Cyber Security Landscape








 

*** Mitigation Methods - Block Threats & Attacks ***

BlaBlaBlaLine1

BlaBlaBlaLine2

BlaBlaBlaLine3

 

Mapped Buisness Risks
Brand Damage Data/Secret Loss Service Disruption  

 

Mapped Cyber Risks
Data Security / Loss Extortion Human Error Basic Security Hygiene Identity/Password Protection Insider Threat  

 

Mapped Attack Methods
BotNet Attack Denial Of Service Attack Identity Comprimise Malware Attack Phishing Attack Ransomware Attack
Rootkit Attack Targeted Attack  

 

Mapped Solution Categories
Cloud Security DNS Security Email Security End-Point Security Event Detection & Response Identity Mgt
iOT/OT Security Logs Mgt Mobile Security Network Security Threat Analytics Web Security  

 

Mapped Functions
Automated Security Controls Testing Cloud Access Broker (inline) Cloud Access Broker (API/OOB) Cloud Container Security Cloud Discovery Cloud DLP (Inline)
Cloud DLP (API/OOB) Cloud Infra-as-a-Service Security Database Activity Monitoring (DAM) DDoS Protection Deception User Device Mgt - Software/Patch (End-Point)
User Device Mgt - Software/Patch (Mobile) Device Mgt -Software/Patch (Server) Disk Encryption (End Point) DMARC Security DNS Proxy (Off-Prem) DNS Proxy (On-Prem)
Email Isolation Email Behavior Analytics Email Security Cleanup/Automation Email Phishing Simulations Email Threat/SPAM Email User Warnings
Application Control (End Point) User Device Registration (End-Point) User Device Registration (Mobile) Detect & Respond (EDR) (End-Point) File Integrity (FIMM) (End-Point) Media Control (End Point)
Next Gen AV (End-Point) End-Point Protection (End-Point) Incident Response Services SIEM Access Mgt / SSO Active Directory Behavior Analysis
Admin Server Access API Mgt Authentication/Directory Customer Identity (CIAM) Cloud Identity Monitoring IDaaS
User Identity Self Service Identity Life Cycle Mgt Multi-Factor Auth (MFA) IOT Device Visibility Logging Agent Log Collector
Managed Hunting Services Managed Security Services (MSS) Mobile Application Reputation Mobile Threat Network Access Control (NAC) Network Security Policy Auditor
Network Security Policy Orchestration SSL Decryption Network Tap Cloud Network Threat Analytics Network Based Threat Detection Network Threat IPS E/W
Network Threat IPS N/S Network Threat Sandbox E/W Network Threat Sandbox N/S ICS/OT Device Visibility Security Automation (SOAR) Micro-Segmentation
Network Firewall Segmentation (East/West) Network Firewall Segmentation (North/South) Threat Intelligence URL Filtering (Off-Net) URL Filtering (On-Net) URL Filtering/Proxy (On-Net)
URL Filtering/Proxy (On-Net) User Software Self Service (End-Point) User Software Self Service (Mobile) End-User VPN Site-to-Site VPN Web Isolation  

 

Mapped Products
Cyberark Alero Okta Advanced Server Access  

 

Mapped OEMs
Cyberark Okta  

 

 

Last Updated: 03202020-11:28:25