top of page

Our vendors by CIS Control

This is to help you navigate in the realm of cybersecurity: we can help you to cover (almost) the full landscape

Inventory and Control of Enterprise Assets

CONTROL 01

DEVICE VISIBILITY

MDM / EEM / UEM

SCADA / OT SECURITY

Inventory and Control of Software Assets

CONTROL 02

ENDPOINT SECURITY

Data Protection

CONTROL 03

DATA LEAK PREVENTION (DLP)

ENTERPRISE DATA ENCRYPTION

HW PROTECTION OF CRYPTOGRAPHIC KEYS AND DATA

Secure Configuraion of Enterprise Assets and SW

CONTROL 04

MOBILE SECURITY

NETWORK ROUTERS

NETWORK SWITCHES

WIRELESS NETWORKS

Account Management

CONTROL 05

IDENTITY SECURITY (IDM, IAM, IGA)

PRIVILIGED ACCOUNT MANAGEMENT

Access Control Management

CONTROL 06

USER AUTHENTICATION / MFA

SECURE FILE SHARING

image.png

CLOUD ACCESS SECURITY BROKER (CASB)

SECURE ACCESS SERVICE EDGE (SASE)

CLOUD SECURITY POSTURE MGMT (CSPM)

CLOUD WORKLOAD PROTECTION PLATFORM (CWPP)

CLOUD-NATIVE APPLICATION PROTECTION PLATFORM (CNAPP)

CLOUD INFRASTRUCTURE ENTITLEMENT MGMT (CIEM)

Continuous Vulnerability Management

CONTROL 07

VULNERABILITY MANAGEMENT

Audit Log Management

CONTROL 08

SIEM

UEBA

Email Web Browser and Protection

CONTROL 09

SECURE WEB GATEWAY

SECURE EMAIL GATEWAY

Malware Defenses

CONTROL 10

ANTI-MALWARE SANDBOX

Data Recovery

CONTROL 11

BACKUP AND STORAGE

Network Monitoring and Defense

CONTROL 13

NEXT GEN FIREWALLS

VPN REMOTE ACCESS

INTRUSION PREVENTION SYSTEM

DETECTION AND RESPONSE (NDR/XDR)

ANTI-DDOS

NETWORK ACCESS CONTROL

Security Awareness and Skills Training

CONTROL 14

SECURITY AWARENESS TRAININGS

Application Software Security

CONTROL 16

WEB APPLICATION FIREWALL

APPLICATION DELIVERY CONTROLLER

Incident Response Management

CONTROL 17

SOAR

Threat Intelligence

Penetration Testing

CONTROL 18

PENETRATION TESTS, BREACH SIMULATIONS

MEGVÉDENÉD A VÁLLALATODAT?

Mi a biztonsági célod? Válaszd ki:

KAPCSOLAT

Socurity IT Kft.

mail
onlinecall
socialmedia

Socurity IT © 2024

bottom of page