Network-Security

Network Firewall
A firewall is a security control that filters network traffic based on defined rules so unauthorized or unnecessary communication can be limited.
Web Application Firewall
A web application firewall inspects HTTP and HTTPS requests to help detect or block suspicious web traffic before it reaches an application.
Intrusion Detection System (IDS)
Monitors traffic or activity for suspicious patterns and generates alerts without necessarily blocking the activity.
Intrusion Prevention System (IPS)
Inspects traffic for suspicious patterns and can automatically block activity that matches prevention logic.
Virtual Private Network (VPN)
Creates protected connectivity between devices or networks over a less trusted path such as the public internet.
Zero Trust Network Access (ZTNA)
Provides narrower, identity-aware access to applications without assuming network location alone should grant trust.
Network Segmentation Strategy
Network segmentation divides networks into smaller zones so traffic can be controlled more tightly and security incidents are easier to contain.
Network Microsegmentation
Microsegmentation applies very granular traffic controls between workloads or services so access is limited to specific allowed communications.
Demilitarized Zone
A demilitarized zone is a network area used to place externally reachable services away from more sensitive internal systems.
Bastion Host Access
A bastion host is a specially hardened system used as a controlled access point into sensitive environments.
Deep Packet Inspection (DPI)
Deep packet inspection examines packet contents and metadata more closely than basic header-based traffic filtering.
Network Access Control
Network access control decides whether a user or device can join a network and what level of access it receives based on identity, posture, or policy.
Egress Filtering Controls
Egress filtering is the network-control practice of restricting which outbound connections internal systems or workloads are allowed to make.
East-West Traffic Flows
East-west traffic is network communication between internal systems, services, or workloads rather than traffic crossing into or out of the environment.
DNS Filtering for Domain Blocking
DNS filtering controls domain resolution so users and systems are blocked from reaching risky destinations.
Email Security Controls and Defenses
Controls that protect email systems, users, and workflows from fraud, malware, and data exposure.
DNSSEC for DNS Integrity
DNSSEC adds authenticity and integrity checks to DNS data so resolvers can detect tampering or spoofing.
Secure Shell (SSH)
SSH, or Secure Shell, is a protocol used to securely administer remote systems and move command-line traffic over an encrypted connection.
Full Packet Capture (FPC)
Full packet capture is the recording of complete network packets so teams can inspect the contents and context of network communication in detail.
Network Telemetry Data
Network telemetry is the operational data that describes network activity, health, communication patterns, and security-relevant traffic behavior.
Security Allowlist
An allowlist permits only explicitly approved users, devices, applications, addresses, or destinations and blocks everything else by default.
Security Denylist
A denylist blocks specified users, files, addresses, domains, or other items while leaving other activity permitted by default.
Man-in-the-Middle Attacks (MITM)
Interception attack where an attacker sits between parties to observe, alter, or relay traffic.
Email Authentication for Sender Trust
Controls that help mail systems verify whether a message came from an authorized sender.