- Next generation endpoint techniques
- Virtualization and isolation
- Browser protection
- Network protection
- Integrating endpoint and network protection
- Gathering and analyzing security data in a data lake
- User behavior analysis
- Cloud security
- The security horizon with blockchain and quantum computing