[Related: Two Aussies make it onto top 500 security list]
More details on each of the companies can be accessed on the Cybersecurity Ventures website.
| vendor | specialty |
| 1. FireEye | advanced threat protection |
| 2. Moka5 | data security for pcs and macs |
| 3. AlienVault | threat detection & response |
| 4. Norse | live attack intelligence |
| 5. Easy Solutions | electronic fraud protection |
| 6. Future Tense Central | phone & mobile device security |
| 7. Lancope | network visibility & security intelligence |
| 8. IBM | enterprise it security solutions |
| 9. Veracode | application security testing |
| 10. CyberArk | cyber threat protection |
| 11. Clearwater Compliance | risk management and compliance |
| 12. AVG Technologies | anti-virus & internet security software |
| 13. Trend Micro | server, cloud, and content security |
| 14. NuData Security | online fraud detection |
| 15. Code Dx | software assurance analytics |
| 16. Sera-Brynn | cyber risk management |
| 17. DFLabs | automated incident & breach response |
| 18. Lockheed Martin | cybersecurity solutions & services |
| 19. Palo Alto Networks | threat detection & prevention |
| 20. Caspida | cyber attack detection & prevention |
| 21. IT Security, Inc. | application, cloud, & network security |
| 22. RSA | intelligence driven security |
| 23. Proofpoint | security-as-a-service |
| 24. Codenomicon | software threat intelligence |
| 25. SecuEra Technologies | identity & access management solutions |
| 26. CertainSafe | secure file sharing |
| 27. Gemalto | digital identity management |
| 28. BT | security & risk management solutions |
| 29. Splunk | big data security |
| 30. Beyond Security | network & software security testing tools |
| 31. Blue Coat | business assurance technology |
| 32. Kaspersky Lab | malware & anti-virus solutions |
| 33. Leidos | anti-terrorism & homeland security |
| 34. Thales | secure it solutions |
| 35. Intel Security | anti-virus, malware & threat protection |
| 36. Absolute Software | mobile device management & security |
| 37. Qualys | cloud security & compliance |
| 38. V-Key | mobile app security |
| 39. Check Point Software | unified threat management |
| 40. AlgoSec | security policy management |
| 41. Templar Shield | cybersecurity & egrc professional services |
| 42. Netskope | cloud application security |
| 43. Bayshore Networks | internet of things security |
| 44. AlertEnterprise | physical identity & access management |
| 45. CipherCloud | cloud visibility & data protection |
| 46. Authentify | mobile & phone based authentication |
| 47. Cisco | threat protection & network security |
| 48. Bitdefender | anti-virus & endpoint security |
| 49. Cybera | security infrastructure protection |
| 50. Centrify | unified identity management |
| 51. Seclore | secure file sharing |
| 52. Verint | security intelligence & compliance |
| 53. Akamai Technologies | secure cloud & mobile computing |
| 54. Coverity | software testing & security |
| 55. CloudLock | cloud information security |
| 56. Bradford Networks | network security automation |
| 57. WatchDox | secure document management |
| 58. Accuvant | information security services |
| 59. Bit9 | endpoint & server security platform |
| 60. Corero | ddos defense & security solutions |
| 61. Red Canary | threat detection & response |
| 62. NTT Communications | managed security services |
| 63. Brainloop | secure document management |
| 64. IKANOW | threat analytics platform |
| 65. CounterTack | real time attack intelligence |
| 66. WinMagic | full-disk encryption software |
| 67. Code42 | data management & protection |
| 68. Checkmarx | software development seecurity |
| 69. Arxan | application security products |
| 70. AT&T Security Solutions | managed security & consulting |
| 71. Infocyte | intrusion assessment platform |
| 72. PivotMail | secure email communications |
| 73. Attachmate | secure file exchange & access control |
| 74. Citigal | application security testing |
| 75. Core Security | predictive security intelligence |
| 76. i-Sprint | identity & access management |
| 77. Covertix | data & file protection |
| 78. Clearswift | data loss prevention |
| 79. Digital Defense | managed security risk assessment |
| 80. Waterfall | cybersecurity for nerc-cip compliance |
| 81. F-Secure | internet security for all devices |
| 82. Cimcor | file integrity & protection |
| 83. Auconet | network visibility & security |
