There are many different threats targeting many different areas of a corporate network. Have you ever wondered how those threats are stopped? What threats impact which areas of a network? What technology detects and blocks those threats? I wanted to build an interactive graphic to answer those questions.
This is a companion discussion topic for the original entry at https://blog.trendmicro.com/how-do-threats-align-with-detection-and-solutions/