Types of Cybersecurity Technologies
Twenty years back, Information Security technologies were limited to Perimeter Security, Anti-Virus, IDS/IPS, PKI, Encryption and some basic vulnerability scanning. Fast forward to 2019, so many technologies have evolved that it is almost impossible to navigate. This becomes more confusing when companies start branding and categorizing with unconventional names. At RSA this year, I couldn't keep up with over 200 companies, categorized as Data sovereignty, Government Spying, Practitioner perspectives, Zero day vulnerability, etc.
There are over 50 categories in the field of cybersecurity technology that exists as of this writing. If you are a new aspirant wanting to join the Cybersecurity workforce, make sure you understand that this field has grown significantly both in depth and breadth. Here is a list of few Cybersecurity technologies you should familiarize yourself with:
- Antivirus and Antimalware Software
- Application security
- Artificial Intelligence
- Big Data Security
- Blockchain
- Business Continuity (BC)/ Disaster Recovery (DR)
- Cloud access security brokers (CASBs)
- Cloud Security & Compliance
- Cloud Workload Protection Platforms
- Cognitive Security
- Container Security
- Critical infrastructure security
- Cyber Range
- Cybersecurity Risk Management
- Data loss prevention
- DDoS Defense & Security Solutions
- Deception
- Deception Technology
- Deep learning
- Email Security
- Encryption, and end-to-end encryption
- Endpoint detection and response (EDR)
- Governance, Risk & Compliance
- Hardware-Enabled Security
- Identity and Access Management (IAM)
- Incident Response Technology
- Internet of things (IoT) security
- Intrusion Detection and Prevention Systems (IDPS)
- Machine Learning
- Managed Detection and Response
- Microsegmentation
- Mobile & Data Security
- Mobile Device Management
- Network Access Control (NAC)
- Network forensics
- Network Segmentation
- Network Traffic Analysis
- NGFW (Next Generation Firewall)
- Orchestration and Automation
- OSS security scanning and software composition analysis for DevSecOps
- Penetration Testing
- Predictive Analytics
- Real-Time Assessment Tool Integration
- Remote Browser/Browser Isolation
- Sandboxing Technologies
- Security Awareness Training
- Security information and event management (SIEM)
- Software-Defined Perimeters
- Threat Intelligence & Network Security
- UEBA (User & Entity Behavior Analytics)
- Unified Threat Management (UTM)
- Virtual Private Networks (VPN)
- Vulnerability Scanning/Vulnerability management
- Web security
- Wireless Security
- Zero-Trust Model
Networking and security. Strong on their own, unbeatable together.
5 年Not only do companies brand and categorize with unconventional names, but the technologies/categories you list here also have many overlapping capabilities. The definition of each one will vary depending on who you're talking to.