CHAPTER 20

Appendix IV: Alphabetical Listing of AI Security Vendors

Alphabetical Listing of AI Security Vendors

All 549 vendors in the IT-Harvest AI Security taxonomy, listed alphabetically with their market segment classification.

VendorMarket Segment
1FortRisk Management
1touchUnclassified
7AISOC Automation
A10 NetworksUnclassified
Abstract SecurityUnclassified
AcompanyModel Security
ActivefenceGovernance
AcuvityGuardrails
Adaptive SecurityDeep Fake Defense
AdversaUnclassified
AedilicDeep Fake Defense
AegisaiEmail Security
AgatUnclassified
AI Score
AicebergGuardrails
Aim SecurityData Security
AiquerySecurity Operations
AirmdrMDR
AirrivedAIAI Security
AishieldUnclassified
AISLE
AISOC
AIStrikeSOC Automation
Aisy
AKA IdentityIdentity
AkamaiUnclassified
AktoAgent Security
Alert AIGuardrails
AlloniaFederated Learning
Alltrue AIGuardrails
Almanax
Alpha Level
AlterAI Agents
Amplifier SecurityUnclassified
Amplify SecurityApplication Security
AnagramUnclassified
AndeavourUnclassified
AndesiteSOC Automation
Anetac
AnthropicUnclassified
AnvilogicSOC Automation
AponoIdentity
AptoriUnclassified
ArcadeAI Security
Arcanna AI
ArcanumUnclassified
Arize AIUnclassified
ArmourZeroVulnerability Management
ArnicaUnclassified
ArthurGuardrails
Artiphishell
AsenionGovernance
Astelia
Asymmetric Security
Auguria
AurascapeData Security
AverlonRisk Management
Backline AISOC Automation
Backslash SecurityCode Scanning
BaitedSecurity Awareness Training
Bedrock DataUnclassified
BeeKeeperAIData Security
BforeaiUnclassified
Binary DefenseSOC Automation
BitPatrolIdentity
Black KiteUnclassified
Blackpoint CyberSOC Automation
Blink OpsSOC Automation
Block HarborIoT Security
Blue Lock AI
BlyssData Security
Bonfy.aiData Security
Bosch AIShieldModel Security
Bricklayer AISOC Automation
BugbaseUnclassified
BugcrowdPenetration Testing
Buster.ai
Calvin RiskModel Security
Calypso AIGuardrails
Camelot Secure
Capsule Security
Casco
Cato NetworksNetwork Security
CaveonixCompliance
Centripetal
Charm Security
CinderUnclassified
CipherData
Ciphero
CircumventSOC Automation
CiscoUnclassified
Citadel AIModel Security
ClarityUnclassified
Clearly AI
ClearwaterCompliance
CloudflareUnclassified
CloudsineGuardrails
Clover Security
CodeAnt AICode Scanning
CoderabbitUnclassified
CogentVulnerability Management
CognitionUnclassified
Cognna
Command Zero
Comp AIUnclassified
CompliantLLM
ConductorOne
Confident SecurityGuardrails
Conifers.ai
Controllo
Coralogix (aporia)Unclassified
CorelightNetwork Security
CorgeaUnclassified
CorridorCode Scanning
CotoolSOC Automation
CraniumGovernance
Crash Override
CredalGuardrails
Credo AICompliance
CroglSOC Automation
CryptoLabFHE
Culminate SecuritySOC Automation
Culture AIUnclassified
CyataData Security
Cyber SierraCompliance
CyberhavenUnclassified
Cybernatics
CyborgDB
CybralPenetration Testing
Cyclops SecurityData Pipeline/Observability
CyeraUnclassified
CyfoxSOC Automation
CypagoCompliance
CytacticSOC Automation
CytexCompliance
CywareThreat Intelligence
D3 SecurityUnclassified
Darwin
Dash Security
DatabricksUnclassified
DatatronGovernance
DawnguardSecurity Design
DaxaData Security
Daylight SecuritySOC Automation
DeepkeepModel Security
DeeptempoSOC Automation
DeeptrustDeep Fake Defense
DeepwatchSOC Automation
DefectDojoVulnerability Management
Delphos LabsApplication Security
Delve
depthfirst
Detections.aiDetection Engineering
Devtron
Discern SecurityIT Operations
DoppelThreat Intelligence
DreadnodePenetration Testing
Dream SecurityUnclassified
Drift
Dropzone AISOC Automation
Dryrun SecurityApplication Security
Dune SecurityUnclassified
Dux Security
Dynamo AICompliance
Edge DeltaSOC Automation
Emanate Security
Embed SecuritySOC Automation
Emperical Security
Enigma Networks
Enkrypt AIAgent Security
EnzaiGovernance
EQTYLabGovernance
EquixlyAPI Security
ETHIACKPenetration Testing
ExaforceSOC Automation
ExpelSOC Automation
ExtrianUnclassified
F5Network Security
Fable SecurityUnclassified
Fabrix SecurityIdentity
