Cybersecurity Companies

This section of CTOvision, designed and optimized for CTOvision Pro members, provides a fast overview of Cybersecurity companies we believe are poised to cause the most positive disruption in enterprise. Remember CTOvision Pro members can always use our Ask The CTO feature to task us to refine and assess these firms further.

Find our other company assessments at: Cloud Computing Companies | Artificial Intelligence Companies | Mobility Companies | Big Data Companies | Robotics Companies | Internet of Things Companies  | Infrastructure and Comms Companies

We have tracked security technologies for over a decade and scour the community for indications of new, virtuous technologies and companies that can help enable enterprise missions through better security.

The most virtuous of these firms focus on doing a small number of things well, or sometimes just doing one and only one thing very well. That is the nature of cyber security technology today. Threats are so complex and enterprises consist of such unique, mission-focused infrastructure that this can make it better for enterprise decision-makers. You can find the one firm that scratches your biggest itch and then move on to the next itch.

But the bad news is with every solution introduced another challenge then becomes the priority. Clearly this is a never ending cycle.

To help you with your continuous searches we maintain this list with continuous updates. The firms we report on below are among the best available. And these are firms with staying power, making them lower risk options. Please contact us for more information on any of them. And please let us know if you think we are missing anyone we should be reporting on.

  • * QuintessenceLabs: Advanced quantum cybersecurity products with high-speed true random numbers, encryption key management, and one time pad encryption.

    QuintessenceLabs delivers a trusted security foundation protecting sensitive data on your premises, in the cloud or in uncontrolled environments. Founded in 2006, QuintessenceLabs addresses the most difficult security challenges facing companies, helping implement robust security strategies to protect data today and in the future. QuintessenceLabs products include: – an enterprise scale true random number generator […]

    AirPatrol: Cognitive Mobility and Wireless Situational Awareness.

    AirPatrol delivers the first intelligent enterprise mobility solution that continuously monitors mobile devices and dynamically adapts their capabilities for the situation. AirPatrol operates under the premise that in security location is everything. There management team, board, and advisors are all first rate, as is their reputation for partnering with others in the community. Their brands […]

    AirWatch: Powering Mobility in The Enterprise

    VMware announced a definitive agreement to acquire AirWatch. We will continue to track AirWatch here for the time being since their capability is unique and will remain so after acquisition. This acquisition is a clear indicator that those adopting AirWatch were doing so for the right reasons. For a quick overview see the video at […]

    AlienVault: Providing An Open Threat Exchange

    AlienVault is a leading provider of unified security management and crowd-sourced threat intelligence required to detect and act on today’s advanced threats. AlienVault Open Threat Exchange (OTX) gives you access to the largest crowd-sourced threat intelligence exchange. OTX is an open threat information sharing and analysis network, created to put effective security measures within the reach […]

    Application Security Inc: Ensuring Database Security

    Trustwave has announced the acquisition of AppSec. AppSec is highly regarded for their work in database security. For a quick overview on why visit this link and see the video embedded below: Application Security, Inc. (AppSecInc) has pioneered database security, risk, and compliance solutions for the enterprise. AppSecInc empowers organizations to assess, monitor and protect […]

    Appthority: The Authority in App Security

    Appthority provides the industry’s first all-in-one App Risk Management service that employs static, dynamic and behavioral analysis to immediately discover the hidden actions of apps and empower organizations to apply custom policies to prevent unwanted app behaviors. Only Appthority combines the largest global database of analyzed public and private apps with advanced policy management tools […]

    Armor: Cloud Computing With Advanced Intelligence, Defense and Control Focused On Customer Outcomes

    Armor was previously known as FireHost. Armor is an industry-leading active cyber defense company. They have a reputation for high quality hosting that enables enterprises to mitigate risk while using the cloud, so we track them on our lists of both Disruptive Cloud Computing Companies and Disruptive Security Companies. It clearly deserves a place on […]

    Authernative: The Authentication Alternative

    At this point we believe Authernative bears watching, but this is a highly active sector of the security world and we plan on revisiting this firm to see how they are doing. Authernative, Inc. is a software company developing, marketing and selling enterprise and consumer level security solutions. Authernative’s granted and pending U.S. and International […]

