Ασφάλεια API Μεσίτης ασφαλείας πρόσβασης στο νέφος (CASB) Cloud Compliance Ασφάλεια δεδομένων νέφους Cloud DDoS Mitigation Ασφάλεια Edge νέφους Ασφάλεια αρχείων νέφους Διαχείριση στάσης ασφαλείας νέφους (CSPM) Προστασία φόρτου εργασίας νέφους Εκτεταμένη ανίχνευση και απόκριση (XDR) Secure Access Service Edge (SASE) Service Mesh Cloud Access Security Broker Cloud security case management Extended detection and response Secure Access Service Edge Service network Protect files in the cloud Cloud Security State Management (CSPM) Workload protection in the cloud Advanced Detection and Response (XDR) Compliance with cloud rules Data security in the cloud DDoS Mitigation in the Cloud Secure device connections to the cloud Secure files in the cloud Cloud Security Status Management (CSPM) Protecting cloud workloads Enhanced Detection and Response (XDR) Secure Access Service Edge (SASE) security Service Mesh level Secure Cloud Access Control Point (CASB) Compliance in the cloud Mitigating DDoS in the cloud Edge security in the cloud File security in the cloud DDoS defence in the cloud Συμμόρφωση με το υπολογιστικό νέφος Μετριασμός DDoS νέφους Πλέγμα υπηρεσιών Peripheral security in the cloud Cloud following Mitigating DDoS attacks in the cloud Security at the edge of the cloud Secure Edge Access Service (SASE) Network of services Mitigation of Distributed Denial of Service (DDoS) attacks in the cloud Cloud endpoint security API protection Compliance with cloud usage regulations Security of edge network data in the cloud Cloud-based workload protection platform Managing data sharing among applications Service web Cloud Access Security Brokerage Service (CASB) Securing cloud data Securing cloud files Cloud DDoS damage mitigation Cybersecurity posture management (CSPM) Secure Access Edge Service (SASE) Service structure (Service Mesh) DDoS risk mitigation in the cloud Cloud Security Posture Management (CSPM, cloud security posture management) Protecting workloads in the cloud Perimeter security in the cloud Secure access to peripheral services (SASE) Cloud security Protection of workload in the cloud The working framework 'Secure Access Service Edge' (SASE) Cloud computing security The security of application programming interfaces (APIs) Compliance with cloud system requirements Data security on cloud systems Reducing the risk of distributed denial of service (DDoS) attacks on cloud systems. Edge security on cloud systems File security on cloud systems Protecting workloads on the cloud Scope of secure access services (SASE) Service network system Cloud Compatibility Comprehensive Detection and Response (XDR) Secure Access Service End (SASE) Compliance with cloud standards Mitigating the effects of cloud DDoS attacks Cloud security management (CSPM) Advanced detection and response Secure border access technology (SASE) Cloud DDoS attack mitigation
Διαχείριση κύκλου ζωής πιστοποιητικών DMARC Κρυπτογράφηση Proxy Network Πιστοποιητικά SSL & TLS SSL and TLS certificates Δίκτυο διακομιστών μεσολάβησης Certificates lifecycle management Network proxy Salvage Certificate in Lifecycle Management Management of the certificate lifecycle Certificate life-cycle management SSL & TLS Certificate Certificate lifetime management Lifecycle management for certificates DMARC (Domain-based Message Authentication, Reporting & Conformance) Proxy networks Certified lifecycle management Verification of message authenticity, reporting, and domain alignment (DMARC) Secure Socket Layer (SSL) certificates and Transport Layer Security (TLS) security.
