* Mobile device and VPN (Virtual Private Network) connectivity
* Identification and computer awareness
* Providing internet access and filtering
* Monitoring and controlling an application
* Security threats and intrusion prevention
* Security measures to prevent data loss