CHAPTER 20
Appendix IV: Alphabetical Listing of AI Security Vendors
Alphabetical Listing of AI Security Vendors
All 549 vendors in the IT-Harvest AI Security taxonomy, listed alphabetically with their market segment classification.
| Vendor | Market Segment |
|---|---|
| 1Fort | Risk Management |
| 1touch | Unclassified |
| 7AI | SOC Automation |
| A10 Networks | Unclassified |
| Abstract Security | Unclassified |
| Acompany | Model Security |
| Activefence | Governance |
| Acuvity | Guardrails |
| Adaptive Security | Deep Fake Defense |
| Adversa | Unclassified |
| Aedilic | Deep Fake Defense |
| Aegisai | Email Security |
| Agat | Unclassified |
| AI Score | |
| Aiceberg | Guardrails |
| Aim Security | Data Security |
| Aiquery | Security Operations |
| Airmdr | MDR |
| AirrivedAI | AI Security |
| Aishield | Unclassified |
| AISLE | |
| AISOC | |
| AIStrike | SOC Automation |
| Aisy | |
| AKA Identity | Identity |
| Akamai | Unclassified |
| Akto | Agent Security |
| Alert AI | Guardrails |
| Allonia | Federated Learning |
| Alltrue AI | Guardrails |
| Almanax | |
| Alpha Level | |
| Alter | AI Agents |
| Amplifier Security | Unclassified |
| Amplify Security | Application Security |
| Anagram | Unclassified |
| Andeavour | Unclassified |
| Andesite | SOC Automation |
| Anetac | |
| Anthropic | Unclassified |
| Anvilogic | SOC Automation |
| Apono | Identity |
| Aptori | Unclassified |
| Arcade | AI Security |
| Arcanna AI | |
| Arcanum | Unclassified |
| Arize AI | Unclassified |
| ArmourZero | Vulnerability Management |
| Arnica | Unclassified |
| Arthur | Guardrails |
| Artiphishell | |
| Asenion | Governance |
| Astelia | |
| Asymmetric Security | |
| Auguria | |
| Aurascape | Data Security |
| Averlon | Risk Management |
| Backline AI | SOC Automation |
| Backslash Security | Code Scanning |
| Baited | Security Awareness Training |
| Bedrock Data | Unclassified |
| BeeKeeperAI | Data Security |
| Bforeai | Unclassified |
| Binary Defense | SOC Automation |
| BitPatrol | Identity |
| Black Kite | Unclassified |
| Blackpoint Cyber | SOC Automation |
| Blink Ops | SOC Automation |
| Block Harbor | IoT Security |
| Blue Lock AI | |
| Blyss | Data Security |
| Bonfy.ai | Data Security |
| Bosch AIShield | Model Security |
| Bricklayer AI | SOC Automation |
| Bugbase | Unclassified |
| Bugcrowd | Penetration Testing |
| Buster.ai | |
| Calvin Risk | Model Security |
| Calypso AI | Guardrails |
| Camelot Secure | |
| Capsule Security | |
| Casco | |
| Cato Networks | Network Security |
| Caveonix | Compliance |
| Centripetal | |
| Charm Security | |
| Cinder | Unclassified |
| CipherData | |
| Ciphero | |
| Circumvent | SOC Automation |
| Cisco | Unclassified |
| Citadel AI | Model Security |
| Clarity | Unclassified |
| Clearly AI | |
| Clearwater | Compliance |
| Cloudflare | Unclassified |
| Cloudsine | Guardrails |
| Clover Security | |
| CodeAnt AI | Code Scanning |
| Coderabbit | Unclassified |
| Cogent | Vulnerability Management |
| Cognition | Unclassified |
| Cognna | |
| Command Zero | |
| Comp AI | Unclassified |
| CompliantLLM | |
| ConductorOne | |
| Confident Security | Guardrails |
| Conifers.ai | |
| Controllo | |
| Coralogix (aporia) | Unclassified |
| Corelight | Network Security |
| Corgea | Unclassified |
| Corridor | Code Scanning |
| Cotool | SOC Automation |
| Cranium | Governance |
| Crash Override | |
| Credal | Guardrails |
| Credo AI | Compliance |
| Crogl | SOC Automation |
| CryptoLab | FHE |
| Culminate Security | SOC Automation |
| Culture AI | Unclassified |
| Cyata | Data Security |
| Cyber Sierra | Compliance |
| Cyberhaven | Unclassified |
| Cybernatics | |
| CyborgDB | |
| Cybral | Penetration Testing |
| Cyclops Security | Data Pipeline/Observability |
| Cyera | Unclassified |
| Cyfox | SOC Automation |
| Cypago | Compliance |
| Cytactic | SOC Automation |
| Cytex | Compliance |
| Cyware | Threat Intelligence |
