Endpoint detection and response: Proactively hunt for new and not known cyberthreats with AI and equipment Studying to monitor devices for uncommon or suspicious activity, and initiate a reaction. Protected attachments: Scan attachments for destructive content, and block or quarantine them if essential. Risk-free links: Scan back links in emails https://www.nathanlabsadvisory.com/open-source-scanning-oss.html