0% found this document useful (0 votes)
564 views1 page

Cyber Scape

The document outlines the various cybersecurity products and services offered by a company, organized under main categories of network & infrastructure security, web security, endpoint security, application security, data security, mobile security, risk & compliance, security operations & incident response, threat intelligence, IoT, messaging security, identity & access management, digital risk management, security consulting & services, cloud security, and fraud & transaction security. Specific offerings mentioned include network access control, software-defined networking, distributed denial-of-service protection, DNS security, network firewall, deception techniques, managed security services, encryption, data loss prevention, data privacy, endpoint prevention, web application firewalls, application security testing, endpoint detection and response, security information and event

Uploaded by

mirza sharif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
564 views1 page

Cyber Scape

The document outlines the various cybersecurity products and services offered by a company, organized under main categories of network & infrastructure security, web security, endpoint security, application security, data security, mobile security, risk & compliance, security operations & incident response, threat intelligence, IoT, messaging security, identity & access management, digital risk management, security consulting & services, cloud security, and fraud & transaction security. Specific offerings mentioned include network access control, software-defined networking, distributed denial-of-service protection, DNS security, network firewall, deception techniques, managed security services, encryption, data loss prevention, data privacy, endpoint prevention, web application firewalls, application security testing, endpoint detection and response, security information and event

Uploaded by

mirza sharif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

2020

Network & Infrastructure Security Web Security Endpoint Security Application Security
Advanced Threat Protection ICS + OT Endpoint Prevention WAF & Application Security

NAC SDN DDoS Protection DNS Security

Vicarius
Network Analysis & Forensics Endpoint Detection & Response
Application Security Testing

Network Firewall

Deception

MSSP Data Security Mobile Security


Traditional MSSP Advanced MSS & MDR Encryption DLP Data Privacy Data Centric Security

Risk & Compliance Security Operations & Incident Response Threat Intelligence IoT Messaging Security
Risk Assessment & Visibility Security Ratings SIEM IoT Devices

Automotive
Pen Testing & Breach Simulation GRC Security Awareness & Training

Connected Home
Security Incident Response

Identity & Access Management


Authentication
Digital Risk Management Security Consulting & Services

Blockchain Fraud & Transaction Security


IDaaS Security Analytics

Privileged Management

Cloud Security
Identity Governance Infrastructure CASB
Container

Consumer Identity

You might also like