1. Protect
Ongoing focus and innovation
on preventative measures;
block known attacks and
known malware
2. Detect
Comprehensive monitoring tools
to help you spot abnormalities
and respond to attacks faster
3. Respond
Leading response and recovery
technologies plus deep
consulting expertise
4. Isolate
Isolate OS components and
secrets; limit admin. privileges;
rigorously measure host health