Cyber Security Landscape








 

*** Solution Categories - Identity Mgt ***

BlaBlaBlaLine1

BlaBlaBlaLine2

BlaBlaBlaLine3

 

Mapped Buisness Risks
Brand Damage Data/Secret Loss Service Disruption  

 

Mapped Cyber Risks
Data Security / Loss Extortion Human Error Basic Security Hygiene Identity/Password Protection Insider Threat  

 

Mapped Attack Methods
BotNet Attack Denial Of Service Attack Identity Comprimise Malware Attack Phishing Attack Ransomware Attack
Rootkit Attack Targeted Attack  

 

Mapped Mitigation Methods
Limit & Control Access Manage Identities & Passwords Block Threats & Attacks  

 

Mapped Functions
Automated Security Controls Testing Access Mgt / SSO Active Directory Behavior Analysis Admin Server Access API Mgt Authentication/Directory
Customer Identity (CIAM) Cloud Identity Monitoring IDaaS User Identity Self Service Identity Life Cycle Mgt Multi-Factor Auth (MFA)  

 

Mapped Products
Cyberark Alero Okta Advanced Server Access  

 

Mapped OEMs
Cyberark Okta  

 

 

Last Updated: 03202020-11:28:25