Application and data security
End-point protections and mobile security
Monitoring of systems and users’ security
Managing vulnerabilities
Network and communication security
Authorization and access management