| D3 Security | Unclassified |
| Darwin | |
| Dash Security | |
| Databricks | Unclassified |
| Datatron | Governance |
| Dawnguard | Security Design |
| Daxa | Data Security |
| Daylight Security | SOC Automation |
| Deepkeep | Model Security |
| Deeptempo | SOC Automation |
| Deeptrust | Deep Fake Defense |
| Deepwatch | SOC Automation |
| DefectDojo | Vulnerability Management |
| Delphos Labs | Application Security |
| Delve | |
| depthfirst | |
| Detections.ai | Detection Engineering |
| Devtron | |
| Discern Security | IT Operations |
| Doppel | Threat Intelligence |
| Dreadnode | Penetration Testing |
| Dream Security | Unclassified |
| Drift | |
| Dropzone AI | SOC Automation |
| Dryrun Security | Application Security |
| Dune Security | Unclassified |
| Dux Security | |
| Dynamo AI | Compliance |
| Edge Delta | SOC Automation |
| Emanate Security | |
| Embed Security | SOC Automation |
| Emperical Security | |
| Enigma Networks | |
| Enkrypt AI | Agent Security |
| Enzai | Governance |
| EQTYLab | Governance |
| Equixly | API Security |
| ETHIACK | Penetration Testing |
| Exaforce | SOC Automation |
| Expel | SOC Automation |
| Extrian | Unclassified |
| F5 | Network Security |
| Fable Security | Unclassified |
| Fabrix Security | Identity |
| Fairly | Unclassified |
| Fiddler | Data Pipeline/Observability |
| Fig Security | |
| FireTail | Unclassified |
| Flower Labs | Federated Learning |
| Fluid Attacks | Application Security |
| Fortyx Security | Email Security |
| Gecko Security | Application Security |
| Geordie | |
| Getreal Labs | Deep Fake Defense |
| Ghost Security | Application Security |
| Ghosteye | Penetration Testing |
| Giskard | Model Security |
| Glasswing AI | Governance |
| Glide Identity | |
| GoComply | |
| Golf | MCP Security |
| Gomboc | Infrastructure Security |
| Gray Swan | Model Security |
| Guardare | Governance |
| GuardDog | |
| GuardiAgent | |
| GuardionAI | |
| Guardrails AI | Governance |
| Haize Labs | Model Security |
| Haleum | Fraud Prevention |
| Harmonic Security | Data Security |
| Harmony | Vulnerability Management |
| Heeler | Code Scanning |
| Helmet Security | MCP Security |
| Hewlett Packard Enterprise | Unclassified |
| HiddenLayer | |
| Hivetrace | Guardrails |
| Holistic AI | Governance |
| Hopper | Application Security |
| HoundDog | Risk Management |
| HTCD | SOC Automation |
| Humanix | |
| Huntbase | |
| Hunters | SOC Automation |
| Huntr | |
| Hush | Unclassified |
| Hydrox AI | Compliance |
| Hypergameai | SOC Automation |
| Hyperproof | Compliance |
| IAMONES | |
| IBM | Unclassified |
| Identity Machines | AI Agents |
| IdentityFirst | |
| Imper | Deep Fake Defense |
| Imperum | |
| Imperva | Unclassified |
| Inception Cyber | Unclassified |
| Indykite | Unclassified |
| Integrate AI | Federated Learning |
| intentyx | |
| Intezer | |
| Invariant Labs | AI Agents |
| Irregular | Model Security |
| Island | Application Security |
| isVerified | |
| Javelin | |
| Jazz Security | Unclassified |
| Jedsec | Penetration Testing |
| Jericho Security | Security Awareness Training |
| Karini AI | Unclassified |
| Kenzo Security | |
| Keycard | Identity |
| Keytos | Identity |
| Kikimora | Vulnerability Management |
| Kindo | Agent Security |
| Kipling Secure | Guardrails |
| Knostic | Guardrails |
| Konfer | Governance |
| Kovrr | Risk Management |
| Kriptos | Data Security |
| krixo | |
| Lakera | Model Security |
| LangGuard AI | |
| Lasso | Model Security |
| Lattica | FHE |
| Leanix | Unclassified |
| Legion Security | |
| Legit Security | Application Security |
| Lema | |
| Level 6 Cybersecurity | Risk Management |
| Liminal Security | Identity |
| Linx Security | Unclassified |
| Lockchain | Risk Management |
| Loti | Unclassified |
| Lumenova | Governance |
| Lumeus AI | Unclassified |
| Lumia | Guardrails |
| Lunar.dev | |
| Lynx | Fraud Prevention |
