SIEM (Security Information and Event Management)Technology - Collects, analyzes, and correlates security logs for threat detection, compliance, and incident response. Examples: Splunk, IBM QRadar, ArcSight, LogRhythm, EDR - Endpoint Detection and Response: Provides continuous monitoring and response to advanced threats on endpoints. Examples: CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, IDS - Intrusion Detection System: Monitors network traffic to detect suspicious or malicious activity; alerts but does not block. Examples: Snort, Suricata, OSSEC, IPS - Intrusion Prevention System: Monitors and actively blocks or mitigates malicious traffic in real-time. Examples: Cisco Firepower, Palo Alto Threat Prevention, Fortinet FortiGate IPS, UDM - Unified Device Management / Unified Defense Management: Centralized management of multiple security/network devices. Sometimes overlaps with UEM/UTM vendors’ terminology. Examples: Fortinet FortiManager, Cisco Defense Orchestrator, UTM - Unified Threat Management: All-in-one security appliance combining firewall, IPS, VPN, AV, and content filtering. Examples: Sophos XG Firewall, Fortinet FortiGate, WatchGuard Firebox, MDM - Mobile Device Management: Controls, monitors, and secures mobile devices in an enterprise environment. Examples: VMware Workspace ONE, Microsoft Intune, MobileIron, MAM - Mobile Application Management: Manages and secures applications (instead of entire devices) for BYOD scenarios. Examples: Microsoft Intune MAM, Apperian, Citrix Endpoint Management, SOAR - Security Orchestration, Automation, and Response: Automates incident response workflows, integrates tools, and improves SOC efficiency. Examples: Palo Alto Cortex XSOAR, Splunk SOAR, IBM Resilient, AV - Antivirus: Detects and removes malware using signature-based and heuristic scanning. Examples: McAfee, Symantec/Norton, Kaspersky, Windows Defender, DLP - Data Loss Prevention: Monitors and prevents unauthorized sharing or leakage of sensitive data. Examples: Symantec DLP, Forcepoint DLP, McAfee Total Protection for DLP, CASB - Cloud Access Security Broker: Enforces security, compliance, and governance for cloud apps (SaaS). Examples: Netskope, McAfee MVISION Cloud, Microsoft Defender for Cloud Apps, SWG - Secure Web Gateway: Filters and inspects outbound/inbound web traffic for malware and policy violations. Examples: Zscaler Internet Access, Cisco Umbrella, Symantec Web Security Service, WAF - Web Application Firewall: Protects web applications from attacks like SQL injection, XSS, and OWASP Top 10 threats. Examples: AWS WAF, F5 BIG-IP ASM, Cloudflare WAF, VPN - Virtual Private Network: Encrypts internet traffic for secure remote access and privacy. Examples: Cisco AnyConnect, Palo Alto GlobalProtect, OpenVPN, NGFW - Next-Generation Firewall: Advanced firewall with deep packet inspection, application awareness, and integrated IPS/URL filtering. Examples: Palo Alto Networks NGFW, Check Point, Cisco Firepower,
0%
Security+ Tools & Platforms
Teilen
Teilen
Teilen
von
Landtechjobscom
CompTIA
Inhalt bearbeiten
Drucken
Einbetten
Mehr
Zuweisungen
Bestenliste
Mehr anzeigen
Weniger anzeigen
Diese Bestenliste ist derzeit privat. Klicke auf
Teilen
um sie öffentlich zu machen.
Diese Bestenliste wurde vom Eigentümer der Ressource deaktiviert.
Diese Bestenliste ist deaktiviert, da sich Ihre Einstellungen von denen des Eigentümer der Ressource unterscheiden.
Einstellungen zurücksetzen
It's a Match
ist eine Vorlage mit offenem Ende. Es generiert keine Punkte für eine Bestenliste.
Anmelden erforderlich
Visueller Stil
Schriftarten
Abonnement erforderlich
Einstellungen
Vorlage ändern
Alle anzeigen
Weitere Formate werden angezeigt, wenn du die Aktivität spielst.
Offene Ergebnisse
Link kopieren
QR-Code
Löschen
Soll die automatisch gespeicherte Aktivität
wiederhergestellt werden?