0% found this document useful (0 votes)
299 views

Cyber Scape

The document outlines the various security products and services offered by a cybersecurity company, organized into categories including network & infrastructure security, web security, endpoint security, application security, data security, mobile security, risk & compliance, security operations & incident response, threat intelligence, IoT, and security consulting & services. Specific offerings mentioned include network access control, software-defined networking, DDoS protection, DNS security, network firewall, deception techniques, managed security services, encryption, data loss prevention, data privacy, data-centric security, risk assessment, security information and event management, security incident response, identity and access management, authentication, digital risk management, security analytics, blockchain, fraud prevention, cloud security, container security, and

Uploaded by

fernando
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
299 views

Cyber Scape

The document outlines the various security products and services offered by a cybersecurity company, organized into categories including network & infrastructure security, web security, endpoint security, application security, data security, mobile security, risk & compliance, security operations & incident response, threat intelligence, IoT, and security consulting & services. Specific offerings mentioned include network access control, software-defined networking, DDoS protection, DNS security, network firewall, deception techniques, managed security services, encryption, data loss prevention, data privacy, data-centric security, risk assessment, security information and event management, security incident response, identity and access management, authentication, digital risk management, security analytics, blockchain, fraud prevention, cloud security, container security, and

Uploaded by

fernando
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

2020

Network & Infrastructure Security Web Security Endpoint Security Application Security
Advanced Threat Protection ICS + OT Endpoint Prevention WAF & Application Security

NAC SDN DDoS Protection DNS Security

Network Analysis & Forensics Endpoint Detection & Response


Application Security Testing

Network Firewall

Deception

MSSP Data Security Mobile Security


Traditional MSSP Advanced MSS & MDR Encryption DLP Data Privacy Data Centric Security

Risk & Compliance Security Operations & Incident Response Threat Intelligence IoT Messaging Security
Risk Assessment & Visibility Risk Quantification SIEM IoT Devices

Automotive
Pen Testing & Breach Simulation GRC Security Awareness & Training

Connected Home
Security Incident Response

Identity & Access Management


Authentication
Digital Risk Management Security Consulting & Services

Blockchain Fraud & Transaction Security


IDaaS Security Analytics

Privileged Management

Cloud Security
Identity Governance Infrastructure CASB
Container

Consumer Identity

You might also like