Stop Disruptive Cyber Threats
Reduce Your Attack Surface
Secure Multi-Cloud Workloads
Optimize Your Defenses
100

When computer resources (CPU, memory, GPU) are used to mine cryptocurrency.

What is Crypto-jacking

100

The act or practice of splitting a computer network into sub-networks.

What is Segmentation?

100

When a user logs in with a single ID and password to gain access to any of several related systems. 

What is Single Sign-On (SSO)?

100

Security services that have been outsourced to a service provider.

What are Managed Security Services (MSS)?

300

Is an integrated solution that has the following capabilities: anti-malware, personal firewall, port and device control.

What is an Endpoint Protection Platform (EPP)?

300

How data is collected, aggregated, distributed and served to monitoring and analytics tools.

What is Network Visibility?

300

It filters, monitors, and blocks HTTP traffic to and from a web application

What is a Web Application Firewall (WAF)?

300

The combination of people, processes, and technology to improve an organization's security posture, making machines do task-oriented 'human work'.

What is Security Automation and Orchestration?

500

Promotes heightened awareness around cyber risks and threats.

What is User Awareness Training?

500

The techniques cyber attackers use to progressively move through a network.

What is Lateral Movement?

500

It is the process of safeguarding important information from corruption, compromise or loss.

What is Data Protection?

500

Refers to the security architecture, tools and processes that ensure the security of an entire computing platform and its associated applications & data.

What is Platform Security?

M
e
n
u