Statements (63)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Cloud_Computing_Service
|
gptkbp:aimsTo |
Cloud Applications
|
gptkbp:developedBy |
gptkb:Cisco_Systems
|
gptkbp:enables |
Secure Remote Access
|
gptkbp:enhances |
Network Security
|
gptkbp:features |
Real-time Monitoring
|
https://www.w3.org/2000/01/rdf-schema#label |
Cisco Cloud Security
|
gptkbp:includes |
User Behavior Analytics
Cloud Access Security Broker (CASB) |
gptkbp:integratesWith |
gptkb:Cisco_Umbrella
|
gptkbp:isAvailableIn |
Small Businesses
Multiple_Platforms |
gptkbp:isCompatibleWith |
Various Cloud Providers
Cloud-Native_Applications Third-Party_Security_Tools |
gptkbp:isDesignedFor |
Enterprises
Enhance Visibility Reduce Attack Surface |
gptkbp:isFocusedOn |
Threat Detection
User Privacy |
gptkbp:isIntegratedWith |
gptkb:Cisco_Talos
gptkb:Cisco_SecureX |
gptkbp:isPartOf |
gptkb:Cisco_Security_Portfolio
gptkb:Zero_Trust_Architecture Enterprise Security Strategy Digital_Transformation_Strategy |
gptkbp:isSuitableFor |
Growing Businesses
Cloud Traffic |
gptkbp:isUsedBy |
Government Agencies
Security Teams |
gptkbp:isUsedFor |
Risk Management
|
gptkbp:isUsedIn |
Healthcare_Sector
|
gptkbp:isUtilizedFor |
Financial Institutions
Data Protection Business Continuity Planning |
gptkbp:offers |
Data Encryption
Security Automation User Training Phishing Protection Advanced Threat Protection Customizable Security Policies Threat Hunting Services Secure Web Gateway Vulnerability_Management Incident_Response_Services |
gptkbp:offersPrograms |
Malware
|
gptkbp:provides |
Access Control
Incident Management Threat Intelligence Compliance Solutions Endpoint Security Security Analytics Web Filtering Security Orchestration Security Posture Assessment Threat Remediation |
gptkbp:supports |
Regulatory Compliance
Continuous Monitoring API Security Incident Response Planning Data Loss Prevention (DLP) Multi-Factor_Authentication_(MFA) |
gptkbp:utilizes |
Machine Learning
|