Protected links: Scan one-way links in e-mails and documents for destructive URLs, and block or replace them that has a Protected link. Endpoint detection and response: Proactively seek for new and unidentified cyberthreats with AI and equipment Studying to watch devices for abnormal or suspicious exercise, and initiate a response. https://www.nathanlabsadvisory.com/blog/nathan/the-top-benefits-of-using-ciso-as-a-service/