As 150 maiores empresas de segurança cibernética para acompanhar em 2020
7 de abril de 2020Annual list of the world’s hottest pure-play cybersecurity companies Selection Criteria
A10 Networks | 2004 | San Jose, CA | Security Analytics & Management |
Absolute | 1993 | Vancouver, Canada | Endpoint Visibility & Control Platform |
Agari | 2009 | Foster City CA | Next Generation Secure Email Cloud |
Aqua Security | 2015 | Ramat Gan, Israel | Container Security Platform |
Arctic Wolf | 2012 | Waterloo, Canada | Managed Detection & Response |
Armor | 2009 | Berkshire UK | Threat Prevention & Response |
Arxan | 2001 | San Francisco CA | Application Protection Solutions |
Attivo Networks | 2011 | Fremont CA | Cyber Deception Platform |
Auth0 | 2013 | Bellevue WA | Authentication & Authorization |
Avanan | 2014 | New York City NY | Cloud Email Security Platform |
Avast | 1988 | Prague, Czech Republic | Security for Consumers & Business |
Avira | 2006 | Munich, Germany | Antivirus for Consumers & Business |
Awake | 2014 | Santa Clara CA | Analytics, AI & Machine Learning |
Barracuda Networks | 2003 | Campbell CA | Email, App, Data & Cloud Security |
Berkeley Varitronics | 1972 | Metuchen NJ | Wireless Threat Detection Tools |
BeyondTrust | 2006 | Johns Creek GA | Privileged Access Management |
BigID | 2015 | Tel-Aviv, Israel | Personal Data Protection & Privacy |
Bitdefender | 2001 | Bucharest, Romania | Cybersecurity for Home & Business |
Bitglass | 2013 | Campbell CA | Cloud Data & Threat Protection |
BitSight | 2011 | Boston MA | Security Ratings Platform |
BlackBerry | 1984 | Waterloo, Canada | End-to-End IoT Security Solutions |
BlueVoyant | 2017 | New York City NY | Managed Security Services |
Bugcrowd | 2011 | San Francisco CA | Crowdsourced Security Platform |
Callsign | 2012 | London, UK | Intelligence Driven Authentication |
Capsule8 | 2016 | New York City NY | Attack Protection for Linux |
Cato Networks | 2015 | Tel-Aviv, Israel | Converged Network & Security |
Centrify | 2004 | Santa Clara CA | Privileged Access Management |
Cequence Security | 2013 | Sunnyvale CA | Application Security Platform |
Check Point Software | 1993 | Tel Aviv, Israel | Cybersecurity Solutions & Services |
Checkmarx | 2006 | Ramat Gan, Israel | Software Exposure Platform |
Cimcor | 1997 | Merrillville IN | IT Integrity, Security & Compliance |
Claroty | 2014 | Tel-Aviv, Israel | Cybersecurity for ICS/OT |
CloudPassage | 2010 | San Francisco CA | Cloud Infrastructure Security |
Code42 | 2001 | Minneapolis MN | Insider Threat Protection |
Contrast Security | 2014 | Los Altos CA | Application Security Platform |
CrowdStrike | 2011 | Sunnyvale CA | Endpoint Protection Platform |
CyberArk | 1999 | Petah Tikva, Israel | Privileged Access Security |
Cyberbit | 2015 | Ra’anana, Israel | Cyber Range Training & Simulation |
Cybereason | 2012 | Boston MA | Cyber Defense & Response Platform |
Cybrary | 2015 | College Park MD | Free Online Cybersecurity Training |
Darktrace | 2013 | Cambridge, UK | Artificial Intelligence for Cybersecurity |
Deep Instinct | 2015 | New York City NY | Deep Learning Cybersecurity |
Digital Defense | 1999 | San Antonio TX | Vulnerability & Threat Management |
Digital Guardian | 2003 | Waltham MA | Enterprise Data Loss Prevention |
Digital Shadows | 2011 | London, UK | Digital Risk Protection Solutions |
DomainTools | 2002 | Seattle WA | Threat Intelligence & Investigation |
Dragos, Inc. | 2013 | Hanover MD | Industrial Control Systems Security |
Entrust Datacard | 1994 | Minneapolis MN | Trusted Identity Technologies |
eSentire | 2001 | Waterloo, Canada | Managed Detection & Response |
