Hi. Can you share how you monitor threats and how do you assess it? We want our system to be secure all the time. I hope you can share what you use.