text stringlengths 16 120 |
|---|
<Access Control, alerts, Security Operations Center Monitoring> |
<Backup and Recovery, analyzes, Access Control> |
<Backup and Recovery, connectedTo, Insider Threat Detection> |
<Firewall Configuration, advises, Security Patch Management> |
<Incident Response, connectedTo, Risk Management Framework> |
<Insider Threat Detection, connectedTo, Malware Analysis> |
<Intrusion Prevention, implements, Threat Detection> |
<Malware Analysis, connectedTo, Backup and Recovery> |
<Risk Management Framework, connectedTo, Security Operations Center Monitoring> |
<Risk Management Framework, protects, Insider Threat Detection> |
<Security Operations Center Monitoring, optimizes, Firewall Configuration> |
<Threat Detection, connectedTo, Incident Response> |
<Automated Assembly, connectedTo, Batch Tracking> |
<Batch Tracking, secures, Yield Optimization> |
<Environmental Compliance, receives, Welding> |
<Machine Calibration, connectedTo, Automated Assembly> |
<Packaging, connectedTo, Parts Replacement> |
<Predictive Maintenance, schedules, Work_in_Progress Monitoring> |
<Raw Material, connectedTo, Machine Calibration> |
<Tool Setup, innovates, Raw Material> |
<Welding, analyzes, Tool Setup> |
<Work_in_Progress Monitoring, molds, Environmental Compliance> |
<Yield Optimization, connectedTo, Machine Calibration> |
<Yield Optimization, optimizes, Packaging> |
<Yield Optimization, processes, Predictive Maintenance> |
<Application Security, connectedTo, Identity Management> |
<DevSecOps Integration, incidents, Application Security> |
<Disaster Recovery Planning, connectedTo, Firewall Configuration> |
<Firewall Configuration, monitors, Risk Management Framework> |
<Firewall Configuration, reports, Malware Analysis> |
<Identity Management, isolates, Disaster Recovery Planning> |
<Incident Response, patches, Antivirus Management> |
<Malware Analysis, connectedTo, Incident Response> |
<Risk Management Framework, connectedTo, Malware Analysis> |
<Security Audit, encrypts, DevSecOps Integration> |
<Application Security, connectedTo, Digital Forensics> |
<Application Security, educates, Web Application Firewall Deployment> |
<Digital Forensics, reports, Application Security> |
<Endpoint Protection, analyzes, Security Awareness Training> |
<Endpoint Protection, threatens, Security Patch Management> |
<Malware Analysis, connectedTo, Network Security> |
<Network Security, connectedTo, Endpoint Protection> |
<Risk Management Framework, governs, Digital Forensics> |
<Security Awareness Training, connectedTo, Security Patch Management> |
<Security Patch Management, designs, Risk Management Framework> |
<Web Application Firewall Deployment, connectedTo, Mobile Security> |
<Access Control, connectedTo, Incident Response> |
<Access Control, connectedTo, Security Policy Development> |
<Antivirus Management, advises, User Training> |
<Data Loss Prevention, connectedTo, Incident Response> |
<Digital Forensics, mitigates, Security Operations Center Monitoring> |
<Incident Response, blocks, Access Control> |
<Incident Response, connectedTo, Security Policy Development> |
<Network Security, prevents, Data Loss Prevention> |
<Security Patch Management, scans, Digital Forensics> |
<Security Policy Development, connectedTo, Security Patch Management> |
<User Training, connectedTo, Network Security> |
<Antivirus Management, connectedTo, Phishing Simulation> |
<Application Security, updates, Security Awareness Training> |
<Compliance Monitoring, connectedTo, Antivirus Management> |
<Digital Forensics, authenticates, Phishing Simulation> |
<Digital Forensics, connectedTo, Application Security> |
<Disaster Recovery Planning, educates, Intrusion Prevention> |
<Phishing Simulation, connectedTo, Disaster Recovery Planning> |
<Security Awareness Training, designs, Compliance Monitoring> |
<Cloud Security, connectedTo, Security Information and Event Management> |
<Insider Threat Detection, analyzes, Intrusion Prevention> |
<Intrusion Prevention, mitigates, Threat Intelligence Gathering> |
<Malware Analysis, blocks, Network Security> |
<Network Security, connectedTo, Phishing Simulation> |
<Phishing Simulation, advises, Insider Threat Detection> |
<Security Information and Event Management, vulnerabilities, Digital Forensics> |
<Security Policy Development, connectedTo, Malware Analysis> |
<Threat Intelligence Gathering, connectedTo, Cloud Security> |
<Threat Intelligence Gathering, connectedTo, Digital Forensics> |
<Data Loss Prevention, monitors, Security Operations Center Monitoring> |
<Firewall Configuration, advises, Security Awareness Training> |
<Identity Management, connectedTo, Intrusion Prevention> |
<Identity Management, connectedTo, Security Information and Event Management> |
<Intrusion Prevention, connectedTo, Data Loss Prevention> |
<Penetration Testing, authorizes, Zero Trust Architecture> |
<Risk Management Framework, connectedTo, Penetration Testing> |
<Security Awareness Training, analyzes, Risk Management Framework> |
<Security Information and Event Management, detects, IoT Security> |
<Security Operations Center Monitoring, implements, Security Information and Event Management> |
<Zero Trust Architecture, connectedTo, Identity Management> |
<Access Control, connectedTo, Phishing Simulation> |
<Antivirus Management, configures, Mobile Security> |
<Compliance Monitoring, responds, Antivirus Management> |
<Mobile Security, recovers, Security Awareness Training> |
<Phishing Simulation, connectedTo, Compliance Monitoring> |
<Physical Security Integration, authorizes, Security Operations Center Monitoring> |
<Security Awareness Training, connectedTo, Access Control> |
<Security Awareness Training, connectedTo, User Training> |
<Security Operations Center Monitoring, designs, Access Control> |
<Automated Vacuum Cleaning, connectedTo, Water Heater Control> |
<Doorbell Camera Alert, connectedTo, Smoke Alarm Integration> |
<Energy Monitoring, connectedTo, Automated Vacuum Cleaning> |
<Geofencing Trigger, measures, Automated Vacuum Cleaning> |
<Geofencing Trigger, optimizes, Guest Access Management> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.