Capture Threat Assessment User Guide
- Capture Threat Assessment
- Overview
- Generating CTA Reports
Glimpse of the Threats
Artificial intelligence is required to understand your risk exposure. This sections details the application exploits, spyware, adware, malware and unseen malware and, botnet activity observed on your network. Deep Packet Inspection takes the information collected and examines the next layers to find and track any threats that are actively trying to evade discovery.
In addition to seeing what is found on your network, bar graphs are used to compare your environment to the industry average and the average is for all organizations.
Was This Article Helpful?
Help us to improve our support portal