top of page
Our vendors by CIS Control
This is to help you navigate in the realm of cybersecurity: we can help you to cover (almost) the full landscape
Inventory and Control of Enterprise Assets
CONTROL 01
DEVICE VISIBILITY


MDM / EEM / UEM


SCADA / OT SECURITY


Inventory and Control of Software Assets
CONTROL 02
ENDPOINT SECURITY



Data Protection
CONTROL 03
DATA LEAK PREVENTION (DLP)


ENTERPRISE DATA ENCRYPTION

HW PROTECTION OF CRYPTOGRAPHIC KEYS AND DATA

Secure Configuraion of Enterprise Assets and SW
CONTROL 04
MOBILE SECURITY




NETWORK ROUTERS


NETWORK SWITCHES




WIRELESS NETWORKS




Account Management
CONTROL 05
IDENTITY SECURITY (IDM, IAM, IGA)

PRIVILIGED ACCOUNT MANAGEMENT

Access Control Management
CONTROL 06
USER AUTHENTICATION / MFA



SECURE FILE SHARING

CLOUD ACCESS SECURITY BROKER (CASB)



SECURE ACCESS SERVICE EDGE (SASE)




CLOUD SECURITY POSTURE MGMT (CSPM)


CLOUD WORKLOAD PROTECTION PLATFORM (CWPP)



CLOUD-NATIVE APPLICATION PROTECTION PLATFORM (CNAPP)



CLOUD INFRASTRUCTURE ENTITLEMENT MGMT (CIEM)




Continuous Vulnerability Management
CONTROL 07
VULNERABILITY MANAGEMENT





Audit Log Management
CONTROL 08
SIEM



UEBA




Malware Defenses
CONTROL 10
ANTI-MALWARE SANDBOX





Data Recovery
CONTROL 11
BACKUP AND STORAGE


Network Monitoring and Defense
CONTROL 13
NEXT GEN FIREWALLS





VPN REMOTE ACCESS





INTRUSION PREVENTION SYSTEM



DETECTION AND RESPONSE (NDR/XDR)




ANTI-DDOS

NETWORK ACCESS CONTROL


Application Software Security
CONTROL 16
WEB APPLICATION FIREWALL

APPLICATION DELIVERY CONTROLLER

Incident Response Management
CONTROL 17
SOAR


Threat Intelligence


Penetration Testing
CONTROL 18
PENETRATION TESTS, BREACH SIMULATIONS


bottom of page