Details on each company and their innovations can be found on Cybersecurity Venture's website.
[Related: Three Aussies make Cybersecurity 500 list]
| Rank | Company | Speciality |
| 1 | root9B | Cybersecurity Consulting & Operational Support |
| 2 | Lancope | Network Visibility & Security Intelligence |
| 3 | AlienVault | Threat Detection & Response |
| 4 | Dell SecureWorks | Managed Security Services |
| 5 | IBM Security | Enterprise IT Security Solutions |
| 6 | AVG Technologies | Anti-Virus & Internet Security Software |
| 7 | FireEye | Advanced Threat Protection |
| 8 | Forcepoint | Cloud, Mobility & IoT Security |
| 9 | Veracode | Application Security Testing |
| 10 | BT | Security & Risk Management Solutions |
| 11 | Clearwater Compliance | Risk Management and Compliance |
| 12 | Palo Alto Networks | Threat Detection & Prevention |
| 13 | Trend Micro | Server, Cloud, and Content Security |
| 14 | RSA | Intelligence Driven Security |
| 15 | Code Dx | Software Assurance Analytics |
| 16 | Sera-Brynn | Cyber Risk Management |
| 17 | Sophos | Anti-Virus & Malware Protection |
| 18 | Intel Security Group | Anti-Virus, Malware & Threat Protection |
| 19 | IKANOW | Information Security Analytics |
| 20 | Cavirin | Automated IT & Cloud Security |
| 21 | Digital Defense | Managed Security Risk Assessment |
| 22 | Cisco | Threat Protection & Network Security |
| 23 | Herjavec Group | Information Security Services |
| 24 | Nexusguard | Cloud Enabled DDoS Mitigation |
| 25 | Thycotic | Privileged Account Management |
| 26 | Check Point Software | Unified Threat Management |
| 27 | Deloitte | Global Risk Management Services |
| 28 | Rapid7 | Security Data & Analytics Solution |
| 29 | Splunk | Big Data Security |
| 30 | DFLabs | Automated Incident & Breach Response |
| 31 | Symantec | Endpoint, Cloud & Mobile Security |
| 32 | Kaspersky Lab | Malware & Anti-Virus Solutions |
| 33 | AT&T Network Security | Managed Security & Consulting |
| 34 | A10 Networks | DDoS Cyber Attack Protection |
| 35 | Booz Allen | Cybersecurity Solutions & Services |
| 36 | PwC | Cybersecurity Consulting & Advisory |
| 37 | Immuniweb | Continuous & On-Demand Web Security |
| 38 | Black Duck Software | Open Source Software Security |
| 39 | Bit9 + Carbon Black | Endpoint & Server Security Platform |
| 40 | Autonomic Software | Endpoint Security Management |
| 41 | CyberArk | Cyber Threat Protection |
| 42 | EY | Cybersecurity Advisory Services |
| 43 | Bayshore Networks | Internet of Things Security |
| 44 | Ziften | Endpoint Threat Detection |
| 45 | CYBERBIT | Cyber Security & Intelligence Solutions |
| 46 | FinalCode | File Encryption & IRM Platform |
| 47 | DB Networks | Intelligent Continuous Monitoring |
| 48 | Cryptzone | File & Data Encryption Platform |
| 49 | Cybera | Security Infrastructure Protection |
| 50 | i-Sprint | Identity & Access Management |
| 51 | Proofpoint | Security-as-a-Service |
| 52 | Deep Secure | Content Control & Inspection |
| 53 | Checkmarx | Software Development Security |
| 54 | Northrop Grumman | Cyber & Homeland Security Services |
| 55 | L-3 | National Security Solutions |
| 56 | Tanium | Security & Systems Management |
| 57 | Qualys | Cloud Security & Compliance |
| 58 | Optiv | Information Security Services |
| 59 | SentryBay | PC, Mobile & IoT Security |
| 60 | Corero | DDoS Defense & Security Solutions |
