top of page
Our vendors by CIS Control
This is to help you navigate in the realm of cybersecurity: we can help you to cover (almost) the full landscape
Inventory and Control of Enterprise Assets
CONTROL 01
DEVICE VISIBILITY
![](https://static.wixstatic.com/media/31157d_8ba6332ba1844c16941b4ab40ddc3223~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_8ba6332ba1844c16941b4ab40ddc3223~mv2.png)
![](https://static.wixstatic.com/media/31157d_dfeb998932af47079160b0f81a764d62~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_dfeb998932af47079160b0f81a764d62~mv2.png)
MDM / EEM / UEM
![](https://static.wixstatic.com/media/31157d_dfeb998932af47079160b0f81a764d62~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_dfeb998932af47079160b0f81a764d62~mv2.png)
![](https://static.wixstatic.com/media/31157d_85a420cedd874bd8bda038c66a23cf52~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_85a420cedd874bd8bda038c66a23cf52~mv2.png)
SCADA / OT SECURITY
![](https://static.wixstatic.com/media/31157d_8ba6332ba1844c16941b4ab40ddc3223~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_8ba6332ba1844c16941b4ab40ddc3223~mv2.png)
![](https://static.wixstatic.com/media/31157d_953574519fda44b495a5a4ee89ae5630~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_953574519fda44b495a5a4ee89ae5630~mv2.png)
Inventory and Control of Software Assets
CONTROL 02
ENDPOINT SECURITY
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_e1147424ae2544e8b95d6cbd9423053a~mv2.png/v1/fill/w_66,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_e1147424ae2544e8b95d6cbd9423053a~mv2.png)
![](https://static.wixstatic.com/media/594687_7ef4e596cb874e5aaf8c8593a16f35af~mv2.png/v1/fill/w_145,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_7ef4e596cb874e5aaf8c8593a16f35af~mv2.png)
Data Protection
CONTROL 03
DATA LEAK PREVENTION (DLP)
![](https://static.wixstatic.com/media/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png/v1/fill/w_76,h_76,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png)
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
ENTERPRISE DATA ENCRYPTION
![](https://static.wixstatic.com/media/31157d_c2cbe6a8517147af984a1da833ac7ff7~mv2.png/v1/fill/w_76,h_76,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_c2cbe6a8517147af984a1da833ac7ff7~mv2.png)
HW PROTECTION OF CRYPTOGRAPHIC KEYS AND DATA
![](https://static.wixstatic.com/media/31157d_c2cbe6a8517147af984a1da833ac7ff7~mv2.png/v1/fill/w_76,h_76,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_c2cbe6a8517147af984a1da833ac7ff7~mv2.png)
Secure Configuraion of Enterprise Assets and SW
CONTROL 04
MOBILE SECURITY
![](https://static.wixstatic.com/media/31157d_dfeb998932af47079160b0f81a764d62~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_dfeb998932af47079160b0f81a764d62~mv2.png)
![](https://static.wixstatic.com/media/31157d_e1147424ae2544e8b95d6cbd9423053a~mv2.png/v1/fill/w_66,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_e1147424ae2544e8b95d6cbd9423053a~mv2.png)
![](https://static.wixstatic.com/media/31157d_85a420cedd874bd8bda038c66a23cf52~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_85a420cedd874bd8bda038c66a23cf52~mv2.png)
![](https://static.wixstatic.com/media/594687_7ef4e596cb874e5aaf8c8593a16f35af~mv2.png/v1/fill/w_145,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_7ef4e596cb874e5aaf8c8593a16f35af~mv2.png)
NETWORK ROUTERS
![](https://static.wixstatic.com/media/31157d_23fa55e041364336aa45b9af8b75cc6d~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_23fa55e041364336aa45b9af8b75cc6d~mv2.png)
![](https://static.wixstatic.com/media/594687_5fbed9db6caf4ea6a2f1a8a34b2ba65a~mv2.png/v1/fill/w_145,h_43,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_5fbed9db6caf4ea6a2f1a8a34b2ba65a~mv2.png)
NETWORK SWITCHES
![](https://static.wixstatic.com/media/31157d_23fa55e041364336aa45b9af8b75cc6d~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_23fa55e041364336aa45b9af8b75cc6d~mv2.png)
![](https://static.wixstatic.com/media/31157d_5d1bf9ac359241b48335cae2eae1d443~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_5d1bf9ac359241b48335cae2eae1d443~mv2.png)
