How the UnderDefense Platform works Key components of breach avoidance machine: Detect - Protect-Respond-Recover