Overview
Technology that automates security operations by orchestrating tools and processes for incident response.
More in Cybersecurity
Ransomware
Offensive SecurityMalicious software that encrypts a victim's files and demands payment for the decryption key.
Runtime Application Self-Protection
Offensive SecuritySecurity technology embedded within applications that detects and blocks attacks in real time by monitoring application behaviour and request patterns during execution.
End-to-End Encryption
Data ProtectionA communication system where only the communicating users can read the messages, with encryption at both endpoints.
Encryption
Data ProtectionThe process of converting plaintext data into ciphertext using an algorithm, making it unreadable without the decryption key.
Firewall
Network SecurityA network security device that monitors and filters incoming and outgoing network traffic based on security rules.
Biometric Authentication
Identity & AccessUsing unique biological characteristics like fingerprints, facial features, or iris patterns to verify identity.
Privileged Access Management
Identity & AccessSecurity solutions that control and monitor access for users with elevated permissions to critical systems.
Sandbox
Offensive SecurityAn isolated testing environment that mimics production settings for safely running untrusted programs or code.