PRIVILEGED IDENTITY/ACCESS MANAGEMENT (PIM/PAM) DATA LOSS PREVENTION HARDWARE SECURITY MODULE /ENTERPRISE SECURE KEY MANAGER/ATALLA PAYMENT HSM CLOUD EMAIL SECURITY WEB APPLICATION FIREWALL ADAPTIVE DECEPTION TECHNOLOGY / REAL TIME BREACH DETECTION & PREVENTION NEXT GENERATION FIREWALL / ENDPOINT SECURITY PRIVILEGED IDENTITY MANAGEMENT ENTERPRISE CONTENT FIREWALL /FILE SYNC & SHARING & MOBILE COLLABORATION (EFSS) NETWORK MONITORING & MAPPING /PERFORMANCE & APPLICATION MONITORING /IT CAPACITY MONITORING ANTI-VIRUS / ANTI-MALWARE SOLUTION CYBERRANGE CYBERSECURITY TRAINING & SIMULATION PLATFORM NETWORKING ACCESS POINTS WEB VULNERABILITY ASSESSMENT /PENETRATION TESTING /INTEGRATED VULNERABILITY MANAGEMENT CENTRALIZED ALERTS & NOTIFICATIONS MANAGEMENT PLATFORM – OMNICHANNEL GATEWAY – MULTIFACTOR AUTHENTICATION FOR SECURED INFRASTRUCTURE & APPLICATION ACCESS DLP / ENDPOINT PROTECTION USER BEHAVIOR ANALYSIS/EMPLOYEE MONITORING/INSIDER THREAT ANALYSIS EMAIL ARCHIVAL – ON PREMISE IT AUDITING / RISK MITIGATION SECURE MANAGED FILE TRANSFER ROBOTIC PROCESS AUTOMATION (RPA) AUTOMATE DDOS PROTECTION MULTI-FACTOR AUTHENTICATION CLASS ROOM MANAGEMENT/REMOTE CONTROL/HELPDESK & TICKETING/IT ASSET MANAGEMENT HARDWARE ENCRYPTED USB DRIVES ENTERPRISE MOBILITY MANAGEMENT (EMM) /MOBILE DEVICE MANAGEMENT (MDM) PATCH MANAGEMENT/DNS SECURITY/EDR/EMAIL SECURITY NETWORK ACCESS CONTROL (NAC) THOR FORESIGHT / PATCH MANAGEMENT WORK FROM HOME /WORKSPACE VIRTUALIZATION / SECURE REMOTE ACCESS SMART ID/PKI /SSO/TWO-FACTOR AUTHENTICATION THOR VIGILANT / ANTIVIRUS / ANTIMALWARE THOR ADMINPRIVILEGE / PRIVILEGE MANAGEMENT