web-traffic (Web Gateway)
endpoints (Endpoint Security)
data and their encryption (DLP/Encryption)
servers (Server Security)
cloud services (Cloud Security)
for detection and elimination
Sandbox (Dynamic Sandbox Execution)
Lures (traps) for criminals (Honeypot, Honeynet)
Detection and management of vulnerabilities (Vulnerability Management)
Endpoint detection
(Endpoint Detect and Response, EDR)
Incident management
(Security Information and Event Management, Security Orchestration, Automation and Response)