Cloud Access Protection
SOLUTION
|
TECHNOLOGY
|
||
|
|
The use of applications as a service, shadow it, migration processes from On Premises to Cloud, the use of technologies such as containers, and serverless, present a series of challenges from the perspective of cybersecurity for organizations, where to be able to protect access, users, data and applications is a fundamental pillar. This model includes solutions that are aimed at protecting users and data in this new perimeter, such as in the Migration processes to the Multicloud and the new Hybrid Datacenter.
SOLUTION
|
TECHNOLOGY
|
||
|
|
stage |
TECHNOLOGY |
DDoS protection |
DDoS |
Web Application & API Protection |
WAF |
Virtual Next Generation Firewall |
NGFW |
stage |
TECHNOLOGY |
Cloud Workload Protection Platform |
CWPP |
Microsegmentation |
Microsegmentation |
DevSecOps and Secret Management |
Code analysis |
Data Protection |
Data Protection |
Cloud Infraestructure Entitlement Manager |
CIEM |
Privileged user control |
PAM |
stage |
TECHNOLOGY |
Cloud Security Posture Management |
CSPM |
Cloud Security Monitoring |
Security Monitoring |
Cloud Security Assessment |
Cloud Security Assessment |