Ασφάλεια βάσεων δεδομένων Data Center Security Δεδομενοκεντρική ασφάλεια Data Loss Prevention (DLP) Data Masking Software Encryption Key Management Ασφάλεια κινητών δεδομένων Secrets Management Ασφάλεια κέντρων δεδομένων Prevent data loss Data hiding programmes Διαχείριση μυστικών Data Loss Protection (DLP) Managing encryption codes Secrecy management Security in the data centre Αποτροπή απώλειας δεδομένων Λογισμικό κάλυψης δεδομένων Διαχείριση κρυπτογραφικών κλειδιών Management of Encryption Key Secret management Database backup Data security on mobile devices Data-driven security Managing secrets Privacy Data Concealment Software Mobile Cloud Security Confidential Management Key management Managing encryption keys Software for data masking Management of encryption keys Data-centred security Data Hiding Software Key management coding Key management for encryption Management of the encryption key Data Centred Security Secret Series Management Protection against data loss Manage encryption keys Managing digital identity credentials Data-centric security system Password management
Ασφάλεια email νέφους Email anti-spam Κρυπτογράφηση email Ευφυής προστασία email Secure Email Gateway Spam email prevention Smart email protection Secure emails in the cloud Anti-spam measures Ασφαλής πύλη email Email security in the cloud Secure e-mail gateway Blocking email spam Cloud Security Anti-spam e-mail Intelligent e-mail protection Secure messaging gateway Preventing spam emails Protection against spam Secure email access Anti-Spam Email Securing cloud email Block email spam Antispam Email Get Secure Email Route Antispam in e-mail Antispam e-mail Email encoding Secure e-mail portal Protection against unwanted e-mail Spam protection Email security on cloud systems Email spam prevention Spam Blocker in Email Secure Email Gateways Protection against spam emails
Antivirus Endpoint Detection & Response (EDR) Διαχείριση τελικών σημείων Προστασία τελικού σημείου Discovering the endpoint and responding to it. Antivirus program Ανίχνευση και απόκριση τελικού σημείου (EDR) Recognition of endpoints and response (EDR) End Point Management End-point detection and response (EDR) End-point management Virus protection Destination management Endpoint Detection and Response antivirus software
Βιομετρικός έλεγχος ταυτότητας Cloud Directory Διαχείριση ταυτότητας και πρόσβασης πελατών (CIAM) Decentralized Identity Διαχείριση ταυτότητας και πρόσβασης (IAM) Επαλήθευση ταυτότητας πολλαπλών παραγόντων (MFA) Passwordless Authentication Password Manager Password Policy Enforcement Διαχείριση προνομιακής πρόσβασης (PAM) Επαλήθευση ταυτότητας βάσει κινδύνου Αυτοεξυπηρετούμενη επαναφορά κωδικού πρόσβασης (SSPR) Ενιαία σύνδεση (SSO) User Provisioning and Governance Cloud Guide Customer identity and access management Αποκεντρωμένη ταυτότητα Identity and Access Management Multi-factor authentication Enforcement of password policy Privileged Access Management Resetting the self-service password. Single sign-on Provisioning and governance for the user Επαλήθευση ταυτότητας χωρίς κωδικό πρόσβασης Application of password rules Self Service Password Reset (SSPR) Single entry (SSO) User provision and management Biometric verification Multi-factor verification (MFA) Verification without password Risk-based verification User supply and management Enforcement of the password policy Κατάλογος νέφους Διαχείριση κωδικών πρόσβασης Επιβολή πολιτικής κωδικών πρόσβασης Παροχή και διακυβέρνηση χρηστών Compliance with the password policy Enforcement of the confidentiality policy Special Access Management (PAM) Self-service password recovery (SSPR) Booking and managing users User Provisioning and Management Authentication without a password Application of the password policy Provisioning and user governance Cloud Address Guide Resource allocation for users and monitoring of users Biometric authentication check Enforcement of password rules Single Sign-On (SSO): Assignment of privileges and user management Cloud library Risk-based certification User rights assignment and management Single Sign-On (SSO) Access Manage passwords Enforce password policies Scattered Identity Customer Identity and Access Management (IAM) Privilege Access Management (PAM) Governance and User Provisioning Cloud catalogue Customer identity and access management (CIAM). Password manager software Enforcement of password policies User preparation and management Multiple verification Privileged Access Management (PAM, extended access management) Grant and manage user privileges Access and identity management (IAM) User management Multifactor Authentication (MFA) Autonomous Password