Market Matrix

Comprehensive vendor evaluation matrices across all security market domains. Select a domain to view detailed vendor comparisons and market analysis.

December 6, 2025

Executive Summary

The Market Matrix provides detailed vendor evaluations across 33 security market domains. Each domain matrix compares vendors side-by-side using standardized evaluation criteria, enabling data-driven vendor selection and competitive analysis.

Select a domain below to access the comprehensive market matrix, including heatmaps, detailed comparisons, and trend analysis for that specific market segment.

Market Domains
33
Domains Analyzed
10
Total Vendors
90
Total Tools
105

Market Domains

Select a domain to view the detailed market matrix and vendor evaluation.

5G, Edge Compute & Embedded Systems Security

Solutions that secure 5G networks, mobile edge computing (MEC), and embedded compute platforms that sit between traditional IT and OT/IoT environments. This includes security for 5G core and RAN components, slice and API exposure protection, MEC workload isolation and monitoring, secure edge gateways, embedded runtime protection, and visibility and policy enforcement across distributed edge compute nodes in telco, industrial, and enterprise deployments. This domain complements OT & IoT Security, which focuses on OT/ICS and IoT devices, and Network & Edge Security, which focuses on traditional enterprise networking.

No vendors
0 attributes

AI & Machine Learning Security & AI‑Driven Defense

Technologies that secure AI and machine learning systems and leverage AI to enhance security operations. This includes protection for training data and models, AI/ML pipeline and MLOps security, generative AI and LLM application security (guardrails, policy enforcement, RAG and plugin/tool security), prompt and model abuse detection, adversarial ML defenses, and AI governance and model risk management for the models themselves. It also covers AI‑driven analytics and copilots for threat detection, investigation, and security automation that operate as capabilities within or alongside SIEM/XDR and SOAR platforms, while the broader governance of enterprise AI usage and safety is covered under AI Usage Governance, Safety & Trust.

11 tools/vendors
21 attributes

AI Usage Governance, Safety & Trust

Solutions that govern and secure the enterprise use of AI and generative AI, focusing on how users, applications, and business processes consume AI services. This includes AI safety guardrails and policy enforcement across LLMs and foundation models, prompt and output monitoring for data leakage and harmful content, AI usage analytics and access governance, model and provider risk assessment, safety and fairness evaluation, and controls that align AI adoption with regulatory, privacy, and responsible AI requirements. This domain complements AI & Machine Learning Security & AI‑Driven Defense, which focuses on securing AI models, pipelines, and AI‑driven security analytics themselves.

No vendors
0 attributes

Application & API Security

Technologies that protect web, mobile, and API‑based applications across the software development lifecycle and in production, focusing on first‑party application logic and exposed interfaces. This includes SAST, DAST, IAST, software composition analysis (SCA) for application dependencies, API discovery and posture management, API threat protection, web application and API protection (WAAP/WAF), runtime application self‑protection (RASP), and related tooling integrated into DevSecOps workflows. Integrity and provenance of the broader build and delivery pipeline are covered under Software Supply Chain Security.

14 tools/vendors
16 attributes

Attack Surface & Exposure Management

Technologies that continuously discover, inventory, and assess an organization’s internal and external attack surface, including external attack surface management (EASM), cyber asset attack surface management (CAASM), and exposure management platforms that prioritize remediation based on business context.

14 tools/vendors
21 attributes

Blockchain, Web3 & Digital Asset Security

Solutions that secure blockchain-based applications, Web3 infrastructure, and digital assets, including smart contract analysis and formal verification, on-chain threat and anomaly detection, wallet and private key protection, custody and MPC-based key management, protocol and bridge monitoring, and risk analytics for DeFi, NFTs, and tokenized assets. This domain focuses on securing both enterprise and consumer-facing blockchain ecosystems and their integration with traditional systems.

No vendors
13 attributes

Cloud Infrastructure Security & CNAPP Platforms

Tools and platforms that secure public, private, and hybrid cloud infrastructure and services, including cloud security posture management (CSPM), cloud workload protection platforms (CWPP), cloud infrastructure entitlement management (CIEM), Kubernetes and cloud network security, and cloud‑native application protection platform (CNAPP) capabilities that unify visibility, configuration, vulnerability, and runtime threat protection across multi‑cloud and hybrid environments. This domain is the primary home for CNAPP‑related capabilities and replaces the deprecated Cloud‑Native Application Protection (CNAPP) domain entry.

7 tools/vendors
18 attributes

Cyber Resilience & Recovery

Technologies that ensure resilience and rapid recovery from cyber incidents, including immutable and cyber‑aware backup, disaster recovery orchestration, ransomware‑resilient storage, recovery testing and automation, and tools that prioritize and orchestrate restoration of critical business services.

11 tools/vendors
18 attributes

Data Security, Privacy & DSPM

Solutions that discover, classify, monitor, and protect sensitive data wherever it resides or is used, including data security posture management (DSPM), data security platforms (DSP), data loss prevention (DLP), database and big data security, encryption and key management, and data access governance. These tools provide continuous visibility into data flows, access, and exposure across on‑prem, cloud, SaaS, collaboration, and AI/LLM environments, with strong alignment to regulatory, privacy, data residency, and emerging AI governance requirements for training and inference data.

