Detection, prevention, and removal based on behavior

Active data protection

Elimination of data-destructive attacks

Integration of data backup and recovery capabilities