Tools, technologies and technical solutions for information protection and security.

πŸ›‘οΈ Perimeter Security

Firewall

Perimeter security devices

WAF (Web Application Firewall)

Web application firewall

VPN

Virtual private network

πŸ” Monitoring and Detection

SIEM (Security Information and Event Management)

Security information and event management

SOAR (Security Orchestration, Automation and Response)

Security orchestration, automation and response

EDR (Endpoint Detection and Response)

Endpoint detection and response

XDR (Extended Detection and Response)

Extended detection and response

πŸ” Identity Management

Active Directory

Microsoft directory service

UBA (User Behavior Analytics)

User behavior analytics

DAC (Discretionary Access Control)

Discretionary access control

🐳 Containers and Cloud

Container Management

Container management

Cloud Security

Cloud security

CSPM (Cloud Security Posture Management)

Cloud security posture management

πŸ”§ Development Tools

DevOps

Development and operations

SecOps

Security and operations

SDLC (Software Development Life Cycle)

Software development life cycle

IAC (Infrastructure as Code)

Infrastructure as code

πŸ” Vulnerability Assessment

Nessus

Vulnerability scanner

Metasploit

Exploitation framework

Vulnerability Assessment

Vulnerability assessment

Nmap

Network scanner

πŸ“Š Monitoring and Observability

Dashboards

Control panels and visualization

Logs

Log and record management

Google Analytics

Web analytics