Page 23 - CSEW
P. 23

Before, during and after: a security

      framework












                               BEFORE                                  DURING                                   AFTER
                               Discover                                 Detect                                   Scope
                               Enforce                                   Block                                  Contain
                               Harden                                   Defend                                Remediate











                              Network            Endpoint             Mobile             Virtual            Cloud


                                                                        X
                                Threat Intelligence             Point in Time           Continuous





      © 2016 Engage ESM All Rights Reserved                                                                                             26
   18   19   20   21   22   23   24   25   26   27   28