Risk Quantification Vendors – Full list Final

CyberDB - Risk Quantification Vendors - Full List

The following is the full list of Cyber Risk Quantification Vendors. Vendors in this domain cover one or more of the following Cyber Security capabilities: Operational Risk analytics (Risk Scoring and Security Rating), Risk Posture, Risk Insurance and Third party Risk.

This Risk Quantification vendors list is managed and maintained by CyberDB, including additional information on their Cyber Security and Cyber quantification products.
Please contact CyberDB for any further clarifications.

A10 Networkshttps://www.a10networks.com/
APMG International
AlertFusion
Allgress
Apomatix
Apptega
At-Bay Inc.
Axio Globalhttp://www.axio.com/
Balbixhttps://www.balbix.com/
Beauceron Security
BeyondTrusthttp://www.beyondtrust.com
BitSight Technologieshttps://www.bitsight.com/
Black Duck Software (Acquired by Synopsys)
BlockApt
Blueliv
Brinqahttp://www.brinqa.com
CENTRI Technologyhttp://www.centritechnology.com/
CRESThttp://www.crest-approved.org/
CYBERNETIQhttps://cybernetiq.io/
Cambridge Intelligence
Censys
Centripetal Networks, Inc.https://www.centripetal.ai/#sthash.sih9RPqu.dpuf
Check Point Softwarehttps://www.checkpoint.com/
Ciscohttps://www.cisco.com/c/en/us/products/security/index.html
Citalid Cybersecurity
Cognni
ControlCasehttps://controlcase.com/
Corax Cyber Security
Cowbell Cyber Inchttps://cowbell.insure
CyNation
Cyber Innovative Technologies
Cyber Observer
CyberSaint Security
CyberSmart
Cybereasonhttp://www.cybereason.com/
Cyberwritehttp://www.cyberwrite.com
DarkOwlhttps://www.darkowl.com/
Defendify
Dshield
ECSChttps://www.ecsc.co.uk/
Expansehttps://www.expanse.co
Fasoohttp://en.fasoo.com/?lang=en
Fidohttps://fidoalliance.org/
FireMonhttps://www.firemon.com
ForeScout Technologieshttps://www.forescout.com/
FortifyData
Fortinet, Inc.https://www.fortinet.com/
Fortscale Security (Acquired by RSA)https://softcloudtech.com/fortscale/
GB&Smith
Galvanize – ACLhttps://www.wegalvanize.com/
GlobeKeeper Tech Ltd.
HAWK Network Defense, Inc.https://www.hawk.io/
Heliocor
Inteller Ltd.
Juniper Networkshttps://www.juniper.net/us/en/
KYNDhttps://www.kynd.io/
Kratikalhttps://www.kratikal.com
Lucideushttp://lucideus.com/
Maxxsurehttp://www.maxxsure.com
MetricStream
NeuraLegion
Onspring
OpenSpan VASCO
Optivhttps://www.optiv.com/
Orca Security
Ordr
Panorayshttps://panorays.com/
Portnoxhttps://www.portnox.com/
Prevalent, Inc.http://www.prevalent.net
ProcessBolt
Project Honeynet
Qualyshttps://www.qualys.com/
Reposify
Resilience Insurance
Resolver
Risk Ledger
RiskLens
SECnologyhttps://www.secnology.com/
Secberus
SecurityScoreCardhttps://securityscorecard.com/
Securonixhttp://www.securonix.com/
Senseonhttps://www.senseon.io
Siemplifyhttp://www.siemplify.co/
Silverfort Ltd.https://www.silverfort.com/
Snode Technologieshttps://www.snode.com/
Superscripthttps://gosuperscript.com/
Sweepatichttps://www.sweepatic.com/
Tenable Network Securityhttps://www.tenable.com/
Threat Sketchhttps://threatsketch.com/
ThreatConnecthttps://threatconnect.com/
TrapX Securityhttp://trapx.com/
TrueForthttps://truefort.com/
UpGuardupguard.com
Uptycshttps://www.uptycs.com/
VNT Software Ltd.http://www.vnt-software.com
ViewTrust Technology (Acquired by Virtustream)http://www.virtustream.com/
Vulcan Cyberhttps://vulcan.io/
citicushttp://www.citicus.com/index.asp
itWatchwww.itwatch.de
PlexTrachttps://plextrac.com

Glossary
For your convenience, here are some definitions to Key elements in this list-

Risk Quantification – Risk quantification is the process of evaluating the risks that have been identified and developing the data that will be needed for making decisions as to what should be done about them.
Risk Scoring / Security Rating Cybersecurity risk is the probability of exposure or loss resulting from a cyber attack or data breach on an organization. This can be presented by a score or rating.
Third party Risk – Third party risk is the potential threat presented to organizations from its supply-chain and other outside parties that provide products and/or services and have access to privileged systems. 
Cyber Risk Posture – Cybersecurity posture refers to an organization’s overall defense against cyber-attacks. It encompasses any security policies in place, employee training programs, or security solutions that have deployed, from malware to anti-virus.
Cyber Risk Insurance – Cyber Risk Insurance is a form of insurance designed to protect a company against damages caused by cybersecurity threats. Among these threats are data breaches, hacks, DDoS, malware, and ransomware.

Our Newsletter

Please leave your name and E-mail to subscribe



    Get connected with CyberDB, your source of Cyber Security data, in popular social networks