborator – Supports collaboration outside the enterprise. • Smartcipher Mobility – Provides file protection without need to download a mobile app or client. The solution works by embedding a security rule set into the file to be protected. This rule set determines when, where, and by whom materials can be viewed, printed, changed, and shared regardless of the device being used (PC, tablet, etc.). Website https://www.covertix.com/
(Alpha Version 0.1 – 06/11/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, ICS/IoT Security Brief Overview Covisint provides a platform for managing identities and other attributes of the IoT ecosystem. Headquarters Covisint Corporation 26533 Evergreen Road, Suite 500 Southfield, Michigan 48074 Tel: (800) 229 – 4125 Executives Sam Inman III serves as CEO of Covisint. He was formerly President and CEO of Comarco Wireless Technologies. History Covisint was established in 2000 by a consortium of General Motors, Ford, and Daimler Chrysler. Compuware acquired the company in 2004 and then spun it off as a separate firm in 2014. The company is headquartered in Detroit with presence in San Francisco, Germany, and China. Key Competitors Core Security, CA Products and Services Covisint provides a suite of solutions for Internet of Things (IoT), connected vehicle, and connected supply chain. The company’s identity and access management (IAM) suite includes the following capabilities: • Identity management of IoT endpoint devices • Onboarding of partner IoT devices • Secure connectivity • Governance of IoT security policies Website https://www.covisint.com/
cPacket Networks
CriticalStart
(Alpha Version 0.1 – 07/20/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview cPacket Networks provides performance monitoring solutions that deliver real-time analysis and coverage. Headquarters 2130 Gold Street Suite 200 San Jose, California Tel: +1 (650) 969-9500 Executives Brendan O’Flaherty, CEO of cPacket Netwroks, was previously President and COO of Massana Semiconductor, and COO for Aureal Systems. History cPacket Solutions was founded in 2002 and has raised $11.6M in funding. This private company is headquartered in California. Key Competitors Riverbed Technology, NetScout Systems. Products and Services cPacket Networks offers an Integrated Monitoring Fabric that improves operational efficiency and reduces time to resolution. It identifies issues that degrade network performance and includes visualization of network events. Website https://www.cpacket.com/
(Alpha Version 0.1 – 06/11/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions, Security Consulting Brief Overview CriticalStart provides information security services as well as resale of select security products for enterprise customers. Headquarters CriticalStart 6100 Tennyson Parkway, Suite 250 Plano, Texas 75024 Tel: (214) 810 – 6760 Executives Rob Davis, Managing Partner of CriticalStart, worked previously for RSA, Lucent Technologies, and Deloitte and Touche. History CriticalStart is a Woman Owned Business Enterprise (WBE) and Texas Historically Underutilized Business (HUB). The company has no outside funding or venture capital. The company is headquartered in Plano, Texas with offices in Houston, Texas; Tulsa, Oklahoma; and East Baton Rouge, Louisiana. Key Competitors Cyber Defense Resources Products and Services CriticalStart offers a range of cyber security solutions for enterprise customers in the following areas: • Cybersecurity Assessment for the Executive Order 13636 • Risk and Compliance Governance • Security Intelligence (SIEM- Network Monitoring) – Valued added resale (VAR) of many industry leading SIEM products • Penetration Testing and Vulnerability Management • Risk Assessments • Malware Capability Assessments • Mobile IT (BYOD) • Threat Management The company has an extensive list of technology partners in the cyber security industry that it offers for resale as part of the CriticalStart service offerings. Website https://www.criticalstart.com/
Cross Match Technologies
CrowdStrike
(Alpha Version 0.1 – 06/11/17 – No Vendor Approval) TAG Cyber Controls (Alpha Version 0.1 – 06/11/17 – No Vendor Approval) Endpoint Security, Threat Intelligence, Incident Response TAG Cyber Controls Identity and Access Management, Two-Factor Authentication Brief Overview CrowdStrike provides an endpoint security platform called Falcon that allows an enterprise to identify unknown Brief Overview Cross Match technologies provides identity management and malware and zero-day threats via a cloud-based model that delivers a combination of next gen AV, endpoint detection and biometric identity verification solutions. response, and managed hunting. Headquarters Headquarters Cross Match Technologies Corporate Headquarters CrowdStrike 3950 RCA Boulevard, Suite 5001 15440 Laguna Canyon Road, Suite 250 Palm Beach Gardens, Florida 33410 Irvine, California 92618 Tel: (561) 622 – 1650 Tel: (888) 512 – 8906 Executives Executives Richard Agostinelli, CEO of Cross Match Technologies, was previously president of the biometrics division of L-1 Identity George Kurtz, Co-Founder and CEO of CrowdStrike, was previously Co-Founder and CEO of Foundstone, which was Solutions. acquired by McAfee. Kurtz spent several years at McAfee , serving as Worldwide CTO. History Cross Match Technologies is headquartered in Florida with History offices in Arlington, Virginia; Jena, Germany; Reading, UK; Gregg Marston, Dmitri Alperovitch, and George Kurtz coTaipei, Taiwan; and Quebec, Canada. DigitalPersona is founded CrowdStrike in 2012. The private company has headquartered in California with offices in Taiwan, Czech received funding from Warburg Pincus and Accel Partners. Republic, Germany, India, and China. Through 2015, the company raised a total of $100M in venture funding. Key Acquisitions DigitalPersona (2014) Key Competitors Cylance, Carbon Black, SentinelOne Key Competitors BI2, Daon Products and Services CrowdStrike provides cloud-delivered endpoint protection Products and Services platform and associated network that can be used to identify Cross Match Technologies provides a range of identity unknown threats, zero-day attacks, and other enterprise management and biometric verification systems that can be security risks using information from a global network of grouped as follows: sensors. CrowdStrike offers its solutions and services based on its Falcon platform and associated intelligence. The Falcon • Livescan Systems – Ten finger and palm print scan platform has the following components: systems • Single/Dual Finger Scanners – Single and two-finger • Falcon Host – Provides enterprise activity monitoring, solutions threat detection, and response. • Mobile Biometric Devices – Handheld biometric capture • Falcon Overwatch – Provides 24/7 managed hunting to systems proactively identify attacks • Multimodal Field Solutions – Field solutions • Falcon Intelligence – offers an in-depth and historical • Child ID Solutions – Focused on child safety understanding of adversaries, their campaigns, and their • Document Readers – Document scanning motivations, providing real-time adversary analysis for • Iris Capture – Iris biometric capture effective defense and cybersecurity operations. • Software Solutions – Web-based solutions • DigitalPersona – Identity verification solutions using CrowdStrike also offers a range of security professional biometrics obtained through the merger between Cross services focused on incident response, forensics, and Match and DigitalPersona. intelligence. Falcon Intelligence is a subscription service offering security intelligence reporting via a feed to Website customers. https://www.crossmatch.com/ Website https://www.crowdstrike.com/
Crypteia Networks
Cryptography Research
(Alpha Version 0.1 – 06/11/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence, Security Analytics Brief Overview Crypteia Networks provides threat intelligence and related security analytic platform services. Headquarters Crypteia Networks 340 Kifisias Avenue, Neo Psychiko GR154 51 Greece Executives Mark Halbfinger serves as CEO of PCCW Global. History Yiannis Giokas founded Crypteia Networks in 2011 using private seed funding in the range of $500K. The company targets small and medium sized companies in Greece, Eastern Europe, and the Mediterranean Region. PCCW Global acquired Crypteia Networks in 2014 Key Competitors Cyphort Products and Services Crypteia Networks offers the MOREAL Threat Intelligence Platform that includes the following capabilities: • Monitoring – Collects logs with open source and Crypteia Networks security intelligence • Reporting – Engine augments threat knowledge by behavioral and statistical analytics • Alerting – Graphs and meta-graphs are processed with algorithms that compute threat paths Crypteia Networks offers its capability in conjunction with a series of technology partnerships with companies such as Fortinet, CheckPoint, Cisco, FireEye, Kaspersky, Radware, SecurityDAM, and WatchGuard. Website https://www.crypteianetworks.com/
Acquired by Rambus (Alpha Version 0.1 – 06/11/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Hardware/Embedded Security Brief Overview Cryptography Research develops and licenses cryptographic technology solutions for semiconductor chips to reduce security risk across many industries. Headquarters Cryptography Research 425 Market Street San Francisco, California Executives Paul Kocher, President and Chief Scientist of Cryptography Research, was elected to the U. S. National Academy of Engineering in 2009. History Paul Kocher founded Cryptography Research in 1995. Rambus acquired Cryptography Research in 2001 for $342.5M. Key Competitors Safenet, Thales eSecurity Products and Services Cryptography Research involves using cryptographic solutions to reduce data security risk and fraud in semiconductor chips. The company provides the following solutions: • DPA Countermeasures – A license to countermeasures such as differential power analysis (DPA) that enables security chips and other cryptographic devices to protect sensitive key information. • DPA Workstation – A platform for side-channel analysis used by chip vendors, governments, and testing labs to evaluate and certify secure semiconductors. • Pay-TV Security – Includes the CryptoFirewall on chip security technology to eliminate signal theft and card swapouts. • Anti-Counterfeiting – Uses CryptoFirewall security core to prevent counterfeiting of products such as medical devices, airplane parts, and printer consumables. • Services – Design, evaluation, education, and training services. Website https://www.cryptography.com/
Cryptomathic
CryptoMove
(Alpha Version 0.1 – 06/11/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, CA/PKI Solutions Brief Overview Cryptomathic provides security solutions for eBanking, PKI, ID and ePassport, card issuance, and related key management applications. Headquarters Cryptomathic Jaegergardsgade 118 DK-8000 Aarhus C Denmark US Office in San Jose Tel: (408) 625 – 1150 Executives Torben Pryds Pedersen, CEO and CTO of Cryptomathic, was previously a visiting researcher at University of Essen, Germany and CWI in Amsterdam, Netherlands. History Peter Landrock, current Executive Chairman of Cryptomathic, and Ivan Damgard from University of Aarhus in Denmark, founded the company in 1986. The private company has offices in the UK, Germany, Canada, and San Jose, California. Key Competitors Cryptography Research Products and Services Cryptomathic involves providing a range of cryptography and PKI-related solutions for banking, identification, and other applications. The company’s security product suite can be grouped as follows: • Authentication and Signing – Includes Authenticator (Authentication Server), Mobile AuthApp (2FA authentication applications), Signer (digital signature server), and Token Manager (end-2-end lifecycle management tool). • EMV (Europay, MasterCard and Visa) – Includes support for transition from magnetic strip to chip with solutions including Cardlink (data preparation system) and EMV CA (EMV card authentication). • Key Management – Includes Crypto Service Gateway (HSM security as a service) and Key Management System (centralized key management system). • PKI & ID – Incudes PKI support for various CA tasks and support for ePassport and ID issuance. Website https://www.cryptomathic.com/
(Alpha Version 0.1 – 07/21/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Data Leakage Prevention Brief Overview CryptoMove is an active defense data protection company that protects data with dynamic movement, distribution, reencryption, and mutation. Headquarters CryptoMove 3915 Arbolado Drive Walnut Creek, California 94598 Tel: (925) 944-1321 Executives Michael Burshteyn serves as CEO and Co-Founder of CryptoMove. Boris Burshteyn serves as CTO and Co-Founder of CryptoMove. History Cryptomove, Inc. was founded in 2015 by Michael Burshteyn and Boris Burshteyn. This private company has received $1.5M in funding. Key Competitors DataLocker Products and Services CryptoMove is a decentralized datastore that protects data with dynamic movement, mutation, fragmentation, and reencryption. Website https://www.cryptomove.com/
CryptoNet
CryptoSense
(Alpha Version 0.1 – 06/11/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview CryptoNet offers security consulting, hardware, and software solutions for risk analysis, network security, and application security to Italian customers. Headquarters CryptoNet c/o Coworking Login Via Stefanardo da Vimercate, 28 20128 Milano Tel: +39 02 87 25 04 75 Executives Paolo Da Ros serves as CEO of CryptoNet. Elisabetta Codarin is a Senior Security Consultant at CryptoNet. History CryptoNet was established in 1995 and claims to have installed the first firewall in Italy. The company is headquartered in Milan. Key Competitors Finmeccanica – Selex ES Products and Services CryptoNet offers a range of information security solutions for customers in Italy in the following areas: • Security Consulting – Includes GRC, PCI DSS, advisory, software security, and auditing • Security Services – Includes vulnerability assessment, penetration testing, PCI DSS, and APT protection The CryptoNet solutions assist customers in dealing with malware, cloud protection, malvertising, DDOS, and security awareness. Website https://www.cryptonet.it/
(Alpha Version 0.1 – 07/21/17 – No Vendor Approval) TAG Cyber Controls Security Analytics, Analysis Brief Overview Cryptosense creates security analysis software with a focus on cryptographic systems. Headquarters CryptoSense 40bis Rue du Faubourg Poissonniere, 75010 Paris Tel France: +33 (0)9 72 42 35 31 Tel USA: +1 (646) 893-7657 Executives Graham Steel serves as CEO and Co-Founder of Cryptosense. History CryptoSense was founded in 2013 by Graham Steel. The private company is headquartered in Paris, France. Key Competitors Cybereason Products and Services CryptoSense offers a platform for automated analysis for cryptographic systems. Website https://cryptosense.com/
CryptoTEC AG
Cryptsoft
(Alpha Version 0.1 – 07/21/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, CA/PKI Solutions Brief Overview CryptoTec AG provides high-security solutions for connecting decentralized computer systems. Headquarters Europe CryptoTEC AG Habsburgerring 2 50674 Koln, Germany Tel: +49 221 2228383 0 USA 3265 Sacremento Street San Francisco, California 94115 Executives Michael Mertens, CEO and Co-Founder of CryptoTEC AG, previously founded the iDev GmbH. History CryptoTEC AG was founded in 2014 by Michael Mertens and Michael Rauman. This private company is headquartered in Germany. Key Competitors CV Cryptovision Products and Services CryptoTEC AG offers high-security solutions including Blackchain, safe ways to exchange to data Website https://www.cryptotec.com/
(Alpha Version 0.1 – 07/25/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Security Consulting Brief Overview Cryptsoft offers its customers with security architecture consulting and solutions development services. It offers encryption technology solutions development services for storage, security, and cloud products. Headquarters 138 Juliette Street Suite 32 Greenslopes 4120, Queensland Australia Tel: +61 7 3103 0321 Executives Greg Scott, CEO of Cryptsoft, was previously apart of large scale application development at Ingres and Oracle. History Cryptsoft was founded in 1996. This private company is headquartered in Australia. Key Competitors HyTrust Products and Services Cryptsoft provides a range of key management products that include C, C++, JAVA, C-Sharp, and Python based KMIP SDKs that provide the required functionality for implementing a KMIP client. They also provide KMIP Servers which are built on top of the corresponding KMIP clinet SDKs to offer fully functional KMIP servers for OEM integration. Website https://www.cryptsoft.com/
Cryptzone
CSC
(Alpha Version 0.1 – 06/11/17 – No Vendor Approval) TAG Cyber Controls VPN/Secure Access, Application Security Brief Overview Cryptzone is a software company offering dynamic, usercentric network access security via its AppGate platform, as well as data security and content governance solutions. Headquarters Cryptzone Headquarters 130 Turner Street, Suite 610 – Building 3 Waltham, Massachusetts 02453 R&D Headquarters Drakegatan 7 Gothenburg, 412 50 Sweden Executives Barry Field serves as CEO of Cryptzone. He was previously with Verizon Terremark and Medina Capital. History The company was originally founded in 2003, and renamed Cryptzone in 2007 to focus on an expanded range of security solutions. In 2008, the Cryptzone Group became listed on the Nasdaq/OMX “First North” stock exchange. Medina Capital acquired Cryptzone in 2014. Today, the company has offices in Massachusetts, Sweden, UK, Australia, Germany, and Switzerland. Key Acquisitions HiSoftware (2014) – Data Protection AppGate (2009) – Network security Key Competitors IBM, Cisco Products and Services Cryptzone offers advanced security, access, and compliance solutions for the enterprise through its platform offerings. • Secure Access is provided to enterprise applications, systems, networks, and cloud through the AppGate platform that creates an individualized network “Segment of One” for users. This Software-Defined Perimeter approach dynamically controls user access, reducing risk and improving operational efficiency for scenarios such as cloud access, third-party remote access, and privileged user access. • Data Security is provided via the Security Sheriff product, which provides for secure file sharing and collaboration in Microsoft Office 365 and SharePoint. • Content Governance is provided via the Compliance Sheriff solution, which supports accessibility, data privacy, OPSEC, and brand protection requirements. The dynamic “segment of one” solutions are directly applicable to hybrid and cloud access control requirements. Website https://www.cryptzone.com/
Merger with HPE to create DXC Technology (Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Information Assurance, Managed Security Services, Security Consulting Brief Overview CSC provides a range of technology-enabled business products and services, including cyber security and information assurance. Headquarters CSC Headquarters 3170 Fairview Park Drive Falls Church, Virginia 22042 Tel: (703) 876 – 1000 Executives Mike Lawrie serves as President and CEO of CSC. Samuel Visner Serves as Vice President, General Manager, and Head of CSC Global Cyber Security. History Established in the 1960’s by Roy Nutt and Fletcher Jones, CSC has grown into a large, multinational public firm with 80,000 employees serving business and government customers in over seventy countries. Key Competitors SAIC, IBM, Accenture Products and Services CSC provides a range of technology-enabled business products and services, including cyber security. As part of CSC’s portfolio of technology-enabled products and services, the following cyber security-related professional service solutions are offered: • Security Consulting • Security Assessments • Managed Security Services • Business Continuity and Disaster Recovery • Identity Management • Incident Response CSC’s cyber security offerings are focused on providing their clients with increased so-called “cyber confidence.” Website https://www.csc.com/
CSPi (Alpha Version 0.1 – 07/25/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring, Incidence Response Brief Overview CSPi Delivers products and consulting solutions focused on securing customers critical business assets. Headquarters CSPi 175 Cabot Street, Suite 210 Lowell, Massachusetts 01854 Tel: 1 (800) 325-3110 Executives Victor Dellovo serves as CEO and General Manager of CSPi. He was previously the President of Modcomp’s worldwide operations. History CSPi was founded in 1968 and is headquartered in Massachusetts. Key Competitors CyberSponse Products and Services CSPi provides the Myricom nVoy Series Packet Broker that allows you to direct the network traffic flows that you are most interested in, such as specific traffic at risk, thereby reducing what has to be captured, indexed and searched. The Myricom nVoy Series Packet Recorder can droplessly record and index up to 10Gbit network traffic. These recordings are used to address issues such as compliance, forensics, and reducing the duration of incident investigation. Website https://www.cspi.com/
C3IA
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Information Assurance Brief Overview C3IA provides secure technical and information security/information assurance solutions for business and government customers. Headquarters C3IA Solutions Ltd. Unit B The Outlook Ling Road Poole Dorset BH12 4PY United Kingdom Tel: +44(0)1202 721123 Executives Keith Parsons serves as Managing Director at C3IA Solutions. History C3IA was formed in 2006 and is headquartered in Dorset, in the UK. The company is a member of the Malvern Cyber Security cluster. Key Competitors BAE Products and Services C3IA provides secure technical and information security solutions for business and government customers. C3IA provides expert security and professional services to various sectors, primarily in the UK, including the emergency services, business and industry, government, and defence sectors. In each sector, C3IA provides tailored SME services using consultants with domain expertise. The company includes many former UK government and defence employees with experience across the services. Website https://www.c3iasolutions.com.uk/
Cura Software Solutions Curtail Security (Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview Cura Software provides GRC and enterprise risk management solutions for the enterprise. Headquarters Cura Global GRC Solutions Pte Ltd. 45 Cantonment Road Singapore [emailprotected] Executives Bala Reddy, Chairman and Director of Cura Software, is a seasoned entrepreneur and executive. History The company is headquartered in Singapore with presence in Australia, Europe, India, US, and South Africa. Key Competitors EY (Integrc) Products and Services Cura Software provides solutions for GRC and enterprise risk management including the Cura Software Governance, Risk, and Compliance Management Platform. GRC and ERM capabilities offered by Cura Software can be grouped as follows: • Enterprise Risk • Compliance • Internal Audit • Operational Risk • Information Security Risk • Project Risk • Incident Management • Business Continuity • Financial Controls Website https://www.curasoftware.com/
(Alpha Version 0.1 – 07/25/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention Brief Overview Curtail Security identifies and isolates zero-day exploits, allowing legitimate traffic to pass through the network uninterrupted. Headquarters Curtail Security Santa Barbara, California [emailprotected] Executives Frank Huerta, CEO and President of Curtail Security, previously founded Recourse Technologies, TransLattice, and Cartillix History Founded in 2015, this private company is headquartered in Santa Barbara, California. Key Competitors Cyber adAPT Products and Services UnCover works in lower-level protocols to detect mismatches in network behavior. ReCover looks deeper in protocol stack, comparing applications, making it better at detecting zero-day threats. Website https://www.curtail.com/
CV Cryptovision
Cyber adAPT
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, CA/PKI Solutions Brief Overview Cryptovision provides cryptography and public key infrastructure products for identity management, strong authentication, and digital signature. Headquarters CV Cryptovision GmbH Munscheidstr. 14 45886 Gelsenkirchen Germany Tel: +49 (0) 2 09 / 1 67 – 24 50 Executives Markus Hoffmeister, Managing Director and CEO of CV Cryptovision, set up a company called Media Factory while still a mathematics student. History Markus and Andreas Hoffmeister co-founded CV Cryptovision in 1999 as a spin-off of the Institute for Experimental Mathematics at the University of Essen in Germany. The company reports roughly 40 employees in 2014 serving a host of large customers such as Audi, BMW, and DaimlerBenz. Bundesdruckerei acquired a 25.1 percent share of the company in 2013. Key Competitors Verisign, Venafi Products and Services CV Cryptovision offers cryptographic products in the following areas: • Public Key Infrastructure (PKI) • Smart Card Management • Email Security • Crypto Libraries – Includes the following products: • Electronic ID – Includes the following products: Website https://www.cryptovision.com/
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention Brief Overview Cyber adAPT provides live network attack detection and forensics for mobile-enabled enterprise customers. Headquarters Cyber adAPT 337 Miranda Road Half Moon Bay, California 94019 Executives Kirsten Bay serves as President and CEO of Cyber adAPT. History Headquartered in California, the company maintains locations in Dallas and Chicago Key Competitors IronNet Cybersecurity, SS8 Products and Services Cyber adAPT provides network intrusion detection solutions as follows: • skwiid Mobile – Mobile users can access business systems from anywhere securely. It encrypts all mobile network traffic and finds attack-indicators in traffic packets. • skwiid In-Network – Probes are installed inside the backbone of the network and monitors all traffic in realtime for potential threats. • skwiid IoT – Authenticates and encrypts traffic to and from internet-connected machines, and finds attackindicators in traffic packets. • skwiid Cloud – A cloud migration-enabler, ensuring all traffic to and from cloud services is secure. Encrypts data to and from cloud services and monitors traffic for potential threats Website https://www.cyberadapt.com/
Cybera
Cyber Alpha Security
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Application Security Brief Overview Cybera provides a secure application defined network (ADN) platform for hosting enterprise applications in the cloud and on-premise. Headquarters Cybera 9009 Carothers Parkway Suite C5 Franklin, Tennessee 37067 Tel: (866) 429 – 2372 Executives Andrew Lev, formerly with NTT Com Security, serves as CEO of Cybera. History Cliff Duffey founded Cybera in 2001 originally as a regional network provider. The company eventually transformed itself into a provider of network and application security solutions. The company raised venture funding through several rounds, including a 2015 investment from Sumeru Equity Partners at an undisclosed level. Headquartered in Tennessee, Cybera maintains a Silicon Valley office in Foster City. Key Competitors Firehost, IBM, Amazon Web Services Products and Services Cyber provides a so-called application defined network (ADN) using its Cybera One platform to provide a dedicated logical network for each application via virtual network and security components. The platform includes support for embedded 3G/4G wireless backup, along with self-healing via the SecureCORE Cloud. Routing is also handled via the Cybera One RapidRoute failover capability, along with prioritization capabilities via the Cybera One Priority Route. Cybera One is available as a secure appliance, an application gateway, a secure appliance gateway, and a SecureCORE cloud solution. Website https://www.cybera.com/
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing Brief Overview Cyber Alpha Security provides a range of security consulting services including ethical hacking. Headquarters Cyber Alpha Security BV Veembroederhof 281 1019HD Amsterdam The Netherlands Tel: +31 20 511 2466 Executives Finn McLain, Founder and CEO of Cyber Alpha Security, was educated at Drew University and the Wharton School. History Finn McLain founded Cyber Alpha Security in 2013. The company is headquartered in Amsterdam with an office in Hong Kong. Key Competitors Fox-IT, Coblue Products and Services Cyber Alpha Security provides security professional and consulting services that can be grouped as follows: • Application Security – Includes Web application penetration testing, vulnerability assessment, source code security audit, and mobile application code audit. • Infrastructure Security – Includes network penetration testing and vulnerability assessment. • Enterprise Cyber Security – Includes malware analysis and reverse engineering, incident response, and cyber forensic investigation. • Operational Security – Includes social engineering security consultation. The company has also developed a threat management service based on a platform called Hawkeye. Cyber Alpha Security also provides customized managed security services, as well as PCI DSS consulting. Website https://www.cyberalphasecurity.com/
CyberArk
CYBERBIT
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Password/Privilege Management, Identity and Access Management Brief Overview CyberArk focuses on locking down privileged accounts to reduce security risk, especially advanced persistent threats (APTs). Headquarters CyberArk Software Inc. 60 Wells Avenue Newton, MA 02459 Executives Udi Mokady, Founder, President, and CEO of CyberArk Software, has a background in military intelligence. Adam Bosnian, Executive Vice President, of the Americas, CyberArk History Founded in 1999 by Alon Cohen and Udi Mokady, CyberArk now claims more than 240 employees with over 1,200 enterprise customers. The company was venture-based by Seed Capital, Cabaret-ArbaOne, and others. It went public in 2014 listing revenues of $66.2M for 2013 and trades on the NASDAQ. Key Acquisitions Viewfinity (2015) – Privilege Management Cybertinel (2015) – Endpoint Security Conjur (2017) – Access Management Key Competitors Dell, Fischer Products and Services CyberArk reduces the risk of cyber attacks that utilize insider access from within the enterprise. This is done by locking down privileged accounts into a protected vault that can be watched more carefully and effectively than the more distributed and complex alternative. The company’s products can be grouped as follows: Privileged Identity Management Suite • Enterprise Password Vault • CyberArk DNA (Discovery and Audit) • Application Identity Manager • On-Demand Privilege Managers for Windows • On-Demand Privilege Manager for Unix/Linux Privileged Session Management • Privileged Session Manager for Databases • Privileged Session Manager for Servers • Privileged Session Manager for Virtualization • Sensitive Information Management Suite • Secure Email Manager • Sensitive Document Vault CyberArk also incudes a security services company called Kahuna that specializes in IT security and protection. Website https://www.cyberark.com/
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Security Training Brief Overview CYBERBIT provides advanced endpoint detection, SOC automation, industrial control network protection and cyber security training and simulation. Headquarters CYBERBIT 22 Zarhin Street Ra’anana 4310602 Israel Tel: +972.(0)9.779.9800 USA 3800 N. Lamar Boulevard Suite 200 Austin, Texas 78756 Tel: +1 (737) 717-0385 Executives Adi Dar serves as CEO of CYBERBIT. He was previously VP and General Manager of Electro Optics. History CYBERBIT was founded in 2015. This private company is headquartered in Israel. Key Competitors Rapid7, Proofpoint, Guidance Software Products and Services CYBERBIT provides the following professional services. • Endpoint Detection and Response Platform - uses hybrid detection with machine learning, automation, and is open and customizable. • SCADAShield – Protects the entire ICS attack surface including both OT and IT components. • SOC 3D – Combines workflow automation, orchestration and big-data based investigation tools into a single IR platform that increases SOC efficiency, provides visibility, and reduces time to respond. • Cyber Range Training – Establish and manage training and simulation centers for instructing and certifying cyber security experts. Website https://www.cyberbit.com/
CyberCrocodile
Cyber Defense Agency
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview CyberCrocodile provides instructor-led and interactive learning materials in IT and information security. Headquarters CyberCrocodile 10851 Tidewater Trail #69 Fredericksburg, Virginia 22408 Tel: (540) 370 – 4225 Executives Information about executives at CyberCrocodile is unavailable. History John Hackmeyer served as Owner and President of CyberCrocodile from 2007 to 2013. Key Competitors SANS Products and Services CyberCrocodile uses instructional design, eLearning, and conceptual linking to provide information technology education and training with a specialization in information security. Offerings range from instructor-led courses on-site to interactive learning materials. Courses include CISSP, Sec+ Certification, Net+ Certification, Virtualization Security, and Network Vulnerabilities. Website https://www.cybercrocodile.com/
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Information Assurance, Security Consulting Brief Overview Cyber Defense Agency provides information security consulting and cyber security research services. Headquarters Cyber Defense Agency Headquarters 11846 Simpson Road Clarksville, Maryland 21029 Tel: (301) 725 – 6462 Executives O. Sami Saydjari, Founder and President of Cyber Defense Agency, spent thirteen years with the National Security Agency, where he was named an NSA Fellow in 1993 and 1994. History Sami Saydjari founded Cyber Defense Agency in 2002. The small consulting company is located in Wisconsin. Key Competitors Chertoff Group Products and Services Cyber Defense Agency offers a range of professional services including the following: • CDA Courses – Includes a range of courses on cyber defense, security, and risk management • Risk Assessment – Includes a “Quick Look” assessment • Red Teaming – Includes local or remote red team services • Information Security Systems Testing – Design, development, and implementation of testing architectures • Security Policy Engineering – Based on a research effort on security policy engineering called Espanola. Website https://www.cyberdefenseagency.com/
Cyber Defense Labs
CyberDefenses
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing Brief Overview Cyber Defense Labs provides a range of security consulting including vulnerability assessments, penetration testing, and cyber forensics. Headquarters Cyber Defense Labs UTD Research and Operations Center 17217 Waterview Parkway #30 Dallas, Texas 75252 Tel: (972) 454 – 0227 Executives Michael Saylor serves as Executive Director of Cyber Defense Labs. History Cyber Defense Labs is affiliate with the University of Texas at Dallas as well as the North Texas Crime Commission. Key Competitors Darwin Deason Institute for Cyber Security at SMU Products and Services Cyber Defense Labs offers a range of security consulting services that can be grouped as follows: • Vulnerability Assessments • Penetration Testing • IT Audit and Compliance • Cyber Forensics and Response • Remediation and Support • Research and Development Website https://www.cyberdefenselabs.org/
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions, Information Assurance Brief Overview CyberDefenses provides a range of security professional services for business and government customers. Headquarters CyberDefenses Inc. (CDI) 1205 Sam Bass Road, Suite 300 Round Rock, Texas 78681 Tel: (512) 255 – 3700 Executives Randall Casey, Founder and CEO of CyberDefenses, has 25 years experience in IT and systems engineering, and is a retired Colonel of the Texas National Guard. History CyberDefenses was founded in 2001 by a team of returning military, cyber security veterans. The small private company has experienced 30%+ growth per year since its inception. CDI is a Service Disabled Veteran Owned Small Business (SDVOSB). Key Competitors Optiv Products and Services CyberDefenses provides cyber security professional services through strategic partnerships in the following areas: • Business Offerings – This includes a range of capabilities for business customers grouped into Information Assurance – Security assessment, planning, standards, evaluation, design, implementation, accreditation, and operations; Network Defense and Forensics – Security as a Service, SOC, NOC, and Security Systems Operations; and Cyber-Talent – Security staff augmentation, network staff augmentation, and talent development. • GSA Schedule Contract Support – CDI is a GSA government contractor. • Texas DIR ITSAC – CDI provides services through the Texas Department of Information Resources (DIR). Website https://cyberdefenses.com/
Cyber Diligence (Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics, Security Training Brief Overview Cyber Diligence provides professional services in the area of combatting and investigating cyber crimes. Headquarters Cyber Diligence Inc. 575 Underhill Boulevard Suite 209 Syosset, New York 11791 Tel: (516) 342 – 9378 Executives Yalkin Demirkaya, Founder and President of Cyber Diligence, has twenty years of law enforcement experience, including serving as detective investigator and detective squad commander with the New York Police Department. History Yalkin Demirkaya founded Cyber Diligence. The small, private company is headquartered in Syosset, New York. Key Competitors AccessData Products and Services Cyber Diligence offers a range of professional services focused on combatting cyber crime with the following specific focus areas: • IT Investigations • Computer Forensics • Network Forensics • eDiscovery (including support for high volume collection) • Covert Investigations • Cyber Incident Response • IT Security Assessment • IT Security Training • Penetration Testing • IT Policy Creation • IT Security Consulting The company offers an Internet Communication Risk Assessment Service where a network forensic collector is installed at the customer’s Internet gateway to monitor all email, Web browsing, files sent and received, and all chat communications. All collected data is analyzed in the Cyber Diligence forensic lab to identify threats. Website https://www.cyberdiligence.com/
Cyber Engineering Services (Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services Brief Overview Cyber Engineering Services provides managed data protection services for small and mid-sized companies. Headquarters CyberESI 1800 Washington Boulevard Suite 412 Baltimore, Maryland 21230 Tel: (410) 921 – 3864 Executives Joseph Drissel, Founder and CEO of Cyber Engineering Services, previously worked in the Department of Defense cyber forensics laboratory. History Joseph Drissel founded Cyber Engineering Services in 2010. Key Competitors Tenable Security, CyberPoint Products and Services Cyber Engineering Services offers managed data protection services including consulting that are centered on their Datasurity methodology, which involves assessing, informing, and sealing. The company provides guidance, consultation, assessment, and mitigation approaches for companies that have less available infrastructure and funding, but that still may handle sensitive data or support critical applications. The team at Cyber Engineering Services focuses on four levels of domain: Global level, device level, network level, and perimeter level. The Datasurity approach is also marketed as supporting cyber insurance filings. Website https://www.cyberesi.com/
CyberFlow Analytics
CyberGym
Acquired by Webroot
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview CyberGym provides realistic cyber security team training and exercises to help prepare for real attacks. Headquarters CyberGym Headquarters – IEC Training Center Heftziba, Hadera Israel Tel: +972 (4) 6679701 [emailprotected] Executives Ofir Hanson, CEO of Cyber Control and Yasha Hain, Deputy CEO of IEC coordinate and sponsor the program. History CyberGym was founded in 2012 as a joint effort between the Israel Electric Company and Cyber Control. Products and Services CyberGym creates realistic, tailored cyber security training exercises for teams to help prepare for real attacks. The exercises are performed at the IEC training center in Heftziba, adjacent to the Orot Rabin Power Station in Hadera. They involve a red team providing defense, an attack team providing the offense, and a white team performing oversight. The exercise is taped and reviewed to identify lessons learned. Website https://www.cybergym.co.il/
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention, Network Monitoring, Security Analytics Brief Overview CyberFlow Analytics provides solutions for security analytics and actionable intelligence. Headquarters CyberFlow Analytics 4250 Executive Square, Suite 525 San Diego, California 92037 Tel: (858) 346 – 1129 Executives Hossein Eslambolchi, Chairman and CEO of CyberFlow Analytics, was previously President and CEO of AT&T Labs. Steve Nye serves as President and CEO of CyberFlow Analytics. History Founded in 2013, the company is headquartered in San Diego. Dave Belanger, former Chief Scientist at AT&T serves on the advisory board. Toshiba offered $2M in venture funding in 2013; this was part of a larger $4M round of seed funding including Siemens Venture Capital and Plug & Play Ventures. Key Competitors IronNet Products and Services CyberFlow Analytics provides a next-generation platform called FlowScape that generates so-called “anomalytics” via real-time, streaming, machine-learning, behavioral analytics. The platform is designed to detect and alert operational and security practitioners of anomalous or suspicious behavior. The platform consists of passive virtual machines with application and device sensors. These are used to create a connected multi-modal analytics engine that machine-learn communications to identify odd behaviors. Visualization is provided via the FlowScape Interactive Case graph. APT scenarios are addressed by the platform. The company maintains alliances with Toshiba, SecurView, and CyberUnited. Website https://www.cyberflowanalytics.com/
CyberInt
Cyberis
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence, Security Consulting Brief Overview CyberInt provides a range of intelligence, monitoring, and consulting services focused on information security and cyber warfare. Headquarters CyberInt Ha-Mefalsim 17 St 4951447 Petah Tikva Israel Tel: +972-3-7286-777 Executives Amir Ofek serves as CEO of Cyberint. Itay Yanovski, Raz Alon, and Shay Priel are managing partners of CyberInt. History The small private company, founded in 2009, is headquartered in Israel with an office in Panama City, Panama. The principals are former Israeli Army Intelligence Veterans from IDF Unit 8200. Key Competitors NCC Group Products and Services The consulting services offered by CyberInt can be grouped as follows: • Offensive Security – Includes penetration testing, security code review, security development lifecycle, and warfare simulation and testing. • Critical Infrastructure Security – Includes CIP/SCADA security and related consulting services. • Defensive Security – Includes security management, security architecture, and identity and access management. • Cyber Intelligence – Includes cyber presence, digital investigations, and open source intelligence. • Cyber Research – Includes methodology and doctrine research in cyber security. Website https://www.cyberint.com/
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing Brief Overview Cyberis provides information security, risk management, and assurance consulting services and solutions. Headquarters Cyberis Limited Unit E The Courtyard Tewkesbury Business Park Tewkesbury Gloucestershire GL20 8GD Tel: +44 3333 444 800 Executives Geoff Jones serves as Director of Cyberis and member of the senior management team. History Cyberis was formed in 2011 and is headquartered in the UK. It is a member of the Malvern Cyber Security cluster and a company of the CESG IT Health Check Service. Key Competitors NCC Group Products and Services Cyberis offers a range of security, risk management, and assurance solutions grouped as follows: • Assurance – Includes application security testing, APT simulation, external telephony review, firewall review, host implementation review, open source investigation, penetration testing, remote access review, social engineering review, vulnerability assessment, and wireless security assessment. • Solutions – Includes Cyberis threat seminar, NetAlerts integrity-monitoring solution for Websites, and NetCapture real-time capture and manual analysis of traffic and data. • Consulting – Includes maturity review, incident response, physical security review, policy development, risk assessment, risk management framework, technical architecture review, and technical security standards. Website https://www.cyberis.co.uk/
Cyberlytic (Alpha Version 0.1 – 08/28/17 – No Vendor Approval) TAG Cyber Controls Web Application Security Brief Overview Cyberlytic uses artificial intelligence to classify attack data, identify threat characteristics, and prioritize high-risk attacks to provide web application security. Headquarters 69 Wilson St London, UK EC2A 2BB Tel: +44(0) 203 290 0011 Executives Stuart Laidlaw serves as the CEO. History Cyberlytic was founded in 2011 by Stuart Laidlaw and St. John Harold. Key Competitors Cylance, Akamai Products and Services Cyberlytic provides a profiler solution that provides real-time risk assessment of web-based attacks. It connects to the web server and analyzes web traffic to determine the capability, sophistication, and effectiveness of each attack. Cyberlytic also privides as defender solution that defuses SQL injections, cross-site scripting, and web-based attacks with patented machine learning classification methods and a cyber-attack risk model. Website https://www.cyberlytic.com
Cyber Net Force Technologies (Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Information Assurance Brief Overview CNF Technologies provides a range of cyber operations and systems engineering solutions with emphasis on network defense and intrusion detection. Headquarters CNF Technologies 9415 Dugas Drive San Antonio, Texas 78245 Tel: (210) 957 – 2800 Executives Roxanne Ramirez is currently CEO of CNF Technologies. History Fred Ramirez founded CNF in 2005. CNF’s principals were pioneers in cyber operations involved in the establishment of the Air Force Information Warfare Center (AFIWC) as well as many other defense-related projects, groups, and missions. The small private company is currently an SBA certified 8(a) small business. Key Competitors Boeing, Lockheed Martin Products and Services CNF offers professional services related to cyber operations in the following areas: • Custom software design and development • Systems integration • Network Engineering • Virtualized services and solutions • Web application development • Database design and development The company’s engineers come to these tasks from the perspective of information assurance and cyber operations. Solutions are offered through GSA, USSTRATCOM, and other government contracts. Website https://www.cnftech.com/
CyberOWL
CyberPoint International
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring, ICS/IoT Security Brief Overview CyberOwl offers an early warning system for cyber attacks through real-time monitoring of high value targets for malicious behavior. Headquarters CyberOWL London, England Executives Daniel Ng, CEO of CyberOWL, was previously Associate Director of KPMG. Siraj Ahmed Shaikh is Co-Founder and CSO of CyberOwl. History Founded in 2016, this private company is headquartered in London. Key Competitors Corelight Products and Services CyberOwl offers an early warning system for attacks through real-time monitoring of high-value targets for malicious behavior. The technology is based on research shortlisted for Lloyd’s Science of Risk Prize 2015. Website https://www.cyberowl.io/
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Information Assurance, Security Consulting Brief Overview CyberPoint International provides security professional services and information assurance to commercial and Federal Government clients. Headquarters CyberPoint International 621 East Pratt Street, Suite 300 Baltimore, Maryland 21202 Tel: (410) 779 – 6700 Executives Karl Gumtow, CEO of CyberPoint International, also serves on the Board of Visitors at the University of Maryland, University College. History Karl Gumtow co-founded CyberPoint International in 2009. The small private company is headquartered in Baltimore with permanent offices in Abu Dhabi. Key Acquisitions Bitmonix (2013) Key Competitors Chertoff Group Products and Services CyberPoint International offers cyber security and information assurance solutions grouped as follows: • Services and Solutions – This includes a range of professional services such as malware analysis, reverse engineering, digital forensics, incident response, secure network engineering, risk analysis, vulnerability assessment, machine learning research, high performance computing, Big Data, strategic planning, policy development, and mobile security. • Products and Technologies – The company provides several tools and products including DarkPoint (automated malware analysis), CyberVaR (risk mitigation and planning), Cyber Workbench (cleans sluggish computers), Minnow USB (fingerprint drive), and CyberWire (news service). • Cyberpoint Labs – This is the company’s R&D team focusing on applied math, data science, and security. The group has close ties to the University of Maryland. Website https://www.cyberpointllc.com/
Cybereason
CyberRiskPartners
(Alpha Version 0.1 – 06/15/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Security Analytics Brief Overview Cybereason provides real-time detection, visualization, and termination of cyber attacks. Headquarters Cybereason 200 Clarendon Street Boston, Massachusetts 02116 Tel: +1 (855) 695 – 8200 Executives Lior Div, Co-founder and CEO of Cybereason, spent six years in the Israeli Intelligence Corps. History Lior Div, Yonatan Striem-Amit, and Yossi Naar co-founded Cybereason in 2014. The company raised $4.6M in Series A funding from Charles River Ventures. Softbank led a $59M round of investment in 2015. Charles River Ventures, Spark Capital also participated in the round. Key Competitors CheckPoint, Symantec, McAfee Products and Services The Cybereason platform uses analytics, machine learning, visualization, and guided investigation to detect intrusion activity the company refers to as “Malops.” The platform was designed to be used in the context of CISO management or cyber security analysis. The platform provides visibility into security events, provides alerts, allows data analysis, isolates users, and supports change implementation. The platform designers claim to be focused more on hacker’s plan of attack and intent, rather than identifying malware. Website https://www.cybereason.com/
(Alpha Version 0.1 – 06/15/17 – No Vendor Approval) TAG Cyber Controls Cyber Insurance Brief Overview CyberRiskPartners provides a decision support cyber security platform for analytics and risk transfer. Headquarters CyberRiskPartners 415 Madison Avenue, 15th Floor New York, New York 10017 Executives David Kimmel serves as CEO of CyberRiskPartners. He was previously with Summit Capital. History CyberRiskPartners is the parent company for CyberFactors LLC and CloudInsure, LLC. Key Competitors Marsh Products and Services CyberRiskPartners provides two main cyber security insurance-related capabilities: • CyberFactors – Includes real-time dashboard tracking events, quality reporting, and dynamic self-serve analytics. • CloudInsure – A cloud-based platform for supporting cloud insurance. Website https://www.cyberriskpartners.com/
Cybersalus
Cyber Search West
(Alpha Version 0.1 – 06/15/17 – No Vendor Approval) TAG Cyber Controls Information Assurance Brief Overview Cybersalus provides cyber security and information assurance services and solutions including risk assessments and cyber operations. Headquarters Cybersalus, LLC 1930 Isaac Newton Square, Suite 203 Reston, Virginia 20191 Tel: (571) 325 – 5712 Executives John Kiehm, CEO of Cybersalus, was previously founder of SKC, as well as former Defense Intelligence Agency Chief of Staff. Dana Shafle is EVP and CTO; she was previously a Navy Commander. History John Kiehm established Cybersalus in 2002 as a ServiceDisabled, Veteran Owned Small Business (SDVOSB). The company, which is led by military veterans, provides capabilities that are well positioned for government customers. Key Competitors Veris Group, TM3 Solutions Products and Services Cybersalus offers cyber security and information assurance services and solutions, many offered in conjunction with a close partnership with McAfee that can be grouped as follows: • Cyber Risk Assessments – Includes comprehensive assessment processes, company dossiers, geospatial intelligence analysis, physical security assessment, technical vulnerability scan, and other services. • Cyber Remediation – Involves proposed remediation based on the SANS 20 critical security controls. • Cyber Operations – Includes services to create or modify security operations centers with centralized security management, SIEM usage, device monitoring and management, and other capabilities. • Cyber Services – Includes subject matter expert (SME) support for federal, state, local, and commercial organizations. Website https://www.cybersalus.com/
(Alpha Version 0.1 – 06/15/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Cyber Search West provides recruiting and search services focused on the managed security services sector Headquarters Cyber Search West 21851 Newland Street, #313 Huntington Beach, California 92646 Tel: (909) 626 - 1234 Executives Roger Gaikar serves as Founder and President of Cyber Search West. History Roger Gaikar founded Cyber Search West in 1984. The company is headquartered in Huntington Beach, California. Key Competitors Alta Associates Products and Services Cyber Search West provides cyber security recruiting and search capabilities focused on the managed security services sector. The company provides services for hiring firms desiring of positions ranging from C-level to subject matter experts in cyber security. The company also caters to security professionals desiring new positions in cyber security. Cyber Search West claims to be the “go-to” firm for hiring companies in the managed security services sector, which requires talents ranging from operations management to technical analysis, response, and digital forensics. Website https://www.cybersearchwest.com/
Cyber Security Recruiters CyberSN (Alpha Version 0.1 – 06/15/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Cyber Security Recruiters provides search and recruiting services for information security professionals. Headquarters Cyber Security Recruiters 637 Main Street NW Suite D Elk River, Minnesota 55330 Tel: (763) 515 – 0088 Executives Al Lerberg serves as President of Cyber Security Recruiters. History The company, which received its start focused on the Intelligence sector, is headquartered in Minnesota. Key Competitors Cyber Search West Products and Services Cyber Security Recruiting serves search and recruiting services for information security professionals. The company serves the Intelligence space as well as the private sector. Samples types of positions covered by the firm include security engineers, security risk engineers, security managers, IAM professionals, risk advisory, IT audit, security consulting, and incident response. The company provides both national and international positions. Website https://www.cybersecurityrecruiters.com/
(Alpha Version 0.1 – 06/15/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Headquarters CyberSN Tel: (888) 470 – 8011 Tel: (714) 272 – 5829 [emailprotected] Key Executives Deidre Diamond, Founder and CEO, was previously with Motion doing IT staffing as well as with Rapid7. Md. Diamond has over twenty years of professional technical staffing experience. History Founded in 2014, the firm is focused on cyber security staffing. Key Competitors Alta Associates Products and Services CyberSN provides cyber security staffing solutions and services. The firm is focused on transforming employment through a technology platform with a common language. The goal is simplifying information needed to find and hire qualified professionals and lowering the cost and time to acquire cyber security professional talent. CyberSN employs a team of recruiters with background and networks focused on cyber security. The company also offers two-hour virtual coaching sessions for candidates. The value proposition for the coaching session is around win-win. Cyber SN also provides a blog for security professionals on trends and issues related to staffing. Website https://www.cybersn.com/
CyberSponse
Cyber 360 Solutions
(Alpha Version 0.1 – 06/15/17 – No Vendor Approval) TAG Cyber Controls Incident Response Brief Overview CyberSponse provides a collaboration platform for supporting security incident response. Headquarters CyberSponse, Inc. 14747 N. Northsight Boulevard #111 Scottsdale, Arizona 85260 Tel: (888) 941 – 6446 Executives Joseph Loomis, Founder and CEO of CyberSponse, was previously Founder and CEO of NetEnforcers. History Joseph Loomis, Craig Cassidy, and William Key co-founded CyberSponse in 2011. The small company is headquartered in Arizona. Key Competitors Resilient Systems Products and Services The CyberSponse solution is a collaboration platform designed to enhance team communication when responding to an IT security incident. Specific focus areas for the product include support for crisis management, event aggregation, and incident response. Features included in the platform include secure team collaboration (chat ad activity feeds, messaging, calendar, and support for mobile), workflow and task management (task roadmaps and a dashboard for monitoring task progress), and incident and event notification (project support for different incidents, and customizable notifications). Website https://www.cybersponse.com/
(Alpha Version 0.1 – 06/15/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Cyber 360 Solutions provides professional cyber security staffing solutions for its clients. Headquarters Cyber 360 Solutions 1600 Providence Highway Walpole, Massachusetts 02081 Tel: (781) 438 – 4380 Executives Heather Haughey serves as CEO of Cyber 360 Solutions. Mark Aiello serves as President of Cyber 360 Solutions. History Cyber 360 Solutions was established in 1999 and is now a division of Staffing 360 Solutions Inc. The group was formerly known as The Revolution Group. Staffing 360 Solutions sold the Cyber 360 Solutions unit to its original owners in 2015 with the intent that the group change its name within a year. The company reports roughly $5M in revenue. Key Competitors CyberSN Products and Services Cyber 360 Solutions provides cyber security staffing solutions for clients with emphasis on the best talent available for consultation and professional service opportunities. As a division of a larger staffing organization, Cyber 360 can offer a wider range of services than smaller competitors. Website https://www.cyber360solutions.com/
CyberTriage
CyberUnited
Owned by Basis Technology
(Alpha Version 0.1 – 06/16/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence Brief Overview CyberUnited offers enterprise solutions based on threat intelligence, analytics, and machine learning to detect malicious insider behavior. Headquarters CyberUnited, Inc. 1855 1st Avenue, Suite 103 San Diego, California 92101 Executives Darin Anderson, President and CEO of CyberUnited, is also Chairman and Founder of CyberHive, a shared workspace and incubator of high tech startup companies. History Darin Anderson and Steven Rahseparian founded CyberUnited in 2013. The small private company is headquartered in San Diego. Key Competitors iSIGHT Partners (FireEye) Products and Services CyberUnited offers a suite of solutions focused on detecting illicit, malicious insider behaviors using a behavioral psychological model and a proprietary self-learning neural network known as Bandito in the following areas: • Intersect – Collects data and analyzes for insider identity and privacy issues using a behavioral psychology model, anonymization to protect internal privacy, Intelligent Search Concepts (ISC) for pattern recognition, and the PitViper correlation and decision engine. • PitViper – This is the underlying decision and correlation engine – referred to as ClearFusion – that uncovers malicious insiders. • Consulting – The company offers a range of professional services for policy and procedural analysis testing, incident response, risk assessment, and other functions. Website https://www.cyberunited.com/
(Alpha Version 0.1 – 07/28/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Cyber Triage is an incident response software that simplifies the collection and analysis of endpoint data. Headquarters CyberTriage One Alewife Center Cambridge, Massachusetts 02140 Tel: +1 (617) 386 - 2000 Executives Brian Carrier leads the digital forensics group at Basis Technology. He previously ran an incident response team at @stake. History Cyber Triage was released in 2017 by Basis Technology. The company is based in Cambridge Massachusetts. Key Competitors Cynet Products and Services Cyber Triage investigates the endpoint by pushing the collection tool over the network, collecting relevant data, and analyzing it for malware of suspicious activity. Website https://www.cybertriage.com/
CyberVista
CyberX
(Alpha Version 0.1 – 07/30/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview CyberVista is a cybersecurity training and workforce development company. Headquarters CyberVista 1300 17th Street North, 17th Floor Arlington, Virginia 22209 Tel: (844) 558-4792 Executives Amjed Saffarini, CEO of CyberVista, previously spent 16 years as a leader at Kaplan launching many industry firsts such as the first fully asynchronous online program and a fully teacher-led online program. History CyberVista is the newest venture of Graham Holdings Company working alongside Kaplan. This private company is headquartered in Virginia. Key Competitors Global Knowledge Products and Services CyberVista offers the following security training products. • CISSP training platform – Offered in two versions: either as the comprehensive Live Online CISSP Course or a leaner Live Online CISSP Refresher Course. • CompTIA Security+ Training • Cybersecurity Certification for multiple companies. Website https://www.cybervista.net/
(Alpha Version 0.1 – 06/16/17 – No Vendor Approval) TAG Cyber Controls ICS/IoT Security Brief Overview CyberX provides protection support for industrial control networks through detecton of incidents, threats, and tamering. Headquarters CyberX 550 Cochituate Road Suite 25 Framingham, Massachusetts 01701 Tel: +1 (657) 229-2370 Israel Executives Omer Schneider serves as CEO of CyberX. History Founded in 2012 in Israel by Omer Schneider and Nir Giller, CyberX is headquartered in Israel and Massachusetts. The company obtained $2M in seed funding in 2014. It has received a total of $11.02M in three rounds through 2016 from ff Venture Capital, Flint Capital, and Glilot Capital Partners. Key Competitors Bayshore Networks Products and Services CyberX provides protection support for industrial control networks through detecton of incidents, threats, and tampering via the XSense platform. OT security capabilities of the XSense platform include the following: • Dashboard and alert management • Complete visibility and control • Event forensics, analysis, and investigation Website https://www.cyberx-labs.com/
CYBONET
Cybric
(Alpha Version 0.1 – 07/30/17 – No Vendor Approval) TAG Cyber Controls Email Security Brief Overview CYBONET’s internet security and network control products enable SMB/Es and Telcos to comprehensively protect their critical network infrastructure. Headquarters CYBONET Matam, Building 23, P.O.B. 15102 Haifa 3190501 Israel Tel: +972 3 821-2321 Executives David Feldman, CEO of CYBONET, previously held multiple strategic management positions within the company. History Founded in 2002, formerly known as PineApp, CYBONET is a private company headquartered in Israel Key Competitors Products and Services CYBONET offers the following products • PineApp Mail Secure – Real-time solution to repel malware and other advanced threats on your network. Integrates with existing mail servers to provide necessary protection from malicious and inadvertent email-borne threats. • Outbound Spam Guard – A carrier-grade solution that can be easily deployed to scan and block up to 99% of all unwanted or malicious outbound email traffic. • Cybowall – Provides complete and continuous monitoring of your network across all protocols and extending to all endpoints. Website https://www.cybonet.com/
(Alpha Version 0.1 – 07/30/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview Cybric develops a cloud-based SaaS platform that integrates security into a user’s application delivery process. Headquarters Cybric 32 Atlantic Avenue Pilot House – Lewis Wharf Boston, Massachusetts 02110 Tel: (617) 221-6280 Executives Ernesto DiGiambattista, CEO of Cybric, was previously CTO for Sentinel Benefits. History Cybric was founded in 2015 by Ernesto DiGiambattista, Andrew Gilman, and Mike D. Kail. This private company has received $7.6M in funding. Key Competitors Detectify Products and Services Cybric offers the Continuous Security-as-a-Service platform that enables enterprises to integrate security into the application delivery process without impacting the production environment. Website https://www.cybric.io/
CYBRScore
_Cyel
(Alpha Version 0.1 – 07/31/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network. Headquarters CYBRScore 20430 Century Boulevard Germantown, Maryland 20874 Executives Alan Gush is the Director, Cyber Solutions at CYBRScore. History A division of Comtech Command & Control Technologies, CYBRScore was launched in early 2017. This private company is headquartered in Maryland. Key Competitors SANS, IANS Products and Services CYBRScore Skills Assessments provide a quantitative measurement of performance, using practical, hands-on scenarios to evaluate job-role competencies, knowledge, skills and abilities. Website https://www.cybrscore.io/
(Alpha Version 0.1 – 07/31/17 – No Vendor Approval) TAG Cyber Controls Intrusion Prevention, Data Encryption Brief Overview _Cyel provides WAN equipment to build software-defined networks that are fully compatible with legacy infrastructure. _Cyel leverages moving target security to take away the aim for an attacker. Headquarters _Cyel Gurtenbrauerei 10 3084 Wabern Bei Bern Switzerland Tel: +41 31 552 12 20 Executives Toni Ala-Mutka serves as Product Director of _Cyel History _Cyel was founded in 2016 and is headquartered in Switzerland. Key Competitors Data Locker Products and Services _Cyel offers data protection that is based on moving target security. The solution is to move, distribute and conceal targets as oppose to preventing intrusions in a static network. Every data transmission is encrypted. Website https://cyel.ch/
Cyfir
Cykick Labs
(Alpha Version 0.1 – 06/16/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics, Incident Response Brief Overview Cyfir provides an enterprise forensics suite to support computer and network investigations and incident response. Headquarters Cyfir 9720 Capital Court Suite 200 Manassas, Virginia 20110 Tel: (703) 659 – 9805 Executives Ben Cotton, CEO of CyFir, is also CEO of the parent company, CyTech Services. Ben is a veteran of US Army Special Operations Command (SOCOM). History CyTech Services launched CyFir in 2013, after purchasing Paraben’s Enterprise Forensics Division. CyFir is headquartered in Virginia. Key Competitors Guidance Software Products and Services The CyFir Network Forensics and Incident Response Platform supports computer and network investigations, as well as incident response activity. The platform supports eDiscovery, insider threat, and digital forensic investigations. It is available as a software installation for existing enterprise hardware or as a dedicated hardware appliance. The company also provides a range of services for forensic analysis, on-site support, and on-site training. Website https://www.cyfir.com/
(Alpha Version 0.1 – 07/31/17 – No Vendor Approval) TAG Cyber Controls Web Fraud Prevention, Intrusion Detection, Network Monitoring Brief Overview Cykick Labs provides protection for websites from fraud & hacking by analyzing user behavior. Headquarters 9 Ahad Ha’am Street 20th Floor Tel Aviv Israel 6526101 Tel: +1 (201) 308 - 1021 Executives David Sokolic, CEO of Cykick Labs, previously held management positions at Microsoft, RADVISION, and VocalTec Communications. History Cykick Labs was founded in 2010. This private company has received $3.27M in funding and is headquartered in Israel. Key Competitors Forter Products and Services Cykick Labs offers Telepath. Telepath uncovers and stops online fraud, automated attacks, and hacker assaults on your web applications undetectable by traditional security solutions using proprietary machine-learning algorithms that track and learn user behavior. Website https://www.cykicklabs.com/
Cylance
Cymmetria
(Alpha Version 0.1 – 06/16/17 – Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Cylance uses AI and machine learning to proactively prevent execution of advanced persistent threats the endpoint. Headquarters Cylance Inc. 18201 Von Karman Avenue, Suite #700 Irvine, California 92612 Executives Stuart McClure, CEO of Cylance, was previously an executive with McAfee . History Ryan Permeh, Chief Scientist, and Stuart McClure founded Cylance in 2012.Cylance is a venture capital funded private corporation. To date, the company has raised $177M across four rounds of funding led by Blackstone, Khosla Ventures, Fairhaven Capital, Dell Ventures, DFJ, KKR, Capital One Ventures, Ten Eleven Ventures and several other firms. Cylance operates in the United Kingdom, Norway, Australia, Japan, and other regions. Key Competitors Symantec, McAfee Products and Services Cylance’s product offerings are based on the CylanceINFINITY technology, which applies AI to analyze the DNA of code prior to its execution on the endpoint. • CylancePROTECT is an endpoint protection product that stops threats in real time before they execute using artificial intelligence to prevent system and memory based attacks, malicious documents, zero-day malware, privilege escalations, scripts, and unwanted programs. • CylancePROTECT + ThreatZERO Services optimize the operation of Cylance products, expediting deployment, mitigating risk, and providing immediate ROI. Cylance’s experts work with enterprise teams to configure agents properly, educate staff, and reduce the risk of threats in the enterprise environment. • Cylance Consulting offers a full suite of services that combines deep domain experience with an innovative artificial intelligence and machine learning based approach to endpoint protection. Services include: compromise assessments, penetration testing, emergency incident response, training, and staff augmentations. Cylance supports endpoints running Windows and MAC OS in typical enterprise configurations. Website https://www.cylance.com/
