Blocks unauthorized access to the network.
Allows legitimate traffic based on security rules.
Can prevent cyberattacks by filtering malicious traffic.
Antivirus/anti-malware protection
Firewall (host-based)
Data encryption
Device control and monitoring
Endpoint Detection & Response (EDR)