SECaaS (Security as a Service): Difference between revisions
No edit summary |
m Kangtain moved page SECaaS to SECaaS (Security as a Service) |
||
| (One intermediate revision by the same user not shown) | |||
| Line 23: | Line 23: | ||
|Network Security | |Network Security | ||
|Network Security consists of security services that allocate network access, distribute, monitor, and protect network services | |Network Security consists of security services that allocate network access, distribute, monitor, and protect network services | ||
|- | |- | ||
|Vulnerability Scanning | |Vulnerability Scanning | ||
|Vulnerability Scanning scans the target infrastructure or systems for security vulnerabilities via a public network. | |Vulnerability Scanning scans the target infrastructure or systems for security vulnerabilities via a public network. | ||
|- | |- | ||
|Web Security | |Web Security | ||
|Web Security offers real-time protection of public facing application services generally offered by proxying web traffic through the cloud service provider. | |Web Security offers real-time protection of public facing application services generally offered by proxying web traffic through the cloud service provider. | ||
|- | |- | ||
|Email Security | |Email Security | ||
|Email Security provides control over inbound and outbound email, protecting the organization from phishing, malicious attachments, and spam, and providing business continuity options. | |Email Security provides control over inbound and outbound email, protecting the organization from phishing, malicious attachments, and spam, and providing business continuity options. | ||
|- | |- | ||
|Identity and Access Management (IAM) | |Identity and Access Management (IAM) | ||
|Identity and Access Management (IAM) provides identity administration, governance and access controls. This includes authentication, identity assurance, access intelligence, and privileged user management. | |Identity and Access Management (IAM) provides identity administration, governance and access controls. This includes authentication, identity assurance, access intelligence, and privileged user management. | ||
|- | |- | ||
|Encryption | |Encryption | ||
|Encryption is the process of obfuscating data using cryptographic and numerical ciphers. Transforming clear-text into cipher-text to make it unreadable | |Encryption is the process of obfuscating data using cryptographic and numerical ciphers. Transforming clear-text into cipher-text to make it unreadable | ||
|- | |- | ||
|Intrusion Management | |Intrusion Management | ||
|Intrusion Management is the process of using pattern recognition to detect statistically unusual events, prevent or detect intrusion attempts, and manage the incidents. | |Intrusion Management is the process of using pattern recognition to detect statistically unusual events, prevent or detect intrusion attempts, and manage the incidents. | ||
|- | |- | ||
|Data Loss Prevention (DLP) | |Data Loss Prevention (DLP) | ||
|Data Loss Prevention is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use. | |Data Loss Prevention is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use. | ||
|- | |- | ||
|Security Information and Event Management (SIEM) | |Security Information and Event Management (SIEM) | ||
|Security Incident and Event Management (SIEM) systems accept log and event information, correlation and incident data and provide real time analysis and correlation. | |Security Incident and Event Management (SIEM) systems accept log and event information, correlation and incident data and provide real time analysis and correlation. | ||
|- | |- | ||
|Business Continuity and Disaster Recovery (BCDR) | |Business Continuity and Disaster Recovery (BCDR) | ||
|Business Continuity and Disaster Recovery is the implementation of measures designed to ensure operational resiliency in the event of any service interruptions. | |Business Continuity and Disaster Recovery is the implementation of measures designed to ensure operational resiliency in the event of any service interruptions. | ||
|- | |- | ||
|Continuous Monitoring | |Continuous Monitoring | ||
|Continuous Monitoring performs the function of continuous risk management presenting the current security posture of the organization. | |Continuous Monitoring performs the function of continuous risk management presenting the current security posture of the organization. | ||
|- | |- | ||
|Security Assessments | |Security Assessments | ||
|Security Assessments are third party audits of cloud services based on industry standards. | |Security Assessments are third party audits of cloud services based on industry standards. | ||
|} | |} | ||