Monitor Endpoint and Network Events; External and Insider Database of Threats; Detection; Investigation; Analytics; Reporting; Alerting
Network Traffic Analysis
Real-time Network Data Analysis; Complete Transaction Visibility; Decrypt Traffic for Analysis; Baselining and Anomaly Detection; Deploying Network Traffic Analyzer; Deception Technologies and Techniques
OSS Security Scanning and Software Composition Analysis
Open Source Audit; Threat Identification; Code; Files
Vulnerability Scan, Penetration Test, and Analysis
Identify Weaknesses; Review Security Policies and Procedures; Design; Implementation; Controls; Host, Network and database; Active and Passive; Distributed
Application and Database Security
Encryption Strategies; Enterprise user Management; Privelages, Roles and Schemas