• Automated protection (shielding or full threat defense)• Mobile threat event collection• Connected to SIEM• Fraud management• Data privacy law enforcement