disruptive infosec vendor landscape (soar focused)
TRANSCRIPT
Network Traffic Analysis (NTA) & Anomaly detection
LOG , SIEM and Big Data Platforms
Threat Protection for SaaS
Vulnerability Assess. (VA) Config audits and Compliance
Tokenization, DLP, Monitoring, Encryption
DLP for the Cloud
IDaaS and CASB - Cloud Access Security Broker
Backup into the Cloud
Encryption and Key Management
Machine Data Analytics & Big Data /Security Operations, Analytics and Reporting (SOAR)
Micro Segmentation of Docker ContainersApp Segmentation & Hardening
Threat Intelligence Platforms (TIPS) Endpoint Detection & Response (EDR) & Malware Hunting
Data Analytics and Visualization
Cloud based CDN, DDoS, WAF, ADC
IoT Security
Cyber Situational Awareness
Deception Based Detection
Risk Intelligence (IRMS) & prioritization
OT/SCADA Security
Security Automation and DevOps
Incident Response Orchestration and Automation & Situational Awareness
User and Entity Behavior Analytics (UEBA/UBA)
Endpoint Protection (EPP)
Sandbox Analysis
MSSP Content Security Web and Mail
Threat Intelligence Automation and Sharing Code Testing
Pred
ict & P
revent
Enrich
data in
pu
t and
detectio
nD
etectR
espo
nd
an
d p
rotect
Comments or corrections? Please send feedback to Philipp Wächter - [email protected] - MSSP Product Developer
Content Disarm & Reconstruction CDR
Offensive Security
Mobile Device Security
Integrity Based Assurance and Detection
Exfiltration detection, DLP
IAG – Identity and Access Governance
Disruptive SOAR (Security Operations, Analytics and Reporting) & related vendors (2016) – Use this landscape to benchmark your legacy Tooling.