Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybersecurity Domains & Tools 🛡️ - Coggle Diagram
Cybersecurity Domains & Tools 🛡️
Network Security 🔐
Wireshark
– Packet analyzer
Snort
– Intrusion detection
Nmap
– Network scanning
Cisco ASA
– Firewall solution
pfSense
– Open-source firewall
Nessus
– Vulnerability scanner
SolarWinds NPM
– Network monitoring
Application Security 🛡️
Burp Suite
– Web app testing
OWASP ZAP
– Web app scanner
Veracode
– Code analysis
Checkmarx
– Static analysis
Snyk
– Open-source security
AppScan
– IBM app security
Fortify
– Static code analyzer
Cloud Security ☁️
Prisma Cloud
– Multi-cloud protection
AWS Security Hub
– AWS security monitoring
Azure Security Center
– Azure security
Google SCC
– Google cloud monitoring
Dome9
– Cloud compliance
CloudGuard
– Check Point cloud security
Lacework
– Cloud threat detection
Endpoint Security 🖥️
CrowdStrike Falcon
– EDR platform
Symantec Endpoint
– Device protection
Microsoft Defender
– Endpoint detection
Trend Micro Apex
– Threat detection
McAfee ENS
– Endpoint defense
Kaspersky
– Endpoint antivirus
Sophos Intercept X
– Ransomware protection
Data Security 🔏
Vormetric
– Data encryption
Digital Guardian
– DLP solution
Netwrix
– Data auditing
IBM Guardium
– Real-time monitoring
Varonis
– Data access control
Symantec DLP
– Prevent data loss
McAfee DLP
– Enterprise data security
Identity & Access Management (IAM) 🔑
Okta
– Identity management
CyberArk
– Privileged accounts
Azure AD
– Cloud IAM
Ping Identity
– SSO & MFA
Auth0
– Authentication platform
RSA SecurID
– Multi-factor auth
SailPoint
– Identity governance
Operational Technology (OT) ⚙️
Nozomi Networks
– OT monitoring
Dragos
– ICS/SCADA security
Claroty
– Industrial security
Fortinet OT
– OT firewall
SCADAfence
– Industrial IoT security
Indegy
– ICS risk management
CyberX
– ICS visibility
IoT Security 📡
Armis
– IoT visibility
Darktrace
– IoT threat detection
Zingbox
– IoT security management
AWS IoT Defender
– AWS IoT security
Trend Micro IoT
– Device security
Palo Alto IoT
– Segmentation
Forescout
– Device control
Cyber Threat Intelligence (CTI) 🧠
Recorded Future
– Real-time threat intel
ThreatConnect
– Intel aggregation
FireEye
– Threat analysis
IBM X-Force
– Threat sharing
Mandiant
– Incident intel
Anomali
– Intel platforms
AlienVault OTX
– Open threat exchange
Incident Response 🚨
TheHive
– IR platform
Splunk Phantom
– SOAR
Velociraptor
– Forensics tool
Carbon Black
– Endpoint IR
Cortex XSOAR
– Playbooks
GRR Rapid
– Live forensics
Cyborg Security
– Threat hunting
Penetration Testing 🔓
Metasploit
– Exploit framework
Kali Linux
– Pentesting OS
Burp Suite
– Web pentesting
Nmap
– Port scanning
SQLmap
– SQL injection
Nikto
– Web server scanner
Cobalt Strike
– Red team simulation
DevSecOps ⚙️
SonarQube
– Code quality
Aqua
– Container security
Twistlock
– Container scanning
Snyk
– Dependency scanning
Anchore
– Container compliance
JFrog Xray
– Artifact scanning
GitLab
– DevSecOps pipeline
Cryptography 🔐
OpenSSL
– TLS/SSL encryption
GPG
– File encryption
HashiCorp Vault
– Secrets management
Entrust
– PKI solutions
Veracrypt
– Disk encryption
Keycloak
– Identity encryption
Thales CipherTrust
– Data encryption
Wireless Security 📶
Aircrack-ng
– Wi-Fi pentesting
Kismet
– Wireless IDS
Wifiphisher
– Rogue AP
