Logo
  • About
  • Sources
  • Models
  • Tools
Contact Us
B - Mapping

B - Mapping

B:

1 – Endpoint (North / South)
2 – Endpoint (East / West)
3 – DDoS / WAF
Firewalls: Cisco -  Secure FirewallCisco - Secure Firewall
Firewalls: Cisco -  Secure FirewallCisco - Secure Firewall
AkamaiAkamai
AV: McAfee - Enterprise AntivirusMcAfee - Enterprise Antivirus
CASB: Skyhigh Security - CASB (McAfee)Skyhigh Security - CASB (McAfee)
Email Security: Mimecast - Email SecurityMimecast - Email Security
4 – Cloud SIEM / SOAR
5 – Vul Mgmt. / TI
6 – IAM / MFA / PAM
Palo Alto Cortex XSOARPalo Alto Cortex XSOAR Red Canary - MDR / SOC Operation ServicesRed Canary - MDR / SOC Operation Services
Vuln Mgmt: Tenable - Insight Vulnerability ManagementTenable - Insight Vulnerability Management Aqua Security - CNAPP - Vulnerability ManagementAqua Security - CNAPP - Vulnerability Management Wing Security - SSPM - SaaS Security Posture ManagementWing Security - SSPM - SaaS Security Posture Management BetterCloud - SaaS ManagementBetterCloud - SaaS Management
Cisco DUOCisco DUO
Threat Intel:
CyberArk - Privilege Access ManagementCyberArk - Privilege Access Management
7 – Endpoint (XDR AI/UBA)
8 – Workload Protection
9 – ZTNA
SentinelOne - XDR - Respond ProSentinelOne - XDR - Respond Pro
Cisco Secure Workload - TetrationCisco Secure Workload - Tetration
Palo Alto Prisma CloudPalo Alto Prisma Cloud
0 – Cross Framework
Backup & Recovery: Commvault - Back Up & RecoveryCommvault - Back Up & Recovery
Encryption:
Red Canary - MDR / SOC Operation ServicesRed Canary - MDR / SOC Operation Services
Logo