This is an example of defence in depth and is an added layer of protection against attackers. It is typically run on servers, identifying and blocking attempts of intrusion that have managed to get through the firewall.
Cyber Essentials Scheme Cyber Resilience Cyber Risk Firewall & Network Security Industry & Updates Phishing & Security Awareness Training Technical Vulnerability Management