    Axway: cloud integration, API and Identity management software

    Axway (NYSE Euronext: AXW.PA), a market leader in governing the flow of data, is a global software and services company with more than 11,000 public- and private-sector customers in 100 countries. For more than a decade, Axway has empowered the world’s top organizations with proven solutions that help manage business-critical interactions through the exchange of […]

    Bit9: Advanced Endpoint Protection and Server Security

    Bit9 is the market leader in adaptive Application Whitelisting. The company’s award-winning endpoint protection and server security solutions provide total visibility and control over all software on endpoints and servers, eliminating the risk caused by malicious, illegal and unauthorized software. Bit9 specializes in protecting organizations against Advanced Persistent Threat attacks. Bit9 leverages the Bit9 Global […]

    BlackRidge Tech

    New cyber defense that is military proven – cloak servers and stop cyber attacks on the first packet with identity-based network security. Partners: IBM, Ciena. For more see: BlackRidge Technology

    BlueBox Security: Serving the corporate world by securing mobile data

    Bluebox Security is saving the corporate world from information thievery by securing company data as it interacts with employee mobile devices & services. For more on how see the video at this link and embedded below:

    Bromium: Virtualization and Cloud Security

    Founded by Gaurav Banga, Simon Crosby and Ian Pratt, Bromium is focused on the delivery of infrastructure products that allow enterprises to safely adopt consumerization and cloud computing. Bromium says that now more than ever enterprise data faces security risks with the growth of new devices and application access as well as the increasing mobility […]

    Carbon Black: Providing Elemental Insight

    Carbon Black, now a Bit9 company, gives your team key answers about the security and efficiency of your enterprise in real time. Carbon Black is the first ‘security camera’ for your computer. By logging binary execution, file system modifications, Registry modifications and new network connections on a Windows host, you can dramatically reduce the time, […]

    Catbird: Virtualization Security Management

    While virtualization offers many benefits to enterprise such as lower costs and greater flexibility, it also creates new challenges. One of the greatest concerns with switching over to virtualized infrastructure, espeically in government, is security and compliance in a complex and dynamic environment which legacy software can no longer handle. Catbird offers automated security solutions […]

    Cellcrypt: Encrypted Voice Calls

    Cellcrypt is the leading provider of encrypted voice calling on commercial off-the-shelf smartphones including Android, BlackBerry, iPhone and Nokia. Founded in 2005, Cellcrypt’s R&D innovation resulted in Encrypted Mobile Content Protocol (EMCP), an Internet Protocol based technology that optimizes delivery of encrypted data between mobile devices over wireless networks. EMCP solves the technical challenge of […]

    Centrify: Control, secure and audit access to cross-platform systems, mobile devices and apps leveraging Microsoft Active Directory

    Unified Identity Services Across Data Center, Cloud and Mobile. One single login for users. One unified identity infrastructure for IT. Centrify delivers integrated software and cloud-based solutions that centrally control, secure and audit access to cross-platform systems, mobile devices and applications by leveraging the infrastructure organizations already own — Microsoft Active Directory. From the data […]

    Centripetal Networks Provides Internet Scale Cyber Defense

      Note: CTOvision publisher Bob Gourley is on the board of Centripetal Networks. Centripetal Networks is a firm with dramatically virtuous technology. The core capability of Centripetal Networks is a product called the RuleGate.  It is a very high performance TCP/IP packet filter able to make decisions in real time on whether to let pass/forward, drop […]

    CipherCloud: New approaches to cloud security

    CipherCloud has a very unique approach to enhancing security of enterprise data in the cloud. CipherCloud is a pioneer in delivering cloud information protection and enabling you to overcome risks to data privacy, residency, security, and regulatory compliance and deliver better business results. Using ground breaking technology they protect the entire lifecycle of data including discovery, […]

    CloudPassage: Everything You Need to Secure Your Cloud Servers

    CloudPassage Halo is your security command center for securing your cloud servers – any cloud provider, any hypervisor, anytime. CloudPassage Halo, the award winning server security platform, bridges the gap between traditional perimeter-oriented data center security and security in dynamic cloud environments. Halo offers a broad range of features to address cloud security issues from […]

