Threat Protection Features

Threat Protection Features

Feature Description
Threat intelligence for malicious sitesUse 40 threat intelligence feeds to identify malicious sites that your employees may be visiting and block them. Threat intelligence is updated dynamically using multiple sources. You can also create your own threat list (e.g., URLs, hashes, etc.) using Threat Exchange.
Anomaly detectionIdentify and remediate anomalous user behavior such as compromised credentials, data exfiltration, insider threats, privileged account access abuse, and more.
Cloud malware protection and remediationDetect and block or quarantine infected files and replace with tombstone files. Remediation options include blocking and quarantining as well as analysis and response workflows. Layered detection approach includes static and heuristic analysis, machine learning, and sandboxing.
Share this Doc

Threat Protection Features

Or copy link

In this topic ...