Cybersecurity Private Vendor Matrix by Dmitry Netis & Jordan Rupar / 7.30.2020

Cybersecurity Private Vendor Matrix by Dmitry Netis & Jordan Rupar / 7.30.2020

Q Advisors – Cybersecurity Private Vendor Matrix By Dmitry Netis & Jordan Rupar / 7.30.2020 Q Advisors assembled over 100 vendors within cybersecurity, selling a multitude of services across nine distinct cybersecurity sub-segments Cloud Security Data Governance DevSecOps (“CS”) (“DG”) (“DSO”) Identity and Access Endpoint Security Email Security Management (“EPP”) (“ES”) (“IAM”) Security Analytics and Security Information and Network Security Automation Event Management (“NS”) (“SA”) (“SIEM”) Sub-Sector Company Product Description 1touch.io discovers, maps, and tracks Personal data and network personal data in the enterprise network, (IAM)/(DG) analytics platform using unique and proprietary network analytics. ACID SaaS is an advanced, customized Cyber Intelligence and intelligence gathering and analysis (SA) Digital Identity Protection platform for early detection of diverse threats. Akeyless is an enterprise-grade holistic Keys Management-as-a- solution made to protect and manage Service solution, made to (CS)/(DSO) Encryption Keys, TLS Certificates, protect Hybrid and Multi- Passwords, etc. Backed by Jerusalem Cloud environments Venture Partners and JVP Media Labs. Alcide provides a K8s-native, AI-driven security platform for configuration risks, Kubernetes-native security (DSO) visibility, runtime security events, and a platform single policy framework across Kubernetes clusters. 1 Q Advisors – Cybersecurity Vendor Matrix Sub-Sector Company Product Description SaaS-enabled managed Alert Logic continuously identifies and (EPP) detection and response addresses breaches and gaps. (MDR) AlgoSec automates network security Network security, cloud policy management to make enterprises (NS)/(DSO) security and DevSecOps more agile, secure and compliant. Private Equity backed by Claridge Israel. Aporeto provides security for containers, Cloud Network Security and microservices, cloud and legacy (CS)/(IAM) Microservices Security applications based on workload identity, encryption, and distributed policies. Aqua provides security for cloud native Cloud native security and apps & infrastructure: containers, (CS)/(DSO) container protection serverless and VMs, across all platforms and clouds. Solution for reducing risk Armis addresses the new threats of (NS) from unmanaged IoT/OT unmanaged IoT devices. devices Attivo provides an active defense for early Attivo ThreatDefend™ detection, forensics, and automated (SA) Deception Platform incident response to in-network cyberattacks. Identity management Auth0 provides the simplicity, extensibility, (IAM) platform for application and expertise to scale and protect builders identities. BeyondTrust prevents data breaches related to stolen credentials, misused Privileged Access (CS)/(DSO) privileges, and compromised remote Management access. Private Equity backed by Francisco Partners. 2 Q Advisors – Cybersecurity Vendor Matrix Sub-Sector Company Product Description BigID helps organizations manage and (CS)/(DG) Data privacy and protection protect their customer data, and meet data privacy and protection regulations. BitDam blocks advanced content-borne Email, cloud storage and IM attacks across all enterprise (DG) threat protection communication channels. Venture Capital backed by Taya Ventures. Bitdefender develops and provides anti- Next-generation endpoint virus software, internet security software (EPP) security and endpoint security software. Private Equity backed by Vitruvian Partners. Real-time end-to-end data Bitglass is a global cloud access security (CS)/(IAM) protection, from the cloud broker (CASB) and agentless mobile to the device security company. BitSight produces daily security ratings to help manage third party risk, underwrite (SA)/(DG) Security ratings platform cyber insurance policies, benchmark performance, conduct M&A due diligence and assess aggregate risk. Centrify centralizes and orchestrates Multi-cloud-architected fragmented identities, improves audit and (DSO)/(IAM) Identity-centric privileged compliance visibility, and reduces risk for access management the modern, hybrid enterprise. Private Equity backed by Thoma Bravo. Checkmarx security platform unifies with DevOps and provides static and application security testing, software (DSO) Software Security Platform composition analysis, and developer application security awareness. Private Equity backed by Insight Partners. Claroty operates an operational technology (OT) security platform that Firewalls, Network Access (CS)/(SIEM) enables engineers, operators, and cyber Control, SIEM security professionals to protect and optimize OT networks. 