Cyber Risk Analysis Vendors – Full list

CyberDB - Cyber Risk Analysis Vendors - Full list

The following is the full list of Cyber Risk Analysis Vendors. Vendors in this domain cover one or more of the following Cyber Security capabilities: Operations and Risk analytics, SOC and SIEM analytics and Threat hunting.

This Cyber Risk Analysis vendors list is managed and maintained by CyberDB, including additional information on their Cyber Security and Cyber quantification products.
Please contact CyberDB for any further clarifications.

Sword-GRChttps://sword-grc.com/
Cythereal Inc.http://www.cythereal.com
Open Systemshttp://www.open-systems.com/
Two Six Technologieshttps://twosixtech.com/
Cado Securityhttps://www.cadosecurity.com
Cyborg Securityhttps://www.cyborgsecurity.com/
Kognoshttps://www.kognos.io
GreyNoise Intelligencehttps://greynoise.io
Dark Cubedhttps://www.darkcubed.com
Anvilogichttps://anvilogic.com
SOC.OShttps://www.socos.io/
Cyware Labshttps://cyware.com/
Oporahttps://www.opora.io/
Huntresshttps://huntress.com
Knoginhttps://knogin.cr/
ReliaQuesthttps://www.reliaquest.com/
CyCrafthttps://www.cycraft.com/
CYBERNETIQhttps://cybernetiq.io/
MistNet.aihttps://www.mistnet.ai
Hunters.AIhttps://www.hunters.ai
Respond Softwarehttps://respond-software.com/
Stellar Cyber.https://www.stellarcyber.ai
Senseonhttps://www.senseon.io
Arctic Wolf Networkshttp://arcticwolf.com
LogicHubwww.logichub.com
Pcysyswww.pcysys.com
DarkOwlhttps://www.darkowl.com/
itWatchwww.itwatch.de
genuahttps://www.genua.de/
Clouderawww.cloudera.com
Telos Corporationtelos.com
tapestry technologies, Inc.tapestrytech.com
Silverskinsilverskin.com
Sera-Brynnsera-brynn.com
SecureStruxsecurestrux.com
SAICsaic.com
Risk Based Securityriskbasedsecurity.com
Mosaic451mosaic451.com
Vanguard Integrity Professionalsgo2vanguard.com
HanSighthttp://www.hansight.com/
Secure Digital Solutionshttps://trustsds.com/
Software Diversified Services (SDS)sdsusa.com
Assured Enterprisesassured.enterprises
DarkLight (Champion Technology Company, Inc.)https://www.darklightcyber.com/
Sotera Defense Solutionshttp://www.soteradefense.com/
Seric Systemshttp://www.seric.co.uk/
SecureBrainhttp://www.securebrain.co.jp/eng/web/index.php
Secura Grouphttp://www.securagroup.com.sg/
Seclyticshttps://www.seclytics.com/
Roforihttp://www.rofori.com/
PerCredohttp://www.percredo.com/
NXOhttps://www.nxo.eu/
Black Kitehttps://blackkitetech.com/
Intrusion (INTZ)http://www.intrusion.com/
Intensity Analyticshttp://intensityanalytics.com/
Haystax Technologyhttps://haystax.com/
Cybernancehttp://www.cybernance.com/
Corax Cyber Securityhttps://www.coraxcyber.co/
TripleCyber Ltd.http://www.triplecyber.co.il
Celarecelarenet.com
imVision Software Technologies Ltd.https://www.imvision.ai/
RoboSOChttps://www.robosoc.co/
BISEC Ltd.http://www.bi-sec.com
Virsechttps://www.virsec.com/
Veriatohttp://www.veriato.com/
Threat Intelligencehttps://www.threatintelligence.com/
Stonesoft (acquired by Forcepoint)https://www.forcepoint.com/product/network-security/forcepoint-ngfw
SecBIhttp://www.secbi.com/
Sawmillhttps://www.sawmill.net/
EST Securityhttps://www.estsecurity.com/public/product/alyac
QinetiQhttps://www.qinetiq.com
PacketNinjashttps://www.packetninjas.com/
MSABhttps://www.msab.com/
Mnemonichttps://www.mnemonic.no/
Milton Security Grouphttps://www.miltonsecurity.com/
Marymanhttp://www.maryman.com/
Kiwi Syslog Serverhttp://www.kiwisyslog.com/
Ikarus Securityhttps://www.ikarussecurity.com/
huntsmanhttps://www.huntsmansecurity.com/
GFIhttp://www.gfi.com/sites/LanGuard/Website/land/ppc/FeatureRightStatic/network-scan-sm
General Dynamicshttps://gdit.com/cyber-security/
Fortycloud (acquired by Firemon)http://40cloud.com/
ERPScan BVhttps://erpscan.io
Elastichttps://www.elastic.co/
DG Technologyhttp://www.dgtechllc.com/
Netsweeperhttps://www.netsweeper.com/
Beta Systemshttp://www.betasystems.com/
Forum Systems (Acquired by Crosscheck)http://www.forumsys.com/en/homepage/
F-Securehttps://www.f-secure.com/en/welcome
EMC (RSA)https://www.rsa.com/en-us
eIQnetworkshttps://www.eiqnetworks.com/
Dshieldhttps://www.dshield.org/
Darktracehttps://darktrace.com/
Cyber adAPThttp://www.cyberadapt.com/
Counter Threat Unit – CTUhttps://www.secureworks.com
