Capture Threat Assessment User Guide

Vulnerable Applications

Vulnerabilities that affect applications are often exploited by hackers to infiltrate private networks. By logging and ranking traffic through these applications, you can also take steps to protect them. The Vulnerable applications are identified and charted. You can see how you do compared to the average value of companies in your industry and also compared to all organizations.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden