list of 200 tools used in Enterprise Information Security Architecture

 list of 200 tools used in Enterprise Information Security Architecture

1. TOGAF, 2. SABSA, 3. Zachman Framework, 4. DoDAF, 5. NIST SP 800-53, 6. Palo Alto Networks, 7. Splunk, 8. CrowdStrike, 9. IBM QRadar, 10. Fortinet FortiGate, 11. Tanium, 12. Okta, 13. CyberArk, 14. McAfee ePolicy Orchestrator, 15. Proofpoint, 16. Tenable, 17. RSA Archer, 18. Cisco Umbrella, 19. Azure Security Center, 20. Symantec Endpoint Protection, 21. Veeam, 22. Vulnerability Assessment Tools, 23. Rapid7, 24. LogRhythm, 25. FireEye, 26. Splunk Phantom, 27. SolarWinds Security Event Manager, 28. BeyondTrust, 29. Tripwire, 30. Check Point, 31. Sumo Logic, 32. Qualys, 33. Forcepoint, 34. Cloudflare, 35. Barracuda Networks, 36. Ivanti, 37. Ping Identity, 38. SentinelOne, 39. Trend Micro, 40. F5 Networks, 41. Netskope, 42. WatchGuard Technologies, 43. Zscaler, 44. Mimecast, 45. FortiAnalyzer, 46. RedSeal, 47. Acunetix, 48. Blue Coat (Symantec), 49. NetSuite Security, 50. Arctic Wolf, 51. LastPass, 52. BigFix, 53. Okta Identity Governance, 54. Rapid7 InsightVM, 55. Security Onion, 56. ManageEngine, 57. Bitdefender, 58. CrowdStrike Falcon, 59. SecuPi, 60. VMware NSX, 61. Cylance, 62. Checkmarx, 63. Qualys Cloud Platform, 64. Splunk Enterprise Security, 65. Forcepoint Data Loss Prevention, 66. Barracuda Web Application Firewall, 67. CloudGuard, 68. ZixCorp, 69. Bitglass, 70. Carbon Black, 71. Microsoft Defender for Endpoint, 72. SecureWorks, 73. Varonis, 74. AppGate, 75. AlienVault, 76. Alert Logic, 77. SecuredTouch, 78. AppDynamics, 79. Lookout, 80. SolarWinds Network Performance Monitor, 81. Talos Intelligence, 82. NetFlow Analyzer, 83. McAfee Web Gateway, 84. Check Point SandBlast, 85. IBM Guardium, 86. Forcepoint Insider Threat, 87. Proofpoint Targeted Attack Protection, 88. Duo Security, 89. PingOne, 90. PhishMe, 91. Veracode, 92. Clarity, 93. LogicMonitor, 94. Hitachi Vantara Security, 95. RSA SecurID, 96. Sumo Logic Cloud SIEM, 97. Intezer Analyze, 98. Splunk IT Service Intelligence, 99. Trend Micro Deep Security, 100. Ivanti Security Controls, 101. SecureAuth, 102. FortiWeb, 103. AlienVault USM, 104. FireMon, 105. Rapid7 Nexpose, 106. Datadog Security Monitoring, 107. Proofpoint Enterprise Protection, 108. Aqua Security, 109. Certes Networks, 110. Keyfactor, 111. Sumo Logic Cloud SIEM, 112. Tenable.io, 113. Thales CipherTrust, 114. AlgoSec, 115. Keycloak, 116. Evident.io, 117. Forcepoint Web Security, 118. McAfee Advanced Threat Defense, 119. Cyberbit, 120. Exabeam, 121. SecureLink, 122. WindRiver, 123. AttackIQ, 124. Illusive Networks, 125. SoftLayer Security, 126. Sysdig, 127. Lookout Mobile Endpoint Security, 128. Cybereason, 129. Brinqa, 130. One Identity, 131. Teramind, 132. SolarWinds Network Configuration Manager, 133. Mimecast Targeted Threat Protection, 134. Cybereason Defense Platform, 135. Webroot, 136. SolarWinds NetFlow Traffic Analyzer, 137. NetWrix Auditor, 138. Tanium Comply, 139. Sysdig Secure, 140. CrowdStrike OverWatch, 141. CipherCloud, 142. Informatica Data Security, 143. Gurucul, 144. FireEye Helix, 145. ExtraHop, 146. Palo Alto Cortex XSOAR, 147. OneSpan, 148. RSA NetWitness, 149. Palo Alto Prisma Cloud, 150. Carbon Black Defense, 151. WatchGuard Firebox, 152. SecureState, 153. Tripwire IP360, 154. Sumo Logic Continuous Intelligence, 155. Digital Guardian, 156. A10 Networks Thunder ADC, 157. Trend Micro Deep Discovery, 158. Veeam Backup for Microsoft Office 365, 159. Darktrace, 160. HPE Fortify, 161. ImmuniWeb, 162. Identity and Access Management by OneLogin, 163. Proofpoint Email Security, 164. IdentityNow, 165. FireEye Endpoint Security, 166. Pulse Secure, 167. Lookout Mobile Security, 168. HyTrust, 169. Panaya, 170. AppTec360, 171. Lastline, 172. Palo Alto Networks Prisma Access, 173. ManageEngine Log360, 174. Tenable.io Vulnerability Management, 175. Citrix NetScaler, 176. GigaSpaces, 177. Cisco ISE, 178. M-Files, 179. NetScaler ADC, 180. Traps, 181. Symantec Endpoint Encryption, 182. FortiClient, 183. ManageEngine Endpoint Security, 184. RSA Security Analytics, 185. Blue Team Tools, 186. Red Team Tools, 187. CyberSponse, 188. Splunk SOAR, 189. Varonis Data Security Platform, 190. Infor Security, 191. IBM BigFix, 192. IBM AppScan, 193. Tripwire Enterprise, 194. Imperva, 195. A10 Thunder, 196. CloudPassage, 197. CloudSOC, 198. Akamai Kona Site Defender, 199. Citrix Security, 200. Sysinternals Suite.

Comments

Popular posts from this blog

Differences Between Ubuntu 24.04.2 LTS and Ubuntu 25.04

Kapardak Bhasma: A Comprehensive Review and use

Vanga Bhasma: A Traditional Ayurvedic Metallic Formulation and use