MindMap Gallery SmarTech
Smart technology, often referred to as "smart tech," encompasses a wide range of devices, systems, and solutions that leverage advanced technologies to enhance functionality, automation, connectivity, and efficiency in various aspects of life. These technologies are designed to make everyday tasks easier, more convenient, and often more sustainable. Smart technology is commonly associated with the concept of the "Internet of Things" (IoT), where devices are connected to the internet and to each other, enabling them to collect and exchange data, and be controlled remotely.
Edited at 2022-04-15 22:19:45SmarTech-IT
Cyber Threat Intelligence
CTM360
Cyber Threat Intelligence
Brand Protection & Anti-Phising
AlienVault OTX
Cyber Threat Intelligence
Network Security
Intrusion Detection System
Snort [by Cisco]
Suricata-IDS
Intrusion Prevention System
Sagan
Suricata-IPS
Honeypots
Traptech
Honeypot Platform
TrapX Security
DeceptionGrid 7.3
Honeytokens
Canary Traps
Awareness Training
Hoxhunt
Phising Training
Hook Security
Automated Phishing Testing
Security Awareness Training
Other
Certifications
ISO/IEC 9001:2013
ISO/IEC 27001:2013
ISO/IEC 27017:2015
ISO/IEC 27018:2019
ISO/IEC 27701:2019
AICPA SOC 2
HITRUST
Cryptography
MS BitLocker
BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining or XTS mode with a 128-bit or 256-bit key.
Preboot Encryption of Physical Workstation
Preboot Encryption of Virtual Workstation
Postboot Workstation OS File System Encrytpion
Container
Removable Media Encryption
DLP Controls
Secure PIM (Priviledged Identity Management)
EDRM (Electronic Discovery Reference Model)
Penetration Testing
Penetration testing, also known as pen testing, means computer securities experts use to detect and take advantage of security vulnerabilities in a computer application. These experts, who are also known as white-hat hackers or ethical hackers, facilitate this by simulating real-world attacks by criminal hackers known as black-hat hackers. In effect, conducting penetration testing is similar to hiring security consultants to attempt a security attack of a secure facility to find out how real criminals might do it. The results are used by organizations to make their applications more secure. First, penetration testers must learn about the computer systems they will be attempting to breach. Then, they typically use a set of software tools to find vulnerabilities. Penetration testing may also involve social engineering hacking threats. Testers will try to gain access to a system by tricking a member of an organization into providing access. Penetration testers provide the results of their tests to the organization, which are then responsible for implementing changes that either resolve or mitigate the vulnerabilities.
Invicti
Discover & Crawl
Continuous Web Asset Discovery Engine Advanced Website Crawling Technologies Easy-to-Configure Authentication Flexible Deployment Options Comprehensive Scanning
Detect Vulnerabilities
Industry Leading Accuracy Detect More with IAST Scanning Software Composition Analysis Technology Version Tracking Advanced Manual Scanning Tools Out-of-Band Detection
Facilitate Remediation
Proof-based Scanning Detailed Scan Results Isolate Vulnerabilities Quickly and Accurately Vulnerability Trend Matrix Dashboards, Reporting, and Compliance
Wireshark
Wireshark is an award-winning network analyzer with 600 authors. With this software, you can quickly capture and interpret network packets. The tool is open-source and available for various systems, including Windows, Solaris, FreeBSD, and Linux.
Metasploitable
Metasploit is the most used penetration testing automation framework in the world. Metasploit helps professional teams verify and manage security assessments, improves awareness, and arms and empowers defenders to stay a step ahead in the game. It is useful for checking security and pinpointing flaws, setting up a defense. An Open source software, this tool will allow a network administrator to break in and identify fatal weak points. Beginner hackers use this tool to build their skills. The tool provides a way to replicates websites for social engineers.
Burp Suite
There are two different versions of the Burp Suite for developers. The free version provides the necessary and essential tools needed for scanning activities. Or, you can opt for the second version if you need advanced penetration testing. This tool is ideal for checking web-based applications. There are tools to map the tack surface and analyze requests between a browser and destination servers. The framework uses Web Penetration Testing on the Java platform and is an industry-standard tool used by the majority of information security professionals.
Kali Linux
Kali Linux advanced penetration testing software is a Linux distribution used for penetration testing. Many experts believe this is the best tool for both injecting and password snipping. However, you will need skills in both TCP/IP protocol to gain the most benefit. An open-source project, Kali Linux, provides tool listings, version tracking, and meta-packages.
Acunetix Scanner
Acutenix is an automated testing tool you can use to complete a penetration test. The tool is capable of auditing complicated management reports and issues with compliance. The software can handle a range of network vulnerabilities. Acunetix is even capable of including out-of-band vulnerabilities.
Vulnerability Management
Qualys
Cloud-Native
Cloud Apps
IT Security
Qualys VMDR
Qualys VMDR with Built-in Orchestration Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
Threat Protection
Industry-leading cloud service for taking full control of evolving threats and identifying what to remediate first
Patch Management
Qualys Patch Management is a cloud service that helps security and IT professionals efficiently remediate vulnerabilities and patch their systems.
Asset Management
Qualys Global AssetView
Knowing what’s on your global hybrid-IT environment is fundamental to security.
Cyber Security Asset Mgmt.
Qualys CyberSecurity Asset Management (CSAM) is asset management reimagined for security teams. With Qualys CSAM, organizations can continuously inventory assets, apply business criticality and risk context, detect security gaps like unauthorized or EOL software, and respond with appropriate actions to mitigate risk, thus reducing the ‘threat debt’.
Compliance
Policy Compliance
Security Config. Assessment
PCI ASV Compliance
File Integrity Monitoring
Security Assessment Questionnaire
Out-of-Band Configuration Assessment
Azure Sentinel
Cloud-Native
Azure Lighthouse
Azure Active Directory
SIEM
SOAR
UEBA
Threat Intelligence
Notebook (Threat Hunting)
Incident Response
Investigations
MS Defender
Defender for Enpoints
Defender for Clouds
Defender for Servers
Defender for Resource Manager
Defender for App Service
Defender for IoT
MS Data Loss Prevention
Technology Stack