Clavisterhttps://www.clavister.com/
Bwise (Acquired by Nadaq)http://www.bwise.com/
BMC Server Automationhttps://www.bmc.com/it-solutions/truesight-server-automation.html?301-bmcsoftware-co-il
Bluedonhttp://www.bluedon.com/
Acuity Risk Managementhttps://www.acuityrm.com/
WireXhttps://wirexsystems.com/
WatchGuard Technologieshttps://www.watchguard.com/
Cognytehttps://www.cognyte.com/
Tripwire (Acquired by Belden)http://www.tripwire.com
ThreatBookhttp://www.threatbook.cn
Tenable Network Securityhttps://www.tenable.com/
TaaSerahttp://www.taasera.com
SurfWatch Labshttp://www.surfwatchlabs.com
Sumo Logichttps://www.sumologic.com/
ServiceNowhttp://www.servicenow.com/
Securonixhttp://www.securonix.com/
SecureLink, Inc. (Acquired by Investcorp)http://www.securelink.com
secunethttp://www.secunet.com
SECnologyhttps://www.secnology.com/
RSAhttps://www.rsa.com/en-us
Rohde & Schwarzhttps://www.rohde-schwarz.com/
RiskIQhttps://www.riskiq.com/
QGroup GmbHhttps://www.qgroup.de/security/index.php/de/
Protegrityhttp://www.protegrity.com
PFP Cybersecurityhttp://www.pfpcyber.com/
Palo Alto Networkshttps://www.paloaltonetworks.com/
Osirium Ltdhttps://osirium.com/
Optivhttps://www.optiv.com/
OpenDNS (Acquired by Cisco)http://www.opendns.com
ObserveIThttp://www.observeit.com/
Netwrixhttp://www.netwrix.com
Manage Enginehttps://www.manageengine.com/
LogRhythmhttps://logrhythm.com/index.html
LANDESK (Merged into Ivanti)https://www.ivanti.com/
Juniper Networkshttps://www.juniper.net/us/en/
Janus Technologies, Inc.http://www.janustech.com/
Huawei Technologies Co., Ltd.http://www.huawei.com
Hillstone Networkshttp://www.hillstonenet.com
IBM Corporationhttps://www.ibm.com/us-en/
Hewlett Packard Enterprisehttps://www.hpe.com/us/en/home.html
HAWK Network Defense, Inc.https://www.hawk.io/
GuruCulhttp://www.guruculsolutions.com/
Guardicorehttp://www.guardicore.com
Gigamonhttps://www.gigamon.com/
GB&Smithhttp://www.gbandsmith.com/
Fox-IT (Acquired by NCC)https://www.fox-it.com/en/
Fortinet, Inc.https://www.fortinet.com/
FireMonhttps://www.firemon.com
Exabeamhttp://www.exabeam.com/
Encode UK Limitedhttp://www.encodegroup.com/
Digital Guardianhttps://digitalguardian.com/
DarkMatterhttps://www.darkmatter.ae/
D3 Securityhttps://www.d3security.com/
Cybereasonhttp://www.cybereason.com/
CYBERBIThttp://www.cyberbit.com/
Ciscohttps://www.cisco.com/c/en/us/products/security/index.html
Check Point Softwarehttps://www.checkpoint.com/
Brinqahttp://www.brinqa.com
Bricatahttp://www.bricata.com
Beijing Venustech Inc.http://www.venusense.com/
Balabit (Acquired by One Identity)https://www.balabit.com
BAE Systemshttp://www.baesystems.com/businessdefence
Auconethttp://www.auconet.com
AlienVault – AT&Thttps://cybersecurity.att.com/
Ayehu Software Technologies Ltd.http://ayehu.com/

Glossary
For your convenience, here are some definitions to Key elements in this list-

Cyber Risk Analysis – Performing a cybersecurity risk analysis helps your company identify, manage, and safeguard data, information, and assets that could be vulnerable to a cyber attack
SIEM analytics – Security Information and Event Management (SIEM) is a set of tools and services offering a holistic view of an organization’s information security.
Threat Hunting – Cyber threat hunting is an active cyber defense activity. It is “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.
SOC analytics – A Security Operation Center (SOC) is a centralized function within an organization employing people, processes, and technology to continuously monitor and improve an organization’s security posture while preventing, detecting, analyzing, and responding to cybersecurity incidents.
Cyber Operation Analytics – Cyber Operation Analytics is the process of using data analysis and business intelligence to improve a company’s security score, looking at your system as a whole, at a macro level.
Risk Analytics – Risk analytics is a technique used to identify and assess factors that may jeopardize the success of a project or achieving a goal.

 

Our Newsletter

Please leave your name and E-mail to subscribe



    Get connected with CyberDB, your source of Cyber Security data, in popular social networks