- All Vendors
- (A)
- (B)
- (C)
- (D)
- (F)
- (G)
- (H)
- (I)
- (K)
- (L)
- (M)
- (N)
- (O)
- (P)
- (Q)
- (R)
- (S)
- (T)
- (V)
- (W)
- 0-9
- Antivirus
- Cloud Security and Services
- Data Protection
- DDoS Attack Protection
- Identity Access Management and Governance
- Monitoring Networks - IT
- Monitoring Networks - OT
- Network Access Control
- Network Segmentation
- Remote Access
- Risk Assessment, Quantification and Management
- Social Engineering
- Threat Intelligence
- Vendor
- Zero Trust
802 Secure
802 Secure delivers a SaaS-based IoT Security product that arms our customers with proactive wireless and IoT risk and threat detection and countermeasures.
Alert Logic
Alert Logic seamlessly connects an award-winning security platform, cutting-edge threat intelligence, and expert defenders – to provide the best security and peace of mind for businesses 24/7, regardless of their size or technology environment.
AlertEnterprise
AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems for true prevention of insider threat, fraud, theft, sabotage and acts of terrorism.
Amazon Web Services (AWS)
AWS Audit Manager helps you continuously audit your AWS usage to simplify how you assess risk and compliance with regulations and industry standards.
Ampex
Our primary focus is the success of our customers and partners through the delivery of suitable products, defect-free and on-time, every-time. To this end, our ISO 9001:2015/AS9100D-certified Quality Management System (QMS) challenges us to continually improve our processes, approaches, workmanship and performance. Our BLUE Lighting product is a high speed, high capacity, rugged compute device that can discover, define, analyze and mitigate cyber threats and vulnerabilities.
Aperio Systems
Aperio’s mission is to build solutions ensuring sensor data integrity for critical infrastructures and large-scale industrial facilities. Their data integrity AI engines authenticate the data provided by physical sensors in a plant and validates that it reflects the true state of the system.
Archer Energy Solutions
Archer is a critical infrastructure protection services firm providing the highest grade security, compliance and operational consultants in the business.
Bayshore Networks
Bayshore empowers organizations to turn their passion for safe and efficient production – and business continuity – into power operational insights and improved business outcomes.
BeyondTrust
BeyondTrust's unified solutions offer the industry’s broadest set of privileged access management capabilities with a flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments.
BlackRidge Technology
BlackRidge develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services. With their patented technology, network and server resources located in the enterprise, data centers and cloud systems are better protected and less vulnerable to compromise from cyber-attacks.
BlackStratus
They believe that all businesses deserve high-quality security which is why our products are designed to help companies of all sizes and industries effectively manage their networks, protect critical data and maintain regulatory compliance.
Blue Ridge Networks
Our easy to deploy and proven solutions have been used within U.S. government agencies, enterprises and industrial organizations to provide 24/7 attack prevention for networks, endpoints and other critical assets for when breaches are simply not an option.
Carbon Black
Carbon Black has been a leader in endpoint security for years. With the VMware Carbon Black Cloud™, they are providing an endpoint protection platform to consolidate security and provide you information needed to secure your endpoints, using a single lightweight agent.
Centrify
Centrify is at the forefront of redefining the legacy approach to Privileged Access Management (PAM) with cloud-ready Zero Trust Privilege to secure access to infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise use cases and stop the leading cause of breaches – privileged access abuse.
Centripetal Networks
Internet-connected devices contain a variety of vulnerabilities and security risks – especially since they are a targeted entry point into critical infrastructure (OT/ICS) that contains SCADA and IoT systems and other internal networks. IoT devices have physical limitations due to a small footprint which results in a lack of security.
Certes Networks
Certes Networks Provable Security™ introduces a new way to think about data security and the effectiveness of your security strategy based on the Certes Five Pillars, key performance indicators (KPIs) that are quantifiable, measurable and outcomes driven.
Check Point
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally.
CipherCloud
CipherCloud, the leader in cloud data security, enables companies to adopt the cloud while ensuring data protection, compliance and control.
Cisco
With their integrated portfolio and industry-leading threat intelligence, Cisco gives you the scope, scale, and capabilities to keep up with the complexity and volume of threats. Putting security above everything helps you innovate while keeping your assets safe. Cisco prioritizes security in all that we do. Only with Cisco can you attain effective network security to face tomorrow's evolving threats.
Core Security
Core Security’s analytics-driven approach to security and remediation enables customers to manage access and identify vulnerabilities to minimize risks and maintain continuous compliance.
