Post on 01-Mar-2021
Application Security ✔ ✔ ✔Breach & Attack Simulation (BAS) ✔ ✔ ✔ ✔Cloud Access Security Broker (CASB) ✔ ✔ ✔Cloud Security (SaaS) ✔ ✔ ✔Cloud Security (IaaS/PaaS) ✔ ✔ ✔Container Security ✔
Data Access Governance ✔ ✔Data Classification ✔ ✔Data Loss Protection (DLP) ✔ ✔ ✔Database Security ✔ ✔
DDoS ✔ ✔ ✔Digital Rights Management (DRM) ✔ ✔Email Security (SPAM, Malware, DLP, Phishing) ✔ ✔ ✔Encryption & Key Management (HSM, PKI) ✔ ✔Endpoint Security (EPP, EDR) ✔ ✔ ✔ ✔File Security & Integrity Monitoring (FIM) ✔ ✔Firewall Platforms (Enterprise) ✔ ✔ ✔ ✔Firewall as a Service (FWaaS) ✔ ✔ ✔ ✔Governance, Risk & Compliance (GRC, IRM) ✔
Identity & Access Management (IAM\IGA) ✔ ✔ ✔IoT Security ✔ ✔Isolation ✔ ✔Malware Sandbox ✔ ✔ ✔Micro‐Segmentation ✔ ✔
Mobile Security (MDM, MTD) ✔ ✔ ✔Multi Factor Authentication (MFA) ✔ ✔Network Access Control (NAC) ✔ ✔ ✔
Page 1
Technology Initiative Architecture Installation PartnersLifecycle Managed
Network Traffic & Behavior Analysis (NTA) ✔ ✔ ✔ ✔Network Forensics ✔ ✔Network Taps & Visibility ✔ ✔Operational Technology (OT) Security ✔ ✔Privileged Access Management (PAM) ✔ ✔ ✔ ✔Security Analytics ✔ ✔ ✔Password Management (SSO) ✔ ✔Security Information & Event Mgmt (SIEM) ✔ ✔ ✔ ✔Security Management (Network) ✔ ✔ ✔ ✔Security Orch, Automation & Response (SOAR) ✔ ✔SSL Inspection ✔ ✔ ✔Testing (App, Network, Security, Performance) ✔ ✔Third Party Risk Management ✔Threat and Vulnerability Management ✔ ✔ ✔ ✔Threat Deception ✔ ✔ ✔Threat Intelligence ✔User & Entity Behavioral Analysis (UBA, UEBA) ✔ ✔ ✔VPN ✔ ✔ ✔Web & Content Security ✔ ✔ ✔ ✔Web Application Firewall (WAF) ✔ ✔ ✔
www.sayers.com
Read Our Case Studies @ https://resources.sayers.com/case_studies
Page 2
Technology Initiative Architecture Installation Lifecycle Managed Partners