Skip to main content

Overview


  1. Cyber Detection and ResponseCyber-Compliance (51 Modules)Module):: This section providesintroduces toolsthe Cyber Security Compliance module—a dedicated tool for ensuring proactive threatrisk detectionmanagement and swiftadherence response,to includingregulatory Cyberrequirements. IncidentIt Monitoring,supports Securitycontinuous Orchestration,compliance Automationmonitoring, policy enforcement, and Response,audit Threatreadiness Intelligence,to Endpointalign Detectionwith industry standards and Response,legal and User and Entity Behavior Analysis.obligations.

  2. Cyber Governance (5 Modules): Ensure compliance and effective governance with features such as SecurityCISO Compliance,Workplan, PrivacyCyber Compliance,Training, Culture, and Awareness, Governance and Management,Management Cloudof Cyber Security, Policies and Procedures, and Security PostureAssessment Management,Questionnaires andfor AssetThird Discovery and Management.Parties.

  3. Cyber Cyber-Risk Management (6 Modules):: Identify, assess, and manage cyber risks with modules covering SocialBusiness Engineering,Continuity Management, Business Impact Analysis, Cyber Security Risk Management, Penetration Testing, Supply Chain Risk Management, Virtual Penetration Testing,and Vulnerability Assessment and Management, Cyber Risk Assessment, and Cyber Risk Management.

  4. Identity and Data GovernanceCyber-Monitoring (46 Modules):: Secure identitiesyour and dataenvironment with Privilegeda Accountlayered Review,defense Datastrategy powered by Cloud Security Posture Management, IdentityCyber Incident Management, Endpoint Detection and AccessResponse, Review,Security Orchestration, Automation and DataResponse, GovernanceThreat tools.Intelligence, and User and Entity Behavior Analysis.

  5. Cyber Resiliency (3 Modules): Ensure business continuity and resilience against cyber threats with Business Continuity Management, Disaster Recovery Planning, and Cyber Insurance Analysis.Data-Security:

  6. Identity-Security: