Strengthen your security strategy


Use our comparison guide below to help you identify the defences you have in place and where you have opportunity to strengthen them.

Return to IT Priority

Access

Securing data access through managing identity and behaviour

Edge

Protecting the evolving boundaries of your organisation across devices, datacentres, and cloud

Operations

Ensuring governance through monitoring and policy management

Baseline Controls 

We think this is the minimum amount of security across access, edge and operations that your organisation needs to keep your data safe. We recommend considering implementing the following across each level of control.

Recommended Controls 

Building on the baseline, these controls are recommended for all organisations to provide proactive protection against more advanced attacks. This layer integrates public cloud. 

Advanced Controls

These controls provide optimal protection for organisations who pride themselves on security maturity, prioritising security excellence by finessing visibility and response rate. 

Access

Securing data access through managing identity and behaviour

Multi-Factor Authentication
Mobile Device Management
Encryption
Load Balancer

Edge

Protecting the evolving boundaries of your organisation across devices, datacentres, and cloud

Anti-Virus
Firewalls
Email Filtering
Web Filtering

Operations

Ensuring governance through monitoring and policy management

Network Monitoring
Creating Policy
OS Patching
Vulnerability Scanning

Access

Securing data access through managing identity and behaviour

Single Sign-On
Secure Workspace Collaboration
Network Access Controls
Cloud Access Security Brokers

Edge

Protecting the evolving boundaries of your organisation across devices, datacentres, and cloud

Next Gen Anti-Virus
Intrusion Prevention System
Sandboxing
Web Application Firewall

Operations

Ensuring governance through monitoring and policy management

SIEM
User Awareness
3rd Party Patching
Data Loss Prevention

Access

Securing data access through managing identity and behaviour

SD WAN
Micro Segmentation
Privilege Access Management
Identity and Access Management

Edge

Protecting the evolving boundaries of your organisation across devices, datacentres, and cloud

Endpoint Detection and Response
Distributed Denial Of Service

Operations

Ensuring governance through monitoring and policy management

Security Orchestration and Response
Multi-cloud Security Monitoring
User Entity Behaviour Analysis
Digital Risk Protection