| 61 | Silent Circle | Enterprise Privacy Platform |
| 62 | HP | Cybersecurity for Public Sector & Defense |
| 63 | Palantir | Cybersecurity Analytics and Cyber Fraud |
| 64 | Threat Stack | Cloud Security Monitoring |
| 65 | Lockheed Martin | Cybersecurity Solutions & Services |
| 66 | Stroz Friedberg | Cyber Intelligence & Risk Management |
| 67 | Verizon Enterprise | Network & Data Security |
| 68 | Akamai Technologies | Secure Cloud & Mobile Computing |
| 69 | Tripwire | Advanced Cyberthreat Detection |
| 70 | Morphick | Advanced Threat Protection Services |
| 71 | StratoKey | Cloud Data Protection |
| 72 | Pindrop Security | Phone-Based Fraud Prevention |
| 73 | TraceSecurity | IT Governance, Risk & Compliance |
| 74 | Coalfire | Cyber Risk Management |
| 75 | Cimcor | Governance, Risk & Compliance |
| 76 | Lookingglass | Cyber Threat Intelligence Management |
| 77 | VMware | Mobile, Data Center & Cloud Security |
| 78 | Clearswift | Data Loss Prevention |
| 79 | Novetta | Cyber Security Analytics |
| 80 | Core Security | Predictive Security Intelligence |
| 81 | Leidos | Anti-Terrorism & Homeland Security |
| 82 | Level 3 | Network & Managed Security Services |
| 83 | MobileIron | Mobile Device & App Security |
| 84 | Click Security | Real Time Security Analytics |
| 85 | BRI - Business Risk Intelligence | Risk Intelligence & Cyberthreat Awareness |
| 86 | Accenture | Enterprise Security Strategy |
| 87 | PKWARE | Data Encryption & Security |
| 88 | StrikeForce Technologies | Keystroke Encryption & Mobile Security |
| 89 | ESNC | Security for SAP Applications |
| 90 | SnoopWall | Mobile Device Security |
| 91 | Spam Titan | Email Security Appliances |
| 92 | Bay Dynamics | Informaton Risk Intelligence |
| 93 | Blue Coat | Business Assurance Technology |
| 94 | Arbor Networks | DDoS Attack & Threat Proection |
| 95 | Future Tense Central | Phone & Mobile Device Security |
| 96 | Malwarebytes | Malware Detection & Protection |
| 97 | Fireglass | Enterprise Network Security |
| 98 | NetIQ | Security Management & Intelligence |
| 99 | Tenable Network Security | Vulnerability Scanning |
| 100 | Seculert | Cloud-Based Malware Protection |
| 101 | LIFARS | Digital Forensics & Cybersecurity Intelligence |
| 102 | Bwise | IT Governance, Risk & Compliance |
| 103 | Agiliance | Integrated Risk Management |
| 104 | AhnLab | Internet Security Solutions |
| 105 | Gemalto | Digital Identity Management |
| 106 | CloudLock | Cloud Information Security |
| 107 | Axway | Secure Email & File Sharing |
| 108 | Zscaler | Security-as-a-Service Solutions |
| 109 | Xceedium | Privileged Identity Management |
| 110 | Fidelis Cybersecurity | Cyber Attack Defense |
| 111 | Brinqa | Risk Analytics & Management |
| 112 | SurfRight | Malware Detection & Protection |
| 113 | Alert Logic | Security-as-a-Service Solutions |
| 114 | Avira | Antivirus & IT Security Software |
| 115 | DigiCert | Digital Certificate Provider |
| 116 | Spikes Security | Browser Malware Isolation |
| 117 | Elastica | Cloud Application Security |
| 118 | neXus | PKI, Access & Identity Management |
| 119 | itWatch | Endpoint Security & Data Loss Prevention |
| 120 | Webroot | Security Analysis & Threat Detection |
| 121 | Arxan | Application Security Products |
| 122 | Entrust | Authentication & Identity Assurance |
| 123 | CenterTools Software | Endpoint Security Solutions |
