Defense-in-Depth Model: The defense-in-depth model supplies a far more extensive approach to risk evaluation by stacking many levels of safety mechanisms and conducting standard hazard assessments. • Seize and reporting of software availability metrics. • Coordinating, planning and carrying out software deployments • Development of automated application deployment scripts • https://enterprise-firewall-solut00998.blogscribble.com/37157526/getting-my-enterprise-firewall-solutions-in-cyber-city-gurugram-to-work