Frigør det fulde potentiale i dine projekter.
Prøv MeisterTask gratis.
Har du ingen konto?
Tilmeld dig Gratis
Brows
Fremhævede Maps
Kategorier
Projektledelse
Forretning og mål
Menneskelige ressourcer
Brainstorming & Analyse
Marketing & Indhold
Uddannelse og noter
Underholdning
Fritid
Teknologi
Design
Opsummeringer
Andre
Sprog
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Andet
Vis hele kortet
Kopier og rediger map
Kopier
Global Cyber Security Market
Forretning og mål
Tyler Shields
Følg
Global Cybersecurity Market Map
Kom i gang.
Det er Gratis
Tilmeld dig via Google
eller
tilmeld
med din email adresse
Lignende mindmaps
Mindmap-oversigt
Global Cyber Security Market
af
Tyler Shields
1. Mobile Device Security
1.1. Mobile Endpoint Protection
1.2. Mobile Device Management
1.3. Mobile Application Assesment
2. Security Threat Intelligence and Analytics
2.1. SEIM
2.2. SOAR
3. Network and Infrastructure Security
3.1. Firewall
3.2. IDS / IPS
3.3. Network Segmentation
3.4. Enterprise VPN
3.5. Wireless Infrastructure Security
3.6. Deception Technology
4. Fraud Prevention and Secure Payments
5. Security Operations and Vulnerability Management
5.1. Vulnerability Management
5.2. Threat Intelligence
5.3. IR Workflow
6. Cloud and Container Security
6.1. Identity Mesh
6.2. Service Mesh
6.3. API Gateway
6.4. Cloud Workload Security
6.5. Container Security
6.6. CASB
7. Data Security
7.1. Data Encryption Technologies
7.2. Data Masking
7.3. DLP
8. Endpoint Security
8.1. Patch Management
8.2. Endpoint and Asset Inventory
8.3. Endpoint Mointoring
8.4. Enterprise Anti-Virus and Endpoint Protection
9. Consumer and Home Device Security
9.1. Consumer VPN
9.2. Consumer Anti-Virus and Endpoint Protection
9.3. Home IoT Security
10. Identity and Access Management
10.1. Privileged Access Management
10.2. SSO
10.3. IDaaS
11. Application Security
11.1. Static Application Security Testing
11.2. Dynamic Application Security Testing
11.3. Integrated Application Security Testing
11.4. Runtime Application Self Protection
11.5. Application Discovery
11.6. Software Composition Analysis
11.7. Web Application Firewall
12. Secure Communications
12.1. Secure Collaboration
12.2. Anti-Spam
12.3. Anti-Phishing
12.4. Secure Email
12.5. Secure Messaging
Kom i gang. Det er gratis!
Forbind med Google
eller
Tilmeld