• IBM offers category-wise products which include endpoint protection, network protection, mainframe security, application security, data security, security intelligence and operations, advanced fraud detection, cloud, and mobile security and IAM. IBM Identity and access management services help in protecting an organization from breaches, enhances productivity and competitiveness, and achieves and maintains regulatory compliance. It helps in increasing the maturity of the program with identity and access management services from IBM Security. IBM solutions help in detecting and stopping advanced threats. It automates threat detection and response across the enterprise. 

    Read More
    • Enterprise
    • New York, USA
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • HPE security protects digital assets with reassurance from the HPE risk management and digital protection service. HPE offers a different product such as security management, threat, and vulnerability defense. Security Information and Event Management (SIEM), security monitoring, data encryption, and key management, and data protection products included in the security management category. HPE security services provide comprehensive, redundant protection that guides servers and data from threats that exist and threats for the future. Its security risk management workshops, assessments, architecture, design and integration services accelerate digital transformation. HPE addresses vulnerabilities in applications and connection and builds security and compliance into the business.

    Read More
    • Enterprise
    • California, USA
    • Founded: 2015
    • $10BN to $50BN
    • 1,00,001 to 5,00,000
  • McAfee’s strong portfolio of solutions and services, and the ability to serve a wide customer base has helped the company build a strong customer base across multiple regions. McAfee’s innovative offerings make it one of the most trusted and deployed solution providers in the market. The company plans to develop new business models and integrate multi-application solutions as a part of its future strategy. Furthermore, the company plans to expand its presence and strengthen its market position by adopting effective partnership strategies.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1968
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Cisco offers products for a different category such as networking, wireless and mobility, security, collaboration, data center, analytics, video, IoT, and software. Security technology helps IT by simplifying security complexity. Small and mid-sized businesses use networking products of Cisco that secure the organization network architecture, manage connected devices, and make business decisions faster.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1984
    • $10BN to $50BN
    • 50,001 to 75,000
  • Through Cloud Migration, Trend Micro provides businesses with flexibility in protecting their cloud throughout the migration and expansion process. It facilitates businesses to gain better visibility and provides constant security throughout their cloud environments. The company's cybersecurity solution has the ability to collaborate with leading SIEM platforms to analyze telemetry data for advanced threat detection.

    Read More
    • Enterprise
    • Tokyo, Japan
    • Founded: 1988
    • $1BN to $5BN
    • 5,001 to 10,000
  • Check Point is one of the renowned security software solution vendors. The company is actively focused on providing advanced security solutions for web, data, endpoints, and mobile devices. The cybersecurity solutions offered by Check Point help customers enhance the security layers of external and internal networks. The company provides security offerings that include security management, cloud security, endpoint security, data security, Unified Threat Management (UTM), mobile threat prevention, and network security. The company delivers IT services and security solutions, globally. Moreover, it is a provider of complete security architecture for protecting SMEs and large enterprises from ransomware, malware, and other types of sophisticated fifth generation cyber-attacks.

    Read More
    • Enterprise
    • Tel Aviv, Israel
    • Founded: 1993
    • $1BN to $5BN
    • 1,001 to 5,000
  • Symantec offers category-wise products offerings, which include endpoint and hybrid cloud security, information protection, messaging security, website security, small and mid-sized Business Security Solutions (SMB). Symantec's Website Security offers SSL, Code Signing, and Complete Website Security. SMB offers products such as Endpoint Protection Cloud and Encryption. It protects SMB by securing their website and products.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • Trustwave Managed Detection services analyses the log and event information coming from devices and applications. It helps fast and efficiently make sense of data by providing the platform, processes and people to monitor, detect and alert on threats. It also develop and maintain threat indicators and use cases focused on up-to-the-minute intelligence for both regional and global threats, all delivered by elite SpiderLabs team.

    Read More
    • SME
    • Illinois, USA
    • Founded: 1995
    • $101MN to $500MN
    • 1,001 to 5,000
  • Qualys is one of the global providers of information security and compliance cloud solutions. Qualys offers a wide range of solutions for infrastructure security, cloud infrastructure security, endpoint security, web application security, and compliance. The company also provides security assessment services that include security configuration assessment, security assessment questionnaire, and cloud security assessment.

