• Perimeter Security (See More)
• Security in applications (WAF, DDoS)
• Double factor authentication
• Protection of endpoints
• Implementation of DLP tools
• Cloud Security
• Security of mobile devices
• Backup & Recovery (on-premise and cloud)
• Disaster Recovery Plan