Control the network, technology, and data. It is the outer edge of to control and have a responsibility to safeguard. As such, it is also the first point of contact for many external threats to the network.
- IDS/IPS
- Firewall
- DMZs
- Message Security (anti-virus, anti-malware)
Protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system.
- Enterprise Message Security
- Web Proxy Content Filtering
- Enclave / DataCenter Firewall
- Enterprise IDS/IPS
Protection of computer networks that are remotely bridged to client devices. Attempts to ensure that such devices follow a definite level of compliance to standards.
- Host IDS/IPS
- Content Security (anti-virus, anti-malware)
- Endpoint Security Enforcement
- Desktop Firewall
Encompasses measures taken to improve the security of an application by finding, fixing and preventing security vulnerabilities.
- Dynamic App Testing
- Static App Testing / Code Review
- Database Monitoring / Scanning
- Database Secure Gateway (Shield)
- WAF
Protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.
- Data Integrity Monitoring
- Data Classification
- Identity & Access Management
- Enterprise Right Management
- D L P
Prevention (Policy Management)
- Penetration Testing
- Vulnerability Assessment
- Cyber Threat Intelligence
- Security Architecture & Design
- Security Policies & Compliance
- Risk Management
Monitoring and Response (Operations)
- SIEM
- SOC/NOC Monitoring (24x7)
- Security Dashboard
- Digital Forensics
- Security SLA/SLO Reporting
- Incident Reporting, Detection, Response (CIRT)
- Continuous Monitoring and Assessment Situational Awareness