Multifactor authentication: Protect against unauthorized use of systems by necessitating users to offer multiple kind of authentication when signing in. Endpoint detection and response: Proactively hunt for new and mysterious cyberthreats with AI and machine Discovering to watch products for unusual or suspicious activity, and initiate a response. Automated assault https://www.nathanlabsadvisory.com/iso-iec-19770-1-2017-it-asset-management-system.html