Describe current hardware and software based cybersecurity tools, tactics, and procedures.
Consider the hardware and software solutions deployed today in the context of Defense in Depth.
Elaborate on why these devices are not successful against the APTs,