Cybersecurity Software in Aerospace and Defense

  • IBM offers category-wise products which include endpoint protection, network protection, mainframe security, application security, data security, security intelligence and operations, advanced fraud detection, cloud, and mobile security and IAM. IBM Identity and access management services help in protecting an organization from breaches, enhances productivity and competitiveness, and achieves and maintains regulatory compliance. It helps in increasing the maturity of the program with identity and access management services from IBM Security. IBM solutions help in detecting and stopping advanced threats. It automates threat detection and response across the enterprise. 

    Read More
    • Enterprise
    • New York, USA
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • HPE security protects digital assets with reassurance from the HPE risk management and digital protection service. HPE offers a different product such as security management, threat, and vulnerability defense. Security Information and Event Management (SIEM), security monitoring, data encryption, and key management, and data protection products included in the security management category. HPE security services provide comprehensive, redundant protection that guides servers and data from threats that exist and threats for the future. Its security risk management workshops, assessments, architecture, design and integration services accelerate digital transformation. HPE addresses vulnerabilities in applications and connection and builds security and compliance into the business.

    Read More
    • Enterprise
    • California, USA
    • Founded: 2015
    • $10BN to $50BN
    • 1,00,001 to 5,00,000
  • McAfee’s strong portfolio of solutions and services, and the ability to serve a wide customer base has helped the company build a strong customer base across multiple regions. McAfee’s innovative offerings make it one of the most trusted and deployed solution providers in the market. The company plans to develop new business models and integrate multi-application solutions as a part of its future strategy. Furthermore, the company plans to expand its presence and strengthen its market position by adopting effective partnership strategies.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1968
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Cisco offers products for a different category such as networking, wireless and mobility, security, collaboration, data center, analytics, video, IoT, and software. Security technology helps IT by simplifying security complexity. Small and mid-sized businesses use networking products of Cisco that secure the organization network architecture, manage connected devices, and make business decisions faster.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1984
    • $10BN to $50BN
    • 50,001 to 75,000
  • Palo Alto Networks offers category-wise products such as Next-Generation Firewalls, Virtualized Next-Generation Firewalls, Management (Panorama), Advanced Endpoint Protection, and SaaS Security. Next-Generation Firewalls include encrypted traffic, application function, based on application, user, and content. The company helps users in  reducing incident response time. It also monitors the firewall traffic, applies global policies, generates reports on patterns, and manages device configuration. 

    Read More
    • Enterprise
    • California, US
    • Founded: 2005
    • $1BN to $5BN
    • 1,001 to 5,000


Below criteria are most commonly used for comparing Cybersecurity Software tools.
  • Breadth and Depth of Product Offerings

    • Licenses

    • Security Type

      Network  | Endpoint  | Application  | Cloud  | Wireless  |
    • Products/Solutions Offered

      Identity and Access Management (IAM) | Risk and Compliance Management  | Encryption  | Data Loss Prevention (DLP) | Unified Threat Management (UTM) | Firewall  | Antivirus/Antimalware  | Intrusion Detection System/Intrusion Prevention System (IDS/IPS) | Security and Vulnerability Management  | Disaster Recovery  | Distributed Denial of Service (DDoS) Mitigation | SIEM |
    • Add-on Product/Solutions

      Security Monitoring | Incident Response | Compliance Management | Others |
  • Product Features and Functionality

    • Services

      Professional Services | Managed Services |
    • Professional Services

      Consulting | Support and Maintenance | Training and Education | Risk & Threat Assessment |
  • Delivery

    • End Users

      System Administrator | ISO | CISO | Others, Please Specify | CIO |
    • Deployment Model

      On-Premises | Cloud |
    • Delivery Mode for Client Location

      Full Time Equivalent | Subscription / Licensing | Per User / Device Basis |
    • Channel of Delivery

      Directly | Through Partners / Third-Party Vendors |
  • Support and Services

    • Level of Support

    • Customer Redressal Mechanism/Program

    • Pre Sales Support

      Software Requirement Specification (SRS) | Product Demos | Proof of Concept | Dedicated Account Manager (DAM) |
    • Channel for Delivery of Support Services