| 124 | NowSecure | Mobile Device & App Security |
| 125 | Resilient Systems | Incident Response Platform |
| 126 | Confer | Threat Prevention & Incident Response |
| 127 | CYREN | Web, Email & Mobile Security |
| 128 | Tapestry Technologies | Cyber Defense Services |
| 129 | Enforcive | Data Security Software |
| 130 | Vaultive | Cloud Data Encryption |
| 131 | VASCO Data Security | Authentication & e-Signature Solutions |
| 132 | Silobreaker | Cyber Analytics & Risk Intelligence |
| 133 | ZixCorp | Email Encryption & Data Protection |
| 134 | Bitdefender | Anti-Virus & Endpoint Security |
| 135 | AccelOps | Network Security Monitoring |
| 136 | Thales | Secure IT Solutions |
| 137 | cryptovision | Cryptography & Electronic Identity |
| 138 | ZeroFOX | Social Risk Management |
| 139 | CyFIR | Digital Forensics & e-Discovery |
| 140 | Bromium | Endpoint Security |
| 141 | Courion | Identity & Access Management |
| 142 | Illumio | Adaptive Security Platform |
| 143 | DomainTools | Cybercrime Investigation & Prevention |
| 144 | WWPass | Authentication & Access Solutions |
| 145 | Wombat Security Technologies | Cybersecurity Education & Training |
| 146 | ePlus Security | Infosecurity Services & Products |
| 147 | Globalscape | Secure File Transfer |
| 148 | Digital Guardian | Data Loss Prevention |
| 149 | wolfSSL | Open Source Internet Security |
| 150 | Varonis | File Collaboration & Data Protection |
| 151 | Haystax | Advanced Threat Analytics |
| 152 | Voltage Security | Data Encryption & Key Management |
| 153 | Venafi | Trust Protection Platform |
| 154 | Viewfinity | Threat Detection & Protection |
| 155 | Vormetric | Data Security Solutions |
| 156 | Unisys | Endpoint & IT Infrastructure Security |
| 157 | Trustwave | Managed Security Services |
| 158 | TechGuard | National Cyber Defense |
| 159 | Bradford Networks | Network Security Automation |
| 160 | Rsam | IT Governance, Risk & Compliance |
| 161 | CloudLink | Cloud Security & Data Encryption |
| 162 | Skyhigh Networks | Cloud Access Security |
| 163 | SynerComm | Network & Security Infrastructure |
| 164 | CA Technologies | Enterprise IT Security |
| 165 | ThreatMetrix | Online & Mobile Fraud Protection |
| 166 | TrustedSec | Information Security Consulting |
| 167 | Shape Security | Website Attack Prevention |
| 168 | SAIC | Cybersecurity Professional Services |
| 169 | V-Key | Mobile App Security |
| 170 | Centrify | Unified Identity Management |
| 171 | Securonix | Security Analytics Technology |
| 172 | Above Security | Managed Security Services Provider |
| 173 | Rohde & Shwarz | Encryption & IT Security |
| 174 | Secunia | Vulernability & Patch Management |
| 175 | Siemens Government Technologies | Cybersecurity for Federal Government |
| 176 | Osirium | Privileged User Management |
| 177 | SECNOLOGY | Log Analysis Software |
| 178 | SecureAuth | Secure Access Control |
| 179 | Adallom | Cloud & SaaS Security |
| 180 | StrongAuth | Enterprise Key Management Infrastructure |
| 181 | TeleSign | Mobile Identity Verification |
| 182 | Sumo Logic | Big Data Security Analytics |
| 183 | Juniper Networks | Threat Intelligence & Network Security |
| 184 | SecureKey | Identity & Authentication Solutions |
| 185 | Hortonworks | Big Data Security Analytics |
| 186 | SilverSky | Security-as-a-Service |
| 187 | SDS | Multi-Platform Encryption |
