Endpoint Detection and Response (EDR) technology focused on delivering efficient endpoint monitoring, either if the endpoints are inside or outside your premises or network.
Network Intrusion Detection System (IDS) technology focused on delivering efficient network threat detection to monitor suspicious activities happening in your environment.
Asset Discovery and Vulnerability Management (VM) technologies focused on discovering the assets connected to your network and performing continuous vulnerability assessments.