      On-Site Support | Remote Support |
  • Geographic Footprint

    • Direct Presence - North America

    • Direct Presence - Europe

    • Direct Presence - Asia-Pacific

    • Direct Presence - Middle East and Africa

    • Direct Presence - Latin America

    • Sales Offices/Development Centers -North America

    • Sales Offices/Development Centers -Europe

    • Sales Offices/Development Centers -Asia-Pacific

    • Sales Offices/Development Centers -Middle East and Africa

    • Sales Offices/Development Centers -Latin America

    • Indirect Presence - North America

    • Indirect Presence - Europe

    • Indirect Presence - Asia-Pacific

    • Indirect Presence - Middle East and Africa

    • Indirect Presence - Latin America

  • Breadth of Applications Served

    • Tailor-made/customized Solutions

    • Industry Vertical Addition

    • Industry Vertical

      Aerospace and Defense | Government and Public Sector | BFSI | IT and Telecom | Healthcare and Life Sciences | Retail and Consumer Goods | Manufacturing | Energy and Utilities |
    • Application Revenue Slit

      BFSI - Revenue | Manufacturing - Revenue | Government - Revenue | IT & Telecom - Revenue | Aerospace & Defense - Revenue | Retail - Revenue | Healthcare - Revenue | Others - Revenue |
  • Channel Strategy and Fit

    • Distibutors Landscape

    • Business Expansion Strategy

    • Partner Ecosystem

      Distributors | Value Added Resellers (VAR) | System Integrators | Others please specify | Consultants |
  • Viability

    • Latest Revenue

    • Growth Rate

    • % Revenue from Applications

      North America in Revenue | Europe in Revenue | MEA Revenue | APAC Revenue | Latin America in Revenue |
  • Vision Alignment

    • Product Launches

    • New Customers Acquired (Last 1 year)

    • Patents Registered

    • R&D Spend

  • Mergers and Acquisitions Strategy

    • M&A

    • Joint Ventures

    • New Partnerships and Collaborations

  • Total Funding Amount

  • Revenue

  • Funding Status


Looking for Cybersecurity Software? Get help
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#25 in Cybersecurity Software

“Integrated security platform "

It is a complete, shared security platform that comprises SecureSphere Web, Database and File Security. It is very well scales to meet the data center security demands of even the largest organizations.
Chief Product Manager,Company Name Classified
Chief Product Manager, Company Name Classified
#25 in Cybersecurity Software

“HTTP Protocol, Platform, and XML Protection"

SecureSphere applies HTTP standards compliance to stop protocol exploits and evasion techniques. It protect the entire application infrastructure including applications and web server software. Flexible, automated XML security policies protect web services, SOAP, HTML 5 Web Sockets and Web 2.0 applications.
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#25 in Cybersecurity Software

“Granular Correlation Policies Reduce False Positives"

(*)(*)(*)(*)( )4
One of the best feature SecureSphere offers is it differentiates threats from uncommon, but real, behaviour by relating web requests across security layers and over time. SecureSphere relate Attack Validation capability inspects various characteristics such as HTTP protocol conformance, profile violations, signatures, special characters, and user reputation, to exactly alert on or block threat with the lowest rate of false positives in the industry.
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#25 in Cybersecurity Software

“Customizable Reports for Compliance and Forensics"

(*)( )( )( )( )1
SecureSphere provides rich graphical reporting capabilities that allow customers to easily understand security status and meet regulatory compliance. SecureSphere offers both pre-defined and fully-customizable reports that rapidly assess security status and streamline demonstration of compliance with PCI, SOX, HIPAA and FISMA and other compliance standards.
Head - Product Management,Buyer Healthcare
Head - Product Management, Buyer Healthcare
#25 in Cybersecurity Software

“Out-of-the-box SIEM Integration"

(*)(*)( )( )( )2
I really liked the integration of SecureSphere WAF with most of the leading Security Information and Event Management (SIEM) systems such as Splunk, ArcSight, RSA enVision and others. SecureSphere WAF events in any SIEM are automatically indexed and are easily searchable for fast incident response. SecureSphere WAF transfers events as syslog messages in Common Event Format (CEF) and JSON format.