| 84. Click Security | real time security analytics |
| 85. BRI - Business Risk Intelligence GmbH | risk intelligence & cyberthreat awareness |
| 86. Catbird | cloud & network security |
| 87. Aegify | security, risk & compliance |
| 88. StrikeForce Technologies | keystroke encryption & mobile security |
| 89. Celestix | authentication & perimeter security |
| 90. Black Lotus | ddos protecction for data centers |
| 91. CenterTools Software | endpoint security solutions |
| 92. Bay Dynamics | informaton risk intelligence |
| 93. DB Networks | intelligent continuous monitoring |
| 94. Arbor Networks | ddos attack & threat proection |
| 95. Antiy Labs | anti-virus engine & solution |
| 96. Cryptomathic | cloud, mobile & network security |
| 97. AppRiver | cloud based email & web security |
| 98. AirWatch | mobility management & security |
| 99. Adallom | cloud & saas security |
| 100. CloudLink | cloud security & data encryption |
| 101. LIFARS | digital forensics & cybersecurity intelligence |
| 102. Bwise | it governance, risk & compliance |
| 103. Agiliance | integrated risk management |
| 104. AhnLab | internet security solutions |
| 105. 41st Parameter | online fraud intervention |
| 106. Sophos | anti-virus & malware protection |
| 107. Axway | secure email & file sharing |
| 108. Zscaler | security-as-a-service solutions |
| 109. Xceedium | privileged identity management |
| 110. iSIGHT Partners | cyber threat intelligence |
| 111. Brinqa | risk analytics & management |
| 112. SurfRight | malware detection & protection |
| 113. Alert Logic | security-as-a-service solutions |
| 114. Avira | antivirus & it security software |
| 115. DigiCert | digital certificate provider |
| 116. Accellion | secure mobile file sharing |
| 117. Elastica | cloud application security |
| 118. Allegro Software | embedded device security |
| 119. itWatch | endpoint security & data loss prevention |
| 120. Webroot | security analysis & threat detection |
| 121. 21CT | security analytics & visualization |
| 122. Wontok | anti-fraud technology |
| 123. VMware | data center security |
| 124. NowSecure | mobile device & app security |
| 125. Resilient Systems | incident response platform |
| 126. Confer | threat prevention & incident response |
| 127. CYREN | web, email & mobile security |
| 128. Tapestry Technologies | cyber defense services |
| 129. Enforcive | data security software |
| 130. Vaultive | cloud data encryption |
| 131. VASCO Data Security | authentication & e-signature solutions |
| 132. ePlus Security | infosecurity services & products |
| 133. ZixCorp | email encryption & data protection |
| 134. Damballa | automated breach defense |
| 135. AccelOps | network security monitoring |
| 136. Hitachi ID Systems | identity management & access governance |
| 137. cryptovision | cryptography & electronic identity |
| 138. ZeroFOX | social risk management |
| 139. CyFIR | digital forensics & e-discovery |
| 140. Websense | cyber attack & data theft protection |
| 141. Accolade | network appliance security |
| 142. Hillstone Networks | data analytics firewall protection |
| 143. DomainTools | cybercrime investigation & prevention |
| 144. WWPass | authentication & access solutions |
| 145. Wombat Security Technologies | cybersecurity education & training |
| 146. Wave Systems | software for hardware-based security |
| 147. Globalscape | secure file transfer |
| 148. Digital Guardian | enterprise information protection |
| 149. wolfSSL | open source internet security |
| 150. Varonis | file collaboration & data protection |
| 151. Haystax | advanced threat analytics |
| 152. Voltage Security | data encryption & key management |
| 153. Venafi | trust protection platform |
| 154. Viewfinity | threat detection & protection |
| 155. Vormetric | data security solutions |
| 156. Unisys | endpoint & it infrastructure security |
| 157. Trustwave | managed security services |
| 158. TechGuard | national cyber defense |
| 159. Symantec | endpoint, cloud & mobile security |
| 160. Rsam | it governance, risk & compliance |
| 161. Seculert | cloud-based malware protection |
| 162. Skyhigh Networks | cloud access security |
| 163. SynerComm | network & security infrastructure |
| 164. Tenable Network Security | vulnerability scanning |
| 165. ThreatMetrix | online & mobile fraud protection |
| 166. TrustedSec | information security consulting |
| 167. GuidePoint Security | information security services |
