SlideShare a Scribd company logo
Very basic
Separate
appliance
Reputation
Based only EOD
Demisto
(SOAR)
enSilo
Protego
Host-level
only
TwistLock
Very
Limited
Only on
EX series
Only on
NX series
Android
Only
Umbrella
URLF
Reputation
Based only Basic Basic
Reputation
Based only
No API
Basic
Partnership
ZingBox
Separate
Product
Separate
Product
FIREW
ALL
INTRUSIONPREVENTIONSYSTEM
APPCONTROLANTI-BOT
THREATEM
ULATION(SANDBOX)
CPU-LEVELSANDBOX/THREATEXTRACTION
URLFILTERING
FW
AAS
ANTI-SPAM
ANTI-VIRUS
NETW
ORKSECURITYCOM
PLIANCE
DDoSPROTECTIONDATALEAKPREVENTION
ENDPOINTAVENDPOINTFULL-DISK
ENCRYPTION
ENDPOINTFORENSICS
NETW
ORKEVENTANALYSIS
PRIVATECLOUDGATEW
AY(NSX/ACI)
PUBLICCLOUDGATEW
AY
OFFICE365PROTECTION
M
OBILETHREATPROTECTION
DOCUM
ENTSECURITY
M
OBILECONTAINER
W
EBAPPLICATIONANDAPIPROTECTION
IOTTHREATPREVENTION
NGFW ATD EDR SIEM CLOUD MTD/EMMEMAIL WAAP
Fullsolution
Partialsolution
Nosolution
CLOUDSECURITYPOSTUREPROTECTION
Separate
solution
No real-
time
prevent
No real-
time
prevent
No real-
time
prevent
No real-
time
prevent
No real-
time
prevent
No real-
time
prevent
No
quarantine
Limited PureSec
DLP EPPDDoS FDE
THREATEXTRACTION
CWPP
SERVERLESSSECURITY
CONTAINERSECURITY
CSPM
CLOUDCOM
PLIANCE
IOT/ICS
IOTRISKANALYSIS&
VISIBILITY
IOTPOLICYENFORCEM
ENT
NETW
ORKASSERVICE
Very basic
No GCP
No GCP
Basic
Monitor
only
Alside
partnership
Alside
partnership
Host level
only
Monitor
only
Basic
Basic
Cloud
conformity
limited
No real
time
compliance
Basic
Few
protections
Few
protections
SASE
Integration
SOAR
Demisto
Cybersponse
SECURITYORCHESTRATION,AUTOM
ATATION&
RESPONSE
Gartner
Definition
DNSseC
CYBER SECURITY COVERAGE HEAT MAP
Information based on vendor’s public information and 3rd party | Q2 2020 Latest copy can be found @ https://tiny.cc/cyberheatmap

More Related Content

PDF
Cyber Security Strategies and Approaches
PPTX
Security Operation Center - Design & Build
PPTX
Ethical Hacking
PDF
Building A Security Operations Center
PDF
Secure Systems Security and ISA99- IEC62443
PPSX
Next-Gen security operation center
PDF
Securing Industrial Control System
PDF
Threat Hunting with Cyber Kill Chain
Cyber Security Strategies and Approaches
Security Operation Center - Design & Build
Ethical Hacking
Building A Security Operations Center
Secure Systems Security and ISA99- IEC62443
Next-Gen security operation center
Securing Industrial Control System
Threat Hunting with Cyber Kill Chain

What's hot (20)

PPTX
Microsoft Threat Protection
PDF
Introduction to Operational Technology 0.1
PPTX
Cloud Security
PPTX
WHY SOC Services needed?
PDF
AIoT and edge computing solutions
PDF
Cyber Threat Intelligence
PDF
Cyber threat intelligence ppt
PPTX
An introduction to SOC (Security Operation Center)
PPTX
What is Penetration Testing?
PPT
IDS and IPS
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PDF
Global Cyber Threat Intelligence
PPTX
Cyber Security – Challenges [Autosaved].pptx
PPTX
Azure Sentinel.pptx
PDF
Building an Analytics Enables SOC
PPTX
The Zero Trust Model of Information Security
PPTX
Security of IOT,OT And IT.pptx
PDF
Building a Next-Generation Security Operations Center (SOC)
PPT
Threat landscape 4.0
Microsoft Threat Protection
Introduction to Operational Technology 0.1
Cloud Security
WHY SOC Services needed?
AIoT and edge computing solutions
Cyber Threat Intelligence
Cyber threat intelligence ppt
An introduction to SOC (Security Operation Center)
What is Penetration Testing?
IDS and IPS
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Global Cyber Threat Intelligence
Cyber Security – Challenges [Autosaved].pptx
Azure Sentinel.pptx
Building an Analytics Enables SOC
The Zero Trust Model of Information Security
Security of IOT,OT And IT.pptx
Building a Next-Generation Security Operations Center (SOC)
Threat landscape 4.0
Ad

Similar to Cyber Security Coverage heat map (20)

PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PPTX
SECURE ACCESS SERVICE EDGE - SSE/SASE(CLOUD)
PPTX
Esteban Próspero
PPTX
Presales-Present_GravityZone Products_June2023.pptx
PPTX
Presales-Present_GravityZone Products_June2023.pptx
PDF
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
PDF
Cumulonimbus fortification-secure-your-data-in-the-cloud
PDF
Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...
PDF
SIEM enabled risk management , SOC and GRC v1.0
PPTX
AWS Lambda Security Inside & Out
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PPTX
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
PDF
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
PPTX
"Navigate the MDR Marketplace Like a Pro!"
PDF
Cloud Computing workshop
PPTX
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
PPTX
From Zero to SOC: Designing Effective Threat Detection & Incident Response
PDF
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
PDF
Maximize your investment with AWS Native Security Controls
PPTX
customer presentation of security concern.pptx
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
SECURE ACCESS SERVICE EDGE - SSE/SASE(CLOUD)
Esteban Próspero
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach k...
SIEM enabled risk management , SOC and GRC v1.0
AWS Lambda Security Inside & Out
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
"Navigate the MDR Marketplace Like a Pro!"
Cloud Computing workshop
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
From Zero to SOC: Designing Effective Threat Detection & Incident Response
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Maximize your investment with AWS Native Security Controls
customer presentation of security concern.pptx
Ad

More from Moti Sagey מוטי שגיא (20)

PDF
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
PDF
Why Check Point - Top 4 Facts
PPTX
Mind the gap_cpx2022_moti_sagey_final
PDF
Why check point win top 4 facts
PDF
Why Check Point - Moti Sagey
DOCX
NGFW RFP TEMPLATE - TEST PLAN
PPTX
Check point Infinity Overview
PPTX
Check Point vs competition security effectiveness
PDF
Why Check Point - Top 4
PPTX
Check Point Corporate Overview 2020 - Detailed
DOCX
Security architecture proposal template
PPTX
Check Point Solutions Portfolio- Detailed
PDF
Moti Sagey CPX keynote _Are All security products created equal
PPTX
Cyber intro 2017_hebrew
PDF
Check point response to Cisco NGFW competitive
PDF
Check Point mission statement
PDF
How to Choose a SandBox - Gartner
PDF
CPX 2016 Moti Sagey Security Vendor Landscape
PDF
How to expose shortcuts in competitive poc
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
Why Check Point - Top 4 Facts
Mind the gap_cpx2022_moti_sagey_final
Why check point win top 4 facts
Why Check Point - Moti Sagey
NGFW RFP TEMPLATE - TEST PLAN
Check point Infinity Overview
Check Point vs competition security effectiveness
Why Check Point - Top 4
Check Point Corporate Overview 2020 - Detailed
Security architecture proposal template
Check Point Solutions Portfolio- Detailed
Moti Sagey CPX keynote _Are All security products created equal
Cyber intro 2017_hebrew
Check point response to Cisco NGFW competitive
Check Point mission statement
How to Choose a SandBox - Gartner
CPX 2016 Moti Sagey Security Vendor Landscape
How to expose shortcuts in competitive poc

Recently uploaded (20)

PPTX
E -tech empowerment technologies PowerPoint
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
The Evolution of Traditional to New Media .pdf
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
Introduction to the IoT system, how the IoT system works
PPTX
Internet Safety for Seniors presentation
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
E -tech empowerment technologies PowerPoint
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
The Evolution of Traditional to New Media .pdf
artificialintelligenceai1-copy-210604123353.pptx
Power Point - Lesson 3_2.pptx grad school presentation
Mathew Digital SEO Checklist Guidlines 2025
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Layers_of_the_Earth_Grade7.pptx class by
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Exploring VPS Hosting Trends for SMBs in 2025
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Introduction to the IoT system, how the IoT system works
Internet Safety for Seniors presentation
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
newyork.pptxirantrafgshenepalchinachinane
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟

Cyber Security Coverage heat map

  • 1. Very basic Separate appliance Reputation Based only EOD Demisto (SOAR) enSilo Protego Host-level only TwistLock Very Limited Only on EX series Only on NX series Android Only Umbrella URLF Reputation Based only Basic Basic Reputation Based only No API Basic Partnership ZingBox Separate Product Separate Product FIREW ALL INTRUSIONPREVENTIONSYSTEM APPCONTROLANTI-BOT THREATEM ULATION(SANDBOX) CPU-LEVELSANDBOX/THREATEXTRACTION URLFILTERING FW AAS ANTI-SPAM ANTI-VIRUS NETW ORKSECURITYCOM PLIANCE DDoSPROTECTIONDATALEAKPREVENTION ENDPOINTAVENDPOINTFULL-DISK ENCRYPTION ENDPOINTFORENSICS NETW ORKEVENTANALYSIS PRIVATECLOUDGATEW AY(NSX/ACI) PUBLICCLOUDGATEW AY OFFICE365PROTECTION M OBILETHREATPROTECTION DOCUM ENTSECURITY M OBILECONTAINER W EBAPPLICATIONANDAPIPROTECTION IOTTHREATPREVENTION NGFW ATD EDR SIEM CLOUD MTD/EMMEMAIL WAAP Fullsolution Partialsolution Nosolution CLOUDSECURITYPOSTUREPROTECTION Separate solution No real- time prevent No real- time prevent No real- time prevent No real- time prevent No real- time prevent No real- time prevent No quarantine Limited PureSec DLP EPPDDoS FDE THREATEXTRACTION CWPP SERVERLESSSECURITY CONTAINERSECURITY CSPM CLOUDCOM PLIANCE IOT/ICS IOTRISKANALYSIS& VISIBILITY IOTPOLICYENFORCEM ENT NETW ORKASSERVICE Very basic No GCP No GCP Basic Monitor only Alside partnership Alside partnership Host level only Monitor only Basic Basic Cloud conformity limited No real time compliance Basic Few protections Few protections SASE Integration SOAR Demisto Cybersponse SECURITYORCHESTRATION,AUTOM ATATION& RESPONSE Gartner Definition DNSseC CYBER SECURITY COVERAGE HEAT MAP Information based on vendor’s public information and 3rd party | Q2 2020 Latest copy can be found @ https://tiny.cc/cyberheatmap