IDENTIFY PROTECT DETECT RESPOND RECOVER API Security Application Security Asset Inventory, Discovery & Management BaaS (Backup as a Service) BAS (Breach Attach Simulation) CSPM (Cloud Security Posture Management)/CNAP CWPP (Cloud Workload Protection) Compliance Assessment CyberSec Risk Assessment & Advisory DLP/ DSPM (Data Loss Prevention/ Data Security Posture Management) Data Security DDoS (Distributed Denial of Service) DRaaS (Disaster Recovery) EDR (Endpoint Detection & Response) Email Security File Security Firewall GRC (Governance, Risk & Compliance) IAM (Identity and Access Management) IDM (Identity Management) IoT/OT Security IR/DFIR (Digital Forensics & Incident Response) MSP (Managed Services Provider) MSSP (Managed Security Services Provider) MDR (Managed Detection & Response) MFA/2FA (Multi-Factor Auth) Network Segmentation & Micro Segmentation Password Management & PAM (Privileged Access Mgmt) Penetration Testing Security Awareness Training SIEM (Security Information & Event Management) Software Supply Chain Security SSPM / SSCP (SaaS Security Posture Management / Security Control Plane) vCISO (Virtual Chief Info Sec Officer) Vulnerability Management ZTNA (Zero Trust Network Access) SOLUTION 2 GOVERN
RkJQdWJsaXNoZXIy NTI5Mg==