. . . "Rosenberg noted that the system actively monitors different types of data associated with the respective owners of that data, and any data deemed to be at risk is then captured or quarantined to prevent an intrusion from advancing to the next level." .