Ekahau
– Wireless survey
NetSpot
– Wi-Fi analysis
Pineapple
– Network attack
Cisco Meraki
– Wireless security
AI for Cyber Defense 🤖
Darktrace
– AI threat detection
Vectra AI
– Network AI
Cylance
– AI malware defense
Watson
– IBM AI security
FortiAI
– Automated threat detection
ExtraHop
– AI-driven analytics
ThreatWarrior
– AI network defense
Risk Management 📊
RiskLens
– Quantifies cyber risk
RSA Archer
– GRC platform
LogicManager
– Governance and risk
Xacta
– IT risk and compliance
OneTrust
– Privacy and security compliance
ServiceNow GRC
– Automated compliance workflows
NAVEX IRM
– Risk and policy management
Supply Chain Security 🔄
Sonatype Nexus
– Dependency management
JFrog Artifactory
– Artifact repository security
CycloneDX
– SBOM generator
ReversingLabs
– Software integrity analysis
Anchore
– Supply chain scanning
Sigstore
– Artifact signing and verification
Dependency-Track
– Component vulnerability analysis
Blockchain Security 🔗
MythX
– Smart contract security
CertiK
– Formal verification
Quantstamp
– Smart contract audits
Slither
– Static analysis for Solidity
Immunefi
– Bug bounty for Web3
Chainalysis
– Blockchain forensics
BlockSec
– Blockchain vulnerability management
Critical Infrastructure Security 🏭
Claroty
– OT and ICS protection
Dragos
– ICS/SCADA monitoring
Nozomi Networks
– Industrial threat detection
FortiGate OT
– Critical infrastructure firewall
Radiflow
– ICS vulnerability detection
SCADAfence
– ICS anomaly detection
Tenable.ot
– Industrial asset security
Physical Security Integration 🚪
Genetec
– Physical security unification
Avigilon
– AI-powered surveillance
Axis Communications
– IP surveillance
HID Global
– Access control solutions
Milestone Systems
– Video management
Gallagher Security
– Perimeter security
Bosch Security
– Intrusion detection
Social Engineering Defense 🎭
KnowBe4
– Security awareness training
Cofense
– Phishing simulations
PhishLabs
– Social engineering defense
Proofpoint
– Email threat protection
Mimecast
– Awareness and phishing protection
Ironscales
– AI-driven phishing defense
Barracuda PhishLine
– User training and testing
Wireless Security 📡
Aircrack-ng
– Wi-Fi packet sniffing
Wifiphisher
– Wireless phishing attacks
Kismet
– Wireless network monitoring
NetSpot
– Wi-Fi performance analysis
Ekahau
– Wireless site surveys
Cisco Meraki
– Secure wireless infrastructure
Wi-Fi Pineapple
– Rogue AP simulations
DevSecOps 🔄
SonarQube
– Code quality and security
Twistlock
– Container security
Aqua Security
– Container and K8s security
Snyk
– Vulnerability scanning in CI/CD
Anchore
– Container policy enforcement
GitLab
– CI/CD security integration
JFrog Xray
– Dependency scanning
Cryptography 🔐
OpenSSL
– TLS encryption and SSL certificates
GPG
– File encryption and signing
HashiCorp Vault
– Secrets management
Keycloak
– Identity federation with encryption
Entrust
– PKI and certificate management
Veracrypt
– Disk encryption
Thales CipherTrust
– Data encryption and management
AI for Cyber Defense 🤖
Darktrace
– Autonomous threat response
Vectra AI
– AI-driven network threat detection
CylancePROTECT
– AI malware prevention
FireEye Helix
– AI-powered SOAR
Watson for Cybersecurity
– IBM AI for threat analysis
ThreatWarrior
– AI-driven network defense
FortiAI
– Automated malware detection