Quick Degree Finder
Businessresearchguide.com is an advertising-supported site. Featured or trusted partner programs and all school search, finder, or match results are for schools that compensate us. This compensation does not influence our school rankings, resource guides, or other editorially-independent information published on this site.

Top 30 IT Security Companies

it security companiesIT security companies assist Information Technology departments and entire companies in preventing addressing security threats in the enterprise. ┬áTraditionally, IT has focused on security within the walls of the company – desktops, servers, networks, and databases. ┬áThe advent of mobile computing and virtualization has expanded the range of potential security threats, making the role of IT security even more important.

Ranking the Top 30 IT Security Companies

In order to make our list of the top IT security companies, a company must have a track record of providing reputable IT security solutions in crucial security areas. They also need to show aggressive thought leadership in understanding and attacking current and potential threat areas. Here are the top 30 IT Security Companies and the key areas in which they operate.

Sponsored Research from IT Security Companies and Others

The Top 30 IT Security Companies

#1 – Absolute Software

  • Mobile device management
  • Layered approach for endpoint security and management
  • Data protection for IT / Freedom for Laptop users
  • iPad and iPhone security
  • Security in a high growth IT environment
  • Tracking and securing laptops
  • Managing Macs in a Windows environment
  • Human Factor in Laptop encryption
  • Migrate to Snow Leopard in 3 steps
  • Client-side Defense for Stolen Laptops
  • Reducing risks and maximizing returns in mobile management
  • Managing risk of personal devices

#2 – HP

  • Software security in the Cloud
  • Steps to delivering more secure software
  • Global records compliance
  • Maximizing return on VMWare
  • Expand the scope of Application Security initiative
  • Software vulnerabilities with eVoting
  • PCI compliance
  • Open source and security

#3 – Trend Micro

  • Mobile device data protection
  • Securing eHealth applications
  • Encryption
  • Data protection at midsize organizations
  • DLP
  • Compliance requirements for privacy, data retention, and e-discovery
  • Protecting sensitive information

#4 – NetIQ

  • Insider threats
  • Security management solutions and Novell
  • Privileged identity management
  • PCI compliance
  • Sustainable compliance
  • Automating IT security audits
  • Security and HIPAA compliance
  • Challenges of administering Active Directory
  • ROI from PCI DSS investment
  • PCI file integrity monitoring

#5 – Symantec / Verisign

  • Business Security and SSL
  • Choosing a Cloud Hosting Provider
  • Protection from Firesheep and other Sidejacking Attacks
  • Best Practices in TLS/SSL
  • Extended Validation SSL
  • Malware Security

#6 – WatchGuard

  • Cyberbullying
  • Data loss prevention
  • Email encryption: cost and complexity
  • Cloud based web security
  • Threat landscape and the retail industry

#7 – ScriptLogic

  • Manage access across a Windows network environment
  • File server migration and permissions
  • PCI compliance and ScriptLogic
  • Logon script replacement
  • Group policy

#8 – GeoTrust

  • Protecting your website against Phishing Scams
  • Choosing a Cloud provider
  • Fundamental website security & SSL
  • Successful selling on the web
  • Securing multiple domains with SSL

#9 – BrainLoop

  • Security and information sharing
  • Security policy
  • Enterprise information management and security
  • Managing information risk
  • Security and compliance in online collaboration

#10 – Blue Coat

  • WAN optimization
  • WebFilter categories
  • Malware delivery networks
  • Social networking and network security objectives
  • Risks of social media

#11 – Dell / Dell Storage

  • Dell Compellent and Optimizing VM Server Virtualization
  • Data protection & disaster recovery with EqualLogix and VMWare
  • Flexible SAN for Private Cloud

#12 – IBM

  • Databases and Security
  • Databases at Risk
  • Database Auditing to Improve Security

#13 – BMC Software

  • Cloud based delivery model for IT service management
  • Effective Cloud planning and design
  • Improving Agility, TCO, and Security with Agentless Job Scheduling

#14 – EdgeWave

  • Email security and blended threats
  • Web filtering solutions
  • E-policy best practices

#15 – Riverbed

  • Chalk Talk Disaster Recovery
  • WAN Optimization and Distaster Recovery
  • Stingray Traffic Manager
  • Steelhead Appliances

#16 – CA Technologies

  • Access management in a virtual environment
  • Defending against insider threats
  • ITSM and cloud computing

#17 – Sophos

  • Stopping Fake Antivirus
  • Mobile device security

#18 – Tripwire

  • Monitoring and preventing cyber security breaches
  • Data protection

#19 – Quest Software

  • Backup and Recovery in Virtual Environments

#20 – EMC Corporation

  • Staying ahead of data protection challenges
  • Backup and recovery

#21 – NimSoft

  • Best monitoring practices in a virtual environment
  • Cloud service delivery models

#22 – Secunia

  • Threat of end-user PC
  • Security state of SCADA software systems
  • Cybercriminals and administrative access

#23 – ESET

  • Endpoint security solutions
  • TDL
  • Protecting business from slowdowns

#24 – GFI

  • Network scanner and vulnerability management solutions
  • Vulnerability management tool

#25 – OKTA

  • Identity & access management challenges with SAAS
  • Active Directory and SAAS

#26 – SourceFire

  • Firewall Security – Four Keys to Effective “Next-Generation” Security

#27 – Quorum Labs

  • Back up and recovery for small businesses

#28 – WebSense

  • Data theft
  • Patient records, passwords, and financial transactions
  • Cyber theft

#29 – Experian

  • Incident management, reporting, and notification
  • Identity protection

#30 – Century Link Business

  • Data Protection / Payment Card Industry
  • Building a Disaster Ready Infrastructure
  • IPv6
  • Customers and data protection

Additional IT Security Companies

Check back as we expand this list of IT Security Companies.

Filed under: IT Security Solutions, IT Security Issues, IT Security Companies