Overview
An integrated security platform that protects cloud-native applications across the full lifecycle, combining workload protection, configuration management, and runtime security.
Cross-References(2)
More in Cybersecurity
Next-Generation Firewall
Defensive SecurityAn advanced firewall that goes beyond traditional packet filtering to include application awareness and intrusion prevention.
Security Orchestration Automation and Response
Defensive SecurityTechnology that automates security operations by orchestrating tools and processes for incident response.
Security Operations Centre
Defensive SecurityA centralised facility where security professionals monitor, detect, analyse, and respond to cybersecurity incidents.
Zero Trust Architecture
Network SecurityA security model that requires strict identity verification for every person and device accessing resources regardless of location.
Cyber Kill Chain
Offensive SecurityA model describing the stages of a cyberattack from reconnaissance through data exfiltration.
Threat Hunting
Defensive SecurityThe proactive search for cyber threats within an organisation's environment that have evaded automated detection, using hypotheses, threat intelligence, and advanced analytics.
Information Security
Security GovernanceThe practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.
Software Supply Chain Security
Security GovernancePractices and tools that protect the integrity of software components, dependencies, build pipelines, and distribution channels from compromise and tampering.