(Alpha Version 0.1 – 06/16/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention, Security Analytics Brief Overview Cymmetria offers deception-based intrusion detection technology with virtualization to detect advanced threats to an enterprise. Headquarters Cymmetria 2557 Park Boulevard #L106 Palo Alto, California 94306 [emailprotected] Executives Gadi Evron and Dean Sysman serve as Founders of Cymmetria. History Founded in 2014, Cymmetria is a start-up based in Israel recently emerging from stealth mode in 2015. The company raised $9M in Series A venture capital from Sherpa Ventures, Lumia Capital, Seedcamp, and Y Combinator. Key Competitors Attivo, Illusive Products and Services Cymmetria is a start-up company that provides deceptionbased platform called MazeRunner with virtualization to detect advanced persistent threats to an enterprise. Three key components in the Cymmetria solution are as follows: • Deception Stack – Technology and methodology that detects and deters attackers • Exact Interaction – Reduces false positives and separate real assets • Adaptive decoys – Seamless integration of deception Website https://www.cymmetria.com/
Cynet
Cypherix
(Alpha Version 0.1 – 06/16/17 – No Vendor Approval) TAG Cyber Controls Security Analytics, Endpoint Security Brief Overview Cynet collects indicators and supports enterprise analysis for detection and mitigation of advanced threats. Headquarters Cynet US Office 17 State Street, Suite 4000 New York, New York 10004 R&D Center 11 Moshe Levi Street (UMI Building) Rishon LeZion, Israel 75070 Executives Eyal Gruner serves as CEO of Cynet. History Cynet was created from BugSec in response to the growing APT challenge Key Competitors Tanium Products and Services Cynet provides agentless, advanced threat detection and remediation solutions that can be grouped as follows: • Cynet 360 – Uses indicators gathered across the enterprise to detect malware or attacks in files, endpoints, or networks. The product was originally named CyberSpear. • Cynet Audit – Collects indicators, analyzes, and supports human analysis. • Cynet Incident Response – Supports the enterprise incident response process The Cynet team includes an integrated SOC and uses behavioral analysis to correlate information to detect threats. Website https://www.cynet.com/
(Alpha Version 0.1 – 06/16/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview Cypherix provides a range of personal encryption software products for Windows platforms. Headquarters Cypherix SVS Road Mahim West Mahim, Mumbai Maharashtra 400016 India Executives Samar Jit serves as CEO of Cypherix. History The private company is headquartered in India. Key Competitors ESET, Symantec Products and Services Cypherix provides a range of personal encryption software products that can be grouped as follows: • Cypherix LE – Miniature, freeware version of Cypherix PE • Secure IT – Command line encryption with batch files • Cypherix PE – Protects data and uses encrypted vaults • Cypherix SE – Password recovery Website https:/www.cypherix.com/
Cyphort
CYREN
(Alpha Version 0.1 – 06/16/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring, Security Analytics Brief Overview Cyphort provides an advanced persistent threat (APT) management and protection platform that focuses on zero day and targeted attacks. Headquarters Cyphort Corporate Headquarters 5451 Great America Parkway #225 Santa Clara, California 95054 Tel: (408) 841 – 4665 Executives Manoj Leelanivas, CEO of Cyphort, was previously a fourteenyear veteran at Juniper Networks. History Fengmin Gong co-founded the company in 2010. The privately held company recently reported roughly 35 employees and has received funding from Foundation Capital, Matrix Partners, and Trinity Ventures. The company announced a $30M Series C round of venture funding in 2015 led by Sapphire Ventures with involvement of Trinity Ventures, Foundation Capital, ad Matrix Partners. Key Competitors FireEye Products and Services Cyphort’s Multi-Method Detection Platform includes functionality in the following areas: • Collection – This involves unique distributed software collectors that are spread across an IT infrastructure to monitor Web, email, and virtual platforms including VMware’s ES server. • Inspection – Cyphort’s engine allows for execution, analysis, and behavior mapping of suspect objects. • Analytics – The analytic engine uses contextual learning, predictive modeling, and threat analytics to correlate multiple indicators. • Correlation – This includes data aggregation fro the Cyphort engine, IPS systems, SIEMs, directory services, and user activity. Website https://www.cyphort.com/
(Alpha Version 0.1 – 06/16/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence Brief Overview CYREN provides a cloud-based platform that makes threat data available to endpoints. Headquarters CYREN 1 Sapir Street, 5th Floor Beit Ampa, P.O. Box 4014 Herzliya, 46140, Israel Tel: +972 9 8636 888 CYREN (US) 1430 Spring Hill Road, Suite 330 McLean, Virginia 22102 Tel: (703) 760 – 3320 Executives Lior Samuelson, CEO of CYREN since 2013, held previous executive positions with Deltathree (DDDS), Pricewaterhouse Coopers Securities, and The Barents Group. History Nahum Sharfman, Gideon Mantel, and Amir Lev co-founded Commtouch Software in 1991, and took the company public less than a decade later. The company changed its name to CYREN in 2014. After several years of financial ups and downs, including restatement of results in 2000, the company made several acquisitions in the anti-virus, and anti-Spam areas. The public company trades on both the NASDAQ and Tel Aviv Stock Exchange (TASE). Key Acquisitions Command Anti-Virus Division of Authentium (2010) Frisk International (2012) GmbH (2012) Key Competitors iSIGHT Partners (FireEye) Products and Services CYREN’s GlobalView Security Cloud technology uses patented Recurrent Pattern Detection (RPD) to make threat information immediately available to millions of endpoints for Spam classification, URL categorization, and malware detection services. Specific products include CYREN Websecurity (URL Filtering, Unified Threat Detection, Support for Android), CYREN Embedded Anti-Virus (Support for Android, Advanced Heuristics, Unified Threat Detection), and CYREN EmailSecurity (Embedded Anti-Spam, IP Reputation). The CYREN Security Lab provides support for the CYREN product suite. Website https://www.cyren.com/
Cytegic
Cyxtera
(Alpha Version 1.0 – 09/05/17 – Vendor Approval) TAG Cyber Controls Automated Cyber Risk Management Brief Overview Cytegic’s scientific approach provides digital-related risk oversight across the entire organization. With Cutting-edge patented technology, Cytegic’s Automated Cyber Risk Officer provides best in industry cyber risk management with unprecedented accuracy, agility and friendliness. ACRO provides you with recommendations on specific operational defensive actions while helping determine which resources should be allocated to match risk tolerance and business strategy. Headquarters Cytegic USA Office 1177 Avenue of the Americas, 5th Floor, New York, NY 10036 Tel: (347) 815 – 7450 Israel Office 39 Sha’ul HaMelech Boulevard Suite #601, Tel-Aviv, 64928 Tel: 972-52-522-1170 Executives Elon Kaplan, CEO and Co-Founder of Cytegic History Cytegic was founded in 2012. This private company has received $9M in funding and is headquartered in Israel. Key Competitors RiskLens, RiskSense, Bay Dynamics Products and Services Cytegic provides the following products. Automated Cyber Risk Officer (ACRO) – ACRO allows senior decision makers primarily the CISO, CIO, CFO, Business Owners and Boards to demystify cyber risk into something that is simple, actionable and quantifiable and translates to dollars and cents. ACRO allows their organizations to become truly proactive and operational regarding the management Cyber Risk instead of catering to the needs of technologies that strike and disappear out of nowhere. Website https://www.cytegic.com/
(Alpha Version 0.1 – 08/29/17 – No Vendor Approval) TAG Cyber Controls VPN/Secure Access, Access Management, Application Security Brief Overview Cyxtera is an evolution of enterprise IT, and a transformation in infrastructure security. Headquarters Cyxtera BAC Colonnade Office Towers 2333 Ponce De Leon Boulevard, Suite 900 Coral Gables, Florida 33134 Tel: (305) 537 – 9500 Executives Manuel D. Medina, CEO of Cyxtera, previously founded Terremark, a publicly traded company that was acquired by Verizon for $2 billion. Leo Taddeo, CISO of Cyxtera, previously served as the Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office. History Cyxtera was founded in 2017 by Manuel D. Medina. This private company is headquartered in Florida. Key Acquisitions Brainspace (2017) Key Competitors Cisco, Juniper Products and Services Cyxtera offers the following cyber security products. • AppGate SDP – Secures the network with a SoftwareDefined Perimeter – a network security model that dynamically creates one-to-one network connections between the user and the resources they access. • AppGate Insight – Automatically and continuously discovers all assets in your virtual fabric, allows the grouping of these assets into logical TrustZones and visualizes asset relationships and the east-west traffic flows between them for improved analytics. Website https://www.cyxtera.com/
Damballa
Daon
Acquired by Core Security
(Alpha Version 0.1 – 06/16/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Two-Factor Authentication Brief Overview Daon offers platforms, tools, and applications focused on identity assurance and biometrics for enterprise and government customers. Headquarters Daon 11911 Freedom Drive Suite 900 Reston, Virginia 20190 Tel: (703) 984 – 4000 Executives Thomas Grissen, CEO of Daon, is a member of the Board of Directors and has over two decades experience in technology. History Dermot Desmond founded Daon in 1999 in Dublin, Ireland. Daon has since grown and acquired the software assets for physical security from Enterprise Air in 2008. The company has offices in Washington, DC, Dublin, Ireland and Canberra, Australia. Key Acquisitions Enterprise Air (2008) – Physical security Key Competitors Duo Security Products and Services Daon provides a platform and tools for identity assurance and biometric authentication. Specifically, the IdentityX Platform offers mobile biometric authentication for application and system identity validation. The company offers an opensource FIDO reference implementation for UAF-based RPApp and RPSA. Website https://www.daon.com/
(Alpha Version 0.1 – 06/16/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring, Intrusion Detection/Prevention, Security Analytics Brief Overview Damballa provides solutions that identify and mitigate advanced persistent threats (APTs) and malware. Headquarters Damballa 817 W Peachtree Street NW Atlanta, Georgia 30308 Tel: (404) 961 – 7400 Executives David Scholtz, CEO of Damballa, previously held executive positions at HP, McAfee, and Mercury. History Merrick Furst, Wenke Lee, David Dragin, and Richard Lipton of Georgia Tech co-founded Damballa in 2006. The company has received several rounds of Series A, B, C, D, and E funding from Imlay Investments, Noro-Moseley Partners, Sigma Partners, GRA Venture Fund, Blumberg Capital, InterWest Partners, Palomar Ventures, Paladin Capital group, and Adams Street Partners. The most recent round was in 2014 for $13M. Key Competitors FireEye Products and Services Damballa’s Failsafe solution provides an automated breach defense system that fills the gap between failed detection or prevention and corresponding incident response. Features of the solution include: • Identification of infect devices • Rapid threat detection • Prioritized remediation • Active infection blocking • Evidence collection based on infections rather then alerts The Failsafe platform is available for both enterprise and service provider customers. The company also provides a range of services including a Damballa University that includes a curriculum of security training courses. Website https://www.damballa.com/
Dark Cubed
Dark Light Cyber
(Alpha Version 0.1 – 08/01/17 – No Vendor Approval) TAG Cyber Controls Threat Detection, Governance, Risk, and Compliance. Brief Overview Dark Cubed uses machine learning and data science to identify and understand the behavior of threat actors across disparate networks in real-time. Headquarters Dark Cubed Alexandria, Virginia Tel: (866) 547-9441 [emailprotected] Executives Vince Crisler, Co-Founder and CEO of Dark Cubed, was previously Senior Vice President at Zeichner Risk Analytics, and Director, Information Assurance to the Executive Office of the President. History Dark Cubed was founded in 2015 by Vince Crisler and Theresa Payton. This private company has received $1.75M in funding. Key Competitors Fortalice Products and Services Dark Cubed offers a platform that enables its users to get instant visibility, real time awareness, and discover threats faster. Website https://www.darkcubed.com/
(Alpha Version 0.1 – 08/01/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview Dark Light Cyber uses an AI-based expert system for active cyber defense and trusted information sharing that allows analysits to codify their logical processes and run them at machine speed, 24-hours a day. Headquarters Dark Light Cyber 1541 Ocean Avenue Santa Monica, California 90401 Tel: +1 (509) 940-1818 Executives John Shearer, Co-Founder and CEO of Dark Light Cyber, was previously Co-Founder and Board Member at Early X Foundation, and Founder of Powercast Corporation. History Dark Light Cyber was founded in 2014. This private company is headquartered in California. Key Competitors Jask Products and Services DarkLight is a cyber security analytics and automation platform. Driven by AI, it is a force multiplier which sits on top of existing security investments and leverages the reasoning, knowledge, and experience of security analytics to deliver human-quality results, at scale. The three major benefits include the force-multiplier, which enhances human analyst’s reasoning. It captures knowledge and reasoning for retention by the enterprise, and intelligently fuses data from disparate sources for analysis. Website https://www.darklightcyber.com/
DarkMatter
Darktrace
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Managed Security Services, VAR/Security Solutions Brief Overview DarkMatter provides a range of professional and managed security services and solutions. Headquarters DarkMatter Level 15, Aldar HQ Abu Dhabi, United Arab Emirates Tel: +971 2 417 1417 Executives Faisal Al Bannai serves as Chief Executive Officer of DarkMatter. He has over twenty years experience in regional technology and start-ups. He was founder of Axiom Telecom. History Headquartered in UAE, the company also has presence in Canada. Key Competitors PA Consulting Group, Accenture Products and Services DarkMatter provides consulting and managed security services and solutions that can be grouped as follows: • Governance, Risk, and Compliance • Cyber Network Defense • Managed Security Services • Secure Communications • Infrastructure and System Integration • Smart Solutions Website https://www.darkmatter.ae/
(Alpha Version 0.1 – 06/18/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Darktrace provides a platform that uses behavioral anomalies to detect cyber attacks in the enterprise. Headquarters Darktrace Platinum Building St John’s Innovation Park Cambridge, CB4 0DS Tel: +44 (0) 1223 394 100 Executives Nicole Eagan serves as Chief Executive Officer of Darktrace. She was previously with Peregrine, Quest, and Verity. History Darktrace is a UK-based company, backed by Mike Lynch of Invoke Capital in 2013. The company immediately began its focus on the use of Bayesian theory to detect behavioral anomalies in systems. It includes several members of the UK government, many with deep mathematical backgrounds. The company remains privately backed. Darktrace raised $18M in venture funding in 2015 from Invoke Capital, Talis Capital, and Hoxton Ventures. Darktrace has locations in London, Cambridge, San Francisco, and Singapore. Key Competitors Fortscale Products and Services The Darktrace solution applies Bayesian mathematics and behavioral analysis to enterprise security in order to avoid using signatures to detect attacks. The overall approach focuses on anomalies in human and machine behavior to detect suspicious events. Darktrace offers a software-only, appliance, or “as-a-service” Behavioral Cyber Defense (BCD) platform that identifies attacks in real time by learning normal and abnormal behavior across humans and machines in order to spot anomalies. The platform uses Bayesian mathematics, which enables real time detection of behavioral changes. The platform also includes a Darktrace Threat Visualizer (DTV) interface for drill-down and analysis. The underlying platform engine is called Secure Adaptive Behavioral Real-time Engine (SABRE). Website https://www.darktrace.com/
Dashlane
Datablink
(Alpha Version 0.1 – 08/02/17 – No Vendor Approval) TAG Cyber Controls Password/Privilege Management, Identity and Access Management. Brief Overview Dashlane makes identity and payments simple and secure everywhere, with its password manager and secure digital wallet. Headquarters Dashlane 156 5th Avenue #504 New York, New York 10010 Executives Emmanuel Schalit, CEO of Dashlane, was previously CEO of CBS Outdoor France, SVP and CSO at Activision Blizzard, and the founder and CEO of Flipside.com. History Dashlane was founded in 2009 by Alexis Fogel and Jean Guillou. This private company has received $52.5M in funding and is headquartered in New York City. Key Competitors LastPass, AgileBits, Roboform Products and Services Dashlane offers a simple and secure was to manage passwords. The platform can generate unique passwords to protect your accounts and identity, secure passwords on your device, where only you have access to them, and have Dashlane enter them for you on every website. Website https://www.dashlane.com/
(Alpha Version 0.1 – 06/18/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Datablink provides advanced authentication for protecting Web-based and financial transactions. Headquarters Datablink 7921 Jones Branch Drive, Suite #101 McLean, Virginia 22102 Executives Alexandre Cagnoni serves as CEO of Datablink. Roberto Correa serves as Board Member of Datablink. He was previously head of retail for Itau Corretora de Valores S/A in Brazil. History Founded in 2014, Datablink merged with Brazil-based BRToken that same year. The company is headquartered in Virginia. Key Competitors RSA Products and Services Datablink provides a small handheld tool called Datablink Device 200 that is held in front of a blinking image on a screen to obtain a challenge number, which can be entered to obtain a response. The device must be physically present and can be used to support advanced authentication for transaction including transaction signing. The technique reduces the threat of transaction and on-line fraud. Website https://www.datablink.com/
Data Devices International
DataEndure
(Alpha Version 0.1 – 06/18/17 – No Vendor Approval) TAG Cyber Controls (Alpha Version 0.1 – 06/18/17 – No Vendor Approval) Governance, Risk, and Compliance, Security Consulting TAG Cyber Controls Brief Overview Data Destruction DataEndure provides a portfolio of security, compliance, and archiving solutions for protecting business sensitive Brief Overview Data Devices International provides a range of degaussers and information. data destruction products for physical media. Headquarters DataEndure Corporate Office Headquarters 1960 Zanker Road B10 Data Devices International San Jose, California 95112 2600 Mission Street, Suite 100 Tel: (408) 734 – 3339 San Marino, California 91108 Tel: (626) 799 – 6545 Executives Kurt Klein, CEO of DataEndure, bought Computer Media Executives Technologies in 1984 for $1M. David Partridge serves as President of Data Devices International. History CMT began in 1984 as a family business under Mark Klein History The small company has been in business for forty years and is selling reel tapes and diskettes. After a long history evolving its business focus as the tape business shrunk, Kurt Klein located seven miles from downtown Los Angeles. joined his father’s company to help drive the evolution. The Generational Equity acquired Data Devices International in company now has a focus in email security, compliance, and 2014. related business. It is headquartered in Santa Clara, California with an office in Bellevue, Washington. The company changed Key Competitors its name to DataEndure in 2016. Iron Mountain Key Competitors Products and Services Elemental, janusNET Data Devices International’s product suite includes many different models of degaussing equipment with varying Products and Services degrees of size, capability, and cost. The company also offers shredders and physical media destruction tools for a range of DataEndure offers security, compliance, and archiving solutions with focus in the following areas: media including optical. The company’s products are NSA approved for classified data and are available under GSA • Cloud Computing schedules. • Infrastructure • Data Protection Website • Business Continuity https://www.datadev.com/ • Collaboration and Messaging • Security, Compliance and Archiving • Networking • Global Logistics In each area of focus, DataEndure offers managed solutions that drive productivity and innovation for its customers. Partners of the company include Symantec, NetApp, and Cisco. Website https://www.dataendure.com/
Dataguise
DataLocker
(Alpha Version 0.1 – 06/18/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Dataguise provides discovery, protection, compliance, and related solutions for securing information in Big Data repositories. Headquarters Dataguise Inc. 2201 Walnut Avenue #260 Fremont, California 94538 Tel: (877) 632 – 0522 Executives Manmeet Singh, Co-Founder and CEO of Dataguise, held previous positions with Oracle, Zeneb, Miri Technologies, and HCL. History Manmeet Singh and Adrian Booth co-founded Dataguise in 2007. The company has received Series A and B funding from private investors (including Herb Madan) and Toba Capital. The Series B round in 2013, led by Toba Capital, resulted in $13M in funding. Headquartered in Fremont, the company has offices in Punjab and New Delhi. Key Competitors Sqrrl Products and Services Dataguise’s security product solutions an be grouped as follows: • DGSecure – Provides one solution for detecting sensitive data in Hadoop, DBMSs, SharePoint, and files with a choice of masking, encryption, or quarantine. The solution includes a control center console for centralized policy management, data detection, and remediation. • DG for Hadoop – Involves protections that embed into Hadoop deployments by leveraging existing APIs and features. • DG for DBMS – Supports masking for Oracle, Microsoft SQL Server, DB2, and Postgres on Linux and Windows. • DG for SharePoint – Allows corporate policies to be enforced on data stored in SharePoint. • DG for Files – Detects and protects files that reside on file systems The Dataguise product suite is effective in supporting compliance needs for PCI DSS, HIPAA, and other frameworks. Website https://www.dataguise.com/
(Alpha Version 0.1 – 06/18/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Data Leakage Prevention Brief Overview DataLocker provides encryption solutions to protect USB drives, files, and other computing resources. Headquarters DataLocker 7007 College Boulevard Suite 240 Overland Park, Kansas 66211 Executives Jay Kim, Founder and CEO of DataLocker, was director of QMD International. History DataLocker, headquartered in Kansas with offices in Seoul and the UK, acquired BlockMaster in 2015 and IronKey in 2016. Key Acquisitions IronKey EMS (2016) – Enterprise Management Systems BlockMaster (2015) – USB Security Key Competitors Secudrive Products and Services DataLocker offers the following data security products: • Encrypted Storage – Includes a range of encrypted flash and hard drives, with many different form factors. • Encryption Gateway – Includes SafeCrypt cloud encryption gateway • Central Management – Includes IronKey access enterprise, enterprise management, and SafeConsole encryption management. Website https://www.datalocker.com/
Datapipe
Data Security Inc.
(Alpha Version 0.1 – 06/18/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services Brief Overview Datapipe offers a range of managed, hosting, and cloud services, including managed security, compliance, and resale services. Headquarters Datapipe Corporate Offices 10 Exchange Place Jersey City, New Jersey 07302 Tel: (201) 792 – 4847 Executives Robb Allen, Founder and CEO of Datapipe, is an entrepreneur who has built successful companies in real estate and technology. History Robb Allen founded Datapipe in 1996. Goldman Sachs provided $75M in private equity funding in 2008; GE Capital, CIT Group, CapitalSource, Caterpillar, Brown Brothers Harriman, ABRY Partners, and TD Securities provided $176M in equity and debt funding in 2011; and $236.4M in private equity funding was obtained in 2013. The company delivers services from Jersey City, New Jersey, San Jose, London, Hong Kong, and Shanghai. Key Acquisitions DualSpark (2015) – Cloud computing Adapt (2016) - Cloud Key Competitors Trustwave Products and Services Datapipe’s manage security and compliance-related offerings include the following: • Managed Security – This includes continuous audit, data encryption, DDOS protection solutions, event management, firewall and VPN services, intrusion detection services, malware protection, patch management, two-factor authentication, vulnerability assessment (leveraging Rapid7’s NeXpose solution), and Web application firewall. • Compliance – Includes support for HIPAA, PCI DSS, and SOX compliance solutions for the enterprise. Datapipe technology security partners include Alert Logic, Cisco, CloudPassage, FireMon, HPE, IBM, Imperva, Microsoft, Rapid7, Symantec, and Tripwire. Website https://www.datapipe.com/
(Alpha Version 0.1 – 06/18/17 – No Vendor Approval) TAG Cyber Controls Data Destruction Brief Overview Data Security provides products for securely erasing and destroying data stored on hardware media. Headquarters Data Security Inc. 300 S. 7th Street Lincoln, Nebraska 8508 Tel: (800) 225 – 7554 Executives Brian Boles serves as CEO of Data Security Inc. History Founded in 1985, Data Security is an American-owned manufacturing company located in Lincoln, Nebraska. Key Competitors Iron Mountain Products and Services Data Security provides new and refurbished degaussers that erase tapes, hard drives, with varying degrees of compactness and environmental use (including hostile). The company also manufactures data destruction devices that destroy hard drives and disintegrate solid state. All Data Security products have been evaluated by the National Security Agency for use with classified information in Federal Government applications. Website https://www.datasecurity.com/
Datashield (Alpha Version 0.1 – 06/18/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Datashield provides a range of security consulting, professional services and managed services with emphasis on RSA/EMC products. Headquarters Datashield 455 E. 200 S, Suite 100 Salt Lake City, Utah 84111 Tel: (855) 328 – 2744 Executives Michael Malone serves as CEO of Datashield. Mark Webb is CTO of Datashield. History Datashield Consulting was founded in 2009 and is located in Park City, Utah. Key Competitors SecurityMetrics Products and Services Datashield offers a range of security consulting services including security assessment, on-site residencies, health checks, and data protection. The company provides pre and post-sales support of RSA/EMC products, and also offers a range of security technology solutions including fraud management, security risk management, secure remote access and collaboration, IT compliance, audit management and other services. Datashield also offers managed services including the following: • Datashield Protect Services – leverages Datashield’s Quality Management Systems to optimize a customer’s use of security technology. • enVision – Includes SIEM and threat management capabilities. • Data Loss Prevention – Includes a portfolio of DLP solutions. Website https://www.datashieldprotect.com/
DataSunrise Database Security (Alpha Version 0.1 – 08/02/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Application Security, Network Monitoring Brief Overview DataSunrise offers a a variety of data security products. Headquarters DataSunrise Database Security Seattle, Washington Tel: (206) 420-6611 Executives Boris Tamarkin, Founder and CEO of DataSunrise Database Security, was previously CEO at WisdomForce. History DataSunrise was founded in 2015. This private company is headquartered in Washington. Key Competitors Imperva, HexaTier Products and Services DataSunrise Data-Centric security software protects sensitive data in real-time in the cloud or on premises. The platform includes data auditing and database activity monitoring. Realtime dynamic data masking to protect and mask data from unauthorized requests. Detection and prevention of SQL injections. Static masking to create a fully functional protected copy of production data. Discovery of sensitive data. Website https://www.datasunrise.com/
Day Zero Security
DBAPPSecurity
(Alpha Version 0.1 – 06/18/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Day Zero Security provides a range of security services and solutions for customers ranging from residential users to police services. Headquarters Day Zero Security Limited 36 Grassy Green Lane Audley, Stoke on Trent Staffs, ST7 9AB United Kingdom Tel: +44 01782 720229 Executives Richard Bennison serves as Director of Day Zero Security. History Day Zero Security was formed in 2005 and incorporated as a Limited Company in 2006. The company has a client portfolio that includes local government, police and fire services, universities, and private business. Key Competitors Secudrive Products and Services Day Zero Security offers a range of different security-related services including the following: • Professional Services • SafeXS encrypted USB sticks • Devicelock USB Security • McAfee SAAS – Includes resale of McAfee email and Web protection • AppAssure Backup and Recovery • Deepnet ID services Website https://www.dayzerosecurity.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Application Security, Database Security, Web Application Firewall Brief Overview DBAPPSecurity provides Web application and database security technology solutions Headquarters DBAPPSecurity Ltd. 44169 Fremont Boulevard Fremont, California 94538 Tel: (510) 516 – 0870 APAC Asia 15F Zhongcai Building #68 Tonghe Road, Binjiang District Hangzhou, 310051, China Executives Frank Fan, Founder, President, and CEO of DBAPPSecurity, spent seven years prior working in the area of security in Silicon Valley. History Frank Fan founded DBAPPSecurity in 2007 in Fremont, California. The company has grown to support offices in Hong Kong, Shanghai, and Beijing, reporting 50% year-over-year revenue growth since 2009. The company is an OWASP Global Partner. Key Competitors WhiteHat Security Products and Services DBAPPSecurity’s Web application and database security products include the following: • DAS-DBScan – Identifies security vulnerabilities in databases such as Informix, Oracle, MSSQL, DB2, MYSQL, Sybase, and Access. • DAS-WebScan – Assesses the security of Web applications for injection attacks, XSS, information leakage, malicious code, form bypass, and buffer overflow. • DAS-Pentest – Provides semi-automatic attack simulation to uncover security issues in targeted systems. The company also offers a range of services including Web application firewall security services, penetration testing, database security, and security consulting. Website https://www.dbappsecurity.com/
DB Networks
Dedrone
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Database Security, Intrusion Detection/Prevention Brief Overview DB Networks provides technology solutions to database security issues for organizations. Headquarters DB Networks 15015 Avenue of Science Suite 150 San Diego, California 92128 Tel: (800) 598 – 0450 Executives Brett Helm, Chairman and CEO of DB Networks, was previously Chairman and CEO of Cordiant, which was acquired by BMC Software. History Founded in 2009, DB Networks received $4.5M in Series B funding from Khosla Ventures in 2013. The small private company is headquartered in Carlsbad, California. Grotech Ventures led a 2014 round of Series C funding in the amount of $17M. Key Competitors DBAPPSecurity Products and Services DB Networks product offerings include: • DBN-6300 – Offers database security through deep protocol analysis operating at the database tier directly in front of the database servers. • Layer 7 Database Sensor – Designed to be integrated with SIEMs, breach detection systems, and threat intelligence systems for full spectrum visibility. Website https://www.dbnetworks.com/
(Alpha Version 0.1 – 08/02/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence Brief Overview Dedrone develops drone detection technology with automated, software-based aeriel intrusion. Headquarters DeDrone 1099 Folsom Street San Francisco, Califronia 94103 Executives Jorg Lamprecht, Co-Founder and CEO of Dedrone, previously founded ONLY Solutions, Cobion, and Aibotix. History Dedrone was founded in 2014 and has received $27.9M in funding. This private company is headquartered in California. Key Competitors Drone Detector, Drone Shield Products and Services DroneTracker is a platform the provides a complete airspace monitoring and management solution through a convenient browser-based interface. It allows users to configure multiple sensors, active and passive countermeasures, and alerts for continuous operation. Website https://www.dedrone.com/
Deep Identity
Deep Instinct
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Deep Identity provides a comprehensive identity audit and compliance solution for enterprise customers. Headquarters Deep Identity Pte Ltd. 140 Paya Lebar Road, AZ @ Paya Lebar, #08-26, Singapore 408564 Tel: (65) 6848 7325 Executives Siva Belasamy serves as CEO of Deep Identity. History VR Ganti founded Deep Identity in 2009 and served as CEO until 2013. The company is headquartered in Singapore and serves the Asia Pacific region. The company has offices in Chennai, India and London. Deep Identity raised $470K in funding in 2014 from Get2volume with co-funding from Singapore National Research Foundation. Key Competitors SailPoint, RSA Aveksa, Oracle Products and Services Deep Identity offers its Identity Audit and Compliance Manager (IACM) product solutions for attestation, compliance, and workflow that provides a layered approach to identity audit. Specific features and capabilities include automatic detection and notification of violations, automatic user and role attestation, automatic compliance management, workflow, risk scoring, reporting, and analytics. Deep Identity also offers services through a range of technology, consulting, and service provider partners. Website https://www.deepidentity.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Intrusion Detection/Prevention Brief Overview Deep Instinct provides intrusion detection solutions for endpoints and mobile using deep learning. Headquarters Deep Instinct 501 Folsom Street Suite 400 San Francisco, California 94105 Tel: (855) 522 – 2223 Executives Guy Caspi serves as CEO of Deep Instinct. He was previously with the Israel Defense Forces. History Founded in 2014 in Tel Aviv, the company maintains presence in San Francisco and Tel Aviv. Investors include Blumberg Capital and UST Global. Key Competitors Cylance Products and Services Deep Instinct provides real-time advanced persistent threat (APT) detection on mobiles and endpoints. The solution is connectionless and works on any device or OS. The solution involves a lightweight agent that utilizes technology from the company’s D-Brain (deep learning component), D-Appliance (device and endpoint management including updates), and DClient (on-device scanning for proactive attack detection). Website https://www.deepinstinct.com/
Deepnet Security
DeepNines
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Deepnet Security provides multi-factor authentication and identity and access management solutions. Headquarters Deepnet Security Building 3 North London Business Park London N11 1GN United Kingdom Tel: +44 20 3740 5310 US Contact – Tel: (855) 333 – 7638 Executives Yurong Lin is Founder and CEO of Deepnet Security. History Founded in 2005, the private company is headquartered in London, with offices in Europe, North America, South America, and Asia. Deepnet Security also operates through an extensive list of value added partners. Key Competitors Duo Security Products and Services Deepnet Security offers a range of multi-factor authentication and identity and access management solutions grouped as follows: • DualShield – Consists of a unified authentication platform delivering multi-factor security • DualFence – Involves a wireless network access control (NAC) with multi-factor authentication • DualTrust – Provides a secure, Web access platform with secure browsing and two-factor authentication. • CryptoKey – Involves a secure USB flash drive to protect stored data with hardware encryption and authentication. Website https://www.deepnetsecurity.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Web Security Brief Overview DeepNines provides a suite of integrated network and Web security products and services. Headquarters DeepNines Technologies 4800 Quorum Drive Suite 480 Dallas, Texas 75254 Tel: (972) 590 – 9690 Executives Sue Dark, Founder and CEO of DeepNines, has thirty years experience directing both start-up and mature stage companies. After leaving the company, she returned as CEO and President in 2012. History Sue Dark founded DeepNines in 1999. The company received Venture Round funding from Altitude Capital Partners in 2007. The company won a lawsuit against McAfee for infringement of intrusion detection patents held by DeepNines. Key Competitors Fortinet, Blue Coat Products and Services DeepNines’ integrated security solutions offerings can be grouped as follows: • Internet Security Assessment – Involves a professional network evaluation of threats, applications, and other issues, usually in a simple, one-week process. • Network Admission Control – DeepNines NAC provides agentless inspection of devices at network join time for policy enforcement. • Secure Web Gateway – Integrates real-time protections around application firewall, intrusion prevention, AntiVirus, and content filtering functionality. • Network Security Manager – This includes SIEM-like functions in a centralized management platform. • Network Application Monitor – Provides real-time network data collection and visibility. • iTrust Remote Agent – Provides endpoint security through a trusted agent. DeepNines has eight patents and roughly forty patent applications through early 2014, all in the areas of unified threat management and network security. Website https://www.deepnines.com/
Deep-Secure
Defence Intelligence
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform, Data Leakage Prevention, Secure File Sharing Brief Overview Deep-Secure provides a cyber security guard solution for organizations to securely share information across their network boundary. Headquarters Deep-Secure 1 Nimrod House Sandy’s Road Malvern WR14 1JJ United Kingdom Tel: +44 (0) 1684 892831 Executives Dan Turner, CEO of Deep-Secure, was previously with Hewlett-Packard. History Deep-Secure was formed in 2009 through a management buyin of Clearswift Specialist Products. The buy-in was supported by venture capitalist YFM through an all-equity investment. The company is located in Malvern in the UK’s Cyber Valley and is a member of the Malvern Cyber Security cluster. DeepSecure received $5.6M in one round from two investors. Key Competitors Fortinet Products and Services Deep-Secure offers a suite of security products that can be grouped as follows: • Mail Guard – Offers, anti-malware, DLP, and other protections for email • Web Guard – Offers security for Web traffic • Network Management Guard – Filters network management traffic • XML Guard – XML security gateway • TransGap Applications – Provides a means for sharing information across air gapped networks • Minerva One-Way Guard – One-way filter • MODOBUS Guard – Controls information flow from industrial, SCADA, and plant equipment • Chat Guard – Filters chat • File Transfer Guard – Filter for file transfer • Managed Secure Email – A managed service for secure email • X.400 MTA – Message Transfer Agent for native X.400 applications • Transshipment - Security solution that extracts designated business information Website https://www.deep-secure.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management Brief Overview Defence Intelligence (Defintel) combines global threat data, research partnerships, analysis and tools to provide advanced malware solutions for customers. Headquarters Defence Intelligence 180 Preston Street, Third Floor Ottawa, Ontario Canada K1R 7P9 Executives Keith Murphy, CEO of Defence Intelligence since 2011, was previously founder and president of non-profit One Dollar Nation. History Christopher Davis, former director of threat analysis for Damballa, founded Defence Intelligence in 2008. The company became known for detecting the Mariposa botnet and then participating in its dismantling. The small private company is headquartered in Ottawa. Key Competitors FireEye Products and Services Defence Intelligence offers the following advanced malware protection services: • Harbinger Network Risk Assessment – Involves a global health check for an enterprise network with focus on risk of compromise due to malicious host communications, software activity, and end user usage patterns. • Nemesis Advanced Malware Protection– Involves in-thecloud, real time protection from botnets, APTs, and malware using analysis of DNS cluster queries. The DNS services can be used to break connections to malware site locations. • Clarity Network Insight and Policy Manager – Involves an insight into network and user traffic, with information on where traffic is going and how to take control. Website https://www.defintel.com/
DefenseStorm
DefiniSec
(Alpha Version 0.1 – 08/03/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection, Cloud Security Brief Overview DefenseStorm is a security data platform that watches everything on your network and matches it to your policies. Headquarters DefenseStorm 710 Second Avenue #310 Seattle Wahington 98104 Tel: (206) 512 - 8691 Executives Sean Feeney, CEO of DefenseStorm, was previously CEO of GT Nexus. History DefenseStorm was founded in 2014 and has received $11.4M in funding. This private company is headquartered in Washington. Key Competitors Seculert Products and Services DefenseStorm offers a platform that unifies your ground and cloud logs into a single place of manage cybersecurity data. It aggregates event data across all cybersecurity tools and links policies to real-time alerts, so that financial institutions can prove to regulators they are both secure and compliant with evolving FFIEC cybersecurity requirements. Website https://www.defensestorm.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing, Endpoint Security Brief Overview DefiniSec provides data security and advanced access controls for protecting and sharing sensitive data and content. Headquarters DefiniSec San Francisco, California 94530 Tel: (415) 529 - 5225 Executives John Poffenbarger serves as Founder and CEO of DefiniSec. He was previously with Network Associates and eEye Digital Security. History Founded in 2014 by John Poffenbarger, the company operates out of the San Francisco Bay area. Key Competitors HPE, IBM Products and Services DefiniSec offers a range of data security products for secure access, protection, and sharing. Solutions include the following: • :Access – Strict access control using two-factor authentication • :Confidential – File system level data protection solution • :Collaboration – Supports sharing of protected information via SharePoint, email, network files shares, and cloud services • :Recover – Stores protected files • :xRecovery – Disaster recovery option • KODiAC Cloud Services – Uses the cloud to enhance data security • :Assess – Retains audit records Website https://www.definisec.com/
Déjà vu Security
Delfigo
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Déjà vu Security provides information security research and consulting services for enterprise customers. Headquarters Déjà vu Security 1415 10th Avenue, Suite #1 Seattle, Washington 98122 Tel: (855) 333 – 5288 Executives Akshay Agarwal, Chief Operating Officer of Déjà vu Security, was previously director of Microsoft’s Information Security and Risk Management Group. History Akshay Agarwal, Michael Eddington, and Adam Cechetti cofounded in 2011. The small, private company is headquartered in Seattle. Key Competitors NCC Group Products and Services The services offered by Déjà vu Security can be grouped as follows: • Application Security – Tests for flaws in Web applications, cloud services, drivers, operating systems, desktop and mobile apps, and control/management systems. • Embedded Device Security – Checks for security flaws in embedded devices for medical, avionics, automotive, SCADA, and payment systems applications. • Security Fuzz Testing – Uses the company’s Peach Fuzzer platform to fuzz test Web applications, cloud services, files, protocols, and other targets. Website https://www.dejavusecurity.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Delfigo provides intelligent authentication solutions including multi-factor for mobile devices. Headquarters Delfigo 280 Summer Street, Mezz. Boston, Massachusetts 02210 Tel: (617) 946 – 0600 Executives Ralph Rodriquez, Founder, Chief Innovation Officer, and CEO of Delfigo Security was previously SVP at Aberdeen Group. He is also currently a Fellow at the Harvard-MIT Division of Health Sciences and Technology. History Ralph Rodriguez founded the company in 2008 based on eight year of research at MIT Media Lab. The basic invention was the creation of a software-based token for secure second factor access using biorhythms. The small company is headquartered in Boston with R&D located at MIT in Cambridge. Stage 1 Ventures provided Series A funding of $1.5M. Key Competitors RSA Products and Services Delfigo Security provides its solutions offerings via the DSGateway Platform. This incudes the DSGateway SoMoCloud mobile authentication platform which evaluates eleven individual identity attributes to assign a risk score or Confidence Factor. The company also offers the DSGateway Versatile Authentication Platform that uses multiple authentication factors including keystroke and device identification. For this solution, twenty-two different individual identity factors can be used to assign a Confidence Factor. The platform supports open standards and Web services such as SOAP, WS-Security, SAML, XML, and protocols such as Radius, LDAP, TACACS, and SAML. The solution is cloud-ready for services based on technologies such as Citrix. Services for discovery, implementation, and training are also available. Website https://www.delfigosecurity.com
Dell
Deloitte
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Unified Threat Management, Web Application Firewall, Endpoint Security, Password/Privilege Management, Security Information Event Management, Threat Intelligence, Identity and Access Management Brief Overview Dell offers a range of computer and technology products and services including data and network security solutions. Headquarters Dell Corporate Headquarters, One Dell Way Round Rock, Texas 78682 Executives Michael Dell serves as Founder and CEO of Dell. John McLurg serves as CSO of Dell. History Michael Dell founded the company in 1984. The company went public in 1988 and debuted on the Fortune 500 in 1992, making Michael Dell the youngest CEO on the list at the time. The company continued to grow through the 90’s and 00’s gaining market share and expanding its product line. Michael Dell resigned as CEO in 2004, but as PC sales began to diminish in 2005, Dells business began to slow. Michael Dell resumed as CEO in 2007, making changes to Dell’s business model toward a 2013 buyout, taking the company private. Key Acquisitions Credant (2012), Kace (2010) MessageOne (2008), Quest/eDMZ (2012) SecureWorks (2011), SonicWALL (2012), EMC (2015) Key Competitors IBM Products and Services In addition to its computer and technology products and services, Dell offers a range of data and network security products and services that can be grouped as follows: • Data Solutions – Data Protection | Encryption, Dell Data Protection | Security Tools, Dell Data Protection | Protected Workspace, and Dell AppAssure. • Endpoint Solutions –Dell KACE Management Appliance, KACE Deployment Appliance, KACE Mobile Management Appliance, and Dell PocketCloud. • User Identity – Dell Quest IAM • Network Security – Dell SonicWALL, E-Class NSA Series, TZ Series UTM, Clean Wireless Series, Dell SonicWALL Aventail E-Class Secure Remote Access (SRA), and Dell SonicWALL Secure Remote Access. Website https://www.dell.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Governance, Risk, and Compliance, PCI DSS/Compliance, Managed Security Services Brief Overview Deloitte is a professional services company that focuses on audit, finance, tax, and consulting, including enterprise risk and compliance services. Headquarters Deloitte – National Office 30 Rockefeller Plaza New York City, New York Tel: (212) 492 – 4000 Executives Cathy Engelbert serves as CEO of Deloitte LLP. Michael Fucci serves as Chairman of the Board of Deloitte. History Founded by William Deloitte in 1845 in London, the firm has grown through the decades to roughly 200K employees operating around the world. The company is one of the Big Four accounting firms. Key Acquisitions Vigilant (2013) – Managed Security Services Day1 Solutions [2017] – Security Consulting Key Competitors Accenture, IBM Products and Services As part of Deloitte’s global professional services consultancy, the company offers services in the area of audit and enterprise risk, where a risk intelligent approach is taken to help clients manage risk including cyber security. The company also offers solutions in the area of governance, risk, and compliance (GRC), where security compliance support solutions are included in the services offered to enterprise customers. Deloitte also offers a Cyber Intelligence Centre in the UK where cyber threat intelligence, vulnerability management, and cyber incident response services are offered. Website https://www.deloitte.com/
Delta ID
Delta Risk
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Delta ID provides biometric authentication based on iris recognition software for mobile and PC device security. Headquarters Delta ID Inc. 35475 Dumbarton Court Suite #B Newark, California Tel: (510) 244 – 3725 Executives Salil Prabhakar, CEO of Delta ID, was previously Director of Engineering and Chief Scientist with Digital Persona. History Founded in 2011, the company is headquartered in California. Intel Capital provided $5M in Venture Funding 2014. Key Competitors BI2 Technologies, Daon Products and Services The Delta ID Active IRIS Technology supports mobile consumer authentication using patented iris recognition, biometrics software. The solution is available for all phone/PC OS platforms and utilizes the infrared LED and infrared camera on a smart device. Active IRIS is available for developers as a software library. Website https://www.deltaid.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Governance, Risk, and Compliance, Information Assurance Brief Overview Delta Risk provides strategic advice, cyber security consulting, and risk management solutions to government and business clients. Headquarters Delta Risk 106 St. Mary’s Street, Suite 428 San Antonio, Texas 78205 Tel: (210) 293 – 0707 Executives Scott Kain serves as CEO of Delta Risk. He is former President of Cyveillance. History Robert Schmidt, Gregory Rattray, and Chris Fogle co-founded Delta Risk in 2007. The small, private company is headquartered in San Antonio with an office in Washington, DC. Key Competitors Chertoff Group Products and Services The security professional services provided by Delta Risk include security consulting, security exercises, security education, security training, security assessments, and security incident response consultations. The company partners with Booz Allen Hamilton, the Software Engineering Institute, and the Internet Corporation of Assigned Names and Numbers (ICANN) to support a variety of cyber defense solutions to large customers in the financial services, Federal services, international, and corporate sectors. Website https://www.delta-risk.net/
Delphiis Now RiskSonar by CynergisTek
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview RiskSonar provides an IT security application and services suite for enterprise customers, including risk management as a service. Headquarters CynergisTek, Inc. 11410 Jollyville Road Suite 2201 Austin, Texas 78759 Tel: (512) 402-8550 Executives Mac McMillan is CEO & Co-Founder of CynergisTek Chris Rogers became CEO of Delphiis in 2012, stepping down in 2014. Mike Gentile, Founder and CTO of Delphiis, was head of Coastline Consulting, where he developed enterprise security programs. History Founded in 2011, the small company is a pioneer in risk management as a service, and is headquartered in San Clemente, California. Managed printing company, Auxilio, acquired Delphiis in 2014. Key Competitors Trustwave Products and Services RiskSonar offers a suite of application and services solutions in the area of IT security that can be grouped as follows: • Application Suite – Consists of applications designed to help organizations manage their IT security assessments and risks. Includes the Sonar GRC tool. • Managed Services – Includes services for compliance, risk management, and security. Managed GRC is included, and is available as an SaaS. Managed security testing is also included. • Professional Services – Includes security program governance, identity and access management strategy, security roadmap development, information security risk management, risk assessment, and regulatory compliance. Website https://www.cynergistek.com/
Denim Group (Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Application Security, Security Training Brief Overview Denim Group provides secure software capabilities, including application development, assessment, training, and consulting. Headquarters Denim Group 1354 North Loop, 1604 E. Suite 110 San Antonio, Texas 78232 Tel: (210) 572 – 4400 Executives Sheridan Chambers, Principal, was previously President of BrandDefense. Dan Cornell, Principal, was previously CTO of BrandDefense. John Dickson, Principal, was previously with the Air Force and SecureLogix. History Sheridan Chambers and Dan Cornell founded Denim Group in 2001. The small private company employs about 100 people as of 2014, with headquarters in San Antonio, Texas, with an office in Austin, Texas. Key Competitors Cigital Products and Services The Denim Group’s secure software solutions can be grouped as follows: • Application Development – Includes full development services for ground-up design and construction of secure applications • Security Assessments – Includes black box, code reviews, penetration testing, mobile app security assessments, and PCI compliance. • Training – Includes ThreadStrong (self-paced eLearning) as well as classroom training for secure software development. • Consulting – Includes SDLC consulting and remediation strategy consulting. Website https://www.denimgroup.com/
Denver Cyber Security
DenyAll
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Denver Cyber Security provides IT security services for customers based on partnerships with Solutionary and Wombat. Headquarters Denver Cyber Security 8100 E. Union Avenue, Suite 2008 Denver, Colorado 80237 Tel: (303) 997 – 5506 Executives Ray Hutchins, Founder and President of Denver Cyber Security, is also Executive Board Member of the Denver Chapter of the Information Systems Security Association. History Ray Hutchins established Denver Cyber Security and merged the company with Denver Web Services in 2012. He serves as President of both entities. The company is headquartered in Denver and provides solutions for companies throughout the state of Colorado and beyond. Key Competitors Azorian Cyber Security, Optiv Products and Services Denver Cyber Security offers security services for clients, primarily in Colorado, in the following areas: • Policy Development • Assessments • Vulnerability Testing • Penetration Testing • Mitigation • Website Defense • Security Awareness Training • Vendor Assessment and Management • Cyber Insurance • Online Identity Management • Network Monitoring The company also provides enterprise managed security services through resale partnership with Solutionary, as well as security awareness training through resale partnership with Wombat. Website https://www.denvercybersecurity.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Web Application Firewall Brief Overview DenyAll provides enterprise CIOs and CISOs with Web application security and vulnerability management solutions. Headquarters DenyAll Headquarters 6 avenue de la Cristallerie 92310 Sevres France Tel: +33 1 46 20 96 00 Executives Jacques Sebag, CEO of DenyAll since 2012, has held executive positions with Oracle, Remedy, Veritas, Symantec, and Ever Team. History Founded in 2001 as a spin-off of leading French bank Societe Generale, DenyAll was one of the early companies providing Web Application Firewall (WAF) products. The company has received funding from Truffle Capital and Omnes Capital. Headquartered in France, the company maintains an office in Frankfurt. Key Competitors Barracuda, Imperva Products and Services DenyAll’s enterprise security products can be grouped as follows: • DenyAll Detect: This family of vulnerability management tools includes the Edge Tester, Vulnerability Manager, and Auditor products. Each of these products assists in providing detection of vulnerabilities with comprehensive views, full reporting, and actionable reporting. • DenyAll Protect – This family of Web Application Firewalls (WAFs) secure business applications against a variety of attacks. Specific WAF products include sProxy, rXML, rWeb, and rWeb + Client Shield. DenyAll Protect WAF products are available as appliances or as software, with support for Amazon Web Services. • DenyAll Manage – This includes the DenyAll Management Console and DenyAll Application Security Dashboard, which provide assistance in the deployment and administration of security. Website https://www.denyall.com/
Depth Security
Detectify
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Depth Security provides security consulting with focus on penetration testing, Web application security, and network access control. Headquarters Depth Security 4741 Central Street Suite 374 Kansas City, Missouri 64112 Tel: (888) 845 – 6042 Executives Gene Abramov serves as Co-Founder, Partner, and Principal Consultant at Depth Security. History Depth Security was co-founded by Gene Abramov and Mark Butler in 2006. The private company is headquartered in Kansas City. Key Competitors NCC Group Products and Services Depth Security offers security assessment and consulting services in the following areas: • Assessment Services – Includes penetration testing, Web application assessment, vulnerability assessment, wireless security assessment, and active directory assessment. • Consulting Services – Includes network access control consulting and information security architecture and design. Depth Security maintains resale partnerships with HPE Tipping Point for Intrusion Prevention Services, Zscaler for Web Security, and Blue Coat for Web Proxy and Cache Services. Website https://www.depthsecurity.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management Brief Overview Detectify provides a SaaS capability for analyzing and reporting on the security vulnerabilities of a Website. Headquarters Detectify AB Malavarvsbacken 8 117 33 Stockholm Sweden Executives Rickard Carlsson, CEO of Detectify, holds a master’s degree in engineering physics and mathematics from Linkoping University. History Founded in 2012 and headquartered in Sweden, the company has received $1.7M in funding from InVenture, Paua Ventures, and other investors. Detectify is listed as a public company. Key Competitors Qualys, Acunetix, Tinfoil Security Products and Services Detectify provides a SaaS-based Web scanner that analyzes Websites for security status. The analysis leads to a report on potential vulnerabilities on the target site. The scan is performed in seven stages: Information gathering, crawling, information analysis, fingerprinting, exploitation, synchronous exploitation, and finalization. Reports are encrypted and provided securely to customers. The company has also taken advantage of corporate bug bounty programs for revenue as well. Website https://www.detectify.com/
Deutsche Telekom (Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, Security Consulting, CA/PKI Solutions, Infrastructure Security Brief Overview Deutsche Telekom is a German telecommunications provider offering a range of managed and network-based security services. The company also offers mobile security capabilities as part of its T-Mobile wireless offerings, as well as cyber security through its T Systems unit. Headquarters Deutsche Telekom AG Friedrich-Ebert-Allee 140 53113 Bonn Germany T Systems USA Frankfurt, Germany Executives Timotheus Hottges serves as CEO of Deutsche Telekom. John Legere serves as CEO of T Mobile in the US. Reinhard Clemens serves as CEO of T Systems. History The company was established in 1996 and has grown to a 230,00 global telecommunications service provider operating in 50 countries with roughly $60B in revenue (2013). Key Acquisitions Systemhaus (2000) Key Competitors AT&T, Verizon, Vodafone Products and Services Deutsche Telekom offers managed security services for its customers in the following areas: • Managed Network Security – Includes managed firewall, IDS/IPS, and related DMZ functions. • Monitoring 24/7 – Includes cyber intelligence services with managed SIEM and honey pot capability. • Incident Management – Based on the Deutsche Telekom Computer Emergency Response Team (CERT). • Managed Endpoint Security – Includes a partnership with Lookout for mobile security. • Professional Services – Includes security architecture and related consultation for customers. Website https://www.telekom.com/
Device Authority (Alpha Version 0.1 – 06/21/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication, ICS/IoT Security, Hardware/Embedded Security Brief Overview Device Authority provides authentication and access solutions for embedded IoT devices. Headquarters Device Authority 39300 Civic Center Drive, Suite 180 Fremont, California 94538 [emailprotected] Executives Darron Antill serves as CEO of Device Authority. He was previously CEO of AppSense. Talbot Hardy serves as CTO of Device Authority. History The private company is headquartered in Fremont, California. Device Authority merged with Cryptosoft and operates the joint entity as Device Authority. Key Acquisitions Cryptosoft (2016) – IoT Security Key Competitors RSA Products and Services The Device Authority platform, formerly the Cryptosoft platform, provides solutions for secure IoT and M2M that can be grouped as follows: • Authentication – Only authorized devices gain access to applications • Data Protection – IoT and M2M data is protected using session-specific and one-time use identification and encryption keys The platform offers simplified device provisioning, devicebased access protection, and dynamic data protection. Website https://www.deviceauthority.com/
DeviceLock
DigiCert
(Alpha Version 0.1 – 06/21/17– No Vendor Approval) TAG Cyber Controls Endpoint Security, Data Leakage Prevention Brief Overview DeviceLock provides endpoint device and port control and data leak prevention (DLP) software for customers. Headquarters DeviceLock Inc. Headquarters 3130 Crow Canyon Place Suite 215 San Ramon, California 94583 Tel: (925) 231 – 4400 Executives Vitaly Shipitsin, Co-Founder and CEO of DeviceLock, was previously involved in the development and growth of “Stels,” which is an importer of high-end designer furniture and cabinetry from European countries. History Ashot Oganesyan created the first freeware version of DeviceLock in 1995. The company was established in 1996, and has grown to include offices in Vancouver, Canada; Ratingen, Germany; Milan, Italy; Moscow, Russia; and London, UK. Key Competitors McAfee , Symantec, RSA Products and Services The DeviceLock endpoint DLP suite consists of three primary components: • DeviceLock – Provides network administrators with ability to set and enforce policies for how data can be handled on company laptops or desktops via device such as phones, cameras, USB sticks, and so on. • NetworkLock – Adds contextual control of user network communications via the Internet through email, Webmail, messaging, social networks, Web usage, and cloud service usage. • ContentLock – Adds ability to look inside files, email, blog posts, and other data objects for sensitive information such as social security numbers, credit card numbers, and other user-definable information. Website https://www.devicelock.com/
(Alpha Version 0.1 – 06/21/17– No Vendor Approval) TAG Cyber Controls CA/PKI Solutions Brief Overview DigiCert is a provider of X.509 SSL cryptographic certificates for Websites and developers. Headquarters DigiCert Inc. Corporate Office 2801 North Thanksgiving Way Suite 500 Lehi, Utah 84043 Tel: (800) 896 – 7973 Executives John Merrill, CEO of DigiCert since 2016, was previously COO of DigiCert. History DigiCert was founded in 2003. The small, private company is a founding member of the CA/Browser Forum, as well as participating in the Extended Validation Certificate. Key Competitors Comodo, Symantec Products and Services DigiCert provides a range of digital certificates and SSL management tools. The company groups its offerings into SSL Certificates, including standard, extended validation, unified communication, multi-domain, and entire domain, and also Code Signing Certificates, including support for both code and document signing. The company does not offer low assurance, domain-validated SSL certificates. Like most CA/PKI companies, DigiCert provides support for IoT. Website https://www.digicert.com/
Digital Defense
Digital Guardian
(Alpha Version 0.1 – 06/21/17– No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Digital Defense Inc. (DDI) provides a range of managed and on-demand SaaS risk assessment solutions, as well as security professional services. Headquarters Digital Defense Inc. 9000 Tesoro Drive, Suite 100 San Antonio, Texas 78217 Tel: (888) 273 – 1412 Executives Larry Hurtado, CEO of Digital Defense, was previously cofounder and president of Elastic Networks. History Digital Defense was founded in 1999. The small private company, headquartered in San Antonio, Texas, has grown to support companies in over 65 countries. Key Competitors TrustWave Products and Services The security products and services offered by Digital Defense Inc. include the following: • Managed SaaS Solutions – Consists of cloud-based managed security solutions for vulnerability lifecycle management (VLM-Pro), remediation (RM-Pro), payment card industry support (PCI-Pro), and application security. • On-Demand SaaS Solutions – Includes automated vulnerability scanning and vulnerability lifecycle management in an on-demand, non-managed cloud environment. • Security Risk Assessments – Includes enterprise risk assessment, ethical hacking, environmental assessments, Web application penetration testing, and Website compliance audits. • Security Awareness Education – Includes SecurED for employees, Training, Education, and Awareness Module (TEAM) using on-line learning management, and application development training. • Decisive Security Intelligence – Offers capability through the DDI Vulnerability Research Team (VRT) for proactive data mining. Website http://www.digitaldefense.com/
(Alpha Version 0.1 – 06/21/17– No Vendor Approval) TAG Cyber Controls Data Loss Prevention, Endpoint Security Brief Overview Digital Guardian provides a next generation data protection platform for data loss prevention, advanced threat protection, endpoint detection and response. Headquarters Digital Guardian 860 Winter Street, Suite 3 Waltham, Massachusetts 02451 Tel: (781) 788 – 8188 Executives Ken Levine, President and CEO of Digital Guardian, has over 20 years of security startup and business leadership. History Founded in 2003, Digital Guardian was formerly known as Verdasys. The company is headquartered in Massachusetts with international offices in the UK, Japan and India. Brookline Venture Partners, Fairhaven Capital Partners, GE Pension Trust, LLR Partners and Toronto Dominion Bank Group have provided $125M in venture funding through Series B, C, and Venture rounds between 2004 and 2014. The company acquired Code Green Networks in 2015. Key Acquisitions Savant Protection (2015) – Application Whitelisting Code Green Networks (2015) – Discovery DLP, Network DLP, Cloud DLP Key Competitors Carbon Black, Forcepoint, Intel McAfee, Symantec Products and Services The Digital Guardian next-generation data protection platform is purpose built to stop data theft with the following capabilities: • Discover and protection sensitive data throughout the data lifecycle and across the enterprise • Protect sensitive data on the network, at the endpoint, in the cloud, and on mobile devices • Provide automated context-based and finger-print-based classification • Provide flexible deployment options including a managed security option Website https://www.digitalguardian.com/
Digital Resolve
Digital Scepter
(Alpha Version 0.1 – 06/21/17– No Vendor Approval) TAG Cyber Controls Web Fraud Prevention Brief Overview Digital Resolve provides solutions for on-line fraud detection and prevention through identity verification. Headquarters Digital Resolve 155 Technology Parkway Suite 800 Norcross, Georgia 30092 Tel: (877) 201 – 3593 Executives Bill Calpin serves as President and CEO of Digital Envoy, which includes two business units, Digital Resolve and Digital Element. History Digital Envoy is a division of Dominion Enterprises of Norfolk. The company includes two units called Digital Resolve, which focuses on ant-fraud, and Digital Element, which focuses on IP data collection for marketing, search, and related applications. Key Competitors ThreatMetrix Products and Services Digital Resolve provides anti-fraud solutions based on its Fraud Analyst platform. Specific solution areas include the following: • Online Behavior Monitoring – User traffic monitored for account, transaction, and customer-related fraud. • Login Authentication – Uses behaviors to match login characteristics to observed activity. • Identity Verification – Manages account opening • Research and Reporting Tools – GUI-based analysis tools Website https://www.digitalresolve.com/
