Refers to the software and hardware employed in securing information technology data and systems from intrusion and attack. This can range from end-point or perimeter security to data centre protection, sometimes delivered by appliance, as well as access control and application-level security.