| 188 | Fortinet | Data Center Security |
| 189 | Syntegrity Networks | Identity Management & Data Security |
| 190 | Syncplicity | Secure File Storage |
| 191 | Easy Solutions | Electronic Fraud Protection |
| 192 | ThreatSim | Proactive Phishing Defense |
| 193 | SENTRIX | Web Application Security |
| 194 | Brainloop | Secure Document Management |
| 195 | Innové | Managed Security Services |
| 196 | TrulyProtect | Software Application Protection |
| 197 | Swivel Secure | Risk Based Authentication |
| 198 | ENCODE | IT Security & Digital Risk Management |
| 199 | TrapX Security | Threat Detection & Prevention |
| 200 | SpectorSoft | Threat Early Warning System |
| 201 | Sonatype | Enterprise Application Security |
| 202 | Skycure | Mobile Device Protection |
| 203 | ERPScan | SAP Security Solutions |
| 204 | Aegify | Security, Risk & Compliance |
| 205 | Antiy Labs | Anti-Virus Engine & Solution |
| 206 | Pwnie Express | Network Security Risk Assessment |
| 207 | Redhawk Network Security | Managed Security & Consulting Services |
| 208 | Centripetal | Cyber Threat Intelligence |
| 209 | Okta | Enterprise Identity Management |
| 210 | Ping Identity | Identity & Access Management Platform |
| 211 | Qosmos | Real-Time Data Security |
| 212 | OPSWAT | IT Infrastructure Security & Management |
| 213 | 21CT | Security Analytics & Visualization |
| 214 | Recorded Future | Real-Time Threat Intelligence |
| 215 | Cigital | Application Security Testing |
| 216 | CipherCloud | Cloud Visibility & Data Protection |
| 217 | Wave Systems | Software for Hardware-Based Security |
| 218 | Outlier Security | Endpoint Threat Detection & Response |
| 219 | Digital Shadows | Cyber Intelligence Feeds |
| 220 | Fluke Networks | Wireless Intrusion Prevention |
| 221 | Modulo | IT Governance, Risk & Compliance |
| 222 | Ridge-Schmidt Cyber | Executive Cyber Solutions |
| 223 | Paraben | Digital Forensics & Data Recovery |
| 224 | MindPoint Group | IT Security Solutions |
| 225 | F-Secure | Internet Security for All Devices |
| 226 | The Chertoff Group | Global Risk Management |
| 227 | Ntrepid | Secure Network & Online Computing |
| 228 | Mycroft | Identity & Access Management |
| 229 | Onapsis | ERP Cybersecurity Solutions |
| 230 | PrivateCore | Malware Detection & Prevention |
| 231 | QuintessenceLabs | Data Security Technology |
| 232 | PrimeKey Solutions | PKI & Digital Signature Solutions |
| 233 | RedSeal | Cybersecurity Analytics |
| 234 | Solutionary / NTT | Managed Security Services Provider |
| 235 | Oberthur Technologies | Digital Security for Mobility |
| 236 | VU Security | Identity Security & Fraud Prevention |
| 237 | Definisec | Endpoint Data Protection |
| 238 | Coverity | Software Testing & Security |
| 239 | GreyCastle Security | Information Security Consulting |
| 240 | EastWind Networks | Breach Detection |
| 241 | Prevalent Networks | Third-Party Risk Management |
| 242 | Avatier | Identity Management |
| 243 | CoSoSys | Data Loss Prevention |
| 244 | NetScout | Situational Awareness & Incident Response |
| 245 | OneLogin | Enterprise Identity Management |
| 246 | Forum Systems | Secure Cloud Gateway |
| 247 | Radiant Logic | Enterprise Identity Management |
| 248 | Reservoir Labs | Real-Time Threat Visibility |
| 249 | Radware | Application Security & Delivery |
| 250 | Smoothwall | Unified Threat Management |
