Skip to main content

Table 1 Classification of SECaaS applications

From: Adoption of security as a service

Application type

Description

Application security

Secure operation of software applications

 

(e.g. application firewalls, code analyzers)

Compliance & IT

Support of the client organization’s compliance and IT security management

Security management (ITSM)

(e.g. automatic compliance checks, benchmarking)

Content security

Protection of content data from intended attacks and undesired events

 

(e.g. e-mail encryption, filtering of network traffic)

Endpoint security

Protection of servers or client computers in networks

 

(e.g. malware protection, host-based intrusion detection)

Identity & access management

Identification of users, provisioning of user identity attributes and assign-

 

ment of necessary privileges (e.g. single sign-on, multi-factor authentication)

Devices management

Remote management of client-sided security systems

 

(e.g. intrusion detection and prevention systems)

Security information &

Specific security-related functions for monitoring complex IT systems

event management (SIEM)

(e.g. archiving and analysis of log-data, forensic analysis)

Vulnerability & threat

Detection of threats apart of eminent internal security incidents

management (VTM)

(e.g. patch management, notifications on current attacks)