Skip to content

Commit 5abd0b3

Browse files
committed
feat: bring in the ics product curated list
1 parent 4280b39 commit 5abd0b3

File tree

1 file changed

+89
-86
lines changed

1 file changed

+89
-86
lines changed

companies/README.md

+89-86
Original file line numberDiff line numberDiff line change
@@ -6,93 +6,96 @@ This is not an endorsement, nor is it comprehensive. This is just providing a li
66

77
Note: This list is not actively maintained.
88

9-
## Alphabetical
9+
## Products
1010

11-
* [Abatis](http://www.abatis-hdf.com)
12-
* [ABB](https://www.abb.com)
13-
* [Accenture](https://www.accenture.com/us-en/service-industrial-control-system-cybersecurity)
14-
* [AECOM](https://www.aecom.com)
15-
* [Aperio](http://www.aperio-systems.com)
16-
* [Applied Communication Sciences](http://www.appcomsci.com)
17-
* [Applied Risk](https://applied-risk.com)
18-
* [BAE Systems](https://www.baesystems.com/en/home)
19-
* [Bayshore Networks](https://www.bayshorenetworks.com)
20-
* [Bechtel](http://www.bechtel.com/services/defense-nuclear-security/industrial-cybersecurity/)
21-
* [Bedrock](https://bedrockautomation.com)
22-
* [Belden](https://www.belden.com/products/industrial/networking/security)
23-
* [Carbon Black](https://www.carbonblack.com)
24-
* [Checkpoint](https://www.checkpoint.com/solutions/critical-infrastructure/)
25-
* [Cisco](https://www.cisco.com/c/en/us/solutions/enterprise-networks/cybersecurity-industrial-control-systems/index.html)
26-
* [Claroty](https://www.claroty.com)
27-
* [CyberArk](https://www.cyberark.com)
28-
* [CyberX Labs](https://cyberx-labs.com/en/)
29-
* [Cylance](https://www.cylance.com)
30-
* [Darktrace](https://www.darktrace.com)
31-
* [Dragos](https://dragos.com)
32-
* [Eaton - Cooper Power Systems](http://www.cooperindustries.com/content/public/en/power_systems.html)
33-
* [Enernex](http://www.enernex.com)
34-
* [FireEye/Mandiant](https://www.fireeye.com)
35-
* [Fortinet](https://www.fortinet.com)
36-
* [FoxGuard Solutions](https://foxguardsolutions.com)
37-
* [GE](https://www.ge.com/digital/cyber-security)
38-
* [Grid Protection Alliance](https://www.gridprotectionalliance.org)
39-
* [GRIMM](https://grimm-co.com)
40-
* [Honeywell](https://www.honeywell.com)
41-
* [IBM](https://www.ibm.com/security/services/infrastructure-security-services)
42-
* [Inductive Automation](https://inductiveautomation.com)
43-
* [Indegy](https://www.indegy.com/)
44-
* [IOActive](https://www.ioactive.com)
45-
* [IPERC](https://iperc.com)
46-
* [ISA Secure](http://www.isasecure.org/en-US/)
47-
* [Kaspersky](https://ics.kaspersky.com)
48-
* [Kenexis](https://www.kenexis.com)
49-
* [Leidos](https://cyber.leidos.com)
