Network Traffic Analysis (NTA) & Anomaly detection LOG , SIEM and Big Data Platforms Threat Protection for SaaS Vulnerability Assess. (VA) Config audits and Compliance Tokenization, DLP, Monitoring, Encryption DLP for the Cloud IDaaS and CASB - Cloud Access Security Broker Backup into the Cloud Encryption and Key Management Machine Data Analytics & Big Data / Security Operations, Analytics and Reporting (SOAR) Micro Segmentation of Docker Containers App Segmentation & Hardening Threat Intelligence Platforms (TIPS) Endpoint Detection & Response (EDR) & Malware Hunting Data Analytics and Visualization Cloud based CDN, DDoS, WAF, ADC IoT Security Cyber Situational Awareness Deception Based Detection Risk Intelligence (IRMS) & prioritization OT/SCADA Security Security Automation and DevOps Incident Response Orchestration and Automation & Situational Awareness User and Entity Behavior Analytics (UEBA/UBA) Endpoint Protection (EPP) Sandbox Analysis MSSP Content Security Web and Mail Threat Intelligence Automation and Sharing Code Testing Predict & Prevent Enrich data input and detection Detect Respond and protect Comments or corrections? Please send feedback to Philipp Wächter - [email protected] - MSSP Product Developer Content Disarm & Reconstruction CDR Offensive Security Mobile Device Security Integrity Based Assurance and Detection Exfiltration detection, DLP IAG – Identity and Access Governance Disruptive SOAR (Security Operations, Analytics and Reporting) & related vendors (2016) – Use this landscape to benchmark your legacy Tooling.