theprotectionof IT assets in general (endpoints, infrastructure, network, applications, cloud environments, Microsoft 365, data,...