Logo
  • About
  • Sources
  • Models
  • Tools
Contact Us
X - Mapping

X - Mapping

X:

1 – Endpoint (North / South)
2 – Endpoint (East / West)
3 – DDoS / WAF
Firewalls: Fortinet - NGFWFortinet - NGFW
Firewalls: Fortinet - NGFWFortinet - NGFW
Netscout - Arbor Networks - DDoSNetscout - Arbor Networks - DDoS
AV:
CASB: Forcepoint - Bitglass CASB Forcepoint - Bitglass CASB
Email Security: Global Relay - Email Communication SurveillanceGlobal Relay - Email Communication Surveillance
CASB / ITDR: Push Security CASB (ISPM & ITDR)Push Security CASB (ISPM & ITDR)
4 – Cloud SIEM / SOAR
5 – Vul Mgmt. / TI
6 – IAM / MFA / PAM
Securonix - Unified Defense SIEMSecuronix - Unified Defense SIEM Exabeam - SIEMExabeam - SIEM
Vuln Mgmt: Lacework - CNAPP Lacework - CNAPP Tigera - CNAPP - Vulnerability MgmtTigera - CNAPP - Vulnerability Mgmt Obsidian - SSPM - SaaS Security Posture ManagementObsidian - SSPM - SaaS Security Posture Management AvePoint - SaaS ManagementAvePoint - SaaS Management Cledara - SaaS ManagementCledara - SaaS Management Zluri - SaaS ManagementZluri - SaaS Management
IBM - Security - Verify IdentityIBM - Security - Verify Identity CyberArk - Privilege Access ManagementCyberArk - Privilege Access Management
LogRhythm - SIEM (Axon)LogRhythm - SIEM (Axon) Devo - SIEMDevo - SIEM
Threat Intel:
7 – Endpoint (XDR AI/UBA)
8 – Workload Protection
9 – ZTNA
Sophos - XDRSophos - XDR Check Point - Infinity XDR/XPR:  Extended Prevention & ResponseCheck Point - Infinity XDR/XPR: Extended Prevention & Response Broadcom / Symantec - Endpoint Security EnterpriseBroadcom / Symantec - Endpoint Security Enterprise
0 – Cross Framework
Backup & Recovery:
Encryption:
Logo