Now that we know what the needs are, lets look at the threat landscape to decide how we can address those needs.
First, lets look at who is attacked? Well it’s clear from the many slices in this pie chart, everyone is attacked – retail, technology, internet, government. If you have a computer connected to the internet, it will eventually be attacked, and without some form of protection, likely compromised.