CyberArk
CyberArk has teamed with the world’s leading technology providers to create the industry's only Privileged Access Security Marketplace with hundreds of certified hardened joint solutions and plug-ins. With CyberArk’s Privileged Access Security Solution, you can meet your compliance requirements and reduce your security risk without introducing additional operational complexity.
CyberProof
CyberProof is a security services company that intelligently manages your organization’s incident detection and response.
CyGlass
CyGlass is an affordable, advanced threat detection solution built for Small and Medium Businesses and the service providers that support them. CyGlass is a Software as a Service application that identifies, detects and responds to network-based cyber attacks in real-time by leveraging our advanced layered Artificial Intelligence approach.
D3 Security
D3 offer a complete security operations platform. Whether you are looking to streamline and standardize procedures, set up automation and orchestration, or leverage the power of MITRE ATT&CK for intent-based response...
Fidelis Security
At Fidelis Cybersecurity, we are committed to helping our customers detect and respond to the advanced threats of today and tomorrow, with powerful technology solutions and services that provide security professionals with the accuracy and context to make faster, more informed decisions.
Firemon Lumeta
FireMon offers proven network security policy management solutions tailored for your hybrid cloud environment.
Forcepoint
Forcepoint offer a systems-oriented approach to insider threat detection and analytics, cloud-based user and application protection, next-gen network protection, data security and systems visibility. It’s a new approach to cybersecurity never seen before.
Fortify Data
FortifyData is a cyber security software company that helps enterprises of all sizes assess, identify and manage their cyber security posture.
Fortinet
From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure. They provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric.
Fortress Information Security
Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US. Fortress specializes in securing the supply chain and industrial assets of North American critical infrastructure, as well as organizations in Transportation, Financial Services, Entertainment, Power Utilities and other sectors.
FoxGuard Solutions
FoxGuard Solutions® is a Virginia based operational technology company that delivers reliable, secure, and configurable solutions to solve technology and compliance challenges faced by critical infrastructure entities. With over three decades of experience, our team focuses on delivering customized Cyber Security, Compliance, and Industrial Computing solutions.
Great Bay Software
They enable our customers to confidently address security and operational challenges stemming from IoT and connected technology. The Great Bay Network Intelligence PlatformTM provides real-time visibility into all network-connected endpoints.
Indegy
Indegy patented technology protects industrial organizations from cyber threats, malicious insiders and human error. We maximize safety, reliability and business continuity for your Industrial Control Systems (ICS) environment. The Indegy Industrial Cybersecurity Suite arms security and operations teams with full visibility, security, and control of ICS activity and threats.
Intellibind
They provide a comprehensive, one-stop resource for services, tools, and training to sustainably meet all NERC Compliance requirements for the Reliability Standards.
IronNet
At IronNet, we deliver behavioral, AI and ML cyberdefense solutions that empower companies, sectors, and nations to collectively defend against advanced cyber threats. IronDefense is our massively scalable Network Traffic Analysis platform that leverages advanced behavioral analysis and integrated hunt to detect cyber threats capable of evading traditional cyber security tools.
IRONSCALES
IRONSCALES is a comprehensive self-learning email security platform for both security teams and employees, designed to quickly detect nefarious emails slipping through traditional anti-phishing defenses, responding to them automatically in seconds, blocking them for good.
ManageEngine
ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget. ManageEngine crafts comprehensive IT management software with a focus on making your job easier.
Micro Focus
D3 offer a complete security operations platform. Whether you are looking to streamline and standardize procedures, set up automation and orchestration, or leverage the power of MITRE ATT&CK for intent-based response...
Network & Security Technologies
They are a nationally recognized, employee-owned and operated consulting firm that, since 2003, serves electric utility market participants with cyber security services focused on NERC CIP, and has been since the UA 1200 Reliability Standards.
Network Perception
Netshield offers affordable, manageable cybersecurity solutions designed specifically for small and mid-sized business networks.
Nozomi Networks
We empower digital transformation by pioneering innovation for industrial cyber security and operational control. Cyber security and rich operational insight are crucial to optimizing industrial processes and quickly delivering new business value.
One Identity
One Identity solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access.
Owl Cyber Defense
Owl is the proven leader in data diode technology, for one-way data transfers, and assured network security against malware, ransomware, control override, and other forms of cyberattack.
Palo Alto Networks
Our technologies give 65,000 enterprise customers the power to protect billions of people worldwide.
