- Compliance Monitoring
- Threat Detection & Identification
- Application Status Monitoring
- Auditing
- Malicious/Unauthorized Activity Monitoring
- Indicators of Compromise Detection
- Malware Information Sharing Program
- GAP Analysis
- Network & Critical Services Analysis
- Forensics Support