top of page

Episode 51: Subcategories of cyber

  • Writer: Embedded IT
    Embedded IT
  • Aug 4, 2025
  • 6 min read

Updated: 6 hours ago


This series was created with Joe Rose, a Senior Product Manager and Senior Security Architect, bringing practical, real-world security insight.


Cyber security can feel like a wall of acronyms and buzzwords, which makes it easy for people to nod along rather than ask questions. In this blog, cyber security is broken down into five practical categories that matter when organisations are buying technology: network security, endpoint security, identity and access management, data security, and cloud security.


The focus is on helping technology procurement teams understand what they are actually buying, how the pieces fit together, and where they need to probe for clarity rather than be blinded by jargon.


This overview builds on our introduction to cyber security, which sets the context for why these categories exist.


Why it helps to group cyber security into clear categories


To make sense of the many different tools and concepts in cyber security, the discussion groups them into five main areas:


  • Network security

  • Endpoint security

  • Identity and access management

  • Data security

  • Cloud security


Each category comes with its own products, services and risks. For procurement teams involved in IT procurement for hardware, software and services, having this structure makes it easier to ask sensible questions and compare options.


What network security covers in practice


Network security is mostly about tools and services that protect the organisation’s network from unwanted or malicious traffic.


A key building block is the firewall. It usually sits just behind the telecoms equipment at the network perimeter. A firewall:


  • Allows only trusted traffic into the network

  • Blocks suspicious or malicious connections

  • Acts like a secure access door for the organisation’s systems


Firewalls are also commonly used to host virtual private networks. When people connect from home, their traffic is encrypted through a VPN tunnel so it cannot easily be intercepted. From the user’s point of view this is now largely transparent, configured by IT without much choice at the endpoint.


More advanced network security stacks may also include:


  • Intrusion detection systems, which spot potential break-ins and raise an alarm

  • Intrusion prevention systems, which try to block malicious traffic in real time


All of these devices generate logs. Those logs are usually sent to a security incident and event management platform, or SIEM. This lets teams see events in time order, trace where an attacker came from, how they moved through the firewall, what rules they passed, and which machines or demilitarised zones they touched.


SIEM tools such as QRadar and Splunk have been around for decades. More recently, extended detection and response tools have appeared. XDR is often a SIEM enriched with extra data feeds, such as identity or user behaviour, and additional dashboards to make the information easier to understand.


For technology procurement teams, network security typically involves firewall hardware, associated software, monitoring platforms and the services required to implement and run them.


Endpoint security beyond antivirus


Endpoint security started life as antivirus on desktops and laptops, but now refers to any software agents installed on devices to improve security.


This can include:


  • Antivirus and anti-malware tools

  • Data loss prevention software

  • Controls on removable storage like USB drives


Data loss prevention is often rule based. It looks at what is leaving the network or device, and checks whether files, emails or transfers break company policy or regulatory rules. It can also block or monitor the use of removable storage, to stop people copying sensitive information onto a USB drive and walking out with it.


There are also legitimate cases where removable storage must be used, such as in defence environments or air-gapped networks. In those situations, tightly managed and trackable USB devices are used, with clear chain-of-custody between people and organisations.


Endpoints now go far beyond PCs and laptops. Mobile phones and tablets are critical endpoints in their own right. Two main categories of mobile security tools are highlighted:


  • Mobile device management, which controls device settings, installed applications and how the phone or tablet behaves

  • Mobile application management, which puts controls around specific apps such as Outlook, Teams, Slack or Google Workspace


The aim is to let people communicate and collaborate, while preventing company data, documents or screenshots being stored locally in an uncontrolled way or shared via personal apps like Gmail.


From a procurement point of view, endpoint security means considering the whole estate – desktops, laptops, mobiles, tablets and even operational technology – and understanding what tools are needed where.


Identity and access management and privileged access


Identity and access management is about making sure the person accessing a system is who they claim to be, and that they have the right level of access.


