SIEM (Security Information and Event Management)Technology - Collects, analyzes, and correlates security logs for threat detection, compliance, and incident response. Examples: Splunk, IBM QRadar, ArcSight, LogRhythm, EDR - Endpoint Detection and Response: Provides continuous monitoring and response to advanced threats on endpoints. Examples: CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, IDS - Intrusion Detection System: Monitors network traffic to detect suspicious or malicious activity; alerts but does not block. Examples: Snort, Suricata, OSSEC, IPS - Intrusion Prevention System: Monitors and actively blocks or mitigates malicious traffic in real-time. Examples: Cisco Firepower, Palo Alto Threat Prevention, Fortinet FortiGate IPS, UDM - Unified Device Management / Unified Defense Management: Centralized management of multiple security/network devices. Sometimes overlaps with UEM/UTM vendors’ terminology. Examples: Fortinet FortiManager, Cisco Defense Orchestrator, UTM - Unified Threat Management: All-in-one security appliance combining firewall, IPS, VPN, AV, and content filtering. Examples: Sophos XG Firewall, Fortinet FortiGate, WatchGuard Firebox, MDM - Mobile Device Management: Controls, monitors, and secures mobile devices in an enterprise environment. Examples: VMware Workspace ONE, Microsoft Intune, MobileIron, MAM - Mobile Application Management: Manages and secures applications (instead of entire devices) for BYOD scenarios. Examples: Microsoft Intune MAM, Apperian, Citrix Endpoint Management, SOAR - Security Orchestration, Automation, and Response: Automates incident response workflows, integrates tools, and improves SOC efficiency. Examples: Palo Alto Cortex XSOAR, Splunk SOAR, IBM Resilient, AV - Antivirus: Detects and removes malware using signature-based and heuristic scanning. Examples: McAfee, Symantec/Norton, Kaspersky, Windows Defender, DLP - Data Loss Prevention: Monitors and prevents unauthorized sharing or leakage of sensitive data. Examples: Symantec DLP, Forcepoint DLP, McAfee Total Protection for DLP, CASB - Cloud Access Security Broker: Enforces security, compliance, and governance for cloud apps (SaaS). Examples: Netskope, McAfee MVISION Cloud, Microsoft Defender for Cloud Apps, SWG - Secure Web Gateway: Filters and inspects outbound/inbound web traffic for malware and policy violations. Examples: Zscaler Internet Access, Cisco Umbrella, Symantec Web Security Service, WAF - Web Application Firewall: Protects web applications from attacks like SQL injection, XSS, and OWASP Top 10 threats. Examples: AWS WAF, F5 BIG-IP ASM, Cloudflare WAF, VPN - Virtual Private Network: Encrypts internet traffic for secure remote access and privacy. Examples: Cisco AnyConnect, Palo Alto GlobalProtect, OpenVPN, NGFW - Next-Generation Firewall: Advanced firewall with deep packet inspection, application awareness, and integrated IPS/URL filtering. Examples: Palo Alto Networks NGFW, Check Point, Cisco Firepower,
0%
Security+ Tools & Platforms
Podijeli
Podijeli
Podijeli
Autor
Landtechjobscom
CompTIA
Uredi sadržaj
Ispis
Postavi
Više
Zadatke
Top-lista
Pokaži više
Pokaži manje
Ova top-lista je trenutno privatna. Odaberite opciju
Podijeli
da biste je javno objavili.
Ovu top-listu onemogućio je vlasnik sadržaja.
Ova top-lista je onemogućena jer se vaš odabir opcija razlikuje od postavki vlasnika sadržaja.
Vrati opcije na početne postavke
Spoji parove
je otvoreni predložak. Ne generira rezultate za top-listu.
Prijava je obvezna
Vizualni stil
Fontovi
Potrebna je pretplata
Postavke
Promijeni predložak
Prikaži sve
Više formata prikazat će se dok budete igrali.
Otvoreni rezultati
Kopiraj vezu
QR kôd
Izbriši
Vrati automatski spremljeno:
?