Prevent and mitigate attacks on technology threatened by outside sources and utilizing security monitoring and operations provided by vendor partners.