Information Security Technologies
Information security utilizes its own portfolio of protective and detective technologies in its function to protect “all things IT”
202
Foundation technologies
Foundation technologies include…
201
Endpoint protection
Endpoint protection includes…
202
Network Protection
Network Protection includes…
202
Data Protection
Data Protection includes…
202
Identity and Access Management
Identity and Access Management includes…
202
Event Management
Event Management includes…
202
Vulnerability Management
Vulnerability Management includes…
202
Systems and Software Development
Systems and Software Development includes…
202
Governance, Risk and Compliance
Governance, Risk and Compliance includes…
202