Logo
  • About
  • Sources
  • Models
  • Tools
Contact Us
Coro Security - Mapping

Coro Security - Mapping

1 – Endpoint (North / South)
2 – Endpoint (East / West)
3 – DDoS / WAF
Firewalls: Coro - Cloud Network Security ModulesCoro - Cloud Network Security Modules
Firewalls: Coro - Cloud Network Security ModulesCoro - Cloud Network Security Modules
Coro - Cloud Network Security ModulesCoro - Cloud Network Security Modules
AV: Coro - Email Security ModulesCoro - Email Security Modules
CASB:
Email Security: Coro - Email Security ModulesCoro - Email Security Modules
4 – Cloud SIEM / SOAR
5 – Vul Mgmt. / TI
6 – IAM / MFA / PAM
Coro - Endpoint Security ModulesCoro - Endpoint Security Modules
Vuln Mgmt: Coro - Endpoint Security ModulesCoro - Endpoint Security Modules
Threat Intel:
7 – Endpoint (XDR AI/UBA)
8 – Workload Protection
9 – ZTNA
Coro - Endpoint Security ModulesCoro - Endpoint Security Modules
Coro - Cloud Network Security ModulesCoro - Cloud Network Security Modules
0 – Cross Framework
Backup & Recovery:
Encryption:
Logo