Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore MTECH-ProdMap2022-rev3

MTECH-ProdMap2022-rev3

Published by R1123 widodoputro, 2023-08-02 14:57:31

Description: MTECH-ProdMap2022-rev3

Search

Read the Text Version

Your Leading Cyber Security & Network Performance Solutions Provider PT M.TECH PRODUCTS PORTFOLIO NIST CYBERSECURITY FRAMEWORK Approach: a PRODUCT MAP



Superior and unbiased Enable long-term Ripple effects across cybersecurity cybersecurity and risk supply chains and vendor NIST Cyber Security management lists Framework Bridge the gap between Flexibility and adaptability Built for future regulation technical and business of the Framework and compliance requirements side stakeholders https://www.nist.gov/cyberframework/online-learning/uses-and-benefits-framework

NIST Cyber Security Framework IDENTIFY What processes and assets need protection? PROTECT What safeguards are available? Awareness and Training PROTECTIVE TECHNILOGY DETECT What techniques can identify incidents? RESPONSE What techniques can contain impacts of incidents? RECOVERY What techniques can restore capabilities?

NIST Cyber Security Framework (category) IDENTIFY ASSET MANAGEMENT BUSINES Risk Assesment RISK MANAGEMENT RISK MANAGEMENT PROTECT ENVIRONMENT STRATEGY GOVERNANCE Awareness and Training IDENTITY MANAGEMENT AWARENESS AND DATA SECURITY INFORMATION PROTECTION MAINTENANCE PROTECTIVE AND ACCESS CONTROLL TRAINING PROCESS AND PROCEDURE TECHNOLOGY DETECT ANOMALIES AND SECURITY CONTINUES DETECTION PROCESS EVENT MONITORING RESPONSE RESPONSE PLANNING COMMUNICATION ANALYSIS MITIGATION IMPROVEMENT RECOVERY RECOVERY PLANNING IMPROVEMENT COMMUNICATION

M.Tech – One-Stop Security Provider Incident Digital Response Forensic Identify • Asset Management (AM) Assessment, (ID) • Business Environment (BE) Report • Governance (GV) Monitor, SECURITY Threat • Risk Assessment (RA) Alert OPERATIONS Hunting • Risk Management Strategy (RM) CENTER Protect • Access Control (AC) (PR) • Awareness Training (AT) • Data Security (DS) • Information Protection & Procedures (IP) Filter, Standardize, Enrich, Correlate Risk Packet Threat IDS • Maintenance (MA) Log Asset Data Data Data Data Endpoint • Protective Technology (PT) Data Trend Data Flow Correlated Data Access Data Data Data DLP Data Server Data Detect • Anomalies and Event (AE) Data SSL Visibility (DE) • Security Continuous Monitoring (CM) Log Packet • Detection Process (DP) Collection Capture Response • Response Planning (RP) Access Anti-Malware DDoS Prevention Data Loss Endpoint (RS) • Communication (CO) Monitoring Risk & Compliance Mgmt Prevention Analysis • Analysis (AN) IDS/IPS Encryption • Mitigation (MI) App. Data Discovery User • Improvement (IM) Monitoring Firewall Vulnerability IT & Classification PAM Behavioral Mgmt MFA Analysis Recovery (RC) • Recovery Planning (RP) INFRASTRUCTURE Identity & • Improvements (IM) Access Network Remote • Communication (CO) Access Analytic Connection Network Control IT Asset /VPN Honey Monitoring Mgmt Pot

Brand Map IDENTIFY PROTECT DETECT RESPONSE

Other Approach

OUR PRODUCTS – Security

OUR PRODUCTS – Network Performance

Your Leading Cyber Security & Network Performance Solutions Provider We look forward to a strong partnership with you. ® M.TECH GROUP 2022. ALL RIGHTS RESERVED. WWW.MTECHPRO.COM


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook