Research various security tools that an employee can use to keep his or her data safe or to thwart denial of service attacks.
Pick 1 and describe where it is installed and how it thwarts intrusions or attacks.
What types of threats does the tool mitigate?