    Contrast Security

    Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Contrast’s patented deep security instrumentation is the breakthrough technology that enables highly accurate analysis and always-on protection of an entire application […]

    CounterTack: In Progress Cyber Attack Intelligence and Response

    Improve your intelligence and incident response capabilities. CounterTack provides organizations with broader and richer, site-specific intelligence, enabling them to respond faster to an advanced cyber attack.Leveraging applied virtualization technology, CounterTack captures and analyzes instruction-level data from the host, identifying specific attack indicators and security policy violations. No one knows you’re watching. CounterTack’s solution operates in […]

    CyberX

    CyberX secures the OT Network by modeling it as a state machine, providing complete visibility and real-time detection of threats. Gartner Cool Vendor 2015. From their website: The Industrial Internet will not thrive without cyber-security as one of its pillars. Industrial networks still rely on many systems that were implemented decades ago, at a time when […]

    Cylance: Providing proactive cybersecurity products and services

    Cylance, Inc. is a global provider of cybersecurity products and services that is changing the way companies, governments and end users proactively solve the world’s most difficult security problems. Through a holistic security process called Presponse™, a philosophical, practical and cyclical approach, Cylance couples the understanding of a hacker’s mentality with algorithmic intelligence and technology […]

    Darktrace: Enterprise Immune System technology

    Darktrace is one of the world’s fastest-growing cyber defense companies and the leader in Enterprise Immune System technology, a new category of cyber solutions based on pioneering Bayesian mathematics developed at the University of Cambridge. For an introduction to Darktrace see the video here and embedded below:   Darktrace addresses the challenge of insider threat […]

    Dome9: Airtight Security for Your Cloud Servers

    Secure Access Lease With Dome9, all your cloud servers are fully protected by default. To gain access to a server, the admin requests a secure access lease, which by default provides access for 1 hour, for a specific server and protocol, connecting from a specific IP. Dome9 Central notifies the Dome9 Agent on your cloud […]

    Emerging Threats: Provider of Open Source Threat Intelligence

    Emerging Threats – now part of Proofpoint – is a world-leading provider of open source and commercial threat and malware intelligence. Founded in 2003 as a cyber security research community, Emerging Threats has become a de facto standard in network-based malware threat detection. The company’s Suite of threat intelligence products delivers time-tested, comprehensive actionable data with […]

    eSentire: Active cyberthreat protection solutions mitigate inbound and internal cyberattacks and prevent data exfiltration

    With this post we are beginning coverage of eSentire. eSentire protects enterprises with advanced cybersecurity capabilities. eSentire leverages their own threat intelligence and third-party feeds as well as customer data via a high performance analytics platform. This is done in a very cost-effective way which allows most all organizations to benefit from their continuous detection and mitigation […]

    FireEye: Purpose-built, Virtual Machine-based Security Platform

    Everyone we know already knows about FireEye. This is a big reason we do not report on it more here at CTOvision, they get plenty of coverage elsewhere. But for continuity we had to add them to our curated lists of security firms so there is no doubt in anyone’s mind that we are tracking […]

    Firemon: Providing proactive security intelligence and governance over your IT

    With this post we are initiating coverage of Firemon, provider of proactive security intelligence and governance capabilities. Firemon enables enterprises to continuously analyze, visualize and improve the capabilities of your existing network security infrastructure. For a short introduction to the Firemon platform in the words of fonder and CEO Jody Brazil is at this link […]

    HumanGeo: Data, Services and Products positioned at the intersection of Big Data applications, social media analytics, and geospatial visualization

    After reading the news of Radiant Group’s acquisition of HumanGeo I contacted the two founders of HumanGeo, Al Di Leonardo and Abe Usher, to seek some first-hand lessons learned of use to the community as well as to congratulate these two friends from the national security ecosystem. This post captures some of the insights from that […]

    IBM Q-1 Labs

    IBM acquired Q-1 labs in Oct 2011 to round out its security offerings in the newly-formed IBM Security Systems division.  This immediately made IBM a SIEM player with a key spot on Gartner’s magic quadrant and since then the original Q-1 labs capability has improved in its ability to integrate with other key enterprise capabilities. […]