| 168. Sypris | encryption & biometric solutions |
| 169. Sungard AS | managed security services |
| 170. Solutionary | managed security services provider |
| 171. Securonix | security analytics technology |
| 172. Above Security | managed security services provider |
| 173. Rohde & Shwarz | encryption & it security |
| 174. Secunia | vulernability & patch management |
| 175. Skybox Security | risk analytics for cybersecurity |
| 176. Brainzsquare | data encryption & protection |
| 177. SECNOLOGY | log analysis software |
| 178. SecureAuth | secure access control |
| 179. Soonr | secure file sharing |
| 180. StrongAuth | enterprise key management infrastructure |
| 181. TeleSign | mobile identity verification |
| 182. Sumo Logic | big data security analytics |
| 183. Thycotic Software | password & access management |
| 184. SnoopWall | mobile device security |
| 185. Razorpoint Security | cybersecurity consulting services |
| 186. SilverSky | security-as-a-service |
| 187. SDS | multi-platform encryption |
| 188. Malwarebytes | malware detection & protection |
| 189. Syntegrity Networks | identity management & data security |
| 190. Syncplicity | secure file storage |
| 191. Threat Stack | cloud security monitoring |
| 192. ThreatSim | proactive phishing defense |
| 193. TIBCO Software | big data security |
| 194. VivoSecurity | automated risk quantification |
| 195. Innové | managed security services |
| 196. TrulyProtect | software application protection |
| 197. Swivel Secure | risk based authentication |
| 198. ENCODE | it security & digital risk management |
| 199. TrapX Security | threat detection & prevention |
| 200. SpectorSoft | threat early warning system |
| 201. Sonatype | enterprise application security |
| 202. Skycure | mobile device protection |
| 203. Sirrix AG | it security consultants & cryptographers |
| 204. Shape Security | website attack prevention |
| 205. RiskIQ | external threat platform |
| 206. Pwnie Express | network security risk assessment |
| 207. PhishMe | cyber-attack detection & prevention |
| 208. Centripetal | cyber threat intelligence |
| 209. Okta | enterprise identity management |
| 210. Ping Identity | identity & access management platform |
| 211. Qosmos | real-time data security |
| 212. OPSWAT | it infrastructure security & management |
| 213. Tripwire | advanced cyberthreat detection |
| 214. Recorded Future | real-time threat intelligence |
| 215. NetIQ | security management & intelligence |
| 216. MobileIron | mobile device & app security |
| 217. Silobreaker | security analytics & risk intelligence |
| 218. Outlier Security | endpoint threat detection & response |
| 219. Perspecsys | cloud applications security |
| 220. Ntrepid | secure network & online computing |
| 221. Modulo | it governance, risk & compliance |
| 222. OpenDNS | enterprise threat protection |
| 223. Paraben | digital forensics & data recovery |
| 224. Pindrop Security | phone-based fraud prevention |
| 225. Rapid7 | security data & analytics solution |
| 226. Raytheon | cyber & homeland security services |
| 227. Portnox | network access control & management |
| 228. Mycroft | identity & access management |
| 229. Onapsis | erp cybersecurity solutions |
| 230. PrivateCore | malware detection & prevention |
| 231. QuintessenceLabs | data security technology |
| 232. PrimeKey Solutions | pki & digital signature solutions |
| 233. Napatech | network management & security |
| 234. Herjavec Group | information security services |
| 235. Oberthur Technologies | digital security for mobility |
| 236. VU Security | identity security & fraud prevention |
| 237. Riscure | security product test labs |
| 238. Northrop Grumman | cyber & homeland security services |
| 239. Protected Networks | identity & access rights management |
| 240. RedSeal | network infrastructure security management |
| 241. Prevalent Networks | third-party risk management |
| 242. Avatier | identity management |
| 243. CoSoSys | data loss prevention |
| 244. NetScout | situational awareness & incident response |
| 245. OneLogin | enterprise identity management |
| 246. Forum Systems | secure cloud gateway |
| 247. Radiant Logic | enterprise identity management |
| 248. Reservoir Labs | real-time threat visibility |
| 249. Radware | application security & delivery |
| 250. Eleven Paths | digital identity & privacy |
| 251. MetricStream | it governance, risk & compliance |
