Logo
  • About
  • Sources
  • Models
  • Tools
Contact Us
IBM - Mapping

IBM - Mapping

IBM:

1 – Endpoint (North / South)
2 – Endpoint (East / West)
3 – DDoS / WAF
IBM Security - MaaS360IBM Security - MaaS360
IBM - Trusteer RapportIBM - Trusteer Rapport
IBM - Trusteer Rapport - MobileIBM - Trusteer Rapport - Mobile
4 – Cloud SIEM / SOAR
5 – Vul Mgmt. / TI
6 – IAM / MFA / PAM
IBM QRadar - SIEM / SOARIBM QRadar - SIEM / SOAR IBM - QRadar Log InsightsIBM - QRadar Log Insights IBM - Mainframe zSecure SuiteIBM - Mainframe zSecure Suite
Vuln Mgmt: IBM - Guardium Vulnerability AssessmentIBM - Guardium Vulnerability Assessment IBM - Guardium Data ProtectionIBM - Guardium Data Protection IBM - Guardium Data Risk ManagerIBM - Guardium Data Risk Manager IBM - Guardium InsightsIBM - Guardium Insights IBM - Guardium Discover & ClassifyIBM - Guardium Discover & Classify IBM - Randori ReconIBM - Randori Recon
IBM - Security - Verify IdentityIBM - Security - Verify Identity IBM - Security - Verify GovernanceIBM - Security - Verify Governance IBM - Security - Verify Privilege ManagerIBM - Security - Verify Privilege Manager IBM - Security - Verify Trust IBM - Security - Verify Trust IBM - Trusteer Pinpoint DetectIBM - Trusteer Pinpoint Detect IBM - Trusteer Pinpoint AssureIBM - Trusteer Pinpoint Assure
IBM - X-ForceIBM - X-Force
Threat Intel: IBM - X-ForceIBM - X-Force IBM - Randori ReconIBM - Randori Recon
7 – Endpoint (XDR AI/UBA)
8 – Workload Protection
9 – ZTNA
IBM - QRadar EDRIBM - QRadar EDR
IBM - Trusteer Pinpoint DetectIBM - Trusteer Pinpoint Detect IBM - Trusteer Pinpoint AssureIBM - Trusteer Pinpoint Assure
0 – Cross Framework
Backup & Recovery: IBM - Storage Protect CloudIBM - Storage Protect Cloud IBM - Storage DefenderIBM - Storage Defender
Encryption: IBM - Guardium Data EncryptionIBM - Guardium Data Encryption IBM - Guardium Key Lifecycle ManagerIBM - Guardium Key Lifecycle Manager
Logo