    IDVector Emerges from Stealth with Privacy Focused Secure Public Internet Access Offering

    Thursday August 24, 2016 – Business Wire WASHINGTON–IDVector, a secure Internet access provider, today emerged from stealth mode with a simple and unobtrusive way to safely and securely access the Internet without fear of data interception or data leaks. With IDVector, every connection you make online is secured from unauthorized observation, whether tethering to your […]

    IID: Provider of ActiveTrust cyber threat data exchange

    InternetIdentity (IID) is a cybersecurity company. Its flagship product, ActiveTrust, is one of the world’s largest commercial cyberthreat data exchanges. IID provides the platform to easily exchange cyber threat intelligence between enterprises and governments. Fortune 500 companies and large government agencies leverage IID to detect and mitigate threats. IID was founded in 1996. The company […]

    IKANOW: Delivering the Power to Act

    For an intro to IKANOW see the video: Here is more from their website: At IKANOW, we have created an environment that supports Open Analytics, a new process for enabling and deploying rapid innovation in the analytic market space. We start by providing a culture that supports the concept and by providing tools and techniques […]

    Imperva: Protecting the Data that Drives Business

    More organizations trust Imperva to protect their business applications and databases than any other vendor. Only Imperva delivers innovative technology to give full audit accountability and separation of duties to meet regulatory compliance. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user. Trusted […]

    Intel Corporation: Designing and manufacturing digital technology platforms

    Intel Corporation (NASDAQ:INTC) is best known for chips, but is involved in many other aspects of the delivery of compute platforms. At a current market cap of $164B they have the resources to continue to innovate and we expect to see Intel as a Tech Titan for years to come. From Reuters: Intel Corporation is […]

    Invincea: Advanced malware threat detection, breach prevention and forensic threat intelligence

    Invincea is the premier innovator in advanced malware threat detection, breach prevention, and forensic threat intelligence. Invincea FreeSpace™ is an innovative, endpoint security solution that provides a secure environment for your users to be productive online while thwarting the barrage of online threats they face daily. Invincea is the market-leading solution that provides enterprise networks with coverage […]

    IPWonk: Find your IP address and learn what your browser reveals about you, fast

    IPWonk.com helps users find information about the IP address they are are using as well as what is known about their web browser. It is fast and accurate. This can be helpful for configuring a computer on a network, setting up communications software, or troubleshooting an Internet connection. Your Internet Service Provider or IT help […]

    Lancope: Providing flow-based solutions for network security, performance and application monitoring

    Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive […]

    Lastline: Stop Evasive Malware, Persistent Threats and Zero Days

    Lastline Enterprise and Analyst deliver protection against targeted attacks, advanced persistent threats (APTs), zero-day exploits, and other advanced malware that bypass traditional signature-based controls and sandbox-based analysis systems. Easy to deploy and simple to administer, Lastline’s solutions are universal to Web, email, file, network traffic and analysis of Android applications. On February 18 2014, the […]

    Lookingglass: Identify, Understand, Act

    ScoutVision is a Cyber Knowledge-Based Threat Intelligence System designed to transform threat data into threat knowledge. For an intro see the video below: The platform’s foundation is a constantly updated cybermap, an accurate account of the enterprise and Internet’s underlying infrastructure, its connectivity and asset ownership. The cybermap is enriched with millions of unique indicators […]

    Lookout: Mobile Security Through Data Approaches

    Lookout is a security technology company dedicated to making the post-PC world safer for everyone. They develop software that secures personal devices, protects the BYOD workforce and defends mobile infrastructure and networks. To address the unique security challenges of the Post-PC era, Lookout takes a different approach, tackling security as a data problem. They created […]

    Maltego: An open source intelligence and cyber forensics application

    Maltego is growing in popularity as an analytical tool because of its functionality and open source model. Maltego supports many mission areas, but has especially caught on among cyber analysts. They are supported by the company Paterva. For an overview of capabilities see the video at this link and embedded below: From their website: What is […]

