0% found this document useful (0 votes)
170 views1 page

Cybersecurity Snapshot February 2022

The document outlines various network, endpoint, application, data, and identity security products and services across multiple categories such as advanced threat protection, web security, endpoint security, application security, network security, data security, risk and compliance, security operations, threat intelligence, IoT security, identity and access management, and security consulting. It includes offerings related to firewalls, IDS/IPS, NAC, SDN, DDoS protection, DNS security, network analysis, endpoint detection and response, application security testing, SASE, deception techniques, managed security services, encryption, DLP, data privacy, SIEM, security incident response, authentication, identity governance, digital risk management, blockchain, fraud prevention, cloud security,

Uploaded by

Kiran Kher
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
170 views1 page

Cybersecurity Snapshot February 2022

The document outlines various network, endpoint, application, data, and identity security products and services across multiple categories such as advanced threat protection, web security, endpoint security, application security, network security, data security, risk and compliance, security operations, threat intelligence, IoT security, identity and access management, and security consulting. It includes offerings related to firewalls, IDS/IPS, NAC, SDN, DDoS protection, DNS security, network analysis, endpoint detection and response, application security testing, SASE, deception techniques, managed security services, encryption, DLP, data privacy, SIEM, security incident response, authentication, identity governance, digital risk management, blockchain, fraud prevention, cloud security,

Uploaded by

Kiran Kher
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

2022

Network & Infrastructure Security Web Security Endpoint Security Application Security
Advanced Threat Protection ICS + OT Endpoint Prevention WAF & Application Security

NAC SDN DDoS Protection DNS Security

Network Analysis & Forensics Endpoint Detection & Response


Application Security Testing

Network
Firewall

SASE Deception

MSSP Data Security Mobile Security


Traditional MSSP Advanced MSS & MDR Encryption DLP Data Privacy Data Centric Security

Risk & Compliance Security Ops & Incident Response Threat Intelligence IoT Messaging Security
Risk Assessment & Visibility Risk Quantification SIEM IoT Devices

Automotive

Pen Testing & Breach Simulation GRC Security Awareness & Training

Connected Home

Security Incident Response

Identity & Access Management


Authentication Digital Risk Management Security Consulting & Services

Blockchain Fraud & Transaction Security


IDaaS Security Analytics

Privileged Management

Cloud Security
Identity Governance Infrastructure CASB
Container

Consumer Identity

You might also like