    Read More
    • SME
    • Redwood City, California, US
    • Founded: 1999
    • $101MN to $500MN
    • 501 to 1,000
  • FireEye has a strong portfolio of cybersecurity solutions, which include network, email, mobile, endpoint, forensics, file management and storage, and security management. . FireEye Helix, FireEye as a service, and threat intelligence come under the category of security operations. FireEye Helix is a unified security platform that simplifies, integrates, and automates security operations.

    Read More
    • SME
    • California, USA
    • Founded: 2004
    • $500MN to $1BN
    • 1,001 to 5,000
  • Palo Alto Networks offers category-wise products such as Next-Generation Firewalls, Virtualized Next-Generation Firewalls, Management (Panorama), Advanced Endpoint Protection, and SaaS Security. Next-Generation Firewalls include encrypted traffic, application function, based on application, user, and content. The company helps users in  reducing incident response time. It also monitors the firewall traffic, applies global policies, generates reports on patterns, and manages device configuration. 

    Read More
    • Enterprise
    • California, US
    • Founded: 2005
    • $1BN to $5BN
    • 1,001 to 5,000
  • Splunk offers cloud services, ES, big data analytics, IT operations, business analytics, and log management. It also offers various services, including technical assessment, community support, training and education, customer support, and project management. The company also helps its users in identifying the hidden security gaps which could probably lead to data breaches and damage their reputation and bottom line. 

    Read More
    • Enterprise
    • San Francisco, California, US
    • Founded: 2003
    • $500MN to $1BN
    • 1,001 to 5,000
  • Kaspersky Lab Threat Intelligence Services provide access to the intelligence that need to mitigate the threats, provided by world-leading team of researchers and analysts. Kaspersky Lab’s knowledge, experience and deep intelligence on every aspect of cybersecurity has made it the trusted partner of the world’s premier law enforcement and government agencies, including INTERPOL and leading CERTs.

    Read More
    • Enterprise
    • Moscow, Russia
    • Founded: 1997
    • $500MN to $1BN
    • 1,001 to 5,000
  • Rapid7’s offers on-premise cybersecurity management solution called Nexpose, which helps in reducing the threat exposure by allowing the assessment and response to be able change in the real time environment and listing risk factors across vulnerabilities, configurations, and controls. Cyber attacks breaches the data at an alarming rate, the attack surface is constantly changing, the adversary is becoming quicker than security teams. Nexpose helps in understanding the attack surface and better security outcomes.

    Read More
    • SME
    • Massachusetts, USA
    • Founded: 2000
    • $101MN to $500MN
    • 1,001 to 5,000
  • CyberArk Security Services accelerate privileged access security programs by providing the knowledge to classify and list the most complex privileged access programs in organization. Once identified, CyberArk Professionals offers strategy, execution and project-management skill to achieve the best privileged access protection solutions. In short, CyberArk Security Services help clients maximize tangible value sooner.

    Read More
    • SME
    • Massachusetts, USA
    • $101MN to $500MN
    • 1,001 to 5,000
  • The company offers products for networking security, routing, switching, application management and orchestration, software defined networking, network management, network edge services, network operating system, identity and policy control, and packet optical. In February 2017, the company partnered with Affirmed Networks to develop solutions.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1996
    • $1BN to $5BN
    • 5,001 to 10,000
  • Fortinet has large category of product offerings such as next-generation Firewall, sandbox, endpoint security, Wi-Fi applications, switching, SIEM, web application firewall, cloud access security, email gateway, DDoS, IAM, and network testing. The company offers high-performance network security solutions to secure organization network, users, and data from threats.

    Read More
    • Enterprise
    • California, USA
    • Founded: 2000
    • $1BN to $5BN
    • 45,001 to 50,000
  • Sophos is a global leader in the network and endpoint security and helps the organization in data security. The company offers product offerings for network, end-user, and server categories with professional services. The company's cyber security solutions are powered by deep learning and Synchronized Security. Sophos Home leverages AI to detect and manage advanced viruses, malware, exploits, and ransomware attacks.

    Read More
    • Enterprise
    • Oxfordshire, UK
    • Founded: 1985
    • $500MN to $1BN
    • 1,001 to 5,000
  • Optiv integrates the deep skills of application security with the knowledge and insight of a broader security solutions. Optiv Security allows organizations to mitigate risk by taking a planned method to cybersecurity. It’s aligned security programs to achieve specific business outcomes with full suite of service abilities from strategy to technology. It reduces security risks by designing an AppSec program that secures growing application environment and meets compliance requirements. It measures development practices and the efficiency of software development lifecycle (SDLC) frameworks to design a complete application security program. The company's Security Architecture and Implementation, navigates complex environments to help clients realize optimal value from their architecture, projects and technology decisions. 

