Capture Threat Assessment User Guide
- Capture Threat Assessment
- Overview
- Generating CTA Reports
Application Highlights
Applications can introduce different kinds of risk. These include:
- Delivering threats
- Potentially allowing data to leave the network
- Enabling unauthorized access
- Lowering productivity
- Consuming corporate bandwidth
The Application section provides visbility into the applications in use so you can compare the risk of their continued use to the business benefit.
Was This Article Helpful?
Help us to improve our support portal