Across
- 2. Toughest privacy and security law in the world
- 4. integrates all of the cloud security capabilities into a single cloud-native solution
- 5. a computer malware program that was originally developed in the form of a banking Trojan
- 8. to create a means for security solutions from different vendors to work together effectively to achieve certain security goals.
- 10. is a new approach to threat detection and response that provides holistic protection against cyberattacks, unauthorized access and misuse
Down
- 1. malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent
- 3. way to create a secure software
- 6. method that requires the user to provide two or more verification factors to gain access to a resource
- 7. is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment
- 9. is a security as a service offering designed to offer an alternative to an in-house Security Operations Center (SOC)
