Enhancing Cybersecurity: Top 10 Solutions for Protecting Your Business

Technology730 Views

In the fast-paced world of technology, safeguarding your digital assets and customer data is paramount. With cyber threats becoming increasingly sophisticated, businesses need robust cybersecurity measures now more than ever. In this article, we’ll delve into the top 10 cyber solutions that are revolutionizing the field of cybersecurity, equipping organizations with the tools they need to combat evolving threats effectively.

1. Sophos: Comprehensive Cybersecurity Suite

Sophos stands out as a leader in the cybersecurity realm, offering a comprehensive suite of solutions tailored to modern business needs. From next-generation firewalls to endpoint protection and email security, Sophos covers all bases. What sets Sophos apart is its synchronized security approach, ensuring seamless integration and swift threat response across all security components.

Sophos: Comprehensive Cybersecurity Suite isn’t just your average security software—it’s a formidable fortress guarding your digital kingdom! With its arsenal of cutting-edge tools and algorithms, Sophos offers a multi-layered defense system that shields your devices, networks, and data from a wide array of cyber threats.

Features That Make Sophos Stand Out

  • Next-Generation Firewall (NGFW): Bid farewell to outdated firewall technology! Sophos’ NGFW utilizes advanced techniques like deep packet inspection and intrusion prevention to keep malicious entities at bay.
  • Endpoint Protection: Your frontline defense against malware, ransomware, and other digital nasties! Sophos’ endpoint protection ensures that every device in your network is shielded from evolving cyber threats.
  • Email Security: Don’t let phishing emails sneak into your inbox! Sophos’ email security feature employs sophisticated algorithms to detect and neutralize phishing attempts before they can cause any harm.
  • Web Security: Surf the web with peace of mind! Sophos’ web security module blocks malicious websites and prevents users from accessing harmful content, ensuring a safe browsing experience for everyone.
  • Cloud Security: As businesses transition to the cloud, safeguarding cloud environments has become imperative. Sophos’ cloud security solutions provide comprehensive protection for cloud infrastructures, ensuring that your data remains secure, no matter where it resides.

In a world fraught with digital dangers, Sophos: Comprehensive Cybersecurity Suite emerges as a beacon of hope, offering unparalleled protection against cyber threats of all shapes and sizes. With its robust features, proactive approach to security, and unwavering commitment to customer satisfaction, Sophos stands as a formidable guardian of your digital realm. So why leave your digital assets vulnerable to cyber attacks? Embrace the power of Sophos today and fortify your defenses against the ever-evolving landscape of cyber threats!

2. IBM Security: Addressing Diverse Cybersecurity Challenges

IBM Security provides a suite of solutions designed to tackle a wide range of cybersecurity challenges. Leveraging advanced technologies such as threat intelligence, identity and access management, and incident response services, IBM equips businesses with the tools needed to detect and mitigate threats effectively. With expertise in artificial intelligence and machine learning, IBM’s solutions offer enhanced effectiveness in safeguarding critical assets.

Before delving into the intricacies of IBM Security’s approach, let’s first decipher what we mean by “cybersecurity challenges.” These hurdles encompass a broad spectrum of threats and vulnerabilities that jeopardize the confidentiality, integrity, and availability of digital information. From malicious hackers seeking unauthorized access to sensitive data to insidious malware infecting networks, the digital landscape is rife with peril. Here’s a glimpse into some of the key challenges:

1. Cyber Attacks: The Perpetual Threat

  • Cyber attacks come in various forms, including phishing, ransomware, and DDoS (Distributed Denial of Service) attacks.
  • These attacks target vulnerabilities in systems and exploit human errors to gain unauthorized access or disrupt operations.

2. Data Breaches: The Nightmare Unleashed

  • Data breaches entail the unauthorized access, theft, or exposure of confidential information, such as personal data or corporate secrets.
  • Breaches can have severe consequences, ranging from financial losses and reputational damage to legal repercussions.

3. Compliance and Regulations: Navigating the Legal Maze

  • Regulatory compliance mandates, such as GDPR (General Data Protection Regulation) and HIPAA (Health Insurance Portability and Accountability Act), impose stringent requirements on organizations to protect sensitive data.
  • Non-compliance can result in hefty fines, lawsuits, and tarnished reputations, underscoring the importance of robust cybersecurity measures.

