Capture Threat Assessment User Guide
- Capture Threat Assessment
- Overview
- Generating CTA Reports
Vulnerable Applications
Vulnerabilities that affect applications are often exploited by hackers to infiltrate private networks. By logging and ranking traffic through these applications, you can also take steps to protect them. The Vulnerable applications are identified and charted. You can see how you do compared to the average value of companies in your industry and also compared to all organizations.
Was This Article Helpful?
Help us to improve our support portal