- Data Discovery & Classification
- Data Use Insights
- Data Security Posture Management
- Data Encryption & Right Management
- Data Loss Prevention
- Database Management
- Data Protection
- Microsoft platform management
- Performance Monitoring
- Unified Endpoint Management
- Network Detection & Response (NDR)
- Network Intrusion Prevention
- Network Access Control
- Cyber Deception / Deception Technology
- Advanced Malware Analysis & APT Defense
- Secure Web Gateway
- Advanced Email Security
- Threat Prevention
- Anti-virus/Spam Email
- Adaptive Threat Protection
- Threat Intelligence Exchange
- Advanced threat detection & response
- Ransomware & APT Prevention
- Mobile Security
- Desktop Firewall
- Device Control
- Application Control
- Change control/integrity monitoring
- Policy Auditing
- Database Security
- Active Directory Security
- Identity Threat detection & Response
- Cloud Visibility & Monitoring
- Cloud Security Posture Management
- Cloud Workload Protection
- Cloud Detection & Response
- SASE & ZTNA
- Static Application Security Testing
- OpenSource & Binary Analysis
- Dynamic Application Security Testing
- Interactive Application Security Testing
- Fuzzing & Zeroday vuln Hunting
- Docker/Container & IaC Security
- AppSec Orchestration & Correlation (ASOC)
- Extended Detection & Response (XDR)
- Security information & Event Management
- Incident, Response & Forensic
- Security Orchestration Automation & Response
- Cyber Deception/ Deception Technology
- Cyber Threat Intelligence
- Privileged Access Management
- Cyber Security Awareness Training
- Third Party Security Assessment
- Attack Surface Intelligence
- Vulnerability Management
- Web Application Security Testing
- Exploitation & Validation (Pentest)
- Adversary Simulation & Red Team Operations
- Inventory & Visibility
- ZeroTrust Segmentation
- Threat Prevention
- Threat Hunting