Security as a service
Given the breadth of security controls available across multiple cloud vendors, the changing threat landscape, and the need to support modern and legacy workloads in the enterprise space, it can be difficult for organizations to provide those services internally.
Skytap works with a variety of Security-as-a-Service vendors who can manage your cloud workloads and who have expert knowledge in securing cloud workloads. These partners can supplement an organization’s internal security support team and should be considered as part of a wider cloud strategy.
| Vendor | Capabilities | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| A | B | C | D | E | F | G | H | I | J | K | |
| Meridian IT | √ | ||||||||||
| IBM | √ | ||||||||||
| HelpSystems |
Legend
| Key | Capability[^1] |
|---|---|
| A | Business continuity and disaster recovery (BCDR or BC/DR) |
| B | Continuous monitoring |
| C | Data loss prevention (DLP) |
| D | Email security |
| E | Encryption |
| F | Identity and access management (IAM) |
| G | Network security |
| H | Security assessment |
| I | Security information and event management (SIEM) |
| J | Vulnerability scanning |
| K | Web security |