Amidst this turbulent landscape, IBM Security emerges as a stalwart defender, armed with cutting-edge technologies and unparalleled expertise. Let’s explore how IBM Security addresses diverse cybersecurity challenges with finesse and ingenuity.

1. Proactive Threat Intelligence: Anticipating the Unseen

  • IBM Security leverages advanced threat intelligence capabilities to anticipate emerging cyber threats before they materialize.
  • By analyzing vast amounts of data and identifying patterns indicative of malicious activities, IBM Security empowers organizations to stay one step ahead of adversaries.

2. Adaptive Security Architecture: Fortifying the Digital Ramparts

  • Recognizing the dynamic nature of cyber threats, IBM Security advocates for an adaptive security architecture that can swiftly adapt to evolving challenges.
  • This approach entails deploying multi-layered defenses, including firewalls, intrusion detection systems, and encryption protocols, to fortify the digital ramparts against intruders.

3. Cognitive Security: Harnessing the Power of AI

  • At the forefront of IBM Security’s arsenal is cognitive security, which harnesses the power of artificial intelligence (AI) and machine learning to augment human capabilities.
  • By analyzing vast datasets and identifying anomalous behavior, cognitive security systems can detect and neutralize threats in real-time, mitigating potential damage.

As we navigate the treacherous waters of cyberspace, the importance of robust cybersecurity measures cannot be overstated. IBM Security’s relentless dedication to addressing diverse cybersecurity challenges serves as a beacon of hope in an increasingly perilous landscape. Through proactive threat intelligence, adaptive security architecture, and cognitive security capabilities, IBM Security empowers organizations to safeguard their digital assets and embark on a journey of innovation with confidence. Together, let us forge ahead into a future where digital innovation thrives, protected by the steadfast guardianship of IBM Security.

3. McAfee: Trusted Solutions for Endpoint and Data Security

McAfee has long been a trusted name in the cybersecurity industry, offering a plethora of solutions for endpoint security, cloud security, and data protection. Powered by advanced analytics and threat intelligence, McAfee’s products enable organizations to detect and respond to threats proactively, mitigating potential risks effectively.

In today’s interconnected digital landscape, ensuring the security of endpoints and sensitive data is paramount. With cyber threats evolving at a breakneck pace, individuals and organizations alike are seeking reliable solutions to fortify their defenses. Enter McAfee: Trusted Solutions for Endpoint and Data Security. With a legacy of innovation and a commitment to excellence, McAfee offers a comprehensive suite of tools designed to safeguard your digital realm from malicious actors and cyber attacks.

Understanding Endpoint and Data Security

Before delving into McAfee’s solutions, let’s first grasp the fundamentals of endpoint and data security.

  • Endpoint Security: Refers to the protection of devices or endpoints, such as computers, smartphones, and tablets, from cyber threats. Endpoint security aims to prevent unauthorized access, detect and respond to potential threats, and ensure compliance with security policies.
  • Data Security: Involves the protection of sensitive information from unauthorized access, theft, or corruption. This includes implementing encryption, access controls, and data loss prevention measures to safeguard valuable data assets.

Now, let’s embark on a journey through McAfee’s arsenal of trusted solutions, designed to address these critical security concerns.

McAfee understands the importance of securing endpoints against a myriad of cyber threats, ranging from malware and ransomware to advanced persistent threats (APTs). Let’s explore how McAfee’s offerings provide robust protection for endpoints.

1. McAfee Endpoint Security: Comprehensive Protection

McAfee Endpoint Security delivers a multi-layered defense mechanism, encompassing antivirus, firewall, intrusion prevention, and advanced threat detection capabilities. Key features include:

  • Real-time scanning and remediation of malware and suspicious files.
  • Behavioral analysis to identify and block emerging threats.
  • Centralized management console for streamlined administration and policy enforcement.

With McAfee Endpoint Security, you can proactively defend against known and unknown threats, ensuring the integrity of your endpoints.

2. McAfee Endpoint Encryption: Protecting Sensitive Data

In an era where data breaches are rampant, encrypting sensitive information is non-negotiable. McAfee Endpoint Encryption offers robust encryption algorithms to safeguard data at rest, in transit, and in use. Its features include:

  • Full disk encryption to protect the entire contents of a device.
  • File and folder encryption for granular control over sensitive data.
  • Integration with authentication mechanisms such as biometrics and smart cards for enhanced security.

By encrypting sensitive data, McAfee Endpoint Encryption mitigates the risk of unauthorized access and data theft, maintaining confidentiality and compliance.

McAfee’s Trusted Solutions: Safeguarding Data Assets

Data is the lifeblood of modern organizations, making its protection imperative. McAfee offers a suite of solutions tailored to safeguard data assets against evolving threats.

1. McAfee Data Loss Prevention (DLP): Preventing Data Leakage

McAfee DLP empowers organizations to monitor, control, and protect sensitive data across endpoints, networks, and cloud environments. Its capabilities include:

  • Content-aware scanning to identify and classify sensitive data.
  • Policy-based controls to prevent unauthorized transmission or sharing of sensitive information.
  • Integration with endpoint and network security solutions for comprehensive protection.

With McAfee DLP, organizations can mitigate the risk of data breaches and regulatory non-compliance, safeguarding their reputation and bottom line.

2. McAfee Total Protection for Data Loss Prevention: Comprehensive Data Security

For organizations seeking an all-encompassing solution, McAfee Total Protection for Data Loss Prevention offers a comprehensive suite of tools to secure sensitive data across the enterprise. Its features include:

  • Endpoint, network, and cloud DLP capabilities for unified data protection.
  • Advanced threat detection and response to combat insider threats and external attacks.
  • Centralized policy management and reporting for visibility and compliance.

With McAfee Total Protection for Data Loss Prevention, organizations can deploy a holistic data security strategy, mitigating risks and maintaining regulatory compliance.

4. Symantec (now part of Broadcom Inc.): Comprehensive Cybersecurity Portfolio

Symantec, now under Broadcom Inc., boasts a comprehensive range of cybersecurity solutions catering to businesses of all sizes. From endpoint protection to cloud security and data loss prevention, Symantec’s portfolio addresses various security needs. With its focus on safeguarding critical assets and defending against evolving threats, Symantec remains a key player in the cybersecurity landscape.

Symantec’s portfolio boasts a diverse array of solutions tailored to address the distinct challenges faced by organizations of all sizes and industries. From endpoint security and cloud protection to network defense and identity management, Symantec offers a holistic suite of products and services designed to mitigate risks and ensure peace of mind in an increasingly interconnected world.

Endpoint Security Excellence

In today’s landscape, endpoints serve as prime targets for cyber attacks. Symantec’s Endpoint Security solutions provide multi-layered protection against malware, ransomware, and other malicious threats, safeguarding devices and sensitive data alike. With features such as advanced threat detection, behavioral analysis, and endpoint detection and response (EDR) capabilities, organizations can proactively detect and neutralize threats before they wreak havoc.

Cutting-Edge Cloud Protection

As organizations embrace cloud computing for its scalability and efficiency, securing cloud environments becomes paramount. Symantec offers best-in-class Cloud Security solutions that enable organizations to securely adopt and leverage cloud services while maintaining compliance and data sovereignty. Whether it’s protecting cloud workloads, securing cloud applications, or ensuring cloud access control, Symantec empowers businesses to harness the full potential of the cloud without compromising security.

Robust Network Defense

In an era of cyber warfare, network security lies at the heart of any comprehensive cybersecurity strategy. Symantec’s Network Security solutions provide organizations with the tools and technologies needed to defend against and mitigate network-based threats. With features such as firewalls, intrusion prevention systems (IPS), and secure web gateways, Symantec empowers businesses to safeguard their networks from a wide range of cyber threats, including zero-day attacks and advanced persistent threats (APTs).

Identity Management Reinvented

Identity has emerged as the new perimeter in today’s digital landscape. Symantec’s Identity Security solutions enable organizations to securely manage and authenticate user identities across diverse environments, from on-premises systems to cloud-based applications. With features such as single sign-on (SSO), multi-factor authentication (MFA), and privileged access management (PAM), Symantec empowers organizations to enforce granular access controls and prevent unauthorized access to critical resources.

Unrivaled Expertise and Support

Beyond its cutting-edge technologies, Symantec distinguishes itself through its unrivaled expertise and dedicated support. With a team of seasoned cybersecurity professionals and a global network of partners, Symantec stands ready to assist organizations at every step of their cybersecurity journey. From risk assessments and security consultations to 24/7 technical support, Symantec ensures that its customers receive the guidance and assistance needed to navigate today’s complex threat landscape with confidence.

