[Related: Two Aussies make it onto top 500 security list]
More details on each of the companies can be accessed on the Cybersecurity Ventures website.
vendor | specialty |
1. FireEye | advanced threat protection |
2. Moka5 | data security for pcs and macs |
3. AlienVault | threat detection & response |
4. Norse | live attack intelligence |
5. Easy Solutions | electronic fraud protection |
6. Future Tense Central | phone & mobile device security |
7. Lancope | network visibility & security intelligence |
8. IBM | enterprise it security solutions |
9. Veracode | application security testing |
10. CyberArk | cyber threat protection |
11. Clearwater Compliance | risk management and compliance |
12. AVG Technologies | anti-virus & internet security software |
13. Trend Micro | server, cloud, and content security |
14. NuData Security | online fraud detection |
15. Code Dx | software assurance analytics |
16. Sera-Brynn | cyber risk management |
17. DFLabs | automated incident & breach response |
18. Lockheed Martin | cybersecurity solutions & services |
19. Palo Alto Networks | threat detection & prevention |
20. Caspida | cyber attack detection & prevention |
21. IT Security, Inc. | application, cloud, & network security |
22. RSA | intelligence driven security |
23. Proofpoint | security-as-a-service |
24. Codenomicon | software threat intelligence |
25. SecuEra Technologies | identity & access management solutions |
26. CertainSafe | secure file sharing |
27. Gemalto | digital identity management |
28. BT | security & risk management solutions |
29. Splunk | big data security |
30. Beyond Security | network & software security testing tools |
31. Blue Coat | business assurance technology |
32. Kaspersky Lab | malware & anti-virus solutions |
33. Leidos | anti-terrorism & homeland security |
34. Thales | secure it solutions |
35. Intel Security | anti-virus, malware & threat protection |
36. Absolute Software | mobile device management & security |
37. Qualys | cloud security & compliance |
38. V-Key | mobile app security |
39. Check Point Software | unified threat management |
40. AlgoSec | security policy management |
41. Templar Shield | cybersecurity & egrc professional services |
42. Netskope | cloud application security |
43. Bayshore Networks | internet of things security |
44. AlertEnterprise | physical identity & access management |
45. CipherCloud | cloud visibility & data protection |
46. Authentify | mobile & phone based authentication |
47. Cisco | threat protection & network security |
48. Bitdefender | anti-virus & endpoint security |
49. Cybera | security infrastructure protection |
50. Centrify | unified identity management |
51. Seclore | secure file sharing |
52. Verint | security intelligence & compliance |
53. Akamai Technologies | secure cloud & mobile computing |
54. Coverity | software testing & security |
55. CloudLock | cloud information security |
56. Bradford Networks | network security automation |
57. WatchDox | secure document management |
58. Accuvant | information security services |
59. Bit9 | endpoint & server security platform |
60. Corero | ddos defense & security solutions |
61. Red Canary | threat detection & response |
62. NTT Communications | managed security services |
63. Brainloop | secure document management |
64. IKANOW | threat analytics platform |
65. CounterTack | real time attack intelligence |
66. WinMagic | full-disk encryption software |
67. Code42 | data management & protection |
68. Checkmarx | software development seecurity |
69. Arxan | application security products |
70. AT&T Security Solutions | managed security & consulting |
71. Infocyte | intrusion assessment platform |
72. PivotMail | secure email communications |
73. Attachmate | secure file exchange & access control |
74. Citigal | application security testing |
75. Core Security | predictive security intelligence |
76. i-Sprint | identity & access management |
77. Covertix | data & file protection |
78. Clearswift | data loss prevention |
79. Digital Defense | managed security risk assessment |
80. Waterfall | cybersecurity for nerc-cip compliance |
81. F-Secure | internet security for all devices |
82. Cimcor | file integrity & protection |
83. Auconet | network visibility & security |
84. Click Security | real time security analytics |
85. BRI - Business Risk Intelligence GmbH | risk intelligence & cyberthreat awareness |
86. Catbird | cloud & network security |
87. Aegify | security, risk & compliance |
88. StrikeForce Technologies | keystroke encryption & mobile security |
89. Celestix | authentication & perimeter security |
90. Black Lotus | ddos protecction for data centers |
91. CenterTools Software | endpoint security solutions |
92. Bay Dynamics | informaton risk intelligence |
93. DB Networks | intelligent continuous monitoring |
94. Arbor Networks | ddos attack & threat proection |
95. Antiy Labs | anti-virus engine & solution |
96. Cryptomathic | cloud, mobile & network security |
97. AppRiver | cloud based email & web security |
98. AirWatch | mobility management & security |
99. Adallom | cloud & saas security |