50-
* [Minerva Labs](https://minerva-labs.com)
51-
* [Mocana](https://www.mocana.com)
52-
* [mPrest](https://www.mprest.com)
53-
* [N-dimension](https://www.n-dimension.com)
54-
* [NexDefense](https://www.nexdefense.com)
55-
* [NextNine](https://nextnine.com)
56-
* [Nixu](https://www.nixu.com/services/safety-and-reliability)
57-
* [Nozomi Networks](https://www.nozominetworks.com)
58-
* [OPSWAT](https://www.opswat.com)
59-
* [OSI](http://www.osii.com)
60-
* [OSIsoft](https://www.osisoft.com)
61-
* [Palo Alto Networks](https://www.paloaltonetworks.com/solutions/industries/enterprise/scada-and-industrial-control)
62-
* [Parsons](https://www.parsons.com)
63-
* [PAS](https://www.pas.com)
64-
* [PFP Cybersecurity](https://www.pfpcyber.com)
65-
* [Phoenix Contact](http://www.phoenixcontact.com/us)
66-
* [Protectwise](https://www.protectwise.com)
67-
* [Radiflow](http://radiflow.com)
68-
* [Raytheon](https://www.raytheon.com)
69-
* [Red Trident](https://www.redtridentinc.com)
70-
* [Rockwell Automation](https://www.rockwellautomation.com)
71-
* [SCADAfence](https://www.scadafence.com)
72-
* [Schneider Electric](https://www.schneider-electric.com/ww/en/)
73-
* [Schweitzer Engineering](https://selinc.com)
74-
* [SIGA](https://sigasec.com)
75-
* [Siemens](https://www.siemens.com/global/en/home.html)
76-
* [SISCO](https://www.sisconet.com)
77-
* [Securicon](http://www.securicon.com)
78-
* [Security Matters](https://www.secmatters.com)
79-
* [Sentryo](https://www.sentryo.net/)
80-
* [Skybox Security](https://www.skyboxsecurity.com)
81-
* [SOPHOS - Cyberoam](https://www.cyberoam.com)
82-
* [Symantec](https://www.symantec.com/solutions/industrial-control)
83-
* [Synopsys](https://www.synopsys.com/software-integrity/solutions/by-industry/industrial-control-systems.html)
84-
* [Tempered Networks](https://www.temperednetworks.com)
85-
* [Tenable](https://www.tenable.com)
86-
* [TDI Technologies](https://www.tditechnologies.com)
87-
* [TrendMicro](https://www.trendmicro.com/vinfo/us/security/threat-intelligence-center/securing-ics-environments/ics-cyber-security)
88-
* [Triangle Microworks](http://www.trianglemicroworks.com)
89-
* [Tripwire](https://www.tripwire.com/solutions/solutions-by-industry/energy/)
90-
* [Uptake](https://www.uptake.com)
91-
* [Viasat](https://www.viasat.com)
92-
* [Veracity](https://veracity.io)
93-
* [Verve Industrial](http://verveindustrial.com)
94-
* [Waterfall Security](https://waterfall-security.com)
95-
* [Yokogawa](https://www.yokogawa.com/us/)
11+
- [ICS Security Products](https://github.com/S3cur1tyH4ggis/ICS-Security-Products) - Categorized product list maintained by the community.
9612

