Top Security Companies

Security Trends 2018: The Top Cybersecurity Companies

“What makes a cybersecurity company the best?” is not an easy question to answer. It’s tough to identify the top cybersecurity companies when they aren’t going around telling consumers how many infections they missed or advertising how many breaches they allowed.

There are dozens of lists floating around the web titled “Top 10 Antivirus Tools” and “Five Must-Have Cybersecurity Tools for Your Company.” But most of them cite anecdotal experiences or provide little information to support their arguments.

Cybersecurity Ventures probably has the most extensive resources available. They’re continually updating their Top Cybersecurity 500 list, but the criteria is cloudy at best and only recognizes innovation, rather than results.

Here, I’ve outlined some objective leaders in their respective markets and identified innovative products making way in emerging fields. The top companies lists are based solely on G2 Crowd user satisfaction score, sourced from thousands of validated cybersecurity product reviews. And the trending tools are based off a combination of our focus trends along with venture capital funding and review data.

System Security

System security categories on G2 Crowd include application security, data security, mobile data security, network security and web security, along with their respective subcategories. This type of software is used to protect applications, websites, data and networks from malicious files and dangerous parties.

This is the broadest security category we’re ranking here. It includes solutions ranging from endpoint protection to secure web gateway tools. Many are aimed at protecting end users from dangerous web content.

Companies are concerned about end-user behavior because one in four breaches is caused by internal users. With these software tools, companies aim to filter content, control access to potentially dangerous sites and protect their sensitive information. The solutions also provide some peace of mind for end users so they can browse without constantly thinking about how their actions put the company at risk.

Top System Security Companies

1. Malwarebytes

malwarebytes logo

Vendor: Malwarebytes
Location: Santa Clara, CA
Main Category: Endpoint Antivirus
Reviews: 102
G2 Crowd Star Rating: 4.5 out of 5

Malwarebytes has the highest satisfaction of any system security tool, likely because it’s so easy to use. It’s an anti-malware solution geared specifically toward Mac users, but supports Windows and Android operating systems as well.

Both individuals and enterprise users can schedule or run impromptu malware scans, diagnose issues and centralize security operations. Malwarebytes offers a range of business products to serve these purposes and manage services for those without dedicated cybersecurity personnel.

2. Webroot Endpoint Protection

webroot logo

Vendor: Webroot
Location: Broomfield, CO
Main Category: Endpoint Detection & Response (EDR)
Reviews: 64
G2 Crowd Star Rating: 4.6 out of 5

Webroot is a well-known and established provider of cybersecurity solutions and has been for some time. The company itself offers endpoint protection, threat intelligence and security awareness training solutions, but its endpoint protection solution is by far its most popular offering.

The platform utilizes machine learning to facilitate smart web filtering and real-time visibility, as well as protect against a wide range of threats. It’s used mostly by small- and medium-sized businesses and performs very well. Only two of its 64 reviews gave the product fewer than a four- or five-star rating.

3. NeoCertified Secure Email

NeoCertified logo

Vendor: NeoCertified
Location: Centennial, CO
Main Category: Secure Email Gateway
Reviews: 40
G2 Crowd Star Rating: 4.9 out of 5

NeoCertified Secure Email provides a portal to centralize and secure email communication. Its tool works across device types, offering HIPAA-compliant messaging, Outlook integration and email encryption capabilities.

It offers industry-specific solutions along with personal or business plans. Users from mostly small and medium businesses have been clear in their lauding of the tool. Only one of NeoCertified’s 40 reviews gave the product a four-star rating, while all others gave it five.

4. Paubox Encrypted Email

Paubox logo

Vendor: Paubox
Location: San Francisco, CA
Main Category: Secure Email Gateway
Reviews: 23
G2 Crowd Star Rating: 5.0 out of 5

Paubox Encrypted Email  is fairly similar to NeoCertified in that they both offer HIPAA-compliant email services; however, Paubox also offers storage and encryption features for enhanced data security. The encrypted email solution is not too complex. It’s simply a centralized communication console that supports Microsoft Exchange, Office 365 and G Suite integrations.

Like NeoCertified, Paubox only has review below five stars, but it has 17 fewer total reviews. It appears to be targeted toward small-business users, as 88 percent of its reviews came from users at companies with 50 or fewer employees.

