Overview
A network security device that monitors and filters incoming and outgoing network traffic based on security rules.
More in Cybersecurity
MITRE ATT&CK
Offensive SecurityA globally accessible knowledge base of adversary tactics and techniques based on real-world cyber observations.
SOC 2
Security GovernanceAn auditing framework that evaluates the security, availability, processing integrity, confidentiality, and privacy of service organisations.
Security Orchestration Automation and Response
Defensive SecurityTechnology that automates security operations by orchestrating tools and processes for incident response.
Multi-Factor Authentication
Identity & AccessAn authentication method requiring two or more verification factors to gain access to a resource.
Threat Intelligence
Offensive SecurityEvidence-based knowledge about existing or emerging threats to an organisation's digital assets and infrastructure.
Extended Detection and Response
Defensive SecurityA unified security platform that integrates data from endpoints, networks, cloud workloads, and email to provide holistic threat detection, investigation, and automated response.
Cyber Insurance
Security GovernanceInsurance coverage protecting organisations against financial losses from cyberattacks, data breaches, and related incidents.
Security by Design
Security GovernanceAn approach that integrates security considerations into every stage of the software development lifecycle.