Your Leading Cyber Security & Network Performance Solutions Provider PT M.TECH PRODUCTS PORTFOLIO NIST CYBERSECURITY FRAMEWORK Approach: a PRODUCT MAP
Superior and unbiased Enable long-term Ripple effects across cybersecurity cybersecurity and risk supply chains and vendor NIST Cyber Security management lists Framework Bridge the gap between Flexibility and adaptability Built for future regulation technical and business of the Framework and compliance requirements side stakeholders https://www.nist.gov/cyberframework/online-learning/uses-and-benefits-framework
NIST Cyber Security Framework IDENTIFY What processes and assets need protection? PROTECT What safeguards are available? Awareness and Training PROTECTIVE TECHNILOGY DETECT What techniques can identify incidents? RESPONSE What techniques can contain impacts of incidents? RECOVERY What techniques can restore capabilities?
NIST Cyber Security Framework (category) IDENTIFY ASSET MANAGEMENT BUSINES Risk Assesment RISK MANAGEMENT RISK MANAGEMENT PROTECT ENVIRONMENT STRATEGY GOVERNANCE Awareness and Training IDENTITY MANAGEMENT AWARENESS AND DATA SECURITY INFORMATION PROTECTION MAINTENANCE PROTECTIVE AND ACCESS CONTROLL TRAINING PROCESS AND PROCEDURE TECHNOLOGY DETECT ANOMALIES AND SECURITY CONTINUES DETECTION PROCESS EVENT MONITORING RESPONSE RESPONSE PLANNING COMMUNICATION ANALYSIS MITIGATION IMPROVEMENT RECOVERY RECOVERY PLANNING IMPROVEMENT COMMUNICATION
M.Tech – One-Stop Security Provider Incident Digital Response Forensic Identify • Asset Management (AM) Assessment, (ID) • Business Environment (BE) Report • Governance (GV) Monitor, SECURITY Threat • Risk Assessment (RA) Alert OPERATIONS Hunting • Risk Management Strategy (RM) CENTER Protect • Access Control (AC) (PR) • Awareness Training (AT) • Data Security (DS) • Information Protection & Procedures (IP) Filter, Standardize, Enrich, Correlate Risk Packet Threat IDS • Maintenance (MA) Log Asset Data Data Data Data Endpoint • Protective Technology (PT) Data Trend Data Flow Correlated Data Access Data Data Data DLP Data Server Data Detect • Anomalies and Event (AE) Data SSL Visibility (DE) • Security Continuous Monitoring (CM) Log Packet • Detection Process (DP) Collection Capture Response • Response Planning (RP) Access Anti-Malware DDoS Prevention Data Loss Endpoint (RS) • Communication (CO) Monitoring Risk & Compliance Mgmt Prevention Analysis • Analysis (AN) IDS/IPS Encryption • Mitigation (MI) App. Data Discovery User • Improvement (IM) Monitoring Firewall Vulnerability IT & Classification PAM Behavioral Mgmt MFA Analysis Recovery (RC) • Recovery Planning (RP) INFRASTRUCTURE Identity & • Improvements (IM) Access Network Remote • Communication (CO) Access Analytic Connection Network Control IT Asset /VPN Honey Monitoring Mgmt Pot
Brand Map IDENTIFY PROTECT DETECT RESPONSE
Other Approach
OUR PRODUCTS – Security
OUR PRODUCTS – Network Performance
Your Leading Cyber Security & Network Performance Solutions Provider We look forward to a strong partnership with you. ® M.TECH GROUP 2022. ALL RIGHTS RESERVED. WWW.MTECHPRO.COM
Search
Read the Text Version
- 1 - 11
Pages: