-
Security Information and Event Management Tools;
-
Vulnerability Assessment Tools;
-
Pentesting tools;
-
Endpoint Detection and Response Tools;
-
Network Detection and Response Tools;
-
Email Security Tools;
-
Data Loss Prevention Tools;
-
Firewalls;
-
Privileged Access Management Tools.