Purpose:
Data Security
Application Security:
Identity and Access Management:
- Endpoint Security: individuals devices like laptops, smartphones, tablets, and desktop that are connected to a network. It detects and prevents malware,viruses, and the other types of attacks. Endpoint involves a mixture of hardware and software, and practices designed to protect and detect, and respond to security threats. Endpoint security manages and control the devices connected to a network. It has firewall that controls the Incoming and outgoing network traffic.
Incident Response and Disaster Recovery:
Incident response means to respond on specific security incident,
Disaster recovery concentrate on restoring operations after a larger disaster. Timeline for Incident response Is short and diaster recovery will take
longer time to complete. Incident response is very tactical, while disaster recovery is more strategic. Disaster recovery minimise the data loss and ensure the business continuity. Incident
response minimise the damage and impact. It also restore normal operations.
Mobile Security:
The applications that are downloaded in mobile are totally secured and do not compromise on device or data. Mobile security protects the device from the malware, viruses and other threats. In mobile security data is encrypted to prevent the unauthorized
access. It protects the device from theft, loss and compromise. It also secure the mobile payment transactions. It use the artificial intelligence (Al) and machine
learning (ML) to detect and protect mobile threats.
- Cloud Security: Data stored in cloud storage services is protected from unauthorized access. Applications that are based on cloud security are protected from threats and attacks. It controls the users access and permissions to cloud resources. It requires a lot of verifications before granting access to cloud security. To monitor and control cloud usage we can use (CASBs).
Security Awareness and Training:
To promote the security awareness and to educate the users about security policies and procedures a program is set that is known as
organizational program. Training the users on security like password management, phishing detection and data handling and classification.
Educating the customers that how to
respond on security incidents, such as data spills, hacking and attacks. It provides education tailored to specific job roles and responsibilities.
Compliance and Governance:
Complaint involves upholding to laws, regulations while
governance involves the frameworks, policies, and the process through which the organization is controlled. Processes to make sure that the values of financial
and operational information. To make sure that business operations are conducted with loyalty and respect for all stakeholders. It reports and provide
accurate information to stakeholders and shareholders. Compliance and
Governance are essential for maintaining a company’s reputation and avoiding
legal penalties.