Security Operations & Incident Response

Get Started. It's Free
or sign up with your email address
Rocket clouds
Security Operations & Incident Response by Mind Map: Security Operations & Incident Response

1. Digital Forensics/eDiscovery

1.1. Content, File and Endpoint Forensics

1.1.1. eDiscovery

1.1.1.1. Clearwell

1.1.1.2. Kazeon

1.1.1.3. Guidance Software

1.1.1.4. Access Data

1.1.1.5. Autonomy

1.1.1.6. kCura

1.1.1.7. FTI Technology

1.1.1.8. Barracuda Networks

1.1.2. Mobile Devices

1.1.2.1. BlackBagTech

1.1.2.2. Cellebrite

1.1.2.3. Compelson Labs

1.1.2.4. Guidance Software

1.1.2.5. MSAB

1.1.2.6. NowSecure

1.1.2.7. Oxygen Forensics

1.1.2.8. Paraben Corporation

1.1.3. Endpoint Computing Systems

1.1.3.1. ADF Solutions

1.1.3.1.1. http://www.adfsolutions.com/

1.1.3.2. Access Data

1.1.3.3. ArxSys

1.1.3.4. BlackBag Technologies

1.1.3.5. CRU Inc

1.1.3.5.1. Ditto Forensic FieldStation

1.1.3.6. Cyfir

1.1.3.7. Guidance Software

1.1.3.8. Magnet Forensics

1.1.3.8.1. http://www.magnetforensics.com/

1.1.3.9. Nuix

1.1.3.10. OSForensics

1.1.3.11. Paraben Corporation

1.1.3.12. WindowsScope

1.1.3.13. X-Ways Forensics

1.1.4. Email Examination

1.1.4.1. Systools Software

1.1.4.1.1. MailXaminer

1.1.4.2. Nuix

1.1.5. Digital Forensics Case Management

1.1.5.1. Axxera

1.1.5.1.1. http://www.axxera4n6.com/index.html

1.1.5.2. D3 Security

1.1.5.2.1. https://www.d3security.com/products/it-forensics-software/

1.1.5.3. Digital Investigation Manager

1.1.5.3.1. http://digitalinvestigationmanager.com/

1.1.5.4. Guidance Software

1.1.5.4.1. https://www2.guidancesoftware.com/products/Pages/encase-enterprise/case-management.aspx

1.1.5.5. Intaforensiscs

1.1.5.5.1. http://www.intaforensics.com/software/lima-product-suite/

1.1.5.6. Sentinel Data

1.1.5.6.1. http://sentineldata.com/atlas-digital-forensic-case-management/

1.1.5.7. Sirentech

1.1.5.7.1. http://www.sirentec.com/

1.1.5.8. Wynyard Group

1.1.5.8.1. https://www.wynyardgroup.com/us/solutions/digital-evidence-investigator/