| 252. Lynx Software Technologies | real time threat detection |
| 253. LogRhythm | log management & security analytics |
| 254. Linoma Software | automated & secure file transfer |
| 255. Google | google cloud security scanner |
| 256. ThreatStream | cyber threat defense |
| 257. HP | cybersecurity for public sector & defense |
| 258. Halon Security | email security for hosting providers |
| 259. Gigamon | data center & cloud security |
| 260. FoxT | network security & assess management |
| 261. Juniper Networks | threat intelligence & network security |
| 262. LANDesk | enterprise endpoint security |
| 263. Link11 | ddos mitigation solution provider |
| 264. Monterey Technology Group | microsoft product security |
| 265. ManageEngine | firewall & log management |
| 266. White Ops | bot fraud detection & prevention |
| 267. Microsoft | windows anti-virus protection |
| 268. LockPath | it governance, risk & compliance |
| 269. CACI | intelligence, defense & federal security |
| 270. Wetstone Technologies | cybercrime investigations & digital forensics |
| 271. Identity Finder | data discovery & protection |
| 272. HID Global | secure identity technology |
| 273. Guardian Analytics | behavioral analytics for fraud prevention |
| 274. Fortinet | internal network firewall |
| 275. InfoExpress | endpoint security & management |
| 276. Keypasco | multi-factor authentication |
| 277. Light Cyber | predictive breach detection |
| 278. Imperva | data & applications security |
| 279. HyTrust | cloud security automation |
| 280. ASPG | mainframe encryption software |
| 281. General Dynamics | threat defense solutions |
| 282. MCSI | enterprise incident response |
| 283. iboss | apt defense, web & mobile security |
| 284. IronKey | hardware encrypted usb drives |
| 285. Klocwork | source code analysis |
| 286. Lieberman Software | privileged identity management |
| 287. Lumension Security | endpoint management & security |
| 288. Malcovery Security | threat intelligence & forensic analysis |
| 289. Mimecast | microsoft exchange email security |
| 290. MicroStrategy | mobile identity platform |
| 291. Infoblox | automated network control & security |
| 292. Messageware | microsoft exchange security |
| 293. Hexis | malware detection & protection |
| 294. Untangle | network security appliance |
| 295. Futurex | hardened enterprise security cloud |
| 296. Glimmerglass | cyber terrorism & fraud prevention |
| 297. Marble Security | mobile threat intelligence |
| 298. GreenSQL | database security & compliance |
| 299. GuruCul | security risk intelligence |
| 300. GlobalSign | authentication & identity service provider |
| 301. Acuity Risk Management | it governance, risk & compliance |
| 302. Denim Group | secure software development services |
| 303. Solarwinds | it security software |
| 304. Cyber Security Canada | cybersecurity services for smbs |
| 305. Entrust | authentication & identity assurance |
| 306. Interset | threat detection & prevention |
| 307. Duo Security | cloud based two-factor authentication |
| 308. Collective Software | active directory authentication |
| 309. ESET | multi-device end point security |
| 310. F5 | cloud & data center security |
| 311. Deja vu Security | infosecurity consulting & research services |
| 312. Daon | identity assurance & biometrics |
| 313. ForeScout | network security & access control |
| 314. DBAppSecurity | web application & database security |
| 315. FireMon | network security management |
| 316. GreyCastle Security | information security consulting |
| 317. DeviceLock | endpoint data leak prevention |
| 318. Entersekt | authentication & fraud protection for banks |
| 319. Fasoo | data & software security |
| 320. eSentire | threat detection & prevention |
| 321. Eagle Eye Networks | cloud video surveillance |
| 322. vArmour | data center security |
| 323. Bitglass | data protection & breach discovery |
| 324. Vectra Networks | cyber-attack detection & management |
| 325. Druva | endpoint data protection & governance |
| 326. Lookout | mobile security for android & ios apps |
| 327. Triumfant | endpont security & malware detection |
| 328. GuardiCore | data center security |
| 329. lastline | security breach detection |
| 330. Delta ID | secure biometric authentication |
| 331. Vistronix | cybersecurity for federal agencies |
| 332. SENTRIX | web application security |
| 333. Cyactive | malware detection & protection |