FairlyUnclassified
FiddlerData Pipeline/Observability
Fig Security
FireTailUnclassified
Flower LabsFederated Learning
Fluid AttacksApplication Security
Fortyx SecurityEmail Security
Gecko SecurityApplication Security
Geordie
Getreal LabsDeep Fake Defense
Ghost SecurityApplication Security
GhosteyePenetration Testing
GiskardModel Security
Glasswing AIGovernance
Glide Identity
GoComply
GolfMCP Security
GombocInfrastructure Security
Gray SwanModel Security
GuardareGovernance
GuardDog
GuardiAgent
GuardionAI
Guardrails AIGovernance
Haize LabsModel Security
HaleumFraud Prevention
Harmonic SecurityData Security
HarmonyVulnerability Management
HeelerCode Scanning
Helmet SecurityMCP Security
Hewlett Packard EnterpriseUnclassified
HiddenLayer
HivetraceGuardrails
Holistic AIGovernance
HopperApplication Security
HoundDogRisk Management
HTCDSOC Automation
Humanix
Huntbase
HuntersSOC Automation
Huntr
HushUnclassified
Hydrox AICompliance
HypergameaiSOC Automation
HyperproofCompliance
IAMONES
IBMUnclassified
Identity MachinesAI Agents
IdentityFirst
ImperDeep Fake Defense
Imperum
ImpervaUnclassified
Inception CyberUnclassified
IndykiteUnclassified
Integrate AIFederated Learning
intentyx
Intezer
Invariant LabsAI Agents
IrregularModel Security
IslandApplication Security
isVerified
Javelin
Jazz SecurityUnclassified
JedsecPenetration Testing
Jericho SecuritySecurity Awareness Training
Karini AIUnclassified
Kenzo Security
KeycardIdentity
KeytosIdentity
KikimoraVulnerability Management
KindoAgent Security
Kipling SecureGuardrails
KnosticGuardrails
KonferGovernance
KovrrRisk Management
KriptosData Security
krixo
LakeraModel Security
LangGuard AI
LassoModel Security
LatticaFHE
LeanixUnclassified
Legion Security
Legit SecurityApplication Security
Lema
Level 6 CybersecurityRisk Management
Liminal SecurityIdentity
Linx SecurityUnclassified
LockchainRisk Management
LotiUnclassified
LumenovaGovernance
Lumeus AIUnclassified
LumiaGuardrails
Lunar.dev
LynxFraud Prevention
Maaya AiVulnerability Management
Magic Mirror2Governance
MagicMirror
Mallory.ai
MaroGovernance
Mate Security
MatvisUnclassified
Mave
MazeVulnerability Management
MenayaPenetration Testing
Method Security
MetomicUnclassified
MimecastEmail Security
MindVulnerability Management
MindFortVulnerability Management
MindgardVulnerability Management
MirageDeep Fake Defense
Mirror SecurityModel Security
Miru Labs
Mithril-SecurityGovernance
MlcodeUnclassified
MobbUnclassified
ModelmetryUnclassified
MonitaurGovernance
MoradoThreat Intelligence
Mountain TheoryVulnerability Management
MultifactorAI Agents
NagomiRisk Management
NatomaIdentity
Nebulock
NeoveraSOC Automation
NetarxDeep Fake Defense
NetskopeUnclassified
NeuralTrustGuardrails
NeurocatData Security
NexosGuardrails
NexusFlow-AIUnclassified
NightFallUnclassified
Noma SecurityModel Security
NOTHREATIoT Security
Novee Security
Nroc-SecurityUnclassified
NuaSOC Automation
Nudge Security
NullifyApplication Security
Oasis Security
Observo AI
OctosightVulnerability Management
OffensAiPenetration Testing
Onyxia CyberSecurity Operations
Opaque-SystemsData Security
OpenlayerUnclassified
OpenShieldModel Security
Operant AIApplication Security
Opnova
Opsera
Opsin-SecurityUnclassified
OptiIdentity
OptIQIdentity
Orchid SecurityUnclassified
Orion SecurityGuardrails
osoUnclassified
OuttakeDeep Fake Defense
OutThinkUnclassified
OvalixGuardrails
Overwatch DataFraud Prevention
Pallma AI
Palo-Alto-NetworkUnclassified
Pangea-CyberGuardrails
PegasiUnclassified
PenteraPenetration Testing
Pillar SecurityAI Runtime Security
PixeeApplication Security
Plerion
PointGuard-AIModel Security
PolyguardDeep Fake Defense
Portal26Governance
PRE Security
Preamble
Prediction Guard
Priam Cyber AI
Prime SecurityCode Security
Privasea ABData Security
Private-aiUnclassified
Prompt Security
PromptArmor
PromptfooModel Security
Prophet SecuritySOC Automation
Protect AIModel Security
ProtectoUnclassified
Protexxa
ProwlerRisk Management
PyntAPI Security
