Skip to main content
Link
Menu
Expand
(external link)
Document
Search
Copy
Copied
Security Architecture Guide
Home
Assets
Application
3rd-Party Packages Scanning
Anti-Bot
Application Attack Simulation
Bug Bounty Programs
Code Scanning
Customer Identity Platforms
DDoS Protection
Infrastructure-as-Code (IaC) Scanning
Integrated Application Security Platforms
Kubernetes Security / Container Security
Penetration Testing
Secrets Management
Web Application Firewall
Cloud
Application Protection
Cloud Application Detection and Response (CADR)
IaaS Detection
IaaS Scanning via API
Integrated Cloud Security Platforms
Runtime SaaS Protection
SaaS Scanning via API
Data
Backup
Data Security Scanner
Immutable Backup
Endpoint
Disk Encryption
Endpoint Protection
Host Firewall
Managed Browser
Patch Management
Remote Browser
Secure Web Gateway
Server Management
User Endpoint Management
Vulnerability Scanner
Identity
Email Authentication
Email Security
Identity Governance
Multifactor Authentication
Password Manager
Privileged Access
Single Sign-On
Network
Micro Segmentation
Network Detection
Network Firewall
Network Segmentation
Remote Network Access
Virtual Private Network (VPN)
Functions
Govern
Compliance Automation
Identify & Protect
External Asset Inventory
Internal Asset Inventory
Security Awareness Training
Third-Party Risk Management (TPRM)
Vulnerability Management
Detect & Respond
Deception
Log Aggregation & Alerting
Managed Detection & Response
Red Team Exercise
Security Workflow Automation
Threat Intelligence
Recover
Cyber Insurance
Functions
Govern
Compliance Automation
Compliance Automation