Types of Cybersecurity Technologies
Image Credit: Wind Power Engineering Development

Types of Cybersecurity Technologies

Twenty years back, Information Security technologies were limited to Perimeter Security, Anti-Virus, IDS/IPS, PKI, Encryption and some basic vulnerability scanning. Fast forward to 2019, so many technologies have evolved that it is almost impossible to navigate. This becomes more confusing when companies start branding and categorizing with unconventional names. At RSA this year, I couldn't keep up with over 200 companies, categorized as Data sovereignty, Government Spying, Practitioner perspectives, Zero day vulnerability, etc.

There are over 50 categories in the field of cybersecurity technology that exists as of this writing. If you are a new aspirant wanting to join the Cybersecurity workforce, make sure you understand that this field has grown significantly both in depth and breadth. Here is a list of few Cybersecurity technologies you should familiarize yourself with:

  1. Antivirus and Antimalware Software
  2. Application security
  3. Artificial Intelligence 
  4. Big Data Security
  5. Blockchain
  6. Business Continuity (BC)/ Disaster Recovery (DR) 
  7. Cloud access security brokers (CASBs)
  8. Cloud Security & Compliance
  9. Cloud Workload Protection Platforms
  10. Cognitive Security
  11. Container Security
  12. Critical infrastructure security
  13. Cyber Range
  14. Cybersecurity Risk Management
  15. Data loss prevention
  16. DDoS Defense & Security Solutions
  17. Deception
  18. Deception Technology
  19. Deep learning
  20. Email Security
  21. Encryption, and end-to-end encryption
  22. Endpoint detection and response (EDR)
  23. Governance, Risk & Compliance
  24. Hardware-Enabled Security
  25. Identity and Access Management (IAM) 
  26. Incident Response Technology
  27. Internet of things (IoT) security
  28. Intrusion Detection and Prevention Systems (IDPS)
  29. Machine Learning
  30. Managed Detection and Response
  31. Microsegmentation
  32. Mobile & Data Security
  33. Mobile Device Management
  34. Network Access Control (NAC)
  35. Network forensics
  36. Network Segmentation
  37. Network Traffic Analysis
  38. NGFW (Next Generation Firewall)
  39. Orchestration and Automation
  40. OSS security scanning and software composition analysis for DevSecOps
  41. Penetration Testing
  42. Predictive Analytics
  43. Real-Time Assessment Tool Integration
  44. Remote Browser/Browser Isolation
  45. Sandboxing Technologies
  46. Security Awareness Training
  47. Security information and event management (SIEM)
  48. Software-Defined Perimeters
  49. Threat Intelligence & Network Security
  50. UEBA (User & Entity Behavior Analytics)
  51. Unified Threat Management (UTM)
  52. Virtual Private Networks (VPN)
  53. Vulnerability Scanning/Vulnerability management
  54. Web security
  55. Wireless Security
  56. Zero-Trust Model
Anthony Van Breda

Networking and security. Strong on their own, unbeatable together.

5 年

Not only do companies brand and categorize with unconventional names, but the technologies/categories you list here also have many overlapping capabilities. The definition of each one will vary depending on who you're talking to.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了