5. Druva inSync

Druva logo

Vendor: Druva
Location: San Francisco, CA
Main Category: Endpoint Management
Reviews: 77
G2 Crowd Star Rating: 4.6 out of 5

2018 marks Druva’s 10th anniversary as a security software provider. Its product has become an established endpoint protection solution and a perennial Leader in G2 Crowd reports. Its cloud platform is gaining ground, but inSync has proven itself capable to provide endpoint management, backup and reporting capabilities.

inSync offers mobile device management (MDM) integration with MobileIron, AirWatch and Mass360 along with Active Directory integration for identity management. Its 77 reviews are all four- or five-star reviews and span across all company sizes.

Security Risk Assessment

Risk assessment companies provide security solutions that fall under G2 Crowd’s incident response, security information and event management (SIEM), threat intelligence and vulnerability management software categories.

While many system security products are geared toward a wider range of users, risk assessment solutions are utilized specifically by security teams and IT administrators. They help users evaluate vulnerabilities, respond to attacks and manage security operations.

Compared to other security tools, security risk assessment platforms are robust and their capabilities are vast. These tools are the foundation for the security operations center.

Top Security Risk Assessment Companies

1. Secdo

Secdo logo

Vendor: SECDO
Location: New York, NY
Main Category: Incident Response
Reviews: 26
G2 Crowd Star Rating: 4.7 out of 5

Secdo is an incident response platform that came on to the scene in 2014. Since then, its offerings have helped users increase endpoint visibility, alert investigation teams and facilitate remediation processes.

Adding to its $10 million from 2016, the company had a Series A funding round in 2017, but the amount was undisclosed. Review-wise, only one reviewer gave the product fewer than five stars; the product is used evenly evenly across small-, medium- and enterprise-sized companies.

2. logo

Location: Tel Aviv, Israel
Main Category: Security Information and Event Management (SIEM)
Reviews: 28
G2 Crowd Star Rating: 4.6 out of 5 sits at at No. 2 overall in our SIEM category, behind only AlienVault USM, but has a higher satisfaction score. It’s an open-source tool geared toward securing systems running Elasticsearch, Logstash and Kibana programs. The tool documents activity, archives analytics and alerts administrators of abnormalities.

In 2017, the company received $23 million in Series C funding, bringing its total funding amount to $46.9 million. The tool has 25 five-star reviews and one four-star, three-star, and one-star review, respectively. It’s used primarily by small- and medium-sized businesses.

3. AlienVault USM

AlienVault logo

Vendor: AlienVault
Location: San Mateo, CA
Main Category: Cloud Security
Reviews: 49
G2 Crowd Star Rating: 4.5 out of 5

AlienVault USM is a complete security operations platform with features to tackle threat detection, incident response and vulnerability management. It can monitor cloud and on-premise infrastructure, deliver continuous threat intelligence and centralize administrative control.

The company itself has grown significantly in popularity since launching in 2007, accumulating $118.4 million in funding. AlienVault USM’s market presence puts it above in overall G2 Crowd rating, but satisfaction is still strong. All of its 49 reviews are four- or five-star ratings.

4. DERDACK Enterprise Alert

Derdack logo

Vendor: Derdack
Location: Potsdam, Germany
Main Category: Incident Management
Reviews: 22
G2 Crowd Star Rating: 4.4 out of 5

DERDACK has been providing security solutions since 1999, with Enterprise Alert as its flagship offering. The German company’s incident response solution provides security notification capabilities, scalable for enterprise.

The product helps users build workflows for incident response and security operations processes. And apparently it works well, garnering 16 5-star reviews from mostly employees of enterprise-sized companies.

5. SpyBot

SpyBot logo

Vendor: Safer-Networking
Location: Wicklow, Ireland
Main Category: Vulnerability Management
Reviews: 22
G2 Crowd Star Rating: 4.6 out of 5

SpyBot is a vulnerability management and malware removal tool from the Irish company Safer-Networking. It provides a set of security tools to help clean and secure IT systems.

All of its 22 ratings are three or more stars, and come from employees in a wide range of company sizes. Users describe SpyBot as a simple, straightforward tool that can help immunize endpoints and defend from malicious software.

