SECaaS (Security as a Service): Difference between revisions

No edit summary
m Kangtain moved page SECaaS to SECaaS (Security as a Service)
 
(One intermediate revision by the same user not shown)
Line 23: Line 23:
|Network Security
|Network Security
|Network Security consists of security services that allocate network access, distribute, monitor, and protect network services
|Network Security consists of security services that allocate network access, distribute, monitor, and protect network services
|
|
|-
|-
|Vulnerability Scanning
|Vulnerability Scanning
|Vulnerability Scanning scans the target infrastructure or systems for security vulnerabilities via a public network.
|Vulnerability Scanning scans the target infrastructure or systems for security vulnerabilities via a public network.
|
|
|-
|-
|Web Security
|Web Security
|Web Security offers real-time protection of public facing application services generally offered by proxying web traffic through the cloud service provider.
|Web Security offers real-time protection of public facing application services generally offered by proxying web traffic through the cloud service provider.
|
|
|-
|-
|Email Security
|Email Security
|Email Security provides control over inbound and outbound email, protecting the organization from phishing, malicious attachments, and spam, and providing business continuity options.
|Email Security provides control over inbound and outbound email, protecting the organization from phishing, malicious attachments, and spam, and providing business continuity options.
|
|
|-
|-
|Identity and Access Management (IAM)
|Identity and Access Management (IAM)
|Identity and Access Management (IAM) provides identity administration, governance and access controls. This includes authentication, identity assurance, access intelligence, and privileged user management.
|Identity and Access Management (IAM) provides identity administration, governance and access controls. This includes authentication, identity assurance, access intelligence, and privileged user management.
|
|
|-
|-
|Encryption
|Encryption
|Encryption is the process of obfuscating data using cryptographic and numerical ciphers. Transforming clear-text into cipher-text to make it unreadable
|Encryption is the process of obfuscating data using cryptographic and numerical ciphers. Transforming clear-text into cipher-text to make it unreadable
|
|
|-
|-
|Intrusion Management
|Intrusion Management
|Intrusion Management is the process of using pattern recognition to detect statistically unusual events, prevent or detect intrusion attempts, and manage the incidents.
|Intrusion Management is the process of using pattern recognition to detect statistically unusual events, prevent or detect intrusion attempts, and manage the incidents.
|
|
|-
|-
|Data Loss Prevention (DLP)
|Data Loss Prevention (DLP)
|Data Loss Prevention is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.
|Data Loss Prevention is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.
|
|
|-
|-
|Security Information and Event Management (SIEM)
|Security Information and Event Management (SIEM)
|Security Incident and Event Management (SIEM) systems accept log and event information, correlation and incident data and provide real time analysis and correlation.
|Security Incident and Event Management (SIEM) systems accept log and event information, correlation and incident data and provide real time analysis and correlation.
|
|
|-
|-
|Business Continuity and Disaster Recovery (BCDR)
|Business Continuity and Disaster Recovery (BCDR)
|Business Continuity and Disaster Recovery is the implementation of measures designed to ensure operational resiliency in the event of any service interruptions.
|Business Continuity and Disaster Recovery is the implementation of measures designed to ensure operational resiliency in the event of any service interruptions.
|
|
|-
|-
|Continuous Monitoring
|Continuous Monitoring
|Continuous Monitoring performs the function of continuous risk management presenting the current security posture of the organization.
|Continuous Monitoring performs the function of continuous risk management presenting the current security posture of the organization.
|
|
|-
|-
|Security Assessments
|Security Assessments
|Security Assessments are third party audits of cloud services based on industry standards.
|Security Assessments are third party audits of cloud services based on industry standards.
|
|
|}
|}