(Alpha Version 0.1 – 06/21/17– No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Digital Scepter provides cyber security solutions with emphasis on next-generation firewalls, endpoint security, and Web application security. Headquarters Digital Scepter 18100 Von Karman Avenue Suite 850 Irvine, California 92612 Tel: (951) 294 – 5330 Executives Jon Robinson, CEO of Digital Scepter since 2007, was previously an executive with Secure Content Solutions. History Digital Scepter was established in 2007. The small private company is headquartered in Irvine, California. Key Competitors GuidePoint Security, Optiv Products and Services DigitalScepter provides information security consulting and resale services for enterprise customers in the following areas: • Palo Alto Networks Health Check • Web Application Vulnerability Assessment • Log Monitoring and Device • Compliance (Gaps, Penetration Testing) • Assessment (Internal, External) • Application Visibility Assessment • Splunk Deployment • SQL Server Database Security and Performance Tuning • Tivoli Endpoint Security (BigFix) The company has resale agreements with several major cyber security vendors including Palo Alto Networks, Zscaler, Tanium, Solutionary, and Trend Micro. Website https://www.digitalscepter.com/
Digital Shadows
Digivera
(Alpha Version 0.1 – 06/21/17– No Vendor Approval) TAG Cyber Controls Threat Intelligence Brief Overview Digital Shadows provides a range of cyber threat intelligence services including information and cyber situational awareness about online exposures. Headquarters Digital Shadows 332 Pine Street, Suite 600 San Francisco, CA 94104 Tel: (888) 889 - 4143 Executives Alastair Paterson serves as CEO of Dark Shadows. History Launched in 2011, Digital Shadows in headquartered in London. Passion Capital, Storm Ventures, and Ten Eleven Ventures provided $8M in venture funding through Seed and Series A rounds between 2012 and 2015. Key Competitors iSIGHT Partners (FireEye) Products and Services Digital Shadows provides a range of cyber threat intelligence services that can be grouped as follows: • Digital Shadows SearchLight – Provides awareness about online exposures to defend against cyber attacks • VIP Protect – Detects safety and security of key employees based on information about online material • CBEST/STAR Threat Intelligence – Identifies technical characteristics of potential attacks Website https://www.digitalshadows.com/
(Alpha Version 0.1 – 06/21/17– No Vendor Approval) TAG Cyber Controls VAR Security Solutions, Security Consulting Brief Overview Digivera provides information security, managed services, and technology consulting services. Headquarters Digivera 2033 Gateway Place, 5th Floor San Jose, California 95110 Tel: (408) 216 – 7799 Executives Gilbert Almazan, President and CEO of Digivera, was previously vice president of sales and marketing at Gallant. History The small company has headquarters in San Jose with regional offices in San Antonio and Mexico City. Key Competitors BG2 Products and Services Digivera offers a range of security professional service solutions including the following: • DVTrust – Involves expert staffing of security technology and solutions advisors • DVAudit – Involves a range of cyber security vulnerability assessment services • DVAssure – Consists of PCI DSS, HIPAA, SOX, and related compliance services • DVShore – Provides local, near shore, and offshore services in USA, Mexico, Argentina, and India. • DVLearn – Includes on-demand training and security certification services for customers. Website https://www.digivera.com/
Direct Recruiters
DirectRM
(Alpha Version 0.1 – 06/21/17– No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Direct Recruiters offers a range of search and recruiting services including focus in IT security. Headquarters Direct Recruiters 31300 Solon Road Suite #4 Solon, Ohio 44139 Tel: (440) 248 – 3370 Executives Dan Charney serves as President and CEO. History Founded by Shel Myeroff, the company is located in Ohio. Key Competitors Egon Zehnder Products and Services Direct Recruiters offers a range of different client and hiring company practice areas including IT security. Position focus areas in IT security from Direct Recruiters range from executive level opportunities such as CISO, to subject matter experts in various disciplines. Website https://www.directrecruiters.com/
(Alpha Version 0.1 – 06/21/17– No Vendor Approval) TAG Cyber Controls Two-Factor Authentication, Identity and Access Management Brief Overview DirectRM provides strong authentication and access management solutions supporting BYOD. Headquarters DirectRM 65 Enterprise Aliso Viejo, California 92656 Tel: (949) 330 – 6730 [emailprotected] Executives Bernard Ta serves as CEO. Previously held senior management roles at Ingram Micro. History Founded in 2010, the company was formed to support release of Direct Authenticator. Key Competitors RSA Products and Services DirectRM provides a range of software-defined security solutions in point-of-sale, ATM transactions, BYOD, and Internet business. In the cyber security area, the company provides identity protection and access management solutions with its Direct Authenticator solution, which includes two-factor authentication and counter measures to prevent identity theft. In addition, the company provides a secure access management solution with emphasis on supporting BYOD initiatives. Website https://www.directrm.com/
Dispersive Technologies Disrupt6 (Alpha Version 0.1 – 06/22/17– No Vendor Approval) TAG Cyber Controls Routing Security Brief Overview Dispersive Technologies provides a virtualized network routing solution that increases security for data at rest or in motion. Headquarters Dispersive Technologies 2555 Westside Parkway #500 Alpharetta, Georgia 30004 Executives Richard E Harrison serves as President and CEO of Dispersive Technologies. He joined in 2013 as its CFO. History Founded in 2010, the small private company is headquartered in Alpharetta. Key Competitors Cisco, Juniper Products and Services The company provides virtualized routing solutions resulting in a software-defined network with many benefits including speed and security. The Dispersive Technologies solution is called Dispersive Virtualized Networks. The approach divides packet data into smaller independent packet streams optimized for time delay and line quality. The resulting solution avoids congestion and defeats man-in-the-middle techniques. The virtual approach is touted as being a superior solution to man-in-the-middle avoidance than encryption. Website https://www.dispersivetechnologies.com/
(Alpha Version 0.1 – 06/22/17– No Vendor Approval) TAG Cyber Controls Threat Intelligence Brief Overview Disrupt6 provides threat intelligence based on a subscription feed or from data collected on a deployed sensor network. Headquarters Disrupt6 673 Potomoc Station Drive Suite 616 Leesburg, Virginia 20176 Tel: (571) 348 – 3686 [emailprotected] Executives Joseph Klein serves as CEO of Disrupt6. He also serves as Director of Infrastructure for ISSA Northern Virginia. History Joseph Klein founded Disrupt6 in 2015. The company is affiliated with the Mach37 accelerator. Key Competitors FireEye Products and Services Disrupt6 is a start-up cyber security company providing cyber threat intelligence using its Trace Analyze Predict (TAP) platform. The platform views and addresses all technology layers in order to produce real-time threat intelligence. Specifically, Disrupt6 offers a Threat Intelligence Feed for subscription as well as a Sensor Defense Network, which involves a set of deployed agents. Website https://www.disrupt6.com/
Distil
DMX Technologies
(Alpha Version 0.1 – 06/22/17– No Vendor Approval) TAG Cyber Controls Web Security, Threat Intelligence Brief Overview Distil Networks protects Websites from botnets, scraping, data mining, and other fraudulent attacks. Headquarters Distil Networks 100 Montgomery Street Suite 1900 San Francisco, CA 94104 Tel: (415) 423 – 0831 Executives Rami Essaid, Co-Founder and CEO of Distil Networks, was previously head of Chit Chat Communications, and also worked for Neustar. History Rami Essaid, Engin Akyol, Andrew Stein, and Sean Harmer founded Distil Networks in 2011. The small private company received $1.8M in seed funding in 2013 from Cloud Power Capital, ff Venture Capital, IDEA Fund Partners, and Techstars. Additional $10M of Series A funding came in 2014 from IDEA Fund Partners, ff Venture Capital, Millitello Capital, Bullet Time Ventures, and Foundry Group. The company raised a Series B round of $21M in 2015 from Bessemer Venture Partners, Investors Foundry, TechStars, ff Venture Capital, Idea Fund, and Correlation Ventures. Key Acquisitions Senor (2016) – Managed and Consulting Services Are You A Human [2017] Key Competitors WhiteOps Products and Services Distil Networks offers Website customers protection via the following product capabilities: • Bot Detection – Immediately identifies and blocks bot threats based on behavioral learning • Theft Bots – Eliminates content theft by isolating bot traffic and preventing content redistribution • Fraud Bots – Stops form Spam to maintain cleaner databases and present better marketing results • Content Acceleration – Operates via a content distribution network over 16 global locations • Private Cloud – Allows on-site usage if local policies prohibit use of public clouds. The company also offers threat intelligence and API security solutions. Website https://www.distilnetworks.com/
(Alpha Version 0.1 – 06/22/17– No Vendor Approval) TAG Cyber Controls Managed Security Services, Security Consulting Brief Overview In addition to its digital media, ICT, mobile SaaS, and managed services, DMX Technologies offers a range of managed security solutions and consulting services. Headquarters DMX Technologies Group Limited Flat B, 9/F, World Tech Center, 95 How Ming Street, Kwun Tong, Kowloon, Hong Kong Tel: +852 2520 2660 Executives Emmy Wu serves as Executive chairman of DMX Technologies. Iwao Oishi serves as CEO and Vice Chairman. History DMX was founded in 1999 and listed in Singapore in 2002. It was promoted to the main board in 2004. The company serves growing regional markets in China, Hong Kong, India, Indonesia, Korea, Macau, Malaysia, Singapore, and Vietnam. The public company reported $359M revenue in 2013. Key Competitors AhnLab Products and Services DMX Technologies offers its Vision TV, Vision CEP, and Vision TA Software platforms to cable TV operators and is active in the China Content Broadcasting Network. Mobile Solution Services are also an important growth area. In the area of cyber security, DMX offers the following: • ICT Security – Includes a full suite of cyber defense technologies and services including content, identity and access management, network access control, secure information and event management (SIEM), and Web application security. • Vantage Managed Security Services – Includes 24/7 security operations from Hong Kong, Shanghai, and India. • Security Risk Assessment and Audit Services – Includes professional services to reduce risk and increase operational security. Website https://www.dmxtechnologies.com/
DomainTools
Dome9
(Alpha Version 0.1 – 06/22/17– No Vendor Approval) TAG Cyber Controls Threat Intelligence, Infrastructure Security, Brand Protection Brief Overview DomainTools provides a range of domain, network, and monitoring tools for look-up, research, investigation, and threat intelligence. Headquarters DomainTools 2101 4th Avenue Suite 1105 Seattle, Washington 98121 Tel: (206) 838 – 9020 Executives Timothy Chen, CEO of DomainTools since 2009, was previously Vice President of Corporate Development at Thought Convergence Inc. (TCI). History The original company was founded in 2002 by Jay Westerdal and then sold to Thought Convergence Inc. (TCI). DomainTools was spun off from TCI in 2009. The small, private company is headquartered in Seattle. Key Competitors Nominum Products and Services DomainTools provides a range of research and lookup products for investigative support that can be grouped as follows: • Domain Research – Includes whois, domain search, reverse whois, whois history, screenshots, domain marketplace, and domain report. • Network Research – Includes IP whois, reverse IP lookup, reverse NS lookup, reverse IP whois, reverse MX, and hosting history. • Monitoring – Includes brand monitor, registrant monitor, name server monitor, IP monitor, and domain monitor. • Enterprise-Scale Data – Includes reverse whois IRM, APIs, custom data feeds, and other services from DomainTools Labs. Website https://www.domaintools.com/
(Alpha Version 0.1 – 06/22/17– No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview Dome9 provides a cloud security service focused on server firewalls, Amazon Web Service (AWS) security, cloud network logging, and file integrity monitoring. Headquarters 701 Villa Street Mountain View, California 94041 Tel: [877] 959-6889 Dome9 Israel R&D Center 18 Raoul Wallenberg Street D building Tel Aviv, 6971915 Executives Zohar Alon, Co-Founder and CEO of Dome9 Security, held a previous position at Check Point Software, where he built Provider-1. History Zohar Alon and Roy Feintuch co-founded Dome9 in 2010. Opus Capital, JAL Ventures, Lazarus Israel Opportunities, ORR Parters, and Pinnacle provide funding for the small privately held company. As of mid-2016, Dome9 has received $12.8M in three rounds from five investors through Series B. Key Competitors CipherCloud, CloudPassage Products and Services Dome9 offers a cloud based SaaS firewall management service that automates security policy management for cloud, dedicated, and virtual private servers (VPS). Additional features include control of AWS EC2 and VPC Security Groups, as well as OpenStack, CloudStack, and VMware vCloud-based public and private clouds. Specific Dome9 products include: • Dome9 SecOps for AWS – Focuses on securing and managing policy for large-scaled EC2 and VPC deployments. • Dome9 Clarity – Provides visualization of AWS security. Website https://www.dome9.com/
DOSarrest
D-Risq
(Alpha Version 0.1 – 06/22/17– No Vendor Approval) TAG Cyber Controls DDOS Security Brief Overview DOSarrest provides a cloud-based solution for defending Websites from DDOS attacks. Headquarters DOSarrest 186-8120 No. 2 Road, Suite 302 Richmond BC V7C 5J8 Canada Executives Mark Teolis, CEO of DOSarrest, was previously co-founder of Peer1 Hosting, as well as a specialist at AT&T Canada. History Founded in 2007, the privately held company is headquartered in Canada with presence in the US, Singapore, and the UK. Key Competitors Akamai (Prolexic) Products and Services DOSarrest provides a cloud-based solution for defending Websites from DDOS attacks. Features embedded in the solution include the following: • 24/7 Manned NOC • 24/7 Network Engineering Team • Multiple 10Gbps Upstream Connections • Website Caching • Traffic Cleaning Nodes (Geographically Dispersed) Solutions offered include service provider options, vulnerability testing, virtual Webserver support, WAFs, and mobile app support. Website https://www.dosarrest.com/
(Alpha Version 0.1 – 06/22/17– No Vendor Approval) TAG Cyber Controls Application Security Brief Overview D-Risq provides automated formal analysis tools to improve the correctness of software. Headquarters D-Risq Limited Malvern Hills Science Park Geraldine Road Malvern Worcestershire, United Kingdom WR13 6PL Tel: +44(0)1684 252452 Executives Nick Tudor serves as Business Director of D-Risq. History D-Risq, a small company founded in 2011 located in the Malvern Hills in the West of England, was a winner of the UK’s Discovering Start-Ups 2012 sponsored by Cambridge Wireless and Silicon South West. The principals have backgrounds in mathematics, engineering, and computer science. Key Competitors Galois Products and Services D-Risq provides a range of formal verification products and services grouped as follows: • Consultancy – The company provides experts who can assist customers in the application and use of D-Risq verification tools. • Software Tools – Includes formal methods-based solutions implemented as CLawZ, which produces a model of the software system in the Z language with tools for verification, and Modelworks, which produces a model of the software in Communicating Sequential Processes (CSPm) with tools for verification. Website https://www.drisq.com/
Druva
Dr.Web
(Alpha Version 0.1 – 06/22/17– No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Druva provides endpoint protection and data governance solutions for enterprise customers. Headquarters Druva Corporate Headquarters 150 Mathilda Place, Suite 450 Sunnyvale, California 94086 Tel: (800) 248 – 4976 Executives Jaspreet Singh, Founder and CEO of Druva, History Jaspreet Singh, Ramani Kothandaraman, and Milind Borate (veterans of Veritas) co-founded Druva in 2008. The company is headquartered in Sunnyvale with offices in the UK, India, and Singapore. Sequoia Capital India and IAN provided $5M in Series A funding in 2010. Sequoia and Nexus provided $12M in Series B funding in 2011. Sequoia Capital, Nexus Venture Partners, and Tenaya Capital provided $25M in Series C funding in 2013. Key Competitors Crashplan, Symantec Products and Services Druva’s inSync endpoint protection product is built on the company’s nCube architecture and provides the following capabilities: • Endpoint Backup – Cloud-based backup to Amazon Web Services for endpoints including mobiles with two-factor authentication for access. • Data Loss Prevention – Provides policy-based filtering for mobiles and endpoints. • Secure File Sharing – inSync Share provides visibility into file sharing capabilities • Data Governance – Provides governance support for data management for endpoints in the enterprise. Website https://www.druva.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools Brief Overview Dr.Web provides Anti-Virus protection tools and services for a global customer base. Headquarters Dr.Web Ltd. 125040, Russia, Moscow, 3d street Yamskogo polya 2-12A Tel: +7 (495) 789– 45-87 Executives Boris Sharov serves as CEO of Dr.Web. Igor Daniloff serves as CTO of Dr.Web. History Igor Daniloff, current CTO of Dr.Web, founded the company in 2003 based on an existing Dr.Web tool that had been developed in 1992. The Russian company employs over 400 staff and is headquartered in Saint Petersburg, Russia with offices in Kazakhstan, Ukraine, Germany, France, Japan, and China. Key Competitors Kaspersky Labs Products and Services Dr.Web’s Anti-Virus software suite is available for consumers and business customers in a variety of different product and service bundles for most popular operating systems including Linux, Mac OS X, Windows, DOS, OS/2, Windows Mobile, and Android. Specific products supported include the following: • Dr.Web CureIt! • Dr.Web LiveCD • Dr.Web LinkChecker • Dr.Web Light for Mac • Dr.Web for Android Light Website https://www.drweb.com/
Dtex Systems
D3 Security
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Security Analytics Brief Overview Dtex Systems provides a platform for using behavioral analytic patters as the basis for detecting endpoint security threats. Headquarters Dtex Systems 300 Santana Row, Suite 400 San Jose, California 95128 Tel: (408) 418 – 3786 Executives Christy Wyatt serves, CEO of Dtex Systems., was previously CEO and President of Good Technology. History Dtex Systems, now headquartered in Silicon Valley, was launched in Australia in 2000. The company has locations in the UK, South Africa, Malaysia, Indonesia, and Argentina. The company closed on $15M in Series A funding in 2015 from Norwest Partners and Wing Ventures. Key Competitors Exabeam, Tanium Products and Services Dtex Systems offers an endpoint agent that provides deep visibility into behavior. The solution uses behavioral patterns based on threat intelligence and heuristics about malware activity. Specific focus is on detection of stolen intellectual property, failed security controls, accidental misuse, malicious employees, off-network risky behavior, fraud, and embezzlement. Dtex offers and complements DLP functionality with active mitigation and filtering of exfiltration activity. The endpoint agent can be deployed using a variety of software distribution mechanisms and includes connectors for SIEMs and various threat management feeds. Website https://www.dtexsystems.com/
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Incident Response Brief Overview D3 Security provides a platform for incident management and response software. Headquarters D3 Security Suite 1000 1090 West Georgia Street Vancouver, British Columbia V6E 4V2 Canada Tel: (800) 608 – 0081 Executives Gordon Benoit, Founder and President of D3 Security, was previously founder of RDI. History Founded in 2002 by Gordon Benoit, the company is headquartered in Vancouver. Key Competitors Resilient Products and Services D3 Security offers a platform for incident management with support for physical attacks, incidents and situations. Specific capabilities include the following: • Incident reporting software • Intelligent workflows • Analysis and trending tools • Case management • Situational awareness The platform offers unique cross-departmental incident tracking for IT security and physical security teams to deal with security-related issues. Website https://www.d3security.com/
Duo Security
DynamiCode
(Alpha Version 1.0 – 08/24/17 – Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Duo Security provides a hosted two-factor authentication scheme for the enterprise, including support for mobile users. The company’s Trusted Access offering ensures that only authenticated users and trusted devices can access protected applications, using single sign-on. (OR) Duo Security verifies the identity of users and the hygiene of their devices before they connect to their allowed applications via single sign-on. Headquarters Duo Security 123 North Ashley Street, Suite 200 Ann Arbor, Michigan 48104 Tel: (866) 760 – 4247 Executives Duo Security cofounders Dug Song (CEO) and Jon Oberheide (CTO) were both previously executives with Arbor Networks. History Duo Security was founded in 2010 by Dug Song and Jon Oberheide. The Ann Arbor, Michigan-based company also has offices in San Mateo, California; Austin, Texas and London. Privately-held Duo has raised $49M in venture capital with backing from Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures. Key Competitors RSA, Symantec, SafeNet, Okta Products and Services • Duo Mobile multi-factor authentication (MFA): Adds a second layer of security to a user’s normal login process with a push authentication request to their Duo Mobile app or by using a U2F token or other medium.
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview DynamiCode provides strong authentication and secure mobile POS solutions for verifying identities and protecting assets. Headquarters DynamiCode Unit 302, Tower 1 Enterprise Square 9 Sheung Yuet Road Kowloon Bay, Hong Kong Executives Fan Dingguo serves as CEO of DynamiCode. History The company is headquartered in Hong Kong, with offices in Shanghai, China; Beijing China; Guangzhou, China; and Seoul, Korea. The company owns MiniNet, an eCommerce business application suite. Key Competitors RSA, Square Products and Services DynamiCode offers products and services in the following areas: • One-Time Password – Includes the K5 Classic OTP Token, K7 Key Fob OTP Token, K8 Challenge/Response OTP Token, M1 Software Token for Smartphone, S1 SMS On-Demand Token, Software Token for PC and Notebook, and Software Token for Browser. • Mobile POS – Includes mPos solution to enable business to accept payment or make payments with mobile credit processing capabilities. Website https://www.dynamicode.com/
•
Duo Access edition: Combines Single Sign-On (SSO) functionality with Duo’s two-factor authentication, as well as providing visibility into the security hygiene of the device so that access policies can be enforced for each SaaS application.
•
Duo Beyond: Expands on the implementation of Google’s BeyondCorp model for internal applications as well as SaaS. with access policies based on device information and health and the associated user. Duo Beyond helps identify trusted devices (such as managed ones) and regulates their access to critical applications.
Specific use-cases supported by Duo Security include protection for cloud, mobile and endpoint security, and adaptive authentication. Website https://www.duosecurity.com/
eAgency
Early Warning
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview eAgency provides mobile security products for consumers, business, and public safety officials. Headquarters eAgency 6 Upper Newport Plaza Newport Beach, California 92660 Tel: (949) 253 – 9131 Executives Robert Lotter, Founder, Chairman, and CEO of eAgency Inc, was previously an Ernst & Young Entrepreneur of the Year in 2000. History Robert Lotter founded eAgency in 2001. The private company is headquartered in Newport Beach, California. Key Competitors Lookout, Mocana Products and Services The mobile security suite offered by eAgency includes the following: • My Mobile Watchdog – Provides mobile parental controls including monitoring of text messages and pictures, Website blocking, time control, App blocking, GPS location tracking, and review of histories. • My Mobile Watchdog – SMB – Offers mobile controls for small business including control of data costs, location racking, Website blocking and monitoring, and text and photo monitoring. • Blackbox Mobile Security – Provides a hosted mobile security business compliance solution for BlackBerry, Android, and Windows Mobile. Includes information on compliance risk, application management, and data security. • Radar – Free version of the eAgency product for law enforcement agencies as a part of the Internet Crimes Against Children. • Nice Office Secure CRM – Integrated and encrypted Web and wireless CRA solution. Website https://www.eagency.com/
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication, Secure Exchange Brief Overview Early Warning provides a trusted payment exchange for financial institutions with authentication and support for compliance. Headquarters Early Warning Scottsdale, Arizona Executives Paul Finch serves as CEO of Early Warning. History Early Warning has been in operation dealing with bank fraud for twenty-five years. In 2015, Bank of America, BB&T, Capital One, JPMorgan Chase, U.S. Bank, and Wells Fargo combined the bank-owned digital payments network (clearXchange) with their fraud and authentication assets (Early Warning) into a secure, real-time payments network called Early Warning. Key Acquisitions clearXchange (2016) Authentify Key Competitors eFront, Beta Systems Products and Services Early Warning provides a trusted payment exchange for financial institutions. The exchange includes advanced authentication to increase trust, as well as support for regulatory compliance in the financial industry. The authentication solutions are categorized into identity solutions, behavioral biometrics, and the Authentify platform. Website https://www.earlywarning.com/
Earthlink
east-tec
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services Brief Overview Earthlink provides Internet services including security services for residential and business customers. Headquarters Earthlink Corporate Headquarters 1170 Peachtree Street Atlanta, Georgia 30309 Tel: (404) 815 – 0770 Executives Joseph Eazor serves as President and CEO of Earthlink. History Founded in 1994, Earthlink Holdings Corporation is a managed network and cloud services provider with over 3,000 employees servicing over a billion dollars in revenue (as of 2014). Key Competitors AT&T, Verizon, Comcast Products and Services Earthlink’s security-related offerings for business include the following: • Managed Security Services (including on-premise firewall) • Unified Secure Endpoint Services • Hosted Network Security The company also offers an Earthlink Protection Control Center for residential customers to include Anti-Virus, file scanning, spyware blocking, firewall, and related security services. Website https://www.earthlink.net/
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview east-tec offers encryption-based products that protect sensitive information by secure erasure and other means. Headquarters east-tec Str. Balogh Istvan Nr. 17 Oradea 410238 Romania European Union Tel: US and Canada (650) 241 2114 Executives Eugen Malita serves as Co-Founder and CEO of east-tec. History Horatiu Tanescu and Eugen Malita founded East Technologies in 1997 while still in high school. The company, renamed easttec, is headquartered in Oradea, Romania, with offices in Redwood City, California; Amsterdam, The Netherlands; and Bucharest, Romania. Key Competitors LSoft Technologies Products and Services The data privacy and security solutions offered by east-tec include the following: • east-tec Eraser – Securely erases Internet and computer activities and traces • east-tec InvisibleSecrets – Encrypts file contents, hides files and emails, and protects documents • east-tec DisposeSecure – Erases hard drive data from old computers for resale, donation, or removal. • east-tec SafeBit - Disk encryption software Website https://www.east-tec.com/
Easy Solutions
Echoworx
(Alpha Version 0.1 – 06/23/17 – Vendor Approval) TAG Cyber Controls Fraud intelligence, secure browsing, multi-factor authentication and transaction anomaly detection Brief Overview Easy Solutions is a security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Headquarters Easy Solutions 8550 NW 33 Street, Suite 101, Doral, FL 33122 Tel: (866) 524 - 4782 Executives Ricardo Villadiego, Founder and CEO of Easy Solutions, worked previously at IBM, Internet Security Systems, Trend Micro, and Unisys Corporation. History Easy Solutions was founded in 2007, and has received $23 M in venture funding from Medina Capital, a private equity firm. The company is headquartered in Miami, Florida, with offices in Atlanta, Georgia; Richmond, UK; Dubai, United Arab Emirates; Tokyo, Japan; Bogota, Colombia; Sao Paulo, Brazil; Buenos Aires, Argentina; San Jose, Costa Rica; Santiago, Chile; and Mexico. Key Competitors RSA, Nice Actimize, Trusteer Products and Services Easy Solutions offers a range of security products and services in the area of fraud protection, threat intelligence, safe browsing, strong authentication, anomaly detection, cloud authentication, and mobile anti-fraud. The solutions can be grouped specifically as follows: • Detect Monitoring Service (DMS) – Involves proactive cloud-based fraud detection and attack mitigation services using 24/7 monitoring by Easy Solution staff and constant monitoring of DNS, SSL, social media and other on-line forums. • Detect Safe Browsing (DSB) – Maintains control over end-user experience by integrating software into the end-user machine or mobile device with DMS for safe browsing and fraud intelligence. • DetectTA – Provides fraud prevention through qualification of transaction risk using behavioral deviation analysis. • DetectID – Provides an adaptable multi-factor authentication platform that supports transactional channels. • Easy Mobile Solutions – Includes multi-layered security for mobile via an SDK. • DMARC Compass – Allows customers to leverage the power of DMARC (Domain-Based Message Authentication, Reporting & Conformance) to gain visibility into all email flows, filter attacks and restore trust in email. Website https://www.easysol.net/
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls Email Security, Data Encryption Brief Overview Echoworx provides secure messaging, document delivery, and collaboration solutions for business customers. Headquarters Echoworx Headquarters 4101 Yonge Street, Suite 708 Toronto, Ontario Canada M2P 1N6 Tel: (800) 697 – 3246 Executives Michael Ginsberg, CEO of Echoworx, was previously CEO at CertaPay, which was purchased by Interac. History Founded in 2000, the private company is headquartered in Toronto, Ontario with offices in Atlanta, Georgia and London, England. Key Competitors Appriver, ZixCorp, Symantec, Proofpoint Products and Services Echoworx secure messaging, delivery, and collaboration products can be grouped as follows: • Gateway Encryption – Includes Echoworx OneWorld, which supports TLS, PGP, S/MIME, and other technologies, Echoworx Secure Document Delivery (SDD), which delivers statements via email to your customers, and Echoworx Encrypted Mail Gateway, which provides centralized, policy-based management of encryption. • Endpoint Encryption – Includes Echoworx Encrypted Email, which provides end-to-end encryption at the application level through an Outlook plugin. • Browser-Based Email Encryption – Includes Echoworx Encrypted Message Exchange, which uses a secure, Webbased portal to allow disparate organizations to work together and share confidential information. • Mobile Device Email Encryption – Include on-the-device Echoworx mobilEncrypt for iOS, Android, and BlackBerry. Website https://www.echoworx.com/
ECKey
EclecticIQ
(Alpha Version 0.1 – 06/23/17 – No Vendor Approval) (Alpha Version 0.1 – 06/23/17 – No Vendor Approval) TAG Cyber Controls TAG Cyber Controls Two-Factor Authentication Threat Intelligence Brief Overview Brief Overview ECKey provides solutions for turning Bluetooth smartphones EclecticIQ, formerly Intelworks, provides a threat into access control components. management platform for analysis and integration of multi source intelligence. Headquarters ECKey Headquarters 206A West James Street EclecticIQ Lancaster, Pennsylvania 17603 Leidsegracht 105, 1017 ND Amsterdam Executives The Netherlands Paul Bodell, President and CEO of ECKey, holds in MBA from Tel: +31 (0) 20 737 1063 the University of New Haven. Executives History Joep Gommers serves as Founder and CEO of EclecticIQ. Nick Willis founded ECKey in 2005. The small, private company is headquartered in Lancaster, Pennsylvania. History Co-founded by Joep Gommers and Raymon van der Velde in Key Competitors 2014, the company is headquartered in Amsterdam. The HID Global company changed its name from Intelworks to EclecticIQ in 2015. Products and Services ECKey Bluetooth smartphone access control products include Key Competitors the following: TruSTAR Products and Services • Bluetooth Proximity Readers – Consists of EK6 EclecticIQ provides a collaborative threat intelligence Proximity Readers with a read range of 30 feet, platform powered by open source standards STIX and TAXII convenient for garages, gates, and other doorways. to enable collaboration, consolidation analysis, and Includes smartphone apps for end-users, as well as integration of cyber security information from multiple support for non-smartphones. • VIZpin Hosted Management – Consists of a cloud-based sources. The tool is available as an on-premise or hosted solution. Features include feed management, enrichment of management system for visitor control with encrypted electronic keys that can last from 15 minutes to 10 years. external data, sharing with partners, collaboration support, intelligence insights, and integration with internal • Administrative Tools – Consists of tools and apps in environments. The platform is compatible with TAXII, STIX, support of the ECKey product. CyBox, MAEC, JSON, and CSV. Website Website https://www.eckey.com/ https://www.eclecticiq.com/
EdgeWave Security
E8 Security
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Email Security, Web Security Brief Overview EdgeWave provides a suite of security product solutions for network, email, Web, and cloud. Headquarters EdgeWave 4225 Executive Sq, Ste 1600 La Jolla, California 92037 Tel: (800) 782 – 3762 Executives Louis Ryan serves as CEO and President of EdgeWave. History EdgeWave was founded in 1995, currently has about 110 employees, and serves 6,500 customers through direct, partner, distributer, and OEM channels. EdgeWave raised $11M in venture funding in 2014 led by TVC Capital and including Square 1 Bank. Key Acquisitions Red Condor (2014) – Information security Key Competitors Blue Coat, Symantec, McAfee Products and Services EdgeWave’s security product portfolio can be grouped as follows: • EdgeWave ePrism Email Security – Consists of various email security products for security usage management, Spam and virus filtering, data loss prevention, encryption, continuity, archiving, and migration from products such as Postini. • EdgeWave iPrism Web Security – Consists of a set of Web-based security solutions including an advanced Web gateway, remote filtering, social protection, mobile security, mobile device management, and a secure browser solution. Website https://www.edgewave.com/
(Alpha Version 1.0 – 09/05/17 – Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview E8 Security provides a behavioral analytics platformcalled Fusion to support the detection of threats in the enterprise. Headquarters E8 Security 100 Marine Parkway, Suite 300 Redwood City, California 94065 Tel: (650) 265 - 7085 Executives Matt Jones serves as CEO of E8 Security. He was previously President and CEO of CloudShield, which was acquired by SAIC. History The company closed Series B funding round in 2016, led by Strategic Cyber Ventures, bringing total funding to date to $21.8 million. All three Series A investors – March Capital Partners, Allegis Capital, and The Hive – also participated in the round. Key Competitors Exabeam, Securonix Products and Services The E8 Security Fusion Platform provides a 360-degree view into the behavioral patterns of an organization and can consume data from multiple sources; including SIEM, log management, endpoint, user and network systems, in order to accurately identify behaviors that pose a potential or active risk. The platform automates threat prioritization based on risk, and provides visibility into malicious activity using machine learning, behavioral analytics and multi-dimensional modeling techniques. Website https://www.e8security.com/
Egon Zehnder
EgoSecure
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Egon Zehnder offers a range of executive search, recruiting, and consultation services for clients around the world. Headquarters Egon Zehnder International Ltd. Toblerstrasse 80 8044 Zurich Switzerland Tel: +41 44 267 69 9 Executives Rajeev Vasudeva and Damien O’Brien both serve as Chairman of Egon Zehnder. History Founded in 1964, Egon Zehnder is now the word’s largest privately held executive search firm. The company employs 400 consultants in 69 offices across 41 countries. It reported revenues of $692M in 2014. Key Competitors Heidrick & Struggles Products and Services EgonZehnder provides a wide range of executive search and recruiting services for clients. The company also offers advisory and consultation services. Egon Zehnder has a focus area in executive, board, and CEO search, with involvement in the cyber security community in recent years. Website https://www.egonzehnder.com/
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview EgoSecure provides data protection solutions based on encryption, control, filtering, and management. Headquarters EgoSecure Pforzheimer Str. 128a 76275 Ettlingen, Germany Executives Sergej Schlotthauer serves as CEO of EgoSecure. History The private company, originally cynapspro, was initiated with a device management tool in 2005, followed by years of new products. Natalya Kaspersky invested in the German company in 2011. EgoSecure acquired FinallySecure in 2014. Key Competitors Echoworx Products and Services EgoSecure provides a data protection solution that utilizes the following protection modules: • Audit • Control • Filter • Encryption • Management EgoSecure protects the data regardless of whether it is stored in the cloud, on servers, or on endpoints. Website https://www.egosecure.com/
802 Secure
eIQ Networks
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Wireless Security Brief Overview 802 Secure provides wireless security through solutions that combine software defined radios with Big Data analytics. Headquarters 802 Secure 4847 Hopyard Rd Suite 4385 Livermore, California 94551 Tel: (888) 725 – 9434 Executives Garry Drummond serves as Founder and CEO of 802 Secure. He formerly served as Sales Director for Air Defense and nCircle. History Founded by Garry Drummond in 2014, the company is headquartered in Silicon Valley. Key Competitors Air Defense Products and Services 802 Secure provides a wireless risk audit tool called WRAT that utilizes software-defined radios to detect RF wireless attack vectors. The solution is designed to prevent RF leakage by identifying exposure states. The solution is cloud-based to continuously audit the RF spectrum, offering centralized wireless threat intelligence, proactive audit of existing security controls, detection of zero-day attacks, and critical path support for exposure reporting. Website https://www.802secure.com/
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Security Information Event Management Brief Overview eIQ provides a platform called SecureVue that offers nextgeneration SIEM and log management capabilities toward real-time security intelligence management and situational awareness. Headquarters eIQ Networks, Inc. 60 State Street Boston, Massachusetts 02109 (617) 337 - 4880 Executives Vijay Basani, Founder, CEO and President of eIQ Networks, was previously founder of AppIQ, which was acquired by HP. History Vijay Basani and Jay Reddy founded eIQ networks in 2001. The company has since grown, but remains privately held. The company netted $9.5M in Series C funding in 2016 from Arrowroot Capital. This adds to previous rounds led by Venrock. Key Competitors AlienVault, HPE ArcSight Products and Services eIQ manages enterprise log and network security information using next-generation SIEM platform capabilities. The purpose of such advanced security management is to derive intelligence toward actionable enterprise decisions. The essence of such an intelligence-based environment for the enterprise is real-time situation awareness. eIQ products focus on simplified security intelligence and can be grouped as follows: • SecureVue NGS – This platform provides nextgeneration SIEM, log management, intelligent security search, file integrity monitoring, and other automated security control monitoring. The platform includes a security-monitoring component called ThreatVue that automates many security intelligence tasks in accordance with SANS recommended controls. • SecureVue USA – This platform provides automated security situational awareness capability for protection and compliance. It includes security search functionality as well as integration capabilities across a heterogeneous environment. eIQ focuses on several target market environments including heavy emphasis on supporting US Federal Government customers including DoD and civilian agencies. Website https://www.eiqnetworks.com/
Elastic
ElcomSoft
(Alpha Version 0.1 – 08/04/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview Elastic builds software to make data usable in real time and at scale for search logging, security, and analytics use cases. Headquarters Elastic 800 West El Camino Real, Suite 350 Mountain View, California 94040 Tel: +1 650 458 2620 Europe Rijnsburgstraat 9-11 1059 AT, Amsterdam Tel: +31 20 794 7300 Executives Shay Banon, Founder and CEO of Elastic, is the Software Developer and creator of Elasticsearch. History Elastic was founded in 2012 by Shay Banon. Elastic has achieved more than 100 million downloads and is used by top organizations including Cisco, eBay, Dell, Goldman Sachs, Microsoft, Netflix, The New York Times, Uber, Verizon, Yelp, and Wikipedia. Elastic has more the $104M in funding from Benchmark Capital, Index Ventures, and NEA. Key Competitors Splunk, Products and Services Elastic offers The Open Source Elastic Stack, that can reliably and securely take data from any source, in any format, and search, analyze, and visualize it in real time. • Kibana – gives shape to the data and is the user interface for configuring and managing all aspects of the Elastic Stack • Elasticsearch – a distributed, JSON-based search and analytics engine designed for horizontal scalability, maximum reliability, and easy management. • Beats – a platform for lightweight shippers that send data from edge machines to Logstash and Elasticsearch. • Logstash – a dynamic data collection pipeline with an extensible plugin ecosystem and strong Elasticsearch interaction. Website https://www.elastic.co/
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics Brief Overview ElcomSoft provides a range of digital forensic, corporate security, and IT audit products for tasks such as password recovery. Headquarters ElcomSoft Co. Ltd. Bolshaya Serpukhovskaya 44, office 19 Moscow, 115093 Russian Federation [emailprotected] Executives Vladimir Katalov serves as CEO of ElcomSoft. History The private company was founded in 1990 and is headquartered in Russia. It received notoriety in 2014 when hackers apparently used the ElcomSoft Phone Password Breaker tool to steal inappropriate photos of celebrities from Apple’s iCloud service. Key Competitors Guidance Software Products and Services ElcomSoft provides a suite of forensic, security, and audit tools that can be grouped as follows: • ElcomSoft Corporate and Forensic Solutions – Includes Password Recovery Bundle, iOS Forensic Toolkit, Phone Password Breaker, Wireless Security Auditor, BlackBerry Backup Explorer, and Forensic Disk Decryptor. • ElcomSoft Password Recovery Software – Includes Distributed Password Recovery, Advanced Office Password Recovery, Advanced PDF Password Recovery, Advanced Archive Password Recovery, Advanced Office Password Breaker, Internet Password Breaker, Advanced SQL Password Recovery, Advanced Intuit Password Recovery, Advanced Sage Password Recovery, Advanced IM Password Recovery, Advanced Lotus Password Recovery, Advanced Mailbox Password Recovery, Advanced WordPerfect Office Password Recovery, Lightning Hash Cracker, and Facebook Password Extractor. • ElcomSoft System and Security Software – Includes Proactive Password Auditor, Advanced EFS Data Recovery, System Recovery, and System Password Recovery. Website https://www.elcomsoft.com/
Elemental
ElevenPaths
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Governance, Risk, and Compliance Brief Overview Elemental Security provides data security and governance, risk, and compliance (GRC) management solutions for enterprise customers. Headquarters Elemental Security Corporate Headquarters 101 Convention Center Drive Las Vegas, Nevada 89126 Tel: (702) 940 – 8061 Executives Marius Octavian Bratan, President and CEO of Elemental Cyber Security Inc., previously founded 1stmarkets, as well as serving as a vice president of ODS Networks – Intrusion, Inc. History Dayne Myers and Dan Farmer, author of SATAN, co-founded the private company in 2002. Elemental is headquartered in Las Vegas with operations in Paris, France and Munich, Germany. Lehman Brothers Venture Partners, Bessemer Venture Partners, Sequoia Capital, and Mayfield Fund provided $11m in Series C funding in 2005. Key Competitors RSA/Aveksa, IBM, HPE Products and Services Elemental offers the Elemental Security Platform (ESP), which is designed to allow enterprise customers to translate their business objectives into policies and rules that can be measured, monitored, reported, and enforced across the enterprise network. The platform provides specific support for the following areas: • Big Data Infrastructure – Includes compliance checks for password policies, input validation, role based access controls, and other security functions. • Adaptive Access Control – Includes a host agent-based solution to complement NAC capabilities. • Risk Management and Compliance – Provides automated support for enterprise risk management and compliance activities. Website https://www.elementalsecurity.com/
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication, Vulnerability Management Brief Overview ElevenPaths provides a range of security products and services including authentication and vulnerability detection. Headquarters ElevenPaths Telefonica Offices Madrid, Spain Tel: +34 914 830 815 Executives Pedro Pablo Pérez serves as CEO of ElevenPaths. History Telefonica launched ElevenPaths in 2013. The company has presence in Spain, UK, Argentina, Colombia, and Brasil. Key Competitors Viafirma Products and Services ElevenPaths provides a range of product and service offerings, which they refer to as “paths.” Specific products and services include the following: • Identity and Privacy – Includes Latch for companies and users, Smart ID (authentication and SSO) and SealSign (digital signature and biometrics) • Threats and Intelligence – Includes Faast (penetration testing), Metashield (data leakage protection), and Tacyt (mobile threat protection) • Secure Infrastructures – Includes new products being developed Website https://www.elevenpaths.com/
Elliptic Enterprises
Emagined Security
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Bitcoin Security Brief Overview Elliptic provides secure storage services for Bitcoin currency. Headquarters Elliptic Enterprises Limited 22 Upper Ground London, United Kingdom SE1 9PD Tel: +44 (0)20 7193 4752 [emailprotected] Executives James Smith, Co-Founder and CEO of Elliptic Enterprises, holds a PhD in computer science from University of Oxford and has experience in derivatives trading. History Adam Joyce, Tom Robinson, and James Smith co-founded Elliptic Enterprises Ltd in January 2014. The private company claims to be underwritten through Lloyds of London. Key Competitors Xapo Products and Services Elliptic provides an insured Bitcoin storage service via a secure vault. The vault works using cold storage techniques, where private keys are generated and stored offline in highly secure facilities. Multiple copies are maintained, and additional layers of cryptography and physical security protect each copy. The stored copies are accessible only by a quorum of directors. The storage is also full reserve, which means that the bitcoins deposited are the ones stored and provided on retrieval. Bitcoins are sent and obtained by secure links to Websites, never by email. Withdrawals require specification of the amount and a delivery address. Website https://www.elliptic.co/
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Incident Response Brief Overview Emagined Security provides professional consulting services for information security and compliance. Headquarters Emagined Security 2816 San Simeon Way San Carlos, California 94070 Tel: (415) 944 – 2977 Executives David Sockol, President and CEO of Emagined Security, previously built and operated security-consulting practices for Arthur Anderson. History David Sockol founded Emagined Security in 2002. The private company is headquartered in San Carlos, California. Key Competitors TBG Security, Trojan Horse Security Products and Services Emagined Security provides a range of security professional services that can be grouped as follows: • Proactive Security Consulting and Assessment – Includes ethical hacking, penetration testing, assessment and design, privacy and compliance, and other services. • Real-Time Monitoring and Managed Services – Includes monitoring and managed services as well as threat and vulnerability alerts. • Reactive Incident Response Services – Includes incident response, incident planning, incident recovery, and cyber and security litigation support. • Executive Advisory Services – Includes CISO on-demand, corporate strategy, merger and acquisition, cost reduction and consolidation, audit services, and regulation planning. • Licensing Advisory Services – Includes acquisition and implementation services, license adequacy services, and vendor support. • Support Services – Includes project management, resource augmentation, secure Web application development, implementation services, and analytics and automation. Website https://www.emagined.com/
eMazzanti Technologies Empow Cyber Security (Alpha Version 0.1 – 06/25/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview eMazzanti technologies provides IT technology consultation services for business including various IT security services. Headquarters eMazzanti Technologies 701 Grand Street Hoboken, New Jersey 07030 Tel: (201) 360 – 4400 Executives Carl Mazzanti, Founder and CEO of eMazzanti Technologies, was educated at Georgetown and studied in Hong Kong. History The small private company is headquartered in Hoboken, New Jersey and has close ties as a VAR partner to Microsoft. Key Competitors Optiv Products and Services The security-related services offered by eMazzanti Technologies include the following: • IT Network Security and Service (eCare) – Includes 24 hour monitoring and maintenance, network design and implementation, network assessment and optimization, virus and spyware protection. • Email Hosting, Filtering, and Anti-virus protection – Based on the MXINSPECT service, this includes support for email security and protection from malware. • Business Continuity and Disaster Recovery – Provides support for boosting an organizations ability to recover from disaster or unexpected events. • Video Security – Includes camera surveillance support for business facility protection. • Secure Mobile Workforce Solutions – Includes support for secure mobile devices and applications including Microsoft 365 support for mobile solutions. Website https://www.emazzanti.net/
(Alpha Version 0.1 – 08/04/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring, Threat Management Brief Overview Empow Cyber Security deconstructs your existing security tools into their individual components. Headquarters Empow Cyber Security Hayetzira 29 Ramat Gan Israel 5252171 Tel: +972-77-4502326 Executives Avi Chesla, Founder and CEO of Empow Cyber Security, was previously CTO and VP of Security Products at Radware. History Empow Cyber Security was founded in 2014 by Avi Chesla. The company has received $9M in funding and is headquartered in Israel. Key Competitors ForeScout Products and Services Empow Cyber Security offers a platform that integrates with your existing newtwork infrastructure and breaking down your security tools to their individual components. It provides real-time mitigation of advanced attacks, automates detection and root-cause investigation of advanced attacks, offers insight into which tools are performing at the highest level, and which aren’t, and saves on SOC and security engineering headcount. Website https://www.empownetworks.com/
Emsisoft
Enclave Forensics
(Alpha Version 0.1 – 06/24/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools Brief Overview Emsisoft provides anti-malware scanning and removal software to clean infect personal computers. Headquarters Emsisoft GmbH 7 Alma Street Whitby House Level 3 Nelson 7010 Austria Executives Christian Mairoll, Founder, Managing Director, and CEO of Emsisoft, named his company after his initials spoken phonetically backward. History Christian Mairoll founded Emsisoft in 2003 as a 100% virtual company with employees located in countries around the world. The company celebrates its lack of a headquarters location and freedom for employees. Key Competitors Avira, McAfee , Symantec, Trend Micro Products and Services Emsisoft provides free and commercial anti-malware solutions for home and business users that provide the following features: • Malware scanning using the a-squared scanner • Surf and phish protection via behavioral monitoring • Internet security features including firewall/host intrusion prevention (HIPS) • Mobile security for Android Solutions are available as a packaged bundle, as well as for business enterprise servers. Website https://www.emsisoft.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics, Incident Response Brief Overview Enclave Forensics provides incident response and digital forensic services for enterprise customers. Headquarters Enclave Forensics 2127 Handel Avenue Henderson, Nevada 89052 Tel: (631) 275 – 1489 Executives David Hoelzer, CEO, Director of Research and Principle Examiner of Enclave Forensics, is an experienced SANS instructor and founder of Cyber-Defense, the parent company of Enclave Forensics. History David Hoelzer founded Cyber-Defense, which is the parent company of Enclave Forensics. Key Competitors AccessData, Guidance Software, Magnet Forensics Products and Services Enclave Forensics provides a range of forensic-based professional services, the VisualSniff toolkit, and a range of professional incident response services for customers. Enclave Forensics provides an annual service contract whereby an experienced incident response and forensic specialist is on site within 24 hours of an incident. The small company is based on the capabilities of David Hoelzer, an experienced SANS Institute instructor. Website http://www.cyber-defense.org/
Encode
Encryptics
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Security Analytics, Incident Response, SIEM Brief Overview Encode provides a security analytics and response orchestration platform for the enterprise. Headquarters Level 33, 25 Canada Square, Canary Wharf London E14 5LB, UK Tel: (+44 (0)207 0388305) Executives Encode was co-founded by its CEO, Harry Eliopoulos, and its CTO, Panos Dimitriou. History Founded by Harry Eliopoulos and Panos Dimitriou, the company is headquartered in London with presence in Dubai, and Greece. Key Competitors Resilient, LogRhythm Products and Services Encode offers a platform for security analytics and response orchestration for continuous cyber situational awareness and response. Features in the Enoras platform include the following: • Security Analytics – Includes risk scoring, threat hunting visualization, self-learning, and Splunk integration outof-the-box. • SOCStreams – Involves incident response orchestration by encapsulating and streamlining SOC and response processes. • SIEM – Offers security intelligence based on the IBM QRadar SIEM. Encode solutions are available on-premise, in cloud, or as-aservice. Website http://www.encodegroup.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview Encryptics provides a data privacy and protection software platform including encryption that can be embedded into applications and processes. Headquarters Encryptics Headquarters 5080 Spectrum Drive Suite 1000 East Addison, TX 75001 Tel: (877) 503 – 4781 Executives Brandon Hart serves as Vice President and CTO of Encryptics. History The small, private company was founded in 2010 and is headquartered in Addison, Texas, with a satellite office in Doha, Qatar. Key Competitors Symantec, McAfee , ZixCorp Products and Services Encryptics provides data privacy and protection software in the following product offerings: • SAFE Package – Involves multi-layered encryption at the device level by wrapping information in, .SAFE packages. • Trusted Peer-to-Peer Platform – Involves combination of a server with peer-to-peer delivery to verify User IDs, hardware IDs, and Usage and Access rights. This allows the authentication process to be managed from a central location, while encryption is handled at the device level. • Encryptics for Email – Involves support for email encryption including an Outlook Add-In. • Data Protection API – Uses trusted peer-to-peer and .SAFE technologies to secure most any file type and provide data protection across a network. Website https://www.encryptics.com/
Endgame
Endian
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Endgame provides offensive and defensive cyber security research including a platform for enterprise threat and vulnerability detection and mitigation. Headquarters Endgame 3101 Wilson Boulevard Suite 500 Arlington, Virginia 22201 Tel: 844-357-7047 Executives Nathaniel Fick, CEO of Endgame, is an operating partner at Bessemer Venture Partners. He was previously CEO of the Center for a New American Security and a Marine Corps infantry officer. He is author of the New York Times bestseller, “One Bullet Away,” which details his combat experiences in Afghanistan and Iraq. History Former executives from the CIA and IBM’s ISS group, including Christopher Rouland, founded Endgame in 2008 as a stealthy, cyber security firm supporting government security operations including offensive cyber attacks. Kleiner Perkins Caulfield & Byers, Bessemer Venture Partners, Columbia Capital, Paladin Capital Group, and TechOperators fund the private company. The company has raised a total of $86.25M in venture funding through three rounds up to Series C in 2014. Key Competitors Rapid7 Products and Services Endgame provides threat and vulnerability research, as well as support for cyber security operations, including offensive attack support, which has produced some controversy regarding the firm’s work in support of organizations such as the NSA. Specifically, Endgame provides hacking tools for government customers such as the Pentagon and US Cyber Command. The firm includes major former defense officials on its board, including Christopher Darby and Lt. Gen, (Ret) Kenneth Minihan. Website https://www.endgame.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform, Intrusion Detection/Prevention, Network Access Control, Unified Threat Management Brief Overview Endian provides unified threat management (UTM) solutions such as firewall, IPS, NAC, and Web/email filtering with emphasis on securing Internet of Things (IoT). Headquarters Endian S.r.l. Via Pillhof 47 I-39057 Appiano, (BZ) Italy Tel: +39 0471 631763 Executives Raphael Vallazza serves as CEO of Endian. History Founded in 2003 in Appiano, Italy, the privately held company claims over 1.7 million users of its open source Community Edition with 50,000 installations of the professional product in over 50 countries. The company is headquartered in Italy with offices in Germany, US, Japan, and Turkey. Key Competitors Cisco Products and Services Endian offers UTM products that can be grouped as follows: • Network Security – Includes security appliances available as hardware, software, or virtual • Hotspot Management – Secure Internet access • Secure Remote Connectivity – Secure remote access to IoT and M2M networks • Industrial IoT Security – Protection for industrial network and automation equipment Specific products include the Endian UTM Mini 25 (UTM features in a small WiFi hotspot), Endian UTM Mercury 50 and 100 (UTM features in device that handles heavier Internet traffic, emails, and VPN connections), Endian UTM Macro 250 and 500 (firewall, VPN, gateway, AV, and content filtering), and Endian UTM Virtual Appliance (runs on VMware, Xen, and KVM). Website http://www.endian.com/
Enet 1 Group
Enforcive
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, ICS/IoT Security, Mobile Security Brief Overview Enet 1 Group provides security professional services in the areas of SCADA and critical infrastructure, and mobility. Headquarters Enet 1 Group 6700 Woodlands Parkway Suite 230-212 The Woodlands, Texas 77382 Tel: (832) 510 – 7119 Executives Tim W. Smith, Founder and CEO of the Enet 1 Group, has over 25 years experience in the global IT security industry. History Tim W. Smith founded the Enet 1 Group, building the company based on experience gained managing IT security for over eighty manufacturing plants around the world. Key Competitors Digital Defense Products and Services The Enet 1 Group provides a range of services in the following categories: • Security Services – Includes assessments, reviews, security management and monitoring, policies and procedures, compliance, security awareness, forensics and other related services. • SCADA and Critical Infrastructure – Includes cyber vulnerability assessments related to NERC, CIP-005 & CIP-007, and DHS CFATS. Also includes network architecture advice, wireless assesments, training, and compliance assistance. • Secure Mobile Apps and Mobile Security – Involves enterprise mobility solutions, corporate development strategies, web and mobility testing, and enterprise mobilility solutions. • Executive Support Website http://www.enet1group.com/
(Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Mainframe Security Brief Overview Enforcive provides security compliance solutions for IBM AS/400, cross-platform, and IBM mainframe DB2 and VSAM in a CICS environment. Headquarters Enforcive – USA 25 East Salem Street, Suite 427 Hackensack, New Jersey 07601-7427 Tel: (201) 968 – 0021 Executives Shimon Bouganim, Founder, President, and Acting CEO of Enforcive, has been the driving force at Enforcive for over 20 years. History The company was founded in 1983 and maintains offices in Hackensack, New Jersey, Herzliya, Israel, and Markham, Ontario. It changed its name from Enforcive Information Systems 1983 Ltd. to the simpler Enforcive in 2011. Key Competitors InfoSec Inc. Products and Services Enforcive’s enterprise security solutions can be grouped as follows: • IBM i Security (iSeries, AS/400) – Includes security and compliance software solutions for IBM I (AS/400) in the areas of access control, auditing and reporting, compliance management, real-time alerts, log collection, data encryption, and password management. • Cross-Platform Security (Multi-Platform) – Includes enterprise-wide event monitoring for cross-platform audit, log management, compliance and policy management, password self-service, and password synchronization. • IBM z Security (Mainframe) – Includes security for IBM mainframe DB2 and VSAM in CICS environment with focus on access control, auditing, reporting, alerting, log collection, and distribution. Website http://www.enforcive.com/
Engility (Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Information Assurance Brief Overview Engility is a US government defense contractor providing a range of intelligence and engineering services including cyber security/information assurance. Headquarters Engility 4803 Stonecroft Boulevard Chantilly, Virginia 20151 Tel: (703) 633 – 8300 Email: [emailprotected] Executives Lynn Dugle serves as CEO of Engility. John Hynes, President and COO of Engility, was previously CEO of TASC. History Founded in 1966, The Analytics Sciences Corporation in Winchester, Massachusetts, grew through various acquisitions. In 2009, Northrop Grumman sold TASC to an investor group led by General Atlantic LLC and affiliates of KKR & Co. Engility was launched in 2012 as an independent company made up of businesses within L-3's Government Services segments, including MPRI, C2S2, and IRG. Engility acquired TASC in 2015. Key Acquisitions TASC (2015) – Information Assurance Key Competitors Boeing, SAIC Products and Services In addition to data analytics, enterprise transformation, intelligence missions and operations, intelligence surveillance and reconnaissance, system engineering and integration, and the Engility application broker service, the company also offers cyber security services to the US Federal Government with the following capabilities: • Critical infrastructure protection • Network security assessments • Monitoring and predictive analysis • Lifecycle security • Certification and accreditation • Enterprise system security • Test and evaluation Website http://www.engilitycorp.com/
Enigmedia (Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Voice Security Brief Overview Enigmedia provides solutions for secure calls and encrypted telepresence. Headquarters Enigmedia Parque tecnológico Miramón Paseo Mikeletegi 65, 20009 Donostia-San Sebastián Spain Tel: (+34) 943 046 661 Executives Gerard Vidal serves as Founder and CEO of Enigmedia. He was previously head of R&D projects at CERN. History Founded in 2012 by Gerard Vidal, Enigmedia is a Spanish start-up focused on voice security. The company received $400K in seed funding in 2013. Key Competitors Koolspan, Cellcrypt, Silent Circle Products and Services Enigmedia is a Spanish company that provides voice and video security with the following capabilities: • Secure Calls – Provides an app that allows for encrypted calls and video calls fro Google/Android or iPhone. The method supports private, semi-private, and public networks through a central authority. • Encrypted Telepresence – Involves HD telepresence plug-and-play kit to communicate with the Enigmedia Secure Communications network. Website https://enigmediasecurity.com/
enSilo (Alpha Version 0.1 – 06/05/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention, Vulnerability Management, Endpoint Security, Digital Forensics Brief Overview enSilo provides data exfiltration detection solutions for enterprise customers experiencing a breach. Headquarters Ensilo 182 Second Street, Suite 210 San Francisco, CA 94105 Tel: (650) 665 – 5400 Executives Roy Katmor, co-founder and CEO of enSilo, previously led Akamai’s security strategy. Udi Yavo serves as the other cofounder and CTO. History enSilo was co-founded by Ido Kelson, Tomer Bitton, Udi Yavo, and Roy Katmor in 2014, The company received $12M in funding from investors including Lightspeed Venture Partners and Carmel Ventures. It is headquartered in San Francisco with offices in Israel and Singapore. Key Competitors FireEye Products and Services enSilo provides an attack exfiltration system that focuses on distinguishing legitimate connections from malicious ones in real time across an enterprise. The platform provides virtual patching against targeted threats while a device or system compromise is being resolved. When enSilo detects a data exfiltration attempt, it sends a single alert to the customer and blocks the outbound communication. Website https://www.ensilo.com/
Enterprise Risk Management (Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, PCI DSS/Compliance, Digital Forensics, Penetration Testing Brief Overview Enterprise Risk Management provides a range of security consulting and training services including risk management and IT security. Headquarters Enterprise Risk Management 800 S. Douglas Road North Tower 940 Coral Gables, Florida 33134 Tel: (305) 447 – 6750 Email: [emailprotected] Executives Silka Gonzalez serves as Founder and President of Enterprise Risk Management. She was previously with Price Waterhouse. History Founded by Silka Gonzalez in 1998, the company is headquartered in Florida. Key Competitors McKinsey, Cura Products and Services Enterprise Risk Management (ERM) provides a range of security consulting, information assurance, data protection, and online training services that can be grouped as follows: • Government Services – The Company is a Federal Government Contractor and is a certified, minority, woman owned business (EDWOSB). • IT Security – Includes security design, vulnerability assessments, and penetration testing • Regulatory Compliance – Includes FISMA, SOX, PCI, and other frameworks • Forensics Services – Includes computer security breach detection and investigation • IT Audit Services – Includes internal information systems audits • Risk Management – Includes risk assessments and fraud prevention • Attestation Services – Includes SSAE 16 support • Online Training – Includes CyberSecurity Academy Website https://www.emrisk.com/
Entersekt
Entrust Datacard