Qevlar
QomplxRisk Management
QualifireGuardrails
Quantara AIUnclassified
QuantpiCompliance
Quantum IntegrityIdentity
QueryPieAI Security
QuilrAgent Security
Radiant Security
RadwareSOC Automation
RangersAIUnclassified
Rapid7Vulnerability Management
RavenmailUnclassified
Reach SecurityUnclassified
Reality DefenderDeep Fake Defense
Redblock
RedCarbon
Redcoat AISecurity Awareness Training
RedRokVulnerability Management
RekenGovernance
RemoteThreat
Repello AIPenetration Testing
Resemble AIDeep Fake Defense
ResourcelyInfrastructure Security
RevEngApplication Security
Ridge SecurityPenetration Testing
RIIGSOC Automation
Riot SecurityUnclassified
RiskappCompliance
Robust IntelligenceUnclassified
RootVulnerability Management
RotateMDR
Roundtable
RunRevealData Pipeline/Observability
RunSybil
Safe IntelligenceUnclassified
Safe Security
SafeBrain.AIData Security
SafeBreachUnclassified
Saidot.aiGovernance
SailPointIdentity
Salience Cyber
SarusData Security
SatoriUnclassified
ScamGuardianFraud Prevention
ScamneticUnclassified
ScourNomadPenetration Testing
ScribeUnclassified
SecAIThreat Intelligence
SeceonSOC Automation
SecureSOC Automation
Secure.com
SecuritiUnclassified
SecuvyUnclassified
SeezoApplication Security
SekoiaSOC Automation
Sense DefenceApplication Security
SentraUnclassified
SentriliteSOC Automation
SeviiUnclassified
Shiboleth
SimbianSOC Automation
Singulr AIGovernance
SkadiMSSP
SkyflowUnclassified
SkyldAI Protection
SlauthGovernance
Sn1per SecurityPenetration Testing
Socratix AIUnclassified
SolaSecurity Agent
SolidCoreGovernance
Sonoma SecurityMCP Security
Sovereign AISecurity LabsGovernance
Spacewalk AIUnclassified
SpartanXUnclassified
Specular
spiky-aiUnclassified
SplxAIGovernance
StairwellThreat Intelligence
StarisCode Scanning
StealthMoleThreat Intelligence
Stellar CyberSOC Automation
StracUnclassified
StraikerModel Security
Strike48
StrikeReadySOC Automation
StrongestLayer
StyrkVulnerability Management
Sublime SecurityEmail Security
Superagent
SuperalignGovernance
SurepathaiGuardrails
Surf.ai
SuzanGovernance
Sweet SecurityCNAPP
SwifGovernance
Swift SecurityGuardrails
SxipherPenetration Testing
Symbiotic SecurityVulnerability Management
SysdigUnclassified
System Two SecuritySOC Automation
TamnoonMSSP
TandemTrace
Tenable (apex)Unclassified
TencyleSOC Automation
Tenex AISOC Automation
TensoroperaaiFederated Learning
TenzaiPenetration Testing
Terracotta AIApplication Security
TerratrueUnclassified
TestsavantModel Security
Theorem
TheoriCode Scanning
ThirdLaw
ThreatCanaryVulnerability Management
ThreatMonThreat Intelligence
TiboUnclassified
Tier4 AISOC Automation
Tier4aiSOC Automation
TinfoilData Security
TitaniamUnclassified
Token Security
Tonic AIData Security
Top HatUnclassified
TorchIdentity
TorqSOC Automation
Tracecat
TracerThreat Intelligence
Transilience AIUnclassified
Trend MicroUnclassified
Troj AIModel Security
TrojanVectorsUnclassified
TruepicUnclassified
TrustcloudUnclassified
TrustibleGovernance
TrustmiEmail Security
TrustwiseGuardrails
TumerykGuardrails
TuskiraPenetration Testing
Twine SecurityAI for Security
UMCA TechnologiesFraud Prevention
UnboundAgent Security
Uncov AIGovernance
UnosecurUnclassified
UprootSecurityPenetration Testing
Usage-PandaAPI Security
Vali CyberEndpoint Security
ValidiaDeep Fake Defense
ValidmindUnclassified
VarianceSOC Automation
Vega.ioData Security
Verax AIGuardrails
Veria Labs
VertivUnclassified
vijil securityAgent Security
Vinci LogicSOC Automation
Virtue AI
VorlonSaaS Security
VulneticPenetration Testing
Wald AIModel Security
Weagle
WhylabsUnclassified
WideFieldUnclassified
Winfunc (asterisk)Unclassified
WisebeeUnclassified
Witness AIGovernance
WizCloud Security
WodanFHE
Wraithwatch
XBOWApplication Security
XenonstackUnclassified
ZafranVulnerability Management
ZaniaCompliance
ZaunSOC Automation
Zenguard AIAgent Security
ZenitySOC Automation
ZeroDrift
ZeroPathVulnerability Management
Zest SecurityVulnerability Management
ZiosecUnclassified
Zynap