Unlock the full potential of your projects.
Try MeisterTask for free.
¿No tienes una cuenta?
Regístrate Gratis
Navegar
Mapas Destacados
Categorías
Gestión de proyectos
Objetivos de negocio
Recursos humanos
Lluvia de ideas y análisis
Marketing y contenido
Educación y notas
Entretenimento
Vida
Tecnología
Diseño
Resúmenes
Otros
Idiomas
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Otros
Ver mapa completo
Copiar y editar mapa
Copiar
Global Cyber Security Market
Objetivos de negocio
Tyler Shields
Seguir
Global Cybersecurity Market Map
Comienza Ya.
Es Gratis
Regístrate con Google
ó
regístrate
con tu dirección de correo electrónico
Mapas Mentales Similares
Esbozo del Mapa Mental
Global Cyber Security Market
por
Tyler Shields
1. Mobile Device Security
1.1. Mobile Endpoint Protection
1.2. Mobile Device Management
1.3. Mobile Application Assesment
2. Security Threat Intelligence and Analytics
2.1. SEIM
2.2. SOAR
3. Network and Infrastructure Security
3.1. Firewall
3.2. IDS / IPS
3.3. Network Segmentation
3.4. Enterprise VPN
3.5. Wireless Infrastructure Security
3.6. Deception Technology
4. Fraud Prevention and Secure Payments
5. Security Operations and Vulnerability Management
5.1. Vulnerability Management
5.2. Threat Intelligence
5.3. IR Workflow
6. Cloud and Container Security
6.1. Identity Mesh
6.2. Service Mesh
6.3. API Gateway
6.4. Cloud Workload Security
6.5. Container Security
6.6. CASB
7. Data Security
7.1. Data Encryption Technologies
7.2. Data Masking
7.3. DLP
8. Endpoint Security
8.1. Patch Management
8.2. Endpoint and Asset Inventory
8.3. Endpoint Mointoring
8.4. Enterprise Anti-Virus and Endpoint Protection
9. Consumer and Home Device Security
9.1. Consumer VPN
9.2. Consumer Anti-Virus and Endpoint Protection
9.3. Home IoT Security
10. Identity and Access Management
10.1. Privileged Access Management
10.2. SSO
10.3. IDaaS
11. Application Security
11.1. Static Application Security Testing
11.2. Dynamic Application Security Testing
11.3. Integrated Application Security Testing
11.4. Runtime Application Self Protection
11.5. Application Discovery
11.6. Software Composition Analysis
11.7. Web Application Firewall
12. Secure Communications
12.1. Secure Collaboration
12.2. Anti-Spam
12.3. Anti-Phishing
12.4. Secure Email
12.5. Secure Messaging
Comienza Ya. ¡Es Gratis!
Conéctate con Google
ó
Regístrate