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication, Mobile Security Brief Overview Entersekt provides interactive authentication and encryption solutions using mobile devices. Headquarters Entersekt House 6 Electron Street Technopark Stellenbosch 7600 South Africa Tel: +27 21 815 2800 Executives Shalke Nolte, CEO and Board member of Entersekt since 2009, had previous experience managing large-scale mobile technology deployments for GSM operators in Africa and the Pacific. History Christiaan Brand, Dewald Nolte, Niel Muller, and Altus van Tonder founded Entersekt in 2008. The company established its first office in Cape Town, South Africa in 2009. It has since expended to include offices in Johannesburg, South Africa; London, UK; Atlanta, Georgia; and Amsterdam, the Netherlands. Key Competitors Duo Security, Authentify Products and Services The Entersekt security platform supports on-line banking authentication, mobile banking authentication, and card-notpresent authentication for business customers. The platform is based on patented PKI technology that is standardscompliant and available as an SDK for embedding into an existing application. The technology secures the primary access channel (desktop, laptop, tablet) by using a mobile phone as the second authentication factor. Website https://www.entersekt.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication, CA/PKI Solutions, Data Encryption, Mobile Security Brief Overview Entrust Datacard provides a suite of authentication, identity, PKI, certificate, and mobile security solutions. Headquarters Entrust Datacard 1187 Park Place Shakopee, MN 55379 USA Tel: (952) 933 – 1233 Executives Todd Wilkinson, President and CEO of Entrust Datacard, worked previously at General Electric. History Entrust built and sold the first commercially available PKI solutions in 1994. The company grew through the 1990’s, becoming the foundation for the US Federal Bridge CA in 2002. Entrust was acquired by San Francisco-based Thoma Bravo in 2009. Thoma Bravo then sold the company to Datacard Group in 2013. Key Acquisitions enCommerce (2000) – Enterprise Portals Key Competitors Comodo, Symantec, RSA Products and Services Entrust offers a full suite of PKI-related products and service in the following areas: • Entrust IdentityGuard – Consists of a strong authentication and identity management platform, also available as a cloud service. • Entrust Authority PKI – Consists of security infrastructure for encryption, digital signature, and certification authentication. • Entrust Entelligence Security Provider – Consists of standards-based email encryption solutions on one platform. • Entrust Get Access – Scalable single sign-on solution • Entrust Transaction Guard – Behavioral fraud detection platform • Entrust TruePass – End-to-end digital identity confirmation • Entrust Entelligence Messaging Server – Solution for encryption, authentication, and digital signatures. • Datacard – Offers services including on-demand financial card insurance, EMV smart chip migration, and customized secure ID or badge solutions Entrust Datacard’s products and solutions include support for cloud-based SSL digital certificate management. The company targets mobile and cloud environments for authentication, access, secure email, collaboration, and other capabilities. Website https://www.entrustdatacard.com/
ERNW
ERPScan
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security R&D, Security Consulting Brief Overview ERNW is an independent IT security services and consultation company specializing in knowledge transfer. Headquarters ERNW Carl-Bosch-Str. 4 69115 Heidelberg Germany Tel: +49 6221 480390 Executives Enno Rey, Founder and CEO of ERNW, is active in the security community, sponsoring events such as Troopers. History Enno Rey founded the small independent firm, headquartered in Germany, in 2001. Key Competitors Zimperium Products and Services ERNW provides IT security services in the following areas: • IT security assessment • IT security consulting • Security research • Knowledge transfer ERNW releases vulnerability information as part of its business model promoting their business through communication and public presentations. Website https://www.ernw.de/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls SAP Security, Application Security Brief Overview ERPScan offers a suite of SAP security products and services for enterprise customers. Headquarters Luna ArenA 238 Herikerbergweg 1101 CM Amsterdam Tel: +31 20 8932892 Executives Alexander Polyakov, Co-Founder and CTO of ERPScan has authored a book on Oracle database security. History Ilya Medvedovsky and Alexander Polyakov co-founded ERPScan in 2010. The public company is headquartered in Amsterdam, the Netherlands with an office in Palo Alto, California. Key Competitors Onapsis Products and Services ERPScan offers its ERPScan Security Monitoring Suite product (available as freeware) for SAP penetration testing security, as well as a range of services including the following: • SAP Penetration Testing • SAP Security Assessment • SAP Security Training • ABAP, Java Code Review • Workstation Security Test Website https://www.erpscan.com/
eSecurity Solutions
eSentire
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls VAR Security Services Brief Overview eSecurity Solutions provides value added security and networking solutions including IT security consultation. Headquarters eSecurity Solutions, LLC 2280 University Drive Suite 104 Newport Beach, California 92660 Tel: (866) 861 – 6685 Executives Tom Ruffalo, CEO of eSecurity Solutions since 2003, was previously owner of Synergy Solutions. History Michael and Tom Ruffalo co-founded eSecurityToGo in 2003. The private company is headquartered in Newport Beach, California. The company changed their name from eSecurityToGo to eSecuritySolutions in 2014. Key Competitors Optiv Products and Services eSecurity Solutions provides a range of commercial security products from vendor partners including gateways and firewalls, endpoint security, mobile security, access control, backup and continuity, data protection, compliance and risk, IP surveillance cameras, networking, and other product areas. The company also provides managed security, disaster recovery, PCI compliance and business continuity solutions, as well as managed services in the following areas: • Authentication Security • Data Disaster Recovery • Email Security • Employee Monitoring • Endpoint Security • Firewall Security • Intrusion Detection • PCI Compliance • Log/Even t Management • Vulnerability Scanning • Web App Security • Web Security Website http://www.esecuritysolutions.com/
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security Analytics, Network Monitoring, Vulnerability Management, Digital Forensics Brief Overview eSentire provides active enterprise cyber security threat protection solutions including vulnerability scanning, log data centralization, and network traffic capture for forensic analysis. Headquarters eSentire 278 Pinebush Road Suite 101 Cambridge, Ontario N1T 1Z6 Canada Tel: (519) 624 – 9714 Executives J. Paul Haynes, CEO of eSentire, is a serial entrepreneur who started his first company while still completing his Masters degree. History The privately held company, headquartered in Canada, was founded in 2001 and has received venture funding from Edison Partners and VentureLink LP. Key Competitors Damballa, FireEye, Checkpoint Products and Services eSentire provides active cyber security protection solutions for enterprise customers in the following areas: • Active Threat Protection Platform – The platform, known as Network Interceptor, provides active analytics, active correlation, active forensics, and active intervention support for threat protection. • Enterprise Vulnerability Assessments – eSentire will provide assessments of vulnerabilities in an enterprise environment. • Cyber Security Incident Response – The eSentire Cyber Security Incident Response (CSIR) solution involves trained professionals, best practices, and incident handling procedures. Website https://www.esentire.com/
ESET
Espion
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools, Endpoint Security, Mobile Security Brief Overview ESET provides anti-virus and Internet security software for end-user PCs and mobiles. Headquarters ESET North America 610 West Ash Street Suite 1700 San Diego, California 92101Tel: (619) 876 – 5429 ESET Headquarters Aupark Tower, 16th Floor Einsteinova 24 851 01 Bratislava Slovak Republic Executives Richard Marko, CEO of ESET since 2011, began his career with the company, and is one of the authors of the ESET NOD32 Anti-Virus scanning engine. Andrew Lee serves as CEO of ESET North America. History ESET was founded in 1992 by Peter Paško, Rudolf Hruby, and Miroslav Trnka, and has grown to over 800 employees worldwide serving customers in over 180 countries. The company is headquartered in Bratislava, Slovakia with offices in San Diego, California; Prague, Czech Republic; Jena, Germany; Sydney, Australia; Buenos Aires, Argentina; and Singapore. Key Acquisitions Setrnet (2008) Comdom (2010) Key Competitors McAfee , F-Secure, Symantec, Trend Micro, Kaspersky Products and Services ESET offers a range of anti-virus and Internet security products for the protection of endpoints that can be grouped as follows: • Home Products – Includes ESET Multi-Device Security, ESET Smart Security, ESET NOD32 Anti-Virus, ESET Cyber Security Pro for Mac, ESET Cyber Security for Mac, and ESET Mobile Security for Android. • Business Products – Includes ESET Endpoint Anti-Virus, ESET Endpoint Security, ESET Mobile Solutions, ESET Mail Security, ESET Secure Authentication, and Professional Services. Website https://www.eset.com/
Acquired by BSI (Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, PCI DSS/Compliance Brief Overview Espion provides a range of security consulting services including information governance, forensics and eDiscovery, training. Headquarters Espion Group Corrig Court, Corrig Road Sandyford Industrial Estate Dublin 18 Tel: +353 1 210 1711 Executives Colman Morrissey, Managing Director of Espion, previously founded the Irish Honeypot Project. History Founded by Colman Morrissey in 1001, Espion is headquartered in Dublin with offices in London, Edinburgh, Manchester, Belfast, Brussels, and New York. BSI Group announced acquisition of Espion in 2016. Key Competitors Rits, BH Consulting Products and Services Espion provides a range of security consulting services that can be grouped as follows: • Information Governance • Forensics and eDiscovery • Cloud Assurance • Research and Development • Training • Technology Distribution The company has a relationship with Wombat for enterprise security training services. Website https://www.espiongroup.com/
EventSentry
EventTracker
(Alpha Version 0.1 – 06/06/17 – No Vendor Approval) TAG Cyber Controls Security Information Event Management Brief Overview EventSentry provides a range of monitoring tools focused on log files, reporting, heath, and compliance. Headquarters netikus.net, ltd 150 South Wacker Drive, Suite 2400 Chicago, Illinois 60606 Tel: (312) 624 – 7698 Executives Ingmar Koecher serves as CEO and Founder of Netikus.Net, parent company of EventSentry. History EventSentry was originally EventwatchNT, which was a free event log monitoring tool released in 2001. The parent company is NETIKUS.NET, a privately held company in the Chicago area. Key Competitors LogRhythm Products and Services EventSentry provides a range of monitoring tools that include event log monitoring, reporting, health monitoring, compliance, management, log file monitoring, network monitoring, and notifications. The tools include a free light edition and provide support for system administration. Website https://www.eventsentry.com/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Security Information Event Management Brief Overview EventTracker offers SIEM, IT security, and compliance solutions for enterprise customers. Headquarters EventTracker Corporate Headquarters 8815 Centre Park Drive 410 Columbia, Maryland 21045 Tel: (410) 953 – 6776 Executives A.N. Ananth serves as Co-founder and CEO of EventTracker. He was previously with Ciena, Westinghouse Wireless, and Equatorial Communications. History Founded by A.N. Ananth and Jagat Shah, EventTracker is headquartered in Columbia, Maryland with offices in Houston, Texas; Ft. Lauderdale, Florida; St. Louis, Missouri; and Bommanahalli, Bangalore. Key Competitors AlienVault, EventSentry Products and Services EventTracker provides a range of SIEM and IT security solutions that can be grouped as follows: • EventTracker CyberShield – Uses behavioral correlation to take remediation action based on continuous monitoring • EventTracker Log Manager – Aggregates, correlates, and monitors firewall, system, application, and error logs • EventTracker Security Center – Real-time dashboard • EventTracker Enterprise – Provides compliance and IT security visibility • EventTracker Services – Includes SIEM Simplified, Expert Install, and Health Check Website https://www.eventtracker.com/
Evident.io
Evidian
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview Evident.io provides a security platform for continuous cloud security for AWS customers. Headquarters Evident.io 7901 Stoneridge Dr. Suite 207 Pleasanton, CA 94588 Tel: (855) 933-1337 Executives Tim Prendergast, Co-founder and CEO of Evident.io, was previously with Adobe, Ingenuity, Ticketmaster, and McAfee . History Founded in 2013 by Tim Prendergast and Justin Lundy, Evident.io is headquartered in California. Bain Capital Ventures, True Ventures, and Semantic-Intelligence, LLC provided $11.4M in venture funding through Series A in 2014. Key Competitors Trend Micro Products and Services The Evident Security Platform (ESP) provides continuous, agentless, cloud security for AWS with the following features: • Detection of security risks and vulnerabilities • Assessment of security risks on a dashboard • Remediation advice on resolution • Auditing of cloud infrastructure The ESP platform is deployed to the AWS cloud and allows integration of ESP data into customer or third party systems. Developer support is provided as well. Website https://www.evident.io/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Evidian provides identity and access management solutions for enterprise customers in Europe and beyond. Headquarters Evidian SA Rue Jean Jaures, BP 68 78340 Les Clayes-sous-Bois France Tel: +33 (0)1 30 80 37 77 Executives Thierry Breton is the Chairman and CEO of Atos, Evidian’s parent company. Philippe Duluc serves as Director of Bull’s cybersecurity group. History Bull Atos Technologies, headquartered in France, manages Evidian as a subsidiary company. Evidian is headquartered in France with offices in the UK, Germany, New York, and Japan. Key Competitors Sailpoint, Ping Identity Products and Services Evidian provides a suite of identity and access management solutions for industries such as healthcare, finance, enterprise, government, and telecommunications. These products and services can be grouped as follows: • Identity and Access Management – Involves a platform for identity and access manager services and capabilities. • Enterprise SSO – Replaces passwords with a single authentication such as biometric or smart card. • Web SSO – Involves the Evidian Web Access Manager (WAM) platform that allows access management of Web applications with a single means of authentication. • Authentication Manager – Provides support for strong authentication • LDAP/X.500 Directory Server – Acts as identity store, and can serve as a provisioning, access management, and metadirectory repository • Safekit High Availability – Load balancing, file replication, and failover for standard operating systems and databases. • Monitoring Systems and Networks – Real-time access to critical performance indicators. Evidian also provides a set of related services including training, consulting, project management, operations, and support. Website https://www.evidian.com/
EWA-Canada
Exabeam
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Information Assurance Brief Overview EWA-Canada provides information assurance services in Canada including IT risk management and managed security services. Headquarters EWA-Canada – Head Office 1223 Michael Street, Suite 200 Ottawa, Ontario, Canada K1J 7T2 Tel: (613) 230 - 6067 Executives Dennis Weiss serves as President of EWA-Canada. He previously directed Canada’s Critical Infrastructure Program. History Incorporated and in operation since 1988, the company has its head office in Ottawa with additional offices in St. John’s and Vancouver. Key Competitors Above Security Products and Services Services offered by EWA-Canada include third-party functional testing, applied semantic technologies, Common Criteria evaluation, cryptographic and security testing, cryptographic algorithm validation, compliance, managed security services, operational assurance, system security testing, payment assurance, SCAP testing, and other services. Website https://www.ewa-canada.com/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Security Analytics, Security Information Event Management Brief Overview Exabeam provides user behavioral analytic intelligence from SIEM and log management data to detect insider attacks. Headquarters Exabeam 1 Waters Park Drive, Suite 160 San Mateo, California 94403 Tel: (844) - EXABEAM Executives Nir Polak, Co-founder and CEO of Exabeam, was previously with Adjungo Networks and Shopping.com. History Co-founded by Nir Polak, Silvian Gil, and Domingo Mihovilovic, the company is headquartered in San Mateo with locations in the UK and Singapore. Norwest Venture Partners, Aspect Ventures, and Shlomo Kramer provided venture funding for the company. The company raised $25M in a Series B round in 2015 led by Icon Ventures. Key Competitors Dtex Systems, Fortscale, Securonix Products and Services The Exabeam User Behavior Intelligence Platform provides user behavioral analytic intelligence from SIEM and log management systems. The technology involves session assembly and stateful user tracking to score risks for insiders and users. The security team is provided with risk scores, incident ranking, and attack detection from the platform used in conjunction with the SIEM and log systems. Website https://www.exabeam.com/
Exonar
Exostar
(Alpha Version 0.1 – 07/26/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance, Data Leakage Prevention Brief Overview Exonar specializes in next generation data leakage prevention and GDPR compliance. Headquarters Exonar 14 West Mills Newbury, Berkshire RG14 5HG United Kingdon Executives Adrian Barret serves as CEO and Founder of Exonar. History This small Information Technology and Services company was founded in 2007 by Adrian Barret and Derrick Hirst. Key Competitors GeoLang, GajShield Products and Services Exonar’s solutions can be broken don into these three categories: • General Data Protection Regulation – Ensuring you are ready for the EU’s GDPR • Cloud Migration – Shows what data needs to be migrated and what does not • Information Security – Understand what data is at risk in the event of data breaches Website https://www.exonar.com/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Secure File Sharing Brief Overview Exostar provides cloud-based identity credentialing and access products, as well as secure collaboration solutions. Headquarters Exostar Corporate HQ 2325 Dulles Corner Blvd. Suite 600 Herndon, Virginia 20171 Tel: (703) 561 – 0500 Executives Richard Addi, President and CEO of Exostar since 2011, was previously vice president of finance at Data Systems Solutions. History Exostar was originally founded in 2000 by five aerospace and defense companies (BAE Systems, Boeing, Lockheed Martin, Raytheon, and Rolls-Royce) to solve their complex supply chain and security requirements. The privately held company is headquartered in Herndon, Virginia. Key Competitors Fischer International Products and Services Exostar offers, in addition to a supply chain management solution, the following two cloud-based, Software-as-aServices (SaaS) security-related products: • Exostar Identity Credentialing and Access Products – Issues credentials including PKI hardware and software certificates, as well as enabling identity federation and single sign on (SSO). • Secure Collaboration Products – Built on Microsoft SharePoint to optimize productivity and secure intellectual property. Website https://www.exostar.com/
Experian
ExtraHop Networks
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Web Fraud Prevention Brief Overview Experian is a global credit services company that includes fraud prevention solutions via acquisition of 41st Parameter. Headquarters Experian plc Newenham House Northern Cross Malahide Road Dublin 17 Ireland Tel: +353 (0) 846 9100 Executives Brian Cassin, CEO of Experian, was previously the Managing Director of Greenhill & Co. History Tracing its roots back to the 1970’s Dublin-based Experian reported $4.8B in revenue in 2015 and employs 17,000 people in 37 countries. Key Acquisitions SafetyWeb (2011) – Cloud Security 41st Parameter (2013) – Anti-Fraud CSIdentity (2016) – Identity Protection Key Competitors Equifax Products and Services Experian is a global credit services company that provides consumer, small business, and business services in the area of identity verification to support account integrity. The company offers fraud prevention solutions for secure account management and avoidance of account takeover. Website https://www.experian.com/
(Alpha Version 0.1 – 07/26/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview ExtraHop sells network appliances that perform real-time analysis of wire data. Headquarters 520 Pike Street Suite 1700 Seattle Washington 98101 Tel: (877) 333 - 9872 Executives Arif Kareem serves as CEO and president of ExtraHop. History ExtraHop was founded by Jesse Rothenstein and Raja Mukerji in 2007. It is headquarted in Seattle, Washington, with offices in the UK and Singapore. Key Competitors F5, Fidelis Cyber Security Products and Services ExtraHop provides real-time operational intelligence for complex, dynamic production environments. IT organizations use ExtraHop to manage their devices and monitor transactions daily. The ExtraHop system equips IT groups with real-time visibility across the entire application delivery chain comprising the network, web, VDI, API and middleware, database, and storage tiers. Website https://www.extrahop.com/
Extreme Networks
EY
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention, Network Access Control, Security Information Event Management Brief Overview Extreme Networks provides a range of advanced network monitoring, network management, SDN, and security solutions. Headquarters Extreme Networks 6480 Via Del Oro, San Jose, CA 95119 San Jose, California 95134 Tel: (408) 579 – 2800 Executives Edward Meyercord III serves as President and CEO of Extreme Networks. History Founded in 1996, Extreme Networks trades on the NASDAQ. It reported $519.5M in revenue in 2014. The company is headquartered in San Jose with offices in New Hampshire, North Carolina, and Toronto. The company also has presence in Asia Pacific, Europe, Middle East, and Africa. Key Acquisitions Enterasys (2003) – IDS Key Competitors Cisco, FireEye Products and Services In addition to wireless, switching, control, and analytics solutions for networks, Extreme Networks offers a range of security solutions that provide intrusion detection through security and policy management. The Extreme Networks intrusion detection solution works from the network node to the individual device. Capabilities include adaptive control, granular visibility, event triggering, and detailed reporting. Website https://www.extremenetworks.com/
(Alpha Version 0.1 – 06/07/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview EY offers a full range of business advisory services including a cyber security consulting practice. Headquarters EY Headquarters 1101 New York Avenue Washington District of Columbia 20005 Tel: (202) 327 – 6000 Executives Mark Weinberger, Global Chairman and CEO of EY, previously served as Assistant Secretary of the United States Department of the Treasury for Tax Policy in the George W. Bush administration. History Two long-standing firms, Ernst & Ernst, and Arthur Young & Company, eventually merged in 1989 to form Ernst & Young. The company is now 190,000 staff, serving clients around the world. Key Acquisitions Integrc (2015) – GRC Mycroft (2015) – IAM Key Competitors PwC, Deloitte and Touche, KPMG Products and Services EY’s advisory services business areas such as tax, transactions, assurance, and strategy. Security, fraud, and risk management are embedded in several of these advisory service areas. In addition, the company provides an advisory practice in cyber security that involves a simple methodology for improving, expanding, and innovating. The company also sponsors an annual global information security survey that explores actions organizations take to prepare for and mitigate cyber security risks. The Integrc acquisition provides GRC capabilities for EY customers. Website https://www.ey.com/
F5
Farsight Security
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Application Security, Cloud Security, DDOS Security, Network Monitoring, Firewall Platform, Web Application Firewall, Web Fraud Prevention Brief Overview F5 provides a range of products focused on network security and optimizing the application delivery network capabilities of an enterprise or service provider. Headquarters F5 Corporate Headquarters 401 Elliott Avenue West Seattle, Washington 98119-4017 Tel: (206) 272 - 5555 Executives François Locoh-Donou , President, CEO, and Director of F5 Networks since April 2017, was previously COO of Ciena. History Founded in 1996 as F5 Labs, the company originally focused on load balancing products. The company grew quickly, being added to the S&P 500 in 2010 based on the performance of both the company and the stock. The company now employs 2600 people and reported $1.38B revenue in 2012. Key Acquisitions uRoam (2003) – Remote Access Magnifire WebSystems (2004) – Web Security Swan Labs (2005) – WAN Optimization Acopia Networks (2007) – Application Delivery Traffix Systems (2012) – Signaling LineRate (2013) – Load Balancing Versafe (2013) – Web Anti-Fraud Defense.net (2015) – DDOS Key Competitors Fortinet, Cisco, Juniper, Palo Alto networks Products and Services F5 offers a range of network security capabilities such as the following specific products: • BIG-IP Local Traffic Manager (LTM) – High-performance application delivery system • BIG-IP DNS – Directs users to best-performing data center for optimiozed app performance • BIG-IT Access Policy Manager (APM) – Consolidates remote access, web access management, and VDI. • BIG-IP Advanced Firewall Manager (AFM) –Full-proxy firewall. • BIG-IT Application Security Manager (ASM) – Application security assessment and scanning • BIG-IQ Cloud – Orchestrates application delivery system services over virtual, cloud-based environments. • BIG-IQ Security –Simplifies firewall policy management to reduce overhead and simplify operations. • Mobile App Manager – Securely wrapping mobile applications. Website https://www.f5.com/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence, Infrastructure Security Brief Overview Farsight Security provides threat intelligence feeds from realtime passive DNS solutions. Headquarters Farsight Security 177 Bovet Road, Suite 180 San Mateo, California 94402 Tel: (650) 489 – 7919 [emailprotected] Executives Dr. Paul Vixie serves as Founder, Chairman, and CEO of Farsight Security. History Founded in 2013 by Internet pioneer and DNS thought leader Dr. Paul Vixie, the company is headquartered in California. Key Competitors Nominum Products and Services The company provides real-time passive DNS solutions that offer contextual data and intelligence about reputation and threat feeds. Information relates to IOCs, whitelists, and block lists. The goal of the Farsight data is to help security vendors, researchers, and threat analysts amplify threat feeds and accelerate the detection of new threats. This is done by identifying known associates, by enhancing mitigation strategies with plug-and-play solutions, and by improving prediction accuracy of cyber threats. The data collected by Farsight Security is considered sensitive and hence, the company carefully screens potential customers to determine appropriateness. Website https://www.farsightsecurity.com/
Fasoo
Fast Orientation
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Content Protection Brief Overview Fasoo provides a variety of data security and enterprise DRM solutions for files and other resources. Headquarters Fasoo 197 State Route 18 South, Suite 203N East Brunswick, New Jersey 08816 Tel: (408) 389 – 3097 Executives Kyugon Cho, Founder, Chairman, President, and CEO of Fasoo, worked for Samsung Group and received his PhD in computer engineering from Rutgers University. History Fasoo was spun out from Samsung SDS in 2000. The private company is headquartered in Seoul, South Korea, with offices in East Brunswick, New Jersey and Sunnyvale, California. With roughly 270 employees, it serves more than two million users. Key Competitors Watchdox, docTrackr Products and Services Fasoo offers a range of DRM security products that use encryption solutions certified by the Korean National Intelligence Service based on the Fasoo Crypto Framework that can be grouped as follows: • File-Based Security – This includes Enterprise DRM, Secure Node, Secure Document, Secure Print, Secure Exchange, Secure Screen, Usage Tracer, Mobile Gateway, and View Plus. • Print Security – Incudes Secure Print and Fasoo ePrint. • Source Code and Secure Coding Analysis – Involves the SPARROW SCE diagnostic tool for static code analysis. • Mobile Security – Includes Mobile Solution, Mobile Gateway, and View Plus. • Secure Collaboration – Includes the DigitalQuick solution. Website https://www.fasoo.com/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Incident Response Brief Overview Fast Orientation provides software that allows IT organizations to explore IT events in real time as part of a continuous awareness and incident response program. Headquarters Fast Orientation HQ Palo Alto, California Executives Sam Small, CEO of Fast Orientation, led an academic research lab and launched two previous security start-ups. History Sam Small, Paul Talamo, and Ed Jaehne launched Fast Orientation in 2014. The small company is headquartered in the Palo Alto area with presence in the Washington, DC area. The company received undisclosed seed funding through the Mach37 security accelerator. Key Competitors Resilient Systems Products and Services Fast Orientation provides a software solution for fast incident response. The product supports root cause analysis, continuous awareness, improved operational health, and orientation on IT infrastructure through the ability to sift through large volumes of data without the need for a new query language. Website https://www.fastorientation.com/
Fastpath
FatSkunk
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview Fastpath offers solutions for security, audit, and compliance management of ERP systems. Headquarters Fastpath 4093 NW Urbandale Drive Urbandale, Iowa 50322 Tel: (515) 276 – 1779 Executives Andy Snook, President and CEO of Fastpath, was named the 19th most influential person for Microsoft Dynamics in 2012. History Fastpath was established in 2004 and is headquartered in Urbandale, Iowa. Key Competitors RSA Archer, ACL, Modulo Products and Services Fastpath offers pre-configured GRC-related security audit and compliance solutions for the most widely used mid-market ERPs and CRM/XRM tools that can be grouped as follows: • Assure – Provides controls such as segregation of duty (SoD) compliance for Microsoft Dynamics. • Audit Trail – Monitors and tracks changes to critical systems for Microsoft Dynamics, Microsoft SQL Server, and so on. • Audit View – Provides audit reporting and tracking. • Config AD – Provides security compliance management with Active Directory. • Identity Manager – Consists of identity and access management for Microsoft Dynamics. • GRC Studio – Provides robust reporting and monitoring tools with built-in audit intelligence. Website https://www.gofastpath.com/
Acquired by Qualcomm (Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview FatSkunk, part of Qualcomm, uses software-based attestation methods to reduce mobile malware risk. Headquarters FatSkunk Inc. Silicon Valley, California Executives Marc Grandcolas, CEO of FatSkunk, was previously an executive with IBM, Sun Microsystems, and several private software companies. History Mark Grandcolas and Markus Jacobsson, both then of Xerox PARC, founded FatSkunk in 2009. It is currently a small, Delaware-based corporation with headquarters in Silicon Valley. Its original funding came as a result of the QualcommLabs@EvoNexus funding initiative for incubation. Qualcomm acquired FatSkunk in 2014. Key Competitors Lookout Products and Services FatSkunk provides software-based attestation using various novel techniques for preventing and detecting mobile malware. A client agent is embedded on mobile devices to perform scans in a battery-efficient manner, while also using clever memory management techniques to reduce the likelihood of mobile malware. A server solution is currently in the works. Website https://www.qualcomm.com/
FEITIAN Technologies
Fidelis Cybersecurity
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview FEITIAN provides digital security through a range of product offerings for authentication, encryption, and related technologies. Headquarters FEITIAN Technologies Co. Ltd. No 9 Xueqing Road Haidian District, Beijing 100085 Beijing, China P.R. China Tel: +86 10 6230 4466 Executives Huang Yu, Founder and CEO of FEITIAN Technologies, was recognized as one of the top ten software leaders in China in 2007. History Huang Yu created FEITIAN Technologies in 1998. The company now claims 350 R&D engineers with over 500 patents. It is listed on the Shenzhen Stock Exchange. Key Competitors RSA, Seamoon, SafeNet Products and Services The suite of product solutions offered by FEITIAN Technologies include the following: • ePass PKI Authentication – Involves certificate-based strong authentication products ranging from FIPS 140-2 compliant cryptographic identity modules to handheld biometric devices. • OTP Authentication – Involves one-tie password authentication tokens using challenge response protocols. • ROCKEY Software Protection – Involves hardware-based dongles and USB sticks for encryption and protection. • Smart Card, COS, and Reader – Includes smart card and associated operating system support plus readers. • Secure VPN Application – Provides support and configuration for using FEITIAN solutions with tools from Citrix, Checkpoint, Juniper, Microsoft, and many other technology companies. • BlockChain – Secure Cryptocurrency Wallet • Computer and Network Sign-On – Provides support for smart card logon in Windows and LINUX environments. Website https://www.ftsafe.com/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Information Assurance, Network Monitoring, Data Leakage Prevention, Network Monitoring Brief Overview Fidelis Cyber security provides information assurance and cyber security solutions for enterprise customers. Headquarters Fidelis Cybersecurity 1601 Trapelo Road, Suite 270 Waltham, Massachusetts 02451 Tel: (617) 275 – 8800 Executives John McCormack is serving as the Interim President, CEO, and Chairman of the Board for Fidelis Cybersecurity. Previously he served as the CEO of Forcepoint. History Timothy Sullivan and Gene Savchuk founded Fidelis in 2002. General Dynamics acquired the company in 2012 and then later sold Fidelis Cybersecurity to Marlin Equity Parters in 2015. The company is headquartered in Boston with offices in Bethesda, EMEA, Northern Europe, Western Europe, Middle East, South Africa, and Asia Pac. Key Competitors SAIC Products and Services Fidelis Cybersecurity provides a range of products and consulting services that can be grouped as follows: • Fidelis XPS – Analyzes traffic at line speed to detect advanced attacks • Resolution1 Endpoint – Detection and response solution for endpoints • Consulting – Includes incident response services, security assessments, security operation center deployment, PCI DSS, and litigation support. Website https://www.fidelissecurity.com/
FileOpen
FinalCode
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing, CA/PKI Solutions Brief Overview FileOpen provides digital rights management solutions for enterprise files and document types. Headquarters FileOpen 1010 Fair Avenue, Suite A Santa Cruz, California 95060 Tel: (831) 706 – 2170 Executives Sanford Bingham serves as Co-Founder, President, and CEO of FileOpen. History Founded in 1997 by Sanford Bingham and Diana Holm, FileOpen was involved in many of the early DRM efforts on CD-ROM and the early Web. Key Competitors Fasoo Products and Services FileOpen provides a rage of digital rights management (DRM) solutions for enterprise files and documents. The solution supports secure file sharing across Box, OneDrive, IBM, and many other cloud-based application services. Specific products include: • RightsManager – Controls DRM for documents from a single dashboard, designating who can edit, save, copy, or print. • RightsServer – Brings document security in-house with hosted server capability. • Developer Toolkit – SDK for developers FileOpen also provides a free plugin for many different formats including Windows, Mac, iOS, Linux, and Android. Website https://www.fileopen.com/
(Alpha Version 0.1 – 06/08/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing, Content Protection Brief Overview FinalCode provides an encryption-based solution for secure file sharing in enterprise. Headquarters FinalCode 3031 Tisch Way #115 San Jose, California 95128 Tel: (855) 201 – 8822 Executives Gord Boyce, CEO of FinalCode was previously CEO of ForeScout Technologies and an executive with Nokia. History Founded I 2014, the company emerged from stealth in 2015. Their technology is based on a Digital Arts patent in 2010. Digital Arts invested in the company. Key Competitors Watchdox Products and Services FinalCode provides an encryption-based file sharing solution that offers the following capabilities: • Designation of who can open files • Specifying access count and duration • Comprehensive file control • Permissions management • Watermarking • Corporate policy enforcement • Lifecycle auditing Website http://www.finalcode.com/en/
Finsphere
Firebind
Acquired by Visa
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management Brief Overview As part of its voice and video performance offerings, Firebind provides a passive, continuous network security and performance-monitoring tool. Headquarters Firebind 1500 District Avenue Burlington, Massachusetts 01803 Tel: (857) 209 -- 4065 Executives Dave Patterson, Co-Founder and CEO of Firebind, spent many years in sales and sale engineering roles for companies such as Shiva, Lucent, SeaChange International, and IneoQuest Technologies. History Jay Houghton and Dave Patterson co-founded Firebind in 2011. Their idea was to create a scan host that could dynamically configure itself to listen on any TCP or UDP port thus allowing Firebind clients to send custom payloads to the scan host to identify policy issues. The small private company is headquartered in Burlington, Massachusetts. Key Competitors Tenable, Lumeta, Tripwire Products and Services Firebind offers a distributed security and performance solution for continuous assessments of networks. The platform uses patent=pending technology to send payloads, including Layer 7, through target devices to see what policies are enforced. It will discover, for example, firewall rules, ACLs, and signatures. Firebind also offers a SpeedSight solution, which is a standalone version of the Firebind technology. Website https://www.firebind.com/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Finsphere provides solutions for using mobile devices for establishing identity and authentication. Headquarters Finsphere Global Headquarters 505 106th Avenue Northeast Suite 200 Bellevue, Washington 98004 Tel: (425) 679 – 5700 Executives Mike Buhrmann, CEO of Finsphere, worked previously for Cantel, McCaw Cellular, and AT&T Wireless, before founding several companies such as @mobile and mQube. History Kirsten Morbeck founded Finsphere in 2007. The private company has received $30.7M in venture capital support from Vodafone Ventures, Shasta Ventures, Bezos Expeditions, Frazier Technology Ventures, and Mohr Davidow Ventures. Key Competitors Duo Security Products and Services Finsphere’s solution offerings use mobile phone data and analytics in support of identity authentication. The underlying platform for analytics is called LASER (location-assisted statistical engineered response), and it uses neural network models to provide predictive analysis. The goal is to provide an identity risk score in support of authentication using the mobile device. Finsphere uses the platform for a range of identity authentication solutions for the financial industry, transaction monitoring, and access management.
FireCompass
FireEye
(Alpha Version 0.1 – 07/26/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview FireCompass is an AI Assistant for Seccurity teams to help them prioritize security investments & simplify security buying. Headquarters FireCompass 2nd Floor, SBC Business Space 156, 27th Cross Road, Jayanagar 6th Block Jayanagar, Bengaluru, Kanataka 560070 Executives Ravi Mishra serves as Head of Product Management and Marketing. History This company was founded by Bikash Barai and Nilanjan De in 2016. Key Competitors Giga Networks, GoSecure Products and Services The capabilities of FireCompass Solution include: • Analyse security portfolio & identify flaws • Conduct benchmarking to assess how an organization stacks up against the industry • Compare security products based on taxonomy • Generate and manage RFPs Website https://www.firecompass.com/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Incident Response, Security Analytics, Network Monitoring, Endpoint Security, ICS/IoT Security, Digital Forensics Brief Overview FireEye offers a range of advanced threat prevention, security analytics, and attack mitigation solutions and platforms. Headquarters FireEye Corporate Headquarters 1440 McCarthy Boulevard Milipitas, California 95035 Tel: (877) 347 - 3393 Executives Kevin Mandia, CEO of FireEye, was previously Founder of Mandiant, which was acquired by FireEye in 2013. History Ashar Aziz founded FireEye in 2004 and served as its CEO until 2012. The company acquired Mandiant in 2013. The company is headquartered in Milipitas, California with offices in Reston, Virginia; Buenos Aires, Argentina; and Mexico. After investments from Jafco Ventures, Sequoia Capital, Juniper Networks, and Norwest, the company went public in 2013. FireEye reported $600M in business in 2014. Key Acquisitions iSIGHT Partners (2016) – Threat Intelligence Invotas (2016) – Security Orchestration nPulse (2014) – Forensics Mandiant (2014) – Incident Response Unveillance (2012) – by Mandiant Key Competitors Damballa, Fortinet, Palo Alto Networks, Stroz Friedberg Products and Services FireEye products and services can be grouped as follows: • Platform: The FireEye appliance and cloud-based Threat Prevention Platform addresses advanced cyber threats for network, email, content, mobile, forensics (AX Series), and endpoint environments. The platform is also available as an Endpoint Threat Prevention Platform. • Subscription: FireEye also provides subscription services via its FireEye Managed Defense, which offers security posture insight, guidance and remediation support on attacks, and work toward containment of attacks. • Mandiant Consulting: The Mandiant Security Consulting Service offers incident response, security assessment, and incident response program development for organizations concerned with advanced attacks. • Threat Intelligence: The FireEye Dynamic Threat Intelligence repository provides actionable information based on millions of VMS deployed worldwide. In 2014, FireEye launched FireEye as a Service. The service works by pushing virtual machines into an environment and then managing from a security center. Website https://www.fireeye.com/
Fireglass
FireLayers
Acquired by Symantec
Acquired by Proofpoint
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Fireglass isolates browser and endpoint sessions using a virtual platform. Headquarters Fireglass 4 World Trade Center Suite 2908 New York, New York 10007 R&D Headquarters 124 Ibn Gabirol street, 16th Floor Tel Aviv, 6203854 Israel Executives Guy Guzner serves as Co-Founder and CEO of Fireglass. He is a former CheckPoint executive. History Founded in 2014 by Guy Guzner and Dan Amiga, and with its roots in Israel, Fireglass emerged from stealth in 2016. The company has received $20M in Series A funding from Norwest Venture Partners, Lightspeed Venture Partners, and Singtel Innov8. Key Competitors Menlo Security Products and Services The company emerged from stealth in 2016 and is focused on investment in its enterprise cyber security platform as well as expanding its sales, marketing, and support teams in North America and Europe. The focus of the firm is protecting data from prying eyes through threat isolation. The solution is offered as an on-premise virtual appliance or cloud solution to isolate browsers, email, documents, and Web applications without altering the user experience. Website https://www.fire.glass/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview FireLayers provides a cloud access security broker (CASB) for extending the perimeter to allow access to cloud-resident apps. Headquarters FireLayers – US Headquarters 425 Broadway Street Redwood City, California 90463 Tel: (650) 242 – 9875 Executives Yair Grindlinger serves as Co-founder and CEO of FireLayers. History Yair Grindlinger and Dorin ELgressy co-founded FireLayers, emerging from stealth in 2014. YL Ventures provided seed funding. Akamai joined the funding round in 2015. Key Competitors Firehost Products and Services FireLayers provides an advanced cloud access security broker (CASB) approach called SafeZones, which extends the perimeter for access to the following cloud infrastructures: • Google Apps • Salesforce • Office 365 • Service Now • Amazon Web Services • Box • Okta • Dropbox • DaPulse Specific features include context-based controls, monitoring and visibility, adaptive security, and compliance. Website https://www.firelayers.com/
FireMon
First Cyber Security
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management Brief Overview FireMon provides a security management platform with advanced security intelligence capabilities for enterprise, government, and service provider customers. Headquarters FireMon Corporate Headquarters 8400 W. 110th Street Suite 400 Overland Park, Kansas 66210 Tel: (913) 948 – 9570 Executives Satin H. Mirchandani serves as CEO for Firemon, and was previously VP of Global Services at Dell. Jody Brazil serves as Co-Founder and Chief Product Strategist for FireMon. History FireMon is a 2004 spin-off of FishNet Security, founded by Gary Fish. FireMon was acquired in 2014 by Insight Venture Partners, which promoted Jody Brazil into the CEO role with Gary Fish becoming Executive Chairman. Key Competitors Algosec, Tufin, SolarWinds Products and Services FireMon offers a Security Intelligence Platform that is built around the following components: • Security Manager – Firewall rule assessment, real-time change detection, access path analysis, and network security visualization • Policy Planner Workflow – Firewall change process management, policy change engineering, and policy impact analysis • Policy Optimizer – Event-driven rule review, multi-factor rule use and analysis. And business process management integration • Risk Analyzer – Network attack path visualization, continuous attack surface monitoring, and security gap analysis. The platform includes APIs in a massively scalable, distributed architecture, optimized for high performance. The company offers complementary services for its platform including training. Website https://www.firemon.com/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Web Security, Brand Protection, Web Fraud Prevention Brief Overview First Cyber Security provides independent verification of a Website’s authenticity for the purposes of reducing fraud. Headquarters First Cyber Security Limited Station House Connaught Road Brookwood Woking Surrey GU24 OER United Kingdom Tel: +44 (0) 8450 564232 Executives Rod Pugh, Managing Director of First Cyber Security Limited, was previously director of Cimlinc. History First Cyber Security Limited was established in 2004. The private company is headquartered in the United Kingdom. Key Competitors MaxMind, Imperva Products and Services First Cyber Security provides fraud and on-line brand protection for Websites via the S.O.L.I.D. Authentication solution that provides “at-a-glance” indicators for both positive and negative warnings about site authenticity. The patented technology is also designed to reduce the risk of phishing. The site owner must be a subscriber to the S.O.L.I.D. Authentication capability for users to obtain the warnings. Website https://www.firstcybersecurity.com/
Fischer International
5nine Software
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Password/Privilege Management Brief Overview Fischer International provides cloud-based identity and management solutions for enterprise customers. Headquarters Fischer International Identity 9045 Strada Stell Court Suite 201 Naples, Florida 34109 Tel: (239) 643 – 1500 Executives Andrew Sroka, President and CEO of Fischer International, has been with the company since 1998. History Addison Fischer founded Fischer International and created the first PC security product rated by the National Computer Security Center (NCSC) in the 1980’s. In the 1990’s, the company created Windows 95 and Windows NT security solutions. Moving into identity and access management in the 2000’s, the company has created a global identity architecture, including technology for managed identity services. Key Competitors Sailpoint, CA, IBM Products and Services Fischer International provides an on-premise and cloud solution for identity and access management that includes the following capabilities: • Password reset and synchronization • Password express • Access termination • Self service portal • Automated role and account management • Privileged access management • Identity compliance • Federated and Web single sign on • InCommon Federation Enablement • iFly mobile identity management • Global identity architecture • Ignite Federation Website https://www.fischerinternational.com/
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Web Application Firewall Brief Overview 5nine provides a range of Microsoft cloud and virtualization management and security applications. Headquarters 5nine Software Inc. 1555 Palm Beach Lakes Blvd. Suite 750 West Palm Beach, Fl 33401 Tel: (561) 898 - 1100 Executives Scott Sanders serves CEO of 5nine. He brings with him over 20 years of experience in software-as-a-service (SaaS). History Founded in 2009, the company has offices in Palm Beach, Florida; Middletown, New Jersey; as well as Boston and Europe. Key Competitors ManageEngine Products and Services 5nine provides a range of Microsoft cloud management and security solutions supporting Hyper-V, Windows Server, and Azure Pack in the following areas; • Hyper-V Management – Includes management and monitoring for Hyper-V deployments. • Hyper-V Security – Supports secure, multi-tenant HyperV deployments, with agentless Anti-Virus and VM isolation. The company provides a PCI DSS solution for the Microsoft Cloud. • Free Hyper-V Tools Website https://www.5nine.com/
Flowmon
FlowTraq
(Alpha Version 0.1 – 06/09/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview Flowmon provides network monitoring and security solutions for the enterprise. Headquarters Flowmon Sochorova 3232/34, 616 00 Brno Czech Republic, Europe Tel: +420 530 510 600 Executives Rostislav Vocilka serves as CEO of Flowmon. Jiri Tobola serves as co-founder and VP of Sales and Alliances. History Founded in 2007, the company is headquartered in the Czech Republic. Key Acquisitions AdvaICT (2013) FerretApps (2016) Key Competitors Riverbed, Fluke Networks Products and Services Flowmon provides IP flow monitoring and network behavior analysis technology (NetFlow, IPFIX) for network visibility and security. Specific security capabilities included in the product are as follows: • Real-time network traffic visibility • Detection of operational and configuration issues • Proactive detection of threats, botnets, DDOS, and other risks undetectable by firewalls, IDS, and AV • Troubleshooting and ticket resolution Website https://www.flowmon.com/
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview FlowTraq provides insight, visibility, protection, and understanding of network infrastructures. Headquarters FlowTraq 105 Dow Street Suite 101 Manchester, New Hampshire 03104 Executives Vincent Berk serves as Co-Founder and CEO of FlowTraq. History Founded in 2004 by Vincent Berk and George Cybenko as Process Query Systems, the company is a spin-off from Dartmouth College. Key Competitors RedOwl Products and Services FlowTraq provides the following products: • FlowTraq – Provides network traffic analysis, monitoring, and visibility for real-time processing or forensic analysis. • FlowTraq Cloud – Supports exporting of flows to the FlowTraq cloud-based platform for analysis. Supported flows include NetFlow, J-Flow, CFlow, sFlow, and IPFIX. • FlowTraq Exporter – Supports free downloadable software to export NetFlow v5 or NetFlow v9. The FlowTraq solution supports multi-tenant operation for managed security services providers. Website https://www.flowtraq.com/
Flashpoint
FlawCheck
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence Brief Overview Flashpoint provides cyber ad physical threat intelligence services from the Deep and Dark Web. Headquarters Flashpoint Partners New York, New York 10003 Tel: (206) 202 – 4911 Executives Josh Lefkowitz, CEO of Flashpoint Partners, has worked extensively with federal, state, and local authorities. History Founded in 2007 and headquartered in New York, Flashpoint received $5M in Series A funding in 2015 from Tech Operators, K2 Intelligence, Greycroft Partners, Cisco Investments, and Bloomberg Beta. The company also has a presence in London. Key Competitors iSIGHT Partners (FireEye) Products and Services Flashpoint provides data and intelligence reports that leverage raw and human curated information from the Deep and Dark Web. The company employs subject matter experts to focus on the on-line channels that provide information about malicious actor behavior. Data is made available with seven days per week accessibility as well as through a RESTful API. Website https://www.flashpoint-intel.com/
Acquired by Tenable Network Security (Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview FlawCheck provides a cyber security platform that offers malware security protection for Linux containers. Headquarters FlawCheck San Francisco, California Tel: (415) 212 – 8856 Executives Anthony Bettini serves as Founder and CEO of FlawCheck. He is former founder and CEO of Appthority. History Anthony Bettini and Sasan Padidar co-founded FlawCheck in 2015. The small company is in early stages of growth. Key Competitors Twistlock Products and Services FlawCheck provides advanced security protection support for container-based virtualization. Features embedded in the FlawCheck solution include hyper scale malware detection (ensures workloads are malware free), known vulnerability detection (assures protection against known vulnerabilities), REST API (available for customers who license), and platform agnostic operation (supports Docker, Apcera). The FlawCheck solution is designed to augment Docker containers running in virtual environments. Website https://www.flawcheck.com/
Fluency
Forcepoint
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Security Information Event Management, Security Analytics Brief Overview Fluency, formerly SecurityDo, provides a product called Fluency that provides breach detection and response capabilities. Headquarters Fluency 387 Technology Drive College Park, Maryland 20742 Tel: (888) 885 -- 3569 [emailprotected] Executives Chris Jordan, Co-founder and CEO of Fluency, previously founded Endeavor Security which was acquired by McAfee. History Chris Jordan and Kun Lo co-founded SecurityDo in 2012. The small company is located in Maryland. The company changed its name to Fluency in 2015. Key Competitors Check Point, IBM, HPE, Juniper Products and Services The company, formerly known as SecurityDo, offers its Fluency product, which has the following breach detection and response features: • Correlation – Multiple levels of fused data • Proxy Awareness – Combines end-to-end and device-toproxy events • Real Time Alerts – Sends alert messages when events occur • Tagging – Tags attributes within a system Fluency provides its solutions to enterprise customers through a partnership with Lumenate. Website https://fluencysecurity.com/
(Alpha Version 0.1 – 06/13/2017 – No Vendor Approval) TAG Cyber Controls Data Loss Prevention, Security Analytics, Cloud Security, Web Security, Email Security, Next Generation Firewall, Network Security Brief Overview Forcepoint offers web and email content security, security for the Cloud (including Office 365 deployments), Insider Threat and Data Protection solutions that leverage advanced analytics and user behavior monitoring, and network security solutions. More than 20,000 organizations around the world rely on Forcepoint security solutions to protect their users, data and networks against the most determined adversaries. Headquarters Forcepoint 10900-A Stonelake Boulevard Quarry Oaks 1, Suite 350 Austin, Texas 78759 Executives Matt Moynahan serves as CEO of Forcepoint. History Forcepoint™ was formed in 2015 through the merger of Raytheon Cyber Products and Websense. The combination of organizations combined decades of experience across many domains of cyber security, from Fortune 100 enterprise to mid-sized businesses in every industry, to the world’s most highly secure defense, intelligence and law enforcement agencies. Forcepoint is headquartered in Austin, Texas. Key Acquisitions January 2016 - Acquisition of Stonesoft and Sidewinder from McAfee Products and Services Forcepoint provides a range of enterprise cybersecurity solutions for safeguarding users, data, and the networks they communicate over. Solutions include: • Web and Email content security delivered through our TRITON APX Suite and Cloud Services that offer robust protection against advanced threats (including malware, phishing and other attacks) with integrated data loss prevention. • Insider Threat and Data Protection solutions that leverage the advanced user behavior monitoring of SureView Insider Threat with the industry-leading data policy enforcement of the AP-DATA family of DLP products to protect intellectual property and compliance-controlled data against theft and leakage. • Network Security that enables thousands of our Stonesoft Next Generation Firewalls around the world, in the office, or in the cloud to be managed from a single console. • Cross Domain Access and Transfer solutions that enable information to be safely shared across networks with different levels of sensitivity. Website https://www.forcepoint.com/
ForeScout
ForgeRock
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) (Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls TAG Cyber Controls Network Access Control Identity and Access Management Brief Overview Brief Overview ForeScout provides pervasive network security through ForgeRock offers a suite of open identity and access continuous monitoring and access control of endpoints, management tools for enterprise, cloud, social, and mobile network users, and applications. systems. Headquarters Headquarters ForeScout Technologies Inc. ForgeRock – US 190 West Tasman Drive 201 Mission Street Campbell, California 95008 Suite 2900 Tel: (866) 377 – 8771 San Francisco, California 94105 Tel: (415) 523 – 0772 Executives Michael DeCesare, CEO and President of ForeScout, was Executives previously President of Intel ecuirty and Executive VP of Mike Ellis, Chairman and CEO of ForgeRock, was previously Worldwide Sales of McAfee. an executive with SAP, i2 Technologies, Oracle, and Apple. History History Doron Shikmoni and Oded Comay co-founded ForeScout in Lasse Andreson, Victor Ake, Steve Ferris, and Jonathan 2000. The company has grown to over three hundred Scudder founded ForgeRock in 2010. The private company employees. The company is headquartered in California with includes former Sun Microsystems CEO Scott McNealy as an sales contacts and/or offices in the United Kingdom, France, investor and advisor. The company has received Series A and Germany, Japan, Korea, Latin America, and Israel. Venture B funding from Accel Partners and Foundation Capital. The capital investors in ForeScout include Accel Partners, company has subsidiaries in Bristol, UK, Oslo, Norway, New Amadeus Capital Partners, Meritech Capital Partners, and Zealand, and France, with a heavy presence in the European Pitango Venture Capital. market. Key Competitors Key Competitors Bradford Networks, PacketFence, Cisco IBM, Oracle, CA, Okta Products and Services Products and Services ForeScout Technologies offers a range of products based on ForgeRock provides a platform called Open Identity Stack that its ForeScout CounterACT platform. The platform includes focuses on identity relationship management (IRM) and capabilities for network access control and endpoint security includes three core products: compliance, along with a collection of extended integration modules that allow for exchange of information between • OpenAM – Provides an open source access management CounterACT and other security products (ControlFabric), solution focused on IRM with support for authentication, integration with other products such as SIEMs, MDMs, SSO, authorization, federation, entitlements, adaptive vulnerability assessment tools, advanced threat detection authentication, strong authentication, and web services tools, McAfee ePO, and the ForeScout Mobile Security Module. security. This product is based on OpenSSO from Sun ForeScout also offers a managed service for network access Microsystems. control (NAC-as-a-Service), to control employee and guest • OpenDJ – Involves an open source Big Data platform for access to the enterprise network. the developer that combines directory security with the accessibility of a database. Website • OpenIDM – Involves an open source provisioning https://www.forescout.com/ solution targeting Internet scale applications to automate the user identity management lifecycle. • CloudConnect – Unifies enterprise and cloud identity infrastructure. • SecureConnect – No touch SSO to enterprise legacy and custom apps. • SecureAPI – Hands-free protection of mobile apps and APIs. All of these products are designed to integrate across the identity and access management lifecycle for large-scale enterprise, cloud, social, and mobile applications using open source development tools. Website https://www.forgerock.com/
Fornetix
Fortalice
(Alpha Version 0.1 – 07/26/17 – No Vendor Approval) TAG Cyber Controls Data Encyryption Brief Overview Fornetix offers an encryption management software allowing organizations to orchestrate automated and optimized policy and identity enforcement across thousands of encryption keys. Headquarters 20116 Ashbrook Place Suite 100 Ashburn, Virginia 20147 Executives Chuck White serves as CTO of Fornetix. History Fornetix was founded in 2014 by Chuck White. The small private company is headquartered in Virginia. Key Competitors Products and Services Fornetix offeres the Key Orchestration Ecosyste. This key management tool takes encryption processes and transforms them into automated solutions. The facts of this tool include: • Key Orchestration Appliance • Key Orchestration Clients • Key Orchestration Agents Website https://www.fornetix.com/
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Security Training Brief Overview Fortalice provides security consultation and training services for business and government. Headquarters Fortalice 907 E. Worthington Ave. Charlotte, North Carolina 28203-5757 Tel: (877) 487 – 8160 Executives Theresa Payton, Founder and CEO of Fortalice, was previously with the Bush Administration as the White House CIO. History Founded by Theresa Payton in 2008, the company employs a team of experts with business and government experience. Key Competitors Chertoff Group Products and Services Fortalice provides a range of cyber security services including the following: • Speaking Engagements – Includes expert speakers such as CEO Theresa Payton • Business Protection – including customizable consulting services and interactive Webinars • Government Protection – Consulting services focused on security programs in federal agencies. Consulting at Fortalice is powered by the company’s Red Ninjas, who specialize in thwarting and testing technology infrastructure. Website https://www.fortalice.com/
Fortego (Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Application Security, Penetration Testing, Digital Forensics Brief Overview Fortego provides computer network operations (CNO) software development, reverse engineering, and cyber security analysis services. Headquarters Fortego, LLC 6711 Columbia Gateway Dr. Suite 100 Columbia, Maryland 21046 Tel: (410) 844 – 4240 Executives Chad Price, Partner/Senior Research Engineer of Fortego, was previously employed by BAH and BAE. History Fortego is a small company founded in 2010. Chad Price and Eric R. are partners. The company is located in Maryland. Key Competitors Trail of Bits, Arxan Technologies Products and Services Fortego provides technical professional services in cyber security that can be grouped as follows: • CNO Software Development – Includes software development lifecycle services and support with staff expertise in Windows API, network, kernel drivers, Linux/Unix application and kernel, embedded systems, secure software, exploit development, and various languages including C, C++, x86 assembly, Python, Perl, Ruby, Java, and .NET C#. • Malware and Intrusion Analysis – Includes exploit and shell code analysis, malware, threat, and related analyses. • Reverse Engineering – Includes expert engineering services designed to determine how a given product works and why. • Vulnerability Analysis – Includes software and protocol fuzzing, exploit development, penetration testing, and embedded code analysis. • Computer and Networm Forensics – Analysts help recreate cyber attacks, assist with incident response, and perform malware analysis. • Research and Development – Includes research for customers into APT, long-term threat, automation, and other areas. Website https://www.fortegollc.com/
Forter (Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Web Fraud Prevention Brief Overview Forter provides solutions for prevention of on-line fraud through behavioral analytics and other heuristic means. Headquarters Forter HQ 12 East 49th Street New York, New York 10017 Executives Michael Reitblat, Co-Founder and CEO of Forter, served previously as VP of Product and International Operations for Pango Parking. History Founded in Tel Aviv by Michael Reitblat, Liron Damri, and Alon Shemesh in 2013, Forter is now headquartered in New York City with R&D headquarters in Tel Aviv. Sequoia Capital, New Enterprise Associates, and Commerce Ventures provided $18M in venture funding from 2014 to 2015 through Series B. The company raised $32M from Scale Venture Partners, Sequoia Capital, and New Enterprise Associates in 2016 to accelerate its growth in the US. Key Competitors RSA (Silver Tail), ThreatMetrix Products and Services Forter provides an on-line fraud prevention system that uses three layers of prevention: • Elastic Identity – Provides real-time synthesis of social networks, demographics, and other factors • Cyber Intelligence – Uses Geolocation and other detection factors • Behavioral Analysis – Uses mouse movement patterns, browsing habits, and reading patterns Website https://www.forter.com/
Fortinet
Fortscale
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform, Unified Threat Management, Email Security, Application Security, Cloud Security, Web Application Firewall, DDOS Security, Anti-Malware Tools, Endpoint Security, ICS/IoT Security, Security Information Event Management Brief Overview Fortinet offers a wide range of security fabric platform solutions including its flagship next-generation firewall for enterprise protection. Headquarters 899 Kifer Road Sunnyvale, California 94086 Executives Ken Xie, CEO of Fortinet, was also founder of NetScreen. History After the acquisition of NetScreen by Juniper, Ken and Michael Xi founded Fortinet in 2000 to address the next-generation enterprise needs. The company went public in 2009, and has grown significantly since, reporting over a billion dollars in revenue and roughly four thousand employees in 2015. Key Acquisitions TalkSwitch (2011) – VOIP, Coyote Point (2013) – Application Delivery, Meru Networks (2015) – Secure Wireless AccelOps (2016) – SIEM Key Competitors Checkpoint, Cisco, F5, Palo Alto Networks, Juniper Products and Services Fortinet provides next-generation “security fabric” for enterprise customers and service providers to address advancing threats and increasing performance requirements. Fortinet products and services can be grouped as follows: • Firewall – The FortiGate Next Generation Firewall offers protection across a wide range of network size and scope requirements. • Advanced Threat Detection – The FortiSandbox supports safe testing of suspicious code and URLs. • Wireless LAN – Fortinet Wireless LAN solutions integrate performance with security. • Secure Email Gateway – The FortiMail solution supports prevention of email threats. • Web Application Firewall – The FortiWeb WAF provides advanced protection for Web apps. • Application Delivery Controllers – FortiADC controllers support advanced application delivery. • Endpoint Protection – The FortiClient solution offers advanced endpoint protections. • SIEM – FortiSIEM capability, based on the acquisition of AccelOps. Fortinet also offers a wide range of management and reporting capabilities, as well as enterprise training, for its platform offerings. Website https://www.fortinet.com/
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Fortscale provides a platform for Big Data security analytics based on multiple enterprise data sources that focuses on detecting privilege escalation. Headquarters Fortscale 1161Mission treet #560 San Francisco, California 94103 Tel: (650) 397 - 9630 Executives Idan Tendler, Co-founder and CEO of Fortscale, was previously with Elbit Systems. History Founded in 2012, the company is headquartered in San Francisco with a research and development center in Tel Aviv, Israel. Swarth Group, Intel Capital, and Blumberg Capital provided $12M in two rounds of Seed and Venture funding. Key Competitors Cyphort, Prelert, Dtex Systems Products and Services Fortscale provides a user behavioral analytics (UBA) platform for Big Data security analytics to protect privileged access via user behavioral algorithms with the following features: • Machine Learning Algorithms • Analyst Tool Box • Analytics Environment • Visualization Tools • Multi-Platform Support • Community Sharing The platform consists of a Hadoop cluster that can be integrated with the enterprise SIEM along with a toolbox for analysis. Need customers to be collecting logs into a SIEM or repository, and the Fortscale platform focuses on detecting compromised or malicious insiders. Website https://www.fortscale.com/
4Discovery
4iQ
