Overview
An auditing framework that evaluates the security, availability, processing integrity, confidentiality, and privacy of service organisations.
More in Cybersecurity
End-to-End Encryption
Data ProtectionA communication system where only the communicating users can read the messages, with encryption at both endpoints.
Penetration Testing
Offensive SecurityA simulated cyberattack against a system to evaluate the security of its defences and identify exploitable vulnerabilities.
Secrets Management
Identity & AccessThe secure storage, distribution, rotation, and auditing of sensitive credentials such as API keys, tokens, passwords, and certificates used by applications and services.
Firewall
Network SecurityA network security device that monitors and filters incoming and outgoing network traffic based on security rules.
Runtime Application Self-Protection
Offensive SecuritySecurity technology embedded within applications that detects and blocks attacks in real time by monitoring application behaviour and request patterns during execution.
Certificate Authority
Network SecurityAn entity that issues digital certificates, verifying the identity of organisations and encrypting communications.
Malware
Offensive SecurityMalicious software designed to disrupt, damage, or gain unauthorised access to computer systems.
Privileged Access Management
Identity & AccessSecurity solutions that control and monitor access for users with elevated permissions to critical systems.