solutions
by service bundle
asset management
compliance management
posture detection
managed detection
extended detection
threat management
by service
all use cases
anomaly
denial of service (dos)
phishing
cloud security posture management (cspm)
application security (appsec)
vulnerability
asset management
network security posture management (nspm)
compliance
attack surface management (asm)
endpoint detection and response (edr)
fraud
by objective
control threats
manage risks
scale opportunities
FEATURED SOLUTION
Cyber Posture Management Bundle
learn more
platform
ecosystem
resources
insights
case studies
blog
about us
about human managed
security at human managed
press
solutions
by objective
control threats
manage risks
scale opportunities
by service bundle
asset management
compliance management
posture detection
managed detection
extended detection
threat management
by service
all services
anomaly
denial of service (dos)
phishing
cloud security posture management (cspm)
application security (appsec)
vulnerability
asset management
network security posture management (nspm)
compliance
attack surface management (asm)
endpoint detection and response (edr)
fraud
featured solutions
Cyber Posture Management Bundle
learn more
Link 2
platform
ecosystem
resources
insights
case studies
blog
about us
about human managed
security at human managed
press
solutions
services
A catalog of our most common services to control threats, scale opportunities, and manage risks.
Request a demo
service objective
manage risks
scale opportunities
control threats
service item
asset management
compliance management
posture detection
managed detection
extended detection
threat management
data source
Akamai
Amazon Web Services (AWS)
Apigee
Azure
BeyondTrust
Check Point
Checkmarx
Cisco
Cloudflare
CrowdStrike
Digital Ocean
DisruptOps
Dmarcian
Exabeam
Fiserv
Forcepoint
ForgeRock
Fortinet
GitLab
Github
Google Cloud Platform (GCP)
Google Workspace
Jira
Linux
Microsoft
Microsoft 365
Palo Alto Networks
PingSafe
Qualys
SailPoint
SentinelOne
Skybox
Snyk
Splunk
Sucuri
Tenable
Trellix
Wazuh
Wibmo
Zendesk
Zscaler
control threats
anomaly
Detection and resolution of abnormal behaviors in your environments.
control threats
denial of service (dos)
Detection and resolution of traffic patterns that affect your service quality or availability.
control threats
phishing
Detection and resolution of attempts to impersonate your internet-facing services.
control threats
cloud security posture management (cspm)
Detection and resolution of config violations on your cloud resources and services.
control threats
application security (appsec)
Detection and resolution of weaknesses in your code, package, and applications.
control threats
vulnerability
Detection and resolution of vulnerabilities in your assets.
manage risks
asset management
Continuous discovery and profiling of your business assets.
control threats
network security posture management (nspm)
Detection and resolution of config and rule violations on your network devices and firewalls.
manage risks
compliance
Discovery and resolution of non-compliance in your assets.
control threats
attack surface management (asm)
Discover and resolve your attack vectors.
control threats
endpoint detection and response (edr)
Detection and resolution of malware, compromises, and ransomware in your endpoints.
manage risks
fraud
Detect and resolve fraud patterns targeting your services.