Application type | Description |
---|---|
Application security | Secure operation of software applications |
(e.g. application firewalls, code analyzers) | |
Compliance & IT | Support of the client organization’s compliance and IT security management |
Security management (ITSM) | (e.g. automatic compliance checks, benchmarking) |
Content security | Protection of content data from intended attacks and undesired events |
(e.g. e-mail encryption, filtering of network traffic) | |
Endpoint security | Protection of servers or client computers in networks |
(e.g. malware protection, host-based intrusion detection) | |
Identity & access management | Identification of users, provisioning of user identity attributes and assign- |
ment of necessary privileges (e.g. single sign-on, multi-factor authentication) | |
Devices management | Remote management of client-sided security systems |
(e.g. intrusion detection and prevention systems) | |
Security information & | Specific security-related functions for monitoring complex IT systems |
event management (SIEM) | (e.g. archiving and analysis of log-data, forensic analysis) |
Vulnerability & threat | Detection of threats apart of eminent internal security incidents |
management (VTM) | (e.g. patch management, notifications on current attacks) |