Scans and removes malicious software.
Monitors incoming and outgoing network traffic.
Identifies and blocks suspicious behavior.
Ensures data is unreadable if intercepted.
Manages use of USBs and other external devices.
Ensures all systems are updated with latest security patches.