Endpoint detection and response: Proactively try to find new and not known cyberthreats with AI and device Discovering to observe gadgets for abnormal or suspicious activity, and initiate a response. Information encryption: Aid defend sensitive data by encrypting email messages and files making sure that only approved users can read https://www.nathanlabsadvisory.com/hitrust.html