This domain focuses on executing operational tasks, including threat detection, incident response, disaster recovery, and preventative controls.
AI-Driven Security Operations Center (AISOC)
-
- Scoping of the Definition: The structural evolution of traditional internal Security Operations and outsourced Managed Detection and Response (MDR) services. It leverages artificial intelligence to automate complex triage, accelerate threat response times, and eradicate analyst alert fatigue by investigating 100% of alerts with extreme velocity.
-
- Definitional Technology, Feature, and Service Lines:
-
-
- Employs autonomous systems (autonomous SOC copilots) that function as tireless Tier 3 analysts.
- Utilizes multi-dimensional correlation frameworks to link disparate signals from cloud logs, identity providers, and network sensors into a cohesive, contextualized attack narrative.
- Enables the AI to take direct, automated action on the affected endpoint, reducing Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
-
Continuous Posture Management (CPM)
-
- Scoping of the Definition: An overarching, automated security strategy designed to continuously discover, assess, and manage the security and compliance state of an organization’s entire IT ecosystem (encompassing cloud infrastructure, SaaS applications, identity fabrics, and on-premises assets). It transitions security assessments from periodic, point-in-time audits to real-time visibility, enabling organizations to proactively identify vulnerabilities, misconfigurations, and compliance gaps the moment they emerge across a sprawling attack surface.
- Definitional Technology, Feature, and Service Lines: Relies on extensive API integrations and agentless scanning to aggregate telemetry across diverse environments. It incorporates automated asset discovery, continuous configuration auditing against established frameworks (e.g., NIST, CIS, GDPR), and dynamic risk prioritization based on asset criticality and threat context. These solutions act as an aggregation layer,often converging capabilities from CSPM (Cloud), SSPM (SaaS), and DSPM (Data), to feed normalized risk data and automated remediation triggers directly into SIEM, XDR, or IT Service Management (ITSM) platforms.
External Attack Surface Management (EASM)
-
- Scoping of the Definition: A discipline focused on continuously discovering, inventorying, and mapping all internet-facing assets owned by an organization, from the perspective of an attacker. EASM identifies security exposures that are unknown or poorly managed by internal teams, including misconfigured cloud services, exposed development portals, forgotten domains, and shadow IT infrastructure.
- Definitional Technology, Feature, and Service Lines: Passive and active reconnaissance (e.g., DNS queries, port scanning), continuous asset discovery (subdomains, cloud storage), attribution and ownership mapping, risk prioritization based on exploitability, and integration with threat intelligence platforms for real-time monitoring of attacker focus.
Insider Threat Detection
-
- Scoping of the Definition: A specialized security discipline and continuous monitoring strategy designed to identify, analyze, and mitigate risks originating from within an organization’s perimeter. This encompasses intentional sabotage or data theft by malicious insiders, inadvertent exposures by negligent employees, and actions taken via internally compromised accounts. The core objective is to protect intellectual property, physical assets, and IT infrastructure from trusted entities who abuse or mishandle their legitimate access.
- Definitional Technology, Feature, and Service Lines: Centered heavily around User and Entity Behavior Analytics (UEBA) to establish baseline activity patterns and detect behavioral anomalies. It incorporates endpoint monitoring, session recording, privileged access analytics, and continuous access log analysis. These solutions typically integrate closely with Identity and Access Management (IAM), Data Loss Prevention (DLP), and Security Information and Event Management (SIEM) platforms to correlate telemetry, provide forensic context, and orchestrate automated responses to suspicious internal activities.
Unified Agentic Defense Platforms (UADP)
-
- Scoping of the Definition: A novel, foundational security architecture engineered specifically for the age of artificial intelligence and autonomous agents. UADPs are comprehensive platforms that unify enterprise security by providing intelligent control, deep visibility, and continuous posture assessment for both underlying AI models and autonomous AI agents, as well as the high-volume data workflows they process. They shift the locus of security control from post-event log analysis to instantaneous, integrated runtime prevention.
-
- Definitional Technology, Feature, and Service Lines:
-
-
- Real-Time Behavioral Enforcement: Security controls operate instantaneously at the boundary layer, preventing critical data exposure the moment a malicious prompt is processed or a sensitive internal tool is invoked by a compromised agent.
- Intent-Aware Decision-Making: Evaluation policies use deep contextual signals to deduce what an AI agent or user is attempting to do, moving beyond simple scanning for sensitive data.
- Unified Visibility Across AI Surfaces: Consolidates continuous monitoring across standalone chat interfaces, embedded copilot extensions, and autonomous background agents into a single governance domain.
- Adaptive Policy Responses: Expands enforcement outcomes beyond binary allow/deny to include granular, context-driven actions like dynamic redaction, data masking, stepped-up authentication triggers, and immediate session termination.
