2 answers
2 answers
Updated
Vanitha’s Answer
The training tools can vary. But they mostly use - flash light, two-way radio for communication, first aid kit, small camera, Pepper spray for safety and Bullet proof vest.
Updated
Keyur’s Answer
I am in Cybersecurity, we use a lot of technology solutions. Cybersecurity is a broad domain and has multiple sub-domains, below are some examples:
1. Identity and Access Management (Provisioning, Single Sign On, Access Recertification, Identity lifecycle management): Okta, Ping, ForgeRock, IBM, Oracle, SailPoint, Saviynt, Microsoft
2. Privileged Access Management: CyberArk, Thycotic, Beyond Trust
3. Vulnerability Management: Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Nessus for network scans, Qualys, IBM App Scan, HP Fortify for code scanning for external and internal penetration testing. Lot of other VM and pen. testing tools are available.
4. Security Information and Event Management (SIEM): QRadar, Splunk, Google Chronicle, Azure Log Monitor
5. API Security: AWS API Gateway, IBM DataPower
6. Database Security - Encryption for Data at Rest, Data in Motion: IBM Guardium, IBM Optim for Data Masking and Obfuscation
7. Data Loss Prevention
8. Application Security: Salesforce Shield, etc.
9. Endpoint protection (Firewalls, etc.) - Palo Alto Networks, etc.
1. Identity and Access Management (Provisioning, Single Sign On, Access Recertification, Identity lifecycle management): Okta, Ping, ForgeRock, IBM, Oracle, SailPoint, Saviynt, Microsoft
2. Privileged Access Management: CyberArk, Thycotic, Beyond Trust
3. Vulnerability Management: Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Nessus for network scans, Qualys, IBM App Scan, HP Fortify for code scanning for external and internal penetration testing. Lot of other VM and pen. testing tools are available.
4. Security Information and Event Management (SIEM): QRadar, Splunk, Google Chronicle, Azure Log Monitor
5. API Security: AWS API Gateway, IBM DataPower
6. Database Security - Encryption for Data at Rest, Data in Motion: IBM Guardium, IBM Optim for Data Masking and Obfuscation
7. Data Loss Prevention
8. Application Security: Salesforce Shield, etc.
9. Endpoint protection (Firewalls, etc.) - Palo Alto Networks, etc.