ESET | 1992 | Bratislava, Slovakia | Cybersecurity for Home & Business |
Exabeam | 2013 | San Mateo CA | Cybersecurity Management Platform |
Expanse | 2012 | San Francisco CA | Cloud Asset Discovery & Monitoring |
Expel | 2016 | Herndon VA | Managed Detection & Response |
F-Secure | 1999 | Helsinki, Finland | Cybersecurity for Home & Business |
F5 | 1996 | Seattle WA | Application & Infrastructure Security |
FireEye | 2004 | Milpitas CA | Cybersecurity Solutions & Services |
Fishtech Group | 2015 | Kansas City MO | Cybersecurity Consulting & Services |
Forcepoint | 2016 | Austin TX | Integrated Cloud Security Platform |
Forescout | 2000 | San Jose CA | Unified Device Visibility for IT & OT |
ForgeRock | 2010 | San Francisco CA | Identity & Access Management |
Fortalice | 2008 | Charlotte NC | Customized Cyber Defense Services |
Fortinet | 2000 | Sunnyvale CA | End-to-End Infrastructure Security |
GM Security | 1970 | San Juan, Puerto Rico | Managed Security Services |
GreatHorn | 2015 | Waltham MA | Email Threat Protection Platform |
GuardiCore | 2013 | Tel-Aviv, Israel | Data Center & Cloud Security |
GuidePoint Security | 2011 | Herndon VA | Cybersecurity Professional Services |
HackerOne | 2012 | San Francisco CA | Bug Bounty Program Management |
Herjavec Group | 2003 | Toronto, Canada | Managed Security Services |
HYPR | 2014 | New York City NY | Secure Authentication Platform |
Hysolate | 2016 | Tel-Aviv, Israel | Software-Defined Endpoints |
iboss | 2003 | Boston MA | Secure Cloud Gateway |
Illumio | 2013 | Sunnyvale CA | Adaptive Micro-Segmentation |
Imperva | 2002 | Redwood Shores CA | Data & Application Security |
Imprivata | 2001 | Lexington MA | Cyberecurity for Healthcare Providers |
IntSights | 2015 | New York City NY | External Threat Protection Suite |
Ionic | 2011 | Atlanta GA | Enterprise Data Protection Engine |
IronNet | 2014 | Fulton MD | Advanced Cyber Threat Detection |
IronScales | 2013 | Tel Aviv, Israel | Phishing Response Platform |
JASK | 2016 | Austin TX | Cloud-Native SIEM Platform |
Karamba Security | 2015 | Hod Hasharon, Israel | Embedded Cybersecurity Solutions |
Kaspersky | 1997 | Moscow, Russia | Cybersecurity for Home & Business |
Kenna Security | 2009 | San Francisco CA | Risk-Based Vulnerability Management |
KnowBe4 | 2010 | Clearwater FL | Security Awareness Training Platform |
LogRhythm | 2003 | Boulder CO | Next Generation SIEM Platform |
LookingGlass | 2006 | Reston VA | Threat Intelligence & Response Platform |
Lookout | 2007 | San Francisco CA | Mobile Endpoint Security |
McAfee | 1987 | Santa Clara CA | Device-to-Cloud Cybersecurity |
Menlo Security | 2012 | Palo Alto CA | Internet Isolation Platform |
Mimecast | 2003 | London, UK | Email, Data, & Web Security |
Mitek | 1986 | San Diego CA | Digital Identity Verification |
MobileIron | 2007 | Mountain View CA | Enterprise Mobility Management |
Mocana | 2002 | Sunnyvale CA | End-to-End Cybersecurity System |
Morphisec | 2014 | Beer-Sheva, Israel | Unified Threat Prevention Platform |
NCC Group | 1999 | Manchester, UK | Cybersecurity & Risk Mitigation |
Netskope | 2012 | Santa Clara CA | Cloud, Network & Data Security |
Okta | 2009 | San Francisco CA | Identity & Access Management Platform |
OneLogin | 2009 | San Francisco CA | Identity & Access Management Platform |
Optiv | 2015 | Denver CO | Cybersecurity Solutions Integrator |
Palo Alto Networks | 2005 | Santa Clara CA | Cyber Threat Detection & Prevention |
Payfone | 2008 | New York City NY | Digital Trust & Identity Authentication |
Pindrop Security | 2011 | Atlanta GA | Cybersecurity for Call Centers |