- Incorporates agentic security analysts, often referred to as autonomous SOC copilots.
-
Security Data Pipeline Platforms (SDPP)
-
- Scoping of the Definition: A purpose-built, highly scalable system that acts as the central nervous system and control plane for the Security Operations Center (SOC). It ingests, normalizes, enriches, filters, and routes massive volumes of security telemetry across hybrid and cloud environments in real time. SDPPs sit logically beneath analytics engines, orchestrating the data flow before it reaches a detection platform.
- Definitional Technology, Feature, and Service Lines:
- Possesses native comprehension of complex security schema standards, including OCSF, ECS, ASIM, and UDM.
- Decouples telemetry sources from analytical destinations, altering SOC economics.
- Data Ingestion & Routing Layer: Handles schema drift, massive data bursts, and upstream network outages resiliently.
- In-Transit Processing Layer: Normalizes heterogeneous schemas on the fly, applies real-time threat intelligence enrichment, and aggressively filters out low-value noise data.
- Decoupled Destination Layer: Routes enriched, high-fidelity data simultaneously to multiple platforms (e.g., critical alerts to real-time SIEMs, bulk logs to cost-effective data lakes) based on security use cases and storage costs.
SaaS Security Posture Management (SSPM)
-
- Scoping of the Definition: A continuous, automated monitoring and remediation strategy dedicated to securing Software-as-a-Service (SaaS) environments (e.g., Microsoft 365, Salesforce, Google Workspace). It is engineered to identify security gaps, prevent configuration drift, ensure regulatory compliance, and mitigate risks associated with data sharing and risky third-party integrations. The core objective is to provide unified visibility and control over an organization’s decentralized, externally hosted application portfolio.
- Definitional Technology, Feature, and Service Lines: Relies heavily on deep API integrations with native SaaS platforms to conduct continuous posture assessments without requiring endpoint agents. It incorporates automated configuration auditing against industry benchmarks (such as CIS or SOC 2), identity and entitlement mapping to detect dormant or over-privileged accounts, and third-party application (OAuth) risk scoring. These solutions frequently feature automated remediation workflows and integrate directly with Security Information and Event Management (SIEM) or IT Service Management (ITSM) ticketing systems to streamline configuration corrections.
Security Orchestration, Automation, and Response (SOAR)
-
- Scoping of the Definition: A technology stack that allows organizations to collect security inputs from various sources (SIEM, XDR, threat intelligence) and define workflows (playbooks) to automate incident response and routine security tasks. SOAR integrates disparate security tools to streamline operations, reduce human intervention in repetitive tasks, and accelerate threat containment.
- Definitional Technology, Feature, and Service Lines: Automated playbook execution (e.g., isolating an infected host, blocking a malicious IP, enriching a threat alert), centralized case management, integration with ticketing systems (ITSM), and security tool orchestration across the enterprise.
Extended Detection and Response (XDR) / Next-Gen SIEM
-
- Scoping of the Definition: The evolution of the traditional Security Information and Event Management (SIEM) platform, XDR provides a unified, highly contextualized security incident response and threat detection platform. It ingests and correlates telemetry across traditional silos—endpoints (EDR), cloud workloads (CDR), identity (ITDR), and email—to create a complete, actionable attack narrative that accelerates threat analysis and response.
- Definitional Technology, Feature, and Service Lines: Automated incident prioritization, integrated forensic capabilities, multi-signal threat correlation, centralized query and search across all data sources, and automated response playbooks (SOAR integration).
Vulnerability Management (VM)
-
- Scoping of the Definition: The continuous process of identifying, classifying, prioritizing, and remediating software flaws and misconfigurations (vulnerabilities) across an organization’s IT assets, including network devices, operating systems, and applications. This foundational practice is distinct from the more strategic, contextualized view offered by Exposure Assessment Platforms (EAP).
- Definitional Technology, Feature, and Service Lines: Network-based vulnerability scanners (credentialed and non-credentialed), host-based agents for continuous monitoring, risk-based prioritization (linking CVSS scores with asset criticality and threat intelligence), and automated ticketing/patch management integrations.
Web Application and API Protection (WAAP)
-
- Scoping of the Definition: A converged platform protecting web applications and APIs from a wide array of attacks, including the OWASP Top 10, advanced botnets, and application-layer distributed denial-of-service (DDoS) attacks. WAAP provides continuous, application-layer inspection and policy enforcement, operating as the critical security control for external-facing digital experiences.
- Definitional Technology, Feature, and Service Lines: Includes traditional Web Application Firewall (WAF) functionality, API security discovery and enforcement, bot management, and L7 DDoS mitigation. Solutions are predominantly delivered as cloud-based services integrated with Content Delivery Networks (CDNs) or edge security platforms.