Cyber Security Landscape








 

*** Mitigation Methods - Manage Identities & Passwords ***

BlaBlaBlaLine1

BlaBlaBlaLine2

BlaBlaBlaLine3

 

Mapped Buisness Risks
Brand Damage Data/Secret Loss Service Disruption  

 

Mapped Cyber Risks
Data Security / Loss Extortion Human Error Basic Security Hygiene Identity/Password Protection Insider Threat  

 

Mapped Attack Methods
Identity Comprimise Targeted Attack  

 

Mapped Solution Categories
Application Security Cloud Security Identity Mgt Insider Threat/Behavior Mgt Logs Mgt Privileged Access
Web Security  

 

Mapped Functions
Application Security Testing Automated Security Controls Testing Cloud Access Broker (inline) Cloud Access Broker (API/OOB) Cloud Container Security Cloud Discovery
Cloud DLP (Inline) Cloud DLP (API/OOB) Cloud Infra-as-a-Service Security Data Classification & Privacy DDoS Protection Deception
Application Control (End Point) Access Mgt / SSO Active Directory Behavior Analysis Admin Server Access API Mgt Authentication/Directory
Customer Identity (CIAM) Cloud Identity Monitoring IDaaS User Identity Self Service Identity Life Cycle Mgt End-Point Local Admin
Multi-Factor Auth (MFA) Session Management Logging Agent Log Collector Cloud Network Threat Analytics Password Vault
Security Awareness Training URL Filtering (Off-Net) URL Filtering (On-Net) URL Filtering/Proxy (On-Net) URL Filtering/Proxy (On-Net) User & Device Behavior Analysis
User-Application Access /Zero-Trust VPN Web Application Firewall (WAF) Web Isolation  

 

Mapped Products
Cyberark Alero Okta Advanced Server Access  

 

Mapped OEMs
Cyberark Okta  

 

 

Last Updated: 03202020-11:28:25