Unlock the full potential of your projects.
Try MeisterTask for free.
Vous n'avez pas de compte ?
Inscription gratuite
Parcourir
Cartes en vedette
Catégories
Affaires
Design
Education
Loisirs
Vie courante
Marketing
Productivité
Résumés
Technologie
Autre
Langues
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Autre
Montrer carte totale
Copier éditer carte
Copier
Global Cyber Security Market
Affaires
Tyler Shields
Suivre
Global Cybersecurity Market Map
Lancez-Vous.
C'est gratuit
S'inscrire avec Google
ou
s'inscrire
avec votre adresse e-mail
Cartes mentales similaires
Plan de carte mentale
Global Cyber Security Market
par
Tyler Shields
1. Endpoint Security
1.1. Patch Management
1.2. Endpoint and Asset Inventory
1.3. Endpoint Mointoring
1.4. Enterprise Anti-Virus and Endpoint Protection
2. Consumer and Home Device Security
2.1. Consumer VPN
2.2. Consumer Anti-Virus and Endpoint Protection
2.3. Home IoT Security
3. Mobile Device Security
3.1. Mobile Endpoint Protection
3.2. Mobile Device Management
3.3. Mobile Application Assesment
4. Security Threat Intelligence and Analytics
4.1. SEIM
4.2. SOAR
5. Network and Infrastructure Security
5.1. Firewall
5.2. IDS / IPS
5.3. Network Segmentation
5.4. Enterprise VPN
5.5. Wireless Infrastructure Security
5.6. Deception Technology
6. Identity and Access Management
6.1. Privileged Access Management
6.2. SSO
6.3. IDaaS
7. Fraud Prevention and Secure Payments
8. Security Operations and Vulnerability Management
8.1. Vulnerability Management
8.2. Threat Intelligence
8.3. IR Workflow
9. Cloud and Container Security
9.1. Identity Mesh
9.2. Service Mesh
9.3. API Gateway
9.4. Cloud Workload Security
9.5. Container Security
9.6. CASB
10. Application Security
10.1. Static Application Security Testing
10.2. Dynamic Application Security Testing
10.3. Integrated Application Security Testing
10.4. Runtime Application Self Protection
10.5. Application Discovery
10.6. Software Composition Analysis
10.7. Web Application Firewall
11. Data Security
11.1. Data Encryption Technologies
11.2. Data Masking
11.3. DLP
12. Secure Communications
12.1. Secure Collaboration
12.2. Anti-Spam
12.3. Anti-Phishing
12.4. Secure Email
12.5. Secure Messaging
Lancez-vous. C'est gratuit!
Connectez-vous avec Google
ou
S'inscrire