This is a short description.
It includes:
a. Threat Intelligence
b. Malware Analysis
c. Data Loss Prevention
d. Compromise Assessment
e. End-Point Security
f. Data Sanitization