text
stringlengths 16
120
|
|---|
<Access Control, alerts, Security Operations Center Monitoring>
|
<Backup and Recovery, analyzes, Access Control>
|
<Backup and Recovery, connectedTo, Insider Threat Detection>
|
<Firewall Configuration, advises, Security Patch Management>
|
<Incident Response, connectedTo, Risk Management Framework>
|
<Insider Threat Detection, connectedTo, Malware Analysis>
|
<Intrusion Prevention, implements, Threat Detection>
|
<Malware Analysis, connectedTo, Backup and Recovery>
|
<Risk Management Framework, connectedTo, Security Operations Center Monitoring>
|
<Risk Management Framework, protects, Insider Threat Detection>
|
<Security Operations Center Monitoring, optimizes, Firewall Configuration>
|
<Threat Detection, connectedTo, Incident Response>
|
<Automated Assembly, connectedTo, Batch Tracking>
|
<Batch Tracking, secures, Yield Optimization>
|
<Environmental Compliance, receives, Welding>
|
<Machine Calibration, connectedTo, Automated Assembly>
|
<Packaging, connectedTo, Parts Replacement>
|
<Predictive Maintenance, schedules, Work_in_Progress Monitoring>
|
<Raw Material, connectedTo, Machine Calibration>
|
<Tool Setup, innovates, Raw Material>
|
<Welding, analyzes, Tool Setup>
|
<Work_in_Progress Monitoring, molds, Environmental Compliance>
|
<Yield Optimization, connectedTo, Machine Calibration>
|
<Yield Optimization, optimizes, Packaging>
|
<Yield Optimization, processes, Predictive Maintenance>
|
<Application Security, connectedTo, Identity Management>
|
<DevSecOps Integration, incidents, Application Security>
|
<Disaster Recovery Planning, connectedTo, Firewall Configuration>
|
<Firewall Configuration, monitors, Risk Management Framework>
|
<Firewall Configuration, reports, Malware Analysis>
|
<Identity Management, isolates, Disaster Recovery Planning>
|
<Incident Response, patches, Antivirus Management>
|
<Malware Analysis, connectedTo, Incident Response>
|
<Risk Management Framework, connectedTo, Malware Analysis>
|
<Security Audit, encrypts, DevSecOps Integration>
|
<Application Security, connectedTo, Digital Forensics>
|
<Application Security, educates, Web Application Firewall Deployment>
|
<Digital Forensics, reports, Application Security>
|
<Endpoint Protection, analyzes, Security Awareness Training>
|
<Endpoint Protection, threatens, Security Patch Management>
|
<Malware Analysis, connectedTo, Network Security>
|
<Network Security, connectedTo, Endpoint Protection>
|
<Risk Management Framework, governs, Digital Forensics>
|
<Security Awareness Training, connectedTo, Security Patch Management>
|
<Security Patch Management, designs, Risk Management Framework>
|
<Web Application Firewall Deployment, connectedTo, Mobile Security>
|
<Access Control, connectedTo, Incident Response>
|
<Access Control, connectedTo, Security Policy Development>
|
<Antivirus Management, advises, User Training>
|
<Data Loss Prevention, connectedTo, Incident Response>
|
<Digital Forensics, mitigates, Security Operations Center Monitoring>
|
<Incident Response, blocks, Access Control>
|
<Incident Response, connectedTo, Security Policy Development>
|
<Network Security, prevents, Data Loss Prevention>
|
<Security Patch Management, scans, Digital Forensics>
|
<Security Policy Development, connectedTo, Security Patch Management>
|
<User Training, connectedTo, Network Security>
|
<Antivirus Management, connectedTo, Phishing Simulation>
|
<Application Security, updates, Security Awareness Training>
|
<Compliance Monitoring, connectedTo, Antivirus Management>
|
<Digital Forensics, authenticates, Phishing Simulation>
|
<Digital Forensics, connectedTo, Application Security>
|
<Disaster Recovery Planning, educates, Intrusion Prevention>
|
<Phishing Simulation, connectedTo, Disaster Recovery Planning>
|
<Security Awareness Training, designs, Compliance Monitoring>
|
<Cloud Security, connectedTo, Security Information and Event Management>
|
<Insider Threat Detection, analyzes, Intrusion Prevention>
|
<Intrusion Prevention, mitigates, Threat Intelligence Gathering>
|
<Malware Analysis, blocks, Network Security>
|
<Network Security, connectedTo, Phishing Simulation>
|
<Phishing Simulation, advises, Insider Threat Detection>
|
<Security Information and Event Management, vulnerabilities, Digital Forensics>
|
<Security Policy Development, connectedTo, Malware Analysis>
|
<Threat Intelligence Gathering, connectedTo, Cloud Security>
|
<Threat Intelligence Gathering, connectedTo, Digital Forensics>
|
<Data Loss Prevention, monitors, Security Operations Center Monitoring>
|
<Firewall Configuration, advises, Security Awareness Training>
|
<Identity Management, connectedTo, Intrusion Prevention>
|
<Identity Management, connectedTo, Security Information and Event Management>
|
<Intrusion Prevention, connectedTo, Data Loss Prevention>
|
<Penetration Testing, authorizes, Zero Trust Architecture>
|
<Risk Management Framework, connectedTo, Penetration Testing>
|
<Security Awareness Training, analyzes, Risk Management Framework>
|
<Security Information and Event Management, detects, IoT Security>
|
<Security Operations Center Monitoring, implements, Security Information and Event Management>
|
<Zero Trust Architecture, connectedTo, Identity Management>
|
<Access Control, connectedTo, Phishing Simulation>
|
<Antivirus Management, configures, Mobile Security>
|
<Compliance Monitoring, responds, Antivirus Management>
|
<Mobile Security, recovers, Security Awareness Training>
|
<Phishing Simulation, connectedTo, Compliance Monitoring>
|
<Physical Security Integration, authorizes, Security Operations Center Monitoring>
|
<Security Awareness Training, connectedTo, Access Control>
|
<Security Awareness Training, connectedTo, User Training>
|
<Security Operations Center Monitoring, designs, Access Control>
|
<Automated Vacuum Cleaning, connectedTo, Water Heater Control>
|
<Doorbell Camera Alert, connectedTo, Smoke Alarm Integration>
|
<Energy Monitoring, connectedTo, Automated Vacuum Cleaning>
|
<Geofencing Trigger, measures, Automated Vacuum Cleaning>
|
<Geofencing Trigger, optimizes, Guest Access Management>
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.