(1) Security Operation Center (SOC) (2) Log Point - SIEM (Security information and event management) (3) Log Point - SOAR (Security Orchestration, Automation and Response) (4) Go Secure - Manage detect and response (MDR) (5) Web Iq - Dark Web monitoring (6) Feitian - FIDO2 Compliant USB Security Keys (7) Ciptor - identity access management