Active Directory, which arrived around the year 2000, became the central directory for users, computers and other devices. It made it easier to build a global directory service. However, in large organisations, particularly those that have grown through mergers and acquisitions, it is common to see dozens of separate Active Directory environments where different divisions wanted to control their own domain.


As software as a service has grown, single sign-on has become an important tool in identity management. Rather than creating a new username and password for every SaaS application, a user logs into their work laptop once and that credential is reused as proof of identity.

This:


  • Reduces friction for users juggling multiple tools

  • Avoids unmanaged local accounts in SaaS platforms

  • Improves attribution, because activity can be traced back to a known identity


Multifactor authentication adds further proof. Older RSA tokens on keyrings still exist in some places, but most organisations now use phone-based apps such as Okta Verify. These allow extra signals to be captured, such as device ID, GPS location or a Face ID challenge, which makes it much more likely that the right person is logging in.


This is important because internet traffic from home workers can appear to come from many different locations, depending on how internet service providers route connections. External IP addresses alone are no longer a reliable identity signal.


Privileged access management is another key part of identity and access. In the past, administrators often had always-on, high-privilege accounts that could reach everything all the time. In sensitive or highly regulated industries, that approach is no longer acceptable.


Privileged access management tools such as CyberArk, BeyondTrust or Delinea:


  • Allow temporary elevation of access to make a specific change

  • Drop privileges back to normal when the session ends

  • Support “four eyes” control, where a second person observes a sensitive change and can pause access


This is especially relevant for highly sensitive systems, such as monitoring platforms for critical national infrastructure.


Data security, GDPR and ownership


Data security is becoming more important as regulations tighten and organisations hold more personal and sensitive information.


Encryption and data loss prevention are part of the picture, but GDPR adds further responsibilities. The regulation unified multiple European country rules into a single framework and introduced clear roles, including data owner and data protection officer.


If nobody explicitly owns a dataset, the default position is often that the managing director is the de facto data owner for any data handled by that business unit.


Tools such as Varonis can help identify likely data owners by analysing who modifies documents most frequently. It is not an exact science, but it gives the data protection officer a shortlist of people to speak to when clarifying who is responsible for what.


For broader GDPR compliance, particularly around subject access requests and deletion requests, tools like those provided by OneTrust support the workflows. For example, if someone contacts an organisation saying “I believe you hold data about me”, the organisation has a set time window to respond and, where requested, delete the data.


From an IT procurement perspective, data security tools raise questions such as:


  • How many people need access to each tool

  • Whether licensing is based on users, functions or volume of data

  • How tools support different roles, from legal through to operations


These choices significantly affect both cost and fit.


Cloud security and vulnerability databases


Cloud security is described as one of the most complex and fast-moving categories. At its heart, it is about dealing with vulnerabilities that arise from missing patches or misconfigurations.

Each vulnerability is formally defined and given a CVE number – a common vulnerability enumeration. Databases of these vulnerabilities describe what the issue is, how severe it is, whether it can lead to data loss, how easy it is to exploit and whether an exploit already exists publicly.


Historically, the main CVE database has been managed in the United States. The conversation notes a recent turning point where a European CVE database has gone live, giving organisations in Europe another authoritative source of vulnerability information to draw on.


For organisations buying cloud security tools as part of technology procurement, the key is to understand how those tools identify vulnerabilities, how they use CVE data, and how they help teams assess risk and prioritise action.


What IT procurement teams should focus on


Across all five categories – network, endpoint, identity, data and cloud – a recurring theme is the importance of understanding terminology and being comfortable asking questions. Cyber security is full of acronyms, and it is easy for sales conversations to become opaque.


Procurement teams need advisers who are willing to demystify the language, explain how tools work together and give clear, practical answers rather than hiding behind jargon.


For organisations that want to make better cyber security decisions as part of their technology procurement, get in touch.


Continue exploring cyber security


bottom of page