- Managed Security Operations Centre (SOC) services
- IP honey-pot tracking of cyber threats and actors
- Physical site specific infrastructure
- Set of security rules to block or allow traffic
- Application awareness and control
- Integrated intrusion prevention
- Cloud-delivered threat intelligence.