In conclusion, Symantec (now part of Broadcom Inc.) stands as your trusted cybersecurity partner, offering a comprehensive portfolio of solutions and services designed to protect against the most sophisticated cyber threats. With its unwavering commitment to innovation, expertise, and customer success, Symantec remains at the forefront of the cybersecurity industry, empowering organizations to embrace digital transformation while safeguarding their most valuable assets.

Whether you’re a small business looking to fortify your defenses or a large enterprise seeking to stay ahead of emerging threats, Symantec has the expertise and solutions to meet your cybersecurity needs. Partner with Symantec today and embark on a journey towards a safer, more secure digital future.

5. Fortinet: Specialized Network Security Solutions

Fortinet specializes in network security solutions, offering robust protection against cyber threats. Its FortiGate firewall appliances, FortiAnalyzer analytics platform, and FortiSIEM security information and event management system provide businesses with centralized monitoring and management capabilities, ensuring comprehensive security coverage.

Fortinet’s holistic approach to network security encompasses a comprehensive suite of solutions designed to address the diverse and complex challenges faced by modern enterprises. From firewalls and intrusion prevention systems (IPS) to secure web gateways and advanced threat protection, Fortinet offers a robust arsenal of tools to fortify your network infrastructure against an ever-expanding array of cyber threats.

At the heart of Fortinet’s success lies its relentless commitment to innovation and technological advancement. Leveraging state-of-the-art AI and machine learning algorithms, Fortinet’s security solutions empower organizations to proactively identify and mitigate cybersecurity threats in real-time, ensuring the continuous integrity and availability of their critical assets and data.

With over two decades of industry experience, Fortinet has established itself as a trusted partner for organizations seeking best-in-class network security solutions. Serving a diverse clientele ranging from small businesses to Fortune 500 enterprises, Fortinet’s track record of excellence speaks volumes about its unwavering dedication to customer satisfaction and operational excellence.

6. Cisco: Diverse Cybersecurity Offerings

Cisco boasts a wide range of cybersecurity solutions, including firewalls, intrusion prevention systems, and secure access solutions. With advanced threat detection and response capabilities, coupled with network visibility and secure cloud infrastructure, Cisco equips organizations with the tools needed to mitigate cyber risks effectively.

At the forefront of Cisco’s cybersecurity arsenal are its next-generation firewall (NGFW) solutions, engineered to provide advanced threat protection and secure network environments against a multitude of cyber threats. Leveraging industry-leading technology such as Cisco’s Firepower Threat Defense (FTD), these firewalls offer intrusion prevention, application visibility and control, and integrated threat intelligence for unparalleled security efficacy. With features like SSL decryption and sandboxing, Cisco’s NGFW solutions empower organizations to stay ahead of emerging threats and safeguard their digital assets with confidence.

Recognizing the critical importance of securing endpoints in today’s distributed work environments, Cisco delivers robust endpoint security platforms designed to thwart even the most sophisticated attacks. Powered by advanced machine learning algorithms and behavioral analytics, Cisco’s endpoint security solutions provide real-time threat detection and response capabilities, ensuring proactive defense against malware, ransomware, and zero-day exploits. By integrating seamlessly with Cisco’s broader security ecosystem, these platforms enable unified visibility and control across the entire attack surface, from endpoints to the network perimeter.

As organizations increasingly migrate their workloads to the cloud, Cisco remains at the forefront of cloud security innovation, offering a comprehensive suite of solutions to protect cloud-based assets and applications. From cloud access security brokers (CASBs) to secure web gateways (SWGs) and cloud workload protection platforms (CWPPs), Cisco’s cloud security portfolio addresses the unique challenges of securing data and applications in a cloud-native environment. With features like multi-cloud support, data loss prevention, and zero-trust security models, Cisco empowers organizations to embrace the cloud with confidence, knowing their digital assets are protected by industry-leading security measures.

 

7. Check Point Software Technologies: Comprehensive Suite of Products

Check Point Software Technologies is a global leader in cybersecurity solutions, offering a comprehensive suite of products ranging from network security to cloud security, mobile security, and endpoint security. Designed to protect businesses from advanced cyber threats, Check Point’s solutions provide centralized management and visibility, enabling organizations to stay ahead of potential security breaches.