| 334. Agari | real-time cyberthreat detection |
| 335. Zenedge | web application security |
| 336. Krimmeni Technologies | data security systems |
| 337. Prelert | machine learning anomaly detection |
| 338. Risk I/O | vulnerability threat management |
| 339. Secure Access Technologies | mobile single sign-on |
| 340. WhiteHat Security | web application security |
| 341. NT OBJECTives | web application security |
| 342. Virtual Forge | sap application security |
| 343. StillSecure | network access control |
| 344. CA Technologies | enterprise it security |
| 345. L-3 | national security solutions |
| 346. Panda Security | anti-virus & internet security software |
| 347. PKWARE | data encryption & security |
| 348. N-Stalker | web application security scanner |
| 349. GFI | email & network security solutions |
| 350. Acunetix | web vulnerability scanner |
| 351. AirTight | wireless intrustion prevention system |
| 352. Secure Decisions | security visualization for cyber defense |
| 353. InteliSecure | network security services |
| 354. PortSwigger | web application security testing |
| 355. Sword & Shield | managed security services |
| 356. EdgeWave | military grade internet security |
| 357. Contrast Security | application security software |
| 358. Wandera | secure mobile gateway |
| 359. Dell SecureWorks | managed security services |
| 360. DeepNines | network security solutions |
| 361. MindPoint Group | it security solutions |
| 362. ContentKeeper | malware detection & prevention |
| 363. WatchGuard | threat management appliances |
| 364. OnWire | ibm security product integration |
| 365. AllClear ID | identity protection service |
| 366. Defense Point Security | cybersecurity services for federal agencies |
| 367. AnubisNetworks | threat intelligence & email security |
| 368. Good | secure mobility solution |
| 369. Gigya | customer identity management |
| 370. BAE Systems | cybersecurity risk management |
| 371. Patriot | mobile device security management |
| 372. KEYW | cyber defense & digital forensics |
| 373. ID Experts | data breach response & forensics |
| 374. CSC | it security services |
| 375. CAaNES | malware detection & protection |
| 376. InfoGard | it security assurance services |
| 377. AnchorFree | end-to-end information security |
| 378. Booz Allen | cybersecurity solutions & services |
| 379. INSIDE Secure | smartphone & mobile device security |
| 380. Eid Passport | high-assurance identity management |
| 381. SecureLogix | uc security & management |
| 382. CloudPassage | cloud infrastructure security |
| 383. Tevora | it governance, risk & compliance |
| 384. Aspect Security | application security consulting |
| 385. Quotium | application security testing & protection |
| 386. Red Lambda | big data security analytics |
| 387. Kroll | cybersecurity services |
| 388. Privacy Analytics | healthcare data privacy |
| 389. Promisec | endpoint security intelligence |
| 390. RSD | information governance solutions |
| 391. SAIC | cybersecurity professional services |
| 392. Saint Corporation | it security risk & compliance |
| 393. Spam Titan | email security appliances |
| 394. TeraDact | secure information sharing |
| 395. TRUSTe | data privacy management |
| 396. VigiTrust | security advsiory & compliance services |
| 397. WildPackets | cyber attack analysis |
| 398. DATASHIELD | data security services |
| 399. Evident.io | cloud security platform |
| 400. Secure Commerce Systems | it security products & services |
| 401. CrowdStrike | endpoint protection & threat intelligence |
| 402. Oceana Technologies | personal web identity monitor |
| 403. Endgame | security intelligence & analytics |
| 404. Clef | two-factor authentication |
| 405. ThreatConnect | cyber threat intelligence platform |
| 406. Siemens Government Technologies | cybersecurity for federal government |
| 407. Singular Security | it security & compliance risk management |
| 408. Syferlock | software-based authentication |
| 409. NexDefense | automation & control systems security |
| 410. Nok Nok Labs | unified authentication infrastructure |
| 411. Area 1 Security | cyber threat intelligence |
| 412. Vkansee | fingerprint sensors for mobile security |
| 413. Secure Digital Solutions | infosecurity consulting services |
| 414. Ionic Security | data privacy & protection |
| 415. RedOwl | data analytics for risk & compliance |
| 416. Ixia | network visibility, security & testing |
