Remote interviews of partner (phone, webinar, etc.)
|
|
|
|
|
|
|
|
On-site visits to partner facilities
|
|
|
|
|
|
|
|
Encrypted Communications
|
|
|
|
|
|
|
|
Firewall Isolated Networks
|
|
|
|
|
|
|
|
Multifactor authentication
|
|
|
|
|
|
|
|
User activity real-time monitoring (IDS, UBA, etc.)
|
|
|
|
|
|
|
|
Custom application protection (e.g. WAF, CASB, etc.)
|
|
|
|
|
|
|
|
Custom data protection (e.g. DLP, DRM, etc.)
|
|
|
|
|
|
|
|
Emulation, virtualization, containerization, etc.
|
|
|
|
|
|
|
|
3rd party online scoring service
|
|
|
|
|
|
|
|