PRIVILEGED IDENTITY/ACCESS MANAGEMENT (PIM/PAM) PATCH MANAGEMENT/DNS SECURITY/EDR/EMAIL SECURITY ADAPTIVE DECEPTION TECHNOLOGY / REAL TIME BREACH DETECTION & PREVENTION ROBOTIC PROCESS AUTOMATION (RPA) AUTOMATE MULTI-FACTOR AUTHENTICATION NETWORK MONITORING & MAPPING /PERFORMANCE & APPLICATION MONITORING /IT CAPACITY MONITORING THOR VIGILANT / ANTIVIRUS / ANTIMALWARE EMAIL ARCHIVAL – ON PREMISE USER BEHAVIOR ANALYSIS/EMPLOYEE MONITORING/INSIDER THREAT ANALYSIS THOR FORESIGHT / PATCH MANAGEMENT THOR ADMINPRIVILEGE / PRIVILEGE MANAGEMENT WORK FROM HOME / SECURE REMOTE ACCESS DISASTER RECOVERY / CLOUD BACKUP SECURE MANAGED FILE TRANSFER ENTERPRISE MOBILITY MANAGEMENT (EMM) /MOBILE DEVICE MANAGEMENT (MDM) ADAPTIVE DATA LOSS PREVENTION/END POINT PEOTECTION WORK FROM HOME /WORKSPACE VIRTUALIZATION / SECURE REMOTE ACCESS DIGITAL RISK PROTECTION CLASS ROOM MANAGEMENT/REMOTE CONTROL/HELPDESK & TICKETING/IT ASSET MANAGEMENT