SIEM (Security Information and Event Management)Technology - Collects, analyzes, and correlates security logs for threat detection, compliance, and incident response. Examples: Splunk, IBM QRadar, ArcSight, LogRhythm, EDR - Endpoint Detection and Response: Provides continuous monitoring and response to advanced threats on endpoints. Examples: CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, IDS - Intrusion Detection System: Monitors network traffic to detect suspicious or malicious activity; alerts but does not block. Examples: Snort, Suricata, OSSEC, IPS - Intrusion Prevention System: Monitors and actively blocks or mitigates malicious traffic in real-time. Examples: Cisco Firepower, Palo Alto Threat Prevention, Fortinet FortiGate IPS, UDM - Unified Device Management / Unified Defense Management: Centralized management of multiple security/network devices. Sometimes overlaps with UEM/UTM vendors’ terminology. Examples: Fortinet FortiManager, Cisco Defense Orchestrator, UTM - Unified Threat Management: All-in-one security appliance combining firewall, IPS, VPN, AV, and content filtering. Examples: Sophos XG Firewall, Fortinet FortiGate, WatchGuard Firebox, MDM - Mobile Device Management: Controls, monitors, and secures mobile devices in an enterprise environment. Examples: VMware Workspace ONE, Microsoft Intune, MobileIron, MAM - Mobile Application Management: Manages and secures applications (instead of entire devices) for BYOD scenarios. Examples: Microsoft Intune MAM, Apperian, Citrix Endpoint Management, SOAR - Security Orchestration, Automation, and Response: Automates incident response workflows, integrates tools, and improves SOC efficiency. Examples: Palo Alto Cortex XSOAR, Splunk SOAR, IBM Resilient, AV - Antivirus: Detects and removes malware using signature-based and heuristic scanning. Examples: McAfee, Symantec/Norton, Kaspersky, Windows Defender, DLP - Data Loss Prevention: Monitors and prevents unauthorized sharing or leakage of sensitive data. Examples: Symantec DLP, Forcepoint DLP, McAfee Total Protection for DLP, CASB - Cloud Access Security Broker: Enforces security, compliance, and governance for cloud apps (SaaS). Examples: Netskope, McAfee MVISION Cloud, Microsoft Defender for Cloud Apps, SWG - Secure Web Gateway: Filters and inspects outbound/inbound web traffic for malware and policy violations. Examples: Zscaler Internet Access, Cisco Umbrella, Symantec Web Security Service, WAF - Web Application Firewall: Protects web applications from attacks like SQL injection, XSS, and OWASP Top 10 threats. Examples: AWS WAF, F5 BIG-IP ASM, Cloudflare WAF, VPN - Virtual Private Network: Encrypts internet traffic for secure remote access and privacy. Examples: Cisco AnyConnect, Palo Alto GlobalProtect, OpenVPN, NGFW - Next-Generation Firewall: Advanced firewall with deep packet inspection, application awareness, and integrated IPS/URL filtering. Examples: Palo Alto Networks NGFW, Check Point, Cisco Firepower,
0%
Security+ Tools & Platforms
Udostępnij
Udostępnij
Udostępnij
autor:
Landtechjobscom
CompTIA
Edytuj elementy
Drukuj
Osadź
Więcej
Zadania
Tabela rankingowa
Pokaż więcej
Pokaż mniej
Ta tabela rankingowa jest obecnie prywatna. Kliknij przycisk
Udostępnij
, aby ją upublicznić.
Ta tabela rankingowa została wyłączona przez właściciela materiału.
Ta tabela rankingowa została wyłączona, ponieważ Twoje opcje różnią się od opcji właściciela materiału.
Przywróć poprzednie opcje
Połącz w pary
jest szablonem otwartym. Nie generuje wyników w tabeli rankingowej.
Wymagane logowanie
Motyw
Czcionki
Wymagany abonament
Opcje
Zmień szablon
Pokaż wszystko
Więcej formatów pojawi się podczas wykonywania ćwiczenia.
Otwórz wyniki
Kopiuj link
Kod QR
Usuń
Przywrócić automatycznie zapisane ćwiczenie:
?