Data Loss Prevention (DLP)
(DLP) makes sure that users do not send sensitive or critical information outside the corporate network. DLP Detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data from going outside the corporate network.
Information Rights Management (IRM)
Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access.
Web Application Firewall (WAF)
A WAF or web application firewall helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. is a specific form of application firewall that filters, monitors, and blocks HTTP traffic to and from a web service.
Static Application Security Testing (SAST)
Static Application Security Testing (SAST) or static code analysis detects application vulnerabilities by scanning the source code, byte code, or binaries of an application. Static Code Analyzer (SCA) uses multiple algorithms and an expansive knowledge base of secure coding rules to analyze an application’s source code for exploitable vulnerabilities.
Dynamic Application Security Testing (DAST)
A dynamic application security testing is a non-functional testing process where one can assess an application using certain techniques and the end result of such testing process covers security weaknesses and vulnerabilities present in an application. A dynamic application security testing (DAST) tool that identifies application vulnerabilities in deployed web applications and services.
Interactive Application Security Testing (IAST)
Interactive application security testing is a security testing method that detects software vulnerabilities by interaction with the program coupled with observation and sensors.
Runtime Application Self Protection (RAST)
Runtime application self-protection is a security technology that uses runtime instrumentation to detect and block computer attacks by taking advantage of information from inside the running software.
Application Programming Interface (API) Security
API security involves the implementation of strategies and procedures to mitigate the vulnerabilities and security threats of the API. Web API security entails authenticating programs or users who are invoking a web API. Along with the ease of API integrations come the difficulties of ensuring proper authentication and authorization.