7 tools/vendors
23 attributes

Developer Security & Secure Coding Platforms

Platforms and tools that embed security into developer workflows and engineering platforms, including IDE and code review security assistants, secure coding guidance, secrets detection in code and repositories, developer‑focused SAST/SCA integrations, pre‑commit and CI hooks, and policy guardrails for Git hosting, code collaboration, and AI coding assistants and code generation. This domain emphasizes improving developer productivity while reducing security risk across the software development lifecycle, including governance of AI‑assisted development.

No vendors
18 attributes

Email, Web & Collaboration Security

Solutions that protect email, web, and collaboration channels from phishing, malware, business email compromise, data leakage, and account takeover, including secure email gateways, API‑based email security, browser and web isolation, collaboration app security, and advanced phishing detection and remediation.

No vendors
21 attributes

Endpoint & Device Security

Technologies that protect and manage endpoints and devices, including endpoint protection platforms (EPP), mobile threat defense (MTD), unified endpoint management (UEM/MDM), device posture assessment, and controls that enforce security baselines across laptops, mobiles, and other user devices.

No vendors
20 attributes

Human Risk & Security Awareness

Solutions that reduce human‑centric cyber risk through security awareness training, phishing simulation, behavioral reinforcement, human risk scoring, and targeted interventions, including platforms that measure and influence employee security behaviors across email, web, collaboration, and SaaS tools.

No vendors
21 attributes

Identity Security

Solutions that secure digital identities and their access to resources, including identity and access management (IAM), privileged access management (PAM), identity threat detection and response (ITDR), and lifecycle governance for human and machine identities across cloud and on‑prem environments, with strong integration into zero‑trust and risk‑based access controls.

No vendors
16 attributes

Insider Risk Management & User Behavior Analytics

Platforms that detect, assess, and manage risks arising from malicious, negligent, or compromised insiders by analyzing user behavior and data interactions. Capabilities include user and entity behavior analytics (UEBA), insider risk scoring, policy‑driven monitoring of data movement and anomalous access, contextual investigation workflows, and integrations with DLP, identity, collaboration, and HR systems. These solutions focus on human‑driven data and access misuse, complementing Data Security, Privacy & DSPM, Human Risk & Security Awareness, and Identity Security.

No vendors
0 attributes

IT Operations & Control Plane Security

Solutions that secure the IT and infrastructure control planes attackers frequently abuse, including remote monitoring and management (RMM) tools, IT service management (ITSM) platforms, configuration and deployment systems, and administrative consoles for SaaS and cloud services. Capabilities include hardening and continuous monitoring of admin interfaces, change and configuration anomaly detection, privileged workflow protection, and guardrails that prevent misuse of powerful operational tools. This domain complements Identity Security and Software Supply Chain Security by focusing on the operational control surfaces used to manage infrastructure and applications.

No vendors
17 attributes

Network & Edge Security

Technologies that secure enterprise networks, data centers, and edge locations, including next‑generation firewalls (NGFW), IDS/IPS, secure SD‑WAN, network segmentation gateways, DDoS protection, and virtual or cloud‑delivered network security services that enforce policy and inspect traffic across on‑prem, branch, and cloud environments.

No vendors
19 attributes

OT & IoT Security

Solutions that secure operational technology (OT), industrial control systems (ICS), and internet of things (IoT) devices, focusing on asset discovery, network monitoring, anomaly detection, segmentation, and protection of safety‑ and mission‑critical environments.

9 tools/vendors
18 attributes

Physical & Cyber‑Physical Security

Solutions that secure physical environments and converged cyber‑physical systems, including physical access control, video surveillance analytics, security operations center (GSOC) platforms, and tools that correlate physical and cyber events to protect facilities, assets, and people in highly regulated or mission‑critical environments.

No vendors
17 attributes

SaaS Security

Tools focused on securing SaaS applications and collaboration platforms, including SaaS security posture management (SSPM), CASB‑like controls, SaaS data access governance, configuration hardening, and continuous monitoring of third‑party SaaS risks.

11 tools/vendors
19 attributes

Security Data & Analytics Platforms

Platforms that collect, normalize, store, and analyze large volumes of security telemetry as a shared data layer, including security data lakes, log and event pipelines, detection engineering workbenches, and analytics engines that support custom detections, threat hunting, and integration with SIEM, XDR, SOAR, and other security tools without being tied to a single detection product.

No vendors
16 attributes

Security Governance, Risk & Compliance

Solutions that support security governance, risk management, and compliance (GRC), including policy management, control frameworks, risk registers, audit support, regulatory mapping, and continuous control monitoring for security programs.