3 Q Advisors – Cybersecurity Vendor Matrix Sub-Sector Company Product Description CloudPassage is an automation platform, delivered via software-as-a-service, that (CS) Cloud security visibility improves security for private, public, and hybrid cloud computing environments. Code42’s solution quickly surfaces insider (DG) Data security threats to trade secrets and other high- value files. CyberArmor provides a streamlined Cloud native security and DevOps and DevSecOps led model in (DG)/(DSO)/(CS) data protection which environments are deployed with inherent zero-trust. Endpoint detection and Cybereason detects behavioral patterns response, next-generation (SA)/(EPP)/(DSO) across endpoints and surfaces malicious antivirus, managed operations. monitoring and IR services Cymatic is an AI-enabled Web Application Cloud-native all-in-one Defense—including bot mitigation and (SA)/(IAM)/(DSO) security platform threat intelligence—designed to mitigate shortcomings of conventional WAFs. Darktrace protects against threats to the Autonomous response (EPP) cloud, email, IoT, networks and industrial technology systems. Password and Identity-as- Dashlane is a mobile and desktop app that (IAM) Service (IDaaS) provides identity and access management. management DivvyCloud protects cloud and container environments from misconfigurations, (CS) Container security policy violations, threats and other security challenges. 4 Q Advisors – Cybersecurity Vendor Matrix Sub-Sector Company Product Description Eqnyte delivers smart content Content intelligence collaboration and governance in the cloud (DG) platform or on-premises. Backed by consortium of investment firms. Exabeam collects log data, uses behavioral Security Management analytics to detect attacks, and automates (SIEM) Platform incident response, both on-premises or in the cloud. ExtraHop provides cloud-native network detection and response for the hybrid (SA)/(CS) Cloud native security enterprise. Backed by several venture capital firms including TCMI. The Forcepoint platform delivers risk- Human-centric adaptive protection to continuously (SA)/(CS)/(DG) cybersecurity ensure trusted use of critical data and systems. Subsidiary of Raytheon. ForgeRock securely connects people, Comprehensive Identity and devices, and things, so everyone and (IAM) Access Management (IAM) everything can interact in today’s IoT solutions world. Greathorn provides cyber security solutions for cloud communication Email Security, Takeover (ES) infrastructure, stopping spear phishing, protection credential theft, and other highly targeted attacks. Built on a proprietary containerized architecture designed 100% for the cloud, Container-based cloud (CS) Iboss cloud secures user Internet access. security Private Equity backed by Goldman Sachs Private Capital. Iconectiv provides authoritative Number intelligence numbering intelligence to the global (IAM) security platform communications industry. Private Equity backed by Francisco Partners. 5 Q Advisors – Cybersecurity Vendor Matrix Sub-Sector Company Product Description Illusive Networks provides tools that help Deception-based (SA)/(CS)/(EPP) security teams detect and resolve cybersecurity solutions advanced attacks. Illumio offers an Adaptive Security Data center and cloud Platform (ASP), a data center and cloud (NS) traffic security tool traffic security tool. Backed by consortium of PE/VC firms. Imperva offers cloud based web Application Security and applications and data security, including (CS)/(DG) Cloud Security governance and compliance solutions. Backed by Thoma Bravo. Imprivata provides identity, authentication, and access management Identity Governance, Mobile solutions that are purpose-built for (DG)/(IAM) IAM and Provisions, Secure healthcare security, and compliance Healthcare Communications challenges. Private Equity backed by Thoma Bravo. Infoblox offers DDI solutions for enhanced Network Services, Security reliability, and automation to cloud and (CS)/(NS) and Cloud Network hybrid systems for network management Automation and customer experience. Private Equity backed by Vista. Iconic Security provides data access policy management, encryption key Machine-Scale Data (DG) management and real-time policy Protection enforcement. Backed by consortium of investment firms. ITsMine uses artificial intelligence, behavior analysis, and deception (DG)/(CS) Data loss prevention techniques to secure and protect all stages of digital data. JFrog empowers IT professionals to code (CS)/(EPP)/(DSO) Continuous Integration high-quality applications that securely flow to end-users with zero downtime. 6 Q Advisors – Cybersecurity Vendor Matrix Sub-Sector Company Product Description KnowBe4 provides security awareness Awareness training and training to help organizations manage (CS)/(ES) simulated phishing platform social engineering, phishing and ransomware attacks. Lacework provides security visibility, DSO)/(DG) Cloud

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us