    McAfee ESM: Enterprise grade security monitoring

    McAfee has a long history in seeking to provide enterprise-grade security tools. Security professionals are well versed in the pros and cons of solutions like McAfee. Their Enterprise Security Manager is a leader according to Gartner. From the McAfee website: Effective security starts with real-time visibility into all activity on all systems, networks, databases, and […]

    Mobile-Flex: Transformative Technology that simplifies mobile technology

    Mobile-Flex® is a Windows Based Server solution that delivers access to any Windows server application on mobile devices, Windows desktops, Surface and Macintosh computers in a safe and secure manner using our patent pending technology that leaves NO trace of data of any nature on the device. We do this by dynamically analyzing each graphical […]

    Nlyte: For Data Center Infrastructure Management

    With this post we are initiating coverage of Nlyte. The modern data center is key to so many enterprise missions. Well run data centers make direct contributions to mission. Nlyte makes direct contributions to running your datacenter well. For an overview of Nlyte see the video of the video at this link and embedded below: […]

    NordVPN Solutions: Enhancing privacy and security across all IT platforms

    NordVPN won PCMagazine’s Editor’s Choice Award, which is important to know given the VPM Market is saturated with providers. Most all VPNs rely on the same basic information to express why you need a VPN: It makes WiFi safer wherever you are, can help give you access to more parts of the Internet by lifting […]

    Okta: On-Demand Identity Management for All Your Web Applications

    Okta is an on-demand identity and access management service that enables enterprises to accelerate the secure adoption of their web applications, both in the cloud and behind the firewall. Enterprises everywhere are rapidly adopting cloud services such as Salesforce.com, WebEx, Google Apps, Workday, or NetSuite to power their core business processes. Whether they have one […]

    Palo Alto Networks: A Next Generation Firewall

    Palo Alto Networks protects thousands of enterprise and governments from cyber threats. They rely on a deep expertise and commitment to innovation to continually enhance their game-changing security platform. The Palo Alto Networks security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS and URL filtering. Because these functions […]

    Pindrop Security: The Phone Fraud Experts

    Pindrop Security has developed a breakthrough caller-ID product that helps detect, report and mitigate phone fraud. We have developed a patent-pending solution that can identify key attributes of any phone call including the device used, ID, call path, and geographic point of origin. Look at it as a call “fingerprint” that helps clients identify and […]

    Ping Identity: Secure cloud identity management

    Ping Identity provides full spectrum security capabilities that enable cloud single sign on and other identity management services. From their website: Simple, proven and secure cloud identity management for employees and customers. Ping Identity meets identity challenges across the enterprise, improving collaboration and customer engagement. Take Your Workforce to the Cloud Frequently used business applications […]

    PKWARE: Inventors of Zip now fielding smart, scalable encryption

    PKWARE has a history of producing scalable, highly functional software and approaches to data storage, movement and encryption.  With this post we are initiating coverage of PKWARE, tracking them in our Disruptive IT Directory in our sections on the highest performing Infrastructure and Security companies. PKWARE’s Smartcrypt solution enables organizations of all sizes to armor their data […]

    PureVPN: Engineered for both speed and security

    PureVPN is a very highly regarded VPN provider with capabilities affordable enough for individual use but easily scalable to support businesses. PureVPN now offers “Virtual Router” feature within its Windows application. With this feature, you can convert your Windows-based desktop or laptop into a virtual router and use it to connect up to 10 devices. […]

    Recorded Future: Web Intelligence Software Platform To Anticipate Threats and Capitalize On Opportunities

    We have reported on Recorded Future since their founding and have watched closely as they have evolved to become a full scope web intelligence software platform able to make unique and very positive contributions to enterprise missions. Recorded Future provides a comprehensive source of past, planned and predicted events on the web. Key to their […]

    RiskIQ: Providing actionable data to map your digital attack surface

    With this post we are initiating coverage of RiskIQ. RiskIQ is all about providing actionable data and high quality insights designed to map your digital attack surface, pinpoint and research threats and reduce overall risk to mission. RiskIQ provides their data in ways easy to put into the context of your business/mission needs which makes […]

    Solarflare: Revolutionizing the way enterprises scale, manage and secure data centers

    With this post we are initializing our coverage of Solarflare. Solarflare is a leading provider of application-intelligent networking I/O software and hardware that facilitate the acceleration, monitoring and security of network data. We are tracking Solarflare in our Disruptive IT Directory in two categories. They are a top player in infrastructure including the critically important […]

    SolarWinds: Powerful and affordable IT management software

    SolarWinds provides powerful and affordable IT management software to customers worldwide from Fortune 500 enterprises to small businesses to government agencies. For an overview see the video at this link: In all of its market areas, the approach is consistent – focus exclusively on IT Pros and strive to eliminate the complexity that they have […]

    Sonatype: The Component Lifecycle Management Company

    Sonatype is leading the component revolution. The company’s innovative component lifecycle management products enable organizations to realize the promise of agile, component-based software development while avoiding security, quality and licensing risks. Sonatype operates the Central Repository, the industry’s primary source for open-source components, housing more than 300,000 components and serving more than five billion requests […]

    Splunk: Make Your Machine Data Accessible, Useful, and Valuable

    Your data contains a definitive record of your user transactions, customer behavior, machine behavior and fraudulent activity, information that is essential for managing, securing and auditing your environment – whether physical, virtual or in the cloud. This data also enables you to gain end-to-end visibility and insights on to how to better run IT and […]

    Sumo Logic: Make Your Applications Run Longer & Stronger

    Sumo Logic provides the first cloud-based log management and analytics solution and removes the headaches associated with on-premise log management software, expensive hardware, complex management, and frequent software upgrades. Collect Any Log from Any Source Collect, compress, and securely transfer all of your log data regardless of volume, type, or location: Local or remote log files […]

    Symantec: Confidence in a Connected World

    Symantec Corporation provides security and information management solutions. The Company operates its business on a global civilian cyber intelligence threat network and tracks various threats across the Internet from mobile devices, endpoints, and servers across the world. It is developing solutions for cloud, threat protection, information protection and cyber security services. It operates through two […]

    Tanium: Modern systems management

    Tanium is a new approach to endpoint management. An enterprise solution that allows you to query and modify your managed computer assets in seconds, regardless of the size of your network. For an overview see the video at this link: For more see http://tanium.com  

    ThreatBrief: Strategic Cyber Intelligence Delivered Daily

    The Daily Threat Brief provides strategic insights into threats. This is an open source intelligence report modeled after the concept of the President’s Daily Brief (PDB). Every day the analysts of Cognitio succinctly provide insights into global risk and security issues in ways that can reduce your personal and business risks and inform your strategic decision making. […]

    ThreatConnect: Provider of advanced threat intelligence products and services

    ThreatConnect, Inc. is the leading provider of advanced threat intelligence products and services including ThreatConnect, a Threat Intelligence Platform (TIP). ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities ThreatConnect offers a superior understanding of relevant cyber threats to business operations. […]

    ThreatStream: A Threat Intelligence Platform

    ThreatStream provides an enterprise class Threat Intelligence Platform, combining comprehensive threat data collection, prioritization, and analytics with secure collaboration in a vetted community. Offering a comprehensive enterprise security infrastructure integration, ThreatStream enables organizations to proactively identify and combat cyber threats targeting their operations. Headquartered in Redwood City, California, the company is privately held and has […]

    Verisign: Security Services

    With this post we are initiating coverage of Verisign (NASDAQ: VRSN). Many in the technology community know Verisign for their domain name registration heritage and their operation of the .com, .net, .edu and .gov top level domains. Verisign has successfully operated the .com DNS infrastructure for almost 18 years without an outage. This feat alone […]

    Vidder: Securing business critical apps, transparently

    The biggest challenge corporations have today is stopping the cyberattack in cost-effective ways. Vidder has created a single service that mitigates broad ranges of attacks in very smart, well designed ways. For context see the short introduction at this video: Vidder is changing how modern day enterprises approach security in an increasingly untrusted IT landscape. […]

    Zettaset Orchestrator: Providing independent management and security layers

    Zettaset Orchestrator™ is an enterprise software application which functions as an independent management and security layer, sitting on top of any Apache Hadoop distribution. Orchestrator is the only solution that has been specifically designed to meet the security requirements of the distributed architectures which predominate in big data and Hadoop environments. Orchestrator creates a comprehensive […]