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics, Incident Response Brief Overview 4Discovery provides a range of digital forensics services including mobile forensics, remote forensic collection, computer analysis, and reporting. Headquarters 4Discovery 215 N. Green Street Chicago Illinois 60607 Tel: (312) 924 – 5761 Executives Chad Gough, Co-Founder and Partner in 4Dscovery, has testified extensively as an expert witness in cases related to computer forensics. History Chad Gough, Tony Balzanto, and Jeffrey Hartman are the three founding partners in 4Discovery. The small company is located in Chicago. Key Acquisitions Cyber Controls (2014) Key Competitors BitSec, Global Digital Forensics, AccessData Products and Services 4Discovery provides professional services for clients in the following areas; • Computer Forensics – Involves support for building legal cases that rely on the collection and discovery of electronic evidence. • Mobile Forensics – Based on digital trails left behind on smart phones • Electronic Discovery – Involves legal case support for data processing, data conversion, and de-duplication. • BSA Software Audits – Support Business Software Alliance (BSA) audit capabilities • Incident Response – Involves general services for incident response to cyber intrusions • Expert Services – Involves expert witness and testimony services • Digital Investigations – Utilizes the 4Discovery computer forensics lab in Chicago 4Discovery services are provided through a small core group of employees with an extensive network of key partners. Website http://www.4discovery.com/
(Alpha Version 0.0 – 08/29/17 – No Vendor Approval) TAG Cyber Controls Unified Threat Management, Threat Intelligence Brief Overview 4iQ monitors thousands of dark web sites, hacktivism forums, and black markets daily for stolen credentials, leaked personal information, and confidential documents. Headquarters 4iQ 289 South San Antonio Road, Suite 110 Los Altos, California 94022 Executives Monica Pal, CEO of 4iQ, was previously Corporate Marketing VP of AlienVault and Co-President and CMO of Aerospike. History 4iQ was founded in 2016. This private company has received $14M in funding and is headquartered in California. Key Competitors Webroot Products and Services 4iQ offers the following cyber security products. • Identity Threat Intelligence Platform – Registered identities are monitored through API and will send alerts as soon as exposures are detected. • Digital Risk Monitoring Service – Monitors the full attack surface for leaked, lost, or stolen identities and exposed confidential data for both executives and the enterprise. • OSINT+ Solution – A unified OSINT and DARKINT solution that gives public and private Intel units protection. Website https://www.4iQ.com/
4Secure
Forum Systems
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Information Assurance, Data Destruction Brief Overview 4Secure provides security consulting and training services to corporate and public sector clients across Europe. The company also provides a hardware data erasure tool. Headquarters 4Secure P.O. Box 556 Moulton Park Industrial Estate, Northampton Northamptonshire, NN3 6UN United Kingdom Tel: 0800 043 0101 Executives Peter Hoinville is the Founder and Managing Director of 4Secure. History Founded in 2003, the company is headquartered in the UK. Key Competitors Information Assurance, Ltd. Products and Services 4Secure offers a range of security consulting and information assurance services for global corporations, government departments, critical national infrastructure, financial institutions, schools, and telecoms in the following areas: • Disaster Recovery and Business Continuity • Managed Incident Response • Training • Information Assurance and Risk Management • Cross Domain Data Transfer • Data Diode • Vehicle Cyber Security 4Secure is also Owl Computing’s European sales and support partner providing secure, one-way data transfer. 4Secure also resells a portfolio of different forensic analysis tools. The company also resells Tier-3 Pty Ltd. Solutions. Website https://www.4-secure.com/
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Web Application Firewall Brief Overview As part of its API and cloud gateway technologies, Forum Systems provides identity management and SSL proxy solutions for cloud storage. Headquarters Forum Systems 75 Second Avenure, Suite 520 Needham, Massachusetts 02494 Tel: (781) 791 – 7510 Executives Mamoon Yunus, Co-Founder and CEO of Forum Systems, holds graduate degrees in engineering from MIT and Georgia Tech. History Mamoon Yunus and Rizwan Mallal founded Forum Systems, which is a wholly owned subsidiary of Crosscheck Networks, Inc. Key Competitors Elastica, Akamai Products and Services Forum Systems offers its Forum Sentry solution, which provides WAF-like secure integration across channels, applications, and infrastructure. Specific security functions enabled by Forum Sentry between cloud storage, mobile apps, user portals and SOA architectures, and the associated underlying infrastructure include: • FIPS 140-2 Security • Identity and SSO (SAML and OAuth) • Centralized Monitoring • Mediation and Data Mapping The company also offers Forum Sentry Cloud Controller, which delivers secure scale-out with leading cloud storage providers including Amazon S3, Google Cloud Storage, and Rackspace. The product offers granular data encryption to enforce privacy and integrity of stored data. Website https://www.forumsys.com/
Fox Technologies
FraudCracker
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Password/Privilege Management Brief Overview Fox Technologies provides a suite of network security and access management solutions for the enterprise. Headquarters Fox Technologies Regional Headquarters 3300 Eagle Run Drive NE Suite 202 Grand Rapids, Michigan 49525 Tel: (616) 438 – 0840 Executives Victor Shepard, CEO of Fox Technologies, has over 25 years of executive leadership in the technology industry. History The company is headquartered in San Jose and Michigan, with an office in Uppsala, Sweden that supports its UK and EMEA business. Key Competitors Symantec, IBM Products and Services Fox Technologies’ Access Management and Governance Platform provides privileged access control, compliance reporting, sudo migration, SSH control, and Active Directory bridging. The FoxT BoKS ServerControl product offers the ability to control accounts, control access, and control privilege, with emphasis on role-based access control (RBAC), user provisioning, group management, home directory control, and password management. FoxT also offers a range of professional services and technical support for its enterprise customers. Website https://www.foxt.com/
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Web Fraud Prevention Brief Overview FraudCracker provides a platform that reduces the risk of fraud through anonymous employee reporting. Headquarters FraudCracker Building 3, Sandgate Office Park 16 Desmond Street Kramerville, Sandton South Africa Tel: 0861 616 100 Tel: (855) 446 – 5269 (US) Executives Gavin Symanowitz, Founder and CEO of FraudCracker, is also founder of FeedbackRocket, the sister company to FraudCracker. History Gavin Symanowitz founded FraudCracker as an offshoot and sister company to FraudCracker, which he also founded. The company is headquartered in South Africa. Key Competitors Deloitte, 41st Parameter Products and Services The FraudCracker platform utilizes the FeedbackRocket platform, which enables 360 degree conversations between employees that would not normally occur face-to-face. The basic whistleblower capability allows for internal observers of fraud to safely and anonymously report the violations. The resumed use-case involves nominated authority figures in the company receiving notifications and alerts from reporting employees. Website http://www.fraudcracker.com/
FRSecure
F-Secure
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing Brief Overview FRSecure provides a range of security consulting services including assessments, audits, strategic security, and virtual CISO. Headquarters FRSecure LLC 5909 Baker Road, Suite 500 Minnetonka, Minnesota 55345 Tel: (888) 676 – 8657 Executives Evan Francen, President of FRSecure, spent 15 years as a leading information security professional and corporate leader. History Founded in 2008 by Evan Francen, the small company is headquartered in Minnesota. Key Competitors Savanture Products and Services FRSecure provides a range of security consulting services that can be grouped as follows: • Security Assessments – Includes NIST 800-53, ISO 27002, penetration testing, and other services • Security Audits – Includes PCI DSS, IT Audit, FIPS/FISMA, HIPAA, and other standards • Development/Consulting – Includes security policy creation, vendor risk management, social engineering, and PCI compliance • Management – Incudes virtual CISO services and security management and reporting Website https://www.frsecure.com/
(Alpha Version 0.1 – 06/13/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools, Mobile Security, VPN/Secure Access, Mobile Security Brief Overview F-Secure provides a range of anti-virus, Internet security, and mobile security products for companies and individuals. Headquarters F-Secure Corporate Headquarters Tammasaarenkatu 7 00181 Helsinki Finland Tel: 358 9 2520 0700 Executives Samu Konttinen, President and CEO of F-Secure, worked previously as EVP of Corporate Security, Consumer Security, Customer and Market Operations of Mobile Business Unit . History Risto Siilasmaa and Petri Allas founded Data Fellows in 1988, later changing the name to F-Secure in 1999. F-Secure has grown to nearly 1000 employees and is listed on the NASDAQ OMX Helsinki Ltd. The public company is headquarters in Helsinki, Finland with offices in Denmark, Italy, France, The Netherlands, Poland, Spain, UK, Mexico, Brazil, Malaysia, Australia, India, Japan, Singapore, and Palo Alto, California. Key Competitors McAfee , Kaspersky, Symantec, Trend Micro Products and Services F-Secure provides a range of anti-virus, Internet security, and mobile security product solutions that can be grouped as follows: • SAFE – Protects any device, including computer, smartphone, or tablet using cloud-based security against viruses, spyware, hacker attacks, and identity theft. Also provides harmful Website blocking. • Freedome – An app that provides malware protection, anti-tracking services, and VPN for encrypting connections. • Younited – Secure personalized cloud that provides common access to existing cloud service such as Dropbox, Facebook, and Google Picasa. • Internet Security – Protection against malware, hacking, and identity theft for surfing, shopping, banking, and using social media. • Mobile Security – Protects mobile device content and identity, surfing and shopping, missing devices, and applications. • Anti-Virus – Basic virus and malware protections for PC and Mac • Child Safe – Protects children from on-line threats • Key – Stores passwords, user names, and other credentials. F-Secure also maintains a research lab and offers free tools on the Internet for researchers and security teams. Website https://www.f-secure.com/
FTI Consulting
Futurex
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Digital Forensics Brief Overview FTI is a global business advisory company with a practice in forensic consulting and eDiscovery services. Headquarters FTI Executive Headquarters 555 12th Street NW Suite 700 Washington, DC 20004 Tel: 9202) 312 – 9100 Executives Steven Gunby, President and CEO of FTI Consulting since 2014, was previously an executive with The Boston Consulting Group. History Dan Luczak founded Forensic Technologies International Ltd. In Annapolis, Maryland in 1982. After providing forensic information in the famous OJ Simpson trial, the company went public in 1996, trading on the NASDAQ. In 1999, the company began trading on the NYSE under the symbol FCN. By 2013, the company had grown to $1.65B in revenue with more than 4,200 employees in 26 countries. Key Acquisitions FS Asia Advisory Ltd (2010) – Advisory Services Korda Mentha (2012) – Advisory Services Think First (2012) – Healthcare Key Competitors Deloitte, PwC Products and Services The security-relevant services offered by FTI Consulting include eDiscovery Software and Services, eDiscovery Consulting, Computer Forensics and Investigations services, Global Risk and Investigations, and Compliance, Monitoring, and Receivership. FTI Consulting provides disaster management and has been active in supporting litigation using forensics, data collection, and other professional services. Website http://www.fticonsulting.com/
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview Futurex provides secure data encryption and key management solutions available in hardware or software. Headquarters Futurex Engineering Campus 864 Old Boerne Road Bulverde, Texas 78163 Tel: (830) 980 – 9782 Executives Brett Smith, President and CEO of Futurex, has been with the company since 2001. History Futurex was founded in 1981. The company is headquartered in Texas with an office in Singapore. Key Competitors Portico, Entrust, RSA Products and Services Futurex provides data encryption product solutions that can be grouped as follows: • Hardware Security Modules (HSMs) – Designed as FIPS 140-2 Level 3 and PCI HSM-validated security and fraud protection encryption devices for retail and banking transactions. Models include Authenticrpyt, Excrypt SSP9000 (2,250 transactions per second), Excrypt SSP9000 Enterprise (8,000 transactions per second), Guardian9000 (centralized cloud-based cryptographic management), and Securus (portable, touch screenbased key loading and remote configuration). • Key Management Servers (KMS) – Scalable enterprise key management solutions including KMES Series (Certificate lifecycle management), RKMS Series (scalable key management), SKI9000 (key injection for point of sale terminals), and Securus. • General Purpose Encryption Devices – Includes Kryptos TLS Server, Certificate Authority Server, and SAS Secure Attached Storage. • Manufacturer Class Encryption Solutions - Includes manufacturer-class CA, Secure Attached Storage, and Device Activation server. • CryptoCube – Consolidated hardware enterprise security platform. Website https://www.futurex.com/
GajShield
Galaxkey
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform, Data Leakage Prevention, Cloud Security Brief Overview GajShield provides a range of network security products including next generation firewalls, DLP, and cloud security. Headquarters GajShieldINfotech (I) Pvt. Ltd 4, Peninsula Center Dr. S.S. Rao Road Parel, Mumbai, India 400 012 Tel: +91 (22) 6660 7450 Executives Sonit Jain, CEO of GajShield, was previously technical head of the team that built IndiaWorld, India’s first Web portal. History Founded in 2002, GajShield was the first Indian firewall company to receive ICSA Firewall Certification. The company is headquartered in Mumbai. Key Competitors Palo Alto Networks, Fortinet Products and Services GajShield provides a range of network security products to customers primarily in India. Specific products include the following: • Next Generation Firewall – Includes the GS series products for small, medium, and large enterprises • Data Leakage Prevention – Includes a context sensitive DLP system for outbound leakage prevention • Cloud Security – Consists of a cloud-based service for customers to enforce network security policies • Application Filtering – Includes Deep Packet Inspection (DPI) for real-time, Layer 7 filtering • BYOD Security – Based on the GajShield Object Oriented Policy Security Management GajShield SecureLabs Distributed Behavioral Analysis (DBA) supports company products and services. Website https://www.gajshield.com/
(Alpha Version 0.1 – 07/27/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview Galaxkey provides an encryption platform enabling users to encrypt all email and file data. Headquarters Galaxkey Limited The Grange Neasden Lane, London United Kingdom Galaxkey Inc. Monarch Plaza 3414 Peachtree Road, N.E. Suite 1600 Atlanta, GA 30326 Tel: (404) 987 - 0220 Executives Randhir Shinde serves as CEO of Galaxkey. History This small company was founded in 2010, and is headquartered in London, England. They have additional offices in the US, Singapore, Saudi Arabi, Denmark, and Austria. Key Competitors FutureX, Fornetix Products and Services GalaxKey offers an encryption platform that protects an enterprise’s confidential information. Their encryption products include: • Email Encryption • Document Encryption • Cloud Encryption • Secure Sharing Website http://www.galaxkey.com/
Galois (Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Security R&D, Security Consulting Brief Overview As part of its computer science and mathematics services, Galois provides R&D in several areas of computer security. Headquarters Galois 421 SW 6th Avenue Suite 300 Portland, Oregon 97204 Tel: (503) 626 – 6616 Executives Rob Wiltbank joined Galois as CEO in 2013. Prior to Galois, he was a professor at Willamette University teaching entrepreneurship. History John Launchbury, current Chief Scientist of Galois, founded the company in 1999. The small company is headquartered in Portland, Oregon. Key Competitors Adventium Labs, D-Risq Products and Services Galois offers professional services focused on developing software to solve their clients’ hardest problems in the following areas: Basic research applied research, development, and consulting. Areas of technology focus include: • Cryptography • Human Computer Interaction • Software Correctness • Scientific Computing • Mobile Security • Machine Learning • Cyber Physical Systems • Computer Security Galois is also active in the open source software community with a range of different software packages made freely available. Website https://www.galois.com/
Garner Products (Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Data Destruction Brief Overview Garner Products provides a range of degaussers and data destruction products for physical media. Headquarters Garner Products 10620 Industrial Avenue Suite 100 Roseville, California 95678 Tel: (800) 624 – 1903 Executives Ron Stofan serves as President of Garner Products History The small company has been in business for forty years and is in Roseville, California. Key Competitors Data Devices International Products and Services Garner Products offers a range of different degaussing equipment with varying degrees of size, capability, and cost. Specific products include the TS-1 Hard Drive and Tape Degausser, PD-5 Physical Hard Drive and Solid State Media Destroyer, and HD-2 Hard Drive and Tape Degausser. Garner Products are consistent with PCI DSS, NIST SP800-36, and other security frameworks. Website http://garner-products.com/
gateprotect
GBprotect
Acquired by Rohde & Schwarz
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services Brief Overview GBProtect is a managed security service provider offering security operations and applications management as well as consulting. Headquarters GBProtect 6892 s. Yosemite Ct. Suite 3-201 Centennial, Colorado 80112 Tel: (303) 488 – 2610 Executives Mel Holstrom, Founder and CEO of GBProtect since 2002, previously co-founded Integrated Consulting Solutions. History GBProtect was founded in 2002. The small, private company is headquartered in Colorado. Key Acquisitions Metis Security (2011) – Emergency Communications Key Competitors CSC, Dell, HPE, IBM, Trustwave Products and Services GBProtect provides managed security services using customized device and technology selection with dedicated consultation for customers in the following areas of specialization: • Security Operations – This includes personalized enterprise security event management, centralized log management, health and availability monitoring, ondemand incident handling, and security device management. • Application Security – Includes support for application code reviews application testing, and operational monitoring of hosted applications. • Strategic Consulting – Includes identity and access management, on-demand security engineering, and security program development. GBProtect solutions ensure full compliance support for HIPAA, PCI, FDIC/FFIEC, SOX, and GLBA. Products supported include Palo Alto Networks, Sourcefire, and Checkpoint. Operations are handled through an on-site 24/7/365 security operations center in Colorado. Website http://www.gbprotect.com/
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Unified Threat Management, Firewall Platform Brief Overview The suite of security solutions offered by gateprotect includes unified threat management (UTM) appliances, next generation firewalls, and VPNs products. Headquarters Rohde & Schwarz Cybersecurity GmbH Mühldorfstraße 15 81671 München Germany Tel: +49 30 65 884 - 223 Executives Ammar Alkassar serves as CEO of Rohde & Schwarz. History The Rohde & Schwarz Group, a public electronics supplier, acquired the gateprotect GmbH organization in 2014. The German company sells its products in the US through an authorized reseller, gateprotectUSA, a division of Virtual Graffiti, located in Irvine California. Gateprotect is a Rohde & Schwarz Company. Key Competitors Palo Alto Networks, Juniper, Cisco, Fortinet Products and Services The suite of security product solutions for enterprise perimeter security offered by gateprotect can be grouped as follows: • Unified Threat Management – gateprotect offers several UTM appliance solutions that include firewall, VPN IPSec, UTM, and IDS/IPS capabilities in varying throughputs ranging from hundreds of Mbps to thousands. Models include the low end GPO 100 up to the highest end GPX 850. Market focus is the small and medium sized business user. • Next Generation Firewalls – The gateprotect GPZ series of products are next generation firewalls that also support VPN, UTM, and IDS/IPS. The gateprotect eGUI interface for managing and administering firewalls, UTMs, and other devices is designed to offer a visual means for simplifying the task. Additional products include VPN clients, endpoint security, virtual appliances, and a W-LAN module. Security consulting services are also available from gateprotect. Website https://cybersecurity.rohde-schwarz.com/en
GB & Smith
G DATA
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Application Security, Governance, Risk, and Compliance (GRC) Brief Overview GB & Smith provides solutions for administering and managing security policies on enterprise applications such as SAP and Oracle. Headquarters GB & Smith 50 Milk Street Boston, Massachusetts 02109 Tel: (617) 319 – 3563 Executives Sebastien Goiffon serves as CEO of Co-Founder of GB & Smith. History Founded in 2008 by Sebastien Goiffon and Alexandre Biegala, the company has grown to fifty staff in eight years. The company has presence in Boston, London, Lille, and Grenoble. Key Competitors Onapsis Products and Services GB & Smith provides a suite of self-service solutions for GRC, security administration, and management of security policies on enterprise applications. In scope applications include SAP BusinessObjects, SAP HANA, IBM Cognos, Microsoft Windows Active Directory, Microsoft SharePoint, Oracle Database, OBIEE, and Tableau. The platform is called 360Suite and it includes support for auditing, backup, administration, versioning, compliance, and other functions. Website http://www.gbandsmith.com/
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools Brief Overview G DATA offers a suite of anti-virus and Internet security solutions for enterprise customers and individuals. Headquarters G DATA Software AG Konigsallee 178 44799 Bochum, Germany Executives Kai Figge and Andres Lüing serve as Managing Directors of G DATA. History Kai Figge and Frank Kuhn created G DATA in 1986 as a provider of virus protection for the ATARI computer. The company grew through the 80’s and 90’s, converting to a public company in 2000. The company has since expended to support customers in over sixty countries. Key Competitors Kaspersky, Symantec, McAfee , Trend Micro, F-Secure Products and Services G DATA provides its anti-virus and Internet security products in the following categories: • Private User – Includes Anti-Virus, Internet Security, Internet Security for Android, and Anti-Virus for Mac • For Business Customers: - Includes Anti-Virus Business, Client Security Business, Endpoint Protection Business, and Small Business Security The company provides its solutions as shrink-wrapped software and is supported through research in the G DATA SecurityLabs. Website https://www.gdatasoftware.com/
Gemalto
General Dynamics
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Mobile Security, Embedded Security, CA/PKI Solutions, Mainframe Security, Two-Factor Authentication, Identity Protection Brief Overview Gemalto provides a range of digital security solutions ranging from biometrics, to subscriber identity module (SIM) card development, to protection of near-field communication (NFC). Headquarters Gemalto N.V. Barbara Strozzilaan 382 1083 HN Amsterdam the Netherlands Tel: +31 20 562 06 80 Executives Philippe Vallée serves as CEO of Gemalto. History Gemplus was created in 1988 as a supplier of prepaid phone cards. Gemplus completed an IPO in 2000. Axalto was an IPO spin-off of Schlumberger in 2004. Gemplus and Axalto merged in 2006 to form Gemalto with focus on making personal digital communications secure. The company has presence in France, Singapore, and Texas. Key Acquisitions DS3 (2013) – Authentication SafeNet (2014) – Data Protection Key Competitors Ingenico, NXP Products and Services Gemalto’s digital security solutions include software, services, consultation, and training for financial services, government, identity and access, machine to machine, telecommunications, and transportation in the following areas: • Biometrics • e-Banking • e-Health • Electronic ID • EMV • Mobile Marketing • Mobile Payment • NFC • Strong Authentication Website https://www.gemalto.com/
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Information Assurance, Voice Security, Security Consulting Brief Overview As part of its comprehensive portfolio focused on government agencies, General Dynamics provides cyber security and information assurance products and services. Headquarters General Dynamics Information Technology 3211 Jermantown Road Fairfax, Virginia 22030 Tel: (703) 995 – 8700 Executives S. Daniel Johnson serves as EVP of the General Dynamics Information Systems and Technology Group. History General Dynamics is an American aerospace and defense contractor that trades on the New York Stock Exchange. It acquired Fidelis Cybersecurity Systems in 2012 and then sold the unit off in 2015. Key Competitors Northrop Grumman, Lockheed Martin, Boeing Products and Services General Dynamics provides cyber security services, products, and expertise focused primarily on government agencies. Additional offered capabilities are intelligence, surveillance, and reconnaissance. Specific cyber security and IA capabilities include the following: • Requirements, Architecture, and Engineering • Security Operations • Managed Security-as-a-Service • Cyber Operations Training Website https://www.gdit.com/
Genians
GeoLang
(Alpha Version 0.1 – 07/27/17 – No Vendor Approval) TAG Cyber Controls Network Access Control Brief Overview Genians offers re-imagened network access control for the World of IoT. Headquarters 50 High Street, Suite 45 North Andover, MA, 01845 Tel: (617) 307 - 4090 Executives Kyeyeon Kim serves as Founder and President of Genians. History Genians was founded by Kyeyon Kim in 2005. They are headquarted in North Andover Massachusetts, with addiotnal offices in South Korea. Key Competitors Great Bay Software, Impulse Point Products and Services Genian offers the Genian NAC through either the cloud, onpremises, or through your hardware. This can be broken down into two products: • Genian NAC Cloud: Oversees initial installation, security, and maintenance of your policy server in the cloud • Genian NAC Software: host Genian NAC solution on your local server or private services Website https://www.genians.com/
(Alpha Version 0.1 – 06/14/17 – No Vendor Approval) TAG Cyber Controls Data Leakage Prevention Brief Overview GeoLang offers a suite of cyber security solutions including the Ascema DLP platform. Headquarters GeoLang Ltd. Cardiff Business Technology Centre Senhennydd Road Cardiff CF24 4AY United Kingdom Tel: 02920 647012 Executives Debbie Garside, Co-Founder, CEO, and Managing Director of GeoLang, is a twenty-five-year veteran of cyber security and business resilience. History Debbie Garside and Lee Gillam co-founded GeoLang in 2006. The private company is headquartered in the UK. Key Competitors Fox-IT Products and Services GeoLang provides the Ascema data leakage prevention (DLP) platform that protects sensitive information at the content level. The platform identifies, tracks, and classifies information as it traverses an enterprise. Fingerprint technology and analysis are used to provide the DLP solution. Ascema can be used with Amazon Web Services and Box. Website https://www.geolang.com/
GFI Software
Gigamon
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Email Security, Anti-Malware Tools, Data Leakage Prevention, Security Information Event Management Brief Overview GFI Software offers IT products and services including email security services and managed anti-virus. Headquarters Triology HQ 401 Congress Ave. #2650 Austin, Texas 78701 Tel: (919) 379 – 3397 Executives Scott Brighton, CEO of GFI Software, was previously with Aurea Software. History Founded in 1992, GFI Software, which is backed by Insight Venture Partners and Bessemer Venture Partners, had planned an IPO in 2013, but postponed the action. The company is headquartered in Luxembourg with offices in North Carolina, Florida, UK, Austria, Australia, Malta, Hong Kong, and Romania. Key Competitors McAfee , Symantec, Websense Products and Services GFI Software offers a range of IT products and services for small to mid-sized companies, as well as managed service providers. The security related products offered by GFI Software include the following: • GFI MailEssentials Online – Includes cloud-hosted security for email as well as anti-Spam capabilities. • GFI EndpointSecurity – Includes protection of USB sticks, iPods, and other endpoint devices. • GFI LANGuard – Involves network security scanning and patch management. • GFI WebMonitor – Includes Web security, monitoring and Internet access control • GFI EventsManager – Log management and analysis capabilities. Website https://www.gfi.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview Gigamon provides a range of network monitoring, analytics, and management solutions including security. Headquarters Gigamon 3300 Olcott Street Santa Clara, California 95054 Tel: (408) 831 – 4000 Executives Paul Hooper serves as CEO of Gigamon. He was previously an executive with Extreme Networks. History Founded by Ted Ho and Patrick Leong in 2004, the company was supported through Series A in 2010 with $$22.8M from Highland Capital Partners. Gigamon went public in 2013 and trades on the NYSE. Key Competitors Cisco Products and Services Gigamon provides a range of network monitoring and management solutions that can be grouped as follows: • Traffic Intelligence – GigaSMART platform offers network infrastructure monitoring and intelligence generation. • Visibility Fabric – GigaVUE offers levels of visibility including virtual and aggregated • Fabric Management – GigaVUE-FM provides management capabilities for network infrastructure including virtual • Network Taps – G-TAP comes in a variety of different series supporting passive fiber, high density optical, bidirectional 40Gb, and active network. Website https://www.gigamon.com/
GigaNetworks
GigaTrust
(Alpha Version 0.1 – 06/019/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview GigaNetworks provides value added resale (VAR) security solutions to businesses with emphasis on the Florida enterprise marketplace. Headquarters GigaNetworks 835 NE 79th Street Miami, Florida 33138 Executives Pilar Somoza, CEO of GigaNetworks, is a Cuban American who was separated with her mother from her father in the early days of the Castro regime. History Originally founded in 1999, the company focused on security solutions in 2008. Headquartered in Miami, the company has presence in Miami Shores, Delray Beach, Orlando, Tampa, Warwick, and Atlanta. Key Competitors AccessIT Products and Services GigaNetworks provides Value Added Resale (VAR cyber security solutions through partnerships with Palo Alto Networks, Blue Coat, Aruba Networks, Brocade, Fortinet, Juniper, McAfee , Exinda, F5, LogRhythm, Websense, Proofpoint, Nordic Edge, Meraki, and Skybox Security. Areas of product focus include firewalls, proxy appliances, WAN acceleration solutions, and IDS/IPS solutions. Website https://www.giganetworks.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Email Security, Data Encryption, Content Protection Brief Overview GigaTrust provides enterprise rights management solutions built on the foundation of Microsoft’s Rights Management Services (RMS). Headquarters GigaTrust Headquarters 607 Herndon Parkway, Suite 302 Herndon, Virginia 20170 Tel: (703) 467 – 3740 Executives Robert Bernardi, Founder, Chairman, President, and CEO of GigaTrust, has many years experience in the technology and document imaging fields. History Robert Bernardi founded GigaTrust in 2001. The company is headquartered in Herndon, Virginia with an office in Madrid, Spain. GigaTrust received an initial venture round of $15.2M in 2007, and a Series E round in 2008 of $11M from Stanford Financial Group, Atlantic Capital Group, and Kirnaf LTD. Key Competitors EMC (Documentum) Products and Services GigaTrust offers enterprise rights management solutions that extend the Microsoft Rights Management Services (RMS). Specific products offered include the following: • Desktop Client – Content protection for multiple file formats and native viewing for both Microsoft and nonMicrosoft file types. • Mobile – Support for BlackBerry and iOS Devices • Enterprise Plus – RMS enterprise management and administration • Protector – For SharePoint and Open text • Dynamic File Folders – Rights-enables file shares • eDiscovery Agent – Facilities electronic discovery • Connector for CA Siteminder – Supports CA product Website https://www.gigatrust.com/
Glasswall Solutions
Glimmerglass
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Email Security Brief Overview Glasswall provides email security protection that analyzes file extensions and for security implications. Headquarters Glasswall Solutions 18A St. James Place London, SW1A 1NH Tel: +44 (0) 203 814 3890 Executives Greg Sim serves as CEO of Glasswall Solutions Nick Banks serves as VP Global Sales. History Headquartered in London, the privately held company has a presence in New York City. Steve Katz, former financial services CISO serves on the advisory board. Key Competitors Proofpoint, McAfee Products and Services Glasswall Solutions offers email file extension and type threat protection with emphasis on content assurance, advanced threat protection, and avoidance of file-based attacks. The solution is available as a cloud capability, a software solution, or integrated with a consulting service. The capability involves sanitization of files as they traverse from one network or cloud to another. This provides a means for assuring content and document security between public and private clouds. Company analyzes files via a security engine that looks at original manufacturers specification. Includes PDF, Microsoft, and several other file types. Website https://www.glasswallsolutions.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview Glimmerglass provides solutions for collecting actionable security intelligence directly from optical networks. Headquarters Glimmerglass 26142 Eden Landing Road Hayward, California 94545 Tel: (510) 723 – 1900 Executives Chusak Siripocanont, CEO of Glimmerglass, was previously SVP of Engineering, Manufacturing and Quality at Omnicell. History Glimmerglass was established as a start-up in 1999, bringing Robert Lundy in as Chief Operating Officer in 2004. The company’s technology has always been linked with the type of mission one finds in intelligence agencies such as the NSA. Glimmerglass expanded its business in the lawful intercept area to seven international customers outside the US in Germany, Israel, Asia, and the UK. The company has received several rounds of undisclosed private seed funding in the area of $17.6M. Key Competitors Boeing (Narus), PacketSled Products and Services Glimmerglass provides product solutions for gathering actionable cyber security intelligence directly from optical networks. The product offerings can be grouped as follows: • Path Manager – An Element Managements System for Glimmerglass Intelligent Optical Systmes. The sobftware is installed on a server or virtual machine, and then provides a browaser-based graphical user interface. • Intelligent Optical Systems – Platform for management of optical network and connections. The Intelligent Peripheral System 3000 provides amplification and signal distribution. Website https://www.glimmerglass.com/
Global Cyber Risk
Global Data Sentinel
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Global Cyber Risk (GCR) provides advisory services to business and government in privacy, security, and related areas. Headquarters Global Cyber Risk LLC 5125 MacArthur Boulevard, NW Third Floor Washington, DC 20016 Tel: (202) 537 – 5070 Executives Jody Westby, CEO of Global Cyber Risk, has an extensive background including senior managing director of PwC as well as launching of In-Q-Tel. History Global Cyber Risk includes an array of principals with extensive backgrounds in cyber security, government, and business. Originally formed as 2000 as The Work-IT Group, the organization renamed itself GCR in 2005. Jody Westby is an industry leading authority on cyber risk management, especially as it relates to board and senior management governance. She is also closely related to Carnegie-Mellon University. Key Competitors Chertoff Group Products and Services The advisory services offered to business and government management teams and executive boards by the principals of Global Cyber Risk (GCR) include the following: • Privacy – Includes privacy breach assessment, privacy audits, and other activity. • Security – Includes security program gap analysis, incident response planning, and related areas. • Investigations – Cybercrime investigation and cyber breach management • Governance – Emphasis on boards and senior management teams • Risk Assessments – Focus on business process and systems analysis Website http://globalcyberrisk.com/
(Alpha Version 0.1 – 08/23/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Identity and Access Management Brief Overview Global Data Sentinel provides data security for any cloud service provider, including private networks, making a platform able to fit in to any existing enterprise network solution. Headquarters Global Data Sentinel 31 W 34th Street 7th Floor New York, NY 10001 Tel: (212) 629 – 1005 Executives John Galinski, CEO of Global Data Sentinel, was previously CIO of Geller & Company. History Global Data Sentinel was founded in 2014. This private company is headquartered in New York. Key Competitors Ionic Products and Services Global Data Sentinel provides solutions such as hybrid cloud security, secure collaboration, email encryption, data backup and recovery, data encryption, key encryption, identity management, and audit data and reporting. Website https://www.globaldatasentinel.com/
Global Digital Forensics Global Knowledge (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics Brief Overview Global Digital Forensics provides a range of digital forensic and eDiscovery software and services. Headquarters Computer Forensic Services of NY 1500 Broadway New York, New York 10036 Tel: (800) 868 – 8189 Executives Joseph Caruso, Founder, CTO, and CEO of Global Digital Forensics, served in an advisory capacity for national cyber security councils for two US Presidents. History The private company was founded by Joseph Caruso in 1992 and has grown to support a large customer base in many different office locations across the US, Europe, Asia, and South America. Key Competitors BitSec, AccessData Products and Services The products and services offered by Global Digital Forensics can be grouped as follows: • Computer Forensics – Includes analysis of computers, disk drives, email, social media, smart phones, databases, and digital devices. • Breach Response – Includes support for responding to cyber attacks from internal and external threats. • Computer Security – Includes vulnerability assessment, penetration testing, disaster recovery, application security, DDOS protection, and mainframe security. • Software – Includes the DBRT (Data Breach Response Toolkit) and the C-ALL monitor for user activity recording. • eDiscovery – Includes forensic readiness assessment, electronically stored information (ESI) collection, database eDiscovery, and expert witness testimony. Website https://www.evestigate.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview In addition to IT, business, and project training, Global Knowledge offers a cyber security training portfolio including support for certifications and product-specific skills. Headquarters Global Knowledge 11000 Regency Parkway Cary, North Carolina 27518 Executives Sean J. Dolan was appointed President and CEO of Global Knowledge in 2015. History Founded in 1995, the company is headquartered in North Carolina with Canadian headquarters in Toronto and EMEA headquarters in the UK. Training centers are located around the US and many countries. Global Knowledge employs 1700 people worldwide. Key Competitors Global Learning Systems Products and Services Global Knowledge provides an extensive course catalog, certification preparation, and many related training resources to its global clients. Cyber security courses and training include CISSP certification prep, Cyber Security Foundations, and many vendor-specific courses for tools from companies such as Palo Alto Networks and Cisco. Website https://www.globalknowledge.com/
Global Learning Systems Globalscape (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview Global Learning Systems provides a range of security awareness and customized eLearning services. Headquarters Global Learning Systems 6030 Daybreak Circle, STE A150 #116 Clarksville, Maryland 21029-1642 Tel: (866) 245 - 5224 Executives Larry Cates serves as President and CEO of Global Learning Systems. History Global Learning Systems (GLS) has over 25 years experience providing training and blended learning. The company is a veteran-owned business under GSA contract with offices in Maryland and Virginia. Key Competitors IANS, SANS Products and Services Global Learning Systems provides a range of training services that can be grouped as follows: • Security Awareness Training • Phishing Awareness • Training and Exploit Testing • Secure Coding (OWASP) Training • HIPAA and PCI DSS Training • Security Role-Based Training Website https://www.globallearningsystems.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing Brief Overview Globalscape supports managed, secure file transfer solutions for enterprise. Headquarters Globalscape 4500 Lockhill-Selma, Suite 150 San Antonio, Texas 78249 Tel: (800) 290 – 5054 Executives Matt Goulet serves as President and CEO of Globalscape. History Founded in 1996 as a subsidiary of American Telesource Incorporated, the public company is headquartered in San Antonio. Key Acquisitions Availl (2006) – File collaboration TappIn (2011) – Mobility solution Key Competitors IBM, Cleo Products and Services Globalscape offers a range of secure file transfer and sharing solutions for the enterprise including the following: • Managed File Transfer • Secure Managed Email • File Sync and Share • Enterprise Collaboration • Secure FTP • Secure Mobile File Sharing • Consumer File Transfer Website https://www.globalscape.com/
GlobalSign
Gluu
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls CA/PKI Solutions Brief Overview GlobalSign is a certification authority providing PKI-based products and services for enterprise, business, and service providers. Headquarters GMO GlobalSign – US Two International Drive, Suite 150 Portsmouth, New Hampshire 03801 Tel: (603) 570 - 7060 Executives Ichiro Chujo, Group President and Chief Executive Officer of GlobalSign, holds an additional position as officer of the public GMO Cloud organization, parent of GlobalSign. History Founded in 1996, the company is a subsidiary of GMO Cloud K.K. in Japan and has offices in the Americas, Europe, Middle East, and Asia Pacific. Its headquarters are in Maidstone, UK. Key Competitors Comodo Products and Services GlobalSign provides a range of Certification Authority products and services that can be grouped as follows: • PKI Products – Includes public key operation (PKO) solutions for enterprise, small business, and service providers. Specific capabilities include auto enrollment gateways, EPKI for mobile, strong authentication, S/MIME, and document sharing, managed SSL, trusted root, code signing certificates, and times tamping services. • SSL – Includes a range of different SSL certificates from low assurance DomainSSL to higher assurance ExtendedSSL. GlobalSign has an extensive partner program through which SSL certificates are made available to hosting customers. Website https://www.globalsign.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Gluu provides an open source or on demand, standards-based identity and access management capability for enterprise. Headquarters Gluu 600 Congress Ave. Floor 14 Austin, Texas 78701 Executives Michael Schwartz, Founder and CEO of Gluu, has been an entrepreneur and identity specialist for nearly two decades. History Michael Schwartz founded Gluu in 2009 to focus on open source identity and access management. The small private company is headquartered in Austin. Key Competitors ForgeRock Products and Services Gluu offers open source and on-demand identity and access management capabilities for enterprise customers. Through the OX project, Gluu has created the Gluu Server Stack, which combines open source with a web-based management system (oxTrust) and an OpenID Connect based implementation of OAuth2 (oAuth). All of the code for this system is made available via the OX wiki. Gluu also builds, operates, and supports Gluu servers for customers as a security service. Website https://www.gluu.org/
Good Harbor
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Information Assurance Brief Overview Good Harbor Security Risk Management provides a range of consulting services focused on risk, threat, strategy, governance, and management. Headquarters Good Harbor Security Risk Management LLC 2020 K Street, NW Suite 620 Washington, DC 20006 Tel: (202) 212 – 6680 Executives Richard Clarke, Founder, Chairman, and CEO of Good Harbor, was previously senior White House Advisor to three Presidents. History Richard Clarke founded Good Harbor in 2003 as Good Harbor Consulting LLC. The firm has since focused on security risk management. Key Competitors Chertoff Group Products and Services Good Harbor works with senior corporate executives, investment professionals, and government leaders to assess and develop cyber security programs. Good Harbor offers cyber risk management and consulting services in the following areas: • Threat Awareness • Risk Assessment • Crisis Management and Communications • Regulatory and Policy Analysis • Thought Leadership • Investment Diligence Website https://www.goodharbor.net/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Cloud Security, Infrastructure Security, Email Security, Secure File Sharing, Anti-Malware Tools, Mobile Security, Content Protection, Security R&D Brief Overview Google provides a range of identity, cloud, email, and infrastructure security solutions as part of its search, email, operating system, cloud, and virtual services. Headquarters Google 1600 Amphitheatre Parkway Mountain View, California 94043 Executives Larry Page serves as CEO of Google. Gerhard Eschelback serves as CISO of Goggle. History Google is a technology company founded in 1998. It includes a division focused on Google Business Services, which offers security through acquisitions such as Postini. Key Acquisitions GreenBorder (2007) – Security Postini (2007) – Email Security reCAPTCHA (2009) – Security WideVine (2010) – DRM Zynamics (2011) – Security VirusTotal (2012) – Anti-Malware Impermium (2014) – Web Security Divide (2014) – Mobile Device Management Spider.io (2014) – Anti-click Fraud SlickLogin (2014) – Internet Security Key Competitors Yahoo, Verizon Products and Services Google’s massive assortment of search, email, mobile operating system, and related products and services (organized under the Alphabet umbrella) are well known. The company has used its presence and capabilities to expand into related areas of identity and access management, cloud security, email security, operating system security, and infrastructure security. Its identiy service, for example, is designed to utilize Google login as the basis for federating the identity to other services in the cloud. Google’s BeyondCorp initiative is a creative means for perimeter-free enterprise networking and the company is working to productize several of the features. Device inventory management and certificatebased security are the key aspects of the BeyondCorp approach. The company’s VirusTotal is a free resource useful to malware researchers. Website https://www.google.com/
GoSecure
GrammaTech
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing, VAR/Security Solutions Brief Overview GoSecure provides a range of security consulting and managed security services. Headquarters GoSecure 800, Rene-Levesque O Blvd., Suite 1860 Montreal, Quebec H3B 1X9 Canada Tel: (514) 287 - 7427 Executives Pascal Fortin, President and Chairman of the Board of GoSecure, has been in IT services since 1997 when he started his first consulting firm at age 17. History Founded in 2002, the company is headquartered in Canada. Key Competitors Optiv, Trustwave Products and Services GoSecure provides a range of so-called Advanced Adversary Protection services that can be grouped as follows: • Audit and Test – Includes application security testing, compliance audit, ethical hacking, and social engineering • Managed Security Services – Includes advanced adversary protection, security intelligence with SIEM, perimeter defense, and endpoint security lifecycle. • Strategize – Includes governance, risk and control strategy, compliance planning, policy and process, and INFOSEC roadmap. • Operate – Includes OPSEC support and training, incident response and forensics, and technical controls. • Design – Includes security architecture, security baselining, security technology, and security plans. The company maintains VAR alliance partnerships with Checkpoint, McAfee , Tufin, RSA, FireEye, CounterTack, Fortinet, Websense, Trend Micro, CyberArk, Blue Coat, and IBM. Website https://www.gosecure.ca/
(Alpha Version 0.1 – 07/27/17 – No Vendor Approval) TAG Cyber Controls Application Security Brief Overview GrammaTech offers software-development tools and application security measures that are used by startups, Fortune 500 companies, educational institutions, and government. Headquarters GrammaTech, Inc. 531 Esty Street Ithaca, NY 14850 Tel: (888) 695 - 2668 Executives Tim Teitelbaum serves as Chairman, CEO, and Co-Founder of GrammaTech. He is also a Professer at Cornell University. History Founded in 1988 by two college professors, Tim Teitelbaum of Cornell and Thomas Reps of University of Wisconsin. GrammaTech s headquartered in Ithaca, NY with an additional office in Madison, Wisconsin. Key Competitors Groundworks Technologies, HexaTier Products and Services GrammaTech CodeSonar: GrammaTech's flagship static analysis SAST tool, identifies bugs that can result in system crashes, unexpected behavior, and security breaches. Website https://www.grammatech.com/
The GRC Group
GRC 20/20 Research
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance, Security Training Brief Overview The GRC Group provides GRC training, certification, and resources for enterprise professionals. Headquarters SOX/GRC-IT-GRC Institute Sarbanes Oxley Group LLC 1360 Clifton Avenue #163 Clifton, New Jersey 07012 Tel: (888) WHY-GRCG Executives Sanjay Anand serves as President and CEO of The GRC Group. History The GRC Group is headquartered in New Jersey. Key Competitors GRC 20/20 Research Products and Services The GRC Group provides education, training, Webinars, certification, and related free and subscription resources for the GRC professional. Training and certification include offerings from the SOX Institute, as well as in-depth courses on Information Security and Information Technology Governance, Risk, and Compliance (IS/IT-GRC). The company offers publications and subscriptions, as well as books on Sarbanes-Oxley. Website https://www.grcg.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance, Security Training Brief Overview GRC 20/20 Research provides research, workshops, and consulting support in the area of GRC for enterprise. Headquarters GRC 20/20 Research Milwaukee, Wisconsin Tel: (888) 365 – 4560 Executives Michael Rasmussen, Founder of GRC 20/20 Research, was previously Vice President at Forrester Research. History Michael Rasmussen founded GRC 20/20 Research in 2007. Key Competitors The GRC Group Products and Services The company describes itself as a Buyer Advocate, Solution Strategist, and Market Evangelist. The company provides a range of research, workshops, and training for GRC solutions in the enterprise. Research documents on selecting, buying, and using GRC platforms are included on the GRC 20/20 Research Website. Each document can be downloaded for a modest fee (e.g., “How to Purchase IT GRC Platforms” for $125.00). GRC 20/20 Research founder Michael Rasmussen also offers workshops around the world for GRC professionals to learn virtually every possible aspect of governance, risk, and compliance. Members can subscribe to the GRC 20/20 Research enterprise, individual, or basic levels of service. Website https://www.grc2020.com/
Great Bay Software
GreatHorn
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Network Access Control Brief Overview Great Bay Software provides endpoint solutions for discovery, management, and protection. Headquarters Great Bay Software 8500 Normandale Lake Boulevard, Suite 1900 Minneapolis, Minnesota 55437 Tel: (800) 503 – 1715 Executives Tim Butler serves as CEO of Great Bay Software. He is a managing partner with GrowthFire, a PE-based firm. History Headquartered in Minnesota, the company has a regional office in Portsmouth, New Hampshire. Key Competitors Cylance, Intel Products and Services Great Bay Software offers its Beacon solution for endpoint with the following capabilities: • Beacon Endpoint Profiler – Discovers endpoints with profiling and monitoring • Beacon for Authentication – Supports MAC-based authentication for NAC • Warehouse of Context – Visibility and contextual insight into network • Enterprise Offerings – Support for organizations up to millions of devices. • Midlevel Offerings – Solutions for smaller companies with fewer endpoints Website https://www.greatbaysoftware.com/
(Alpha Version 0.1 – 07/28/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, Email Security Brief Overview GreatHorn is a cybersecurity solution for cloud communication infrastructure, including email, collaboration, and chat tools. Headquarters 116 Beech Street Belmont, Massachusetts 02478 Tel: (800) 604 - 2566 Executives Kevin O’Brien serves as CEO and Co-Founder. History GreatHorn was founded in 2015 by Kevin O’Brien and Raymond Wallace III. They are headquatered in Belmont, Massachusetts. Key Competitors Halon, HPE Products and Services GreatHorn offers products broken down into these three cateogories: • Inbound Email Security - Comprehensive postdelivery protection against targeted email attacks, powered by machine learning and automated response capabilities. • Messagin Security – Automated security operations and reporting for chat and collaboration platforms like Slack. • GH Threat Platform – Automated threat detection and response for in-house communication systems. Website https://www.greathorn.com/
Green Hills Software (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls ICS/IoT Security Brief Overview Green Hills Software is an embedded software provider with solutions for ICS, IoT, and other embedded devices. Headquarters Green Hills Software 30 West Sola Street Santa Barbara, California 93101 Tel: (800) 765 – 4733 Executives David Chandler serves as Senior Vice President of Sales at Green Hills Software. History Founded in 1982, the company introduced INTEGRITY-178 RTOS in 2008. Headquartered in Santa Barbara, the private company has offices in Florida, the UK, and other locations. Key Competitors Intel Products and Services Green Hills Software provides embedded software solutions for platforms, operating systems, hypervisors, OS middleware, development tools, and processors. The flagship operating system INTEGRITY RTOS, offers a partitioning architecture with safety and security. Website https://www.ghs.com/
GreeNet Information Service (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring Brief Overview GreeNet Information Service provides advanced traffic inspection for network monitoring and security. Headquarters Wuhan GreeNet Information Service Suite 602, Building C3 The Optical Valley Software Park East Lake District Wuhan 430068 Peoples Republic of China Tel: (400) 888 – 7180 Executives Ye Zhigang serves as CEO of Wuhan GreeNet Information Service. History Wuhan Green Network Information Service (referred to as Wuhan Green Network) was founded in 2003 and is located in the China Optical Valley. Key Competitors Huawei, Cisco Products and Services GreeNet Information Service is a Chinese company that provides network monitoring and network security solutions for deep packet inspection (DPI), Big Data analysis, SDN/NFV, and other advanced areas of enterprise and wide area networking. The company provides its IDC Information Security Management System to address cyber security issues. Website https://www.greenet.net.cn/
Grid32 Security
GroundLabs
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Security Training Brief Overview Grid32 provides a range of security services including penetration testing and vulnerability assessment. Headquarters Grid32 Security 614 Frelinghuysen Avenue Newark, New Jersey 07114 Tel: (800) 936 – 3204 Executives Seth Danberry serves as CEO and Co-Founder of Grid32 Security. History Grid32 was founded in 2009 in New York City. The company provides services to business government customers. Key Competitors NCC Group Products and Services Grid32 Security provides a range of security consulting services including the following: • Penetration Testing • Awareness Training • Vulnerability Assessments • Code Audits • Incident Response Grid32 Security offers bundled service options including a “grid-Lock” option that involves a set of services providing year-round protection. Website https://www.grid32.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Data Leakage Prevention, Vulnerability Management, PCI DSS/Compliance Brief Overview GroundLabs provides software tools for sensitive data discovery to support compliance and avoid breaches. Headquarters GroundLabs Pte Ltd Registration 201106727H #29-01 Suntec Tower Two 9 Temasek Boulevard Singapore 038989 Tel: +65 3133 3133 Executives Stephen Cavey serves as Director of Corporate Development for GroundLabs. History Stephen Cavey co-founded the company in 2007, and launched its first product in 2008. It is 100% owned by the founders, who remain a core part of the management team. Key Competitors Guidance Software, PwC, Dataguise, Sword & Shield Products and Services GroundLabs provides software products that provide security teams and PCI DSS QSA consultants to locate sensitive data for the purpose of preventing data loss via data loss prevention (DLP) methods. The flagship products offered by GroundLabs include the following: • Card Recon – PCI compliance data discovery tool that searches emails, databases, documents, and other locations. The tool scans every single file on any server, workstation, or supported storage device. Information targeted includes credit card data for the purpose of dealing with cardholder fraud. • Data Recon – Data discovery tool that helps locate PII data such as social security numbers, tax file numbers, passport numbers, national ID numbers, Medicare information, and other types of sensitive data. It works by identifying the desired PII data types and the targets for search in the enterprise. • Enterprise Recon – Focuses on PII data discovery across an entire enterprise network. Website https://www.groundlabs.com/
Groundworks Technologies
GTB Technologies
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) Data Leakage Prevention TAG Cyber Controls Brief Overview Application Security GTB Technologies provides premise and cloud-based data discovery and data loss prevention tools. Brief Overview Groundworks Technologies provides engineering and Headquarters assessment services including reverse engineering and GTB Technologies embedded device security. 5000 Birch Street, Suite 3000 Newport Beach, California 92660 Headquarters Tel: (800) 626 – 0557 Groundworks Technologies Cespedes 3249, Executives C1426DVG CABA, Uzi Yair, CEO and Co-Founder of GTB Technologies, was Argentina previously CEO of Proxycon, General Manager at Redwood Tel: +54 (11) 4554 6812 Software, and CEO of USA for Magic Software. Executives History Sebastian Muniz, Co-Founder and CEO of Groundworks Technologies, worked for several years as senior developer in Founded in 2004, the company is headquartered in Newport Beach with offices in Mexico City, Kyiv, Beijing, Hong Kong, the telecommunications industry. Taipei, Tokyo, Kuala Lumpur, and Mumbai. History Alfredo Ortega and Sebastian Muniz co-founded Groundworks Key Competitors Ground Labs, Dataguise, Datashield Technologies. The company is headquartered in Argentina. Products and Services Key Competitors GTB Technologies provides the ability to perform real-time Klocwork data classification fo all outbound and inbound transmission, as well as the ability to create, manage, and enforce policies Products and Services based on content and context for when, where, how, and by Groundworks Technologies provides a range of software whom, for all activity involving the network and devices. security services including the following: Specific products offered include the following: • Reverse Engineering • GTB data loss platform • Source Application Review • Reverse content-aware firewall inspector • Strategy Development • Endpoint protector • Software and Firmware Security Assessments • Data discovery and classification • Security Research and Malware Analysis • Email encryption • Custom Security Tools Development • SDK • Vendor Risk Assessment • Content aware IRM • GTB eDiscovery Website • Cloud information protection – eDiscovery https://www.groundworkstech.com/ • Enterprise information protection – DLP as a Service • Inspector cloud for MSSPs, Hosts, and ISPs • Managed enterprise data protection Website https://www.gtbtechnologies.com/
Guardian Analytics (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Security Analytics, Web Fraud Prevention Brief Overview Guardian Analytics provides a behavioral analytic-based solution for detecting fraudulent activity in financial systems. Headquarters Guardian Analytics 2465 Latham Street Suite 200 Mountain View, California 94040 Executives Laurent Pacalin serves as President and CEO of Guardian Analytics. History Tom Mitonberger and Craig Press co-founded Guardian Analytics in 2005. The private company is headquartered in California and now services nearly 300 financial institutions. Key Competitors IBM Trusteer, RSA, Dtex Systems Products and Services Guardian Analytics provides a family of products called FraudMAP that utilizes patented anomaly detection technology called Dynamic Account Modeling. This technology provides FFIEC compliance for layered security. Specific products include the following: • FraudMAP On-line – Prevents on-line banking fraud • FraudMAP Access – Detects unauthorized access to secure portals • FraudMAP ACH – Analyzes automated clearing house (ACH) origination • FraudMAP Wire – Analyzes wire transactions for fraud • FraudMAP Mobile – Detects fraud when accessing bank account using a mobile • FraudMAP Connect – Collaboration platform and intelligence community for detecting fraud • FraudDESK – Monitors portals, banking, and payments Website https://www.guardiananalytics.com/
Guardian Data Destruction (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Data Destruction Brief Overview Guardian Data Destruction offers a range of on-site data destruction and degaussing services. Headquarters Guardian Data Destruction 71 Schrieffer Street South Hackensack, New Jersey 07606 Tel: (888) 556 – WIPE Executives Glenn Laga, President of Guardian Data Destruction, has been with the company since 2008. History The company is headquartered in New Jersey. Key Competitors Applied Magnetics, Garner Products Products and Services Guardian Data Destruction provides on-site services for data destruction and degaussing that can be grouped as follows: • On-Site Hard Drive Erasure • On-Site Hard Drive Shredding • On-Site Tape Shredding • Packaging and Removal • Transport and Logistics • Recycling and e-Waste • Site Decommissioning • NSA Degaussing Website https://www.guardiandatadestruction.com/
GuardiCore
GuardSquare
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview GuardiCore provides real-time threat detection and mitigation via SDN with the intent of protecting the enterprise datacenter from APT attacks. Headquarters GuardiCore U.S. 600 California St., 11th Floor San Francisco, California 94109 Executives Pavel Gurvich, Co-Founder and CEO of GuardiCore, was previously a cyber security expert with the Israeli Defense Force. History Co-founded by Pavel Gurvich, Dror Sal’ee, and Ariel Zeitlin in 2013, the company has offices in Tel Aviv and San Jose. Greylock Partners, 83North, and Battery Ventures provided $11M in Series A funding in 2014. Key Competitors Cisco, Juniper Products and Services GuardiCore provides real-time threat detection and mitigation for software defined data centers. APT attacks are detected once inside the data center using software defined networking (SDN) technology. The technology works in three stages: Detection in real-time, based on traffic analysis within a hypervisor, Understanding via forensic analysis using Automated Semantic Analysis, and Reaction to mitigate spread of the threat. The company provides a component called “Active Honeypot?” which is designed to evade attacks by rerouting traffic to highly monitored “ambush” servers so that data centers can eliminate threats in their early stages. Website https://www.guardicore.com/
(Alpha Version 0.1 – 07/28/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview GuardSquare provides optimization and obfuscation software for Android and iOS. Headquarters GuardSquare Leuven Tervuursevest 362 Bus 1 3000 Leuven Belgium GuardSquare San Francisco 620 Davis Street San Francisco, CA 94111 United States Tel: (415) 347 - 6575 Executives Heidi Rakels serves as Co-Founder and CEO of GuardSquare. History Founded in 2014 by Heidi Rakels and Eric Lafortune, the company is based in Leuven, Belgium and San Francisco. Key Competitors Huawei, Hypori Products and Services GuardSquare offers mobile app protection broken down into the following three categories: • DexGuard (Android) – Security Solution for Android applications • iXGuard (iOS) – Security pproduct designed to protect iOS applications • ProGuard – Optimizer for Java and Android Website https://www.guardsquare.com/en
Guardtime
Guidance Software
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview Guardtime provides a family of security solutions based on its keyless signature infrastructure (KSI) that enable data integrity, protection, and governance through block chain. Headquarters Guardtime A.H. Tammsaare tee 60 Tallinn, 11316 Estonia US Office in Irvine 5151 California Ave Suite 210 Irvine, California 92617 Executives Mike Gault, Founder and CEO of Guardtime, spent ten years as a derivatives trader at Credit Suisse and Barclays Capital. History Mike Gault founded the company in 2007 after the large Estonian cyber attack. The company is headquartered in Estonia with offices in the U.S., the U.K., Singapore, and the Netherlands. Key Competitors BHC Laboratory Products and Services Guardtime’s solutions are based on keyless signature infrastructure, which is a quantum-immune Exabyte-scale digital signature system for protecting data by algorithmically proving the time, origin, and integrity. The specific products offered by Guardtime to enable information assurance, attributable networks, data breach management, insider threat mitigation, and secure email messaging include the following: • GuardVIEW – The GuardVIEW SOC product provides the ability for a NOC/SOC to visualize a KSI-enabled network and to provide chain-of-custody and integrity intelligence for all assets, applications, services, and security components. The GuardVIEW ANS product provides advanced real-time monitoring, reporting, and search features for integrity assurance, continuous monitoring, and network visualization. • GuardSHIELD – Allows for integrity monitoring and management across cloud services and virtualized environments. GuardSHIELD comes APLI enabled to support VMware virtualization and VCenter Operation toolsets. • VIDERI KSI Appliance – This hardware appliance can be used to deploy a KSI system including GuardVIEW and all related capabilities including escrow services and agent deployment support. Website https://www.guardtime.com/
Acquired by OpenText (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics, Endpoint Security, Incident Response Brief Overview Guidance Software provides solutions for digital investigations, governance and compliance, data discovery, data risk management, and endpoint detection and response. Headquarters Guidance Software Inc. Headquarters 1055 E. Colorado Boulevard Pasadena, California 91106-2375 Executives Patrick Dennis has served as President and CEO of Guidance Software since 2015. He was previously an executive for twelve years with EMC. History Founded in 1997 to support federal and local law enforcement with digital forensic technology, forensicsecurity solutions from Guidance Software have been deployed on an estimated 33 million endpoints by more than 70 of the Fortune 100. The company trades on the NASDAQ exchange as GUID, and is headquartered in Pasadena, CA with offices in New York, San Francisco, Washington, D.C., Chicago, Waukesha, London, Dubai and Paris. Guidance Software was acquired by OpenText in 2017. Key Competitors Carbon Black, AccessData, Nuix, Spirion Products and Services The products and services offered by Guidance Software are based on its kernel-level agent architecture and deep visibility to endpoint devices: • Digital Forensics – Guidance offers digital forensic technology for law enforcement via the EnCase Forensic product and for enterprise via EnCase Endpoint Investigator. The company also offers hardware products under the Tableau brand, including duplicators, write-blockers, utilities, and accessories. • eDiscovery – EnCase eDiscovery provides continuous end-to-end case management and analysis support for legal hold, identification, collection and preservation, processing, review, and production, aligned with the electronic discovery reference model. • Endpoint Detection and Response –EnCase Endpoint Security provides powerful security analytics and incident response capabilities designed to validate, assess, triage and remediate the effects of both internal and external threats. • Data Risk Management - EnForce Risk Manager is designed to proactively identify, classify, and remediate private or sensitive data across the enterprise, offering the deepest level of insight and control of electronic data across all endpoints and data store, no matter where they are located. Guidance offers industry-leading services to help clients adopt, adapt, and solve for critical business risks.