Established in 1993, Check Point Software Technologies has been at the forefront of cybersecurity for over two decades. With a relentless commitment to excellence and a passion for innovation, Check Point has earned its reputation as a global leader in the industry. Trusted by organizations of all sizes, from small businesses to Fortune 500 enterprises, Check Point’s solutions have consistently delivered unparalleled security and peace of mind.

Comprehensive Suite of Products: Tailored Solutions for Every Need

1. Next-Generation Firewalls (NGFW)

At the heart of Check Point’s arsenal lies its Next-Generation Firewalls, engineered to provide advanced threat prevention across networks, endpoints, and the cloud. With cutting-edge technologies such as threat emulation, intrusion prevention, and URL filtering, Check Point’s NGFWs empower organizations to thwart even the most sophisticated cyber attacks with ease and confidence.

2. Endpoint Security

In an era defined by remote work and BYOD (Bring Your Own Device) policies, securing endpoints has become paramount. Check Point’s Endpoint Security solutions offer comprehensive protection for desktops, laptops, mobile devices, and virtual environments. From malware prevention to data loss prevention, Check Point safeguards endpoints against a myriad of threats, ensuring uninterrupted productivity and peace of mind.

3. Cloud Security

As businesses migrate their operations to the cloud, securing cloud environments has become a top priority. Check Point’s CloudGuard solutions provide holistic security for public, private, and hybrid cloud deployments. Leveraging advanced threat intelligence and automation, CloudGuard enables organizations to safeguard their cloud assets against emerging threats while ensuring compliance and scalability.

4. Threat Intelligence and Research

In the ever-evolving landscape of cybersecurity, knowledge is power. Recognizing this, Check Point invests heavily in threat intelligence and research, continuously monitoring global cyber threats and vulnerabilities. By leveraging this wealth of actionable insights, organizations can stay one step ahead of cyber adversaries, proactively mitigating risks and fortifying their defenses.

Unrivaled Performance: Why Choose Check Point?

1. Proactive Threat Prevention

Check Point’s proactive approach to threat prevention sets it apart from the competition. By leveraging real-time threat intelligence and advanced machine learning algorithms, Check Point identifies and neutralizes threats before they can inflict harm, ensuring uninterrupted business operations and peace of mind for customers.

2. Scalability and Flexibility

Whether you’re a small startup or a multinational corporation, Check Point’s solutions are designed to scale effortlessly with your business. With flexible deployment options and centralized management capabilities, Check Point empowers organizations to adapt to evolving security needs without compromising performance or efficiency.

3. Simplified Management and Compliance

Navigating the complex landscape of cybersecurity can be daunting, but Check Point simplifies the process with intuitive management interfaces and comprehensive compliance frameworks. From regulatory compliance to industry standards, Check Point equips organizations with the tools and guidance they need to achieve and maintain compliance effortlessly.

8. CrowdStrike: Cutting-Edge Endpoint Protection Platform

CrowdStrike is renowned for its cloud-native Falcon platform, which utilizes artificial intelligence and machine learning to detect and respond to threats in real-time. By offering comprehensive endpoint protection, CrowdStrike empowers organizations to safeguard against cyberattacks effectively, minimizing the risk of data breaches and system compromises.

At the heart of CrowdStrike’s prowess lies its unparalleled threat detection capabilities. Leveraging advanced machine learning algorithms and behavioral analysis, CrowdStrike Falcon, the company’s flagship product, detects and mitigates threats with lightning speed and precision. Unlike traditional signature-based approaches that lag behind in identifying emerging threats, CrowdStrike Falcon stays ahead of the curve, providing proactive protection against even the most sophisticated attacks.

Real-time Response and Remediation

In the face of a cyber incident, time is of the essence. CrowdStrike’s real-time response and remediation capabilities ensure that threats are swiftly neutralized, minimizing the impact on your organization’s operations. With Falcon’s endpoint detection and response (EDR) functionality, security teams gain granular visibility into endpoint activity, enabling them to investigate incidents comprehensively and take immediate action to contain and eradicate threats.

