0% found this document useful (0 votes)
141 views1 page

Cyber Security Coverage Heat Map: Full Solution Partial Solution No Solution

This heat map provides an overview of an organization's cyber security coverage across key areas. It shows partial solutions in response and monitoring, and no solutions in detection, protection, and identity management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
141 views1 page

Cyber Security Coverage Heat Map: Full Solution Partial Solution No Solution

This heat map provides an overview of an organization's cyber security coverage across key areas. It shows partial solutions in response and monitoring, and no solutions in detection, protection, and identity management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CYBER SECURITY COVERAGE HEAT MAP

Full solution

SE
Partial solution

ON
SP
RE
N&
IO
No solution

N
TIO

AT

N
N

IO
AT

I)

TIO
AC

AC

CT
M
N
TR

EC
CE

TE
TIO

/
TO
M

EX

OT
IAN

RO
X)

NS
AU
YP
TE

AT

N
BO

PR

IP
YS

PL

CR

TIO
Y(

Y
IS
RE

N,

LIT
ND

AP
RE
NS

YS

T
A

AY

N
EN
N
/TH

EN
EC
TIO

IBI

IO
CO

AL

TU
IO
SA

ND
IO

ITY
IO

OT
S

M
E

VIS

NT

ICE
ISK
NT

CE
RA
OX

AN
SIC
NT

N(

OS
T

RIT
E

ITY

ER
ITY

CT

NA
N

CE
UR
A

AT

PR
N

VE
AN

RV
VE

-D

ST

S&
TIO
DB
VE

IO

EN

DG

YP

AIN
NT

E
CU
UR
UR

OR
TIO

DG

EC
T

IO

RE
AT
HE
AT

RE

E
LL
RE

I
AN

O
R

PL

I
T
AC

VE

SS
YS
SE
EC

F
OU
EC
OL

T
NT
TS
I
EC

FO
FU

TP
G

AV

RE
PR
UL

UR
KP

RC

EN
NP

OU

ICA
OM

AL
TR
LS

KE

KA
IN

SS

ER
KS
TR

AM

OT

CO
US

EN
TH
CL
EM

EA
YO
NT

NT

65
LEA

EC
NT

ICY
L

AN
ER
IO

EX
VE

PL
CL
T

LES

AIN
OR
ON

OR
AL

OR

DC
VIR

PR

M
TE
BO

HR
E3
DS

ILE

ILE
US

OI

OI
SP
ILT

OI

AP
RIT
LE

OL
AT

AT

IC

ISK
EW

S
TA

TW

CU

TW
ER
PC

TW

IVA

NT

FIC
DP

DP

OU

C
oS

AA
TI-

TI-

TT
TI-

DP

OB

OB
TR

BL
U-

LF

OU
RE

TP
RE

CU

Sse
EB

TR
DA

RV

DO
AN

DD
AP

AN

AN

CO
FIR

PU

NE
CP
IN

NE
EN

EN

OF
UR

PR
NE

FW
EN
TH

CL

IO
TH

IO
W

DN
CL
SE

IO
SE
Gartner
NGFW ATD DDoS DLP EPP FDE EDR SIEM SOAR CLOUD CWPP CSPM EMAIL MTD/EMM WAAP IOT/ICS SASE
Definition

No Host-level
Protego Partnership Integration
quarantine only

No real- No real Android Few


time Demisto Demisto PureSec TwistLock time ZingBox
Limited Very basic protections
prevent (SOAR) compliance Only

No real- Very Alside Alside


time Very basic enSilo Cybersponse Basic
prevent Limited partnership partnership

No real- Separate Separate Umbrella Separate Few


time No GCP Basic
prevent appliance solution URLF Product protections

Reputation No real- Monitor Monitor Separate


Based only time EOD No API
prevent only only Product

Only on No real- Only on


time
NX series prevent EX series

No real- Cloud
Reputation Host level
Based only time Basic conformity Basic Basic Basic
prevent only limited

Reputation Basic
Based only No GCP

Information based on vendor’s public information and 3rd party | Q2 2020 Latest copy can be found @ https://tiny.cc/cyberheatmap

You might also like