SIEM (Security Information and Event Management)Technology - Collects, analyzes, and correlates security logs for threat detection, compliance, and incident response. Examples: Splunk, IBM QRadar, ArcSight, LogRhythm, EDR - Endpoint Detection and Response: Provides continuous monitoring and response to advanced threats on endpoints. Examples: CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, IDS - Intrusion Detection System: Monitors network traffic to detect suspicious or malicious activity; alerts but does not block. Examples: Snort, Suricata, OSSEC, IPS - Intrusion Prevention System: Monitors and actively blocks or mitigates malicious traffic in real-time. Examples: Cisco Firepower, Palo Alto Threat Prevention, Fortinet FortiGate IPS, UDM - Unified Device Management / Unified Defense Management: Centralized management of multiple security/network devices. Sometimes overlaps with UEM/UTM vendors’ terminology. Examples: Fortinet FortiManager, Cisco Defense Orchestrator, UTM - Unified Threat Management: All-in-one security appliance combining firewall, IPS, VPN, AV, and content filtering. Examples: Sophos XG Firewall, Fortinet FortiGate, WatchGuard Firebox, MDM - Mobile Device Management: Controls, monitors, and secures mobile devices in an enterprise environment. Examples: VMware Workspace ONE, Microsoft Intune, MobileIron, MAM - Mobile Application Management: Manages and secures applications (instead of entire devices) for BYOD scenarios. Examples: Microsoft Intune MAM, Apperian, Citrix Endpoint Management, SOAR - Security Orchestration, Automation, and Response: Automates incident response workflows, integrates tools, and improves SOC efficiency. Examples: Palo Alto Cortex XSOAR, Splunk SOAR, IBM Resilient, AV - Antivirus: Detects and removes malware using signature-based and heuristic scanning. Examples: McAfee, Symantec/Norton, Kaspersky, Windows Defender, DLP - Data Loss Prevention: Monitors and prevents unauthorized sharing or leakage of sensitive data. Examples: Symantec DLP, Forcepoint DLP, McAfee Total Protection for DLP, CASB - Cloud Access Security Broker: Enforces security, compliance, and governance for cloud apps (SaaS). Examples: Netskope, McAfee MVISION Cloud, Microsoft Defender for Cloud Apps, SWG - Secure Web Gateway: Filters and inspects outbound/inbound web traffic for malware and policy violations. Examples: Zscaler Internet Access, Cisco Umbrella, Symantec Web Security Service, WAF - Web Application Firewall: Protects web applications from attacks like SQL injection, XSS, and OWASP Top 10 threats. Examples: AWS WAF, F5 BIG-IP ASM, Cloudflare WAF, VPN - Virtual Private Network: Encrypts internet traffic for secure remote access and privacy. Examples: Cisco AnyConnect, Palo Alto GlobalProtect, OpenVPN, NGFW - Next-Generation Firewall: Advanced firewall with deep packet inspection, application awareness, and integrated IPS/URL filtering. Examples: Palo Alto Networks NGFW, Check Point, Cisco Firepower,
0%
Security+ Tools & Platforms
Bagikan
Bagikan
Bagikan
oleh
Landtechjobscom
CompTIA
Edit Konten
Cetak
Menyematkan
Tambah
Tugas
Papan Peringkat
Tampilkan lainnya
Tampilkan lebih sedikit
Papan peringkat ini saat ini bersifat pribadi. Klik
Share
untuk menjadikannya publik.
Papan peringkat ini telah dinonaktifkan oleh pemilik sumber daya.
Papan peringkat ini dinonaktifkan karena opsi Anda berbeda dengan pemilik sumber daya.
Opsi Pemulihan
Permainan Pencocokan
adalah templat terbuka. Ini tidak menghasilkan skor untuk papan peringkat.
Diperlukan login
Gaya visual
Font
Diperlukan langganan
Pilihan
Berganti templat
Tampilkan semua
Format lainnya akan muncul saat Anda memainkan aktivitas.
Buka hasil
Salin tautan
Kode QR
Hapus
Pulihkan simpan otomatis:
?