Capture Threat Assessment User Guide
- Capture Threat Assessment
- Overview
- Generating CTA Reports
Exploits
Exploits are used by hackers to infect computers and signify one of the initial phases of a breach. Capture Threat Assessment can help you detect the exploitable vulnerabilities within your company that hackers target . It shows you how many applications are delivering exploits in your company and provides the average for your industry and for all organizations so you can compare.
You can also see the top exploits presented in list form.
Was This Article Helpful?
Help us to improve our support portal