Before, during and after: a security
framework
BEFORE DURING AFTER
Discover Detect Scope
Enforce Block Contain
Harden Defend Remediate
Network Endpoint Mobile Virtual Cloud
X
Threat Intelligence Point in Time Continuous
© 2016 Engage ESM All Rights Reserved 26