Identity Security

Identity security categories on G2 Crowd include cloud identity and access management (CIAM), multi-factor authentication (MFA), password manager, risk-based authentication, single sign on (SSO) and user provisioning software categories. Identity security and management tools range from enterprise-sized user provisioning and governance tools to password managers for individuals.

They’re used by IT and HR professionals alike to unify security and database operations. Larger-scale tools can sync with directories and help manage access permissions or create SSO portals for simplified application access. Personal tools can be used for simple password storage and multi-factor authentication practices.

For businesses, controlling access can improve the security of their data and allow users the freedom to worry less about Wi-Fi security or password strength. Added benefits include activity monitoring, intelligent access capabilities and unified cloud access.

Top Identity Security Companies

1. 1Password

1Password logo

Vendor: AgileBits Inc.
Location: Ontario, Canada
Main Category: Password Manager
Reviews: 246
G2 Crowd Star Rating: 4.6 out of 5

1Password is an incredibly popular password manager for both individuals and businesses. It sits at at No. 2 overall in our password manager category, behind only LastPass, but has a higher satisfaction score.

The product offers solutions for individuals, families, teams and businesses. It’s used mostly by individuals and small businesses, but has 89 reviews from users at companies with more than 50 employees. The tool’s highest-rated features are password generation, its browser extension and login speed.

2. Keeper

Keeper logo

Vendor: Keeper Security
Location: Chicago, IL
Main Category: Password Manager
Reviews: 119
G2 Crowd Star Rating: 4.8 out of 5

Keeper is another password management solution hailing from G2 Crowd’s home city of Chicago. It has the third-highest satisfaction from any Chicago-based company. The tool received a Leader badge in the Fall 2017 Password Manager Grid® Report.

It’s the fourth-highest overall rated product in our password management company, but has 111 five-star reviews. The product also provides individual, family and business options with varied pricing, but its reviews are fairly evenly distributed across business size. Its highest-rated features include its digital wallet, two-factor authentication and mobile app usability.

3. LastPass

LastPass logo

Vendor: LogMeIn
Location: Boston, MA
Main Category: Password Manager
Reviews: 357
G2 Crowd Star Rating: 4.4 out of 5

Again, LastPass is a password manager; these tools are widely applicable and apparently very satisfying to users. It’s our highest-rated and most-popular product in the password manager category and a perennial Leader in the category.

The company was purchased by LogMeIn in 2015 for $110 million. LastPass reviews are fairly evenly distributed between small- and medium-sized businesses, but still has more than 50 reviews from users at enterprise-sized companies.

4. Okta

Okta logo

Vendor: Okta
Location: San Francisco, CA
Main Category: Cloud Identity and Access Management
Reviews: 144
G2 Crowd Star Rating: 4.4 out of 5

Okta, finally, does a bit more than password management, placing it in our CIAM category, as well as SSO, password manager, and user provisioning categories. The widely used tool provides a centralized portal for users to access multiple business applications. It also has administrative features for user lifecycle and API management.

It’s the highest-overall rated and most-popular tool in the CIAM software category, and used mostly by employees at medium- to enterprise-sized businesses. Some of its highest-rated features include support for required authentication systems, local access and support for bring-your-own-device (BYOD) users.

5. Duo Security

Okta logo

Vendor: Duo Security
Location: Ontario, Canada
Main Category: Cloud Security
Reviews: 37
G2 Crowd Star Rating: 4.4 out of 5

Duo Security provides a cloud-based access platform to securely connect users to common SaaS applications. The company received $70 million in Series D funding in 2017 and $121.5 million in total funding since launching in 2010.

Duo lives in both our cloud security and MFA categories, leading both in satisfaction and overall G2 Scores. We’ve only compiled enough data to evaluate one feature, but 91 percent of user reviews rated it highly.

Trending Cybersecurity Technologies for 2018

This section is a bit more subjective, but still based mostly on our data and the trends we have identified as components of cybersecurity technology that serve as the framework of our ongoing analysis. Intelligent security and risk-based authentication are two components we believe will have significant impact on the cybersecurity aspect of business modernization.

The tools I have outlined are some of the first few venturing into these emerging markets. They’re either implementing artificial intelligence (AI) and machine learning or securing new endpoints from the internet of things (IoT).

The products are broken down into a few broad fields that seem to be the first ones implementing AI. Those categories include threat intelligence, risk-based authentication (RBA), remediation and IoT security.

