Cyber Security Landscape








 

*** Buisness Risks - Brand Damage ***

A company’s brand and reputation is inextricably linked to how it manages and mitigates its cyber risk

Just take a look at some of the major data breaches over the last three to five years

Not only do companies suffer significant financial losses to remediate those events such as regulatory fines and liability expenses, but companies also suffer reputational brand harm that could impact their stock value and their ongoing ability to keep and attract customers

 

Mapped Cyber Risks
Data Security / Loss Extortion Human Error Basic Security Hygiene Identity/Password Protection Insider Threat  

 

Mapped Attack Methods
BotNet Attack Denial Of Service Attack Business Email Impersonation Identity Comprimise Malware Attack Phishing Attack
Ransomware Attack Rootkit Attack Targeted Attack  

 

Mapped Mitigation Methods
Limit & Control Access Protect Data Manage Identities & Passwords Manage Risks, Compliance and Controls Block Threats & Attacks Manage Threats & Vulnerabilities
Enable Visibility  

 

Mapped Solution Categories
Third Party Risk Application Security Cloud Security Data Security DNS Security Email Security
End-Point Security Event Detection & Response Risk & Compliance Identity Mgt Insider Threat/Behavior Mgt iOT/OT Security
Logs Mgt Mobile Security Network Security Privileged Access Threat Analytics Vulnerability / Attack Surface Detection
Web Security  

 

Mapped Functions
Application Security Testing Automated Security Controls Testing Cloud Access Broker (inline) Cloud Access Broker (API/OOB) Cloud Container Security Cloud Discovery
Cloud DLP (Inline) Cloud DLP (API/OOB) Cloud Infra-as-a-Service Security Database Activity Monitoring (DAM) Data Classification & Privacy Data Encryption
Data Tokenization/Masking DDoS Protection Deception User Device Mgt - Software/Patch (End-Point) User Device Mgt - Software/Patch (Mobile) Device Mgt -Software/Patch (Server)
Disk Encryption (End Point) Enterprise DLP DMARC Security DNS Proxy (Off-Prem) DNS Proxy (On-Prem) Email Isolation
Email Behavior Analytics Email Security Cleanup/Automation Email Phishing Simulations Email Threat/SPAM Email User Warnings Application Control (End Point)
User Device Registration (End-Point) User Device Registration (Mobile) Detect & Respond (EDR) (End-Point) File Integrity (FIMM) (End-Point) Media Control (End Point) Next Gen AV (End-Point)
End-Point Protection (End-Point) Incident Response Services SIEM External/Digital Risk Review GRC Access Mgt / SSO
Active Directory Behavior Analysis Admin Server Access API Mgt Authentication/Directory Customer Identity (CIAM) Cloud Identity Monitoring
IDaaS User Identity Self Service Identity Life Cycle Mgt End-Point Local Admin Multi-Factor Auth (MFA) Session Management
IOT Device Visibility Logging Agent Log Collector Managed Hunting Services Managed Security Services (MSS) Mobile Application Reputation
Mobile Threat Network Access Control (NAC) Network Security Policy Auditor Network Security Policy Orchestration SSL Decryption Network Tap
Cloud Network Threat Analytics Network Based Threat Detection Network Threat IPS E/W Network Threat IPS N/S Network Threat Sandbox E/W Network Threat Sandbox N/S
ICS/OT Device Visibility Password Vault Security Automation (SOAR) Security Awareness Training Security Ratings (Vendor & Supplier) Micro-Segmentation
Network Firewall Segmentation (East/West) Network Firewall Segmentation (North/South) Threat Intelligence URL Filtering (Off-Net) URL Filtering (On-Net) URL Filtering/Proxy (On-Net)
URL Filtering/Proxy (On-Net) User & Device Behavior Analysis User Software Self Service (End-Point) User Software Self Service (Mobile) User-Application Access /Zero-Trust VPN End-User VPN
Site-to-Site VPN Vulnerability Scanning Web Application Firewall (WAF) Web Isolation  

 

Mapped Products
Cyberark Alero Okta Advanced Server Access  

 

Mapped OEMs
Cyberark Okta  

 

 

Last Updated: 03202020-11:28:25