    Read More
    • SME
    • Denver, Colorado, US
    • Founded: 2015
    • 1,001 to 5,000
  • Dell Endpoint Security Suite Enterprise integrates innovative threat prevention with unmatched efficiency against threats and commodity malware. It uses exclusive artificial intelligence (AI) and active mathematical models to analyse files prior to their implementation and determine which are safe and which aren’t, thus restricting malware before it can run. It is built on thousands of indicators derive from careful analyses of millions of real-world activities and known good files. Dell stop threats without cloud connection or frequent updates. The intelligence is built into the endpoint either on physical device or a virtual machine. Dell identify the advanced threat prevention through Dell commercial system BIOS on boot and quickly alert administrators of any possible BIOS tampering.

    Read More
    • Enterprise
    • Texas, USA
    • Founded: 1984
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Logrhythm has developed a platform to seamlessly scale with organization and help detect and respond to threats faster. The LogRhythm NextGen SIEM Platform eliminates blind spots across the enterprise, providing visibility into IT and OT environments. Logrhythm Next-generation solutions plots modern security teams need by improving collaboration and effectiveness through automation and defined processes. The company provides a unified user experience that drives highly efficient workflows, offers real-time visibility into endpoints, and produces assessable results. Logrhythm end-to-end platform helps in detecting threats early in the threat lifecycle. 

    Read More
    • SME
    • Colorado, USA
    • Founded: 2003
    • $101MN to $500MN
    • 1,001 to 5,000
  • Proofpoint Targeted Attack Protection (TAP) is advanced software that comes with innovative approach that senses, examines and restrict advanced threats before it reaches inbox. This includes ransomware and other advanced email threats delivered through malicious attachments and URLs polymorphic malware, weaponized documents and phishing attacks. It also detects threats and risks in cloud apps, connecting email attacks related to credential theft or other attacks.

    Read More
    • Enterprise
    • California, USA
    • Founded: 2002
    • $500MN to $1BN
    • 1,001 to 5,000
  • F-Secure provides a wide range of cyber security solution, which include endpoint protection, cloud protection, advanced threat protection, network protection, email protection, and vulnerability management. The company's solutions enable businesses to be updated with the latest status of threats and incidents by providing customized reports on risk and compliance. F-Secure Protection Service for Business is a cloud-based endpoint protection solution that secures management portals, comupters, mobile devices and servers. 

    Read More
    • SME
    • Helsinki, Finland
    • Founded: 1988
    • $101MN to $500MN
    • 1,001 to 5,000
  • Webroot BrightCloud Threat Intelligence Services protects customers from malicious URLs, IPs, files, and mobile apps by integrating accurate and near real-time threat intelligence into network and endpoint protection. The platform scans billions of IP addresses and billions of URLs across millions of domains, in addition to millions of mobile apps, and leverages machine learning to classify and categorize each according to the threat it represents to business. The company offers tools for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures, and natural disasters. 

    Read More
    • SME
    • Colorado, USA
    • Founded: 1997
    • $101MN to $500MN
    • 101 to 500
  • Imperva provides cloud Web Application Firewall (WAF) that protects applications against all attacks wherever they're located; on-premises, in public or private cloud. The company's WAF is PCI-certified, customizable, SIEM-ready and tuned for detecting and blocking threats with minimal false-positives. It is easy to setup and ensures quick time to benefit. The company helps businesses by setting the standard for protection, innovation, and customization. It’s dynamic profiling ensures any application is protected no matter how complex or unique. It secures databases in the cloud by using common processes and reporting to protect databases from attack, reduce risk, and streamline compliance as one moves databases into AWS and Azure.

    Read More
    • SME
    • California, USA
    • Founded: 2002
    • $51MN to $100MN
    • 501 to 1,000
  • AWS offers various services in the field of computation, storage, networking, machine learning, AI, cybersecurity, Virtual Reality (VR), Augmented Reality (AR), databases, analytics, mobile, IoT, and enterprise applications. The company provides secure technology platforms to all these industry verticals with the utmost reliability, safety, and flexibility. AWS provides businesses with enterprise grade security and analytics solutions that have the ability to deliver total visibility into application traffic.

