Security Managment | HIPAA | PCI |
Check Point |
|||
Centralized Security Management |
![]() |
X | X | X | ||
(SIEM) Security Information & Event Management |
![]() |
![]() |
![]() |
Various | Various | Various |
Governance / Risk / Compliance |
![]() |
![]() |
![]() |
Various | Various | Various |
Network Controls | Cisco | Juniper |
Palo Alto |
|||
Data Loss Prevention |
![]() |
![]() |
X | X | X | |
Intrusion Protection |
![]() |
![]() |
![]() |
~ | ~ | ~ |
Mobile Access |
![]() |
![]() |
![]() |
~ | ~ | X |
Anti-bot |
![]() |
X | X | X | ||
Antivirus / Malware |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
URL Filtering / Application Control |
![]() |
~ | ~ |
![]() |
||
Firewall / VPN |
![]() |
![]() |
![]() |
![]() |
![]() |
X |
End Point Controls | Symantec | Trend | McAfee | |||
Full Disk Encryption |
![]() |
![]() |
![]() |
PGP |
![]() |
![]() |
Port Protection |
![]() |
![]() |
X | X | X | |
Media Encryption |
![]() |
![]() |
X | X | X | |
Antivirus / Malware |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Program Control |
![]() |
X | X | X | ||
Device Firewall |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |