• Monitor, identify and correlate new threats and vulnerabilities.
• Prioritize the vulnerabilities, examine in more details, and assessment of potential risk
• Analyze in-depth to identify protection coverage
• Distributing new patches, filters or updates in host and across the network
• Communicate results in real-time to customers, through Security Advisories