| 251 | MetricStream | IT Governance, Risk & Compliance |
| 252 | Lynx Software Technologies | Real Time Threat Detection |
| 253 | LogRhythm | Log Management & Security Analytics |
| 254 | AlgoSec | Security Policy Management |
| 255 | Google Cloud Security Scanner | |
| 256 | ThreatStream | Cyber Threat Defense |
| 257 | SailPoint | Identity & Access Management |
| 258 | Becrypt | Mobile Device & Data Security |
| 259 | Gigamon | Data Center & Cloud Security |
| 260 | FoxT | Network Security & Assess Management |
| 261 | Praetorian | Cybersecurity Consulting & Services |
| 262 | LANDesk | Enterprise Endpoint Security |
| 263 | Link11 | DDoS Mitigation Solution Provider |
| 264 | Monterey Technology Group | Microsoft Product Security |
| 265 | ManageEngine | Firewall & Log Management |
| 266 | White Ops | Bot Fraud Detection & Prevention |
| 267 | Microsoft | Windows Anti-Virus Protection |
| 268 | LockPath | IT Governance, Risk & Compliance |
| 269 | CACI | Intelligence, Defense & Federal Security |
| 270 | Wetstone Technologies | Cybercrime Investigations & Digital Forensics |
| 271 | Identity Finder | Data Discovery & Protection |
| 272 | HID Global | Secure Identity Technology |
| 273 | Guardian Analytics | Behavioral Analytics for Fraud Prevention |
| 274 | Red Canary | Threat Detection & Response |
| 275 | InfoExpress | Endpoint Security & Management |
| 276 | Keypasco | Multi-Factor Authentication |
| 277 | Kroll | Cybersecurity Services |
| 278 | Imperva | Data & Applications Security |
| 279 | HyTrust | Cloud Security Automation |
| 280 | Infocyte | Intrusion Assessment Platform |
| 281 | General Dynamics | IT Cybersecurity Solutions |
| 282 | MCSI | Enterprise Incident Response |
| 283 | iboss | APT Defense, Web & Mobile Security |
| 284 | IronKey | Hardware Encrypted USB Drives |
| 285 | Klocwork | Source Code Analysis |
| 286 | Lieberman Software | Privileged Identity Management |
| 287 | Lumension Security | Endpoint Management & Security |
| 288 | Malcovery Security | Threat Intelligence & Forensic Analysis |
| 289 | Mimecast | Microsoft Exchange Email Security |
| 290 | MicroStrategy | Mobile Identity Platform |
| 291 | Infoblox | Automated Network Control & Security |
| 292 | Messageware | Microsoft Exchange Security |
| 293 | Hexis | Malware Detection & Protection |
| 294 | Untangle | Network Security Appliance |
| 295 | Futurex | Hardened Enterprise Security Cloud |
| 296 | Glimmerglass | Cyber Terrorism & Fraud Prevention |
| 297 | Marble Security | Mobile Threat Intelligence |
| 298 | GreenSQL | Database Security & Compliance |
| 299 | GuruCul | Security Risk Intelligence |
| 300 | GlobalSign | Authentication & Identity Service Provider |
| 301 | Acuity Risk Management | IT Governance, RIsk & Compliance |
| 302 | Denim Group | Secure Software Development Services |
| 303 | Solarwinds | IT Security Software |
| 304 | Cyber Security Canada | Cybersecurity Services for SMBs |
| 305 | Wontok | Anti-Fraud Technology |
| 306 | Interset | Threat Detection & Prevention |
| 307 | Duo Security | Cloud Based Two-Factor Authentication |
| 308 | Allegro Software | Embedded Device Security |
| 309 | ESET | Multi-Device End Point Security |
| 310 | F5 | Cloud & Data Center Security |
| 311 | Darktrace | Cyber Threat Prevention |
| 312 | Daon | Identity Assurance & Biometrics |
| 313 | Cylance | Cyber Threat Intelligence |