    Read More
    • Enterprise
    • Washington, USA
    • $10BN to $50BN
    • 40,001 to 45,000
  • F5 Networks is a developer and provider of software-defined application services. F5 Networks’ main technology is a full-proxy, programmable, highly scalable software platform called Traffic Management Operating System (TMOS). F5 Networks’ applications and services include DDoS protection, network traffic management, cloud computing, load balancing, DNS security, application security, and firewalls. The company’s solutions run individually on BIG-IP appliances or as software-only virtual editions. The BIG-IP and VIPRION platforms are application delivery controller technologies. 

    Read More
    • Enterprise
    • Washington, US
    • Founded: 1996
    • $1BN to $5BN
    • 1,001 to 5,000
  • Forcepoint Web Security uses a composite scoring process with the Forcepoint ACE predictive analysis . It’s various real-time content engines analyze full web page content, active scripts, web links, contextual profiles, files and executables. The Forcepoint Web Security advanced threat offers forensic detail reporting on who was attacked, what data was targeted, the data’s intended endpoint and how the attack was executed. It’s security incidents include data theft capture and analyze inbound and outbound communications.

    Read More
    • Enterprise
    • Texas, US
    • Founded: 1994
    • $500MN to $1BN
    • 1,001 to 5,000
  • Micro Focus Cyber Security Services offers expert design, application, consulting, and operational services in the areas of data protection, application security, identity management, and governance, and security operations and cyber defense. The company provides intelligent security operations and cyber defense services to help an organization rapidly detect and respond to malicious security events. It develops threat intelligence, big data, and hunt operations best practices to detect evasive, complex attacks, and previously undiscovered security threats. Microfocus designs, implements, and optimizes solutions that consistently enforce access rights across the business environment and reduces the risk of excessive access. 

    Read More
    • Enterprise
    • Newbury, UK
    • Founded: 1976
    • $1BN to $5BN
    • 10,001 to 15,000
  • Microsoft Services helps in threat detection services through preparation, design, and the implementation of Microsoft Advanced Threat Analytics. Microsoft Advanced Threat Analytics (ATA) provides a simple and fast way to understand what is happening within the network. It identifies suspicious user and device activity with built-in intelligence that provides clear and relevant threat information on a simple attack timeline. Microsoft assists the design and monitors threat to the production environment by user and entity management. Microsoft advanced threat analytics protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents, and improves security posture. It helps in reducing the total surface area of attack by eliminating the exploit options and pathways that adversaries depend on the most. It helps in blocking malicious and suspicious behavior by using advanced runtime analysis.

    Read More
    • Enterprise
    • Washington, USA
    • Founded: 1975
    • More than $100 BN
    • 1,00,001 to 5,00,000

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Cybersecurity Software tools.
4.06
3.87
3.64
  • Breadth and Depth of Product Offerings

    • Licenses

    • Security Type

      Network  | Endpoint  | Application  | Cloud  | Wireless  |
    • Products/Solutions Offered

      Identity and Access Management (IAM) | Risk and Compliance Management  | Encryption  | Data Loss Prevention (DLP) | Unified Threat Management (UTM) | Firewall  | Antivirus/Antimalware  | Intrusion Detection System/Intrusion Prevention System (IDS/IPS) | Security and Vulnerability Management  | Disaster Recovery  | Distributed Denial of Service (DDoS) Mitigation | SIEM |
    • Add-on Product/Solutions

      Security Monitoring | Incident Response | Compliance Management | Others |
  • Product Features and Functionality

    • Services

      Professional Services | Managed Services |
    • Professional Services

      Consulting | Support and Maintenance | Training and Education | Risk & Threat Assessment |
  • Delivery

    • End Users

      System Administrator | ISO | CISO | Others, Please Specify | CIO |
    • Deployment Model

      On-Premises | Cloud |
    • Delivery Mode for Client Location

      Full Time Equivalent | Subscription / Licensing | Per User / Device Basis |
    • Channel of Delivery

      Directly | Through Partners / Third-Party Vendors |
  • Support and Services

    • Level of Support

    • Customer Redressal Mechanism/Program

    • Pre Sales Support

      Software Requirement Specification (SRS) | Product Demos | Proof of Concept | Dedicated Account Manager (DAM) |
    • Channel for Delivery of Support Services

