Shadow It

Shadow IT refers to information technology projects that are managed outside of, and without the knowledge of, the IT department. At one time Shadow IT was limited to unapproved Excel macros and boxes of software employees purchased at office supply stores. It has grown exponentially in recent years, with advisory firm CEB estimating that 40% of all IT spending at a company occurs outside the IT department. This rapid growth is partly driven by the quality of consumer applications in the cloud such as file sharing apps, social media, and collaboration tools, but itís also increasingly driven by lines of business deploying enterprise-class SaaS applications. In many ways Shadow IT is helping to make businesses more competitive and employees more productive.

DLP

Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.

User Behaviour Analytics

User behaviour analytics (UBA) as defined by Gartner is a cybersecurity process about detection of insider threats, targeted attacks, and financial fraud. UBA solutions look at patterns of human behavior, and then apply algorithms and statistical analysis to detect meaningful anomalies from those patternsóanomalies that indicate potential threats.[1] Instead of tracking devices or security events, UBA tracks a system’s users.[2] Big data platforms like Apache Hadoop are increasing UBA functionality by allowing them to analyze petabytes worth of data to detect insider threats and advanced persistent threats.

NPS

A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer
networks from unauthorized access and malicious activity.A NIPS continually monitors an organization’s computer networks for abnormal traffic patterns, generating event logs, alerting system administrators to significant events and stopping potential intrusions when possible.

Threat Management

Threat Management System are network analysis and visibility solution that uniquely detects evasive intrusions and automates remediation, giving you the real-time visibility, insight, and control you need to protect your company from advanced targeted attacks. Threat Management Systems provide the most accurate and up-to-date threat deterrence capability.

CASB

An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol — or, more often, its successor, the Transport Layer Security (TLS) protocol — in standard web browsers to provide secure, remote-access VPN capability.