![](https://static.wixstatic.com/media/31157d_b2b17b9c0bd0448fb2ee5169dfb236e0~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_b2b17b9c0bd0448fb2ee5169dfb236e0~mv2.png)
![](https://static.wixstatic.com/media/594687_5fbed9db6caf4ea6a2f1a8a34b2ba65a~mv2.png/v1/fill/w_145,h_43,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_5fbed9db6caf4ea6a2f1a8a34b2ba65a~mv2.png)
WIRELESS NETWORKS
![](https://static.wixstatic.com/media/31157d_23fa55e041364336aa45b9af8b75cc6d~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_23fa55e041364336aa45b9af8b75cc6d~mv2.png)
![](https://static.wixstatic.com/media/31157d_5d1bf9ac359241b48335cae2eae1d443~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_5d1bf9ac359241b48335cae2eae1d443~mv2.png)
![](https://static.wixstatic.com/media/594687_5fbed9db6caf4ea6a2f1a8a34b2ba65a~mv2.png/v1/fill/w_143,h_43,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_5fbed9db6caf4ea6a2f1a8a34b2ba65a~mv2.png)
![](https://static.wixstatic.com/media/31157d_b2b17b9c0bd0448fb2ee5169dfb236e0~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_b2b17b9c0bd0448fb2ee5169dfb236e0~mv2.png)
Account Management
CONTROL 05
IDENTITY SECURITY (IDM, IAM, IGA)
![](https://static.wixstatic.com/media/31157d_690c7a92247e4fc98ffd48ece0607fae~mv2.png/v1/fill/w_118,h_51,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_690c7a92247e4fc98ffd48ece0607fae~mv2.png)
PRIVILIGED ACCOUNT MANAGEMENT
![](https://static.wixstatic.com/media/31157d_690c7a92247e4fc98ffd48ece0607fae~mv2.png/v1/fill/w_118,h_51,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_690c7a92247e4fc98ffd48ece0607fae~mv2.png)
Access Control Management
CONTROL 06
USER AUTHENTICATION / MFA
![](https://static.wixstatic.com/media/31157d_c2cbe6a8517147af984a1da833ac7ff7~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_c2cbe6a8517147af984a1da833ac7ff7~mv2.png)
![](https://static.wixstatic.com/media/594687_50f503fb33ae468d8cad5b88d138e74c~mv2.png/v1/fill/w_47,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_50f503fb33ae468d8cad5b88d138e74c~mv2.png)
![](https://static.wixstatic.com/media/31157d_1733a3fe4197465c99caf60e84482fb9~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_1733a3fe4197465c99caf60e84482fb9~mv2.png)
SECURE FILE SHARING
![image.png](https://static.wixstatic.com/media/594687_a1734a61721f474bbf5c28b4d0bec214~mv2.png/v1/fill/w_84,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_a1734a61721f474bbf5c28b4d0bec214~mv2.png)
CLOUD ACCESS SECURITY BROKER (CASB)
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_bbff7062eba144c9ac37f1ad91681dd8~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_bbff7062eba144c9ac37f1ad91681dd8~mv2.png)
![](https://static.wixstatic.com/media/31157d_35946feab1c54e099f180234ab8052ce~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_35946feab1c54e099f180234ab8052ce~mv2.png)
SECURE ACCESS SERVICE EDGE (SASE)
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png)
![](https://static.wixstatic.com/media/31157d_bbff7062eba144c9ac37f1ad91681dd8~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_bbff7062eba144c9ac37f1ad91681dd8~mv2.png)
![](https://static.wixstatic.com/media/31157d_01e2f11459a74a0c9e2226bfd540bbdb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_01e2f11459a74a0c9e2226bfd540bbdb~mv2.png)
CLOUD SECURITY POSTURE MGMT (CSPM)
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png)
CLOUD WORKLOAD PROTECTION PLATFORM (CWPP)
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png)
![](https://static.wixstatic.com/media/594687_7ef4e596cb874e5aaf8c8593a16f35af~mv2.png/v1/fill/w_121,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_7ef4e596cb874e5aaf8c8593a16f35af~mv2.png)
CLOUD-NATIVE APPLICATION PROTECTION PLATFORM (CNAPP)
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png)
![](https://static.wixstatic.com/media/594687_7ef4e596cb874e5aaf8c8593a16f35af~mv2.png/v1/fill/w_121,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_7ef4e596cb874e5aaf8c8593a16f35af~mv2.png)
