Security as a Service
Given the breadth of security controls available across multiple cloud vendors, the changing threat landscape, and the need to support modern and legacy workloads in the enterprise space, it can be difficult for organizations to provide those services internally.
Skytap works with a variety of Security as a Service vendors who can manage your cloud workloads and who have expert knowledge in securing cloud workloads. These partners can supplement an organization’s internal security support team and should be considered as part of a wider cloud strategy.
Vendor | Capabilities | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
A | B | C | D | E | F | G | H | I | J | K | |
Meridian IT | ✔️ | ||||||||||
IBM | ✔️ | ||||||||||
HelpSystems |
Legend
Key | Capability1 |
---|---|
A | Business continuity and disaster recovery (BCDR or BC/DR) |
B | Continuous monitoring |
C | Data loss prevention (DLP) |
D | Email security |
E | Encryption |
F | Identity and access management (IAM) |
G | Network security |
H | Security assessment |
I | Security information and event management (SIEM) |
J | Vulnerability scanning |
K | Web security |
Next steps
Main Overview
Operational Excellence
Resiliency
Security
-
Cloud Security Alliance. ["Defined Categories of Security as a Service"]{.ul} (PDF). Cloud Security Alliance. Retrieved 5 June 2017. ↩