Threat Intelligence

Intelligent security systems combine traditional cybersecurity software characteristics with artificial intelligence and machine learning. Most of them utilize threat intelligence networks to continually update their knowledge base.

The threat network provides massive amounts of data from sources like malware libraries, hash databases and honeynets. Intelligent security systems translate the raw information into actionable intelligence. They will distribute update alerts, patches, automate detection and perform threat forensics assessments.


Trending Threat Intelligence Products 2018:


Sqrrl logo

Year Founded: 2012
2017 Funding: $12,300,000
Total Funding: $26,500,000
Reviews: 2
G2 Crowd Star Rating: 5.0 out of 5

Sqrrl is a self-described “threat-hunting-as-a-service” solution that launched in 2012. The company has led the way in integrating enterprise threat intelligence with traditional security operations center (SOC) activity. It has been recognized for its innovative technology by reputable agencies including CRN, CSO and the Cyber Security Excellence Awards


Cylance logo

Year Founded: 2012
2017 Funding: $O
Total Funding: $177,000,000
Reviews: 8
G2 Crowd Star Rating: 4.4 out of 5

CylancePROTECT’s product line combines features of threat intelligence with next-generation endpoint protection to provide a wide range of security features powered by intelligent threat detection. This year, CylancePROTECT’s founder Stuart McClure won Info Security Products Guide’s “CEO of the Year” award. The company was also named a top-10 Fastest Growing Company in North America on Deloitte’s 2017 Technology Fast 500.


LogRhythm logo

Year Founded: 2003
2017 Funding: $O
Total Funding: $126,250,948
Reviews: 3
G2 Crowd Star Rating: 3.8 out of 5

LogRythm combines aspects of network monitoring, event logging and threat intelligence to provide an end-to-end threat management platform. An interesting product add-on the company offers is LogRhythm CloudAI, which provides advanced threat detection and AI-powered insights. LogRythm has won awards from SC Media, Gartner and Forrester.

Identity Management

These tools are innovators in the risk-based authentication (RBA) space, outlined as a trend to watch in 2018. They are using big data and/or machine learning to improve data security and automate user provisioning processes.

RBA tools analyze a wide range of behavioral and technical factors to manage access to applications, databases and directories. The program will analyze metrics ranging from IP address and endpoint details to historical use trends and behavioral metrics.

Parties that surpass a threshold are restricted from accessing information, while potentially risky parties are prompted to validate their identity through some form of two-factor authentication.

We chose this as a trend because RBA appears to be a priority for both established and emerging identity solution providers. In addition, identity management has grown in importance with the expanding popularity of software as a service (SaaS), platform as a service (PaaS), and infrastructure as service (IaaS) applications.

Trending Identity Management Products 2018:

Duo Security

Duo logo

Year Founded: 2010
2017 Funding: $70,000,000
Total Funding: $121,500,000
Reviews: 31
G2 Crowd Star Rating: 4.5 out of 5

As mentioned above, Duo provides cloud-based authentication portals for SSO access to a range of cloud applications. It certifies connections, devices, users and applications for comprehensive authorization processes. This year it was featured in LinkedIn’s Top 50 Startups list, gained recognition from Crain’s and was called Facebook’s security chief’s favorite security tool.

Armor Anywhere

Armor logo

Year Founded: 2009
2017 Funding: $89,000,000
Total Funding: $149,100,000
Reviews: n/a
G2 Crowd Star Rating: n/a

The company offers both managed security services and Armor Anywhere, a scalable cloud-security offering. It provides OS-level virtual machines to abstract cloud applications and provides increased security visibility. In 2017, the company gained recognition from SC Magazine, Forbes and Dark Reading.


CloudPassage logo

Year Founded: 2010
2017 Funding: $O
Total Funding: $88,900,000
Reviews: n/a
G2 Crowd Star Rating: n/a

The CloudPassage platform provides a number of security features for vulnerability management, application control and configuration management, among other things. The platform is geared toward DevOps teams building and working within cloud-based applications. This year the company gained recognition from The Village Voice, CSO and Help Net Security.


Remediation tools here typically fall under the umbrellas of endpoint detection and response (EDR) and incident response (IR). Like many of the products in the risk assessment category above, these tools make up for much of the security operations center.

