Vendors
Analysis and filtering of network traffic (including NTA)
Open
Cyber Fraud Protection
Open
Cyber Intelligence platforms
Open
Data Leak Prevention (DLP)
Open
Data-Centric Audit and Protection & Data Access Governance (DCAP&DAG)
Open
Forcepoint
DDoS Attack Prevention
Open
Encryption tools
Open
Endpoint protection (EPP, EDR)
Open
Extended Detection and Response (XDR)
Open
Firewall (NGFW/UTM)
Open
Ideco
Mail server protection
Open
Means of protecting information from unauthorized access
Open
Protect of an Industrial Automatic Control System (IACS)
Open
Protecting Cloud and Virtual Environments
Open
Protection against targeted attacks (Sandbox)
Open
Protection of remote workstations and mobile devices
Open
Security information and event management (SIEM)
Open
Security Orchestration, Automation and Response (SOAR)
Open
Training of personnel to protect against cyberthreats
Open
Vulnerability Scanner
Open
Web Application Firewall (WAF)
Open