100. CloudLink | cloud security & data encryption |
101. LIFARS | digital forensics & cybersecurity intelligence |
102. Bwise | it governance, risk & compliance |
103. Agiliance | integrated risk management |
104. AhnLab | internet security solutions |
105. 41st Parameter | online fraud intervention |
106. Sophos | anti-virus & malware protection |
107. Axway | secure email & file sharing |
108. Zscaler | security-as-a-service solutions |
109. Xceedium | privileged identity management |
110. iSIGHT Partners | cyber threat intelligence |
111. Brinqa | risk analytics & management |
112. SurfRight | malware detection & protection |
113. Alert Logic | security-as-a-service solutions |
114. Avira | antivirus & it security software |
115. DigiCert | digital certificate provider |
116. Accellion | secure mobile file sharing |
117. Elastica | cloud application security |
118. Allegro Software | embedded device security |
119. itWatch | endpoint security & data loss prevention |
120. Webroot | security analysis & threat detection |
121. 21CT | security analytics & visualization |
122. Wontok | anti-fraud technology |
123. VMware | data center security |
124. NowSecure | mobile device & app security |
125. Resilient Systems | incident response platform |
126. Confer | threat prevention & incident response |
127. CYREN | web, email & mobile security |
128. Tapestry Technologies | cyber defense services |
129. Enforcive | data security software |
130. Vaultive | cloud data encryption |
131. VASCO Data Security | authentication & e-signature solutions |
132. ePlus Security | infosecurity services & products |
133. ZixCorp | email encryption & data protection |
134. Damballa | automated breach defense |
135. AccelOps | network security monitoring |
136. Hitachi ID Systems | identity management & access governance |
137. cryptovision | cryptography & electronic identity |
138. ZeroFOX | social risk management |
139. CyFIR | digital forensics & e-discovery |
140. Websense | cyber attack & data theft protection |
141. Accolade | network appliance security |
142. Hillstone Networks | data analytics firewall protection |
143. DomainTools | cybercrime investigation & prevention |
144. WWPass | authentication & access solutions |
145. Wombat Security Technologies | cybersecurity education & training |
146. Wave Systems | software for hardware-based security |
147. Globalscape | secure file transfer |
148. Digital Guardian | enterprise information protection |
149. wolfSSL | open source internet security |
150. Varonis | file collaboration & data protection |
151. Haystax | advanced threat analytics |
152. Voltage Security | data encryption & key management |
153. Venafi | trust protection platform |
154. Viewfinity | threat detection & protection |
155. Vormetric | data security solutions |
156. Unisys | endpoint & it infrastructure security |
157. Trustwave | managed security services |
158. TechGuard | national cyber defense |
159. Symantec | endpoint, cloud & mobile security |
160. Rsam | it governance, risk & compliance |
161. Seculert | cloud-based malware protection |
162. Skyhigh Networks | cloud access security |
163. SynerComm | network & security infrastructure |
164. Tenable Network Security | vulnerability scanning |
165. ThreatMetrix | online & mobile fraud protection |
166. TrustedSec | information security consulting |
167. GuidePoint Security | information security services |
168. Sypris | encryption & biometric solutions |
169. Sungard AS | managed security services |
170. Solutionary | managed security services provider |
171. Securonix | security analytics technology |
172. Above Security | managed security services provider |
173. Rohde & Shwarz | encryption & it security |
174. Secunia | vulernability & patch management |
175. Skybox Security | risk analytics for cybersecurity |
176. Brainzsquare | data encryption & protection |
177. SECNOLOGY | log analysis software |
178. SecureAuth | secure access control |
179. Soonr | secure file sharing |
180. StrongAuth | enterprise key management infrastructure |
181. TeleSign | mobile identity verification |
182. Sumo Logic | big data security analytics |
183. Thycotic Software | password & access management |
184. SnoopWall | mobile device security |
185. Razorpoint Security | cybersecurity consulting services |
186. SilverSky | security-as-a-service |
187. SDS | multi-platform encryption |
188. Malwarebytes | malware detection & protection |
189. Syntegrity Networks | identity management & data security |
190. Syncplicity | secure file storage |
191. Threat Stack | cloud security monitoring |
192. ThreatSim | proactive phishing defense |
193. TIBCO Software | big data security |
194. VivoSecurity | automated risk quantification |
195. Innové | managed security services |
196. TrulyProtect | software application protection |
197. Swivel Secure | risk based authentication |
198. ENCODE | it security & digital risk management |
199. TrapX Security | threat detection & prevention |
200. SpectorSoft | threat early warning system |
201. Sonatype | enterprise application security |
202. Skycure | mobile device protection |