1.1.6. Memory Forensics

1.1.6.1. FireEye

1.1.6.2. Guidance Software

1.1.6.3. Volatility Framework

1.1.6.4. WindowsScope

1.2. Forensic File & Data Analysis Tools

1.2.1. Cellebrite

1.2.2. Cyfir

1.2.3. Intella

1.2.4. Magnet Forensics

1.2.5. Nuix

1.2.6. Systools Software

1.3. eDiscovery Services

1.3.1. Robert Half

1.3.2. Advanced Discovery

1.4. eDiscovery Software

1.4.1. AccessData

1.4.2. Guidance Software

1.4.3. Nuix

1.4.4. Symantec

2. Fraud Prevention/Web Malware Monitoring

2.1. Fraud/Bot/Webscrape Prevention

2.1.1. Software

2.1.1.1. CallSign

2.1.1.2. Digital Resolve

2.1.1.3. Elastic Beam

2.1.1.4. FeedZai

2.1.1.5. IBM (Formerly Trusteer)

2.1.1.6. Intellinx

2.1.1.7. RSA (EMC)

2.1.1.8. ShieldSquare

2.1.2. Appliances

2.1.2.1. Distil Networks

2.1.2.2. Elastic Beam

2.1.2.3. Imperva

2.1.2.4. RSA (EMC)

2.1.2.5. Shape Security

2.1.2.6. White Ops

2.1.3. Software as a Service

2.1.3.1. Akamai

2.1.3.2. BioCatch

2.1.3.2.1. http://www.biocatch.com/

2.1.3.3. BotScout

2.1.3.4. CallSign

2.1.3.5. Digital Resolve

2.1.3.6. Imperva

2.1.3.7. FeedZai

2.1.3.8. Guardian Analytics

2.1.3.8.1. ACH/Wire Transaction Monitoring

2.1.3.9. iovation

2.1.3.10. Kount

2.1.3.11. MarkMonitor

2.1.3.12. namogoo

2.1.3.13. NuData Security

2.1.3.14. Shape Security

2.1.3.15. ShieldSquare

2.1.3.16. Signifyd

2.1.3.17. LexisNexus (Formerly ThreatMetrix)

2.1.3.18. White Ops

2.1.3.19. X-Cart

2.1.3.20. Zenedge

2.1.4. Virtual Appliances

2.1.4.1. Distil Networks

2.1.4.2. Elastic Beam

2.1.4.3. Imperva

2.1.4.4. ShieldSquare

2.2. Website & Ad Malware Monitoring

2.2.1. Ad-Juster

2.2.2. Globalsign

2.2.2.1. Leverages Hackalert

2.2.3. Hackalert

2.2.4. McAfee

2.2.4.1. Siteadvisor

2.2.5. QualysGuard

2.2.6. RiskIQ

2.2.7. Sucuri

2.2.8. The Media Trust

3. Incident Response Legal Services

3.1. Information Law Group

3.2. FoleyHoag

3.3. Ropes & Gray

3.4. Kroll

4. Security Information and Event Management (SIEM), Log Management & Analytics

4.1. Application Security Intelligence Engine

4.1.1. SAP

4.1.1.1. iT-Cube Systems

4.2. Log Management

4.2.1. EventTracker

4.2.2. IGLOO Security

4.2.3. Intel Security

4.2.3.1. McAfee Enterprise Log Manager

4.2.4. Kiwi Syslog Server

4.2.5. LogEntries

4.2.6. LogRythm

4.2.7. LogZilla

4.2.8. Logscape

4.2.9. Open Source

4.2.9.1. Elasticsearch (ELK Stack)

4.2.9.2. SEC (Simple Event Correlator)

4.2.9.3. OSSIM

4.2.9.3.1. http://trac.osgeo.org/ossim/

4.2.9.4. Syslog-NG

4.2.9.5. Octopussy

4.2.9.5.1. http://www.octopussy.pm/

4.2.10. Sawmill

4.2.11. Splunk

4.2.12. Sumo Logic

4.2.13. Tripwire

4.2.14. XpoLog

4.3. SIEM

4.3.1. AlienVault

4.3.1.1. OSSIM

4.3.2. CorreLog

4.3.3. Cybonet

4.3.4. EventTracker

4.3.5. Fortinet

4.3.6. HP

4.3.6.1. Arcsight

4.3.7. Hexis Cyber Solutions

4.3.7.1. Hawkeye AP

4.3.8. IBM

4.3.8.1. Q1Radar

4.3.9. IGLOO Security

4.3.10. LogPoint

4.3.10.1. http://www.logpoint.com/en/

4.3.11. LogRythm

4.3.12. LogZilla

4.3.13. McAfee

4.3.13.1. NitroSecurity

4.3.14. Novell

4.3.14.1. Sentinel

4.3.15. RSA

4.3.15.1. Envision

4.3.16. Sensage

4.3.17. Solarwinds

4.3.18. Splunk

4.3.19. Sqrrl

4.3.20. Tibco

4.3.20.1. Loglogic

4.3.21. eIQnetworks

4.4. Security Analytics

4.4.1. Anomaly Analytics

4.4.1.1. CTILab

4.4.1.2. eMite

4.4.1.3. Intel

4.4.1.4. Niddel

4.4.1.5. Prelert

4.4.1.6. Theta Ray

4.4.1.7. Versive

4.4.2. User and Entity Behavior Analytics (UEBA)

4.4.2.1. Bae Systems Applied Intelligence

4.4.2.2. Bay Dynamics

4.4.2.3. Caspida

4.4.2.4. Click Security

4.4.2.5. CTILab

4.4.2.6. Darktrace

4.4.2.7. Detex Systems

4.4.2.8. Exabeam

4.4.2.9. FICO

4.4.2.10. Fortscale

4.4.2.11. GuruCul

4.4.2.12. HPE

4.4.2.12.1. Formerly Niara

4.4.2.12.2. HAVEn

4.4.2.13. IBM

4.4.2.13.1. Infosphere BIG Insights

4.4.2.14. Intellinx

4.4.2.15. Interset

4.4.2.16. Lockheed Martin

4.4.2.17. Logtrust