| 314 | Avecto | Endpoint Security Software |
| 315 | FireMon | Network Security Management |
| 316 | Protected Networks | Identity & Access Rights Management |
| 317 | DeviceLock | Endpoint Data Leak Prevention |
| 318 | Entersekt | Authentication & Fraud Protection for Banks |
| 319 | Fasoo | Data & Software Security |
| 320 | eSentire | Threat Detection & Prevention |
| 321 | Eagle Eye Networks | Cloud Video Surveillance |
| 322 | vArmour | Data Center Security |
| 323 | Bitglass | Data Protection & Breach Discovery |
| 324 | Vectra Networks | Cyber-Attack Detection & Management |
| 325 | Druva | Endpoint Data Protection & Governance |
| 326 | Lookout | Mobile Security for Android & iOS Apps |
| 327 | Triumfant | Endpont Security & Malware Detection |
| 328 | GuardiCore | Data Center Security |
| 329 | lastline | Security Breach Detection |
| 330 | Delta ID | Secure Biometric Authentication |
| 331 | Vistronix | Cybersecurity for Federal Agencies |
| 332 | PixAlert | IT Governance, Risk & Compliance |
| 333 | Cyactive | Malware Detection & Protection |
| 334 | Agari | Real-Time Cyberthreat Detection |
| 335 | Zenedge | Web Application Security |
| 336 | Absolute Software | Mobile Device Management & Security |
| 337 | Prelert | Machine Learning Anomaly Detection |
| 338 | Risk I/O | Vulnerability Threat Management |
| 339 | Secure Access Technologies | Mobile Single Sign-On |
| 340 | WhiteHat Security | Web Application Security |
| 341 | Sungard AS | Managed Security Services |
| 342 | Virtual Forge | SAP Application Security |
| 343 | StillSecure | Network Access Control |
| 344 | Secure Decisions | Security Visualization for Cyber Defense |
| 345 | Hillstone Networks | Data Analytics Firewall Protection |
| 346 | Panda Security | Anti-Virus & Internet Security Software |
| 347 | Code42 | Data Management & Protection |
| 348 | N-Stalker | Web Application Security Scanner |
| 349 | GFI | Email & Network Security Solutions |
| 350 | Acunetix | Web Vulnerability Scanner |
| 351 | AirTight | Wireless Intrustion Prevention System |
| 352 | Accellion | Secure Mobile File Sharing |
| 353 | InteliSecure | Network Security Services |
| 354 | PortSwigger | Web Application Security Testing |
| 355 | Sword & Shield | Managed Security Services |
| 356 | EdgeWave | Military Grade Internet Security |
| 357 | Contrast Security | Application Security Software |
| 358 | Wandera | Secure Mobile Gateway |
| 359 | XBridge | Mainframe Data Loss Prevention |
| 360 | DeepNines | Network Security Solutions |
| 361 | Sqrrl | Cyber Defense Analytics |
| 362 | ContentKeeper | Malware Detection & Prevention |
| 363 | WatchGuard | Threat Management Appliances |
| 364 | OnWire | IBM Security Product Integration |
| 365 | AllClear ID | Identity Protection Service |
| 366 | Defense Point Security | Cybersecurity Services for Federal Agencies |
| 367 | AnubisNetworks | Threat Intelligence & Email Security |
| 368 | Good | Secure Mobility Solution |
| 369 | Gigya | Customer Identity Management |
| 370 | BAE Systems | Cybersecurity Risk Management |
| 371 | Patriot | Mobile Device Security Management |
| 372 | KEYW | Cyber Defense & Digital Forensics |
| 373 | ID Experts | Data Breach Response & Forensics |
| 374 | CSC | IT Security Services |
| 375 | RiskSense | Malware Detection & Protection |
| 376 | InfoGard | IT Security Assurance Services |
