Application Security ✔ ✔ ✔ Breach & Attack Simulation (BAS) ✔ ✔ ✔ ✔ Cloud Access Security Broker (CASB) ✔ ✔ ✔ Cloud Security (SaaS) ✔ ✔ ✔ Cloud Security (IaaS/PaaS) ✔ ✔ ✔ Container Security ✔ Data Access Governance ✔ ✔ Data Classification ✔ ✔ Data Loss Protection (DLP) ✔ ✔ ✔ Database Security ✔ ✔ DDoS ✔ ✔ ✔ Digital Rights Management (DRM) ✔ ✔ Email Security (SPAM, Malware, DLP, Phishing) ✔ ✔ ✔ Encryption & Key Management (HSM, PKI) ✔ ✔ Endpoint Security (EPP, EDR) ✔ ✔ ✔ ✔ File Security & Integrity Monitoring (FIM) ✔ ✔ Firewall Platforms (Enterprise) ✔ ✔ ✔ ✔ Firewall as a Service (FWaaS) ✔ ✔ ✔ ✔ Governance, Risk & Compliance (GRC, IRM) ✔ Identity & Access Management (IAM\IGA) ✔ ✔ ✔ IoT Security ✔ ✔ Isolation ✔ ✔ Malware Sandbox ✔ ✔ ✔ Micro‐Segmentation ✔ ✔ Mobile Security (MDM, MTD) ✔ ✔ ✔ Multi Factor Authentication (MFA) ✔ ✔ Network Access Control (NAC) ✔ ✔ ✔ Page 1 Technology Initiative Architecture Installation Partners Lifecycle Managed