With all the recent IT transformation, scaling and evolution to new “perimeters”, attack surfaces are expanding. At the same time, threats are becoming more sophisticated. An effective security strategy must consider everything from securing the supply chain and firmware to implementing threat detection and response for a comprehensive approach that secures the device both below and above the operating system. Machine Learning and AI are imbued into many security solutions to enhance the effectiveness in protecting critical environments.