Across
- 2. Endpoint detection and response
- 4. Cyber security Mesh Architecture
- 6. pentest as a service
- 9. Security Orchestration and automated response
- 12. vulnerability prioritization technology
- 14. external attack surface management
- 15. risk-based vulnerability management
- 17. identity and access management
- 18. security service edge
- 20. digital forensics and incident response
- 21. cyber asset attack surface management
- 22. managed endpoint detection and response
- 24. Extended detection and response
- 26. digital risk protection service
- 27. Identity Threat Detection and Response
Down
- 1. Breach and Attack Simulation
- 2. endpoint protection platform
- 3. Vulnerability Assessment
- 4. Cyber-Physical systems security
- 5. Cloud Access security Broker
- 7. threat intelligence platform
- 8. Security Information and Event Management
- 10. managed extended detection and response
- 11. network detection and response
- 13. threat intelligence
- 16. modern security operations center
- 19. exposure management
- 23. data discovery and management software
- 25. Managed detection and response
