Logo
  • About
  • Sources
  • Models
  • Tools
Contact Us
C - Mapping

C - Mapping

C:

1 – Endpoint (North / South)
2 – Endpoint (East / West)
3 – DDoS / WAF
Firewalls: Check Point -  Next Generation Firewalls (NGFW)Check Point - Next Generation Firewalls (NGFW)
Firewalls: Check Point -  Next Generation Firewalls (NGFW)Check Point - Next Generation Firewalls (NGFW)
Imperva - Application Security (DDoS & WAF)Imperva - Application Security (DDoS & WAF)
AV: Sophos - Enterprise AntivirusSophos - Enterprise Antivirus
CASB: Netskope - CASBNetskope - CASB
Email Security: Smarsh - Email ArchivingSmarsh - Email Archiving
4 – Cloud SIEM / SOAR
5 – Vul Mgmt. / TI
6 – IAM / MFA / PAM
Splunk - SIEM / SOARSplunk - SIEM / SOAR
Vuln Mgmt: Orca - Vulnerability ManagementOrca - Vulnerability Management Torii Security - SaaS ManagementTorii Security - SaaS Management Adaptive Shield - SSPM - SaaS Security Posture ManagementAdaptive Shield - SSPM - SaaS Security Posture Management
Ping Identity - PingOne for WorkforcePing Identity - PingOne for Workforce
Threat Intel:
Delinea - Privilege Access ManagementDelinea - Privilege Access Management
7 – Endpoint (XDR AI/UBA)
8 – Workload Protection
9 – ZTNA
Trend Micro - EDRTrend Micro - EDR
IllumioIllumio
0 – Cross Framework
Backup & Recovery: Cohesity - Backup & RecoveryCohesity - Backup & Recovery
Encryption:
Logo