4.4.2.18. Microsoft

4.4.2.18.1. Acquired Aorato

4.4.2.19. Mobile System 7

4.4.2.20. Novetta Solutions

4.4.2.21. Oracle

4.4.2.22. Palerra

4.4.2.23. Platfora

4.4.2.24. Rapid7

4.4.2.25. Raytheon

4.4.2.26. Reveelium

4.4.2.27. SAS Institute

4.4.2.28. Secureonix

4.4.2.29. Splunk

4.4.2.30. Veriato

4.4.2.31. ZoneFox

4.4.3. Endpoint User Monitoring

5. Security Operations, Analytics and Reporting

5.1. Security Incident Response Platforms (SIRP)

5.1.1. Agiliance

5.1.2. DFLabs

5.1.3. Demisto

5.1.4. EMC(RSA)

5.1.5. Empow

5.1.6. Fido

5.1.7. Microsoft

5.1.7.1. Formerly Hexadite

5.1.8. ID Experts

5.1.9. Proofpoint

5.1.10. ServiceNow

5.1.11. Siemplify

5.1.12. Syncurity

5.1.13. IBM Resilient

5.1.13.1. Formerly Resilient Systems

5.2. Security Operations Automation Platforms (SOAPS)

5.2.1. Ayehu

5.2.2. Cyberbit

5.2.3. Cybersponse

5.2.4. Demisto

5.2.5. DFLabs

5.2.6. empow security

5.2.7. Fireye

5.2.8. Microsoft

5.2.9. IBM

5.2.10. Komand

5.2.11. LogicHub

5.2.12. Phantom Cyber

5.2.13. Siemplify

5.2.14. Swimlane

5.2.15. Syncurity

5.3. Security Orchestration, Automation and Response (SOAR)

5.3.1. Anomali

5.3.2. Ayehu

5.3.3. Cyber Observer

5.3.4. Cybersponse

5.3.5. Cybraics

5.3.6. Demisto

5.3.7. DFLabs

5.3.8. EclecticIQ

5.3.9. EMC(RSA)

5.3.10. IBM

5.3.11. Microsoft

5.3.12. Proofpoint

5.3.13. Resolve Systems

5.3.14. ServiceNow

5.3.15. Siemplify

5.3.16. Splunk

5.3.16.1. Formerly Phantom

5.3.17. Swimlane

5.3.18. Syncurity

5.3.19. ThreatConnect

5.3.20. ThreatQuotient

5.3.21. WitFoo

5.4. Threat Intelligence

5.5. Vulnerability Assessment/Management (VA/VM/SAST/DAST/PENTEST)

5.5.1. Crowdsourced Application Security Testing Platforms

5.5.1.1. Hyver

5.5.1.2. Applause

5.5.1.3. Bugcrowd

5.5.1.4. BugFinders

5.5.1.5. Cobalt

5.5.1.6. Crowdtesters

5.5.1.7. HackerOne

5.5.2. Managed Penetration Testing Services

5.5.2.1. Cenzic

5.5.2.2. WhiteHatSecurity

5.5.3. Penetration Testing Software

5.5.3.1. Core Security

5.5.3.2. Rapid7

5.5.3.2.1. Metasploit Pro

5.5.3.2.2. Metasploit Express

5.5.3.3. Trustwave

5.5.4. Threat and Vulnerability Management (TVM)

5.5.4.1. Acuity Risk Management

5.5.4.2. Agiliance

5.5.4.3. BeyondTrust

5.5.4.4. Core Security

5.5.4.5. CTILab

5.5.4.6. Cybersponse

5.5.4.7. DFLabs

5.5.4.8. EMC(RSA)

5.5.4.9. Exodus Intelligence

5.5.4.10. Kenna Security

5.5.4.11. Kornic Glory

5.5.4.12. Lithik

5.5.4.13. NopSec

5.5.4.14. Recorded Future

5.5.4.15. RedSeal

5.5.4.16. Revolver RiskVision

5.5.4.17. Risk Based Security

5.5.4.18. RiskSense

5.5.4.19. Siemplify

5.5.4.20. Skybox Security

5.5.4.21. Swimlane

5.5.5. Vulnerability Assessment

5.5.5.1. Software as a Service

5.5.5.1.1. Vulnerability Management

5.5.5.1.2. Phish Testing/Management

5.5.5.2. Network-Based Vulnerability Assessment (On Premise)

5.5.5.2.1. Core Security

5.5.5.2.2. CTILab

5.5.5.2.3. Cybonet

5.5.5.2.4. Digital Defense

5.5.5.2.5. Fortinet

5.5.5.2.6. McAfee

5.5.5.2.7. Ncircle

5.5.5.2.8. Netasq

5.5.5.2.9. NSAuditor

5.5.5.2.10. Outpost24

5.5.5.2.11. Qualys

5.5.5.2.12. RandomStorm

5.5.5.2.13. Rapid 7

5.5.5.2.14. Trustwave

5.5.5.3. Mainframe Vulnerability Assessment

5.5.5.3.1. Key Resources Inc. (KRI)

5.5.5.4. Agent-Based Vulnerability Assessment

5.5.5.4.1. BeyondTrust

5.5.5.4.2. Qualys

5.5.5.4.3. Secunia

5.5.5.4.4. Tenable

5.5.6. Vulnerability Correlation

5.5.6.1. Code DX

5.5.6.2. Core Security

5.5.6.3. Cybric

5.5.6.4. Denim Group

5.5.6.4.1. ThreadFix

5.5.6.5. Kenna Security

5.5.6.6. Kenna Security

5.5.6.7. NopSec

5.5.6.8. NopSec

5.5.6.9. Nucleus Security

5.5.6.10. RiskSense

5.5.6.11. Secure Decisions

5.5.7. Vulnerability Research

5.5.7.1. CSC

5.5.7.2. HP

5.5.7.2.1. DV Labs

5.5.7.3. HotWAN

5.5.7.4. McAfee

5.5.7.5. SecNiche Labs

5.5.7.6. Sourcefire VRT

5.5.7.7. Symantec

5.5.7.8. VRLSec

5.5.7.9. Vupen