PENETRATION TESTING: Is a technological service that helps prevent unauthorized access to secure and/or sensitive information. Anti-phishing services protect various types of data in diverse ways across a variety of platforms.
Distributed Denial of Service Attack (DDoS); is a set of techniques or tools for resisting or mitigating the impact of distributed attacks on networks attached to the internet by protecting the target and relay networks. DDoS has two victims: The targeted organization whose services are shutdown and the hosts of the botnets (who are being commandeered to perform illegal actions, compromising legitimate business activity)
ANTI-PHISHING: An authorized simulated attack that looks for security weaknesses (e.g; scammers lookout for your passwords), potentially gaining access to the system’s features and data. This includes Security Review, Risk Assessments, Firewall Configuration Reviews, Security Solution Configuration Reviews.
RISK ASSESSMENT: Is the determination of a quantitative or qualitative estimate of risk related to a well-defined situation and a recognized threat and it will enable an organization to put definitions and policies into place and enable them to use its use the results of a risk assessment to develop security requirements and specifications. Many regulations and standards require this to be executed regularly
WEB APPLICATION FIREWALL(WAF); is an application firewall for HTTP applications, deployed by organizations with a web presence. It applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. While proxies generally protect clients, WAFs protect servers.
NEXT-GENERATION-FIREWALLS (NGFW ); is an integrated network platform that is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration.
USER-BEHAVIOR ANALYTICS (UBA); is a cyber security process regarding the detection of insider threats, targeted attacks, and financial fraud. UBA tools use a specialized type of security analytics that focuses on the behavior of systems and the people using them. It enables organizations to assess their progress to forge the thorough scrutiny in applying security postures that safeguard confidentiality, integrity and the availability of data to the right user. Threats can be driven internally by trusted individuals with sensitive data, making it extremely difficult for a security analyst to see these threats because conventional products don’t focus on identifying malicious intent within the system. These breaches are not necessarily intentionally malicious, but could also be negligent or accidental.
NETWORK ACCESS CONTROL (NAC); is an approach that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.