| Maaya Ai | Vulnerability Management |
| Magic Mirror2 | Governance |
| MagicMirror | |
| Mallory.ai | |
| Maro | Governance |
| Mate Security | |
| Matvis | Unclassified |
| Mave | |
| Maze | Vulnerability Management |
| Menaya | Penetration Testing |
| Method Security | |
| Metomic | Unclassified |
| Mimecast | Email Security |
| Mind | Vulnerability Management |
| MindFort | Vulnerability Management |
| Mindgard | Vulnerability Management |
| Mirage | Deep Fake Defense |
| Mirror Security | Model Security |
| Miru Labs | |
| Mithril-Security | Governance |
| Mlcode | Unclassified |
| Mobb | Unclassified |
| Modelmetry | Unclassified |
| Monitaur | Governance |
| Morado | Threat Intelligence |
| Mountain Theory | Vulnerability Management |
| Multifactor | AI Agents |
| Nagomi | Risk Management |
| Natoma | Identity |
| Nebulock | |
| Neovera | SOC Automation |
| Netarx | Deep Fake Defense |
| Netskope | Unclassified |
| NeuralTrust | Guardrails |
| Neurocat | Data Security |
| Nexos | Guardrails |
| NexusFlow-AI | Unclassified |
| NightFall | Unclassified |
| Noma Security | Model Security |
| NOTHREAT | IoT Security |
| Novee Security | |
| Nroc-Security | Unclassified |
| Nua | SOC Automation |
| Nudge Security | |
| Nullify | Application Security |
| Oasis Security | |
| Observo AI | |
| Octosight | Vulnerability Management |
| OffensAi | Penetration Testing |
| Onyxia Cyber | Security Operations |
| Opaque-Systems | Data Security |
| Openlayer | Unclassified |
| OpenShield | Model Security |
| Operant AI | Application Security |
| Opnova | |
| Opsera | |
| Opsin-Security | Unclassified |
| Opti | Identity |
| OptIQ | Identity |
| Orchid Security | Unclassified |
| Orion Security | Guardrails |
| oso | Unclassified |
| Outtake | Deep Fake Defense |
| OutThink | Unclassified |
| Ovalix | Guardrails |
| Overwatch Data | Fraud Prevention |
| Pallma AI | |
| Palo-Alto-Network | Unclassified |
| Pangea-Cyber | Guardrails |
| Pegasi | Unclassified |
| Pentera | Penetration Testing |
| Pillar Security | AI Runtime Security |
| Pixee | Application Security |
| Plerion | |
| PointGuard-AI | Model Security |
| Polyguard | Deep Fake Defense |
| Portal26 | Governance |
| PRE Security | |
| Preamble | |
| Prediction Guard | |
| Priam Cyber AI | |
| Prime Security | Code Security |
| Privasea AB | Data Security |
| Private-ai | Unclassified |
| Prompt Security | |
| PromptArmor | |
| Promptfoo | Model Security |
| Prophet Security | SOC Automation |
| Protect AI | Model Security |
| Protecto | Unclassified |
| Protexxa | |
| Prowler | Risk Management |
| Pynt | API Security |
| Qevlar | |
| Qomplx | Risk Management |
| Qualifire | Guardrails |
| Quantara AI | Unclassified |
| Quantpi | Compliance |
| Quantum Integrity | Identity |
| QueryPie | AI Security |
| Quilr | Agent Security |
| Radiant Security | |
| Radware | SOC Automation |
| RangersAI | Unclassified |
| Rapid7 | Vulnerability Management |
| Ravenmail | Unclassified |
| Reach Security | Unclassified |
| Reality Defender | Deep Fake Defense |
| Redblock | |
| RedCarbon | |
| Redcoat AI | Security Awareness Training |
| RedRok | Vulnerability Management |
| Reken | Governance |
| RemoteThreat | |
| Repello AI | Penetration Testing |
| Resemble AI | Deep Fake Defense |
| Resourcely | Infrastructure Security |
| RevEng | Application Security |
| Ridge Security | Penetration Testing |
| RIIG | SOC Automation |
| Riot Security | Unclassified |
| Riskapp | Compliance |
| Robust Intelligence | Unclassified |
| Root | Vulnerability Management |
| Rotate | MDR |
| Roundtable | |
| RunReveal | Data Pipeline/Observability |
| RunSybil | |
| Safe Intelligence | Unclassified |
| Safe Security | |
| SafeBrain.AI | Data Security |
| SafeBreach | Unclassified |
| Saidot.ai | Governance |
| SailPoint | Identity |
| Salience Cyber | |
| Sarus | Data Security |
| Satori | Unclassified |
| ScamGuardian | Fraud Prevention |
| Scamnetic | Unclassified |
| ScourNomad | Penetration Testing |
| Scribe | Unclassified |
| SecAI | Threat Intelligence |
| Seceon | SOC Automation |
| Secure | SOC Automation |
| Secure.com | |
| Securiti | Unclassified |
| Secuvy | Unclassified |
| Seezo | Application Security |
| Sekoia | SOC Automation |
| Sense Defence | Application Security |
| Sentra | Unclassified |
| Sentrilite | SOC Automation |
| Sevii | Unclassified |
| Shiboleth | |
| Simbian | SOC Automation |
| Singulr AI | Governance |
| Skadi | MSSP |
| Skyflow | Unclassified |
| Skyld | AI Protection |
| Slauth | Governance |
| Sn1per Security | Penetration Testing |
| Socratix AI | Unclassified |
| Sola | Security Agent |
| SolidCore | Governance |
| Sonoma Security | MCP Security |
| Sovereign AISecurity Labs | Governance |
| Spacewalk AI | Unclassified |
| SpartanX | Unclassified |
| Specular | |
| spiky-ai | Unclassified |
| SplxAI | Governance |
| Stairwell | Threat Intelligence |
| Staris | Code Scanning |
| StealthMole | Threat Intelligence |
| Stellar Cyber | SOC Automation |
| Strac | Unclassified |
| Straiker | Model Security |
| Strike48 | |
| StrikeReady | SOC Automation |
| StrongestLayer | |
| Styrk | Vulnerability Management |
| Sublime Security | Email Security |
| Superagent | |
| Superalign | Governance |
| Surepathai | Guardrails |
| Surf.ai | |
| Suzan | Governance |
| Sweet Security | CNAPP |
| Swif | Governance |
| Swift Security | Guardrails |
| Sxipher | Penetration Testing |
| Symbiotic Security | Vulnerability Management |
| Sysdig | Unclassified |
| System Two Security | SOC Automation |
| Tamnoon | MSSP |
| TandemTrace | |
| Tenable (apex) | Unclassified |
| Tencyle | SOC Automation |
| Tenex AI | SOC Automation |
| Tensoroperaai | Federated Learning |
| Tenzai | Penetration Testing |
| Terracotta AI | Application Security |
| Terratrue | Unclassified |
| Testsavant | Model Security |
| Theorem | |
| Theori | Code Scanning |
| ThirdLaw | |
| ThreatCanary | Vulnerability Management |
| ThreatMon | Threat Intelligence |
| Tibo | Unclassified |
| Tier4 AI | SOC Automation |
| Tier4ai | SOC Automation |
| Tinfoil | Data Security |
| Titaniam | Unclassified |
| Token Security | |
| Tonic AI | Data Security |
| Top Hat | Unclassified |
| Torch | Identity |
| Torq | SOC Automation |
| Tracecat | |
| Tracer | Threat Intelligence |
| Transilience AI | Unclassified |
| Trend Micro | Unclassified |
| Troj AI | Model Security |
| TrojanVectors | Unclassified |
| Truepic | Unclassified |
| Trustcloud | Unclassified |
| Trustible | Governance |
| Trustmi | Email Security |
| Trustwise | Guardrails |
| Tumeryk | Guardrails |
| Tuskira | Penetration Testing |
| Twine Security | AI for Security |
| UMCA Technologies | Fraud Prevention |
| Unbound | Agent Security |
| Uncov AI | Governance |
| Unosecur | Unclassified |
| UprootSecurity | Penetration Testing |
| Usage-Panda | API Security |
| Vali Cyber | Endpoint Security |
| Validia | Deep Fake Defense |
| Validmind | Unclassified |
| Variance | SOC Automation |
| Vega.io | Data Security |
| Verax AI | Guardrails |
| Veria Labs | |
| Vertiv | Unclassified |
| vijil security | Agent Security |
| Vinci Logic | SOC Automation |
| Virtue AI | |
| Vorlon | SaaS Security |
| Vulnetic | Penetration Testing |
| Wald AI | Model Security |
| Weagle | |
| Whylabs | Unclassified |
| WideField | Unclassified |
| Winfunc (asterisk) | Unclassified |
| Wisebee | Unclassified |
| Witness AI | Governance |
| Wiz | Cloud Security |
| Wodan | FHE |
| Wraithwatch | |
| XBOW | Application Security |
| Xenonstack | Unclassified |
| Zafran | Vulnerability Management |
| Zania | Compliance |
| Zaun | SOC Automation |
| Zenguard AI | Agent Security |
| Zenity | SOC Automation |
| ZeroDrift | |
| ZeroPath | Vulnerability Management |
| Zest Security | Vulnerability Management |
| Ziosec | Unclassified |
| Zynap |