These tools, though, are evolving the space by implementing intelligent security capabilities through machine learning. AI can improve a platforms capabilities to adapt to new forms of malware, continuously monitor for vulnerabilities and better understand user behavior.

Trending Remediation Products 2018:


Bromium logo

Year Founded: 2010
2017 Funding: $0
Total Funding: $115,800,000
Reviews: 1
G2 Crowd Star Rating: 5 out of 5

Bromium’s platform is virtualization-based and designed for enterprise-level companies. Its remediation features are powered by adaptive intelligence to remove threats like ransomware, unauthorized file transfers and targeted attacks. In 2017, the company received press from The Independent, SC Magazine and IDG.

Falcon Host

CrowdStrike logo

Year Founded: 2011
2017 Funding: $89,000,000
Total Funding: $281,000,000
Reviews: 4
G2 Crowd Star Rating: 4.4 out of 5

Falcon Host (Crowdstrike) — Crowdstrike’s Falcon line of security products cover antivirus, EDR, IT hygiene and threat intelligence. Crowdstrike’s threat intelligence feed provides insight to the EDR offering for real-time visibility and automated attack indicators. Falcon Host was named one of CNBC’s 2017 Disruptor 50 companies and was named to multiple SC Awards Finalists 2017 lists.


CloudPassage logo

Year Founded: 2013
2017 Funding: $70,000,000
Total Funding: $109,520,000
Reviews: 4
G2 Crowd Star Rating: 5.0 out of 5

The SentinelOne Platform uses machine learning to detect advanced attacks and disconnect compromised devices from the network. It can learn from past events and immunize endpoints to prevent repeated infections and patch exploits. The company received press from Dark Reading and SC Magazine, and it was noted as one of four AI cybersecurity startups using predictive analytics by Nanalyze.

IoT Security

The IoT has brought a lot of the same threats posed by BYOD policies, but with added risk. New types of endpoints ranging from smart-appliances to vehicle fleets. IoT security requires a great deal of big data processing and stream analytics.

These tools are utilizing AI and machine learning to improve those monitoring and analytics capabilities. They’re important because we don’t want another Dyn attack or a botnet composed of truck fleets. And they’re leaders because they’re jumping into the space first.

Trending IoT Security Products 2018:


HYPR logo

Year Founded: 2014
2017 Funding: $10,000,000
Total Funding: $13,800,000
Reviews: n/a
G2 Crowd Star Rating: n/a

HYPR offers an omni-channel authentication platform for IoT systems. It incorporates biometric access controls for cars, locks and homes. It decentralizes credential storage to reduce loss if a system were compromised. This year it received funding and press coverage in TechCrunch, Huffington Post and PYMNTS.


Trustwave logo

Year Founded: 2007
2017 Funding: Acquired for $770,000,000
Total Funding: $10,000,000 (Before Acquisition)
Reviews: 7
G2 Crowd Star Rating: 3.8 out of 5

Trustwave integrates existing IoT endpoints with TrustWave’s platform, and offers managed IoT deployment, security testing and incident response services. Along with Check Point, Symantec and Gemalto, Trustwave is expected to make big gains in the IoT security market next year. It was a finalist for multiple SC awards 2017 and noted by analyst firms IDC and Gartner.

Cyber adAPT

Cyber adAPT logo

Year Founded: 2014
2017 Funding: $0
Total Funding: $15,000,000
Reviews: 1
G2 Crowd Star Rating: 5.0 out of 5

Cyber adAPT’s skwiid offering includes an IoT solution for device monitoring, real-time analytics and encrypted data transfers. It’s specifically geared toward IoT with a lightweight architecture for things like security cameras and energy sensors.  It was named a “Cool Vendor” by Gartner this year and received coverage from Dark Reading, Financial times and CSO.

So there we have it. Some of these products are proven leaders in their respective markets, others are just skimming the surface of emerging industries. Either way, they’ve proven something to someone, be it real users or venture capitalists.

It’s always risky to jump in on untested products, but sometimes it’s unavoidable. Still, it’s important to know your options and stay up to date on the latest security tools. Security knowledge will have you better equipped to combat the ever-evolving digital threat landscape.

Cybersecurity resources

Explore cybersecurity resources including experts, events, jobs and education.

Cybersecurity resources