203. Sirrix AG | it security consultants & cryptographers |
204. Shape Security | website attack prevention |
205. RiskIQ | external threat platform |
206. Pwnie Express | network security risk assessment |
207. PhishMe | cyber-attack detection & prevention |
208. Centripetal | cyber threat intelligence |
209. Okta | enterprise identity management |
210. Ping Identity | identity & access management platform |
211. Qosmos | real-time data security |
212. OPSWAT | it infrastructure security & management |
213. Tripwire | advanced cyberthreat detection |
214. Recorded Future | real-time threat intelligence |
215. NetIQ | security management & intelligence |
216. MobileIron | mobile device & app security |
217. Silobreaker | security analytics & risk intelligence |
218. Outlier Security | endpoint threat detection & response |
219. Perspecsys | cloud applications security |
220. Ntrepid | secure network & online computing |
221. Modulo | it governance, risk & compliance |
222. OpenDNS | enterprise threat protection |
223. Paraben | digital forensics & data recovery |
224. Pindrop Security | phone-based fraud prevention |
225. Rapid7 | security data & analytics solution |
226. Raytheon | cyber & homeland security services |
227. Portnox | network access control & management |
228. Mycroft | identity & access management |
229. Onapsis | erp cybersecurity solutions |
230. PrivateCore | malware detection & prevention |
231. QuintessenceLabs | data security technology |
232. PrimeKey Solutions | pki & digital signature solutions |
233. Napatech | network management & security |
234. Herjavec Group | information security services |
235. Oberthur Technologies | digital security for mobility |
236. VU Security | identity security & fraud prevention |
237. Riscure | security product test labs |
238. Northrop Grumman | cyber & homeland security services |
239. Protected Networks | identity & access rights management |
240. RedSeal | network infrastructure security management |
241. Prevalent Networks | third-party risk management |
242. Avatier | identity management |
243. CoSoSys | data loss prevention |
244. NetScout | situational awareness & incident response |
245. OneLogin | enterprise identity management |
246. Forum Systems | secure cloud gateway |
247. Radiant Logic | enterprise identity management |
248. Reservoir Labs | real-time threat visibility |
249. Radware | application security & delivery |
250. Eleven Paths | digital identity & privacy |
251. MetricStream | it governance, risk & compliance |
252. Lynx Software Technologies | real time threat detection |
253. LogRhythm | log management & security analytics |
254. Linoma Software | automated & secure file transfer |
255. Google | google cloud security scanner |
256. ThreatStream | cyber threat defense |
257. HP | cybersecurity for public sector & defense |
258. Halon Security | email security for hosting providers |
259. Gigamon | data center & cloud security |
260. FoxT | network security & assess management |
261. Juniper Networks | threat intelligence & network security |
262. LANDesk | enterprise endpoint security |
263. Link11 | ddos mitigation solution provider |
264. Monterey Technology Group | microsoft product security |
265. ManageEngine | firewall & log management |
266. White Ops | bot fraud detection & prevention |
267. Microsoft | windows anti-virus protection |
268. LockPath | it governance, risk & compliance |
269. CACI | intelligence, defense & federal security |
270. Wetstone Technologies | cybercrime investigations & digital forensics |
271. Identity Finder | data discovery & protection |
272. HID Global | secure identity technology |
273. Guardian Analytics | behavioral analytics for fraud prevention |
274. Fortinet | internal network firewall |
275. InfoExpress | endpoint security & management |
276. Keypasco | multi-factor authentication |
277. Light Cyber | predictive breach detection |
278. Imperva | data & applications security |
279. HyTrust | cloud security automation |
280. ASPG | mainframe encryption software |
281. General Dynamics | threat defense solutions |
282. MCSI | enterprise incident response |
283. iboss | apt defense, web & mobile security |
284. IronKey | hardware encrypted usb drives |
285. Klocwork | source code analysis |
286. Lieberman Software | privileged identity management |
287. Lumension Security | endpoint management & security |
288. Malcovery Security | threat intelligence & forensic analysis |
289. Mimecast | microsoft exchange email security |
290. MicroStrategy | mobile identity platform |
291. Infoblox | automated network control & security |
292. Messageware | microsoft exchange security |
293. Hexis | malware detection & protection |
294. Untangle | network security appliance |
295. Futurex | hardened enterprise security cloud |
296. Glimmerglass | cyber terrorism & fraud prevention |
297. Marble Security | mobile threat intelligence |
298. GreenSQL | database security & compliance |
299. GuruCul | security risk intelligence |
300. GlobalSign | authentication & identity service provider |
