You are meeting with a financial customer who is concerned about Internet worms, viruses, and other threats. A worm or virus would cost millions of dollars in lost productivity, and malware or spyware could result in information theft. How should you position Anti.X defenses with this customer?
A.
Anti.X defenses intelligently analyze network payload so that application security tools can control port 80 misuse by rogue applications.
B.
Anti.X defenses provide broad attack.mitigation capabilities and distribute defenses throughout the network, including to critical system endpoints.
C.
Anti.X defenses enable proactive response to threats by aggregating and correlating security information.
D.
Anti.X defenses render malware and spyware harmless by managing patches more proactively.