CLOUD INFRASTRUCTURE ENTITLEMENT MGMT (CIEM)
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_690c7a92247e4fc98ffd48ece0607fae~mv2.png/v1/fill/w_118,h_51,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_690c7a92247e4fc98ffd48ece0607fae~mv2.png)
![](https://static.wixstatic.com/media/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png)
![](https://static.wixstatic.com/media/31157d_c2cbe6a8517147af984a1da833ac7ff7~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_c2cbe6a8517147af984a1da833ac7ff7~mv2.png)
Continuous Vulnerability Management
CONTROL 07
VULNERABILITY MANAGEMENT
![](https://static.wixstatic.com/media/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png)
![](https://static.wixstatic.com/media/31157d_86fbedcb5697421ea34b3db066d158e0~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_86fbedcb5697421ea34b3db066d158e0~mv2.png)
![](https://static.wixstatic.com/media/31157d_e1147424ae2544e8b95d6cbd9423053a~mv2.png/v1/fill/w_61,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_e1147424ae2544e8b95d6cbd9423053a~mv2.png)
![](https://static.wixstatic.com/media/31157d_767a614777524b03a360e85a9f50c1f0~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_767a614777524b03a360e85a9f50c1f0~mv2.png)
![](https://static.wixstatic.com/media/31157d_953574519fda44b495a5a4ee89ae5630~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_953574519fda44b495a5a4ee89ae5630~mv2.png)
Audit Log Management
CONTROL 08
SIEM
![](https://static.wixstatic.com/media/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png)
![](https://static.wixstatic.com/media/31157d_55ad232af9c7498eab313b76d763f2eb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_55ad232af9c7498eab313b76d763f2eb~mv2.png)
![](https://static.wixstatic.com/media/594687_547e26ab61914cd3abb53ea3bf59de85~mv2.png/v1/fill/w_94,h_28,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_547e26ab61914cd3abb53ea3bf59de85~mv2.png)
UEBA
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png)
![](https://static.wixstatic.com/media/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png)
![](https://static.wixstatic.com/media/31157d_55ad232af9c7498eab313b76d763f2eb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_55ad232af9c7498eab313b76d763f2eb~mv2.png)
Malware Defenses
CONTROL 10
ANTI-MALWARE SANDBOX
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_114,h_21,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_9a5b1c6a0a0e4a3ca1f409318daadc9e~mv2.png/v1/fill/w_102,h_102,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_9a5b1c6a0a0e4a3ca1f409318daadc9e~mv2.png)
![](https://static.wixstatic.com/media/31157d_01e2f11459a74a0c9e2226bfd540bbdb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_01e2f11459a74a0c9e2226bfd540bbdb~mv2.png)
![](https://static.wixstatic.com/media/31157d_e1147424ae2544e8b95d6cbd9423053a~mv2.png/v1/fill/w_61,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_e1147424ae2544e8b95d6cbd9423053a~mv2.png)
![](https://static.wixstatic.com/media/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png)
Data Recovery
CONTROL 11
BACKUP AND STORAGE
![](https://static.wixstatic.com/media/31157d_11e0d3c79c56475f90aedfbec49467a7~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_11e0d3c79c56475f90aedfbec49467a7~mv2.png)
![](https://static.wixstatic.com/media/31157d_6be690bf1d3d49a9be1a7bd649d60e57~mv2.png/v1/fill/w_48,h_48,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_6be690bf1d3d49a9be1a7bd649d60e57~mv2.png)
Network Monitoring and Defense
CONTROL 13
NEXT GEN FIREWALLS
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png)
![](https://static.wixstatic.com/media/31157d_23fa55e041364336aa45b9af8b75cc6d~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_23fa55e041364336aa45b9af8b75cc6d~mv2.png)
![](https://static.wixstatic.com/media/31157d_01e2f11459a74a0c9e2226bfd540bbdb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_01e2f11459a74a0c9e2226bfd540bbdb~mv2.png)
![](https://static.wixstatic.com/media/31157d_04fb08d7a2634daa98c20b7d41065a9d~mv2.png/v1/fill/w_64,h_64,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_04fb08d7a2634daa98c20b7d41065a9d~mv2.png)
VPN REMOTE ACCESS
![](https://static.wixstatic.com/media/31157d_dfeb998932af47079160b0f81a764d62~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_dfeb998932af47079160b0f81a764d62~mv2.png)
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_76f050e0f5ee44cfb14657a894f49acb~mv2.png)
![](https://static.wixstatic.com/media/31157d_01e2f11459a74a0c9e2226bfd540bbdb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_01e2f11459a74a0c9e2226bfd540bbdb~mv2.png)
![](https://static.wixstatic.com/media/31157d_bbff7062eba144c9ac37f1ad91681dd8~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_bbff7062eba144c9ac37f1ad91681dd8~mv2.png)
INTRUSION PREVENTION SYSTEM
![](https://static.wixstatic.com/media/31157d_04fb08d7a2634daa98c20b7d41065a9d~mv2.png/v1/fill/w_64,h_64,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_04fb08d7a2634daa98c20b7d41065a9d~mv2.png)
![](https://static.wixstatic.com/media/31157d_01e2f11459a74a0c9e2226bfd540bbdb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_01e2f11459a74a0c9e2226bfd540bbdb~mv2.png)
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
DETECTION AND RESPONSE (NDR/XDR)
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png)
![](https://static.wixstatic.com/media/31157d_e1147424ae2544e8b95d6cbd9423053a~mv2.png/v1/fill/w_61,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_e1147424ae2544e8b95d6cbd9423053a~mv2.png)
![](https://static.wixstatic.com/media/31157d_55ad232af9c7498eab313b76d763f2eb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_55ad232af9c7498eab313b76d763f2eb~mv2.png)
ANTI-DDOS
![](https://static.wixstatic.com/media/594687_6a40db03e2ce46aebaf26ccff82fd963~mv2.png/v1/fill/w_136,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_6a40db03e2ce46aebaf26ccff82fd963~mv2.png)
NETWORK ACCESS CONTROL
![](https://static.wixstatic.com/media/31157d_dfeb998932af47079160b0f81a764d62~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_dfeb998932af47079160b0f81a764d62~mv2.png)
![](https://static.wixstatic.com/media/31157d_8ba6332ba1844c16941b4ab40ddc3223~mv2.png/v1/fill/w_79,h_79,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_8ba6332ba1844c16941b4ab40ddc3223~mv2.png)
Application Software Security
CONTROL 16
WEB APPLICATION FIREWALL
![](https://static.wixstatic.com/media/594687_6a40db03e2ce46aebaf26ccff82fd963~mv2.png/v1/fill/w_136,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_6a40db03e2ce46aebaf26ccff82fd963~mv2.png)
APPLICATION DELIVERY CONTROLLER
![](https://static.wixstatic.com/media/594687_6a40db03e2ce46aebaf26ccff82fd963~mv2.png/v1/fill/w_136,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_6a40db03e2ce46aebaf26ccff82fd963~mv2.png)
Incident Response Management
CONTROL 17
SOAR
![](https://static.wixstatic.com/media/594687_1c6481a67b10448185948946154fc789~mv2.png/v1/fill/w_125,h_23,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_1c6481a67b10448185948946154fc789~mv2.png)
![](https://static.wixstatic.com/media/31157d_55ad232af9c7498eab313b76d763f2eb~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_55ad232af9c7498eab313b76d763f2eb~mv2.png)
Threat Intelligence
![](https://static.wixstatic.com/media/31157d_9a5b1c6a0a0e4a3ca1f409318daadc9e~mv2.png/v1/fill/w_102,h_102,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_9a5b1c6a0a0e4a3ca1f409318daadc9e~mv2.png)
![](https://static.wixstatic.com/media/594687_39963bacbe95498fb9cb7b896e1b3a3d~mv2.png/v1/fill/w_85,h_42,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_39963bacbe95498fb9cb7b896e1b3a3d~mv2.png)
Penetration Testing
CONTROL 18
PENETRATION TESTS, BREACH SIMULATIONS
![](https://static.wixstatic.com/media/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/31157d_f89143cdb7cc44ffaa5b84975ab6a826~mv2.png)
![](https://static.wixstatic.com/media/594687_a7026bb0288e4cd2929b4be47f10a4d2~mv2.png/v1/fill/w_54,h_32,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/594687_a7026bb0288e4cd2929b4be47f10a4d2~mv2.png)
bottom of page