• Firewall Security Management
• Intrusion Detection/Prevention Systems
• Content Filtering
• Anti-Malware Management
• Secure Configurations
• Cloud Architecture security review
• Privacy & Data Protection
• Security Information and Event Monitoring
• Vulnerability Management
• Identity Management
• Access Management
• User Administration