- Application Control
- Application Security Testing
- Authentication (User Authentication, Biometric Authentication and PKI)
- Behavior Analytics (User and Entity)
- Big Data Security
- Browser Security (Secure Virtual Browser and Remote Browser)
- Cloud Access Security Broker (CASB)
- Cloud Security
- Compliance Management
- Container Security
- Cyber Threat Hunting
- Data Discovery
- Data Loss (Leakage) Prevention (DLP)
- Data Masking
- Data Security
- Data-at-Rest Encryption
- Data-in-Motion/Transit (Network) Encryption and VPN
- Database Security
- DDoS Protection
- Deception-Based Security
- Digital Forensic Investigation and Computer Forensics
- Digital Risk Monitoring
- Endpoint Protection and Next-Gen Anti-virus
- Endpoint Threat Detection and Response
- File Content Security
- Firewall Configuration and Management
- Firewall Migrations
- Firewall Audits
- Firewall Optimization
- Fraud Prevention
- Governance/Compliance Management
- Hypervisor Security
- Identity and Access Management (IAM)
- Industrial Security (ICS/SCADA Security)
- Internet of Things (IoT) Security
- Intrusion Prevention Systems (and Intrusion Detection Systems)
- Malware Detection and Analysis
- Managed Security Service Providers
- Messaging Security
- Mobile Data Protection
- Mobile Device Management
- Network Access Control (NAC)
- Network Behavior Analysis and Anomaly Detection
- Network Firewall (includes Next Generation Firewalls)
- Network Monitoring and Forensics
- Password Manager
- Patch Configuration and Management
- Penetration Testing
- Pervasive Trust Services
- Risk and Compliance Management
- Risk and Vulnerability Assessment
- Secure Access Service Edge (SASE)
- Secure File Transfer
- Secure Web Gateway
- Security Configuration Management
- Security Incident Management and Response
- Security Information and Event Management (and Log Management)
- Security Operations Automation and Orchestration (SOAR)
- Security Ratings
- Security Training Software
- Specialized Threat Analysis and Protection
- SSL and Digital Certificate Authority and Management
- Threat Intelligence and Signature Feeds
- Transport Access Control
- Trusted Computing, Cross Domain Security and Multi Level Security
- Unified Threat Management
- Vulnerability Assessment
- Web Application Firewall
- Wireless Intrusion Detection System