301. Acuity Risk Management | it governance, risk & compliance |
302. Denim Group | secure software development services |
303. Solarwinds | it security software |
304. Cyber Security Canada | cybersecurity services for smbs |
305. Entrust | authentication & identity assurance |
306. Interset | threat detection & prevention |
307. Duo Security | cloud based two-factor authentication |
308. Collective Software | active directory authentication |
309. ESET | multi-device end point security |
310. F5 | cloud & data center security |
311. Deja vu Security | infosecurity consulting & research services |
312. Daon | identity assurance & biometrics |
313. ForeScout | network security & access control |
314. DBAppSecurity | web application & database security |
315. FireMon | network security management |
316. GreyCastle Security | information security consulting |
317. DeviceLock | endpoint data leak prevention |
318. Entersekt | authentication & fraud protection for banks |
319. Fasoo | data & software security |
320. eSentire | threat detection & prevention |
321. Eagle Eye Networks | cloud video surveillance |
322. vArmour | data center security |
323. Bitglass | data protection & breach discovery |
324. Vectra Networks | cyber-attack detection & management |
325. Druva | endpoint data protection & governance |
326. Lookout | mobile security for android & ios apps |
327. Triumfant | endpont security & malware detection |
328. GuardiCore | data center security |
329. lastline | security breach detection |
330. Delta ID | secure biometric authentication |
331. Vistronix | cybersecurity for federal agencies |
332. SENTRIX | web application security |
333. Cyactive | malware detection & protection |
334. Agari | real-time cyberthreat detection |
335. Zenedge | web application security |
336. Krimmeni Technologies | data security systems |
337. Prelert | machine learning anomaly detection |
338. Risk I/O | vulnerability threat management |
339. Secure Access Technologies | mobile single sign-on |
340. WhiteHat Security | web application security |
341. NT OBJECTives | web application security |
342. Virtual Forge | sap application security |
343. StillSecure | network access control |
344. CA Technologies | enterprise it security |
345. L-3 | national security solutions |
346. Panda Security | anti-virus & internet security software |
347. PKWARE | data encryption & security |
348. N-Stalker | web application security scanner |
349. GFI | email & network security solutions |
350. Acunetix | web vulnerability scanner |
351. AirTight | wireless intrustion prevention system |
352. Secure Decisions | security visualization for cyber defense |
353. InteliSecure | network security services |
354. PortSwigger | web application security testing |
355. Sword & Shield | managed security services |
356. EdgeWave | military grade internet security |
357. Contrast Security | application security software |
358. Wandera | secure mobile gateway |
359. Dell SecureWorks | managed security services |
360. DeepNines | network security solutions |
361. MindPoint Group | it security solutions |
362. ContentKeeper | malware detection & prevention |
363. WatchGuard | threat management appliances |
364. OnWire | ibm security product integration |
365. AllClear ID | identity protection service |
366. Defense Point Security | cybersecurity services for federal agencies |
367. AnubisNetworks | threat intelligence & email security |
368. Good | secure mobility solution |
369. Gigya | customer identity management |
370. BAE Systems | cybersecurity risk management |
371. Patriot | mobile device security management |
372. KEYW | cyber defense & digital forensics |
373. ID Experts | data breach response & forensics |
374. CSC | it security services |
375. CAaNES | malware detection & protection |
376. InfoGard | it security assurance services |
377. AnchorFree | end-to-end information security |
378. Booz Allen | cybersecurity solutions & services |
379. INSIDE Secure | smartphone & mobile device security |
380. Eid Passport | high-assurance identity management |
381. SecureLogix | uc security & management |
382. CloudPassage | cloud infrastructure security |
383. Tevora | it governance, risk & compliance |
384. Aspect Security | application security consulting |
385. Quotium | application security testing & protection |
386. Red Lambda | big data security analytics |
387. Kroll | cybersecurity services |
388. Privacy Analytics | healthcare data privacy |
389. Promisec | endpoint security intelligence |
390. RSD | information governance solutions |
391. SAIC | cybersecurity professional services |
392. Saint Corporation | it security risk & compliance |
393. Spam Titan | email security appliances |
394. TeraDact | secure information sharing |
395. TRUSTe | data privacy management |
396. VigiTrust | security advsiory & compliance services |
397. WildPackets | cyber attack analysis |
398. DATASHIELD | data security services |
399. Evident.io | cloud security platform |
400. Secure Commerce Systems | it security products & services |
401. CrowdStrike | endpoint protection & threat intelligence |
