Teaching directors about cybersecurity
Art of writing or solving codes
Designing political/activities to prevent/ thwart terrorism
Documenting a structured approach with instructions for responding to unplanned incidents
Outsourcing client's computing/ storage resources to a service provider that offers its infrastructure services (IaaS)
Advising on legal system dealings with the Internet, cyberspace, and their respective legal issues
Converting (a text written in code, or a coded signal) into normal, understandable language
Judging overall completeness, accuracy and consistency of data
Sorting and categorizing data into various types, forms or any other distinct class
Vulnerability assessing and penetration testing (using Open Web Application Security Project)
Recovering and investigating material found in digital devices, often in relation to computer crime
Testing via network monitoring tools connectivity between authoritative name servers and local recursive servers
Addressing/ managing the aftermath of a security breach or cyberattack to limit damage
Ensuring state of being in accordance with established global guidelines or specifications
Examining/ evaluating an organization's information technology infrastructure, policies and operations
Prescribing commercial/ professional procedures which are accepted as being correct or most effective
Ensuring the effective and efficient use of IT in enabling an organization to achieve its goals
Strategizing how a client enables its IT infrastructure/portfolio to operate/ function in line with its business objectives
Cooperatively carrying out initial work prior to a comprehensive VAPT
Proactive/ adversarial approach to protect computer systems/ networks/ individuals from attacks
Configuring most basic core of OS that handles resource allocation/ file management/ security
Art of receiving electronic transmissions before they reach the intended recipient
Determining the functionality/ origin/ potential impact of a given malware sample
Evaluating of the quality or capability of a product or solution
Our own unique methodologies used for exploiting vulnerabilities
Investigating the most core of a OS for damages (often for repairs) after an event
Assigning user rights and privileges to the users of a system or network
Testing to confirm that a recent program or code change has not adversely affected existing features
Trying to carry out our services without visiting the client's office site
Using sophisticated instruments to detect signals over a period of time, and to identify and report findings
Securely transmitting/ transferring data such as confidential/ proprietary information over our secure channel
Configuring the OS and security settings of the client to offer maximum protection/ security
Supporting the client to remedy any technical difficulties
Leveraging advanced virtualisation technology to avert dangers our clients can face
Checking the security of websites, web applications and web services
Reviewing application security of our clients
Security tools to defend against data loss and leakage.
Services and solutions that focus on blocking and mitigating the effects of illegal emails – or spam – on email users.
Actions to prevent another country or company from discovering its security, industrial, or political secrets.
Techniques or tools to mitigate impact of distributed denial-of-service (DDoS) attacks on networks by protecting the relay networks.
Deep packet inspection (DPI) is a form of filtering used to inspect data packets sent from one computer to another over a network.
A database which acts as the data store for multiple applications, and thus integrates data across these applications
8. Database (DBMS) Firewalls
(1) McAfee Centrigo
(3) IBM Guardium
This is either we destroy data so it's irrecoverable, or we disassemble, dissect, neutralise threats, reconstruct and deliver safe files.
The practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data or archival.
(4) Microsoft (Secure Islands)
Solution on endpoint devices to prevent file-based malware attacks, detect malicious activity, and provide respond to security incidents.
View and manage all scheduled jobs or processes across multiple platforms.
(1) BMC (Control-M)
(2) Automic (UC4-CA)
Manage the entire enterprise's technology systems across multiple platforms.
(1) BMC HP
(2) IBM CA
(6) AppDynamics (CISCO)
Communications backbone which connect computers and related devices across departments + workgroup networks, facilitating insight.
(3) Arista Networks
(4) Nokia (Alcatel Lucent)
Integrated management of main business processes, often in real-time and mediated by software and technology.
Procedure of copying data from one or more sources into a destination system which represents the data differently.
Encrypt the data of the enterprise.
(7) NimbleStorage (HP)
(1) CISCO Iron Port
Backing up software for companies.
(8) HP Rubrick
A way to mitigate external threats for an enterprise.
Network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Solid-state storage disk system, is an external storage array that uses only flash media for persistent storage.
(6) IBM Nimble (HP)
A honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods.
(1) Trap X
(2) Illusive Networks
(5) Penror 7
Technology to protect control systems.
Being aware of all the devices in the network.
(2) IXIA (Keysight)
(4) VSS (Netscout)
Unify endpoint security technology, user or system authentication and network security enforcement.
Principles, procedures and guidelines to enforce, manage, monitor and maintain security on a computer network.
Protecting devices from malware threats to reducing risks and securing mobile devices and their data in the case of theft, loss, etc.
(2) Mobile Iron
(9) Ivanti (Let Mobile)
Isolates applications from critical system resources and other programs to stop harmful applications from negatively affecting your system.
(9) Open Source (Cuckoo)
(11) Vx Stream
Devices which encode or disrupt the signals for security purposes.
Protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites.
(1) Cyber Ark
Knowledge + attitude of an organization regarding the protection of the physical, and especially informational, assets of that organization.
(1) Iron Scales
(2) Cyber Ready
(4) Celestya Q-log
Products which provide real-time analysis of security alerts generated by applications and network hardware.
(1) HP (Microfocus)
A safe and encrypted connection over a less secure network
Computer or computer program which manages access to a centralized resource or service in a network.
A communications center that provides a single point of contact between a company and its customers, employees and business partners.
(1) BMC Service Now
(3) CA Microsoft via XRM
(4) Manage Engine
(5) Jira (as SD)
We set up and try to use TOR to anonymize network traffic.
Products which secure confidential data stored online from unauthorized access and modification.
Protects web applications by monitoring and filtering traffic.
It is possible to learn this industry well by studying the information found on the internet.