Cyber Security Landscape








 

*** Solution Categories - End-Point Security ***

BlaBlaBlaLine1

BlaBlaBlaLine2

BlaBlaBlaLine3

 

Mapped Buisness Risks
Brand Damage Data/Secret Loss Service Disruption  

 

Mapped Cyber Risks
Data Security / Loss Extortion Human Error Basic Security Hygiene Identity/Password Protection Insider Threat  

 

Mapped Attack Methods
BotNet Attack Denial Of Service Attack Business Email Impersonation Identity Comprimise Malware Attack Phishing Attack
Ransomware Attack Rootkit Attack Targeted Attack  

 

Mapped Mitigation Methods
Limit & Control Access Protect Data Block Threats & Attacks Enable Visibility  

 

Mapped Functions
Automated Security Controls Testing User Device Mgt - Software/Patch (End-Point) User Device Mgt - Software/Patch (Mobile) Device Mgt -Software/Patch (Server) Disk Encryption (End Point) Application Control (End Point)
User Device Registration (End-Point) User Device Registration (Mobile) Detect & Respond (EDR) (End-Point) File Integrity (FIMM) (End-Point) Media Control (End Point) Next Gen AV (End-Point)
End-Point Protection (End-Point) User Software Self Service (End-Point) User Software Self Service (Mobile)  

 

 

Last Updated: 03202020-11:28:25