Purchase Of Ips, Ids, Post-Intrusion Analysis Software Licenses And A Central Password Manager Along With The Implementation Service