Website https://www.guidancesoftware.com/
GuidePoint Security (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview GuidePoint Security provides customized, innovative information security solutions for its customers using a range of technology partners. Headquarters GuidePoint Security 2201 Cooperative Way Suite 225 Herndon, Virginia 20171 Tel: (877) 889 – 0132 Executives Michael Volk, Co-Founder and Managing Partner, served previously as COO of FishNet Security. History Michael Volk and Justin Morehouse co-founded GuidePoint Security in 2011. The private company is headquartered in Northern Virginia with offices in Alpharetta, Charlotte, Detroit, Frisco, St. Louis, St. Paul, St. Petersburg, and Wakefield. Key Competitors Optiv Products and Services GuidePoint Security provides a range of security value added resale (VAR) solutions to customers through partners including Blue Coat, Check Point Software, FireEye, RSA, Symantec, and Voltage. The company focuses on innovative solutions for access control, application security, authentication, content filtering, DLP, GRC, IdAM, IDPS, mobile security, network analytics, remote access, SIEM, and vulnerability management. Website https://www.guidepointsecurity.com/
Guidepost Solutions
GuruCul Solutions
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls TAG Cyber Controls Security Consulting Security Analytics Brief Overview Brief Overview Guidepost Solutions provides a range of consulting services GuruCul provides an identity-centric, behavioral risk analysis including investigation, compliance, and monitoring. The platform that uses Big Data and machine security analytics. company has expertise in the installation of physical security. Headquarters Headquarters GuruCul Worldwide Headquarters Guidepost Solutions 222 N. Sepulveda Blvd. 415 Madison Avenue, 11th Floor Suite 1322 New York, New York 10017 El Segundo Tel: (212) 817 – 6700 , California 90245 Tel: (213) 373 – 4878 Executives [emailprotected] Bart Schwartz serves as Chairman of Guidepost Solutions. Julie Myers Wood serves as CEO of Guidepost Solutions. Executives Saryu Nayyar serves as CEO of GuruCul. She previously held History executive roles Oracle, Sun Microsystems, Ernst & Young, and Guidepost Solutions is headquartered in New York with Disney. offices in Chicago, Dallas, Honolulu, Palm Beach, Sacramento, San Francisco, London, Los Angeles, Oakland, Seattle, History Singapore, and Washington. GuruCul was founded in 2010. The company is headquartered in Los Angeles with an APAC headquarters office in Mumbai Key Competitors and a development center in Shivaji Nagar. Stroz Friedberg, Trustwave Key Competitors Products and Services Red Owl, Novetta Guidepost Solutions provides a range of security consulting services including the following: Products and Services GuruCul provides a range of security risk intelligence products and services that can be grouped as follows: • Investigations – Data forensics, analytics, and response • Compliance – AML, privacy, audit, and other services • GuruCul Risk Analytics (GRA) – Identity-centric • Monitoring – Construction and corporate integrity behavioral risk intelligence platform that provides near • Security and Technology Consulting - System design, real-time contextual and situational awareness for user cyber threat mitigation, security operations, managed access and activity. GRA is designed to provide an services, and business development enterprise security team with so-called Actionable Risk Intelligence through behavior profiling algorithms. Website • Investigation Workbench – A visual, investigative http://www.guidepostsolutions.com/ workbench to support the investigation and forensic process. • Risk and Threat Intelligence – Self-learning technology to consolidate identity profiles with machine data and alerts. • Self-Audit – Provides end-users with a customizable on line view of system activity. • Access Intelligence – Provides capability to monitor accounts (high privileged, shared, and regular). The company also provides a range of services including strategy and planning, consulting services, support services, and training. Website https://www.gurucul.com/
HackerOne
Hacking Team
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Bug Bounty Support Brief Overview HackerOne provides a range of bug bounty services for enterprise customers. Headquarters HackerOne 114 Sansome Street San Francisco, California 94104 Executives Marten Mickos was named CEO of HackerOne in 2015. He is formerly head of open source cloud software maker Eucalyptus. History Co-founded by Merijn Terheggen, Alex Rice, Jobert Abma, and Michiel Prins in 2012, the company is headquartered in San Francisco. Benchmark provided $9M in Series A funding in 2014. HackerOne also received $25M in Series B funding led by NEA. Key Competitors Synack Products and Services HackerOne provides a platform for vulnerability management and serving bug bounty capabilities to external hackers. The company eliminates security mailboxes with a SaaS platform through which companies can communicate with hackers. The result is improved coordination to manage vulnerabilities form disclosure through resolution. Support is also provided for bounties and rewards to vulnerability contributors. Website https://www.hackerone.com/
(Alpha Version 0.1 – 06/019/17 – No Vendor Approval) TAG Cyber Controls Digital Forensics, Penetration Testing, Bug Bounty Support Brief Overview Hacking Team provides offensive security solutions for the law enforcement and intelligence communities. Headquarters Hacking Team Via della Moscova 13 20121 Milano Italy Tel: (443) 949 – 7470 Executives David Vincinzetti is Co-Founder and CEO of Hacking Team. History David Vincinzetti and Valeriano Bedeschi co-founded in 2003. The company is headquartered in Milan with offices in Annapolis and Singapore. All development work is done in Milan and the company has grown to roughly 50 individuals. Key Competitors Elcomsoft, Palantir Products and Services Hacking Team provides a Remote Control System (RCS) that is designed to evade encryption through use of an agent that is installed onto the device to monitor. Evidence collection by law enforcement and intelligence officials can then be collected on the monitoring device through stealth means and transmission of the collected data from the device to the RCS server is encrypted and untraceable. The Hacking Team sells only to government agencies and has strict policies intended to control misuse of their product by unauthorized individuals. The system can be deployed on Windows, Apple, BlackBerry, and other technologies. It can be managed from a single interface and can monitor from a few up to a hundred different targets. Website http://www.hackingteam.it/index.html
HackLabs
Halock Security Labs
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Security Training Brief Overview HackLabs provides a range of security consulting and training services including penetration testing. Headquarters HackLabs Head Office Level 29, Chiffey Tower 2 Chiffey Square Suite Sydney, NSW Australia 101 California Street, Suite 2710 San Francisco, California 94111 Tel: (800) 708 – 2164 Executives Kevin McLaine serves as Managing Director of PS&C, parent company of HackLabs. History Founded in 2009, the company is headquartered in Australia with an office in San Francisco. In 2013, HackLabs and Securus Global combined to form a new ICT company called PS&C that will float on the ASX. Key Competitors NCC Group Products and Services HackLabs provides a range of professional services including the following: • Internal Penetration Testing • External Penetration Testing • Web Application Security Testing • Social Engineering • SCADA Penetration Testing • War Dialing Penetration Testing • Secure Hosting • Vulnerability Management and Assessment • Web Security Health Check Website https://www.hacklabs.com/
(Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing, PCI DSS/Compliance Brief Overview Halock Security Labs provides security consulting services including penetration testing and security assessment. Headquarters Halock Security Labs 1834 Walden Office Square Schaumberg, Illinois 60173 Tel: (847) 221 – 0200 Executives Terry Kurzynski and Jim Mirochnik serve as CEO and Partners of Halock Security Labs. Both had been executives with Remington Associates since 1996. History Terry Kurzynski and Jeremy Simon relaunched their firm Remington Associates, founded in 1996, as Halock Security Labs based on their philosophy of Purpose Driven Security. Key Competitors Deloitte Products and Services Halock Security Labs utilizes risk management as the basis for a range of security and compliance services for business customers. Halock Security Labs offers a suite of security professional services based on its Purpose Driven Security approach in the following areas: • Security Management – Includes risk assessments, requirements review and gap assessment, security program review and development, information security management services, ISO 27001 certification, policies and procedures, security awareness, and virtual CISO. • Compliance – Includes HIPAA, PCI DSS and other compliance requirements coverage. • Penetration Testing – Includes external and internal penetration testing, web application security reviews, and social engineering testing. • Malware Defense – Includes advanced malware threat assessment, malware defense strategy, and malware analysis. • Work Force – Includes retained executive search, fulltime permanent staff placement, and other recruiting and staffing services. • Products and Engineering – Includes engineering and resale services for WAF, SIEM, vulnerability scanning, and other products. • Incident Response Services – Includes incident readiness and response security services. Website https://www.halock.com/
Halon (Alpha Version 0.1 – 06/19/17 – No Vendor Approval) TAG Cyber Controls Email Security Brief Overview Halon provides a secure SMTP (email) platform for service providers. Headquarters Halon Security AB Olskroksgatan 30 SE-14 66 Gothenburg Tel: +46 31 301 1920 [emailprotected] Halon office in San Francisco – (415) 477 – 1045 Executives Peter Falck serves as Co-Founder and CEO of Halon Security. History Peter and Jonas Falck founded Halon Security in 2002. The company is headquartered in Sweden with offices in San Francisco, France, and the UK. Recent funding of an undisclosed amount came from Almi Invest and Chalmers Innovation Seed Fund. Key Competitors Proofpoint, Symantec, McAfee Products and Services Halon offers a secure SMTP (email) platform for service providers. The platform includes the following capabilities: • Email Security – Includes Span filtering and in-line processing, with full virtualization support for VMware, KVM, Xen, and Hyper-V. The product supports DMARC and DKIM with DNSSEC. • Security Routing – Includes firewall, load balancing, and routing software based on OpenBSD. • Secure Load Balancing – Provides load balancing with fully featured firewall capabilities, OSPF routing, VRFs, and other routing protocols. Website https://www.halon.se/
Happiest Minds Technologies (Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Analytics, ICS/IoT Security Brief Overview Happiest Minds technologies provides a range of solutions, including security, for IoT, Big Data analytics, softwaredefined data center, and cloud computing. Headquarters Happiest Minds Technologies 3rd & 4th Floor, SJR Equinox, Sy.No.47/8, Doddathogur Village, Begur Hobli, Electronics City Phase 1, Hosur Road, Bangalore – 560 100 Tel: +91 80 3320 3333 Executives Ashok Soota serves as Executive Chairman of Happiest Minds Technologies. Sashi Kumar serves as CEO and Managing Director of Happiest Minds Technologies. History Headquartered in Bangalore, the company has presence in Delhi and Mumbai, serving customers in the US, UK, Singapore, Canada, and Australia. The company has secure $52.5M in Series A funding from investors including JPMorgan Private Equity Group, Intel Capital, and Ashok Soota. Key Competitors Tata, Tech Mahindra Products and Services Happiest Minds Technologies provides advanced solutions including security in the following areas: • Data Science • Dev/Ops • Software Defined Data Center (SDDC) • Cloud Computing • Internet of Things (IoT) Specific offerings include Agile infrastructure, managed infrastructure and security services, digital transformation services, IT security services, data management, and product engineering. Sectors served include automotive, e-commerce, retail, consumer goods, banking, education, and travel. Website http://www.happiestminds.com/
HardSecure
Harris
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview HardSecure provides values added resale (VAR) security solutions including consulting. Headquarters HardSecure Avenida Duque de Avile 28, 1000-14 Lisbon Portugal Tel: +351 218 278 126 Executives Marta Portela serves as CEO of HardSecure. She also serves as CEO of MSP Consulting. History Founded in 2010, the company is headquartered in Portugal. Key Competitors AccessIT Products and Services HardSecure provides values added resale (VAR) security solutions in the area of data loss prevention, anti-virus, unified threat management (UTM), next generation firewall, bandwidth control, authentication services, and cyber security. The company maintains partnerships with security technology solution providers including Kaspersky, Assuria, Palo Alto Networks, Fortinet, Allot, Sophos, Swivel, Safenet, Cisco, and Arbor Networks. Website http://www.hardsecure.com/index.php?lang=en
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Information Assurance Brief Overview Harris provides communications and IT products and services, including communications security products, with emphasis on government. Headquarters Harris Corporate Headquarters 1025 W NASA Boulevard Melbourne, Florida 32919 Tel: (321) 727 – 9100 Executives William M. Brown serves as Chairman, President, and CEO of Harris Corporation. Sheldon Fox serves as Group President, Government Communications Systems. History The public company is headquartered in Florida with offices around North America, Asia Pacific, Europe, Latin America, Middle East, and Africa. Key Competitors Lockheed Martin, Boeing, Northrop Grumman, General Dynamics Products and Services Harris Corporation offers many different lines of communication, technology, and service business including National Intelligence, which includes several security-related offerings: • Border Security Systems • Command and Control Products • Cyber Security Systems • End-to-End Satellite Communications • Geospatial Intelligence • Intelligence, Surveillance, and Reconnaissance • IT Services • Mapping and Visualization The Harris Defense business also includes several offerings related to cyber security including C4ISR, and Tactical Radio. Website https://www.harris.com/
Hawk Network Defense
Haystax Technology
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Hawk Network Defense provides security analytics for enterprise, service providers, and SIEM enrichment. Headquarters Hawk Network Defense, Inc. 5057 Keller Springs Road, Suite 300 Dallas, Texas 75001 Tel: (888) 919 – 4295 Executives David E. Harris has served as CEO of Hawk Network Defense since 2012. He was an original member of ISS, which was acquired by IBM. History Established in 2007 and co-founded by Hawk CTO Tim Shelton, the company is headquartered in Dallas. Key Competitors KEYW Products and Services Hawk Network Defense provides a Big Data Security Analytics (BDSA) platform to derive actionable intelligence from logged data. Specific products include the following: • HAWK eyeCon-BDSA – Provides correlation of data collected from networked systems for behavioral analytics. • HAWK eyeCon-X – Multi-tenancy support for cloud security environments. • HAWK eyeCon-VSA – Visual Security Analytics for streamlined advanced analytics. Website https://www.hawkdefense.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Analytics, Threat Intelligence Brief Overview Haystax provides actionable security intelligence and realtime situational awareness. Headquarters Haystax Technology 8251 Greensboro Drive, Suite 1111 McLean, Virginia 22102 Tel: (571) 297 – 3800 Executives Bryan Ware serves as CEO of Haystax Technology. General Peter Pace (ret.) serves as Chairman of the Board of Haystax. History The private company, which was founded in 2012, is headquartered in McLean, Virginia. Haystax was formed by Chicago-based Edgewater Funds to create a data analytics company focused on national security and public safety. Haystax manages two companies, Haystax technology and NetCentrics. Key Acquisitions Flexpoint Technology (2012) – Consulting Digital Sandbox (2012) – Learning Platform Netcentrics (2014) – Enterprise Systems Key Competitors IBM, Intergraph, Verint Products and Services Haystax Technology focuses on collecting data and creating actionable intelligence based on analytics and Big Data processing. Physical security for law enforcement agencies and police departments is in-scope to the Haystax solution. Raw data is pulled in from social media, surveillance cameras, news outlets, police reports, and many other sources. Specific product and service areas offered by Haystax include the following: • Contextual Threat Understanding – Uses patented algorithms to provide continuous threat assessments • Real-Time Situational Awareness – Includes applications for planning, monitoring, and coordinating response • Secure Cloud Optimized Enterprise – Provides means for sharing information securely and managing applications across the cloud from any device Website https://www.haystax.com
H-Bar Cyber Solutions
HDIV Security
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Security Training Brief Overview H-Bar Cyber Solutions provides a rage of security consulting, compliance, and security training services. Headquarters H-Bar Cyber Solutions York County Stewartstown, Pennsylvania Tel: (240) 446 – 0021 [emailprotected] Executives Adam Austin is the President and Owner of H-Bar Cyber Solutions. History Founded in 2012, the small private company/sole proprietorship is located in Pennsylvania. Key Competitors PA Consulting Group Products and Services H-Bar Cyber Solutions offers a range of cyber security consulting services in the Pennsylvania area with emphasis on the following: • Information System Security Engineering • Information System Risk Assessment • Information System Risk Mitigation and Remedies • Compliance (NIST 800-53, DIACAP, HIPPA, FISMA, NISPOM, PCI) • Cyber Security Training Website http://hbarcyber.com/
(Alpha Version 0.1 – 07/28/17 – No Vendor Approval) TAG Cyber Controls Application Security Brief Overview HDIV Security provides software for runtime application selfprotection (RASP). Headquarters Mikeletegi 69, 4th Floor 20009, Donostia-San Sebastián, Spain [emailprotected] Executives Roberto Velasco serves as CEO of HDIV Security. History This small privately held company was founded in 2008, and is headquarted in San Sebastián, Spain. Key Competitors GB & Smith, Security Innovation Products and Services HDIV RASP solutions are availablein three editions: • HDIV Enterprise – a RASP commercial verison with enterprise-class security, exclusive functionality, scalability, and enterprise-level support services. • HDIV Professional – a RASP version that provides enterprise-class security, advanced functionality, and scalability • HDIV Community – An open-source web application security framework that includes readonly data protection and editable data risk mitigation Website https://hdivsecurity.com/
HEAT Software
Hedgehog Security
Merged with LANDESK to form Ivanti
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing Brief Overview Hedgehog security provides a range of penetration testing and security research services. Headquarters Hedgehog Security 10th Floor, 3 Hardman Street Spinningfields, Manchester M3 3E]HF United Kingdom Tel: 0161 850 0454 [emailprotected] Executives Peter Bassill, CEO and Founder of Hedgehog Security, was previously CISO for the Gala Coral group. History Peter Bassill founded Hedgehog Security in 2010. Hibernaculum Ltd. is the parent company of Hedgehog Security. Key Competitors 2-sec, SECFORCE, Security Audit Systems Products and Services Hedgehog Security provides solutions in the areas of security research and penetration testing. The company is fully UKbased and offers its research and testing services for gaming, financial services, and PCI DSS industry participants. The company has also launched a virtual CSO program aimed at small and medium sized businesses. Website https://www.hedgehogsecurity.co.uk/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Heat Software provides unified endpoint management including security. Headquarters Ivanti 698 West 10000 South Suite 500 South Jordan, Utah 84095 United States Tel: (888) 253 - 6201 Executives John Ferron serves as Executive Chairman and CEO of HEAT Software History FrontRange Solutions was originally formed in 1989. Clearlake Capital group acquired FrontRange in 2015 and formed HEAT Software by combining Lumension and FrontRange. HEAT Software merged with LANDESK in 2017 to form Ivanti. Key Acquisitions Absolute Manage & Absolute Service (2015) Key Competitors Intel, Symantec Products and Services Heat Software offers a unified platform for endpoint management that includes Cloud Service Management, IT service management, client management, patch management, and software asset management. Endpoint security solutions include the following: • Threat Protection • Vulnerability Management • Data Security Website https://www.heatsoftware.com/
Heidrick & Struggles
The Herjavec Group
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Heidrick & Struggles provides senior leadership-level search and recruitment including CISO and CSO positions. Headquarters Heidrick & Struggles 233 South Wacker Drive, Suite 4900 Chicago, Illinois 60606 Tel: (312) 496 - 1000 Executives Tracy R. Wolstencroft serves as CEO of Heidrick & Struggles. History Founded in 1953, the firm has grown to a major executive leadership firm with focus on senior search and recruiting. The public company trades on the NASDAQ and operates across North America, Latin America, Europe, the Middle East, Africa, and Asia Pacific. Key Acquisitions Co Company (2015) IronHill Partners (2008) Key Competitors Egon Zehnder Products and Services Heidrick & Struggles provides global search and recruitment with emphasis on senior level, C-Suite, and executive leadership positions. The company provides leadership effectiveness consulting, board-level consulting, leadership talent strategy, and team effectiveness consulting. Website http://www.heidrick.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Managed Security Services, PCI DSS/Compliance Brief Overview The Herjavec Group is a Canadian technology firm specializing in network security managed services and consulting. Headquarters Herjavec Group (Headquarters) 180 Duncan Mill Road, 7th Floor Toronto, Ontario M38 1Z6 Canada Tel: (416) 488 – 1272 Executives Robert Herjavec, Founder of The Herjavec Group, is one of the stars of the ABC television program, Shark Tank. History The Herjavec Group was established in 2003 and has grown considerably since through acquisition. The company is headquartered in Toronto with offices in Dallas, Ottawa, Montreal, Calgary, Vancouver, New York, and Los Angeles. Key Acquisitions MetaComm (2006) – Cyber Security Cyberklix (2010) – Managed Services Zentra Computer Technologies (2011) Galaxy Tech (2014) – Integrator Sentry Metrics (2014) – Metrics Sysec (2015) – Security Reseller Key Competitors EWA-Canada, Above Security, Spyders Products and Services The Herjavec Group offers security services via partnerships with companies such as McAfee , Cisco, and Symantec in the following areas: • Managed Services – Includes intrusion prevention and detection, SIEM, vulnerability management and remediation, compliance monitoring and reporting, and patch management. THG offers a cloud-based SIEM solution as well. • Professional Services – Includes certified installation services, accredited training services, certified customer support, and on-going tuning and maintenance. • PCI Consulting – Involves full PCI Qualified Security Assessor (QSA) services for retail customers. • Security Consulting – Includes security architecture, preventive controls. Detective controls, and various security consulting offers such as assessment, penetration testing, architecture review, firewall rule review, social media assessment, and wireless assessment. Website https://www.herjavecgroup.com/
Heshengda Information Security (Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Data Destruction Brief Overview HSD is a manufacturer of information destruction devices including degaussers, data disintegrators, and data erasers. Headquarters Heshengda Information Security (HSD) Room 9A07, Changyin Building No. 88 Yongdin Road Haidian District Beijing 100039 China [emailprotected] Executives Mayer Zhao serves as Marketing Officer for HSD. History The company is headquartered in Beijing and was founded in 2004. Key Competitors Systems Maintenance Services Products and Services The products offered by HSD include the following: • Degaussers • Shredders and Destroyers • Multifunctional Disintegrators • HDD Destroyers • Eco-Friendly Incinerators • Data Erasers Website https://www.heshengda.com/
Hexadite Acquired by Microsoft (Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Incident Response Brief Overview Hexadite provides an automated incident response solution based on intelligent algorithms and tools. Headquarters Hexadite 101 Federal Street Boston, MA 02110 Tel: (415) 306 – 0909 Executives Eran Barak, Co-Founder and CEO of Hexadite, served as an intelligence officer in the Israeli Defense Force. History Eran Barak, Barak Klinghofer, and Idan Levin, three former intelligence officers in the Israeli Defense Forces, founded the company in 2014. YL Ventures, and former Microsoft Corporate Vice President Moshe Lichtman provided seed funding in the amount of $2.5M. The company received $8M in Series A funding in 2016 led by Hewlett Packard Ventures, Ten Eleven Ventures, and YL Ventures. Key Competitors Co3 Systems, CyberSponse Products and Services The Hexadite Automated Incident Response Solution (AIRS) is based on the company’s SWAT intelligent algorithms and tools. The platform allows for uncovering and remediation of hidden threats by supporting parallel investigations, remediating large scale cyber events, and validation of remediation effectiveness. The methodology presumes five basic steps including alerting (detection devices send information to the Hexadite platform), collecting (Hexadite aggregates the information), analyzing (SWAT algorithms analyze the collected data), deciding (Hexadite automatically determines the best response action), and remediation (steps are taken to stop the full extent of the breach). Website https://www.hexadite.com/
HexaTier
Hex Security
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Application Security Brief Overview HexaTier, formerly GreenSQL, provides a database application security solution for data masking, compliance, and database threat protection. Headquarters HexaTier Ltd. 21 Bar Cochva Bnei Berak 5126018 Israel Tel: +972 3 688 8090 Executives Dan Dinnar serves as CEO of HexaTier. He was previously with CyberArk. History Amir Sadeh, David Maman, and Hadar Eshel co-founded GreenSQL in 2009. GreenSQL, renamed HexaTier, is a private company with venture funding from Atlantic Capital Partners, Magma Venture Capital, Rhodium, Gandyr, and 2BAngels. The company is headquartered in Israel with offices in Boston and Irvine. Key Competitors IBM, Camouflage Software, Sofix Technologies Products and Services HexaTier offers a family of Unified Database Security Solution products that can be grouped as follows: • Unified Database Security – Involves all-in-one security, compliance, monitoring, and masking. • Cloud Database Security – Includes HexaTier for AWS, Azure, Google Cloud, and Rackspace. • Compliance and Regulations Website http://www.hexatier.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Hex Security provides security and information assurance consultation services toward both strategic and compliance objectives. Headquarters Hex Security Limited 46 Cottons Meadow Kingstone Heresford United Kingdom HR2 9EW Tel: +44 (0) 1432 800440 [emailprotected] Executives Steven Dunsmuir has served as Company Director for Hex Security Limited since 2014. History Hex Security was established in 2014 and is headquartered in the United Kingdom. Key Competitors QinetiQ, Xyone Products and Services Hex Security provides a range of different security consulting services from accredited experts. These service include: • Threat and Risk Assessments • Security Awareness and Training • Data Centre Security • Enterprise Security Design • Risk Control and Treatment • Security Engineering • Security Process and Procedures Website http://www.hexsecurity.co.uk/
HID Global
High-Tech Bridge
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Hardware/Embedded Security, Two-Factor Authentication Brief Overview HID Global provides a range of identity and access solutions including smart cards, readers, RFID tags, and software. Headquarters HID Global – Americas and Corporate 611 Center Ridge Drive Austin, Texas 78753 Tel: (949) 732 - 2000 Executives Stefan Widing serves as President and CEO of HID Global. History HID Global is an ASSA ABLOY Group brand. The company is headquartered in Austin, Texas with offices around the world in Hong Kong, England, Australia, Argentina, Brazil, Canada, China, Czech Republic, Germany, India, Ireland, Japan, Korea, Malaysia, Mexico, Singapore, Switzerland, and Thailand. Key Acquisitions ActivIdentity (2010) LaserCard(2011) EasyLobby (2012) CodeBench (2013) IdenTrust (2014) Lumidigm (2014) – Biometrics Quantum Secure (2015) - Identities IAI Industrial Systems (2015) - Identities Key Competitors Identicard Products and Services HID Global is a manufacturer of complete electronic access control products. The HID Global product line includes the iCLASS 13.56 MHz contactless smart cards and readers, the Proximity 125 KHz proximity, multiclass multi-technology card readers, High Definition printers and encoders, SecureMark RFID-based card issuance technology, and Networked Access Solutions that include the Edge Solo and EdgeReader products, and VertX managed access controller. HID Global partners with technology and service providers to access control-enable their offerings with security technology such as iCLASS. Website https://www.hidglobal.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing Brief Overview High-Tech Bridge is a Swiss company offering penetration testing and related forensic and audit services. Headquarters High-Tech Bridge World Trade Center II 29, Route de Pre-Bois CH-1215 Geneva 15 Switzerland Tel: +41 22 560 68 41 Executives Ilia Kolochenko, CEO and Founder of High-Tech Bridge, has previous experience in the military as well as with financial services security in Switzerland. History Ilia Kolochenko founded High-Tech Bridge in 2007 in Switzerland. The High-Tech Bridge Security Lab and ImmuniWeb platform were certified as achieving CVE (Common Vulnerabilities and Exposures) and CWE compatibility in 2012 and 2013. The private company Key Competitors Praetorian, InfoGuard Products and Services High-Tech Bridge offers a range of proactive security services that can be grouped as follows: • Ethical Hacking • Penetration Testing • Internal Penetration Test • External Penetration Test • Best Practice Consulting • Security Training • Security Audit The company also offers reactive services such as cybercrime investigative support and malware analysis. High-Tech Bridge also offers an automated scanning toolkit called ImmuniWeb, which is based on proprietary technology and research. Website https://www.htbridge.com/
High Water Advisors
Hillstone Networks
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview High Water Advisors is a consulting organization specializing in corporate governance, risk, and compliance. Headquarters High Water Advisors – Head Office 7900 East Union Avenue Suite 1100 Denver, Colorado 80237 Tel: (855) 747 – 5928 Executives Steve Biskie, Managing Director of High Water Advisors, spent years at Deloitte, followed by early-stage start-ups including Jefferson Wells International. History The small, privately held company is headquartered in Denver with an office in Vancouver. Entered into an exclusive license agreement with RSM in 2017. Key Competitors LockPath, RSA Archer Products and Services High Water Advisors provides a range of GRC-related services including the following: • Strategy and Program Management • Benchmarking and Assessment • Consulting Services • Training and Coaching Specific GRC platform solutions are designed and implemented in the areas of Risk Management, Compliance, Audit, and SAP GRC. Website http://www.highwateradvisors.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform Brief Overview Hillstone Networks provides a behavioral analytic-based next generation firewall platform. Headquarters Hillstone Networks 292 Gibraltar Drive, Suite 105 Sunnyvale, California 94089 Tel: (408) 508 – 6750 [emailprotected] Executives Dongping Luo serves as CEO and Co-Founder of Hillstone Networks. History Cisco, Juniper, and NetScreen executives founded Hillstone Networks in 2006. The private company is headquartered in Sunnyvale. Hillstone participated in InnoSpring, a technology start-up incubator, in 2012. Key Competitors Palo Alto Networks, CheckPoint, Cisco Products and Services Hillstone offers two product platforms as follows: • Hillstone Intelligent Next-Generation – This firewall includes real-time traffic data and behavior analysis to detect next generation threats. The appliance identifies more than 1,300 applications, including encrypted and mobile. The product is offered as a T-Series and M/G Series product. • Hillstone Data Center Firewall – This firewall is a highperformance, fully distributed system with Elastic Firewall Architecture (EFA) and Virtual Elastic Firewall Architecture (vEFA). The appliance is designed to scale with the virtualized data center. Website http://www.hillstonenet.com/
Hiperos
Hitachi ID
Acquired by Opus
(Alpha Version 0.1 – 07/28/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Hitachi ID Systems, Inc. is a provider of identity management and access governance solutions. Headquarters 1401 1st Street S.E. Suite 500 Calgary, Alberta Canada T2G 2J3 Tel: (403) 233 - 0740 Executives Gideon Shoham serves as CEO and Co-Founder of Hitachi ID. History Orginally founded in 1992 as M-Tech Information Tecnology, INC., it was acquired by Hitachi, Ltd. In 2008 and became Hitachi ID Currently Hitachi ID has 160 employees and is headquartered in Calgary. Key Competitors iWelcome, neXus Products and Services Hitachi ID offers the Hitachi ID Identity and Access Suite, which includes the following: • Hitachi ID Identity Manager – Identity management and access governance • Hitachi ID Password Manager – Self-service credential management • Hitachi ID Privilged Access Manager – Privilegedaccess management Website http://hitachi-id.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview Hiperos provides risk, compliance, and performance solutions for managing third parties. Headquarters Hiperos 176 East Main Street Suite 8 Westborough, Massachusetts 01581 Executives Greg Dickinson serves as President and CEO of Hiperos LLC. Doug Bergeron is the Founder and CEO of Opus Global, as well as Executive Chairman of Hiperos. History Hiperos is an Opus Global company. The company has offices in New Jersey, Chicago, New York, Palo Alto, Pittsburgh, and Houston. Key Competitors Modulo, BitSight Products and Services Hiperos provides a platform called Hiperos 3M that offers a range of compliance, risk, and performance management solutions for third parties supporting the enterprise. Specific risk-related solutions include third party planning, supply chain resilience, business continuity, reputational risk, regulatory risk, risk scoring, subcontractor risk, and contract risk management. Website https://www.hiperos.com/
Hitec Labs
HOB GmbH
Acquired by Mitratech
(Alpha Version 0.1 – 06/20/19 – No Vendor Approval) TAG Cyber Controls Secure Remote Access Brief Overview HOB includes cyber security offerings for secure remote access and connectivity. Headquarters HOB GmbH & Co. KG Schwadermuhlstr. 3 90556 Cadolzburg Germany Executives Klaus Brandstatter serves as Managing Director of HOB. Zoran Adamovic serves as Managing Director of HOB. History Founded in 1981 to develop software and terminals for IBM mainframes, the company is headquartered in Germany. Key Competitors Cisco Products and Services HOB offers cyber security solutions for enterprise customers in the following areas: • Secure Development • Secure Access • Secure Connectivity • Secure Administration The proprietary HOB-SSL implementation is marketed as an alternative to OpenSSL. The company provides secure single sign-on with Kerberos. Website https://www.hobsoft.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview Hitec Labs provides service and platform support for GRC and enterprise risk management. Headquarters Hitec Labs Ltd. 430 Bath Road Slough Berkshire SL1 6BB United Kingdom Executives Jeremy Crane, Co-founder and CEO of Hitec, has over thirty years experience with the computing industry. History Headquartered in the UK and founded in 1991, the company has presence in Boston, Massachusetts. Key Competitors MetricStream Products and Services Hitec offers enterprise risk management and GRC solutions in the following areas: • Enterprise Content Management – Based on the DataStoreDSX platform • Governance, Risk, and Compliance – Includes PolicyHub for proactive policy management and OpRiskControl for ERM • Policy Management – Based on PolicyHub. • Enterprise Risk Management – Based on Op RiskControl Website https://www.hiteclabs.com/
HoGo
Hold Security
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Content Protection, Secure File Sharing Brief Overview HoGo provides a digital rights management (DRM)-based solution for protecting and sharing documents. Headquarters HoGo 844 Elm Street Manchester, New Hampshire 03101 Executives Hiro Kataoka, Founder and CEO of HoGo, was previously CEO of Boston Circuits. History HoGo was founded in 2012 and is headquartered in Manchester, New Hampshire in the abi Innovation Hub. The company has received investment, technical, and market support from GMO Cloud K.K., a cloud computing provider in Japan. Key Competitors Vitrium, Armjisoft, docTrackr Products and Services The HoGo product is designed to allow protection and sharing of documents by first setting up an account. Documents are protected via upload to the HoGo account where they can be shared via permissions settings and managed through an account control panel. The HoGo proprietary security platform continues to protect documents after they have been delivered in order to help control leaks and manage revocation. Documents are viewed using a HoGo viewer, which can be accessed on-line. Website https://www.hogodoc.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Threat Intelligence Brief Overview Hold Security is an information security and investigations company providing consulting services and threat intelligence for business clients. Headquarters Hold Security Milwaukee, Wisconsin Tel: (414) 678 – 1414 [emailprotected] Executives Alex Holden, Founder and CISO of Hold Security LLC., was previously CISO for a large brokerage firm. History Alex Holden launched Hold Security in 2013 and is located in Milwaukee, Wisconsin. Key Competitors FireEye (Mandiant), Roka, Lancope (Cisco) Products and Services Hold Security offers security consultation services that can be grouped as follows: • Deep Web Monitoring – Involves indexing and correlating public and private resources on the Internet to derive intelligence. • Incident Response and Investigation – Involves analysis in support of incident response. • Information Security Assessment and Services – Assessment services for businesses. • Enterprise Security Architecture and Integration – Focus on improving security of enterprise architecture. Website https://holdsecurity.com/
HoloNet Security
HPE
(Alpha Version 0.1 – 07/28/17 – No Vendor Approval) TAG Cyber Controls Intrusion Dection/Prevention Brief Overview HoloNet Security offers real-time breach detection for sensitive business data. Headquarters 1294 Kifer Road, Suite 710 Sunnyvale, California 94086 [emailprotected] Executives Frank Zou serves as CEO and Co-Founder of HoloNet Security. Previously he was the VP of engineering in Juniper Netoworks’ Security Business Unit. History HoloNet Security was founded in 2013 by Frank Zou and is headquartered in Sunnyvale, California. Key Competitors Illusive, Code42 Products and Services HoloNet Security offers OnFire, which provides instant visibility across data in motion through data behavior analytics, connecting the moving data with its user and device to detect abnormal data movement in real-time. Website https://www.holonetsecurity.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Information Event Management, Email Security, Application Security, Mainframe Security, Threat Intelligence, Data Encryption, Identity and Access Management, Vulnerability Management, Security R&D Brief Overview HPE is a multinational information technology company that sells a range of different products and services including IT, enterprise, and network security. Headquarters HPE Corporate Headquarters 3000 Hanover Street Palo Alto, California 94304 Executives Meg Whitman, Chairman, President, and CEO of HP, was previously President and CEO of eBay. Sue Barsamain serves as SVP of Enterprise Security Products. History HP Enterprise (HPE) is an iconic American technology company that has $112B in revenue, employs over 300,000 employees, and trades on the NYSE. HP has made a series of acquisitions that has made it a significant player in the IT, enterprise, and network security industry. Key Acquisitions SpyDynamics (2007) TippingPoint from 3com (2009) – IPS Fortify (2010) – Application Security, ArcSight (2010) – SIEM Voltage (2015) – Email Security Key Competitors IBM, Intel Security (McAfee), Symantec Products and Services HPE provides a range of security solutions for enterprise customers that can be grouped as follows: • Network Security – Includes TippingPoint Next Generation Firewall, Next Generation IPS, and Security Management System. The products are supported by research from TippingPoint DVLabs. • Application Security – Includes Fortify on Demand (managed application security testing), Application Defender, WebInspect, Fortify Static Code Analyzer, and Fortify Software Security Center Server. • Security Intelligence and Event Management – Includes ArcSight SIEM, ArcSight ESM, ArcSight Logger, ArcSight Express, and EnterpriseView. • Payments and Data Security – Includes the Atalla Network Security Processor (NSP), Enterprise Secure Key Manager (ESKM), Atalla Cloud Encryption, and other products. • Encryption – The acquisition of Voltage provides HPE with an encryption and enterprise email and file security solution. • Security Research –TippingPoint DVLabs, the Zero Day Initiative (ZDI), and other research Website https://www.hpe.com/
Huawei
Humming Heads
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention, Mobile Security, VPN/Secure Access, DDOS Security Brief Overview Huawei is a global ICT provider offers a range of network security products. Headquarters Huawei Technologies Co. Ltd. Bantian, Longgang District Shenzhen, 518129 China Executives Ren Zhengfei serves as Founder and CEO of Huawei. John Suffolk serves as Huawei’s Global Cyber Security & Privacy Officer. History Ren Zhengfei founded Huawei in 1987. The private company has grown steadily over the years and now employs over 140,000 employees across the globe, recoding US sales in 2010 of $22B. The company refers to itself as a “collective” rather than a private company, which has been important in gaining state support during its history. Key Acquisitions CIP (2012) Key Competitors Cisco, Juniper Products and Services Huawei offers a large portfolio of networking and ICT products and services, including roughly 5 percent of the world’s smartphones. In the networking and security area, Huawei offers the following products: • USG9500 Cloud Data Centers Security Gateway – Cloud data center security gateway in appliance form • NIP2000-5000 Intrusion Prevention System Series Product – IPS appliance product. • AntiDDOS 1000 Series DDOS Defend System – DDOS appliance with performances in the 2 – 5 Gbps range. • Enterprise Unified Maintenance Audit – Provides central management, monitoring, and audit support for IT security functions. • Enterprise Policy Center – Provides unified access policy support for Internet and Intranet access. • Enterprise AnyOffice – Mobile security solution providing BYOD support. Website https://www.huawei.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools Brief Overview Humming Heads provides a range of anti-virus and Internet security products including a corporate security platform. Headquarters Humming Heads Tsukishima 1-2-13 Chuo-ku Tokyo, 104-0052 Japan Executives Yoshiaki Matsuoka serves as President of Humming Heads North America. History Founded in 1999, the company is headquartered in Japan with a presence in North America. Key Competitors ESET, Kaspersky Products and Services Humming Heads provides anti-virus and Internet security solutions through its Defense Platform SHINOBI Home Edition. The platform provides anti-virus, program analysis, and whitelisting, with the corresponding alerting, detection, and notification capabilities. The company also offers a Business Edition for corporate security protection. Website https://www.hummingheads.co.jp/
Huntsman Security UK (Alpha Version 0.1 – 07/28/17 – No Vendor Approval) TAG Cyber Controls Security Information Event Management Brief Overview Huntsman Security is an information security software company which provides solutions to organisations to enable the collection, analysis and alerting/reporting on systems, user and applications activity logs, audit trails and event data. Headquarters Huntsman/Tier-3 – London 7-10 Adam Street, Strand London WC2N 6AA Executives Peter Woollacott serves as Founder and CEO of Huntsman Security. History Founded in 1999 by Peter Woollacott, Huntsman Security is headquarted in the UK with offices in San Francisco, Sydney, and Tokyo. Key Competitors LogRhythm, Secnology Products and Services The Huntsman defence-grade cyber security suite provides a modular platform to deliver advanced security analytics, compliance management and reporting and cyber threat detection that you can scale horizontally and vertically to increase volume, by adding capacity. Website https://www.huntsmansecurity.com/
Hypersecu Information Systems (Alpha Version 0.1 – 07/28/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication, Brand Protection Brief Overview Hypersecu Information Systems provides multi-factor authentication and public key infrastructure, as well as software copyright protection. Headquarters Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond, BC V7C 4V4 Canada Tel: (604) 279 - 2000 Executives James Li serves as Founder, President, and CEO of Hypersecu Information Systems. History Founded in 2009 by James Li, this small privately held company is headquarterd in Canada wih a US office in Washington. Key Competitors ID Control, MarkMonitor Products and Services Hypersecu products include: • HyperOTP Edge – One-time password card • HyperFIDO – U2F Security key designed to add two-factor authentication when signing into online services • HyperPKI – Line of PKI enabled hardware devices that allow use of certificate-based PKI authentication, encryption/decryption, and digital signing • HyperSC – Line of secure physical smart crd or circuit cards, and cmart card readers • HyperDRM - Digital Rights Managements encryption technology protects software intellectual property rights using an advanced hardware-based system to protect information and applications developed on Linux, Windows, and Mac operating systems. Website https://www.hypersecu.com/
Hypori
HyTrust
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview Hypori provides a secure mobile app platform for delivering secure services virtually. Headquarters Hypori 9211 Waterford Centre Boulevard Suite 100 Austin, Texas 78758 Tel: (844) 279 – 4357 Executives David Hood serves as CEO of Hypori He was previously with AT&T and Cisco. History Brian Vetter and Justin Marston co-founded Hypori, which is headquartered in Austin, Texas. The company was previously known as DroidCloud. It received three rounds of $13.95M in investment through Series A in 2015. Green Visor Capital is an investor in the company. Key Competitors Citrix, VMware Products and Services Hypori’s agentless secure mobile app platform supports a variety of mobile devices and scenarios for usage in the enterprise. The solution includes a thin client to support secure service access from endpoints. The result is a virtual mobile device running on a server so that nothing runs on the actual mobile device. This approach ensures that no enterprise data is ever stored at rest on the physical mobile device. Instead, everything is stored and managed on the protected server. Website https://www.hypori.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview HyTrust provides encryption-based security solutions for enterprise customers using cloud services. Headquarters HyTrust, Inc. US Headquarters 1975 W. El Camino Real, Suite 203 Mountain View, California 94040 Tel: (650) 681 – 8100 Executives John De Santis, CEO and Chairman of HyTrust, was formerly Vice President, Cloud Services for VMware. History Eric Chiu, Renata Budko, and Boris Strongin founded HyTrust in 2008. The company is headquartered in Mountain View with an office in Dublin, Ireland. HyTrust has received $5.5M in Series A funding from Trident Capital and EPIC ventures, $10.5M in Series B funding from Granite Ventures, Trident Capital, EPIC Ventures, and Cisco, and Series C funding from Trident Capital, VMware, Cisco, Granite Ventures, EPIC Ventures, and In-Q-Tel. Key Acquisitions HighCloud Security (2013) – Cloud security Key Competitors CipherCloud, Boxcryptor, Skyhigh Networks, Vormetric Products and Services HyTrust offers the following solutions for enterprise customers requiring cloud security and compliance: • HyTrust CloudControl – This solution is a virtual appliance that allows locking-down of virtual machines and data using built-in encryption and key management. The solution works for public, private, and hybrid cloud deployments, with support for both Windows and Linuxbased environments. The solution involves a software agent that ensures data written to storage by an application is encrypted in motion and at rest, through the hypervisor and network. • HyTrust DataControl – HyTrust provides similar functionality and can be deployed into the operating system of any virtual machine on any public, private, or hybrid cloud. • HyTrust Compliance – The company also focuses on virtualization and cloud compliance offering vSphere and vCenter administrative controls, configuration hardening for virtual infrastructure, and virtual machine encryption. Website https://www.highcloudsecurity.com/ https://www.hytrust.com/
IANS
iboss
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview IANS offers general and customized information security training and education through a range of events and services. Industry experts participate as faculty Headquarters IANS 2 Center Plaza, Suite 500 Boston, MA, 02108 Tel: (617) 399 – 8100 Executives Phil Gardner, Founder and CEO of IANS, spent several years in the US Navy, as well as Goldman Sachs and McKinsey, before founding a company called Provant. History IANS was founded in 2001 as the Institute for Applied Network Security. The company was inspired to utilize the case study method to help train security practitioners. It has since grown to include a range of professional services for enterprise customers. Key Competitors SANS Products and Services IANS delivers expert information security guidance from practitioners, to practitioners, using tailored case studies and other methods such as webinars. IANS offerings include professional services, training, consulting, and research packages in the following areas: • Decision Support – This includes resources for customers including a research portal, tailored decision support webinars, topic-focused IANS forums and symposiums, an “ask an expert” function, and a “QuickPoll” capability.” • Insights – IANS offers expert guidance on information security through its portal and blog. • Events – IANS regularly runs general training and educational forums, symposiums, and webinars on information security in different locations • Consulting Services – IANS supports a range of technical projects, including penetration testing, security architecture review, and forensic analysis. IANS also supports strategic projects, including overall security assessment, security policy review, and mobile security strategy. Website https://www.iansresearch.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Web Security Brief Overview The security solutions offered by iboss include a Web Security Platform supporting layered APT and mobility defense products. Headquarters iboss Corporate HQ 101 Federal Street Boston, MA 02110 Tel: (858) 568 – 7051 Executives Paul Martini, Co-Founder and CEO of iboss, was previously with Copper Mountain Networks. History Twin brothers, Peter Martini and Paul Martini, co-founded iboss in 2003. The company is headquartered in Boston with offices in Fort Lauderdale and Orlando, Florida; Essex, UK; Irvine, California; and Buenos Aires, Argentina. The company accepted $35M in investment from Goldman Sachs in 2015. Key Competitors Blue Coat, Zscaler, Websense Products and Services The products offered by iboss, which focus on Web security, mobile security, and layered APT defense, are available as appliances, cloud, and hybrid deployments. Solutions areas include malware and data protection, SSL traffic management, application security, mobile security (MDM and BYOD), social media security, network availability, and Web content filtering. Specific products offered include the following: • Web Security – Involves the iboss Secure Web Gateway, which offers https and SSL protection, advanced application management threat and event reporting via a console, intelligent bandwidth control, and BYOD management. • FireSphere Layered APT Defense – Involves behavioral sandboxing, continuous monitoring, network baselining, high-risk quarantine, intrusion prevention, and signature/heuristic AV. • Mobile Security – Provides cloud Web security, MDM capabilities, and BYOD management. Website https://www.iboss.com/
IBM
Icon Labs
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Mainframe Security, Security Information Event Management, Security Consulting, Web Fraud Prevention, Cloud Security, Infrastructure Security, Secure File Sharing, VPN/Secure Access, ICS/IoT Security, Mobile Security, Password/Privilege Management, Governance, Risk, and Compliance, Security Analytics, Threat Intelligence, Application Security, PCI DSS/Compliance, Vulnerability Management, Information Assurance, Managed Security Services, Security R&D Brief Overview IBM is a global technology and consulting company, including a range of security products and services. Headquarters IBM Corporation, 1 New Orchard Road Armonk, New York 10504 Executives Ginni Rometty serves as Chairman, President, and CEO of IBM. History IBM is an iconic company with an iconic history in computers, systems, technology, and global services. The public company trades on the New York Stock Exchange and posted revenue in 2013 of nearly $100B. Key Acquisitions BigFix (2010) – IT Security OpenPages (2010) – Risk Management Algorithmics Inc. (2011) – Risk Management Q1 Labs (2011) – Security Intelligence Trusteer (2013) – Cyber Security and Fraud CrossIdeas (2014) – Cloud Security Lighthouse (2014) – Cloud Security Bluebox (2015) – Private Cloud as a Service Resilient Systems (2016) – Incident Response Key Competitors HPE, Accenture, CSC Products and Services IBM organizes its cyber security products and services in the following areas: • Application Security Services • Data Security Services d critical data protection. • Emergency Response Services • Identity and Access Management – Based on Tivoli platform, includes user provisioning, managed identity, cloud identity, Web access management, and strong authentication services. • IT Risk Management and Security Consulting • IT Security Governance and Compliance Services • Managed Security Services and SIEM • Mobile and Network Security Services • PCI Security • Penetration Testing Website https://www.ibm.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls ICS/IoT Security, Mobile Security, Hardware/Embedded Security Brief Overview Icon Labs secures the Internet of Things (IoT) by providing portable software to protect embedded devices with firewall, access, and network management. Headquarters Icon Labs 3636 Westown Parkway Suite 203 West Des Moines, Iowa 50266 Tel: (515) 226 – 3443 Executives Alan Grau, President and Co-Founder of Icon Labs, held previous positions with Motorola and AT&T Bell Laboratories. History Alan Grau co-founded Icon Labs in 1992. The privately held company is headquartered in Iowa. Key Competitors Intel, ESCRYPT Products and Services Icon Labs offers an embedded software product suite that can be grouped as follows: • Floodgate Defender – Involves an embedded firewall for networked devices with conventional features such as static filtering, stateful inspection, and threshold filtering. • Floodgate Agent – Provides endpoint policy and management control • Floodgate Aware – Situational awareness for endpoint devices • Floodgate at Home – Software firewall that protections smart home devices from attacks • Floodgate Defender Appliance – compact firewall appliance that provides drop-in protection for networked industrial devices • Iconfidant SSH – Provides SSH and SFTP client and server software • Iconfidant SSL – Remote secure access to Web servers • Envoy SNMP – Development and runtime environment for SNMP agents Website https://www.iconlabs.com/
Idappcon
ID Control
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Attack Detection/Prevention Brief Overview Idappcon provides IDS and gateway solutions for evaluating the effectiveness of attack detection tools in the enterprise. Headquarters Idappcom Ltd 66 Prescott Street London E1 8NN United Kingdom Tel: +44 (0)203 355 6804 Executives Ray Bryant serves as Chairman and Managing Director of Idappcon. He was previously with Ciba Geigy in Switzerland. History Idappcon was formed in 2004 in Guernsey. Operations were moved to the UK in 2009. The company has development offices in the UK and India. Key Competitors Gurock Products and Services Solutions from Idappcon include the following enterprise attack detection and prevention auditing and assessment support: • Traffic IQ Professional – Audits network-based security defenses • Traffic IQ Gateway – Applies advanced evasion techniques to IP traffic. • Easy Rules Manager – Snort-based intelligent framework including a rules creator Website http://www.idappcom.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview ID Control provides a range of strong authentication and encryption products for securing business access, transactions, and authorization. Headquarters ID Control Van Diemenstraat 202 The Hague South-Holland 2518 VH The Netherlands +31 888 SECURE (732873) Executives Hans Kortekaas serves as CEO of ID Control. History The privately held company was founded in 2005 and is headquartered in The Netherlands. Key Competitors VASCO, SafeNet, Symantec, Entrust, Gemalto, Imprivata Products and Services ID Control provides strong authentication and encryption solutions that can be grouped as follows: • ID Control USB Token – Securely encrypts files on flash storage • HandyID and MessageID – Mobile phone as authentication token • KeystrokeID – Biometric authentication • ID Control OTP Key – Hardware one-time password key • CardID – Credit card sized one time password key • RiskID – Risk-based authentication • MailID – Encryption, decryption, and signing of documents • ID Control Server – Authentication management server with SSO Website https://www.idcontrol.com/
Identacor
IDentia
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Identacor provides a cloud-based identity and access management solution for corporate Web applications. Headquarters Identacor LLC Newport Beach, California 92660 Tel: (213) 260 – 0080 Executives Sandy Dalal is CEO of Identacor. History Sandy Dalal founded Identacor in 2013, although the principals have been helping customers with identity and access management since 1998. The small company remains privately held. Key Competitors Okta, ForgeRock Products and Services Identacor provides cloud-based identity and access management for corporate Web applications. Identacor offers virtual technology, including hosting on Amazon Web Services (AWS) platform, for user authentication, user management, login and password policy management, single sign-on support for SAML 2.0 applications, and browser extension technology for apps that do not support native SSO protocols. The company recently announced partnerships with Zendesk and Kintone. Website https://www.identacor.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview IDentia provides identity and access management, as well as cloud security products and services. Headquarters IDentia Inc. 13800 Coppermine Road, Suite 300 Herndon, Virginia 20171 Executives Dr. Nick Duan serves as President and CEO of IDentia. History Dr. Nick Duan founded Identia. The Mach37 accelerator supported the small company, which reports $50K in venture funding from a single investor. Key Competitors Okta, ForgeRock Products and Services IDentia provides cloud identity solutions with the following capabilities: • IDentia Identity Provider – Centralized Identity Provider (IdP) offers centralized user authentication for distributed Web application and services via gateway bridging between back-end attribute services and relying parties for user attribute information. • SAML Attribute Service – Security Assertion Markup Language (SAML) compliant Web service for integrating directory services. • Policy Administration Services – IDentia Policy Admin Services (PAS) for centralized policy store and lifecycle management to policy decision and enforcement points (PDEP). • Discovery Service – For selecting and using appropriate identity service during authentication • Metadata Service – Centralizes identity metadata management • Relying Party – Client component for enabling Web applications and services for authentication via IDentia IdP. Website http://www.identiainc.com/
Identiv
ID Experts
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Identiv provides products for identity and smart card access including credentials, RFID support, and readers. Headquarters Identiv 2201 Walnut Ave., Suite 100 Fremont, California 94538 Tel: (888) 809 – 8880 Executives Steven Humphreys, CEO and Director of Identiv, was previously CEO of Flywheel Software. History The company is headquartered in Fremont, with operational headquarters in Santa Ana and Federal headquarters in Arlington. The company also has a presence in APAC, EMEA, and Japan. Identiv is a publicly trade company with common stock listed on the NASDAQ. Key Competitors HID Global, Identicard Products and Services Identiv provides a range of identity and trust-related products that can be grouped as follows: • idOnDemand – Trusted identity and smart card solution • Transponders – RFID and NFC technology • uTrust Premises Readers – Physical access control support • uTrust Software – Integrated software platform • uTrust Credentials – Trusted credentials for converged access • uTrust Information Readers – Secure logical access • uTrust Controllers – Identiv controller • Identiv Services – Range of “Identity-as-a-Service” offerings Website https://www.identiv.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Incident Response, Digital Forensics Brief Overview ID Experts provides solutions to support privacy incident response in sector such as medical and healthcare. Headquarters ID Experts Lincoln Center One 10300 SW Greenburg Road, Suite 570 Portland, Oregon 97223 Executives Rick Kam serves as President and Co-Founder of ID Experts. History Founded in 2003, ID Experts received $2.1M in venture funding from Rogue Venture Partners in 2013. The company is headquartered in Oregon with regional offices in Boston, Philadelphia, Atlanta, Phoenix, Dallas, Chicago, and San Diego. Key Competitors Resilient Systems Products and Services ID Experts provides privacy incident response support via the RADAR Saas platform. Capabilities include the following: • Breach Risk Reduction • Consistent Assessments • Workflow Support • Compliance Repository The platform guides users through the process of assessing, analyzing, and responding to incidents. The platform captures incidents into a profile from which the RADAR Breach Guidance Engine can provide analytic support. Website https://www.idexpertscorp.com/
Igloo Security
IKANOW
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services Brief Overview Igloo is a Korean company that provides managed security services including SIEM management. Headquarters Igloo Security 6th Floor 7 Jeongui-ro 8-gil, Songpa-gu Seoul, Korea 135-721 Tel: +82 2 3452 8814 Executives Lee Deuk-choon serves as CEO of Igloo Security. History The company was established in 1999, and has grown to roughly 600 employees in the years since. Igloo Security has ben listed on the KOSDAQ exchange since 2010. Key Competitors SK Infosec, INCA Internet Products and Services Igloo Security offers solutions for business customers, primarily in Korea, in the following areas: • Managed Security Services – Includes security management (remote, on-site security control), CERT (reaction, analysis), and security system integration (implementation and installation). • Centralized Monitoring – Based on the LIGER-1 Next Generation Integrated Security Management Platform, which offers real-time management and control of security infrastructure. • Security Consulting – Igloo offers consultation, training, impact analysis, and penetration testing. Website http://www.igloosec.co.kr/en/index.do
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview IKANOW provides Big Data analytic solutions to reduce the risk of breaches and APT attacks. Headquarters IKANOW 11921 Freedom Drive Suite Suite #550 Reston, Virginia 20190 Tel: (888) 420 - 3846 Executives Dave Camarata is the Co-Founder and CEO of IKANOW. His first company, MTCSCS, was sold to ManTech International. History Founded in 2010, based on intelligence work in Afghanistan and Iraq, the company is headquartered in the Washington, DC area. Key Competitors Palantir Products and Services IKANOW provides Big Data analytic solutions in the following areas: • Cyber Threat Analytics – Involves taking feeds from SIEM, logs, and other sources to produce reports and a dashboard of threat intelligence • Crisis Informatics – Involves using data analytics to deal with crisis response • Social Intel – Involves set of tools to mine data sources including RSS feeds, Web pages, databases, XML documents, and other sources The IKANOW analytics platform is open source (community edition) with an enterprise grade version available for business and government customers. Website http://www.ikanow.com/
Ikarus Security Software Illumio (Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools Brief Overview Ikarus provides security software to prevent viruses and to secure mobility and cloud computing. Headquarters Ikarus Security Software GmbH Blechturmgasse 11 1050 Vienna Austria Tel: +43 1 58995 0 Executives Josef Pichlmayr serves as CEO of Ikarus Security Software. History Victor Mayer-Schonberger founded Ikarus Security Software in 1986 as one of the first anti-virus vendors. The company is headquartered in Austria. Key Competitors Kaspersky, Trend Micro Products and Services Ikarus Security Software provides security solutions in the following areas: • Endpoint Protection – Includes security solutions for PC, network, mailbox, smartphone, and tablet. Areas of focus include anti-virus, security manager, security for Android devices, and MDM for Android devices. • Network Protection – Includes gateway security, cloud security with monitoring for email, Web, and WiFi, and scan server, which scans files for malicious content. Website https://www.ikarussecurity.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Cloud Security Brief Overview Illumio builds a cloud-based platform for securing application workloads using virtualized protections. Headquarters Illumio 160 San Gabriel Drive Sunnyvale, California 94086 Tel: (669) 800 – 5000 Executives Andrew Rubin, CEO of Illumio, was formerly CEO of Cymtec. History Founded by Andrew Rubin and PJ Kirner, Illumio initially raised nearly $8M in backing from venture firms such as Andreessen Horowitz, Marc Benioff (Salesforce CEO), Aaron Levie (Box CEO), and Steve Herrod (former VMware). In 2013, the start-up received an additional $34M from General Catalyst, Formation 8, and Andreessen Horowitz. Series C investors include Data Collective, Valor Capital Group, Jerry Yang, Marc Benioff, John Thompson, and General Catalyst Partners. The total funding through 2015 is $142.5M Key Competitors Red Hat (Docker), vArmour, Catbird, CloudPassage Products and Services Illumio offers a solution to protect applications running in virtual machines, which is being called “application virtualization protection.” The Illumio Adaptive Security Platform (ASP) includes the following protection for cloud workloads: • Illumination – Live application traffic and policy violation detection • Enforcement – Nano-segment application enforcement at workload (i.e., VMs, servers, processes) • Secure Connect – Protection of data with instant encryption support Functionality embedded in the platform includes access, enforcement, and segmentation. A process called RAEL provides labeling of workloads in servers, relationships are embedded in white lists, and the policy engine enforces security via graph dependency and algorithmic provisioning. Natural language-based rules are also supported by the platform. Website https://www.illumio.com/
Illusive
ImageWare
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention Brief Overview Illusive utilizes deception-based technology to detect advanced threats in the enterprise. Headquarters Illusive US 25 West 36th Street. 11th Floor New York, New York 10018 Israel HQ Totseret Ha-Arest St. 7, 4th Floor Tel Aviv-YaFo, 6789104 Executives Ofer Israeli is the Founder and CEO of illusive networks. History Founded by Ofer Israeli the illusive team originates from the Unit 8200, the Israeli elite cybersecurity Intelligence Corps. Key Competitors Attivo Products and Services Illusive provides a solution called illusive Deceptions Everywhere that uses deception to weave a layer of protection across endpoints, servers, and network components. When an attacker penetrates the network, the data becomes unreliable and the attack can be detected and paralyzed. Website https://www.illusivenetworks.com/
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview ImageWare provides a range of biometric solutions to support authentication and identity management. Headquarters ImageWare Systems Inc. 10815 Rancho Bernardo Road, Suite 310 San Diego, California 92127 Tel: (858) 673 – 8600 Executives Jim Miller has served as Chairman and CEO of ImageWare since 1997. History The company is headquartered in San Diego with offices in Portland, Canada, and Mexico. Key Competitors Hoyos Labs Products and Services ImageWare provides a range of biometric solutions that can be grouped as follows: • GoVerifyID – Replaces passwords and PINs with biometric security • GoCloudID – Cloud-based identity management platform • IWS Biometric Engine – Multimodal biometric technology for identity management • IWS CloudID – Supports applications and business services • GoMobile Interactive – Mobile based authentication Website https://www.iwsinc.com/
