Endpoint detection and response (EDR), user hardening, and secure usage.
Identity verification and access management
Phishing protection and secure communications
Threat detection and malware analysis
Credential hygiene and policy enforcement
Security awareness and safe behaviors