| 377 | AnchorFree | End-to-End Information Security |
| 378 | WatchDox | Secure Document Management |
| 379 | INSIDE Secure | Smartphone & Mobile Device Security |
| 380 | Eid Passport | High-Assurance Identity Management |
| 381 | SecureLogix | UC Security & Management |
| 382 | CloudPassage | Cloud Infrastructure Security |
| 383 | Tevora | IT Governance, Risk & Compliance |
| 384 | Aspect Security | Application Security Consulting |
| 385 | Quotium | Application Security Testing & Protection |
| 386 | Red Lambda | Big Data Security Analytics |
| 387 | Light Cyber | Active Breach Detection |
| 388 | Privacy Analytics | Healthcare Data Privacy |
| 389 | Promisec | Endpoint Security Intelligence |
| 390 | RSD | Information Governance Solutions |
| 391 | Sypris | Encryption & Biometric Solutions |
| 392 | Saint Corporation | IT Security Risk & Compliance |
| 393 | Exabeam | User Behavior Intelligence |
| 394 | TeraDact | Secure Information Sharing |
| 395 | TRUSTe | Data Privacy Management |
| 396 | Barracuda Networks | Email & Web Security Appliances |
| 397 | WildPackets | Cyber Attack Analysis |
| 398 | DATASHIELD | Data Security Services |
| 399 | Evident.io | Cloud Security Platform |
| 400 | NT OBJECTives | Web Application Security |
| 401 | CrowdStrike | Endpoint Protection & Threat Intelligence |
| 402 | Synack | Crowd Security Intelligence |
| 403 | Endgame | Security Intelligence & Analytics |
| 404 | Clef | Two-Factor Authentication |
| 405 | TargetProof | Identity Verification & Fraud Prevention |
| 406 | Skybox Security | Risk Analytics for Cybersecurity |
| 407 | Waterfall | Cybersecurity for NERC-CIP Compliance |
| 408 | Syferlock | Software-based Authentication |
| 409 | NexDefense | Automation & Control Systems Security |
| 410 | Nok Nok Labs | Unified Authentication Infrastructure |
| 411 | Area 1 Security | Cyber Threat Intelligence |
| 412 | Vkansee | Fingerprint Sensors for Mobile Security |
| 413 | Secure Digital Solutions | Infosecurity Consulting Services |
| 414 | Ionic Security | Data Privacy & Protection |
| 415 | RedOwl | Data Analytics for Risk & Compliance |
| 416 | Ixia | Network Visibility, Security & Testing |
| 417 | Virtru | Secure Email & Digital Privacy |
| 418 | Grid32 Security | Cybersecurity Consulting Services |
| 419 | LaunchKey | Mobile Authentication Platform |
| 420 | 405Labs | Data Loss Prevention |
| 421 | SentinelOne | Endpoint Protection Platform |
| 422 | Dataguise | Big Data Security |
| 423 | VisiTrend | Cybersecurity Analytics |
| 424 | Penango | Email Encryption & Security |
| 425 | Forensic Innovations | Data Discovery & Forensics |
| 426 | pixlcloud | Security Analytics & Visualization |
| 427 | ForeScout | Network Security & Access Control |
| 428 | PacketSled | Threat Detection & Network Forensics |
| 429 | Blueliv | Cyber Threat Analysis |
| 430 | Crypteia Networks | Managed Security Services |
| 431 | Kryptnostic | Encrypted Search SDK |
| 432 | Damballa | Automated Breach Defense |
| 433 | Proteus Security | Information Security Services |
| 434 | Taia Global | Cybersecurity Consulting Services |
| 435 | 6Scan | Website Security & Malware Quarantine |
| 436 | Farsight Security | Actionable Threat Intelligence |
| 437 | Mocana | Mobile & Internet of Things Security |
| 438 | AXON Ghost Sentinel | Internet of Things Security |
| 439 | Avast | Anti-Virus Protection for MACs |
