Log In
Sign Up
Home
/
Find Controls
Log In
Sign Up
10
Controls Found
Search
Business Risk
Business Risk
Business Interruption
(
0
)
Financial Fraud
(
0
)
Loss of Sensitive Information
(
0
)
Regulatory Compliance
(
0
)
Reputation damage
(
0
)
Cyber Threat
Cyber Threats
Advanced persistent threat (apt)
(
0
)
Data exfiltration
(
0
)
Data interception
(
0
)
Data loss
(
0
)
Malware
(
0
)
Man-in-the-middle attacks
(
0
)
Non-compliance
(
0
)
Phishing
(
0
)
Polymorphic malware
(
0
)
Post-breach compromise
(
0
)
Ransomware
(
0
)
Social engineering
(
0
)
Spam
(
0
)
Spear phishing
(
0
)
Trojans
(
0
)
Unauthorized disclosure
(
0
)
Zero-day attacks
(
0
)
Solution Category
Solution Category
Threat reporting
(
0
)
User awareness
(
0
)
Forensics
(
0
)
Incident response
(
0
)
Machine learning
(
0
)
Secure communication
(
0
)
Encryption
(
0
)
Data Loss Prevention (DLP)
(
0
)
Sandboxing
(
0
)
Malware detection
(
0
)
Phishing detection
(
0
)
Spam filtering
(
0
)
Compliance management
(
0
)
Data archiving
(
0
)
Behavioral analysis
(
0
)
Threat intelligence
(
0
)
Email security
(
0
)
Function: Access Control
Function:Access Control
No
(
0
)
Yes
(
0
)
Function:Threat Protection
Function:Threat Protection
No
(
0
)
Yes
(
0
)
Function:Detect & Respond
Function:Detect & Respond
No
(
0
)
Yes
(
0
)
Cyber Event Mitigations
Cyber Events
Anthem 2015
(
0
)
Capital one 2019
(
0
)
Colonial Pipeline 2021
(
0
)
DNC Hack 2016
(
0
)
Equifax 2017
(
0
)
Home Depot 2014
(
0
)
Marriott 2018
(
0
)
None specific
(
0
)
Notpetya 2017
(
0
)
Solarwinds 2020
(
0
)
Sony pictures 2014
(
0
)
Target 2013
(
0
)
Twitter Bitcoin Scam 2020
(
0
)
Wannacry 2017
(
0
)
Yahoo 2013
(
0
)
Enforcement Point
Enforcement Point
Cloud services
(
0
)
Email client
(
0
)
Email gateway
(
0
)
Email servers
(
0
)
Endpoint
(
0
)
Security operations center (soc)
(
0
)
Source Context Data
Source Context Data
Behavioral analysis
(
0
)
Data classification
(
0
)
Email attachments
(
0
)
Email content
(
0
)
Email metadata
(
0
)
Encryption keys
(
0
)
File signatures
(
0
)
Ip blacklists
(
0
)
Metadata
(
0
)
Network traffic
(
0
)
Recipient identity
(
0
)
Retention policies
(
0
)
Sender information
(
0
)
Sender reputation
(
0
)
Threat indicators
(
0
)
Threat intelligence feeds
(
0
)
Url analysis
(
0
)
User actions
(
0
)
User behavior
(
0
)
User identity
(
0
)
User reports
(
0
)
NIST SP 800-53
NIST SP 800-53
Ac-2 account management
(
0
)
Ac-4 information flow enforcement
(
0
)
Ac-6 least privilege
(
0
)
At-2 security awareness and training
(
0
)
Au-11 audit record retention
(
0
)
Au-6 audit review, analysis, and reporting
(
0
)
Ir-4 incident handling
(
0
)
Ir-5 incident monitoring
(
0
)
Ir-6 incident reporting
(
0
)
Mp-6 media sanitization
(
0
)
Mp-7 media protection
(
0
)
Ra-3 risk assessment
(
0
)
Sc-13 cryptographic protection
(
0
)
Sc-28 protection of information at rest
(
0
)
Sc-8 transmission confidentiality and integrity
(
0
)
Si-12 information handling and retention
(
0
)
Si-3 malicious code protection
(
0
)
Si-4 system monitoring
(
0
)
Si-7 software, firmware, and information integrity
(
0
)
Si-8 spam protection
(
0
)
MITRE ATT&CK
MITRE ATT&CK
T1040 network sniffing
(
0
)
T1070 indicator removal on host
(
0
)
T1204 user execution
(
0
)
T1530 data from cloud storage
(
0
)
T1565 data manipulation
(
0
)
T1566 phishing
(
0
)
ISO/IEC 27001
ISO/IEC 27001
A.12.2.1 controls against malware
(
0
)
A.12.4.1 event logging
(
0
)
A.12.4.2 protection of log information
(
0
)
A.12.4.3 administrator and operator logs
(
0
)
A.12.6.1 management of technical vulnerabilities
(
0
)
A.13.2.3 electronic messaging
(
0
)
A.14.1.2 securing application services
(
0
)
A.16.1.1 responsibilities and procedures
(
0
)
A.16.1.4 assessment of and decision on information security events
(
0
)
A.16.1.5 response to information security incidents
(
0
)
A.18.1.3 records retention
(
0
)
A.18.1.4 privacy regulations
(
0
)
A.7.2.2 information security awareness
(
0
)