Cloud-native Architecture

CrowdStrike’s cloud-native architecture sets it apart from traditional endpoint security solutions. By harnessing the power of the cloud, CrowdStrike delivers seamless scalability and agility, allowing organizations to adapt to evolving security needs without the constraints of on-premises infrastructure. This cloud-first approach also facilitates rapid deployment and updates, ensuring that customers always have access to the latest features and threat intelligence.

Intelligence-driven Protection

In the cyber threat landscape, knowledge is power. CrowdStrike’s intelligence-driven approach empowers organizations to stay one step ahead of adversaries. Through its Falcon Intelligence platform, CrowdStrike provides actionable threat intelligence derived from extensive research and analysis of global cyber threats. This intelligence is seamlessly integrated into CrowdStrike Falcon, enhancing its detection and prevention capabilities and enabling customers to make informed decisions to protect their assets.

Seamless Integration and Orchestration

In today’s interconnected digital ecosystem, effective security requires more than just standalone solutions. CrowdStrike recognizes this reality and offers seamless integration and orchestration with a wide range of security tools and platforms. Whether it’s integrating with SIEM solutions for centralized security monitoring or orchestrating automated incident response workflows, CrowdStrike ensures that its products fit seamlessly into your existing security infrastructure, maximizing efficiency and efficacy.

Continuous Innovation

The cyber threat landscape is constantly evolving, and so is CrowdStrike. Through continuous innovation and research, CrowdStrike stays at the forefront of security technology, anticipating emerging threats and developing solutions to combat them effectively. From enhancing machine learning algorithms to pioneering new approaches in threat hunting and response, CrowdStrike remains committed to delivering the most advanced and effective security solutions to its customers.

9. Palo Alto Networks: Integrated Cybersecurity Platform

Palo Alto Networks provides an integrated platform offering next-generation firewall capabilities, advanced endpoint protection, cloud security, and threat intelligence. With Palo Alto Networks, businesses can secure their networks and endpoints from a wide range of cyber threats, ensuring comprehensive protection across all fronts.

At the heart of Palo Alto Networks’ approach lies an unwavering commitment to innovation and excellence in cybersecurity. Founded with a vision to redefine the security landscape, Palo Alto Networks has consistently delivered cutting-edge solutions that empower organizations to protect their digital assets effectively.

Unified Approach to Cybersecurity

Palo Alto Networks offers an integrated cybersecurity platform that seamlessly combines network security, cloud security, and endpoint protection into a unified architecture. This holistic approach enables organizations to simplify their security infrastructure while enhancing overall efficacy.

Next-Generation Firewall Technology

At the core of Palo Alto Networks’ offering is its Next-Generation Firewall (NGFW) technology, renowned for its superior threat prevention capabilities. By leveraging advanced machine learning and threat intelligence, Palo Alto Networks’ NGFW empowers organizations to detect and mitigate threats in real-time, thereby minimizing the risk of data breaches and cyberattacks.

Cloud Security Reinvented

Recognizing the shifting paradigm towards cloud-based environments, Palo Alto Networks has pioneered innovative cloud security solutions tailored to modern cloud architectures. From securing public clouds to enabling secure cloud adoption and workload protection, Palo Alto Networks ensures comprehensive cloud security across the entire cloud journey.

Endpoint Protection Redefined

In an era where endpoints are increasingly targeted by cybercriminals, Palo Alto Networks offers advanced endpoint protection solutions that go beyond traditional antivirus measures. Powered by AI-driven threat detection and behavioral analytics, Palo Alto Networks’ endpoint protection solutions provide unparalleled visibility and control, safeguarding endpoints from a myriad of threats.

10. Trellix: Intelligence-Driven Cybersecurity Solutions

Trellix offers a range of solutions designed to detect and prevent cyber threats effectively. Its intelligence-driven approach, coupled with cutting-edge technology, enables organizations to identify and respond to advanced attacks swiftly. With Trellix’s Mandiant services, businesses gain access to incident response, threat intelligence, and security assessments, further enhancing their cybersecurity posture.

In conclusion, prioritizing cybersecurity is non-negotiable in today’s digital landscape. The top 10 cyber solutions highlighted in this article offer cutting-edge technologies and services to help organizations defend against evolving cyber threats effectively. By adopting these solutions, businesses can bolster their security posture, safeguard sensitive data, and maintain customer trust in an increasingly interconnected world. Stay proactive, stay secure.

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *