Network Security Listing

Here’s your listing of the network security categories and their respective sample vendors.

Considering feedback on our (very!) popular Network Security Stack blog post, we noticed that a lot of folks simply hate security acronyms. Others pointed out that knowing sample vendors for each category would be helpful. So if you’re one of those, or are in need of a quick lookup, this list is just for you.

Note: if you think a vendor solution is missing please drop us a note at [email protected] and we’ll make sure to update the list!

  • Cloud Access Security Broker – CASB: Products and services that address security gaps in an organization’s use of cloud services.

    Sample vendors offering such solutions include: Bitglass, Forcepoint, McAfee, Microsoft, Netskope, Proofpoint

  • Data Loss Prevention – DLP: offerings that provide visibility into data usage and movement across an organization, as well as dynamic enforcement of security policies based on content and context at the time of actions on data.

    Sample vendors offering such solutions include: Armorblox, Broadcom, Check Point Software Technologies, Cisco, Digital Guardian, Forcepoint, GTB Technologies, McAfee, Menlo Security, Microsoft, Mimecast, Palo Alto Networks, Trend Micro, Zscaler

  • Endpoint Detection and Response – EDR: Endpoint solutions that detect and investigate security events, contain attacks and produce remediation guidance.

    Sample vendors offering such solutions include: Citrix, Forcepoint, iboss, Minerva Labs, SentryBay, BlackBerry, Broadcom, Cybereason, Deep Instinct, McAfee, Microsoft, Sophos, Tanium, Tehtris

  • Internet of Medical Things Security – IoMTSec: Addresses software, hardware, and network and data protection requirements for the HDO’s IoMT devices.

    Sample vendors offering such solutions include: Armis, Asimily, Cybeats, CyberMDX, Cylera, Cynerio, Medigate, MediTechSafe, MedSec, Ordr, Palo Alto Networks, Sensato

  • Internet of Things Security – IoTSec: Addresses software, hardware, network and data protection for vendors bringing IoT solutions to market, as well as end users using them.

    Sample vendors offering such solutions include: Armis, Braintrace, Cisco, CounterCraft, Forescout, Microsoft, Nozomi Networks, Open Cloud Factory, Ordr, SCADAfence, SecurityGate.io, Viakoo

  • Micro-Segmentation: A form of isolation that is defined in terms of the endpoint.

    Sample vendors offering such solutions include: Akamai, Cisco, ColorTokens, Illumio, Palo Alto Networks, Tempered, Truefort, Unisys, Valtix, vArmour, VMware, Zscaler

  • Network Airspace Control and Protection – NACP: Dynamic enforcement of wireless security policies based on an understanding of communicating wireless devices and their interactions.

    Sample vendors: AirEye, Loch.io, Outpost24

  • Network Detection and Response – NDR: Solutions that primarily use non-signature-based techniques (for example, machine learning or other analytical techniques) to detect suspicious traffic on enterprise networks.

    Sample vendors offering such solutions include: Awake Security, Bricata, Cisco, Corelight, Darktrace, ExtraHop, Fidelis, Flowmon, Gigamon, GREYCORTEX, IronNet, Lastline, Plixer, Vectra

  • Network Access Control – NAC: Enables organizations to implement policies and control access to corporate infrastructure by user devices and cyber-physical devices such as IoT and operational technology (OT) devices.

    Sample vendors offering such solutions include: Akamai (Inverse), Auconet, Cisco, CommScope, Extreme Networks, Forescout, Fortinet, Genians, InfoExpress, Open Cloud Factory, OPSWAT (Impulse), Portnox, Pulse Secure

  • Network Firewall Secures traffic bidirectionally across networks.

    Sample vendors offering such solutions include: Amazon Web Services, Barracuda, Check Point Software Technologies, Cisco, Forcepoint, Fortinet, Hillstone Networks, Huawei, Juniper, Microsoft, Palo Alto Networks, Sangfor Technologies, SonicWall, Sophos, Versa Networks, WatchGuard, Stormshield

  • Operational Technology Security – OTSec: The practices and technologies used to protect people, assets and information involved in the monitoring and/or control of physical devices, processes and events, particularly in production and operations.

    Sample vendors offering such solutions include: Armis, Braintrace, Cisco, Claroty, Darktrace, Dragos, Forescout, Industrial Defender, Microsoft, Nozomi Networks, Open Cloud Factory, Ordr, OTORIO, Radiflow, SCADAfence, SecurityGate.io, Tenable, Verve

  • Secure Access Service Edge – SASE: Delivers multiple converged network and security-as-a-service capabilities.

    Sample vendors offering such solutions include: Cato Networks, Fortinet, Palo Alto Networks, Perimeter 81, Versa Networks, VMware, Zscaler

  • Secure Email Gateway – SEG: A prediction, prevention, detection and response framework used to provide attack protection and access protection for email.

    Sample vendors offering such solutions include: Barracuda, Broadcom, Cisco, FireEye, Fortinet, Microsoft, Mimecast, Proofpoint, Sophos, Trend Micro

  • Secure Web Gateway – SWG: A solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance.

    Sample vendors offering such solutions include: Barracuda, Broadcom, Cisco, ContentKeeper, Forcepoint, McAfee, Menlo Security, Netskope, Sangfor Technologies, Zscaler

  • Virtual Private Network – VPN: Products and services used to achieve security and confidentiality for data in motion by means of encryption and access controls.

    Sample vendors offering such solutions include: Array Networks, Barracuda, Bitglass, Blu5 Group, Broadcom, Check Point Software Technologies, Cisco, Citrix, F5, Forcepoint, Fortinet, Hillstone Networks, IBM, Microsoft, NCP, NetMotion, NordVPN, Palo Alto Networks, Pulse Secure, Sangfor Technologies, SecureAge Technology, Sophos, Versa Networks, VMware, WatchGuard

  • Web Application Firewall – WAF: A traffic processing engine that is mainly focused on exploit mitigation, such as injection attacks (XSS and SQL injection) and application-level denial of service (DoS)

    Sample vendors offering such solutions include: Imperva, Akamai, Amazon Web Services, Barracuda, CloudFlare, F5, Fastly, Fortinet, Microsoft, Radware, ThreatX

  • Extended Detection and Response – XDR: A platform that integrates, correlates and contextualizes data and alerts from multiple security prevention, detection and response components.

    Sample vendors offering such solutions include: Cisco, CrowdStrike, Cybereason, Elastic, F-Secure, FireEye, Fidelis Cybersecurity, Fortinet, McAfee, Microsoft, Palo Alto Networks, Rapid7, Tehtris, SecureWorks, SentinelOne, Sophos, Trend Micro, VMware

  • Zero Trust Network Access – ZTNA: Products and services that create an identity-based and context-based, logical-access boundary encompassing a user (or device) and an application service

    Sample vendors offering such solutions include: Akamai, Appgate, Axis security, Banyan Security, Bitglass, BlackRidge, Broadcom, Cato Networks, Certes Networks, Check Point Software Technologies, Cisco, Cloudflare, Cognitas, Forcepoint, Fortinet, Google, iboss, InstaSafe, Ivanti, Menlo Security, Microsoft, NetFoundry, NetMotion, Netskope, Okta, OPSWAT, Palo Alto Networks, Perimeter 81, Proofpoint, Safe-T, SAIFE, SecureLink, Systancia, Verizon, Wandera, Waverley Labs, Zentera Systems, Zero Networks, Zscaler