Reconfiguration (SSPR) Provision and User Governance Cloud Director Log in without password Speech Manager Unattended password reset (SSPR) User activation and governance Biometric identity verification Identity verification without a password Implementation of password policy Identity verification based on risk Assigning privileges to a user and management Password-free authentication Biometric authentication. Decentralised identity information Risk-based identity verification Single Sign-On (SSO) with a single username and password User permissions and oversight. Cloud Index Risk Based Authentication User Preparation and Administration Decentralised identification Authentication without passwords Apply password policy Self-set password reset (SSPR) Prepare and manage user accounts Decentralised identity recognition Strengthening password policy User configuration and management Biometric feature verification Strengthening password policies User deployment and management
Ασφάλεια DNS Τείχος προστασίας Intrusion Detesction and Prevention Systems (IDPS) Microsegmentation Έλεγχος πρόσβασης δικτύου Ανίχνευση και απόκριση δικτύου (NDR) Network Sandboxing Διαχείριση πολιτικής ασφάλειας δικτύου (NSPM) Ανάλυση κυκλοφορίας δικτύου (NTA) Software-Defined Perimeter (SDP) Ενιαία διαχείριση απειλών Εικονικό ιδιωτικό δίκτυο (VPN) Zero Trust Networking Intrusion detection and prevention systems Micronisation Network detection and response Network firewall Network Security Policy Management Network traffic analysis Software-defined environment virtual private network A network with no trust. Συστήματα ανίχνευσης και πρόληψης εισβολών (IDPS) Network test environment Περίμετρος καθορισμένη από λογισμικό (SDP) A network with zero trust Intrusion Detection and Prevention System (IDPS) Network Activity Analysis (NTA) Software Defined Circuit (SDP) United Threat Management Zero Trust Network Network sandbox Intrusion detection and prevention systems (IDS/IPS) Analysing network traffic (NTA) Μικροτμηματοποίηση Sandboxing δικτύου Δικτύωση μηδενικής εμπιστοσύνης Micro-segmentation DNA turve Network access management Network sandbox mode Harmonised risk management Full access Zero confidence network Network sandbox testing A network that operates on the principle of zero trust. DNS protection Fire extinguisher Network security testing Software Defined Reach (SDR) Network operation with the "everyone is untrusted" model (Zero Trust) Detection and mitigation of bot impact Browser isolation Monitoring the Dark Web DDoS protection Fraud detection Secure web gateways (SWG) Use of a network sandpit Software-defined territory (SDP) Integrated Threat Management Network access controls Firewalls The Wall of Fire Test Field Network Perimeter Software Definition (SDP) Fire wall Software-defined parameters (SDP) Summarised threat management Network Security Policy Management (NSPM, network security policy management) Software-Defined Perimeter (SDP, software-defined perimeter) Uniform threat management Zero-trust networks Sandbox of networks Uniform management of risks Network isolation Network sandbox protection Networking with zero trust Retaining wall Sandbox network environment Management of Network Security Policy (NSPM) Trustless networking The security of the application programming interface (DNS) Subdividing Creating a network sandbox Comprehensive threat management Building a Zero Trust network Unauthorised Access Detection and Prevention System (IDPS) Micro Segmentation Network Protected Area Software Defined Peripheral (DSP) Mass Attack Management Networks with zero trust
Breach and Attack Simulation Τεχνολογία εξαπάτησης Digital Forensics Incident Response Ασφάλεια IoT Ανάλυση κακόβουλου λογισμικού Διαχειριζόμενη ανίχνευση και απόκριση OT Secure Remote Access Ασφαλής διαχείριση πληροφοριών και συμβάντων (SIEM) Security Orchestration, Automation and Response (SOAR) Threat Intelligence Penetration testing and attack simulation Internet of Things security Remote access security for operational technology Secure information and event management Security coordination, automation, and response Breakthrough and attack simulation Fraud technology Secure OT remote access Organising Security, Automation and Response (SOAR) Simulate breaches and attacks Digital forensic activities Response to the incident Controlled detection and response Secure remote access OT Security Organisation, Automation and Response (SOAR) Threat analysis Simulation of breaches and attacks Detection and response management OT-secure remote access Security information and event management (SIEM) Deception technologies Response to incidents