1.
A system that monitors and controls incoming and outgoing network traffic.
2.
Software or hardware that detects unauthorized access or anomalies.
3.
A system that actively blocks detected threats.
4.
Software that detects and removes malicious software.
5.
A solution that collects and analyzes security data in real time.
6.
Tools that monitor end-user devices to detect and respond to threats.
7.
A service that encrypts your internet connection for privacy and security.
8.
Running untested or untrusted programs in isolation to prevent damage.
9.
A server that acts as an intermediary for requests from clients.
10.
A tool that captures and analyzes network traffic.
11.
A framework for managing digital keys and certificates.
12.
An international standard for information security management systems.