1. Phen
  2. CanSecure
  3. Software product
  4. The vulnerability of the computer network
  5. Constant cybersecurity monitoring
  6. NeTERS
  7. Network traffic data
  8. Detection of out-of-profile traffic patterns
  9. Generation of network traffic data
  10. PHEN
  11. Transmission to gather analytics
  12. Automate diagnostics
  13. Monitoring of network traffic
  14. Automate mitigation solution
  15. Automate real-time messaging
  16. Reports regarding computer security.
  17. CCG
  18. Computer security consultancy