• Securing and responding to threats on endpoint devices.
  • Endpoint detection and response tools and techniques.