Though Armis’ remote access capabilities were highly secure, multiple solutions were involved in delivering a less than optimal user experience. Similarly, though appropriate monitoring controls were implemented to identify insider and external threat events, the process to respond to such an event was not as real-time as desired.