      On-Site Support | Remote Support |
  • Geographic Footprint

    • Direct Presence - North America

    • Direct Presence - Europe

    • Direct Presence - Asia-Pacific

    • Direct Presence - Middle East and Africa

    • Direct Presence - Latin America

    • Sales Offices/Development Centers -North America

    • Sales Offices/Development Centers -Europe

    • Sales Offices/Development Centers -Asia-Pacific

    • Sales Offices/Development Centers -Middle East and Africa

    • Sales Offices/Development Centers -Latin America

    • Indirect Presence - North America

    • Indirect Presence - Europe

    • Indirect Presence - Asia-Pacific

    • Indirect Presence - Middle East and Africa

    • Indirect Presence - Latin America

  • Breadth of Applications Served

    • Tailor-made/customized Solutions

    • Industry Vertical Addition

    • Industry Vertical

      Aerospace and Defense | Government and Public Sector | BFSI | IT and Telecom | Healthcare and Life Sciences | Retail and Consumer Goods | Manufacturing | Energy and Utilities |
    • Application Revenue Slit

      BFSI - Revenue | Manufacturing - Revenue | Government - Revenue | IT & Telecom - Revenue | Aerospace & Defense - Revenue | Retail - Revenue | Healthcare - Revenue | Others - Revenue |
  • Channel Strategy and Fit

    • Distibutors Landscape

    • Business Expansion Strategy

    • Partner Ecosystem

      Distributors | Value Added Resellers (VAR) | System Integrators | Others please specify | Consultants |
  • Viability

    • Latest Revenue

    • Growth Rate

    • % Revenue from Applications

      North America in Revenue | Europe in Revenue | MEA Revenue | APAC Revenue | Latin America in Revenue |
  • Vision Alignment

    • Product Launches

    • New Customers Acquired (Last 1 year)

    • Patents Registered

    • R&D Spend

  • Mergers and Acquisitions Strategy

    • M&A

    • Joint Ventures

    • New Partnerships and Collaborations

  • Total Funding Amount

  • Revenue

  • Funding Status

TOP REVIEWS

Looking for Cybersecurity Software? Get help
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#25 in Cybersecurity Software

“Integrated security platform "

(*)(*)(*)(*)(*)5
It is a complete, shared security platform that comprises SecureSphere Web, Database and File Security. It is very well scales to meet the data center security demands of even the largest organizations.
Chief Product Manager,Company Name Classified
Chief Product Manager, Company Name Classified
#25 in Cybersecurity Software

“HTTP Protocol, Platform, and XML Protection"

(*)(*)(*)(*)(*)5
SecureSphere applies HTTP standards compliance to stop protocol exploits and evasion techniques. It protect the entire application infrastructure including applications and web server software. Flexible, automated XML security policies protect web services, SOAP, HTML 5 Web Sockets and Web 2.0 applications.
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#25 in Cybersecurity Software

“Granular Correlation Policies Reduce False Positives"

(*)(*)(*)(*)( )4
One of the best feature SecureSphere offers is it differentiates threats from uncommon, but real, behaviour by relating web requests across security layers and over time. SecureSphere relate Attack Validation capability inspects various characteristics such as HTTP protocol conformance, profile violations, signatures, special characters, and user reputation, to exactly alert on or block threat with the lowest rate of false positives in the industry.
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#25 in Cybersecurity Software

“Customizable Reports for Compliance and Forensics"

(*)( )( )( )( )1
SecureSphere provides rich graphical reporting capabilities that allow customers to easily understand security status and meet regulatory compliance. SecureSphere offers both pre-defined and fully-customizable reports that rapidly assess security status and streamline demonstration of compliance with PCI, SOX, HIPAA and FISMA and other compliance standards.
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#25 in Cybersecurity Software

“Out-of-the-box SIEM Integration"

(*)(*)( )( )( )2
I really liked the integration of SecureSphere WAF with most of the leading Security Information and Event Management (SIEM) systems such as Splunk, ArcSight, RSA enVision and others. SecureSphere WAF events in any SIEM are automatically indexed and are easily searchable for fast incident response. SecureSphere WAF transfers events as syslog messages in Common Event Format (CEF) and JSON format.