• Ackworth, IA
  • United States
  • CISO Platform
Share on Facebook

Denise's Page

Profile Information

CISO Platform
Community Manager

Denise's Blog

Key Program Metrics of Network Advanced Threat Protection

Posted on November 29, 2019 at 4:30pm 0 Comments

Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.

Advance threat protection is not about a single security solution, It is about a combination of security…


Key Program Metrics Of Next Generation Firewall (NGFW)

Posted on November 29, 2019 at 4:30pm 0 Comments

A Next-Generation Firewall (NGFW) is an integrated network platform that combines a traditional firewall with application specific granular controls to help them detect application specific attacks. They help detect attacks through application specific protocols such as HTTP, HTTPS, SMTP and so on. It also incorporates various network device filtering functionalities such as an intrusion prevention system (IPS), Web filtering and Email security. They also features functionalities such…


Key Program Metrics of Security Operations, Analysis and Reporting (SOAR)

Posted on November 29, 2019 at 4:30pm 0 Comments

Security Operations, Analysis and Reporting (SOAR) technologies support workflow management and automation by enabling the security operations teams to automate and prioritize activities for good business decision making.

Key Program Metrics:

1.Current Anti-Malware Coverage :

The goal of this metric is to provide an indicator of the…


Key Program Metrics of Distributed denial-of-service (DDoS)

Posted on November 29, 2019 at 4:00pm 0 Comments

Distributed denial-of-service (DDoS) attack is one in which a multiple sources attack a single target causing denial of service for legitimate users of the targeted system. The flood of incoming traffic totally overwhelms the system, hence denying service to legitimate users.

Key Program Metrics:

Loss percentage :

number of…


Comment Wall

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

  • No comments yet!

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service