disruptive infosec vendor landscape (soar focused)

1
Network Traffic Analysis (NTA) & Anomaly detection LOG , SIEM and Big Data Platforms Threat Protection for SaaS Vulnerability Assess. (VA) Config audits and Compliance Tokenization, DLP, Monitoring, Encryption DLP for the Cloud IDaaS and CASB - Cloud Access Security Broker Backup into the Cloud Encryption and Key Management Machine Data Analytics & Big Data / Security Operations, Analytics and Reporting (SOAR) Micro Segmentation of Docker Containers App Segmentation & Hardening Threat Intelligence Platforms (TIPS) Endpoint Detection & Response (EDR) & Malware Hunting Data Analytics and Visualization Cloud based CDN, DDoS, WAF, ADC IoT Security Cyber Situational Awareness Deception Based Detection Risk Intelligence (IRMS) & prioritization OT/SCADA Security Security Automation and DevOps Incident Response Orchestration and Automation & Situational Awareness User and Entity Behavior Analytics (UEBA/UBA) Endpoint Protection (EPP) Sandbox Analysis MSSP Content Security Web and Mail Threat Intelligence Automation and Sharing Code Testing Predict & Prevent Enrich data input and detection Detect Respond and protect Comments or corrections? Please send feedback to Philipp Wächter - [email protected] - MSSP Product Developer Content Disarm & Reconstruction CDR Offensive Security Mobile Device Security Integrity Based Assurance and Detection Exfiltration detection, DLP IAG – Identity and Access Governance Disruptive SOAR (Security Operations, Analytics and Reporting) & related vendors (2016) – Use this landscape to benchmark your legacy Tooling.

Upload: philipp-wachter-cissp

Post on 15-Apr-2017

243 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Disruptive INFOSEC vendor landscape (SOAR focused)

Network Traffic Analysis (NTA) & Anomaly detection

LOG , SIEM and Big Data Platforms

Threat Protection for SaaS

Vulnerability Assess. (VA) Config audits and Compliance

Tokenization, DLP, Monitoring, Encryption

DLP for the Cloud

IDaaS and CASB - Cloud Access Security Broker

Backup into the Cloud

Encryption and Key Management

Machine Data Analytics & Big Data /Security Operations, Analytics and Reporting (SOAR)

Micro Segmentation of Docker ContainersApp Segmentation & Hardening

Threat Intelligence Platforms (TIPS) Endpoint Detection & Response (EDR) & Malware Hunting

Data Analytics and Visualization

Cloud based CDN, DDoS, WAF, ADC

IoT Security

Cyber Situational Awareness

Deception Based Detection

Risk Intelligence (IRMS) & prioritization

OT/SCADA Security

Security Automation and DevOps

Incident Response Orchestration and Automation & Situational Awareness

User and Entity Behavior Analytics (UEBA/UBA)

Endpoint Protection (EPP)

Sandbox Analysis

MSSP Content Security Web and Mail

Threat Intelligence Automation and Sharing Code Testing

Pred

ict & P

revent

Enrich

data in

pu

t and

detectio

nD

etectR

espo

nd

an

d p

rotect

Comments or corrections? Please send feedback to Philipp Wächter - [email protected] - MSSP Product Developer

Content Disarm & Reconstruction CDR

Offensive Security

Mobile Device Security

Integrity Based Assurance and Detection

Exfiltration detection, DLP

IAG – Identity and Access Governance

Disruptive SOAR (Security Operations, Analytics and Reporting) & related vendors (2016) – Use this landscape to benchmark your legacy Tooling.