Immunity
Imperva
(Alpha Version 0.1 – 06/20/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing Brief Overview Immunity provides security-consulting services including assessments and penetration testing. Headquarters Immunity Headquarters 2751 N. Miami Ave. Suite #7 Miami, Florida 33127 Tel: (786) 220 – 0600 Executives Dave Aitel, CEO of Immunity, worked previously for the National Security Agency, as well as @Stake. History Founded in 2002. Immunity is headquartered in Miami Beach with additional staff located in Washington, Argentina, Canada, and Italy. Key Competitors Rapid7, Hedgehog Security, Intrepidus Products and Services Security professional services that are offered by Immunity include the following: • Application Vulnerability Analysis • Network Security Assessment • Web Application Testing • Wireless Security Assessment • Process Review • Source Code Analysis • Exploit Development and Reverse Engineering • Penetration Testing • Certified Network Offense Professionals • Consulting The company also makes available a range of security penetration testing product tools including Canvas (packaged exploits), Swarm (penetration test control), Innuendo (advanced attack modeling), Silica (WiFi testing), Debugger (reverse engineering), El Jefe (Windows process monitoring), Drosera (forensics), and D2 Elliott (Web security). Website https://www.immunityinc.com/
(Alpha Version 0.1 – 06/20/17 – Vendor Approval) TAG Cyber Controls Web Security, Web Application Firewall, Cloud Security, DDOS Prevention Brief Overview Imperva provides a range of Web application, database, file, and cloud security products for protecting business critical data and applications. Headquarters Imperva, Inc. 3400 Bridge Parkway, Suite 200 Redwood Shores, California 94065 Tel: (650) 345 – 9000 Executives Anthony Bettencourt, President, chairman of the Board, and CEO of Imperva, was previously CEO of Coverity, and currently serves on the Board of Directors for Proofpoint. History Shlomo Kramer, Amichai Shulman, and Mickey Boodaei founded Imperva in 2002. The company has grown to over 1000 employees with $234M in revenue (2015) with its main offices in Redwood Shores, California. The company is public and trades on the NYSE. Key Acquisitions Incapsula (2014) – Cloud WAF, DDoS, CDN Skyfence (2014) – SaaS security Tomium (2014) – Software assets for mainframe data security Key Competitors F5, IBM, Akamai Products and Services Imperva offers data and application security products that can be grouped as follows: • Web Application Security – Includes the SecureSphere Web Application Firewall (WAF), Incapsula WAF and DDOS protection, ThreatRadar subscriptions, including reputation services, community defenses, and fraud prevention services. • File Security – Includes file activity monitor, file firewall, SecureSphere for SharePoint, user rights management for files, and directory services monitor. • Database Security – Includes a database activity monitor, database firewall, database assessment, Big Data security, and database security add-ons. • Cloud Security – Includes SecureSphere for Amazon Web Services (AWS) and Microsoft Azure, as well as Skyfence for cloud app security. • Breach Prevention – includes CounterBreach to protect enterprise data from compromised, careless or malicious users Website https://www.imperva.com/
Imprivata (Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Imprivata provides authentication, single-sign-on, and password management solutions, with emphasis on health care. Headquarters Imprivata, Inc. 10 Maguire Road Building 1, Suite 125 Lexington, Massachusetts 02421 Tel: (781) 674 - 2700 Executives Gus Malezis is the President and CEO of Imprivata. History Founded by Phil Scarfo and David Ting in 2002, the company has grown to support 1,250 clients, primarily in health care, around the world. The company went public in 2014 on the NYSE. Thom Bravo announced its intention to take over the firm in 2016 in a deal valued at $544M. Key Acquisitions IdentiPHI (2009) – Biometrics HT Systems (2015) – Authentication and access management Key Competitors Entrust, BIO-key Products and Services Imprivata offers a range of authentication and related products, with emphasis on health care providers. The solutions can be grouped as follows: • Single Sign-On – Imprivata OneSign provides single signon to streamline clinical workflow • Authentication Management – Offers clinical access with badges, passwords, PINs, and related factors • Virtual Desktop Roaming – Supports Citrix or VMware virtual desktops with automated logins • Secure Communications – Provides secure messaging across desktop sna devices Website https://www.imprivata.com/
Impulse Point (Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Network Access Control, Endpoint Security Brief Overview Impulse Point provides a solution called SafeConnect that manages network access policies and endpoint security with emphasis on BYOD and the education marketplace. Headquarters Impulse Point 5650 Breckenridge Park Drive, Suite 201 Tampa, Florida 33610 Tel: (813) 607 – 2771 Executives J. David Robinson, CEO of Impulse Point has previously founded and sold start-up and mature companies, including having served in roles at DoD and a healthcare company. History The private company, founded in 2004, is headquartered in Tampa, Florida with offices in Boston and Austin. Key Competitors ForeScout, Bradford Networks, Cisco Products and Services The Impulse Point SafeConnect solution for devices and users offers administration of network access policy modules to comply with anti-virus, anti-Spyware, Microsoft OS patches, peer-to-peer file sharing, registration, and authentication requirements. Specific capabilities, many driven by the unique needs of academic institutions to balance the needs of security with students desire for network freedom, that are embedded in SafeConnect include the following: • Contextual Intelligence – Allows automation of security and compliance policy enforcement • Policy Enforcement Flexibility – Allows policy decisions based on location, identity, and other organizational attributes. • Real-Time Identity for Mobiles – Involves identity-todevice mapping SafeConnect works as a passive appliance connected to directory services (LDAP, MS Active Directory, etc.) with support for remote maintenance and rapid installation. A primary focus for the company is the education technology marketplace including both K through 12, and higher education. Website http://impulse.com/
INCA Internet
Include Security
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools Brief Overview INCA Internet is a Korean software company, also known as nProtect in the US that includes a line of security products such as anti-virus. Headquarters INCA Internet Co. Ltd. ACE High End Tower 1201 Guo-3dong Guro-Gu Seoul, 152848 South Korea Tel: 82 2 6220 8000 nProtect Inc. 3003 N. First Street #301 San Jose, California 95134 Executives Young Heum Joo serves as President and CEO of INCA Internet. History Founded in 2000, the company is headquartered in both South Korea and San Jose, California. Key Competitors Kaspersky, AhnLab Products and Services In addition to their nProtect anti-virus/Spyware solution, and their GameGuard security solution for gaming companies, additional products offered by nProtect include the following: • NOS – nProtect Online Security provides endpoint protection for financial transactions via malware monitoring, keystroke protection, anti-screen capture, anti-phishing, network protection, and DNS monitoring. • NSRS – nProtect Security Reporting System provides real-time, cloud-based threat activity monitoring. • NFDS – nProtect Fraud Detection and Prevention includes a rule engine that calculates risk score. • nProtect Mobile – Includes a multi-layered mobile financial transaction solution. • nProtect Defenstick – Personal data management on a secure USB stick. Website https://www.nprotect.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Include Security offers information and application security assessment, advisory, and consulting services. Headquarters Include Security Brooklyn, New York 10016 Tel: (424) 242 – 2592 Executives Paolo Po is an Operations and Project Manager at Include Security. Kensington Moore is Director of Sales and Business Development at Include Security. History The privately held company was founded in 2010, and is headquartered in New York City. Key Competitors NCC Group Products and Services Include Security is a boutique consulting firm that consists of full and part-time experts and that offers the following information security professional services for clients: • Security Assessments – This includes client applications, server applications, Web applications, Web services, and mobile applications. • Reverse Engineering – This Includes software reverse engineering, competitive intelligence reverse engineering, exploit development and reverse engineering, and fuzzing and dynamic analysis tool creation. Website https://www.includesecurity.com/
Indegy
Indusface
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls ICS/IoT Security Brief Overview Indegy provides solutions for establishing visibility and control for industrial control networks. Headquarters Indegy Yigal Alon 126, Building C Tel Aviv-Yafo 6744332 Israel Tel: +972 (3) 550 - 1783 Executives Barak Perelman serves as Co-Founder and CEO of Indegy. Shlomo Kramer serves on the company’s Board. History Indegy landed $12M in Series A funding in a 2016 round led by Vertex Ventures. The company has offices in Tel Aviv and California. Key Competitors Bayshore Networks Products and Services Indegy provides a platform for protecting and supporting visibility into ICS networks. The platform includes the following features: • Visibility and control of ICS networks • Identification of malicious actors with alerting • Problem troubleshooting from configuration or firmware issues • Regulatory compliance and change management Website https://www.indegy.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Web Application Firewall, Application Security, Vulnerability Management Brief Overview Indusface offers a suite of Web application firewall (WAF), and Web and mobile application testing products. Headquarters Indusface A/2-3, 3rd Floor, Status Plaza Opp. Relish Resort, Atladara Old Padra Road, Vadodara, 390020 Gujarat, India Tel: +91-9343824004 Executives Ashish Tandon, CEO of Indusface, is also founder, investor, and board member of OpenClove. History Indusface was founded in 2004. The privately held company is headquartered in India and continues to grow, reporting 150 new hires in 2014. Key Competitors Barracuda Products and Services Indusface provides enhanced security for Web and mobile applications via WAF and penetration testing capabilities. Indusface offers its IndusGuard platform, which can be described in terms of the following components: • IndusGuard Web – Involves support for creating dynamic Website groups to help manage granular access to multiple Websites from a single console. Also includes support for managing and reporting on vulnerabilities. • IndusGuard WAF – Involves a Security-as-a-Service WAF capability to block application layer attacks with support for DDOS mitigation, continuous application protection, and minimal false positives. • IndusGuard Mobile – Supports penetration testing for mobile applications. • SSL Certificates – Involves certificates for e-commerce sites running SSL. Website https://www.indusface.com/
Infinigate
InfoAssure
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Infinigate is a value added distributor in the UK for a set of security services from companies such as Corero, Dell, and Trustwave. Headquarters Infinigate Holding AG Grundstrasse 14 6343 Rotkreuz, Zug, Switzerland Infinigate UK Arch 8 Chancel Street London SE1 0UR United Kingdom Tel: +44 (0) 207 593 3290 Executives David Martinez serves as CEO of the Infinigate Group. History Infinigate was founded in 1996 as Internet2000. It now operates as the Infinigate Group and is headquartered in Switzerland. The company maintains a network of subsidiaries across Europe. Key Acquisitions Nocom Security Group (2007) – Scandinavian security group Key Competitors Westcon, IT Security Experts Products and Services Infinigate is a value added distributor of information securityrelated products and services in the areas of firewalls, VPN, IPS, IDS, content security, encryption, strong authentication, managed security, cloud security, security training, security consulting, and security sales and marketing support through partnerships a range of companies including Ultra Electronics AEP, Corero, Dell Software, and Evidian. Website https://www.infinigate.co.uk/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview InfoAssure provides a solution for data owners to protect their assets through a combination of cryptography and content-based access controls. Headquarters InfoAssure, Inc. 1997 Annapolis Exchange Parkway, Suite 210 Annapolis, Maryland 21401 Tel: (410) 757 – 4188 Executives James Lightburn, Co-Founder, Chairman and CEO of InfoAssure, was formerly co-founder and CEO of Information Operations Associates. History Info Assure was founded in 2002, and created a set of patented solutions under the Small Business Innovation Research (SBIR) program. The company has close ties to the Defense community of the US with Frank Carlucci (former National Security Advisor and Secretary of Defense) and LTG James Williams (former Director of the DIA) as senior advisors to the company. Key Competitors SafeNet, Vormetric Products and Services InfoAssure provides a platform called Need2Know (N2K) that offers data protection for owners using a scheme called crypto labeling. N2K labels are distributed to users (human or device) and are updated over the network and enforced using real-time authorization policies including revocation. Website http://www.infoassure.net/
Infoblox (Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Infrastructure Security, Threat Intelligence Brief Overview Infoblox provides solutions for secure DNS as well as related network services, cloud, and virtualization. Headquarters Infoblox 3111 Coronado Drive Santa Clara, California 95054 Tel: (408) 986 – 4000 Executives Jesper Andersen, President and CEO of Infoblox since 2014, worked previously at Cisco and Oracle. History Founded by Stuart Bailey in 1999, Infoblox acquired Netcordia in 2010. The company trades on the NYSE and is headquartered in Santa Clara with offices in Annapolis, Chicago, New York, Canada, Mexico, Belgium, France, Frankfurt, Munich, Russia, Spain, The Netherlands, UK & Ireland, UAE, Singapore, Japan, Beijing, ShenZhen, Hong Kong, Taiwan, Sydney, Korea, and India. Key Acquisitions IID (2016) – Threat intelligence Internet Associates (2014) Netcordia (2010) – Network task automation Key Competitors Nominum Products and Services Infoblox provides the following set of products: • Secure DNS • Network Services (DNS, DHCP, IPAM) • Hybrid Cloud and Virtualization • Network Automation • Threat Intelligence The secure DNS capability protects against DNS attacks with mitigation of exploits, volumetric and DNS hijacking attacks. The company also offers a DNS firewall with a FireEye adaptor. Website https://www.infoblox.com/
Infocyte (Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management Brief Overview Infocyte offers intrusion assessments, malware hunting, and threat engagement services. Headquarters Infocyte 110 E. Houston Street, Floor 7 San Antonio, Texas 78201 Tel: (844) 463 - 6298 Executives Peter Klante serves as CEO of Infocyte. History Chris Gerritz, Ryan “Russ” Morris, and Jacob Stauffer cofounded Infocyte in 2014. All three were formerly with the US Air Force Computer Emergency Team. LiveOak Venture Partners offered $700K in seed funding. Key Competitors Lumeta, Tripwire Products and Services Infocyte provides security services in the following areas: • Intrusion Assessment – Involves enterprise scanning for advanced malware and attackers • Malware Hunting – Involves proprietary detection capabilities using human intelligence and advanced heuristics to identify rootkits and backdoors • Threat Engagement – Direct engagement with an adversary using interactive capabilities Website https://www.infocyte.com
InfoDefense
InfoExpress
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Governance, Risk, and Compliance Brief Overview InfoDefense provides security consultation services focused on regulatory compliance, information assurance, and response. Headquarters InfoDefense, Inc. 2745 Dallas Parkway, #510 Plano, Texas 75093 Tel: (972) 992 – 3100 Executives Kevin Wheeler, Founder and Managing Director of InfoDefense, co-authored a McGraw-Hill book entitled: “IT Auditing: Using Controls to Protect Information Assets.” History Kevin Wheeler founded InfoDefense in 2001. The private security and compliance firm is headquartered in Texas. Key Competitors LockPath Products and Services Solution areas focused on by InfoDefense include information protection, identity and access management, GRC, threat and vulnerability management, network security, and system security. Specific services offered include: • Security Assessment – Includes enterprise assessment, audit, compliance assessment, and penetration testing. • IT Governance, Risk, and Compliance – Focuses on policy, vendor management, and related services. • Security Design and Implementation – Design of security infrastructure and implementation assistance • Computer Incident Response – Support for response • Computer Forensics and eDiscovery – Forensics, eDiscovery, litigation support, and expert witness services. • Security Training – Support for CISSP, CISA, and related topics. Technology partners embedded in InfoDefense solutions include Symantec, Imperva, RedSeal, Palo Alto Networks, and Ping Identity. Website https://www.infodefense.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Network Access Control Brief Overview InfoExpress provides network access control product solutions for enterprise customers. Headquarters InfoExpress, Inc. 3235 Kifer Road, #310 Santa Clara, California 95051 Tel: (613) 727 – 2090 Executives Stacey Lum, Co-Founder, CEO, and CTO of InfoExpress, studied computer science and electrical engineering at UC Berkeley. History InfoExpress was established in 1993 as a dial-up information service. The first remote access VPN was provided in 1996, and the company had a firewall product in 1999. The private company is headquartered in California. Key Competitors ForeScout, Trustwave, Cisco Products and Services InfoExpress focuses on guest access to enterprise networks, BYOD support, policy inspection, and agentless policy enforcement. Specific products offered include: • CGX – Starts with a CGX virtual machine or appliance server that provides core functions for the CGX solution. Custom rule sets and policies can be established for flagging devices, sending alerts, and restricting access. • CyberGatekeeper – Checks for device compliance and will block rogue devices and assist in remediation. • CyberGatekeeper Remote – Sits between the VPN, remote access server, and corporate network for NAC support. • Dynamic NAC – Turns PCs into enforcers that monitors the network and stops rogues form gaining access without changes to the network. Website https://www.infoexpress.com/
InfoArmor
Infogressive
(Alpha Version 0.1 – 07/28/17 – No Vendor Approval) TAG Cyber Controls Threat Intelligence, Data Leakage Prevention Brief Overview InfoArmor provides solutions for employee identity protection and advanced threat intelligence to help organizations protect their assets. Headquarters 7001 N Scottsdale Road, Suite 2020 Scottsdale, AZ 85253 Tel: (480) 302 - 6701 Executives John Schreiber serves as CEO of InfoArmor. Drew Smith serves as Founder and Executive Chairman of InfoArmor. History Founded in eptember of 2007 by Drew Smith, InfoArmor is headquartered in Scottsdale, Arizona. Key Competitors McAfee, LookingGlass Security Products and Services The InfoArmor solutions can be brokwn down into three categories: • PrivacyArmor - Comprehensive identity and privacy protection benefits for mployees • VigilanteATI – Threat intelligence and investigative services • InfoArmor Identity Insights – Safeguard and engage customers though customized identity and remediation solutions Website https://www.infoarmor.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview Infogressive provides a range of managed and professional security services for enterprise customers. Headquarters Infogressive, Inc. 1560 S. 70th Streeet Lincoln, Nebraska 68506 Tel: (402) 261 – 0123 Executives Justin Kalhoff, Founder and CEO of Infogressive, had previous experience at Alltel and Fiserv. History Justin Kalhoff founded Infogressive in 2006. The small security services provider is located in Lincoln, Nebraska. Key Competitors Optiv, Solutionary (NTT), Trustwave Products and Services Infogressive provides managed and professional security services for enterprise customers in the following specific areas: • Managed Security Services – Customized to the specific needs of the customer, including providing fully outsourced managed security • Penetration Testing, Vulnerability, and Risk Assessment • Product Implementation, including Fortinet Training • Incident Response and Business Continuity Security technology and solution areas addressed by Infogressive include firewalls and WAF, malware, patch management, Web content filtering, encryption, and related areas. Infogressive also provides compliance support for PCI DSS, SANS 20 Critical Controls, HIPAA, NIST, and GLBA. Website https://www.infogressive.com/
InfoGuard
infoLock
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions, Security Consulting Brief Overview InfoGuard provides ICT security products, professional services, and managed security for business customers. Headquarters InfoGuard AG Lindenstrasse 10 Baar, ZG 6340 Switzerland Tel: +41 41 749 19 00 Executives Thomas Meier, CEO of InfoGuard, was previously with Crypto AG. History Founded in 2001, InfoGuard has grown to the largest security company in Switzerland. The public company has more than 300 security experts and customers in 130 countries. Key Competitors High-Tech Bridge, Navixia, Crypto AG Products and Services InfoGuard organizes its range of security products and services into the following broad categories: • Security Audits – Includes penetration testing and ethical hacking, security audit and review, vulnerability management, and social engineering audits. • Security Consulting – Includes ISO 27001-compliant Information Security Management System (ISMS) support, GRC, network and security architecture, security awareness, and security officer service. • Security Solutions – Includes layer 2 encryption (Ethernet, Fibre Channel, SONET, and Multilink), data center security, firewall, VPN, IDP, advanced threat detection, DDOS protection, smartphone security, Web security, NAC, strong authentication, and many related areas. • Network Products – Includes routing, switching, DWDM, and WAN optimization. • Managed Security Services – Includes cloud and managed security, managed firewall and VPN, managed infrastructure, out tasking and outsourcing, and managed SIEM services. InfoGuard maintain an extensive list of major information and network security technology partners including Adva, ActivIdentity, Airlock, Algosec, Arbor, Bluecat, Fortinet, Good, InfoGuard, Juniper, Palo Alto Networks, Sophos, SSH, Varonis, Websense, and Utimatico. Website https://www.infoguard.ch/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview infoLock provides information security consulting, integration, and value added resale (VAR) services. Headquarters infoLock Technologies 2900 South Quincy Street, Suite 330 Arlington, Virginia 22206 Tel: (877) 610 – 5625 Executives Sean Steele, Co-Founder and Managing Partner of infoLock Technologies, was previously with GlobalCerts. History Sean Steele and Chris Wargo co-founded infoLock Technologies in 2005. The company is privately owned and headquartered in Arlington, Virginia. Key Competitors Optiv, Towerwall, TotalTech, Nexum Products and Services The services offered by infoLock can be grouped as follows: • Consulting Services – Includes DLP (emphasis on Symantec), 360 risk assessment, data risk assessment, network vulnerability assessment, and security and regulatory compliance support. • Integration Services – Includes integration of DLP, encryption, device control, secure messaging, Web security, content filtering, SIEM, asset and patch management, and anti-virus/anti-Spam. Partners include Symantec’s Vontu, PGP, and GuardianEdge products. • Value added Resale (VAR) – Emphasis on Symantec products in DLP, authentication, Web security, and related areas. Website https://www.infolocktech.com/
Informatica
Infosec Global
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Informatica provides a range of Big Data solutions including a data security offering focused on critical data intelligence. Headquarters Informatica Corporate Headquarters 2100 Seaport Boulevard Redwood City, California 94063 Tel: (650) 385 - 5000 Executives Anil Chakravarthy serves as CEO of Informatica. History Founded in 1993 in Diaz Nesmoney and Guarav Dhillon, the company is headquartered in Redwood City. The public company trades on the NASDAQ. Key Acquisitions WisdomForce Technologies (2011) – Big Data integration 29 West (2010) Siperian (2010) Agent Logic (2009) Operational intelligence Address Doctor (2009) – Address verification Applimation (2009) – Data management Key Competitors TIBCO Products and Services Informatica has a Data Security Group that provides solutions including Secure@Source that identifies risk associated with sensitive data. The solution is in a new security category called Data Security Intelligence. The focus is risk intelligence focused on sensitive and critical data including customer data, PII, PCI, and other related data. Capabilities include data flow identification and assessment of exposure. Website https://www.informatica.com/
(Alpha Version 0.1 – 07/28/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Secure File Sharing Brief Overview The Infosec Global platform enables the interoperability of standard, custom, and multi-crypto solutions with a realtime service that remotely manages the cryptography of critical systems Headquarters 750 Battery Street San Francisco, California 94113 [emailprotected] Executives Nagy Moustafa serves as CEO, Co-Founder, and Chairman of Infosec Global. Dr. Taher Elgamal serves as Co-founder of Infosec Global, and is known as the Father of SSL. History Founded in 2009 by Nagy Moustafa and Dr. Taher Elgamal, Infosec Global has offices in the US, Canada, Switzerland, and Turkey. Key Competitors Intralinks, Ipswitch Products and Services The Agilesec Platform developed by Infosec Global is an enterprise multi-cryptography suite that applies, manages, and controls usage of cryptography across a large-scale digital footprint. The Agilesec Platform mitigates cryptographic risks, automatically patches vulnerabilities, and prevents the use of obsolete or weak cryptographic ciphers, while switching cryptographic implementations when needed for data management safety and optimization. Website https://www.infosecglobal.com/
Infosec Inc.
Infosec Institute
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Mainframe Security Brief Overview InfoSec provides a range of security products and services for mainframe computer systems. Headquarters InfoSec Inc. 14001-C St. Germaine Drive Suite 809 Centreville, Virginia 20121 Tel: (703) 825 – 1202 Executives Robert Fake, President of InfoSec Inc., was previously senior vice president with Computer Associates (CA). History Founded in 1998 to focus on mainframe, the private company is headquartered in Centerville, Virginia. Key Competitors Enforcive, IBM, CA Products and Services InfoSec provides specialized products and services for mainframe computer systems including the Mainframe Event Acquisition System (MEAS) and resale of the TSSADmin Express for CA Top Secret. Services focus in the following areas: • Installing, implementing, and upgrading mainframe security • Assessment and compliance support for PCI DSS, DoD Diacap, HIPAA, etc. • RBAC design and implementation • Security database cleanup • Resolving audit concerns • Extending application security • z/OS, VM/VSE 3rd party support and performance tuning Website http://infosecinc.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview InfoSec Institute offers a variety of information security training courses, certifications, and boot camps. Headquarters InfoSec Institute 7310 W. North Avenue Suite 4D Elmwood Park, Illinois 60707 Tel: (866) 471 – 0059 Executives Jack Kozial, President and Founder at InfoSec Institute, was previously with Harris Bank. History Jack Kozial founded InfoSec Institute in 2003, and continues to serve as a senior instructor. The company is headquartered in the Chicago area with training courses offered in Atlanta, Washington, Virginia, Las Vegas, Dallas, Baltimore, Boston, Houston, and New York. Key Competitors SANS, IANS Products and Services InfoSec Institute provides a range of information security training programs offered by expert instructors that can be grouped as follows: • Boot Camps – Includes many different areas such as hacking, penetration testing, forensics, reverse engineering, security certification, IT audit, security awareness, and other subjects. Vendor technologies covered include Microsoft, Cisco, VMware, Google, and others. • Certification – The company provides training for Microsoft, Cisco, EC-Council, ISACA, ITIL, and other organizational certifications. • Online Training – Includes self-paced mentored as well as live online training options. • Enterprise Training – Provides training support for large groups from enterprise teams, tailored to their specific needs. • Government Training – Includes DoD 8570.1 training. Website https://www.infosecinstitute.com/
InfoSec Skills
InfoSecure
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview InfoSec Skills is a UK-based cyber and ICT security training and education organization. Headquarters InfoSec Skills Ltd. Atlantic House Imperial Way Reading Berkshire RG2 0TD Tel: +44 (0)20 8144 2303 Executives Terry Neal serves as CEO of InfoSec Skills. History InfoSec Skills is headquartered in the UK and offers security training in the UK and elsewhere. It is part of the Malvern Security Cluster and offers course through the National Cyber Skills Centre (NCSC) in Malvern. Key Competitors SANS, IANS, InfoSec Institute Products and Services InfoSec Skills offers a range of cyber security training and education programs that can be grouped as follows: • Training Courses – Categorized as IA awareness, IA governance, IA architecture, and information risk management. • Professional Exams – Includes assistance for various BCS exams. InfoSec Skills includes an impressive assortment of expert instructors located across the world, including Mich Kabay in the United States. Website https://www.infosecskills.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview InfoSecure provides security training and consultation in the area of information security awareness. Headquarters BeOne InfoSecure BV Bergweg 44 1217 SC Hilversum The Netherlands Tel: +31 (0)35 20 30 216 Executives Ernst Bouwman is Managing Director of InfoSecure at BeOne Development Group. History InfoSecure is part of the BeOne Development Group. The company is headquartered in the Netherlands with offices in Germany. Key Competitors SANS, IANS, InfoSec Institute Products and Services InfoSecure offers a range of security awareness-focused services including security awareness training, IT professionals training, compliance training, business continuity training, management commitment, NewsFlashes, one minute security flash, security awareness app, management commitment game, and cyber security investigation game. The company also provides a security consultancy around security guidelines and security awareness. Website http://www.infosecuregroup.com/
Infosys
InfoWatch
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Infosys provides IT consulting, technology and outsourcing services including a range of information security solutions. Headquarters Infosys Corporate Headquarters Electronics City, Hosur Road Bangalore 560 100 India Tel: +91 80 2852 0261 New York, New York Location Tel: (646) 254 – 3198 Executives Dr. Vishal Sikka serves as CEO and Managing Director of Infosys. History Established in 1981, Infosys has grown to a NYSE listed company with 161,000 employees. Key Competitors CSC, Wipro Products and Services Infosys provides a range of enterprise security solutions including risk assessment, security planning, security design and implementation, security awareness program, security management, and compliance audits. Infosys also provides consultation in infrastructure security, technology, unified identity management, and enterprise mobility. Website https://www.infosys.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Data Leakage Protection, Security Consulting Brief Overview InfoWatch is a group of information security companies – InfoWatch, Kribrum, EgoSecure, and Appercut – that operates across Eastern and Western Europe, Asia, and the Middle East. Headquarters InfoWatch, Ltd. 30, Proezd 607 Zenit-Plaza Business Center Moscow, 123458, RUS Executives Natalya Kaspersky, President of the InfoWatch Group of Companies, was co-founder of Kaspersky Labs. History Natalya Kaspersky founded InfoWatch in 2003, as a subsidiary company to Kaspersky Labs. In 2012, Kaspersky Labs and InfoWatch became completely independent companies with the two former partner/founders Eugene and Natalya Kaspersky leading the two respective companies. InfoWatch remains privately held and has roughly 150 employees. Key Competitors Kaspersky Products and Services The core mission addressed by InfoWatch is to provide enterprise customers with advanced data leak prevention and risk management systems and software. InfoWatch consists of four information system companies: • InfoWatch Ltd. – Focuses on data leak protection and prevention software • Kribrum Ltd. – Focuses on social media monitoring and reputational analysis • EgoSecure GmbH – Provides endpoint security software • Appercut – Focuses on business application source code analysis Major products offered by the InfoWatch group of companies include the following: • InfoWatch Traffic Monitor – Integrated DLP system monitoring enterprise flows for leaks and unauthorized distribution • InfoWatch Kribrum – Provides cloud-based social media monitoring with proprietary search and linguistic capabilities. • InfoWatch Endpoint Security – Provides information security for workstations, removable media, and mobile devices. • InfoWatch Appercut – Offers automated source code vulnerability audit for business applications. Website https://www.infowatch.com/
Ingenico
InGuardians
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Embedded Security, Identity Protection, Web Security Brief Overview Ingenico is provider of retail payment solutions for merchants with emphasis on security across different channels. Headquarters Ingenico SA 28-32, boulevard de Grenelle 75015 Paris France Tel: +33 (0)1 58 01 80 00 Executives Philippe Lazare, Chairman and CEO of Ingenico, was previously CEO of Eurotunnel, as well as COO of Air France. History Jean-Jacques Poutrel and Michel Malhouitre co-founded Ingenico in 1980. The company is headquartered in Paris with offices in Alpharetta, Singapore, Sao Paulo, Belgium, Boston, and Germany. It has grown to over 4600 employees with 2013 revenue of 1.37 billion euros. Key Acquisitions EasyCash (2009) – Payment processor Ogone (2013) – On-line payment provider GlobalCollect (2014) SafeNet Key Competitors NCR, VeriFone, Hypercom Products and Services Ingenico provides retail payment solutions for merchants that can be grouped as follows: • Payment Terminals – Includes a full range of payment terminals for secure transaction support including banking PIN pads, retail PIN pads, mobility, countertops, signature capture, self services, contactless readers, biometrics, and check readers. • Software Platform – This is Ingenico’s operating system platform that runs across its range of terminals. • Telium Campus – Supports SDK, biometrics, EMV, contactless payment, and iPhone payment. Ingenico and CardConnect provide point-to-point encryption. • Network Solutions – Consists of the Network Communication Controller (NCC) Blade, Ingenico’s networking device to provide additional secure connectivity. Ingenico products are designed to address in-store purchases, e-Payment, m-Payment, value added services, and healthcare/ID solutions. Website https://www.ingenico.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview InGuardians is a vendor-independent security consultancy offering audit, penetration testing, and related services. Headquarters InGuardians 5614 Connecticut Avenue, NW #313 Washington, DC 20015-2604 Tel: (202) 448 – 8958 Executives Jimmy Alderson, CEO of InGuardians, joined the company after working at ISS, Meta Security Group, and ESecurity Inc. History Founded in 2003, the private company employs a team of expert information security consultants. Most of the consultants are security authors, academic instructors, and well-known contributors to the security community. Key Competitors NCC Group, Core Security, Hold Security, HackLabs Products and Services InGuardians provides consultation services based on its ARM Threat Mitigation Service in the following categories: • Assessment – Includes penetration testing, security risk assessment, and audits in the areas of network security architecture, Web applications, wireless networks, physical security, and code reviews. • Response – Includes support for incident response, forensics, and expert witness. • Mitigation – Includes firewall deployment, IDS rollout, OS hardening, and security policy. The company also provides an assortment of free security tools developed by the InGuardians team. Website https://www.inguardians.com/
Inside Secure
Inspired eLearning
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Hardware/Embedded Security, Content Protection Brief Overview Inside Secure provides a range of embedded security solutions for mobile payment, content protection, secure access, and IoT. Headquarters Inside Secure Headquarters Arteparc Bachasson – Batiment A Rue de la Carrierre de Bachasson CS70025 13590 Meyreuil France Executives Amedeo D’Angelo, is the President and CEO of Inside Secure. History Inside Secure was established in 1995 by Jacek Kowalski and several former Gemplus engineers. Alta Berkeley, GIMV, Soffinova Partners provided several rounds of funding prior to the company’s IPO in 2012 on the NYSE Euronext Paris. Key Acquisitions Smardtech (2006) – Embedded operating systems Atmel (2010) – Secure microcontroller business Metaforic (2014) – Mobile payments Key Competitors Gemalto Products and Services The company began developing contactless memory chips in the mid-1990’s and began developing NFC technology in the early 2000’s including contactless smart cards and contactless payment cards. Current embedded security products can be grouped as follows: • Silicon IP – Components and packet engines for IPSec, SSL, TLS, and other protocols. • VaultIC – Chips for protecting against counterfeiting, cloning, and theft. • MatrixHCE – Enables mobile banking • SecureCom – IPSec toolkit • MicroPass – Smart card solutions • DRM Fusion – Windows Media DRM and OM DRA standards-based clients Website https://www.insidesecure.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview Inspired eLearning provides security awareness and compliance training offerings. Headquarters Inspired eLearning 613 N.W. Loop 410 Suite 530 San Antonio, Texas 78216 Executives Felix Odigie serves as CEO of Inspired eLearning. History The company is headquartered in San Antonio with a UK representative in Oxfordshire in the UK. Key Competitors MIS Institute Products and Services Inspired eLearning provides security and awareness training in the form of instructor-led training, managed services, course hosting, custom eLearning, legal review, localization services, and PhishProof assessments. Specific products include the following: • PhishProof (Simulated phishing) • iLMS (learning management system) • Adaptive Training Engine • Analytics and Reporting • Employee Threat Profile Website https://www.inspiredelearning.com/
Intego
IntegriCell
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools Brief Overview Intego provides a family of products focused on security and anti-virus protection for Mac computers. Headquarters Intego Corporate 520 Pike Street, Suite #1520 Seattle, Washington 98101 [emailprotected] Tel: (512) 637 – 0700 Executives Steve Kelly serves as President of Intego. Jeff Erwin, Chiarman of the Board, was formerly a general manager with Microsoft, as well as CEO of Pure Networks. History Laurent Marteau founded Intego in 1997 in Paris, offering the Rival anti-virus program for Mac OS 8. The company has evolved with the Apple computing line, including iOS. Headquartered in Seattle, the company has offices in Austin, Texas; Paris, France; and Japan. The company has received venture funding from Bessemer Venture Partners and Siparex. Key Competitors Trend Micro, Kaspersky Products and Services Intego offers a Mac security product line that can be grouped as follows: • Mac Security Products for Home – Includes Mac Internet Security X8, Mac Premium Bundle X8, Family Protector, Family Protector for Secure X8, Mac Washing Machine, Mac Washing Machine Secure X8, and VirusBarrier iOS. • Mac Security Products for Business – Includes Flexibility Secure, Flexibility Monitor, Flexibility Complete, VirusBarrier X8, NetBarrier X8, and VirusBarrier iOS. The company offers a resource center for Mac security including free Mac anti-virus software. Apple removed the VirusBarrier solution from its iOS App Store in 2015. Website https://www.intego.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview IntegriCell offers a range of expert professional services in the area of mobility security. Headquarters IntegriCell 300 New Jersey Avenue, NW Suite 900 Washington, DC 20001 Tel: (202) 400 – 2858 Executives Aaron Turner, Founder and CEO of IntegriCell, was previously CEO of RFinity, as well as holding positions with the Idaho National Laboratory and Microsoft. He recently joined Verifone. History Aaron Turner, a recognized expert in mobility security, founded IntegriCell in 2010. The private company is headquartered in Washington. Key Competitors DenimGroup Products and Services IntegriCell offers professional services in the area of mobility security that can be grouped as follows: • Mobile Security Risk Assessments – Risk assessment services focused on enterprise to help prioritize mobile security activities. • Mobile Security Strategy Roundtables – Customized roundtable focused on enterprise needs. • Security Program Advisory Services – Designed to assist carriers • Mobile Device Security Quality Assessments – Includes assistance for carriers design automated platforms for vulnerability analyses. • Spectrum Audits – Strategic guidance and tactical tools designed to assist carriers. • SmartGrid Spectrum Risk Assessments – Designed for infrastructure owners The company is also an authorized reseller of the Cryptophone secure mobile product. Website http://integricell.com/
Intellect Security
IntelleSecure
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions, Security Consulting Brief Overview Intellect Security provides value added data security and encryption solutions for enterprise and cloud using a network of partners. Headquarters Intellect Security Limited The Baltic Exchange, 38 St. Mary Avenue London, EC3A 8BH United Kingdom Tel: 0333 003 3305 Executives Richard Callis serves as Group Managing Director of Intellect Security. History Founded in 2002, the small, public company began using variants of OpenPGP and has extended to offer commercial encryption solutions through partners. The company is headquartered in the UK. Key Competitors Bridgeway Security Solutions Products and Services Intellect Security is a UK-based company that offers data security solutions for enterprise customers, especially in cloud architectures, through partnerships with encryption companies such as Symantec (PGP), Vormetric, Imperva, Centrify, CipherCloud, Cryptosoft, Vaultive, and Ionic Security. The company is a member of the CiperCloud Partner Program. Website https://www.intellect.co.uk/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Governance, Risk, and Compliance Brief Overview IntelleSecure provides training and consulting services in GRC and information security management. Headquarters IntelleSecure Network Solutions Private Limited 418, 1st Floor, 100 Feet Road, 4th Block Koramangala, Bangalore 560 034 India Tel: +91 98804 99100 / 200 Executives Nagarajan Balasubramanian serves as the Director of IntelleSecure. History The company is headquartered in Bangalore and focuses on clients in India and the Middle East. Key Competitors EY (Integrc) Products and Services IntelleSecure provides a range of information security management and GRC consulting and training services that can be grouped as follows: • GRC Training Services – Includes CISA, PCI, attestation standard, and other GRC areas • Information Security Management Training Services – Includes CISSP, CISM, ISMS, security fundamentals, and other specialized areas of GRC and security • Consulting Services – Includes controls and assurance, security and defense, and advisory support Website http://www.intellesecure.com/
Intelligent ID
IntelliGo Networks
(Alpha Version 0.1 – 06/22/16 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Intelligent ID provides an endpoint monitoring and protection solution that provides continuous security. Headquarters Intelligent ID 250 Old West Wilson Bridge Road Suite 140 Worthington, Ohio 43085 Tel: (888) 798 – 7792 Executives Jim Mazotas, Founder and CTO of Intelligent ID held previous senior technical positions with Toyota, Lockheed Martin, Department of Defense, and AT&T. Glen Kazerman serves as the CEO of Intelligent ID. History Jim Mazotas founded Intelligent ID in 2009. The small, privately funded company is headquartered in Ohio. Key Competitors Intel Security (McAfee), Symantec Products and Services Intelligent ID provides continuous security monitoring and protection for organizational endpoints. The Intelligent ID product focuses on uncovering threats by monitoring user activity for inappropriate or potentially malicious behavior through endpoint agents and a customizable dashboard. The specific focus areas of the product include behavioral analysis, email review, network connection monitoring, infrastructure analysis, productivity measurement, Web monitoring, and user activity coverage. Components of the product include: • Sensitive Data Crawler – Locates copies of sensitive data on endpoints or file systems • Dashboard – Provides real-time statistics and activity views • Event Log – Includes every rule-based event sorted by severity level or other factors • Timeline View – Provides a time-based view of events • Dossier – Provides an identity or group-based view of events • Productivity Review – Helps demonstrate productivity of individuals or groups Website https://www.intelligentid.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Secure Access, Mobile Security Brief Overview Intelligo provides a secure mobile enablement platform for authentication, device management, and network access control. Headquarters IntelliGo Networks 207 Queens Quay, Suite 820 Toronto, Ontario CA M5J 1A7 Executives Khaled Mansour serves as CEO of IntelliGo Networks. He also serves as CEO of Spyders. History Headquartered in Toronto, the company has presence in Palo Alto and Riyadh. IntelliGo is marketed as the flagship product of Spyders. Key Competitors Mobile Iron Products and Services IntelliGo Networks provides a hardware appliance that supports small, medium, and large enterprise for mobile enablement. Specific features supported by IntelliGo Networks include authentication, network access control, device management, and endpoint compliance. Operating systems supported include Windows, Mac, Android, iOS, and ChromeOS. Website https://www.intelligonetworks.com/
Intellinx
InterCrypto
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Web Fraud Prevention Brief Overview Intellinx provides enterprise fraud detection and prevention solutions including data leakage protection and behavioral usage monitoring. Headquarters Intellinx 1c Yoni Netanyahu Street P.O.B. 1035 Or-Yehuda, 60200 Israel Tel: +972-3-5385555 Englewood Cliffs, New Jersey Office: Tel: (201) 567 – 7737 Executives Orna Mintz-Dov serves as Founder and CEO of Intellinx. She was previously CEO of Sabratec until its acquisition by Software AG. History Orna Mintz-Doz founded Intellinx in 2005. The company is headquartered in Israel with a US-based subsidiary in New Jersey. Ascend Technology Ventures, Elran Technologies, and SPL Software provided $4M in Series A funding in 2006. Bottomline acquired Intellinx in 2015. Key Competitors ThreatMetrix, Guardian Analytics Products and Services The Intellinx platform uses behavioral monitoring and analytics with network sniffing and data capture to detect enterprise fraud. Specifically, the platform provides internal and external tracking of end-user activity in heterogeneous environments, with the ability to zoom in on specific suspicious users interactions with applications. Advanced features include screen recording and display, session search, graphic visualizer, business rules customization, alert and case management, and compliance support. Website https://www.intellinx-sw.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Data Encryption Brief Overview InterCrypto provides data encryption tools for files, disks, and media. Headquarters InterCrypto, Ltd. Pacific Business Center P.O. Box 34069 #381 Seattle, Washington 98124-1069 Executives No information is available about the management at InterCrypto. History The first version of Advanced Encryption Package was released in 1998. After hundreds of improvements suggested by customers in over 80 countries, the company has evolved its product line to the modern Advanced Encryption Package for Windows. Key Competitors Axantum, WinMagic Products and Services InterCrypto provides a range of data encryption tools that can be grouped as follows: • Advanced Encryption Package Professional – Used to encrypt files • CryptoExpert 8 – Used for encrypting drives • Master Voyager – DVD, CD, USB flash stick encryption • Master Shredder and Master Uneraser – Used for file recovery and deletion Website https://www.intercrypto.com/
InterGuard
Interhack
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Security Analytics Brief Overview InterGuard, a solution of Awareness Technologies, provides employee-monitoring software that records and controls PC activity for loss and misuse. Headquarters InterGuard Awareness Technologies 88 Post Road West, 1st Floor Westport, Connecticut 06880 Tel: (800) 998 – 5621 Executives Brad Miller, CEO of Awareness Technologies, was previously CEO of Perimeter eSecurity. History Mike Osborn and Ron Penna co-founded Awareness Technologies in 2002 to focus on counter-terrorism solutions. In 2010, a group headed by Brad Miller and First New England Capital invested $6.5M in Awareness Technologies. Headquartered in Connecticut, the company has an office in the UK. Key Competitors SpectorSoft, Dtex Systems Products and Services InterGuard provides monitoring and control products that can be grouped as follows: • PC Monitoring – Records and controls all PC activity by employees • Web Filtering – Records and controls all Web activity through URL blocking • Data Loss Prevention – Provides detection of data leakage based on policies • Laptop Anti-Theft – Geolocates stolen laptops for retrieval and deletion • Log Management – Aggregates audit and event logs from security devices • Mobile Management – Manages iOS and Android devices with software push and control features Website https://www.interguard.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Interhack provides a range of computer-related professional services with emphasis on security assessments. Headquarters Interhack 5 E. Long Street, 9th Floor Columbus, Ohio 43215 Tel: (614) 545 – 4225 Executives C. Matthew Curtin serves as Founder of Interhack. He is author of two books on cyber security and was previously senior lecturer at Ohio State University as well as a member of AT&T Bell Laboratories. History Founded in 2000 by former members of AT&T Bell Laboratories in Columbus, the company is headquartered in Ohio. Key Competitors Praetorian, KCFS Cybersecurity Products and Services The range of computer-expert related professional services offered by Interhack include the following: • Vulnerability Assessment • Penetration Testing • Information Security Assessment • Application Security Evaluation • Network Traffic Assessment • Criticality Assessment Website https://www.interhack.com/
InterNetwork Defense
Interset
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview InterNetwork Defense partners with Test Pass Academy to offer a series of cyber security training including CISSP preparation. Headquarters InterNetwork Defense Philadelphia, Pennsylvania Tel: (866) 219 – 6031 Executives Larry Greenblatt serves as founder of InterNetwork Defense. History Founded in 1997 and headquartered in Philadelphia, the company provides training and consultancy across the Delaware Valley. Key Competitors Global Learning Systems Products and Services InterNetwork Defense offers cyber security training services in conjunction with Test Pass Academy. Courses focus on CAP Boot Camp offerings, across the US as well as CISSP training preparation across the US. InterNetwork Defense offers cyber security consulting in the following areas: • Information Security • Business Continuity • Regulatory Compliance • Business Analysis Website https://www.internetworkdefense.com/
(Alpha Version 0.1 – 06/22/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Interset provides a platform for behavioral analytic and machine learning-based security analytic threat detection in the enterprise. Headquarters Interset 411 Legget Drive Suite 503 Ottawa, ON K2K 3C9 Canada Executives Mark Smialoowicz serves as the CEO of Interset. History Headquartered in Canada, the company received $10M in venture funding in 2015 from Toba Capital. They also have a west coast office in Irvine, California. Key Competitors AlienVault, Splunk Products and Services Interset provides a platform supporting security analytics in the ente8rprise. The Interset platform collects metadata from applications, systems, and endpoints. The data is aggregated and correlated in the context of Interset’s patent-pending Event and Entity Behavioral Analytics (E2A) Engine. Anomalous behaviors are identified and displayed contextually. Website https://www.interset.com/
InterTrust
Interset
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Data Encryption, Content Protection Brief Overview InterTrust Technologies invents, develops and licenses software and technologies in the areas of content protection, cryptography, and digital rights management (DRM). Headquarters InterTrust 955 Stewart Drive Sunnyvale, California 94085 Executives Tala Shamoon, CEO of InterTrust, previously served as researcher at NEC Research Institute. Dave Maher, Chief Technology Officer of InterTrust was formerly with AT&T Bell Labs. History Victor Shear founded InterTrust in 1990. The company has grown through the years, with time spent as a public company, and also a private joint venture between Sony and Philips. Today, the company headquartered in Silicon Valley with regional offices in London and Beijing. . Key Competitors Certicom Products and Services InterTrust provides a range of different secure system and content protection solution innovations, mostly developed for license, in the following areas: • Certificate Authority – InterTrust’s Seacert trusted digital certificates for devices and services. InterTrust has shipped over a billion certificates to Internet connected devices supporting the Internet of Things. • Software Integrity Technology – InterTrust includes a subsidiary whiteCrytion that offers cryptographic tools (Cryptanium) for app developers. • Cloud Service for Content Protection – ExpressPlay is a cloud service for DRM of video, audio, eBooks, and games. Kabuto supports secure collaboration integrating email and cloud. Website https://www.intertrust.com/
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Security Analytics, Endpoint Security Brief Overview Interset provides tracking and audit control over intellectual property by endpoint behavioral analytics. Headquarters Interset Headquarters 411 Legget Drive, Suite 503 Ottawa, Ontario K2K 3C9 Canada Tel: (613) 226 – 9445 Executives Mark Smialowicz serves as the CEO of Interset. He has over twenty years of experience helping venture and private equity startups and a background in behavioral and IT analytics. History The company, founded in 2011, had originally been involved in file sharing. More recently, the focus has shifted to behavioral analytics on endpoint behavior. Interset received Series B funding of $10M in 2012 from Ontario Emerging Technologies Fund, Telesystem Ltd., and Anthem Venture Partners. Headquartered in Canada, the company has an office in Irvine. In-Q-Tel announced in investment in Interset in 2016. Key Competitors Dtex Systems Products and Services Interset provides tracking and audit control over intellectual property by endpoint behavioral analytics. Interset’s solution for protecting documents and intellectual property by assigning risk scores to users based on behavioral analytics. Interset sensors collect endpoint data into the cloud and then use algorithms to determine whether any users are operating outside some tolerance level. Administrators set thresholds, and information is provided on standard reports. Access is being extended to additional types of endpoints including mobile and other devices. Website https://www.interset.com/
Intralinks Acquired by Synchronoss
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing Brief Overview Intralinks provides solutions for secure collaboration and virtual information sharing. Headquarters Intralinks 150 East 42nd Street 8th Floor New York, New York Tel: (212) 543 – 7800 Executives Richard Anstey serves as the CTO of Intralinks. Stephen Waldis serves as the CEO of Synchronoss. History Founded in 1996, the company trades on the NYSE and is headquartered in New York City. Key Acquisitions docTrackr (2014) – File security Key Competitors Linoma Software Products and Services Intralinks provides secure enterprise collaboration tools and virtual data room solutions for the enterprise. Information rights capability is built-in using the Microsoft rights management framework. Collaboration is supported for users with PCs and mobiles. Website https://www.intralinks.com/
Intrinium (Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions, Security Consulting Brief Overview Intrinium offers, in addition to cloud and network services, a range of cyber security consulting and managed security services. Headquarters Intrinium Information Technology Solutions 609 N. Argonne Road Spokane Valley, Washington 99212 Tel: (866) 461 – 5099 Executives Nolan Garrett, Founder and CEO of Intrinium, served for three years as VP of the ISSA Spokane Chapter. History Nolan Garrett founded Intrinium in 2007. In 2013, Intrinium and Interlink merged, creating a 35-worker company located in Spokane. Key Acquisitions Olympia Computer Central (2012) – Computer services Interlink (2013) – Cloud and network Key Competitors Trustwave, Optiv Products and Services Intrinium provides a range of security consulting and managed security services that can be grouped as follows: • Managed Security and Monitoring – 24/7 management of customer security systems. • Compliance and Audit Consulting – Support for regulatory compliance including PCI DSS. • Computer and Network Security – Assessment and consulting services including penetration testing and vulnerability analysis. • Incident Response and Forensic Analysis – Support for prosecuting attackers, including legal process support. Website https://www.intrinium.com/
Intrusion
iTrust
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Intrusion Detection/Prevention Brief Overview Intrusion Inc. provides enterprise security products for Internet monitoring and network data capture. Headquarters Intrusion, Inc. 1101 East Arapaho Road Suite 200 Richardson, Texas 75081 Tel: (972) 234 – 6400 Executives G. Ward Paxton, Co-Founder, Chairman, and CEO of Intrusion, was previously Vice President at Honeywell. History G. Ward Paxton and Joe Head co-founded Intrusion, Inc in 1983. The public company trades on the OTCBB and is headquartered in Richardson. The company reported $1.6M revenue for the third quarter of 2015. Key Competitors Ixia (Net Optics), Gigamon, Fluke Networks, VSS Monitoring Products and Services Intrusion Inc. provides enterprise security solutions that can be grouped as follows: • TraceCop – Suite of Internet monitoring and tracking solutions • Savant – Transparent network data capture and analysis solution • Secure Taps – Secure and transparent network tap device and solution • Compliance Commander – Data leak prevention, content monitoring, and filtering Website https://www.intrusion.com/
(Alpha Version 0.1 – 08/07/17 – No Vendor Approval) TAG Cyber Controls Consulting, Penetration Testing Brief Overview iTrust provides penetration testing and various products and services for vulnerability management. Headquarters BAT ACTYS / 1 55 l’Occitane 31670 Labège, France Executives Jean-Nicolas Piotrowski serves as the Chairman and CEO. History iTrust is a European company founded by security architecture professionals and pentesters in 2007. Key Competitors Secmentis Products and Services iTrust provides a variety of products to aid companies in vulnerability management. Pen-Testing services Vulnerability Scanner, IKare Behavioral Analysis As well as dashboard products to manage security issues in one place. Website https://www.itrust.fr/en/
Invincea
IOActive
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Invincea provides a security container solution for browsers and endpoints that is designed to reduce the risk of malware and other exploits from attacking host operating systems and network resources. Headquarters Invincea 3975 University Drive Suite 460 Fairfax, Virginia 22030 Tel: (855) 511 – 5967 Executives Anup Ghosh, Founder and CEO of Invincea, held previous positions with DARPA and Cigital. History Anup Ghosh founded Invincea in 2009, originally using DARPA funding. The company has since grown and has received several rounds of venture funding from New Atlantic Ventures, Harbert Venture Partners, Aeris Capital, Dell Ventures, and Grotech Ventures. Key Acquisitions Sandboxie (2013) Key Competitors Bromium Products and Services Invincea’s advanced malware solution works by creating a secure virtual container, local to the desktop to control, protect, and isolate the most vulnerable applications including Web browsers, PDF readers, and Microsoft Office suite tools. The solution is intended to address high-risk attacks including • Targeted Spear Phishing • Watering Hole Attacks (hijacking legitimate Websites to push malware) • Opportunity Attacks (including Ransomware) Website https://www.invincea.com/
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Security R&D, ICS/IoT Security Brief Overview IOActive provides a range of security hardware and software assessments and research services. Headquarters IOActive 701 5th Avenue, Suite 6850 Seattle, Washington 98104 Tel: (866) 760 – 0222 Executives Jennifer Steffens, CEO of IOActive, was previously Director at Sourcefire, as well as holding positions with Ubizen, NFR Security, and StillSecure. History Founded by Josh Pennell in 1998, the company is headquartered in Seattle with a presence in London. Key Competitors NCC Group Products and Services IOActive provides a range of assessment and research services that can be grouped as follows: • Embedded Security Assessment (included SCADA) • Hardware Reverse Engineering • Infrastructure Assessment • Vehicle Security • Penetration Testing • Wireless Security Assessment • Industrial Services • Chip Security Assessment Website https://www.ioactive.com/
Ionic Security
iovation
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Data Security, Data Encryption Brief Overview Ionic Security provides a unified cloud and mobility-based security platform focused on data protection, single sign-on, and analytics. Headquarters Ionic Security, Inc. 1170 Peachtree St. NE, Suite 2285 Atlanta, Georgia 30309 Executives Adam Ghetti serves as CEO of Iconic Security. History Adam Ghetti founded Ionic Security (originally Social Fortress) in 2011. The company has raised $36.9M in funding from Kleiner Perkins Caulfield & Byers, Jafco Ventures, Google Ventures, Terawatt Ventures, ff Venture Capital, TechOperators, Webb Investment Network, and other investors. Amazon and Goldman Sachs invested $45M in Ionic Security in 2016. Key Competitors Zscaler, Splunk Products and Services Ionic Security provides a unified data and mobility security platform called Fusion that provides access control, intellectual property monitoring, data encryption, and policy management without the needs for proxies or gateways. The purpose of the platform is to create patterns of data usage and to perform data analytics to identiy potential security threats. Website https://www.ionicsecurity.com/
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Web Fraud Prevention, Two-Factor Authentication Brief Overview iovation provides an on-line fraud prevention platform based on authentication via device recognition and reputation. Headquarters iovation, Inc. 111 SW 5th Avenue, Suite 3200 Portland, Oregon 97204 Tel: (503) 224 – 6010 Executives Greg Pierson, Co-Founder and CEO of iovation, is a frequent speaker at industry trade shows across the globe. History Greg Pierson, Jon Karl, and Molly O’Hearn co-founded iovation in 2004. Intel Capital, AP Ventures, European Founders, and EPIC Ventures provided $16M in funding for the company. Key Competitors ThreatMetrix Products and Services The two product offerings from iovation utilize a device reputation database of over 15 million fraud reports, and include the following: • ReputationManager 360 – Focused on stopping online fraud in real time by identifying the device being used to commit the fraud based on reputation score. This score comes from business rules, Geolocation and IP address, mobile recognition, and associated analytics. • TrustScore – Reduces reviews and accelerates revenue by identifying good customers with device reputation. Website https://www.iovation.com/
IPS Acquired by Deloitte Canada
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview IPS is a Canadian value added reseller (VAR) of cyber security products and services. Headquarters IPS Corporate Headquarters 888 Dunsmuir Street, Suite 888 Vancouver, British Columbia Canada V6C 3K4 Tel: (604) 697 – 5400 Executives Karim Ladha, President and CEO of IPS, previously co-founded another IT services company in Canada, as well as holding senior positions at various system integrators and service providers. History Founded 2001, IPS (Integrity-Paahi Solutions, Inc.) has evolved to a major VAR in Canada. The company is headquartered in Vancouver with offices in Calgary, Ontario, and India. Key Competitors Optiv, Empowered Networks, Nexum Products and Services The security value added resale (VAR) services offered by IPS can be grouped as follows: • Security – Includes IT security roadmaps, vulnerability management and assessment, penetration testing, social engineering assessments, and security for wireless, Web applications, and other areas. • Compliance – Includes compliance audits, gap analysis, remediation services, compliance management, and regulatory support for PCI DSS and other standards. • Managed Security Services – Includes intrusion detection, intrusion prevention, log management and SIEM, security monitoring, firewall and VPN, compliance management, and security operations. Security services are offered through partnerships with Bit9, CheckPoint, Cisco, FireEye, IBM, LogRhythm, Palo Alto Networks, Rapid7, Riverbed, Sourcefire, Splunk, and Websense. Website https://www.ipsnetworks.com/
Ipswitch (Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing Brief Overview Ipswitch provides a platform for secure, managed file transfer as well as solutions for managing networks and mail servers. Headquarters Ipswitch, Inc. 83 Hartwell Avenue Lexington, Massachusetts 02421 Tel: (781) 676 – 5700 Executives Joe Krivickas, CEO of Ipswitch, was previously CEO of SmartBear Software. History The private company was founded in 1991 and is headquartered in Massachusetts. Key Acquisitions Standard Networks (2008) Hourglass Technologies (2009) Dorian Software Creations (2009) MessageWay (2010) Key Competitors ShareVault, SendThisFile Products and Services In addition to network management and email service support, Ipswitch provides a security-oriented managed file transfer capability called MOVEit. The secure file transfer is designed to support mission critical applications across various industries. A dedicated team provides managed support for file transfer capabilities. The company also offers a secure FTP server product called WS_FTP Server. Website https://www.ipswitchft.com/
IPV Security
IRM
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview IPV Security provides a range of security consulting services focused on compliance, monitoring, management, and audit. Headquarters IPV Security 10 Zarchin Street P.O. Box 4330 Ra’anana 43662 Israel Tel: (866) 531 – 1848 Executives Ido Ganor, Founder and CEO of IPV Security, was previously founder of ShopServe. History Ido Ganor founded IPV Security in 2005. The company is headquartered in Israel. Key Competitors CyberInt, COMSEC, Hybrid Security Products and Services IPV Security provides several security professional services that are marketing as “Security-as-a-Service” offerings including the following: • Comply-as-a-Service – Includes GRC professionals offering assistance to enterprise customers with security compliance challenges • Monitor-as-a-Service – An in-the-cloud analysis service that monitors and examines audit logs for evidence of security threats. • CISO-as-a-Service – Offers a professional security expert as a designated CISO for customers desiring to outsource this function. • Audit-as-a-Service – Involves gap assessments, readiness testing, and other audit-related activities to identify and mitigate risk. • Cloud Security – Includes audit and assessment of cloud security architecture and approach • DDOS Mitigation – IPV is an authorized distributor in Israel of Arbor Networks DDOS mitigation tools. • Malware Infection – Assessment and assistance in dealing with malware in Websites and networks. Website https://www.ipvsecurity.com/
