1. Hosted e-mail security: Platform delivered through the cloud vs. an expensive on-site appliance.
2. Web/URL filtering: Blocks users from visiting malware-infected sites.
3. Reputation-based antivirus: Relies more on where malware comes from than on traditional signatures that flag already-known threats.
4. Patch and configuration management: Automates the updating of software to fill in security vulnerabilities that can be abused by attackers.
5. Web application vulnerability scanning: Looks through the web applications on a business site to find weaknesses through which the site can be infected.
6. Whole disk encryption: Protects lost laptops and devices from prying eyes, preventing costly data-breach notification procedures.
7. Web application firewalls: Filter out common attacks on an organization's vulnerable web applications.