No vendors
20 attributes

Security Operations, Automation & Response (SOAR & SOC Platforms)

Technologies that orchestrate and automate security operations workflows, including security orchestration, automation and response (SOAR), case and incident management, playbook automation, collaborative investigation workspaces, analyst copilots and AI‑assisted triage, incident communications, and integration hubs that connect SIEM, XDR, ticketing/ITSM, threat intel, and IT operations tools. These platforms focus on standardizing and scaling SOC processes, reducing mean time to detect and respond, and improving analyst productivity.

No vendors
20 attributes

Security Posture Management & Program Analytics

Platforms that provide an aggregated, program‑level view of security posture across tools and domains, including continuous control monitoring, security scorecards and KPIs, board‑level reporting, framework and maturity mapping, and cross‑domain analytics that correlate vulnerabilities, misconfigurations, incidents, human risk, and external exposure. These solutions integrate with attack surface and exposure management, GRC, and operational security tools to help security leaders measure, prioritize, and communicate risk and investment effectiveness across the entire security program.

No vendors
0 attributes

Security Testing & Validation

Platforms and services that proactively test and validate security controls and resilience, including penetration testing management, breach and attack simulation (BAS), automated red teaming, adversary emulation, purple‑team tooling, and continuous validation of security controls against real‑world attack techniques.

No vendors
24 attributes

Software Supply Chain Security

Solutions that protect the integrity of software development and delivery pipelines, including SBOM generation and validation, dependency and artifact scanning, build system and CI/CD hardening, code signing and provenance, policy enforcement in artifact repositories and package managers, and integrity verification and attestation (e.g., SLSA‑aligned, in‑toto, Sigstore) from source through build, packaging, deployment, and runtime across applications, containers, and infrastructure as code. This domain focuses on the trustworthiness of the software supply chain itself, complementing Application & API Security, which focuses on application behavior and exposure.

9 tools/vendors
21 attributes

Third-Party & Vendor Risk Management

Platforms and tools that assess, monitor, and manage security and compliance risks associated with third parties, vendors, and partners, including continuous external risk scoring, questionnaire automation, evidence collection, and integration with procurement and GRC workflows.

12 tools/vendors
18 attributes

Threat Detection, Investigation & Response (SIEM, XDR, NDR)

Technologies that provide centralized, productized detection and investigation of threats across the enterprise, including SIEM, XDR, NDR, and related analytics platforms that aggregate and correlate telemetry from endpoints, networks, identities, applications, and cloud environments. These solutions deliver out‑of‑the‑box and customizable detection content, investigation workflows, and native response actions, and integrate with Security Operations, Automation & Response tools for orchestration and case management.

No vendors
23 attributes

Threat Intelligence, Digital Risk & Attack Surface Intelligence

Platforms and services that collect, aggregate, analyze, and operationalize threat intelligence and external digital risk signals, including threat intelligence platforms (TIP), curated threat feeds, malware and infrastructure intelligence, brand and domain protection, dark web monitoring, and attack surface intelligence that maps adversary infrastructure and exposure. These tools enrich detections, hunting, and incident response with contextual threat data and increasingly provide automation, scoring, and AI‑assisted analysis to make intelligence actionable.

No vendors
0 attributes

Unified User Protection & Access Experience Platforms

Converged platforms that provide unified, user‑centric security and access controls across web, SaaS, private applications, and endpoints. They combine capabilities such as secure web gateway (SWG), CASB‑like controls, ZTNA, DNS and browser security, endpoint posture checks, and risk‑based access policies, with an emphasis on consistent user experience, policy enforcement, and session protection. These platforms often form part of broader SSE/SASE architectures and integrate closely with identity providers and endpoint security tools, complementing the more architecture‑oriented Zero Trust Network Access & SSE/SASE domain.

No vendors
0 attributes

Vertical Cyber‑Physical & Safety‑Critical Systems Security

Specialized security solutions for regulated and safety‑critical verticals such as healthcare, automotive, aviation, and critical public services, including medical device and clinical network security, connected vehicle and in‑vehicle network protection, avionics and transportation system monitoring, and safety‑aware anomaly detection. These tools focus on patient, passenger, and public safety, regulatory alignment, and secure operation of highly specialized cyber‑physical systems.

No vendors
0 attributes

Vulnerability & Patch Management

Solutions that identify, prioritize, and help remediate vulnerabilities across infrastructure, operating systems, applications, and cloud resources, including vulnerability scanners, configuration assessment, risk‑based vulnerability prioritization, integration with ticketing and patch management tools, and workflows that coordinate remediation with IT and DevOps teams.

No vendors
16 attributes

Zero Trust Network Access & SSE/SASE

Solutions that implement zero‑trust principles for user and workload access across web, private applications, and cloud services, including zero trust network access (ZTNA), secure service edge (SSE/SASE components such as SWG, CASB, and cloud firewall), software‑defined perimeter, micro‑segmentation, and continuous risk‑based access controls that leverage identity, device posture, and context to enforce least‑privilege access. This domain focuses on cloud‑delivered access and policy enforcement, complementing traditional Network & Edge Security and core Identity Security platforms.

No vendors
20 attributes