IoT - Security Secure Remote Access for OT Προσομοίωση παραβίασης και επίθεσης Εξέταση ψηφιακών πειστηρίων Αντιμετώπιση περιστατικών Ασφαλής απομακρυσμένη πρόσβαση τεχνολογία παραγωγικών λειτουργιών Συντονισμός, αυτοματισμός και απόκριση ασφαλείας (SOAR) Μονάδα πληροφοριών για απειλές Simulation of leaks and attacks Technology of deception Secure remote access to the TO Attack simulation Chain technology Incident handling Analysis of malicious assets Guided detection and response OT secure access Security Information and Incident Management (SIEM) Security Operations, Automation and Response (SOAR) Risk analysis Security of IoT Secure and Remote Access of OT Simulation of hacking and attack Deceptive technology Information regarding threats Reaction to the incident IoT protection Security organisation, automation, and response (SOAR) Notification of security threats Data breach and attack simulation Supervised detection and response Security Alignment, Automation and Response (SOAR) Offence and Attack Simulation Digital forensic technologies OT protected remote access Security Orchestration, Automation, and Response (SOAR) Data breaches and attack simulation Digital investigation Analysis of malware Secure information and incident management (SIEM) Safety orchestration, automation and response (SOAR) Vomiting and attack simulation Malware analyses Secure remote access to operational technology Threat information Fault and Attack Simulation Secure Remote Access to TO Stealth technology Digital criminology Analyse malware Secure Information and Security Event Management (SIEM) Investigating threats Simulation of breakthrough and attack The technology of deception Operational technology for secure remote access Intelligence data on the threat Intrusion and attack simulation Fraud techniques IT forensics Analysis of malicious software Managed Detection and Response (security monitoring programme) Simulation of violations and attacks The examination of digital evidence. Response to events Internet of Things (IoT) security Secure remote access for operational technology (OT) Integration of Security Automation and Orchestration (SOAR) Intelligence on threats Cheating Technology Forensic Informatics Event Response Malicious Software Analysis Modelling hacks and attacks Gap and attack simulation Deceptive techniques
Διαχείριση επιφανείας επίθεσης Patch Management Διαχείριση ευπάθειας βάσει κινδύνου Secure Code Training Security Aware Training Surface management attack Correction management Safe programming training Awareness training for safety Management of corrections Security Training Repair management Security code training Safety knowledge training Surface management against attacks Security coding training Εκπαίδευση ευαισθητοποίησης σε θέματα ασφάλειας Secure Coding Training Διαχείριση λογισμικού επιδιόρθωσης Ασφαλής κατάρτιση σε κώδικα Secure code formation Management of the attack surface Management of repairs Protected code training Safety awareness training Management of the attack area Network repair management Secure code guidance Managing attack vectors Tools for writing more secure code Method for better understanding of security Code Safe Training Superficial attack management Managing attack touchpoints Surface Attack Management Management of Patching Safe Code Practice Safe Awareness Training Management of updates Safety-conscious training Amendment management Safety training Managing surface attack Managing corrections Secure codes training Training in secure coding Training in security codes Management of attack area risks Training on security codes Training on security awareness Correction Attachment Management Risk Based Vulnerability Management Managing attack types Vulnerability management based on risk management Teaching secure code Safety code training
Ανίχνευση και μετριασμός μποτ Απομόνωση προγραμμάτων περιήγησης Παρακολούθηση σκοτεινού ιστού Προστασία από DDoS Ανίχνευση απάτης Secure Web gateways The discovery of robots and mitigating their impact. Detection and mitigation of bots Robot detection and mitigation Monitoring the dark web Bot detection and damage limitation Protection against DDoS Ασφαλείς πύλες Ιστού Dark Internet monitoring Secure Web Gateway Botit detection and protection Secure web locks Bot Detection and Prevention Detecting and mitigating bots Detection and Reduction of Bots Closed Web Monitoring get safe web access Detection and risk mitigation of bots Darkweb monitoring Discovering robots and reducing risk Uncovering fraud Scanner Isolation Dark Network Tracking Detecting and destroying bots Browser threat isolation Dark web surveillance