
- Email security – remove the risk of these threats being impactful as soon as a signature is available.
- Web security – remove the risk of these threats as sites are classified and as soon as signatures are available.
- Advanced firewall – block outbound traffic, inbound patterns, or other signatures from application aware firewalls.
- Least privilege – remove the rights of applications and users to install/update system files because they will have not come from a trusted source.
- Integrity monitoring – block or notice changes to critical files that could indicate a compromised system.