top of page
Our vendors by CIS Control
This is to help you navigate in the realm of cybersecurity: we can help you to cover (almost) the full landscape
Inventory and Control of Enterprise Assets
CONTROL 01
DEVICE VISIBILITY


MDM / EEM / UEM


SCADA / OT SECURITY


Inventory and Control of Software Assets
CONTROL 02
ENDPOINT SECURITY

Data Protection
CONTROL 03
DATA LEAK PREVENTION (DLP)

ENTERPRISE DATA ENCRYPTION

HW PROTECTION OF CRYPTOGRAPHIC KEYS AND DATA

Secure Configuraion of Enterprise Assets and SW
CONTROL 04
MOBILE SECURITY



NETWORK ROUTERS

NETWORK SWITCHES



WIRELESS NETWORKS



Account Management
CONTROL 05
IDENTITY SECURITY (IDM, IAM, IGA)

PRIVILIGED ACCOUNT MANAGEMENT

Access Control Management
CONTROL 06
USER AUTHENTICATION / MFA


SECURE FILE SHARING
CLOUD ACCESS SECURITY BROKER (CASB)


SECURE ACCESS SERVICE EDGE (SASE)



CLOUD SECURITY POSTURE MGMT (CSPM)

CLOUD WORKLOAD PROTECTION PLATFORM (CWPP)

CLOUD-NATIVE APPLICATION PROTECTION PLATFORM (CNAPP)

CLOUD INFRASTRUCTURE ENTITLEMENT MGMT (CIEM)



Continuous Vulnerability Management
CONTROL 07
VULNERABILITY MANAGEMENT





Audit Log Management
CONTROL 08
SIEM


UEBA



Malware Defenses
CONTROL 10
ANTI-MALWARE SANDBOX




Data Recovery
CONTROL 11
BACKUP AND STORAGE

Network Monitoring and Defense
CONTROL 13
NEXT GEN FIREWALLS




VPN REMOTE ACCESS




INTRUSION PREVENTION SYSTEM


DETECTION AND RESPONSE (NDR/XDR)



ANTI-DDOS
NETWORK ACCESS CONTROL


Application Software Security
CONTROL 16
WEB APPLICATION FIREWALL
APPLICATION DELIVERY CONTROLLER
Incident Response Management
CONTROL 17
SOAR

Threat Intelligence

Penetration Testing
CONTROL 18
PENETRATION TESTS, BREACH SIMULATIONS

bottom of page