402. Oceana Technologies | personal web identity monitor |
403. Endgame | security intelligence & analytics |
404. Clef | two-factor authentication |
405. ThreatConnect | cyber threat intelligence platform |
406. Siemens Government Technologies | cybersecurity for federal government |
407. Singular Security | it security & compliance risk management |
408. Syferlock | software-based authentication |
409. NexDefense | automation & control systems security |
410. Nok Nok Labs | unified authentication infrastructure |
411. Area 1 Security | cyber threat intelligence |
412. Vkansee | fingerprint sensors for mobile security |
413. Secure Digital Solutions | infosecurity consulting services |
414. Ionic Security | data privacy & protection |
415. RedOwl | data analytics for risk & compliance |
416. Ixia | network visibility, security & testing |
417. Virtru | secure email & digital privacy |
418. Socure | online identity verification |
419. LaunchKey | mobile authentication platform |
420. 405Labs | data loss prevention |
421. SentinelOne | endpoint protection platform |
422. Digital Shadows | cyber intelligence feeds |
423. VisiTrend | cybersecurity analytics |
424. Penango | email encryption & security |
425. Forensic Innovations | data discovery & forensics |
426. pixlcloud | security analytics & visualization |
427. Cylance | cyber threat intelligence |
428. PacketSled | threat detection & network forensics |
429. Blueliv | cyber threat analysis |
430. Crypteia Networks | managed security services |
431. Kryptnostic | encrypted search sdk |
432. Cryptzone | file & data encryption platform |
433. Proteus Security | information security services |
434. Taia Global | cybersecurity consulting services |
435. 6Scan | website security & malware quarantine |
436. Farsight Security | actionable threat intelligence |
437. Mocana | mobile & internet of things security |
438. AXON Ghost Sentinel | internet of things security |
439. Avast | anti-virus protection for macs |
440. Hyperion Gray | open source web security |
441. Narus | big data security analytics |
442. ForgeRock | open source identity management |
443. Cienaga Systems | cyber threat management |
444. NetNinja | wifi hot spot encryption |
445. Sensato | healthcare it security & privacy |
446. Veris Group | cybersecurity professional services |
447. CenturyLink | multi-layered network security |
448. VEEDog | malware detection appliance |
449. Kernel | it security services |
450. Security Compass | software development security |
451. TargetProof | identity verification & fraud prevention |
452. PhishLabs | cybercrime detection & prevention |
453. Oxford Biochronometrics | online fraud detection & prevention |
454. Sqrrl | cyber defense analytics |
455. Cyber Defense Labs | cybersecurity & forensics services |
456. Defence Intelligence | real-time malware protection |
457. AlphaGuardian | cyber safe infrastructure |
458. GhostMail | free encrypted email & chat |
459. Berkeley Varitronics Systems | wireless threat detection |
460. Seclytics | security analytics & threat intelligence |
461. Novell | endpoint security management |
462. VSS Monitoring | network packet brokers |
463. Groundworks Technologies | os & embedded devices security |
464. DefiniSec | intellectual property protection |
465. Risk Based Security | cyber risk analytics |
466. Mobile Active Defense | mobile device protection |
467. Citicus | risk & compliance management |
468. Banff Cyber | website defacement monitoring |
469. SurfWatch Labs | cyber risk intelligence analytics |
470. Allgress | it governance, risk & compliance |
471. Light Point Security | web safety & malware protection |
472. PUNCH | cyber threat advisory & consulting |
473. Minereye | self-learning data protection |
474. Fulcrum Biometrics | biometric identification systems |
475. Selex ES | cybersecurity & information assurance |
476. Harris | cybersecurity for federal agencies |
477. FRSecure | information security services |
478. Paladion | cybersecurity testing & monitoring |
479. OpenPeak | white label mobile security |
480. Silent Circle | enterprise privacy platform |
481. Ziften | endpoint threat detection |
482. nwStor | network & cloud data security |
483. Distil Networks | malicious bot detection & prevention |
484. Apperion | mobile app security |
485. Imprivata | security for healthcare providers |
486. PivotPoint Security | information security consultants |
487. Protectimus | two factor authentication |
488. Mega AS | eauthentication service for websites |
489. Barracuda Networks | email & web security appliances |
490. Autonomic Software | endpoint security management |
491. Tanium | security & systems management |
492. Avecto | endpoint security software |
493. Boldon James | secure messaging solutions |
494. Grid 32 Security | cybersecurity consulting services |
495. CloudHASH Security | enterprise endpoint security |
496. Nuix | analytics for digital investigations |
497. Fortscale | big data cyber analytics |
498. Blackfin | security simulation & training |
499. Citrix | secure remote access |
500. Secure Mentem | security awareness services |