A.8.2.3 handling of assets
(
0
)
A.9.4.2 secure system access control
(
0
)
CMMC
CMMC
Ac.l2-3.1.2 access control
(
0
)
Ac.l2-3.1.3 access control
(
0
)
At.l2-3.2.3 awareness and training
(
0
)
Au.l2-3.3.2 audit and accountability
(
0
)
Au.l2-3.3.8 audit and accountability
(
0
)
Ir.l2-3.6.1 incident response
(
0
)
Mp.l2-3.8.1 media protection
(
0
)
Mp.l2-3.8.3 media protection
(
0
)
Ra.l2-3.11.2 risk assessment
(
0
)
Sc.l2-3.13.8 system and communications protection
(
0
)
Si.l2-3.14.1 system and information integrity
(
0
)
Si.l2-3.14.2 system and information integrity
(
0
)
Si.l2-3.14.4 system and information integrity
(
0
)
SOX
SOX
It general controls (itgc) - access controls
(
0
)
Itgc - access controls
(
0
)
Itgc - application controls
(
0
)
Itgc - compliance
(
0
)
Itgc - data management
(
0
)
Itgc - incident management
(
0
)
Itgc - monitoring
(
0
)
Itgc - risk assessment
(
0
)
Itgc - security
(
0
)
Itgc - training
(
0
)
PCI DSS
PCI DSS
10.1.1 anti-malware controls
(
0
)
10.2.1 logging and monitoring
(
0
)
11.2.1 vulnerability scan
(
0
)
12.2.1 employee training
(
0
)
12.3.1 information security policies
(
0
)
12.4.1 incident response plan
(
0
)
12.5.4 information retention
(
0
)
5.1.1 cryptographic protection
(
0
)
6.1.1 data classification
(
0
)
8.2.3 user identification and authentication
(
0
)
NERC
NERC
Cip-004-6 r4 personnel and training
(
0
)
Cip-007-6 r2 security patch management
(
0
)
Cip-007-6 r4 system security management
(
0
)
Cip-007-6 r5 account management
(
0
)
Cip-008-6 r1 incident response planning
(
0
)
Cip-009-6 r1 recovery plans
(
0
)
Cip-010-3 r1 configuration change management
(
0
)
Cip-011-2 r1 information protection
(
0
)
Cip-011-2 r2 information protection
(
0
)
HIPAA
HIPAA
164.308(a)(1)(ii)(d) security management process
(
0
)
164.308(a)(5)(ii)(a) security awareness
(
0
)
164.308(a)(5)(ii)(b) protection from malicious software
(
0
)
164.308(a)(6)(ii) response and reporting
(
0
)
164.308(a)(7)(ii)(a) contingency plan - data backup
(
0
)
164.312(a)(2)(iv) encryption and decryption
(
0
)
164.312(b) audit controls
(
0
)
164.312(e)(2)(ii) transmission security
(
0
)
164.316(b)(2)(i) documentation
(
0
)
FISMA
FISMA
Ac-2 account management
(
0
)
Ac-4 information flow enforcement
(
0
)
Ac-6 least privilege
(
0
)
At-2 security awareness and training
(
0
)
Au-11 audit record retention
(
0
)
Au-6 audit review, analysis, and reporting
(
0
)
Ir-4 incident handling
(
0
)
Ir-5 incident monitoring
(
0
)
Ir-6 incident reporting
(
0
)
Mp-6 media sanitization
(
0
)
Mp-7 media protection
(
0
)
Ra-3 risk assessment
(
0
)
Sc-13 cryptographic protection
(
0
)
Sc-28 protection of information at rest
(
0
)
Sc-8 transmission confidentiality and integrity
(
0
)
Si-12 information handling and retention
(
0
)
Si-3 malicious code protection
(
0
)
Si-4 system monitoring
(
0
)
Si-7 software, firmware, and information integrity
(
0
)
Si-8 spam protection
(
0
)
GLBA
GLBA
501.15(a)(1) information security procedures
(
0
)
501.15(a)(2)(iv) security awareness training
(
0
)
501.15(a)(4) data protection
(
0
)
501.15(a)(6) incident response
(
0
)
501.15(a)(7) monitoring
(
0
)
501.15(a)(8) record retention
(
0
)
501.16(b)(2) information handling
(
0
)
GDPR
GDPR
Article 30 records of processing
(
0
)
Article 32(1)(a) encryption
(
0
)
Article 32(1)(b) security of processing
(
0
)
Article 32(1)(d) technical measures
(
0
)
Article 32(2) risk assessment
(
0
)
Article 33(1) notification of a personal data breach
(
0
)
Article 34 communication of a personal data breach
(
0
)
Article 39(1)(b) staff training
(
0
)
Article 5(1)(f) integrity and confidentiality
(
0
)
CCPA
CCPA
1798.100(b) risk assessments
(
0
)
1798.105(d)(1) data retention
(
0
)
1798.150(a) security measures
(
0
)
1798.150(b) breach notification
(
0
)
Mitigation Method
Mitigation Method
Advanced threat detection
(
0
)
Archiving
(
0
)
Automated workflows
(
0
)
Behavioral analysis
(
0
)
Compliance management
(
0
)
Content analysis
(
0
)
Data Loss Prevention (DLP)
(
0
)
Email filtering
(
0
)
Email security
(
0
)
Encryption
(
0
)
Incident reporting
(
0
)
Incident response
(
0
)
Machine learning
(
0
)
Malware protection
(
0
)
Phishing protection
(
0
)
Phishing reporting
(
0
)
Sandboxing
(
0
)
Spam filtering
(
0
)
Threat intelligence
(
0
)
Threat remediation
(
0
)
User training
(
0
)
Business Risk Contributing Factors
Business Risk Contributing Factors
Advanced persistent threat (apt)
(
0
)
Business email compromise (bec)
(
0
)
Compliance violations
(
0
)
Confidentiality breach
(
0
)
Credential theft
(
0
)
Data breach
(
0
)
Data exfiltration
(
0
)
Data interception
(
0
)
Data retention risks
(
0
)
Delayed threat response
(
0
)
Financial Fraud
(
0
)
Human error
(
0
)
Incident escalation
(
0
)
Insider threats
(
0
)
Intellectual property loss
(
0
)
Legal risks
(
0
)
Malicious content exposure
(
0
)
Operational disruption
(
0
)
Productivity loss
(
0
)
Regulatory non-compliance
(
0
)
Reputation damage
(
0
)
Social engineering
(
0
)
System compromise
(
0
)
System overload
(
0
)
Zero-day exploits
(
0
)
Industry Standard Terms
Industry Standard Terms
Advanced persistent threat (apt)
(
0
)
Anti-malware
(
0
)
Anti-phishing
(
0
)
Anti-spam
(
0
)
Business email compromise (bec)
(
0
)
Data archiving
(
0
)
Data Loss Prevention (DLP)
(
0
)
Data protection
(
0
)
Domain-based message authentication, reporting, and conformance (dmarc)
(
0
)
Electronic discovery (ediscovery)
(
0
)
Email authentication
(
0
)
Email encryption
(
0
)
End-to-end encryption
(
0
)
Incident response
(
0
)
Insider threat management
(
0
)
Phishing simulation
(
0
)
Regulatory Compliance
(
0
)
Sandboxing
(
0
)
Secure email gateway (seg)
(
0
)
Security awareness training
(
0
)
Security orchestration, automation, and response (soar)
(
0
)
Social engineering
(
0
)
Threat intelligence
(
0
)
Threat reporting
(
0
)
Threat response
(
0
)
Transport layer security (tls)
(
0
)
User behavior analytics
(
0
)
Cyber Missions
Cyber Missions
Compliance assurance
(
0
)
Data governance
(
0
)
Data protection
(
0
)
Incident management
(
0
)
Incident reduction
(
0
)
Incident reporting
(
0
)
Operational efficiency
(
0
)
Operational resilience
(
0
)
Proactive defense
(
0
)
Risk management
(
0
)
Risk mitigation
(
0
)
Secure communication
(
0
)
Security awareness
(
0
)
System integrity
(
0
)
Threat mitigation
(
0
)
Threat prevention
(
0
)
User empowerment
(
0
)
User protection
(
0
)
Industry Analyst Firm Terms
Industry Analyst Firm Terms
Advanced threat protection
(
0
)
Anti-phishing
(
0
)
Continuous adaptive risk and trust assessment (carta)
(
0
)
Data Loss Prevention (DLP)
(
0
)
Email encryption
(
0
)
Forrester wave: data security platforms
(
0
)
Forrester wave: managed detection and response
(
0
)
Forrester wave: security awareness and training solutions
(
0
)
Gartner magic quadrant for email security platforms
(
0
)
Gartner market guide for email security
(
0
)
Human-centric security
(
0
)
Integrated cloud email security (ices)
(
0
)
Intelligent classification and protection
(
0
)
Intelligent compliance platform
(
0
)
Managed detection and response (mdr)
(
0
)
Modern compliance and archiving
(
0
)
Secure email gateway (seg)
(
0
)
Security awareness training
(
0
)
Threat response
(
0
)
Apply
Clear All
Controls
Sort by: Newest
Date: Oldest
Date: Newest
Email Security – Behavioral Analysis
Email Security – Archiving and Compliance
Email Security – Spam Filtering
Email Security – Phishing Protection
Email Security – Malware Protection
Email Security – Data Loss
Email Security – Encryption
Email Security – Advanced Threat Detection
Email Security – Response and Remediation
Email Security – Phishing Button
Insert/edit link
Close
Enter the destination URL
URL
Link Text
Open link in a new tab
Or link to existing content
Search
No search term specified. Showing recent items.
Search or use up and down arrow keys to select an item.
Cancel