persistent threat (APT), the network segregation, the application-to-application encryption, defense-in-depth and the network hardening; (4) define a clear set of controls including access control, monitoring
, LOCUS, LOOM, LPT, LQTY, LRC, LTO, LYXe, MASK, MBL, MBOX, MDX, META, METIS, MFT, MLN, MNW, MOB, MPL, MTL, MXC, NEBL, NEXO, NKN, OCEAN, OGN, ONE, ORC, PERP, PHA, PLA, POLS, POLY, POND, PORTO, POWR, PRO
, HUNT, ICP, ICX, IDEX, ILV, IMX, INJ, IOST, IOTX, IQ, IRIS, JOE, JST, KAI, KAVA, KDA, KEEP, KLAY, KLV, KMD, KNC, KP3R, LAZIO, LCX, LEO, LINA, LIT, LOOKS, LOOM, LPT, LRC, LSK, LTC, LUSD, MANA, MATIC, MBL
, LCX, LINA, LOCUS, LOOM, LPT, LQTY, LRC, LTO, LYXe, MASK, MBL, MBOX, MDX, META, METIS, MFT, MLN, MNW, MOB, MPL, MTL, MXC, NEBL, NEXO, NKN, OCEAN, OGN, ONE, ORC, PERP, PHA, PLA, POLS, POLY, POND, PORTO
, GXC, HAI, HARD, HDAO, HEGIC, HIVE, HNS, HNT, HOT, HPT, HT, ICX, IDEX, INJ, IOST, IOTX, IRIS, JST, KAI, KAVA, KCS, KDA, KEEP, KIN, KLV, KMD, KP3R, KRL, KSM, LINK, LOOM, LPT, LRC, LSK, LTC, LTO, LYXe
, HIVE, HNT, HT, HTR, HUM, HUNT, ICP, ICX, IDEX, ILV, INJ, IQ, IRIS, JST, KAVA, KCS, KDA, KEEP, KEY, KIN, KMD, KSM, LDO, LINA, LINK, LOOM, LPT, LQTY, LRC, LSK, LTC, LTO, LYXe, MANA, MAP, MAPS, MARO, MASK
, HIVE, HNT, HT, HTR, HUM, HUNT, ICP, ICX, IDEX, ILV, INJ, IQ, IRIS, JST, KAVA, KCS, KDA, KEEP, KEY, KIN, KMD, KSM, LDO, LINA, LINK, LOOM, LPT, LQTY, LRC, LSK, LTC, LTO, LYXe, MANA, MAP, MAPS, MARO, MASK
, HIVE, HNT, HT, HTR, HUM, HUNT, ICP, ICX, IDEX, ILV, INJ, IQ, IRIS, JST, KAVA, KCS, KDA, KEEP, KEY, KIN, KMD, KSM, LDO, LINA, LINK, LOOM, LPT, LQTY, LRC, LSK, LTC, LTO, LYXe, MANA, MAP, MAPS, MARO, MASK
, GXC, HAI, HARD, HDAO, HEGIC, HIVE, HNS, HNT, HOT, HPT, HT, ICX, IDEX, INJ, IOST, IOTX, IRIS, JST, KAI, KAVA, KCS, KDA, KEEP, KIN, KLV, KMD, KP3R, KRL, KSM, LINK, LOOM, LPT, LRC, LSK, LTC, LTO, LUNA
ลักษณะ DDoS (distributed denial of service) การป้องกันการบุกรุกจากโปรแกรมไม่ประสงค์ดี การป้องกันภัยคุกคามในรูปแบบใหม่ (advanced persistent threat) การแบ่งแยกเครือข่าย การเข้ารหัสระหว่างแอพพลิเคชั่น