Application Security | | X | X | X |
Breach & Attack Simulation (BAS) | X | X | X | X |
Cloud Access Security Broker (CASB) | | X | X | X |
Cloud Security (SaaS) | X | | X | X |
Cloud Security (laaS/PaaS) | X | | X | X |
Container Security | | | | X |
Data Access Governance | | X | | X |
Data Classification | | X | | X |
Data Loss Protection (DLP) | | X | X | X |
Database Security | | | X | X |
DDoS | | X | X | X |
Digital Rights Management (DRM) | | | X | X |
Email Security (SPAM, Malware, DLP, Phishing) | X | | X | X |
Encryption & Key Management (HSM, PKI) | | | X | X |
Endpoint Security (EPP, EDR) | X | X | X | X |
File Security & Integrity Monitoring (FIM) | | X | | X |
Firewall Platforms (Enterprise) | X | X | X | X |
Firewall as a Service (FWaaS) | X | X | X | X |
Governance, Risk & Compliance (GRC, IRM) | | | | X |
Identity & Access Management (IAM\IGA) | X | | X | X |
Isolation | | | X | X |
Malware Sandbox | X | | X | X |
Micro-Segmentation | | | X | X |
Mobile Security (MDM, MTD) | X | | X | X |
Multi Factor Authentication (MFA) | | | X | X |
Network Access Control (NAC) | X | | X | X |
Network Traffic & Behavior Analysis (NTA) | X | X | X | X |
Network Forensics | | | X | X |
Network Taps & Visibility | | | X | X |
Operational Technology (OT) Security | | | X | X |
Privileged Access Management (PAM) | X | | X | X |
Security Analytics | | X | X | X |
Password Management (SSO) | | | X | X |
Security Information & Event Mgmt (SIEM) | X | X | X | X |
Security Management (Network) | X | X | X | X |
Security Orch, Automation & Response (SOAR) | | | X | X |
SSL Inspection | X | | X | X |
Testing (App, Network, Security, Performance) | | | X | X |
Third Party Risk Management | | | | X |
Threat and Vulnerability Management | X | X | X | X |
Threat Deception | X | | X | X |
Threat Intelligence | | X | | X |
User & Entity Behavioral Analysis (UBA, UEBA) | | | X | X |
VPN | X | | X | X |
Web & Content Security | X | X | X | X |
Web Application Firewall (WAF) | | X | X | X |