• Cybersecurity technologies are divided into two levels: Level 1 includes the security technologies required as a foundation for a secure infrastructure, such as the following. * Firewall * Desktop Anti-Virus Tool * Secure Web Gateways * Messaging Security * Intrusion Detection/Prevention Systems * Encryption * Security Event Management Layer 2 security technologies such as those listed below are capable of detecting anomalous behavior in transit and at the host. As a rule, they are bought after a major hack. But before such a loss, more knowledgeable corporations are investing in these advanced technologies that go beyond traditional pattern matching and signatures for known attacks. They are capable of detecting anomalous behavior in transit and at the host. * Network Forensics * Desktop Forensics * Data Leak Protection * Behavioral Analysis * Security Information Channels