Cyber Security Landscape








 

*** Solution Categories - Insider Threat/Behavior Mgt ***

BlaBlaBlaLine1

BlaBlaBlaLine2

BlaBlaBlaLine3

 

Mapped Buisness Risks
Brand Damage Data/Secret Loss Service Disruption  

 

Mapped Cyber Risks
Data Security / Loss Extortion Human Error Basic Security Hygiene Identity/Password Protection Insider Threat  

 

Mapped Attack Methods
BotNet Attack Denial Of Service Attack Identity Comprimise Malware Attack Phishing Attack Ransomware Attack
Rootkit Attack Targeted Attack  

 

Mapped Mitigation Methods
Limit & Control Access Manage Identities & Passwords  

 

Mapped Functions
Automated Security Controls Testing Cloud Access Broker (inline) Cloud Access Broker (API/OOB) Cloud DLP (Inline) Cloud DLP (API/OOB) Deception
Application Control (End Point) Access Mgt / SSO Active Directory Behavior Analysis Admin Server Access Authentication/Directory Customer Identity (CIAM)
Cloud Identity Monitoring Cloud Network Threat Analytics Security Awareness Training User & Device Behavior Analysis  

 

Mapped Products
Cyberark Alero Okta Advanced Server Access  

 

Mapped OEMs
Cyberark Okta  

 

 

Last Updated: 03202020-11:28:25