| 440 | Hyperion Gray | Open Source Web Security |
| 441 | Vanguard Integrity Professionals | Cybersecurity Consulting & Training |
| 442 | ForgeRock | Open Source Identity Management |
| 443 | Cienaga Systems | Cyber Threat Management |
| 444 | SecSign | Mobile ID Authentication |
| 445 | Sensato | Healthcare IT Security & Privacy |
| 446 | Veris Group | Cybersecurity Professional Services |
| 447 | CenturyLink | Multi-Layered Network Security |
| 448 | VEEDog | Malware Detection Appliance |
| 449 | Vidder | Cyber Attack Prevention |
| 450 | Security Compass | Software Development Security |
| 451 | ThreatConnect | Cyber Threat Intelligence Platform |
| 452 | PhishLabs | Cybercrime Detection & Prevention |
| 453 | Oxford Biochronometrics | Online Fraud Detection & Prevention |
| 454 | Bugcrowd | Crowd Sourced Security Testing |
| 455 | Security Innovation | Application Risk Management |
| 456 | Defence Intelligence | Real-Time Malware Protection |
| 457 | AlphaGuardian | Cyber Safe Infrastructure |
| 458 | GhostMail | Free Encrypted Email & Chat |
| 459 | Portnox | Network Access Control & Management |
| 460 | Seclytics | Security Analytics & Threat Intelligence |
| 461 | GuidePoint Security | Information Security Services |
| 462 | VSS Monitoring | Network Packet Brokers |
| 463 | Groundworks Technologies | OS & Embedded Devices Security |
| 464 | Auconet | Network Visibility & Security |
| 465 | Risk Based Security | Cyber Risk Analytics |
| 466 | Mobile Active Defense | Mobile Device Protection |
| 467 | Citicus | Risk & Compliance Management |
| 468 | SAS Cybersecurity | Fraud & Security Intelligence |
| 469 | SurfWatch Labs | Cyber Risk Intelligence Analytics |
| 470 | Netskope | Cloud Application Security |
| 471 | Light Point Security | Web Safety & Malware Protection |
| 472 | PUNCH | Cyber Threat Advisory & Consulting |
| 473 | Minereye | Self-Learning Data Protection |
| 474 | Fulcrum Biometrics | Biometric Identification Systems |
| 475 | Selex ES | Cybersecurity & Information Assurance |
| 476 | Harris | Cybersecurity for Federal Agencies |
| 477 | FRSecure | Information Security Services |
| 478 | Paladion | Cybersecurity Testing & Monitoring |
| 479 | Sirrix AG | IT Security Consultants & Cryptographers |
| 480 | Cryptomathic | Cloud, Mobile & Network Security |
| 481 | AlertEnterprise | Physical Identity & Access Management |
| 482 | nwStor | Network & Cloud Data Security |
| 483 | Distil Networks | Malicious Bot Detection & Prevention |
| 484 | Apperion | Mobile App Security |
| 485 | CounterTack | Real Time Attack Intelligence |
| 486 | WinMagic | Full-Disk Encryption Software |
| 487 | Protectimus | Two Factor Authentication |
| 488 | Mega AS | eAuthentication Service for Websites |
| 489 | Celestix | Authentication & Perimeter Security |
| 490 | DBAPPSecurity | Web App & Database Security |
| 491 | Seclore | Secure File Sharing |
| 492 | GrammaTech | Software Code Security |
| 493 | Bluebox Security | Mobile App Security |
| 494 | Deja vu Security | Infosecurity Consulting & Research Services |
| 495 | CloudHASH Security | Enterprise Endpoint Security |
| 496 | Aujas | Information Risk Management Services |
| 497 | Fortscale | Big Data Cyber Analytics |
| 498 | NetFort | Network Security Monitoring |
| 499 | Citrix | Secure Remote Access |
| 500 | Imprivata | Security for Healthcare Providers |




