Overview
A unified security platform that integrates data from endpoints, networks, cloud workloads, and email to provide holistic threat detection, investigation, and automated response.
More in Cybersecurity
Multi-Factor Authentication
Identity & AccessAn authentication method requiring two or more verification factors to gain access to a resource.
Runtime Application Self-Protection
Offensive SecuritySecurity technology embedded within applications that detects and blocks attacks in real time by monitoring application behaviour and request patterns during execution.
Deception Technology
Identity & AccessSecurity solutions that deploy decoy assets such as fake servers, credentials, and data to detect, misdirect, and analyse attackers who have breached perimeter defences.
Denial of Service Attack
Offensive SecurityAn attack designed to make a machine or network resource unavailable by overwhelming it with traffic.
NIST Cybersecurity Framework
Security GovernanceA set of voluntary guidelines for managing and reducing cybersecurity risk developed by the US National Institute of Standards.
Vulnerability Assessment
Offensive SecurityThe process of identifying, quantifying, and prioritising security vulnerabilities in systems and applications.
Firewall
Network SecurityA network security device that monitors and filters incoming and outgoing network traffic based on security rules.
Security Audit
Security GovernanceA systematic evaluation of an organisation's information system security by measuring compliance with established criteria.