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview IRM is a UK-based firm offering security consulting and risk management services. Headquarters Information Risk Management PLC Eagle Tower 11th Floor Montepellier Drive Cheltenham GL50 1TA Tel: +44 (0)12424 225 200 Executives Charles White is Co-Founder and CEO of IRM. History Charles White and David Cazalet co-founded IRM in 1998. The company is headquartered in Gloucestershire with an office in London. Key Acquisitions Onformonics Europe Limited (2012) – GRC Software Key Competitors Xyone Cyber Security, PA Consulting Products and Services IRM offers a range of security consulting services that can be grouped as follows: • Continuous Security – Helps prioritize controls via IMPACT security testing, Synergy GRC compliance and regulatory support, and NetFACTS network forensics solution. • Prepared Security – Includes data protection, impact assessment, ISO 27001 support, mobile security testing, application security testing, and other related services. • Strategic Security – Includes cyber risk assessments, governance reviews, and other risk-related frameworks. • Visible Security – Includes an incident response workshop, security awareness campaign, social engineering, and other related services. Website https://www.irmsecurity.com/
IRM Secure (Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing, Data Leakage Prevention Brief Overview IRM Secure provides security solutions for information usage control, information rights management (IRM), and secure outsourcing. Headquarters IRM Secure 2800 Skymark Avenue, #4 Mississauga, Ontario L4W 5A6 Canada Tel: (905) 366 – 4444 Executives Mathias Steinbock is the North American Strategic Director for IRM Secure. History The privately held company was founded in 2012 and is headquartered in Canada. Key Competitors InfoLock Products and Services IRM Secure provides security products and services that can be grouped as follows: • IRM FileSecure – Attaches policies to information with the goal of ensuring proper data leakage prevention (DLP). Allows policy-based information protection using connectors to SharePoint, OmniDocs, and IBM FileNet. • IRM Secure InfoSource – Provides full security control of data being outsourced to third-party vendors via assigned usage rights and other restrictions. Website https://www.irmsecure.com/
Iron Mountain (Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Data Destruction Brief Overview Iron Mountain provides records management, data backup, and data destruction solutions for the enterprise. Headquarters Iron Mountain 1 Federal Street Boston, Massachusetts 02110 Executives William Meaney serves as President and CEO of Iron Mountain. He was previously CEO of the Zuellig Group in Hong Kong. History Founded in 1951, Iron Mountain is headquartered in Boston, employs 17,000 staff, and serves 94% of the Fortune 1000. The company is public and trades on the NYSE. Key Acquisitions Recall (2015) – Data destruction Key Competitors Kroll Ontrack Products and Services Iron Mountain provides a range of data management solutions for the enterprise that can be grouped as follows: • Records Management • Data Management Solutions • Information Destruction The company safely and securely stores many of the world’s most valuable historical artifacts, cultural treasures, business documents, and medical records. Website https://www.ironmountain.com/
IronNet Cybersecurity
IronSDN
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Network Monitoring, Intrusion Detection/Prevention Brief Overview IronNet Security provides cyber defense systems that offer end-to-end protection at network speed. Headquarters IronNet Cybersecurity 8135 Maple Lawn Boulevard Fulton, Maryland 20759 Tel: (202) 384 – 1200 Executives General (Ret.) Keith Alexander, CEO of IronNet, was formerly Director of the NSA and Commander of the US Cyber Command. History Founded in 2014, the firm is led by Keith Alexander and is headquartered in Maryland. The company secured $32.5M in funding in 2015 from Trident Capital and Kleiner Perkins Caufield & Byers. Key Competitors FireEye, Symantec, Intel Products and Services IronNet provides advanced network cyber security solutions using real-time threat intelligence sharing network feeds. The solution is designed to offer end-to-end threat management and cyber defense at line speeds ranging up to 10 Gbps. A key innovation is the threat description language called Portable Format Analytics (PFA) developed for use with the product. Technologies embedded in the product include the use of Hadoop-based cloud with the ability to manage engine updates based on threat intelligence. IronNet maintains a professional security operations center, which monitors live threats as the basis for embedded intelligence in its platform solution, as well as support for customers. Website https://www.ironnetcyber.com/
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls SDN Security, Cloud Security Brief Overview IronSDN provides continuous compliance and security protections for software-defined networks (SDNs). Headquarters IronSDN [emailprotected] Executives Vimal Vaidya, CEO of IronSDN, was previously CEO of iPolicy Networks. History IronSDN is a Silicon-Valley based startup created by veterans of Checkpoint, Symantec, Cisco, and other security companies. Key Competitors NIKSUN, Radware Products and Services IronSDN provides a range of SDN security products and services that can be grouped as follows: • SDN Vulnerability Assessment and Remediation – Addresses security issues in SDN controller and SDN network elements including routers and switches. • Protection for the SDN Controller – Includes an SDNspecific firewall, health monitoring, and SDN IPS with SDN countermeasures. • Protection for SDN Infrastructure – Addresses virtualization and SDN specific IPS including SDN countermeasures. Website https://www.ironsdn.com/
ISARR
iScan Online
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management, Incident Response Brief Overview ISARR provides a Web-based platform for managing risk, resilience, response, and security intelligence. Headquarters ISARR Crystal Gate 28-30 Worship Street London EC2A 2AH Tel: +44 (0)844 736 2544 Executives Nick Beale serves as CEO and Managing Director of ISARR. History Founded in 2003, the small, privately held company is headquartered in London. Key Competitors Skybox, RSA Products and Services The ISARR platform provides support for operations and emergency/crisis management via risk visualization and profiling. Specific capabilities include the following: • Profile and Visualize – Allows visualization of operational components including countries and business units • Manage and Collaborate – Allows collating and managing intelligence assessments • Respond and Recover – Provides single, unified view of information, using a so-called Common Recognized Information Picture (CRIP) The company targets the transportation, logistics, mining, events, healthcare, government, energy, education, and corporate sectors. Website https://www.isarr.com/
(Alpha Version 0.1 – 06/27/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management, Endpoint Security Brief Overview iScan Online, now part of LogicNow, scans and detects vulnerabilities on enterprise endpoint and mobile devices. Headquarters iScan Online, Inc. 5600 Tennyson Parkway Suite 380 Plano, Texas 75024 Tel: (800) 630 – 4713 Executives Carl Banzhof, Co-Founder and VP of Engineering of iScan Online, was previously VP of Technology Strategy at McAfee. History Carl Banzhof and Billy Austin co-founded iScan Online in 2012. The company is headquartered in Plano, Texas. LogicNow acquired iScan Online in 2016. Key Competitors Lookout, McAfee , Symantec Products and Services The iScan Online Data Breach Prevention Platform scans endpoints and mobile devices, including BYOD, for vulnerabilities related to unencrypted data, PCI issues, and other exposures and then sends the information securely to the cloud for analysis and reporting. The scanning follows these steps: 1) Discovery of the vulnerability on the device, 2) detection and reporting from the cloud, 3) support for prioritizing vulnerabilities, and 4) support for remediation and lifecycle management. Platform supported include Windows desktops, Mac OS, Linux, Apple iOS, and Android. Website https://www.iscanonline.com/
i-Sprint Innovations
ITADSecurity
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Two-Factor Authentication Brief Overview i-Sprint Innovations provides identity, credential, and access management solutions. Headquarters i-Sprint Innovations Blk 750D Chai Chee Road #08-01 Technopark @ Chai Chee Singapore 469004 Tel: +65 6244 3900 Executives Albert Ching, Founder and CTO of i-Sprint Innovations, had prior employment with Citigroup. Dutch Ng serves as the CEO. History Albert Ching founded i-Sprint Innovations in 2000. Automated Systems Limited, a public company listed on NASDAQ, acquired the company in 2011. The company is headquartered in Singapore with offices in Thailand, China, Hong Kong, Taiwan, Japan, and East Brunswick, New Jersey. Key Competitors Duo Security, IBM, RSA Products and Services i-Sprint Innovations provides range of identity, credential, and access solutions that can be grouped as follows: • Enterprise Single Sign-On (SSO) • SSO with Portal Integration • Enterprise Access Control • End-to-End Encryption • Two Factor Authentication • Future Proof Authentication • 2FA Solutions for Banking Website https://www.i-sprint.com/
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview ITADSecurity offers a security risk intelligence solution for mobile device endpoints. Headquarters ITADSecurity 19 Tech Circle Natick, Massachusetts 01760 Tel: (508) 651 – 8800 Executives Robert Rinaldi, Co-Founder and CEO of ITADSecurity, was previously an executive with EMC. History Robert Rinaldi and Gerald Scala co-founded ITADSecurity in 2011. The company is headquartered in Massachusetts. It received $355K in venture funding through ne round in 2012. Key Competitors ESET, Symantec Products and Services The ITAD Security Macro Endpoint Risk Intelligence solution provides assurance of device audit trails, encryption tracking, security software updates, and cross correlation of security information between different collection sources. The purpose is to provide a basis for endpoint security analytics and advanced correlation to detect deviations and anomalies. The solution offers management, monitoring, and securing endpoints, including BYOD. The product is referred to as a Mobile Endpoint Security Information Management (SIM) system. Website https://www.itadsecurity.com/
ITC Secure Networking
ITsec Security Services
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls VAR Security Services Brief Overview ITC Secure Networking is a UK-based network and security integrator including management services from the company’s SOC. Headquarters ITC Secure Networking Ltd Boatman’s House 2 Selsdon Way London, E14 9GL United Kingdom Tel: +44 (0) 20 7517 3900 Executives Tom Millar serves as Founder and CEO of ITC Secure Networking. History Tom Millar established ITC Secure Networking in 1995 in Canary Wharf in London. Key Competitors Optiv, Accumuli Products and Services ITC Secure Networking offers security solutions that can be grouped as follows: • ITC Consult – Includes design, deployment, engineering, and audit services. • ITC Network – Incudes WAN and virtual network provision, and other network services. • ITC Security – Includes Firewall and intrusion prevention, privileged identity management, log management, vulnerability management, SIEM, MDM, email and Web security, and two-factor authentication. • NetSure 360 - - Includes complete management of network and security infrastructure, as well as video support. ITC Secure Networking maintains partnerships with Cisco, Riverbed, ForeScout, HPE, Actual Experience, CyberArk, Esselar, Qualys, Palo Alto networks, and Solar Winds. Website https://www.itcsecure.com/
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing Brief Overview ITsec Security Services provides IT security-related consultation services in the Netherlands. Headquarters ITsec Security Services P.O. Box 5120 2000 GC Haarlem, The Netherlands +31 (0)23 542 0578 Executives Jan van Ek is Co-Founder and CEO of ITsec Security Services. History ITsec Security Services was founded by Jan van Ek, Christiaan Roselaar, and Joey Dreijer in 1995 and is headquartered in the Netherlands. Key Competitors Securitas, PA Consulting Products and Services ITsec Security Services is a small company that provides IT security-related professional services in the following areas: • Security Assessments – Includes ethical hacking • AVMS – Internet-based vulnerability scanning service • IPv6 Research – Includes assessment of security risks in transition to IPv6 Website https://www.itsec.nl/
IT Security Experts
IT2Trust
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview IT Security Experts is a UK-based security consulting organization focused on audits and training. Headquarters IT Security Experts Ltd 119 West Street Fareham Hampshire United Kingdom PO16 0DU Tel: 0300 101 0050 Executives Simon Earl is Director at IT Security Experts Ltd. History Founded in 2003, the private company is headquartered in the UK. Key Competitors PA Consulting, Xyone, Portcullis Products and Services The services offered by IT Security Experts can be grouped as follows: • Security Audits – Includes ethical hacking, network security, Web application testing, and wireless security. • Security Training – Includes cyber security courses toward certifications in incident handling, penetration testing, digital forensics, CISSP, disaster recovery, secure coding, secure Web application engineering, and VSphere engineering. Website https://www.it-security-experts.co.uk/
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls VAR Security Solutions Brief Overview IT2Trust is a Scandinavian value added distributor of IT and network security solutions. Headquarters IT2Trust A/S Roskildevej 522 DK-2605 Brondby Denmark Tel: +45 70 22 38 10 Executives Peter Boll serves as Managing Director of IT2Trust. History The company is headquartered in Denmark with offices in Sweden and Norway. Key Competitors Westcon Products and Services IT2Trust offers solutions in the areas of biometrics, cloud security, DLP, encryption, identity management, load balancing, mail/Web scanning, mobile device management, patch management, remote control, secure file transfer, and user validation. Partner technology providers include Alertsec, Bit9, BlockMaster, CronLab, CTWO, Digital Persona, Gemalto, Ipswitch, Kaspersky, KEMP Technologies, Lieberman Software, Lumension, NetSupport, Proofpoint, SafeNet, SevenPrinciples, Swivel Secure, and Webroot. Website https://www.it2trust.com/
itWatch
iVanti
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security, Data Leakage Prevention Brief Overview itWatch provides a suite of IT security products focused on DLP, endpoint security, device security, encryption, and other areas. Headquarters itWatch GmbH Aschauer Strabe 30 D-81549 Munich Tel: +49 89 62030100 [emailprotected] Executives Ramon Morl serves as Co-Founder and CEO of itWatch. History Ramon Morl co-founded itWatch in 2002. The company is headquartered in Munich. Key Competitors gateprotect Products and Services The IT security products offered by itWatch can be grouped as follows: • DeviceWatch – Endpoint security with blacklisting and whitelisting, focused on the devices connected to a PC via USB, PCMCIA, Firewire, and Bluetooth • ApplicationWatch – Centralized control of application behavior with blacklist and whitelist management • XRayWatch – Allows definition of which applications and users can access which data on the network • PDWatch – Guarantees privacy during data transport • dataEx – Security management with ability to security delete files • DEvCon – Endpoint device security management • CDWatch – Control of CDs ad DVDs within a network • ReCAppS – Remote controlled application system • PrintWatch – DLP for printing Website https://www.itwatch.de/
(Alpha Version 0.1 – 08/08/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management, Vulnerabilit and Patch Management, Endpoint Brief Overview iVanti provides various IT services to help your organization keep track of user information, IT assets, and more. Headquarters Ivanti 698 West 10000 South Suite 500 South Jordan, Utah 84095 United States Executives Steve Daly serves as the President and CEO History In January 2017 LANDESK and HEAT Software combined to form iVanti. Key Acquisitions RES Key Competitors Axios Systems, CA Technologies Products and Services iVanti provides a wide variety of products and services. Patch Management – iVanti has proucts for pathc management on endpoints, SCCM, and windows servers. Apllication Control – Designed to aid your IT team in managing application use. Privilege Management – iVanti also provides products to help manage identity and acces control. This will helo keep track of logon times and user credentials. Website https://www.ivanti.com/
iWelcome
Ixia
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview iWelcome provides on-premise and cloud-based identity and access management solutions for European companies and governments. Headquarters iWelcome Soesterweg 300E 3812 BH Amersfoort The Netherlands Tel: +31 33 445 05 50 Executives Danny de Vreeze, Co-Founder and EO of iWelcome, was previously CEO of Everett. History Founded in 2011, the company is headquartered in The Netherlands. The company received an undisclosed investment from Newion Investments. Key Competitors Okta, ForgeRock Products and Services iWelcome offers enterprise and cloud-based identity and access management solutions that can be grouped as follows: • iWelcome Cloud Identity – Provides identity and access management for cloud using connectors to common applications. The platform can also connect to corporate directories for provisioning and authentication. Features include user management, provisioning and deprovisioning, single sign-on, password management, logging and reporting, access governance and RBAC, and self-service functionality for end-users. • iWelcome Enterprise Identity – Provides identity and access management functions for on-premise, enterprise use. • iWelcome Extended Enterprise Identity – Identity as a service solutions for on-premise applications as well as external or cloud applications. The company also offers eRecognition, a Dutch initiative to enable businesses to work more closely with the government. Website https://www.iwelcome.com/
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Security Testing, Penetration Testing Brief Overview Ixia offers a range of network testing and visibility products including network security testing. Headquarters Ixia Corporate Center 26601 W. Agoura Road Calabasas, California 91302 Tel: (877) 367 – 4942 Executives Errol Ginsberg serves as Founder and Chairman of Ixia. Bethany Mayer, President and CEO of Ixia, previously served as SVP for HP. History Errol Ginsberg and Joel Weissberger co-founded Ixia in 1997. Ixia is a publicly traded company, listed on NASDAQ, and headquartered in Calabasas, California. Key Acquisitions Catapult Communications (2009) – Network testing Agilent Technologies (2009) – Networking testing VeriWave (2011) – WiFi testing Anue Systems (2012) – Network aggregation Breaking Point (2012) – Network security testing Net Optics (2013) – Network monitoring Key Competitors SolarWinds, ZTI Communications Products and Services In addition to its network testing and network visibility product solutions, Ixia offers a range of network security testing solutions including the following: • PerrfectStorm – Enterprise-wide application and security testing by generated real-world traffic. • Breaking Point – Application security testing • IxLoad-Attack – IP security testing for networks and devices • IxLoad-IPsec VPN – IPSec protocol emulation • Application and Threat Intelligence (ATI) – Subscription threat service • AppLibrary – Application traffic at scale • Firestorm – Load module to simulate massive scale traffic • NSS Labs Test Packs for Ixia BreakingPoint – In-house network security testing Website https://www.ixiacom.com/
Jacadis
janusNET
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Jacadis provides a range of security consulting services to business clients. Headquarters Jacadis 4700 Northwest Parkway, Suite 140 Hilliard, Ohio 43026 Tel: (614) 819 – 0151 Executives Doug Davidson, CEO of Jacadis, was previously with two technology forms as president and national practice leader. History Founded in 2001, Jacadis is a privately held company headquartered in Ohio. Key Competitors Praetorian, Kroll, Sword & Shield Products and Services Jacadis provides a range of security consulting services that can be grouped as follows: • Assess and Measure – Includes assessment of client environments via answers to a host of questions about security, compliance, and information assurance. • Build and Deploy – Includes design services to assist organizations building ad deploying infrastructure in the provision of proper cyber security. • Manage and Defend – Includes assistance to companies who and managing and defending their information assets including the use of virtual security staffing. • Respond and Recover – Assists clients dealing with sudden, unexpected events from malicious adversaries. The company maintains partnerships with technology vendors including Qualys, TraceSecurity, Risk I/O, FireMon, Fortinet, MaaS360, and InformationShield. Website https://www.jacadis.com/
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Data Security, Email Security Brief Overview janusNET provides data protections products focused on classification, filtering, and control. Headquarters janusNET P.O. Box 1078 North Sydney NSW 2059 Australia Executives Greg Colla serves as Managing Director for janusNET. History janusNET was founded in 2004 and is headquartered in Australia. Key Competitors Titus Products and Services janusNET provides data protection products in the following areas: • Data Classification – Includes janusSEAL for Outlook (email classification), janusSEAL Documents (classification of MS Office Documents, PDFs, and other files), and janusSEAL for Outlook Web App ((classification of Exchange Webmail). • Data Protection – Includes janusGATE Mobile (filters for email to and from mobiles) and janusGATE Exchange (advanced, real-time MS Exchange message control). Website https://www.janusnet.com/
Jask
Javelin Networks
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Jask provides an artificial intelligence-based platform for security analytics. Headquarters Jask 995 Market Street San Francisco, California 94103 Tel: (415) 604 – 0202 Executives Greg Martin, founder of Jask, was previously founder of ThreatStream, and had also been a key developer of ArcSight. History Founded in 2015 by Greg Martin, the company has received $2M in Seed investment from Battery Ventures and Vertical Venture Partners. Key Competitors IBM, Securonix, RSA Products and Services Jask provides artificial intelligence-based security analytics through a predictive security operation center platform called Trident to help with security management and monitoring functions. The artificial intelligence supports more proactive and sophisticated cyber attack prevention. Website https://www.jask.io/
(Alpha Version 0.1 – 08/08/17 – No Vendor Approval) TAG Cyber Controls Network Access Control Brief Overview Javelin Networks protects the corporate domain from APTs. Headquarters Tel Aviv-Yafo, Israel Nahmani St 14 Tel: +1-888-867-5179 Email: [emailprotected] Executives Roi Abutbul serves as the CEO of Javelin Networks. History In January of 2014, cyber security professionals from both the Israeli Air Force OFEK and the Israeli intelligence corps began developing a tool to help oranizations protect Active Directory. Key Competitors SolarWinds, Varonis Products and Services Javelin AD Protect – This product is installed into the Active Directory. It is a silent implementation that does not alter the AD infrastructure or user experience. The product seeks to reduce the attack surface by illuminating surfaces favored by attackers as well as provide automated foresnics. Finally, the solution claims to have reduced alert fatigure, meaning an alert is only signaled on a definitive breach. Website http://www.javelin-networks.com/
Jericho Systems
JIRANSOFT
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Jericho Systems provides a suite of tools for establishing attribute-based access controls and authorizations for the enterprise or service provider environment. Headquarters Jericho Systems Corporation 6600 LBJ Freeway Suite 250 Dallas, Texas 75240 Tel: (877) 231 - 2200 Executives Brynn Mow, CEO of Jericho Systems, was previously head of the Dallas Technology Group. History Brynn Mow founded Jericho Systems in 2002 inspired by the need to securely share information. The company is headquartered in Dallas. Key Competitors Axiomatics Products and Services Jericho Systems products focus on standards such as XACML to provide fine-grained filtering, secure attribute-based access control, identity management and policy management. Their products can be grouped as follows: • EnterSpace Decisioning Suite – This provides content filtering, access control, and policy support. • EnterSpace Exchange – This provides attribute-based authorization within healthcare exchanges. • Jericho Authorization Provider – This provides policy enforcement and access controls for Microsoft SharePoint. • EnterSpace LDAP Vault – This provides policy support and access control for LDAP. • SAML Attribute Responder – This provides a Security Assertion Markup Language (SAML)-compliant means for an enterprise to establish a standards-compliant attribute authority. Website https://www.jerichosystems.com/
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) TAG Cyber Controls Secure File Sharing, Data Loss Prevention Brief Overview JIRANSOFT provides an SaaS platform for secure storage and control of enterprise assets in the cloud. Headquarters JIRANSOFT 8 Shenton WAY #04-01 AXA Tower, Singapore 068811 Executives ChiYoung Oh serves as Founder and CEO of JIRANSOFT. History Established in 1994 by ChiYoung Oh and headquartered in Sunnyvale, the company has major presence in Korea and Japan. Key Competitors Box Products and Services JIRANSOFT provides secure cloud storage and control SaaS capabilities in the following offers: • DirectCloud – Business cloud storage platform • OfficeBox – Secure private cloud storage for enterprise • OfficeDLP – DLP solution for SMBs • DirectFolder – Share photos with friends and family Website https://www.jiransoft.com/
Joe Security
Jumio
(Alpha Version 0.1 – 08/08/17 – No Vendor Approval) TAG Cyber Controls Endpoint Security Brief Overview Joe Security scans endpoints to provide malware protection. Headquarters Joe Security LLC business parc Reinach Christoph Merian-Ring 11 4153 Reinach Switzerland Executives No information listed History Joe Security was founded in 2011 by Stefan Bühlmann. Products and Services Joe security provides software to run a deep scan on computers to detect malware. Website https://www.joesecurity.org/
(Alpha Version 0.1 – 08/08/17 – No Vendor Approval) TAG Cyber Controls Identity and Access Management Brief Overview Jumio provides solutions for digital ID verification. Headquarters 268 Lambert Avenue Palo Alto, CA 94306 USA Executives Stephen Stuut serves as the CEO of Jumio. He has over 25 years of experience in leadership positions for technology companies. History Jumio was founded in 2010 by Daniel Mattes. Key Competitors Trulioo, IDology Products and Services Jumio provides secure ways for customers to scan credit cards and provide digital ID from their smartphones. BAM Checkout – This is a card scanning service for merchants to use to allow customers ease of checkout. Website https://www.jumio.com/
Juniper Networks
justASC
(Alpha Version 0.1 – 06/30/17 – No Vendor Approval) Acquired by Falanx (Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Firewall Platform, Cloud Security, Network Monitoring, TAG Cyber Controls Security Information Event Management Security Consulting Brief Overview Brief Overview Juniper Networks challenges the status quo with products, justASC provides advanced security consulting focused on solutions and services that transform the economics of threat management, secure architecture and incident networking. The company co-innovates with customers and response. partners to deliver automated, scalable and secure networks with agility, performance and value. Headquarters Falanx Cyber Defense Headquarters Studio 23 Fazeley Studios Juniper Networks, 1133 Innovation Way 191 Fazeley Street Sunnyvale, California 94089 Digbeth, Birmingham B5 5SE Executives Tel: 08456 437406 Rami Rahim serves as CEO of Juniper Networks. Rahim began his Juniper career in early 1997, as employee No. 32, and Executives worked as an engineer on Juniper's first breakthrough Jay Abbott, Founder and Managing Director of justASC, product, the M40 core router. previously held senior positions with PwC, Electronic Arts, and Barclays Bank. History Pradeep Sindhu founded Juniper Networks in 1996. The History company has grown considerably, employing over 9,300 Jay Abbott founded justASC in 2012. The privately held firm is people and generating roughly $4.8B in annual revenue. In headquartered in the United Kingdom. early 2016, Juniper introduced its Software-Defined Secure Network approach, representing a shift in the cybersecurity Key Competitors paradigm that addresses today’s deficiencies and provides an PA Consulting, Praetorian, Portcullis extensible and resilient framework by leveraging the full strength of the network to detect and defend against threats. Products and Services The security professional services offered by justASC can be Key Acquisitions grouped as follows: NetScreen (2004) – Security Products Trapeze (2010) – Wireless • Penetration Testing Mykonos (2012) – Security Software • Technical Security Countermeasure Survey BTI Systems (2015) – SDN for Cloud and Metro Networks • Security Consulting and Advice • Threat and Risk Assessments Key Competitors • Security Architecture and Design Cisco, Fortinet, Palo Alto Networks • Security Monitoring Services • Security Incident Response Products and Services • Security Training In addition to its networking products which include routing and switching solutions including SDN and NFV, Juniper also Website offers a wide range of network security products for https://www.justasc.net/ enterprise and service providers, such as: • SRX Series Firewalls – Next-generation anti-threat firewalls that deliver high-performance security with advanced, integrated threat intelligence. • vSRX Virtual Firewall – High-performance network security in a virtual form factor for rapid deployment and scale-out environments • cSRX Container Firewall – Advanced security services for containerized and virtual machine environments. • Junos Space Security Director – Provides security policy management through an intuitive, centralized, webbased interface that offers enforcement across emerging and traditional risk vectors. • Sky Advanced Threat Prevention – A cloud-based service that provides advanced malware protection Website https://www.juniper.net/
Kaprica Security
Kaspersky
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Mobile Security Brief Overview Kaprica Security offers penetration testing services with emphasis on mobile security, as well as mobile charging devices that scan for viruses. Headquarters Kaprica Security 387 Technology Drive, #1114 College Park, Maryland 20740 Tel: (2020) 430 – 685 Executives Doug Britton, Co-Founder and CEO of Kaprica Security, was formerly involved in security R&D at Lockheed. History Doug Britton, Andrew Wesie, Hudson Thrift, Sagar Momin, Brian Pak, Matt Dickoff, and Garrett Barboza co-founded Kaprica Security in 2011. The small private company received $100K in funding from the Center for Innovative Technology GAP Fund in 2013. Key Competitors Lookout, Mocana Products and Services In addition to professional services focused on mobile security assessment, network penetration testing, and security design, Kaprica offers a product called Skorpion that is an Android mobile device charger. The device scans the mobile for malware, rootkits, and viruses while it charges. This is done via a scanning process that takes place while the device is connected to the mobile. Website https://www.kapricasecurity.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Anti-Malware Tools, Web Fraud Prevention, Endpoint Security, Mobile Security Brief Overview Kaspersky Lab provides IT security products for endpoint users with emphasis on malware detection. Headquarters Kaspersky Lab HQ 39A/3 Leningradskoe Shosse Moscow, 125212 Russian Federation Tel: +7-495-797-8700 Executives Eugene Kaspersky, Founder, Owner, and CEO of Kaspersky Lab, is a well-known speaker and personality in the cyber security community. History Eugene Kaspersky founded Kaspersky Lab in 1997, after years of successful anti-virus research. The company is now the largest privately held vendor of endpoint protection and is headquartered in Russia. Key Competitors McAfee , Symantec, Trend Micro Products and Services Kaspersky Lab provides endpoint security product solutions that are grouped as follows: • Security for Home – Includes Kaspersky Internet Security (Multi-Device), Kaspersky PURE, Kaspersky Internet Security, Kaspersky Anti-Virus, and Kaspersky Internet Security for Mac. • Business Security – Includes Endpoint Security Advance, Endpoint Security Select, Total Security for Business, Kaspersky Security Applications, Target Security Solutions, and Kaspersky Fraud Prevention. The Company offers a range of free downloads and scans as part of its anti-malware offerings for endpoints. Kaspersky Lab also maintains an active research laboratory, often reporting new vulnerabilities to the public based on their research. The Company also maintains an active partner/reseller program with VAR participants around the word. Website https://www.kaspersky.com/
Kaymera Technologies
KDM Analytics
(Alpha Version 0.1 – 08/08/17 – No Vendor Approval) TAG Cyber Controls Mobile Security Brief Overview Kaymera Technologies provides a rnage of services and products for mobile security such as secured devices and applications. Headquarters Herzliya, Tel Aviv Israel Executives Avi Rosen serves as the CEO. History Kaymera was founded in 2013 by Avi Rosen, Shalev hulio, and Omri Lavie in Israel. Key Competitors Zimperium, SkyCure (Symantec) Products and Services Kaymer secured device – Off the shelf high end devices with hardened operating systems. Many layers of security ensure the device is properaly protected from many threats. Adaptive mobile threat defense – a mobile security solution that aims to balance mobility and productivity. It does this through detection, augmentation, and mitigation. Cyber Command Cetner – a console to serve as a centralized management system. It allows real time monitoring of the organizations mobile security. Website https://www.kaymera.com/
(Alpha Version 0.1 – 08/09/17 – No Vendor Approval) TAG Cyber Controls GRC, Security Training, Consulting Brief Overview KDM Analytics helps risk managers quantify, measure, and prioritize cyber risks. Headquarters KDM Analytics 1101 Pennsylvania Ave NW, Suite 600 Washington DC, 20004 Tel: 202.756.2488 KDM Analytics 1956 Robertson road, Suite 204 Ottawa, Ontario, K2H5B9 Tel: 613.627.1010 Executives Djenana Campara serves as the CEO of KDM Analytics. She currently also serves as a board member on the Object Management Group and has previously held a board position for NIST. History KDM Analytics was founed in 2006 by Djenana Campara in Washington DC. Key Competitors Global Cyber Risk LLC Products and Services KDM’s Blade Risk Manager is a cyber security risk management platform. It provides a top down operational view of cyber risk. Eliminate the ad hoc nature of risk analysis Reduce operational costs (repeatable process) KDM also offers third party risk assessment, consulting, and security training services. Website http://kdmanalytics.com/
Keeper Security
Kenna
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Password/Privilege Management Brief Overview Keeper Security provides secure password management and online vault storage solutions. Headquarters Keeper Security 850 W. Jackson Boulevard, Suite 500 Chicago, Illinois 60607 Executives Darren Guccione, Co-founder and CEO of Keeper Security, was previously co-founder of Callpod and OnlyWire. History Darren Guccione and Craig Lurey co-founded Keeper Security in 2011. The company is located in Chicago and El Dorado Hills, California. Key Competitors AgileBits, LastPass Products and Services Keeper Security offers a zero knowledge security platform for private vault storage of passwords and personal information. Information is protected with multi-factor authentication, encryption, biometric login, and personal device identity verification. A feature of Keeper Security is that the encryption key to decrypt data is always kept within the Keeper user to ensure full owner control of data encryption and protection. Keeper also offers a Cloud Security Vault physically hosted within AWS infrastructure. Website https://www.keepersecurity.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Vulnerability Management, Security Analytics Brief Overview Kenna provides a threat management platform focused on external breaches, data exploitation, and zero-day vulnerabilities. Headquarters Kenna 223 West Erie Street, Suite 2SE Chicago, Illinois 60654 Executives Karim Toubba, CEO of Risk I/O since 2014, was previously Vice President of Global Security at Juniper. History Founded in 2010, the private company has raised $10.4M in venture funding from Costanova Venture Capital, US Venture Partners, Tugboat Ventures, and Hyde Park Angels. The company rebranded from Risk I/O to Kenna in 2015. Key Competitors Lastline, NetCitadel, Dell SonicWALL, BeyondTrust Products and Services Kenna provides a software-as-a-service platform for analyzing external attack data and zero-day threat intelligence with internal scanning results to identify threats. The company claims to process over a billion vulnerabilities per day for users. The platform includes connectors to a range of security and management technologies including Atlassian JRA, Beyond Security, Beyond Trust, Burp Suite, Cenzic, HPE Fortify, HPE Webinspect, IBM AppScan, McAfee Vulnerability Manager, Netsparker, Metasploit, Nmap, NTOSpider, Qualys, Nexpose, OpenVAS, Tenable, Security Center, Tripwire, Veracode, W3AF, and WhiteHat. Risk I/O provides a dashboard with a risk score (0 – 1000) that estimates the security risk profile of an organization. Scans are matched against Open Threat Exchange, SANS, and other open threat information. Website https://www.kennasecurity.com
Kerio Acquired by GFI Software
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Unified Threat Management, Secure File Sharing Brief Overview Kerio provides unified threat management (UTM) and collaboration solutions for its customers. Headquarters 401 Congress Ave #2650 Austin, TX 78701 Executives Scott Schreiman, CEO of Kerio since 2006, held a previous executive position with Wells Fargo. History Kerio entered the security market in 1997 with its WinRoutePro product. They have expanded since into the secure collaboration space and have grown to hundred of employees. The company now has offices in the Czech Republic, UK, Germany, Australia, and Russia. Key Competitors Hightail, SmartVault, Accellion Products and Services Kerio provides secure file sharing and content collaboration for its customers, along with added security product capabilities. Kerio’s main product offering is Kerio Connect, which includes support for email collaboration, file sharing, and other secured collaboration features. The company also offers a product called Kerio Control, which is a unified threat management solution with firewall and network intelligence capabilities. Additional products Kerio Samepage.io and Kerio Operator provide additional capabilities with cloud options. Website https://www.kerio.com/
Kernel (Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, Penetration Testing Brief Overview Kernel provides a range of security services including managed and network security as well as penetration testing and security audit. Headquarters Kernel Aurora, Colorado Tel: (720) 446 – 5221 Executives Justin Farmer and Travis Framer serve as co-founders of Kernel. History Founded in 2012, the company has presence in Aurora, Colorado and Springdale, Arizona. The company received $100K in seed funding in 2014. Key Competitors Trustwave Products and Services Kernel provides a range of managed and professional services that can be grouped as follows: • Security Audit Services • Managed IT Security • Web and Application Development • Satellite Internet • Security Consulting Website https://www.kernelops.com/
Keypasco
KEYW
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview Keypasco offers secure multi-factor authentication and transaction verification for mobile devices. Headquarters Keypasco AB Otterhallegatan 1, 411 18 Goteborg, Sweden Tel: +46 31 10 23 60 Executives Maw-Tsong Lin, Co-Founder and CEO of Keypasco, holds patents in the areas of authentication and smart cards. History Maw-Tsong Lin and Per Skygebjerg co-founded Keypasco in 2010. The small independent company is headquartered in Sweden with an office in China. The company also sells through a series of partners in Taiwan, Brazil, China, and Russia. Key Competitors Duo Security, RSA Products and Services The Keypasco software-based solution involves secure authentication and transaction verification with multi-factors. The service includes support for device fingerprints, geographical locations (called Geo-fencing), mobile device proximity, and risk behavioral analysis (involving creation of a risk score for each attempt) to authenticate users. The implementation involves a Keypasco server (Borgen) – located in the cloud or on-premise, one or several clients (Vakten), and a Web channel. Website https://www.keypasco.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Information Assurance, Security Information Event Management Brief Overview KEYW offers cyber security and information assurance analytics and SOC solutions through its Hexis Cyber Solutions platform. Headquarters KEYW Corporation 7740 Milestone Parkway, Suite 400 Hanover, Maryland 21076 Tel: (443) 733 – 1600 Executives Bill Weber serves as President and CEO of KEYW. He was previously President and CEO of XLA. History Founded in 2008, the public company is headquartered in Hanover, Maryland. The company went public in 2010 after $28M in Venture funding from 2009 to 2010. KEYW acquired Hexis Cyber Solutions in 2013. The company additionally acquired SenSage for its SIEM capability and platform, making SenSage a subsidiary of Hexis. Key Acquisitions Hexus (2013) – SIEM Ponte Technologies – Information Assurance Key Competitors TASC, Boeing, LMC, NGC Products and Services KEYW offers a range of professional, engineering, and program services to the Federal Government. It offers cyber security solutions through its Hexis Cyber Solutions products and services, which include the following capabilities: • HawkEye – Machine speed analytics using Big Data algorithms and techniques on a high-performance platform • HexisCare – Professional services centered on the Hexis Security Operations Center to leverage intelligence across users KEYW also offers cyber security training and related professional services with emphasis on Federal customers. Website https://www.keywcorp.com/
Kindus
KLC Consulting
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview Kindus is an IT security and services consulting firm located in the UK. Headquarters Kindus Limited The Elsie Whiteley Innovation Centre Hopwood Lane Halifax West Yorkshire HX1 5ER Tel: 0845 0780 365 Executives Imram Ali is head of information security and risk at Kindus Solutions. History The small company is located in Halifax, in the UK with an office in Hebden Bridge. Key Competitors PA Consulting Products and Services Kindus security consulting offerings can be grouped as follows: • Application Security – Includes application code security, application security testing, firewall assurance, security training, application delivery, and certificate management. • Network Security – Includes DDOS mitigation, load balancing, network penetration testing, network assurance, SIEM, next generation firewalls, and network vulnerability assessment. • Information Security – Includes due diligence, security risk assessment, business continuity planning, disaster recovery planning, data security governance, information systems audit, ISO 27001, and IT health check. Website https://www.kindus.co.uk/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview KLC Consulting offers a range of consulting services including assessments and risk management. Headquarters KLC Consulting, Inc. 225 Cedar Hill Street Suite #200 Marlboro, Massachusetts 01752 Tel: (617) 314 – 9721 Executives Kyle Lai, Founder, President, and CEO of KLC Consulting, was previously with PwC, CIGNA, Boeing, and HP. History Founded in 2002 by Kyle Lai, the small private company is headquartered in Massachusetts. Key Competitors Taino Consulting Group Products and Services KLC Consulting offers security-consulting services that can be grouped as follows: • Information Assurance / Privacy Assessment – Includes vulnerability assessments, penetration testing, certification and accreditation, security test and evaluation, third-party vendor security review, regulatory compliance, and privacy documentation. • Information Security / Information Assurance Solutions – Includes network and application security, virtualization and cloud computing security, identity and access management, business continuity planning, staff augmentation, intrusion detection, prevention, and antimalware. • Application Development and Security – Includes secure development lifecycle, secure application and database development, configuration and change management, secure code review, and threat modeling. Website https://www.klcconsulting.net/
Klocwork
KnowBe4
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Application Security Brief Overview Klocwork provides secure code analysis tools for software and application security. Headquarters Rogue Wave Software Klocwork 5500 Flatiron Parkway Suite 200 Boulder, Colorado 80301 Tel: (800) 487 – 3217 Executives Brian Pierce serves as CEO of Rogue Wave. Mike Laginski serves as CEO of Klocwork. History Klocwork is a Rogue Wave company, spun off from Nortel Networks in 2001 and acquired in 2014. Rogue Wave is headquartered in Boulder, Colorado with offices in the UK, Germany, Canada, France, and Japan. Key Competitors Cigital, Veracode Products and Services Klocwork provides a suite of secure code products and services that can be grouped as follows: • Secure Code Analysis Tools – Includes secure code analysis tools for application security, source code analysis, code refactoring, reporting and metrics, code architecture, and code review. • Code Architecture – Involves a rich code architecture platform to visualize and modularize software. • Professional Services – Includes software professional services such as discovery, deployment, installation, and other activities. Website https://www.klocwork.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Security Training Brief Overview KnowBe4 provides security awareness training services for the enterprise. Headquarters KnowBe4 33 N. Garden Avenue Suite 1200 Clearwater, Florida 33755 Tel: (855) 566 – 9234 Executives Stu Sjouwerman serves as founder of KnowBe4. He was previously owner of Sunbelt Software, which was acquired by GFI Software in 2010. History The firm, which is located in Florida, markets a partnership with former hacker Kevin Mitnick as part of its security awareness differentiation. Key Competitors Wombat Products and Services KnowBe4 provides security awareness training focused on reducing the risk of social engineering and other attacks to the enterprise that can be mitigated through educated and professional judgment from employees. Specific offerings include: • Kevin Mitnick Security Awareness Training • KnowBe4 Enterprise Awareness Training • Security Awareness Training • Customer Awareness Program KnowBe4 also provides tools for phish testing ad related security awareness exercises. It also offers SaaS subscriptions to support training. Website https://www.knowbe4.com/
KoolSpan
KoreLogic
(Alpha Version 0.1 – 07/05/17 – Vendor Approval) TAG Cyber Controls Voice Security Brief Overview KoolSpan provides mobile communications security products with voice and messaging encryption. Headquarters KoolSpan, Inc. 7735 Old Georgetown Road, Suite 500 Bethesda, Maryland 20814 Executives Nigel Jones serves as CEO of KoolSpan. Elad Yoran serves as Executive Chairman of KoolSpan. History Koolspan is a privately owned company based in Bethesda, Maryland with international offices in Korea (APAC), Miamai (LATAM), Italy, and the United Kingdom (EMEA). Koolspan has raised more than $50M.
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Security Consulting Brief Overview KoreLogic provides a range of security professional services for business customers. Services include penetration testing, application security assessment, and threat modeling. Headquarters KoreLogic Security 116 Defense Highway, Suite 300A Annapolis, Maryland 21401 Tel: (410) 867 – 9103 Executives Bob Austin, Founder and President of KoreLogic, was previously a Vice President at the Meta Group. History Bob Austin founded KoreLogic in 2004 with a group of seasoned security experts to offer security professional services for business customers. Key Competitors Telos, LMI Government Consulting, PPC Products and Services KoreLogic provides a range of security professional services for business customers. These services include penetration testing and various types of security assessments, often assisted with tools provided by the company. The services offered by KoreLogic are as follows: • Application Security Assessment • Penetration Testing • Threat Modeling • Intrusion/Malware Response • Forensics • Architecture Reviews • Third-Party Assessments • Product Evaluation • Monitoring and Compliance Services Website https://www.korelogic.com/
Key Competitors Cellcrypt, Silent Circle Products and Services KoolSpan mobile phone communications encryption product line, TrustCall, has shifted recently toward a software implementation from its original hardware base. TrustCall provides robust, cross-platform, end-to-end communication security on mobile devices for Governments and Enterprises, and more recently, for SMBs and Consumers. KoolSpan’s offerings include the following: •
•
•
TrustCall DIRECT Enterprise is designed for organizations requiring direct control of their communications, including both data and metadata. TrustCall DIRECT Enterprise includes infrastructure (TrustCenter, TrustBridge and more) deployed on the customer’s premise or in their private cloud. TrustCall DIRECT Service Provider enables service providers to deliver TrustCall “as-a-service” to their customers. It includes service provider infrastructure and APIs for integration within service provider ecosystems, such as provisioning and billing systems and others. Partners include service providers in Europe, Asia, Middle East, Latin America and the United States. TrustCall Global Service offers a completely hosted service managed by KoolSpan, enabling secure and private communications without any associated capital expenditures and overhead.
All TrustCall solutions work on iPhone, Android and BlackBerry. TrustCall is also available with a HW TrustChip as an option. TrustCall communications are encrypted and authenticated end-to-end with AES-256 bit encryption. KoolSpan is FIPS 140-2 validated and has 21 patents issued and dozens pending. TrustCall is embedded in many high-end secure mobile phones, including the Sirin Solarin and others. Website https://www.koolspan.com/
Kount
KPMG
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Web Fraud Prevention Brief Overview Kount provides anti-fraud and risk management solutions for e-commerce and credit card merchants. Headquarters Kount Corporate Campus 917 S Lusk Street #300 Boise, Idaho 83706 Tel: (208) 489 – 2701 Executives Bradley Wiskirchen, CEO of Kount, is also Chairman of the Salt Lake City Branch of the Federal Reserve Bank of San Francisco. History Tim Barber founded Keynetics, which is now the largest private provider of technology in the state of Idaho. Kount was established as a subsidiary of Keynetics. CVC Capital Partners Growth Fund made an $80M investment in Kount in 2015. Key Competitors ThreatMetrix, Guardian Analytics Products and Services Kount provides anti-fraud solutions for credit card and ecommerce merchants, including card-not-present solutions in the cloud. Their product offerings can be grouped as follows: • Kount Complete – Involves an in-the-cloud service that creates a risk score for transactions where the credit card is not present • Kount Access – Uses device ID, IP location, previous attempts, and other context to determine and calculate risk at login time from the login page • Kount Central – Offers risk management for payment processors using real-time analytics. • Kount SMB – Addresses a range of account, chargeback, and other fraud conditions. Website https://www.kount.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Governance, Risk, and Compliance, PCI DSS/Compliance Brief Overview KPMG provides professional services to business clients, including information security. Headquarters KPMG World Headquarters Amstelveen, The Netherlands Executives John B. Veihmeyer serves as Chairman and CEO of KPMG. History Founded in 1987, KPMG is one of the largest professional services companies in the word. Regarded as one of the Big Four auditing firms, KPMG is headquartered in the Netherlands. It is organized as a Swiss Cooperative, with each national firm operating as an independent legal entity. The company reported $23B in revenue in 2013. Key Acquisitions Rothstein Kass (2014) – Accounting and Audit Key Competitors Deloitte, EY, PwC Products and Services As part of the Advisory Services, KPMG maintains a Risk Consulting offering which, in turn includes the following security-related offerings: • Forensic Services • Internal Audit, Risk, and Compliance Services • IT Advisory Services including Cyber Security KPMG’s cyber security advisory services are based on its Cyber Security Framework, which emphasizes protection, detection and response, integration, and preparation. Website https://www.kpmg.com/
Kroll
Krypsys
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Incident Response, Security Consulting, Penetration Testing, Digital Forensics, Information Assurance Brief Overview Kroll provides investigations, risk, and cyber security consulting services for business clients. Headquarters Kroll Cyber Security and Information Assurance Suite 300 Nashville, Tennessee 37214 Tel: (866) 419 – 2052 Executives David Fontaine serves as CEO of Kroll. History Jules Kroll established Kroll Inc. in 1972. The firm has grown since and is based in Midtown Manhattan. The cyber security team is headquartered in Tennessee with an office in the UK. Altegrity acquired Kroll in 2010 for $1.13B. Prior to the 9.11 attacks, Kroll hired John O’Neill to head security at the World Trade Center complex; O’Neill died on 9/11. Key Competitors Skybox Security, eSentire, SAINT Products and Services The cyber security and information assurance services offered by Kroll Cyber Security can be grouped as follows: • Cyber Security – Includes security and risk assessments, self risk assessments, policy review and design, penetration testing, vulnerability scanning, and thirdparty reviews. • Computer Forensics – Includes cyber crime investigation and expert testimony and reporting. • Data Breach and Incident Response – Includes data collection and preservation, data recovery and forensic analysis, and malware and advanced persistent threats. • Data Breach Notification and Remediation – Includes PHI and PII identification, data breach notification and data breach remediation. Website https://www.kroll.com/ https://www.krollcybersecurity.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing Brief Overview Krypsys provides security professional services including penetration testing and compliance support. Headquarters Krypsys Manchester – Head Office 5300 Lakeside, Cheadle Royal Business Park, Manchester, SK8 3GP Tel: 0845 474 3031 Executives Simon Hunt serves as Managing Director of Krypsys. History Founded in 2011, the company is headquartered in Manchester with an office in London. Key Competitors Hedgehog Security, Rapid7 Products and Services The security consulting services offered by Krypsys can be grouped as follows: • Penetration Testing • Vulnerability Assessment • Web Application Testing • Anti-Evasion (AET) Readiness Testing • Virtual Security Team • Firewall Health Check • ISO Consulting • Project Management • Training The company maintains partnerships and offers security products from companies such as Core Security, Stonesoft, NetWrix, Symantec, Juniper, Barracuda, FireEye, Quarri, and Alien Vault. Website https://www.krypsys.com/
K2 Intelligence
Kyrus
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Incident Response, Security Consulting, Digital Forensics Brief Overview K2 Intelligence provides investigative, integrity, and analytic consulting including forensics. Headquarters K2 Intelligence 845 Third Avenue New York, New York 10022 Tel: (212) 694 – 7000 Executives Jeremy Kroll, Co-Founder and CEO of K2 Intelligence, previously spent eleven years at Kroll. History Founded in 2009, by Jeremy and Jules Kroll, the company is headquartered in New York with presence in London, Madrid, and Tel Aviv. Key Competitors Mandiant, Kroll, Stroz Friedberg Products and Services K2 Intelligence provides consulting and investigative services that can be grouped as follows: • Complex Investigations and Disputes • Board Advisory • AML and Regulatory Compliance • Integrity Monitoring and Compliance • Data Analytics and Visualization • Cyber Investigations and Defense Website https://www.k2intelligence.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Security R&D Brief Overview Kyrus focuses on security research, reverse engineering, computer forensics, and secure software development. Headquarters Kyrus 46040 Center Oak Plaza, Suite 165 Sterling, Virginia 20166 Tel: (571) 313 – 5064 Executives W. Daniel Hall, President and CEO of Kyrus, is a former special agent with the Air Force Office of Special Investigations. History Kyrus is headquartered in the Washington area with a presence in San Antonio and Denver. The company has a strategic partnership with Syndis. Carbon Black, acquired by Bit9, was originally developed at Kyrus. Key Competitors NCC Group Products and Services Kyrus focuses on security research (hardware and software), reverse engineering, secure code development, and forensics. The company makes available a large set of open source security tools on its GitHub. Kyrus maintains partnerships with Digital Crimes Unit, Syndis, Exodus, and FusionX. Website https://www.kyrus-tech.com/
Lacework
Lancera Security
(Alpha Version 0.1 – 08/09/17 – No Vendor Approval) TAG Cyber Controls Cloud Security, IDS Brief Overview Lacework provides cloud threat detection through their product, Lacework Polygraph. Headquarters 700 E El Camino Real Suite 130 Mountain View, CA 94041 Executives Jack Kudale serves as the President and CEO. History Lacework was founded in 2015. Key Competitors CloudPassage, GuardiCore Products and Services Lacework Polygraph is a cloud security solution that focusses on the following; Breach Detection – Detect intrustions with Polygraph’s deep temporal baseline. No policies, rules, or log analysis required. Incident Investigation – review users, application use, containers, connections, and traffic after a compromise. Insider Threat Management – track privileged accounts to prevent insider abuse. DEVSECOPS Insights – chart cloud operations with an intuitive graphical map. Website https://www.lacework.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Application Security Brief Overview Lancera Security provides a range of services including penetration testing and secure application development. Headquarters Lancera Security 709 N. 1890 W. Unit #39A Provo, Utah 84601 Tel: (855) 526 – 2372 Executives Chad Bennett serves as Founder and CEO of Lancera Security. He was previously with Vested Group and Domain Market. History Chad Bennett founded Lancera Security in 2011. The small private company is headquartered in Utah. Key Competitors HackLabs Products and Services Lancera offers a range of security professional services including the following: • Penetration Testing • Secure Application Development • Managed Firewall Services • Vulnerability Assessment Website https://www.lancera.com/
Landrian Networks
Larson Security
(Alpha Version 0.1 – 08/09/17 – No Vendor Approval) TAG Cyber Controls Incident Response Brief Overview Landrian Networks uses virtual reality to visualize incident response and security operation centers. Headquarters 200 Spectrum Center Dr Irvine, CA 92618 Tel: (949) 667-1670 Executives Jason Ladners serves as CEO. History Landrian Networks was founded in 2016. Products and Services Landrian Networks virtual reality incident response tool uses a virtual reality headset and a Leap Motion handset to operate. The tool was developed in Unity and is operated with hand motions to navigate a security heads up panel in virtual reality. Website https://www.landriannetworks.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Digital Forensics, Incident Response Brief Overview Larson Security provides cyber security services including digital forensics and incident response. Headquarters Larson Security, LLC 17 Peterson Place North Oaks, Minnesota 55127-6201 Tel: (612) 200 – 0862 [emailprotected] Executives Scott Larson, CEO of Larson Security, worked previously for the FBI as a cyber crime and computer forensic agent. History The small private company is headquartered in Minnesota. Key Competitors Sword & Shield, Kroll Products and Services Larson Security offers security services that can be grouped as follows: • Cyber Security – Includes advice, analysis, and mitigation techniques to address espionage, APTs, and other attacks • Digital Forensics – Includes digital forensics and eDiscovery preservation, full network tap collection, and related activities • Investigations – Supports corporate, legal, regulatory, and court-appointed experts in investigations and other projects • Security Assessments – Involves security investigation and assessment of networks, systems, and so on. Website https://www.larsonsecurity.com/
Lastline
LastPass
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Security Analytics Brief Overview Lastline provides advanced malware detection and threat analysis for enterprise customers as a hosted or on-premise solution. Headquarters Lastline 203 Redwood Shores Parkway Redwood City, California 94065 Executives Christopher Kruegel, PhD serves as Co-Founder and CEO of Lastline. History University researchers Engin Kirda, Christopher Kruegel, and Giovanni Vigna founded Lastline in 2001. These founders also created iSecLab, Anubis, and Wepawet. The private company has received Series A, Venture Round, and Series B funding from Redpoint Ventures and e.ventures totaling $23.7M. Key Competitors FireEye, Intel, Symantec Products and Services The core mission addressed by Lastline involves using advanced malware detection and threat analytics techniques to help the enterprise detect and prevent serious threats such as APTs. Lastline offers two main products: • Lastline Enterprise – Involves support for detecting malware in the enterprise network with focus on zeroday and APT attacks. • Lastline Analyst – Involves support for uploading files for analysis with emphasis on the needs of a forensic or audit team. Both solutions are available as on-premise or hosted/cloud offerings. The products come in three modules: Sensor Module (on-site appliance that monitors network traffic), Manager Module (on-site appliance or cloud service that forwards data to engine for analysis), and Engine Module (analysis tools that analyze executables). Website https://www.lastline.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Password/Privilege Management Brief Overview LastPass provides a password management tool, including support for enterprise customers. Headquarters LastPass Corporate Headquarters 8315 Lee Highway Suite 501 Fairfax, Virginia 22031 Executives Joe Siegrist, Co-Founder and CEO of LastPass, was previously CTO of eStara until it was acquired by ATG. History Joe Siegrist, Robert Billingslea, Sameer Kochbar, Andrew Zitnay co-founded LastPass Key Competitors AgileBits, Dashlane, RoboForm, Symantec Products and Services The LastPass tool provides password management with the following features: • Leading encryption technology • Local-only decryption • Multi-factor authentication • Support for mobile • Support for enterprise Website https://www.lastpass.com/
LaunchKey Acquired by iovation
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Two-Factor Authentication Brief Overview LaunchKey provides a next generation authentication and authorization platform using mobile devices. Headquarters LaunchKey 701 Bridger Avenue Las Vegas, Nevada 89101 Executives Geoff Sanders serves as Co-Founder and CEO of LaunchKey. History Geoff Sanders, Devin Egan, and Yo Sub Kwon co-founded LaunchKey. The small company has received rounds of venture funding from VegasTechFund, Kima Ventures, Ludlow Ventures, and Prolific VC. Key Competitors Okta, Duo Security Products and Services LaunchKey provides authentication products in the context of an identity and access management platform for enterprise. Specific feature areas include the following: • LaunchKey for End Users – Mobile app that turns user’s device into authorization agent • LaunchKey for Developers – Includes REST API and public endpoints to secure Web or mobile applications • LaunchKey for Organizations – Next generation authentication as an identity and access management platform • LaunchKey for Enterprise – Customized solutions and advanced deployments for enterprise The solution uses the LaunchKey Engine that uses a PKI-based platform for authentication flow, encryption, and system status. A LaunchKey Dashboard provides command and control of all authentication, identity, and access capabilities, including creating groups and managing users. Website https://www.iovation.com/launchkey
Layer Seven Security (Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Penetration Testing, Application Security Brief Overview Layer Seven Security provides a range of SAP security services including application security and penetration testing. Headquarters Layer Seven Security 555 Industrial Drive Suite 107 Milton, ON L9T 5E! Canada Tel: (647) 964 7207 Executives Aman Dhillon serves as Managing Director and SAP Security Consultant for Layer Seven Security. History Founded in 2010 and headquartered in Toronto, the private company has partners throughout the United States. Key Competitors ERPScan Products and Services Layer Seven Security provides SAP security and configuration validation services including the following: • SAP Cybersecurity • Code Vulnerability Assessment • SAP Penetration Testing • SAP Security Training Website https://www.layersevensecurity.com/
LBMC
Lenzner Group
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Security Consulting, Penetration Testing Brief Overview LBMC Information Security offers a range of security consulting services including penetration testing. Headquarters LBMC Information Security 5250 Virginia Way PO Box 1869 Brentwood, Tennessee 37027-1869 Tel: (615) 377 – 4600 Executives Mark Burnette serves as Partner, Information Security at LBMC. History The LBMC Family of Companies originated as an accounting firm and now includes professional services companies focused on audit, technology solutions, staffing, and other areas – including information security. The LBMC information security team is located in Nashville. Key Competitors Deloitte Products and Services LBMC Information Security offers a range of professional and managed services including the following: • Compliance and Audit Services – Includes PCI DSS and other frameworks • Consulting – Includes penetration testing and risk assessment • Managed Security Services – Includes monitoring and management Website https://www.lbmcinformationsecurity.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Security Recruiting Brief Overview Lenzner Group provides search and recruiting services with emphasis in information security. Headquarters Lenzner Group 575 Madison Ave 10th Floor New York, NY 10022 Tel: (212) 920 – 6155 Executives Tracy Lenzner serves as Founder and CEO of Lenzner Group. History Founded in 2003, the firm is located in Williamsville, New York. Key Competitors LJ Kushner Products and Services Lenzner Group provides search and recruiting services for positions in areas such as CISO, Chief Information Risk, Professional Services Partner, Legal Technology Risk, ERP Risk, Crisis Management, Cyber Crime, eDiscovery, Managed Services, Advanced Technologies, and Analytics. These positions serve industries such as financial services, government and defense, life sciences and health, private equity, manufacturing, industrial, utilities, professional services, technology law, technology, telecommunications, and media. Website https://www.lenznergroup.com/
Leidos
Level 3
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Information Assurance, Security Consulting Brief Overview Leidos offers solutions in national security, health, and engineering including cyber security. Headquarters Leidos, Inc. 11951 Freedom Drive Reston, Virginia 20190 Tel: (571) 526 – 6000 Executives Roger Krone serves as CEO of Leidos. History Founded in 1969 as SAIC the company changed its name in 2013 and spun off a separate IT services company with the name SAIC. The company expects $10B in revenue in 2016 and trades on the NYSE. Key Competitors LMC, NGC, Accenture Products and Services Leidos offers product and service solutions for national security include cybersecurity areas such as accreditation and testing, contingency planning, digital and computer forensics, security education and training, cybersecurity consulting, information security assessment, public key infrastructure (PKI), supply chain security, ICS/IoT, security development lifecycle, threat and security operation services, and eGRC. Website https://www.leidos.com/
(Alpha Version 0.1 – 07/05/17 – No Vendor Approval) TAG Cyber Controls Managed Security Services, DDOS Security Brief Overview Level 3 is a telecommunications and Internet service provider that offers services including managed security. Headquarters Level 3 Communications 1025 Eldorado Boulevard Broomfield, Colorado 80021 Tel: (720) 888 – 1000 Executives Jeff Storey, President and CEO of Level 3, was previously CEO of WilTel Communications. He began his career with Southwestern Bell Telephone. Dale Drew serves as CISO of Level 3. History Founded in 1985 as Kiewit Diversified Group, the company changed its name to Level 3 in 1998. During that era of dotcom boom, Level 3 constructed almost 20K route miles of fiber and was servicing 2,700 customers. The company merged with Global Crossing in 2011 and has over 100K route miles of fiber. The public company trades on NASDAQ. Level 3 acquired Black Lotus Communications in 2015. Key Acquisitions Black Lotus – DDOS Security Key Competitors AT&T, Verizon, CenturyLink Products and Services Level 3 products and services include the following security solutions: • Secure Access Services (VPN) • Managed Security Services • DDOS Mitigation • Email and Web Defense • Security Consulting Services The company acquired DDOS security service provider Black Lotus in 2015. The Black Lotus DDOS service operates as a reverse proxy service designed for protection of HTTP and SSL traffic. The service uses a patent-pending concept known as Human Behavioral Analysis (HBA) to address Layer 7 attacks. HBA is used to ensure that requests come from human beings or legitimate automation, rather than botnets. Black Lotus offers emergency turn-up for companies under attack. Black Lotus deploys its service by establishing connectivity to its Black Lotus High Performance Carrier Network (HPCN) via Ethernet, tunneling, or o