Proofpoint
No other cybersecurity vendor has a global intelligence platform that spans email, social and mobile.
Protegrity
Protegrity, a global leader in data security, protects sensitive data everywhere and future-proofs businesses as data-privacy regulations evolve.
Pulse Secure
We are the company that is 100% focused on delivering secure access solutions for people, devices, things and services. For years, enterprises of every size and industry have been trusting our integrated network, cloud, mobile and application access solutions to enable seamless connectivity and empower digital transformation.
Q-Net Security
Q-Net Security, Inc. is an innovative cyber security company based in St. Louis, Missouri. Founded in 2015 by a team of highly acclaimed technologists, engineers and security experts, QNS is driven to provide clean communication channels which leverage the public internet.
Qualys
The Qualys Cloud Platform and its integrated apps help businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications.
Radiflow
Radiflow develops trusted Industrial Cyber-Security Solutions for critical business operations. We offer a complete portfolio of game-changing solutions for ICS/SCADA networks that empowers users to maintain visibility and control of their OT networks, including an Intelligent Threat Detection tool that passively monitors the OT network for anomalies, as well as Secure Gateways that protect OT networks from any deviations from set access policies.
Red Tiger Security
Red Tiger Security is a focused SCADA Security consultancy, training, and research firm dedicated to the resiliency of national critical infrastructure, and mission-critical business systems that must be available on a 24×7 basis.
ReversingLabs
802 Secure delivers a SaaS-based IoT Security product that arms our customers with proactive wireless and IoT risk and threat detection and countermeasures.
Saviynt
Saviynt is a leading provider of Cloud Security and Identity Governance solutions. Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for Cloud (Office 365, AWS, Azure, Salesforce, Workday) and Enterprise (SAP, Oracle EBS). Saviynt is pioneering IGA 2.0 by integrating advanced risk analytics and intelligence with fine-grained privilege management.
Secure-NOK
Traditional cybersecurity protection methods are not tailored for industrial settings and might allow advanced threats to go undetected. That is why we have designed SNOK™ to specifically meet the needs of owners of industrial automation and control systems.
SecureLink
802 Secure delivers a SaaS-based IoT Security product that arms our customers with proactive wireless and IoT risk and threat detection and countermeasures.
Senhasegura
senhasegura is a company that is part of the MT4 Technology group. We develop and provide privileged access management solutions, or PASM – Privileged Access and Session Management.
Siemens
Our holistic approach meets the strictest requirements for data integrity, transfer and monitoring, to ensure your whole system is fully secured. Let’s design and create together to select the solution that best fits your needs and protect your devices, networks and people so you can move forward with full confidence.
TDI Technologies
Our solution provides you a secure, single connection to streamline access and control to any device. All interactions between you and the endpoint devices are managed through ConsoleWorks.
Thales Group
Businesses and governments rely on Thales to bring trust to the billions of digital interactions they have with people. They identity management and data protection technologies help banks exchange funds, people cross borders, energy become smarter and much more.
Thycotic
We make it simple to access, configure and manage your privileged access management solution on your own terms, without sacrificing functionality. Modular, integrated solution lets you start solving problems right away and expand at your own pace, for multiple layers of privileged account protection.
Trend Micro
Over the last three decades, Trend Micro become a market leader in hybrid cloud security, network defense, small business security, and endpoint security.
Verve Industrial Protection
Verve brings together 25 years of industrial controls engineering and the only vendor-agnostic, OT security management and orchestration platform to deliver turnkey security results for our clients. Our focus with Verve has been to improve and simplify reliability, security and compliance within the operational enterprise.
More than 1,000 companies sell cybersecurity products to electric utilities in the U.S. and Canada. This project is designed to organize and evaluate these vendors, and their products and services, to make it easier for utility companies to make informed decisions on products that meet their specific cybersecurity needs.
Explore
Protect Our Power has identified more than 80 topics related to Best Practices for Cybersecurity Solutions. For each topic, we will provide a short overview, a list of the vendors who provide products or solutions that address that topic, and a link to the university or universities evaluating those vendor offerings.
Universities, colleges and research labs are conducting valuable research on vendor product offerings and solutions that address a broad range of cybersecurity issues and challenges. The results of these analyses are published here and will be updated as new information becomes available.
More than 1,000 suppliers and vendors provide hardware and software solutions to the utility industry to address cybersecurity issues and threats. Those vendors are listed here, grouped according to the cybersecurity topic that their product offerings address.