Retrouvez sur cette page « glossaire de la cybersécurité » tous les termes liés aux produits SEKOIA.IO et à l’industrie de la cybersécurité.| Sekoia.io
Un SOC (Security Operations Center) est une organisation qui déploie les opérations de sécurité d’une organisation contre les cyberattaques.| Sekoia.io
RaaS is a software developed by cybercriminals that allows people to launch ransomware attacks without having any particular coding skills.| Sekoia.io
APT (Advanced Persistent Threat) is a sophisticated attack on an organization that can take months to identify and remove.| Sekoia.io
Learn about zero-day vulnerability, how they work, and why they pose a critical risk to cybersecurity. Essential insights.| Sekoia.io
Security Orchestration Automation and Response system covers three major functions: response, orchestration and automation of IT security.| Sekoia.io
Open XDR architecture is a framework designed to improve threat detection and incident response across an organization's entire IT ecosystem| Sekoia.io
MSSP is a third-party service provider or supplier that offers computer security services to a client company on a subscription basis.| Sekoia.io
Explore XDR, a powerful cybersecurity solution that offers advanced threat detection, AI-driven response and enhanced incident response.| Sekoia.io
EDR (Endpoint Detection and Response) is a security solution to detect and remedy cyber threats targeting endpoints (computer, server).| Sekoia.io
Discover what SIEM is, how it works, and its benefits. Learn best practices and future trends in SIEM for enhancing security.| Sekoia.io
With our Cyber threat intelligence tool, you can ensure the security of your environments by controlling threats and adversaries targeting your organization.| Sekoia.io
The primary mission of a CERT is to contain computer security incidents, minimize their impact on the organization's operations and reputation| Sekoia.io
STIX is an open standard describing objects of interest in the field of defensive computer warfare, and the links they can maintain between them.| Sekoia.io
Within our SOC platform, cyber threat detection is one of the core elements of our approach. Discover our solution.| Sekoia.io
On SEKOIA.IO, automate through a soar software integrated on our SOC platform, incident responses without human intervention, before impact.| Sekoia.io
On our open XDR platform, you can interconnect all your security solutions without constraint. Discover our catalog of integrations.| Sekoia.io
Cyber Threat Intelligence (CTI) defines cyber threat research, analysis and modeling. It'is used to prevent and detect computer attacks.| Sekoia.io
Security Operations Center is an organizational structure dedicated to the implementation of an organization's security against cyberattacks| Sekoia.io
Get the power of a next-generation SIEM tool that can escalate events, detect anomalies and automate incident responses.| Sekoia.io
We provide cyber teams a turnkey cyber SOC to detect and respond to incidents, regardless of the attack surface.| Sekoia.io
Our XDR platform allows you to secure your environments from a single platform. It is suitable for both managers and security teams.| Sekoia.io
Sekoia.io provides cyber teams with a SOC platform that can respond to security incidents, regardless of the attack surface.| Sekoia.io
Indicator of compromise is qualified technical data that makes it possible to detect malicious activities on an information system.| Sekoia.io
Would you like to discover SEKOIA.IO SOC platform? Fill out this form and an advisor will get in touch with you shortly.| Sekoia.io