Ping Identity | 2001 | Denver CO | Intelligent Identity Platform |
Proofpoint | 2002 | Sunnyvale CA | People-Centric Security & Compliance |
Qualys | 1999 | Foster City CA | IT Security & Compliance Platform |
Rapid7 | 2007 | Boston MA | Enterprise Cloud Security Platform |
Recorded Future | 2009 | Somerville MA | Universal Threat Intelligence Solution |
Red Canary | 2013 | Denver CO | Security Operations Management |
RedSeal | 2004 | San Jose CA | Cyber Risk Modeling & Scoring |
Respond Software | 2016 | Mountain View CA | Security Operations Center Software |
ReversingLabs | 2009 | Cambridge MA | Advanced Malware Analysis Platform |
RSA | 1982 | Bedford MA | Digital Risk Management Solutions |
SafeBreach | 2014 | Tel Aviv, Israel | Data Breach & Attack Simulation |
SailPoint | 2005 | Austin TX | Cloud Identity Governance Platform |
SCADAfence | 2014 | Tel Aviv, Israel | Cybersecurity for Industrial Networks |
SecureAuth | 2005 | Irvine CA | Identity & Access Management Platform |
Secureworks | 1999 | Atlanta GA | Cybersecurity Solutions & Services |
SecurityScorecard | 2013 | New York City NY | Cybersecurity Ratings Platform |
SentinelOne | 2013 | Mountain View CA | Next-Generation Endpoint Protection |
Shape Security | 2011 | Santa Clara CA | Application Security & Fraud Prevention |
Siemplify | 2015 | New York City NY | Security Orchestration & Automation |
Skybox Security | 2002 | San Jose CA | Risk Analytics for Cybersecurity |
Sonatype | 2008 | Fulton MD | Open Source Security Management |
SonicWall | 1991 | San Jose CA | Cybersecurity Products & Services |
Sophos | 1985 | Abingdon, UK | Cybersecurity for Home & Business |
Sumo Logic | 2010 | Redwood City CA | Cloud Operations & Security Analytics |
Symantec | 1982 | Mountain View CA | Integrated Cyber Defense Platform |
Synack | 2013 | Redwood City CA | Crowdsourced Penetration Testing |
Tanium | 2007 | Emeryville CA | Endpoint Visibility & Control Platform |
Telos | 1969 | Ashburn VA | Cybersecurity Solutions & Services |
Tempered Networks | 2012 | Seattle WA | Identity Defined Networking |
Tenable | 2002 | Columbia MD | Cyber Exposure Platform |
ThetaRay | 2013 | Hod HaSharon, Israel | Big Data Security Analytics |
ThreatConnect | 2011 | Arlington VA | Threat-Centric Security Operations |
ThreatQuotient | 2013 | Reston VA | Threat Intelligence Platform |
Thycotic | 1996 | Washington DC | Privileged Account Management |
Tigera | 2016 | San Francisco CA | Kubernetes Network Security |
Trend Micro | 1988 | Tokyo, Japan | Cybersecurity Products & Solutions |
Tripwire | 1997 | Portland OR | Cybersecurity & Compliance Solutions |
Tufin | 2005 | Tel Aviv, Israel | Network Security Policy Orchestration |
ValiMail | 2015 | San Francisco CA | Cloud-Based Email Security |
Varonis | 2005 | New York City NY | Enterprise Data Security Platform |
VDOO | 2017 | Tel-Aviv, Israel | End-to-End IoT Security Platform |
Vectra | 2010 | San Jose CA | Intelligent Threat Detection & Response |
Venafi | 2000 | Salt Lake City UT | Machine Identity Protection |
Veracode | 2006 | Burlington MA | Application Security Platform |
WatchGuard | 1996 | Seattle WA | Cybersecurity Products & Services |
Webroot | 1997 | Broomfield CO | Threat Intelligence for Cybersecurity |
ZeroFOX | 2013 | Baltimore MD | Social Media & Digital Protection |
ZixCorp | 1988 | Dallas TX | Email Encryption & Security Solutions |
Zscaler | 2008 | San Jose CA | Enterprise Cloud Security Platform |
Essa é uma seleção feita por Steve Morgan é fundador e editor-chefe da Cybercrime Magazine e Cybersecurity Ventures. Seus blogs e artigos podem ser vistos na CSO, DarkReading, Entrepreneur, Forbes, IDG e outros.