| 417. Virtru | secure email & digital privacy |
| 418. Socure | online identity verification |
| 419. LaunchKey | mobile authentication platform |
| 420. 405Labs | data loss prevention |
| 421. SentinelOne | endpoint protection platform |
| 422. Digital Shadows | cyber intelligence feeds |
| 423. VisiTrend | cybersecurity analytics |
| 424. Penango | email encryption & security |
| 425. Forensic Innovations | data discovery & forensics |
| 426. pixlcloud | security analytics & visualization |
| 427. Cylance | cyber threat intelligence |
| 428. PacketSled | threat detection & network forensics |
| 429. Blueliv | cyber threat analysis |
| 430. Crypteia Networks | managed security services |
| 431. Kryptnostic | encrypted search sdk |
| 432. Cryptzone | file & data encryption platform |
| 433. Proteus Security | information security services |
| 434. Taia Global | cybersecurity consulting services |
| 435. 6Scan | website security & malware quarantine |
| 436. Farsight Security | actionable threat intelligence |
| 437. Mocana | mobile & internet of things security |
| 438. AXON Ghost Sentinel | internet of things security |
| 439. Avast | anti-virus protection for macs |
| 440. Hyperion Gray | open source web security |
| 441. Narus | big data security analytics |
| 442. ForgeRock | open source identity management |
| 443. Cienaga Systems | cyber threat management |
| 444. NetNinja | wifi hot spot encryption |
| 445. Sensato | healthcare it security & privacy |
| 446. Veris Group | cybersecurity professional services |
| 447. CenturyLink | multi-layered network security |
| 448. VEEDog | malware detection appliance |
| 449. Kernel | it security services |
| 450. Security Compass | software development security |
| 451. TargetProof | identity verification & fraud prevention |
| 452. PhishLabs | cybercrime detection & prevention |
| 453. Oxford Biochronometrics | online fraud detection & prevention |
| 454. Sqrrl | cyber defense analytics |
| 455. Cyber Defense Labs | cybersecurity & forensics services |
| 456. Defence Intelligence | real-time malware protection |
| 457. AlphaGuardian | cyber safe infrastructure |
| 458. GhostMail | free encrypted email & chat |
| 459. Berkeley Varitronics Systems | wireless threat detection |
| 460. Seclytics | security analytics & threat intelligence |
| 461. Novell | endpoint security management |
| 462. VSS Monitoring | network packet brokers |
| 463. Groundworks Technologies | os & embedded devices security |
| 464. DefiniSec | intellectual property protection |
| 465. Risk Based Security | cyber risk analytics |
| 466. Mobile Active Defense | mobile device protection |
| 467. Citicus | risk & compliance management |
| 468. Banff Cyber | website defacement monitoring |
| 469. SurfWatch Labs | cyber risk intelligence analytics |
| 470. Allgress | it governance, risk & compliance |
| 471. Light Point Security | web safety & malware protection |
| 472. PUNCH | cyber threat advisory & consulting |
| 473. Minereye | self-learning data protection |
| 474. Fulcrum Biometrics | biometric identification systems |
| 475. Selex ES | cybersecurity & information assurance |
| 476. Harris | cybersecurity for federal agencies |
| 477. FRSecure | information security services |
| 478. Paladion | cybersecurity testing & monitoring |
| 479. OpenPeak | white label mobile security |
| 480. Silent Circle | enterprise privacy platform |
| 481. Ziften | endpoint threat detection |
| 482. nwStor | network & cloud data security |
| 483. Distil Networks | malicious bot detection & prevention |
| 484. Apperion | mobile app security |
| 485. Imprivata | security for healthcare providers |
| 486. PivotPoint Security | information security consultants |
| 487. Protectimus | two factor authentication |
| 488. Mega AS | eauthentication service for websites |
| 489. Barracuda Networks | email & web security appliances |
| 490. Autonomic Software | endpoint security management |
| 491. Tanium | security & systems management |
| 492. Avecto | endpoint security software |
| 493. Boldon James | secure messaging solutions |
| 494. Grid 32 Security | cybersecurity consulting services |
| 495. CloudHASH Security | enterprise endpoint security |
| 496. Nuix | analytics for digital investigations |
| 497. Fortscale | big data cyber analytics |
| 498. Blackfin | security simulation & training |
| 499. Citrix | secure remote access |
| 500. Secure Mentem | security awareness services |




