Logo
  • About
  • Sources
  • Models
  • Tools
Contact Us
A - Mapping

A - Mapping

A:

1 – Endpoint (North / South)
2 – Endpoint (East / West)
3 – DDoS / WAF
Firewalls: Palo Alto Next Generation Firewalls (NGFW)Palo Alto Next Generation Firewalls (NGFW)
Firewalls: Palo Alto Next Generation Firewalls (NGFW)Palo Alto Next Generation Firewalls (NGFW)
CloudflareCloudflare
AV: Symantec Endpoint Security EnterpriseSymantec Endpoint Security Enterprise
CASB: Cisco - Cloudlock CASBCisco - Cloudlock CASB
Email Security: Proofpoint - Email SecurityProofpoint - Email Security
4 – Cloud SIEM / SOAR
5 – Vul Mgmt. / TI
6 – IAM / MFA / PAM
IBM QRadar - SIEM / SOARIBM QRadar - SIEM / SOAR Expel - MDR / SOC Operation ServicesExpel - MDR / SOC Operation Services
Vuln Mgmt: Qualys - Vulnerability ManagementQualys - Vulnerability Management Wiz - Vulnerability ManagementWiz - Vulnerability Management Valence Security - SSPM - SaaS Security Posture ManagementValence Security - SSPM - SaaS Security Posture Management Zylo - SaaS ManagementZylo - SaaS Management Palo Alto Prisma CloudPalo Alto Prisma Cloud
OKTA - Identity & Access ManagementOKTA - Identity & Access Management
Threat Intel: Recorded FutureRecorded Future
BeyondTrust - Privilege Access ManagementBeyondTrust - Privilege Access Management
7 – Endpoint (XDR AI/UBA)
8 – Workload Protection
9 – ZTNA
Crowdstrike XDRCrowdstrike XDR
GuardicoreGuardicore
ZscalerZscaler
0 – Cross Framework
Backup & Recovery: Veeam - Back Up & RecoveryVeeam - Back Up & Recovery
Encryption: Thales (Vormetric) CipherTrust ManagerThales (Vormetric) CipherTrust Manager
Logo