13+
## Alphabetical Company List
14+
15+
- [Abatis](http://www.abatis-hdf.com)
16+
- [ABB](https://www.abb.com)
17+
- [Accenture](https://www.accenture.com/us-en/service-industrial-control-system-cybersecurity)
18+
- [AECOM](https://www.aecom.com)
19+
- [Aperio](http://www.aperio-systems.com)
20+
- [Applied Communication Sciences](http://www.appcomsci.com)
21+
- [Applied Risk](https://applied-risk.com)
22+
- [BAE Systems](https://www.baesystems.com/en/home)
23+
- [Bayshore Networks](https://www.bayshorenetworks.com)
24+
- [Bechtel](http://www.bechtel.com/services/defense-nuclear-security/industrial-cybersecurity/)
25+
- [Bedrock](https://bedrockautomation.com)
26+
- [Belden](https://www.belden.com/products/industrial/networking/security)
27+
- [Carbon Black](https://www.carbonblack.com)
28+
- [Checkpoint](https://www.checkpoint.com/solutions/critical-infrastructure/)
29+
- [Cisco](https://www.cisco.com/c/en/us/solutions/enterprise-networks/cybersecurity-industrial-control-systems/index.html)
30+
- [Claroty](https://www.claroty.com)
31+
- [CyberArk](https://www.cyberark.com)
32+
- [CyberX Labs](https://cyberx-labs.com/en/)
33+
- [Cylance](https://www.cylance.com)
34+
- [Darktrace](https://www.darktrace.com)
35+
- [Dragos](https://dragos.com)
36+
- [Eaton - Cooper Power Systems](http://www.cooperindustries.com/content/public/en/power_systems.html)
37+
- [Enernex](http://www.enernex.com)
38+
- [FireEye/Mandiant](https://www.fireeye.com)
39+
- [Fortinet](https://www.fortinet.com)
40+
- [FoxGuard Solutions](https://foxguardsolutions.com)
41+
- [GE](https://www.ge.com/digital/cyber-security)
42+
- [Grid Protection Alliance](https://www.gridprotectionalliance.org)
43+
- [GRIMM](https://grimm-co.com)
44+
- [Honeywell](https://www.honeywell.com)
45+
- [IBM](https://www.ibm.com/security/services/infrastructure-security-services)
46+
- [Inductive Automation](https://inductiveautomation.com)
47+
- [Indegy](https://www.indegy.com/)
48+
- [IOActive](https://www.ioactive.com)
49+
- [IPERC](https://iperc.com)
50+
- [ISA Secure](http://www.isasecure.org/en-US/)
51+
- [Kaspersky](https://ics.kaspersky.com)
52+
- [Kenexis](https://www.kenexis.com)
53+
- [Leidos](https://cyber.leidos.com)
54+
- [Minerva Labs](https://minerva-labs.com)
55+
- [Mocana](https://www.mocana.com)
56+
- [mPrest](https://www.mprest.com)
57+
- [N-dimension](https://www.n-dimension.com)
58+
- [NexDefense](https://www.nexdefense.com)
59+
- [NextNine](https://nextnine.com)
60+
- [Nixu](https://www.nixu.com/services/safety-and-reliability)
61+
- [Nozomi Networks](https://www.nozominetworks.com)
62+
- [OPSWAT](https://www.opswat.com)
63+
- [OSI](http://www.osii.com)
64+
- [OSIsoft](https://www.osisoft.com)
65+
- [Palo Alto Networks](https://www.paloaltonetworks.com/solutions/industries/enterprise/scada-and-industrial-control)
66+
- [Parsons](https://www.parsons.com)
67+
- [PAS](https://www.pas.com)
68+
- [PFP Cybersecurity](https://www.pfpcyber.com)
69+
- [Phoenix Contact](http://www.phoenixcontact.com/us)
70+
- [Protectwise](https://www.protectwise.com)
71+
- [Radiflow](http://radiflow.com)
72+
- [Raytheon](https://www.raytheon.com)
73+
- [Red Trident](https://www.redtridentinc.com)
74+
- [Rockwell Automation](https://www.rockwellautomation.com)
75+
- [SCADAfence](https://www.scadafence.com)
76+
- [Schneider Electric](https://www.schneider-electric.com/ww/en/)
77+
- [Schweitzer Engineering](https://selinc.com)
78+
- [SIGA](https://sigasec.com)
79+
- [Siemens](https://www.siemens.com/global/en/home.html)
80+
- [SISCO](https://www.sisconet.com)
81+
- [Securicon](http://www.securicon.com)
82+
- [Security Matters](https://www.secmatters.com)
83+
- [Sentryo](https://www.sentryo.net/)
84+
- [Skybox Security](https://www.skyboxsecurity.com)
85+
- [SOPHOS - Cyberoam](https://www.cyberoam.com)
86+
- [Symantec](https://www.symantec.com/solutions/industrial-control)
87+
- [Synopsys](https://www.synopsys.com/software-integrity/solutions/by-industry/industrial-control-systems.html)
88+
- [Tempered Networks](https://www.temperednetworks.com)
89+
- [Tenable](https://www.tenable.com)
90+
- [TDI Technologies](https://www.tditechnologies.com)
91+
- [TrendMicro](https://www.trendmicro.com/vinfo/us/security/threat-intelligence-center/securing-ics-environments/ics-cyber-security)
92+
- [Triangle Microworks](http://www.trianglemicroworks.com)
93+
- [Tripwire](https://www.tripwire.com/solutions/solutions-by-industry/energy/)
94+
- [Uptake](https://www.uptake.com)
95+
- [Viasat](https://www.viasat.com)
96+
- [Veracity](https://veracity.io)
97+
- [Verve Industrial](http://verveindustrial.com)
98+
- [Waterfall Security](https://waterfall-security.com)
99+
- [Yokogawa](https://www.yokogawa.com/us/)
97100

98101
(creative commons license)

0 commit comments

Comments
 (0)