Capture Threat Assessment User Guide

Application Highlights

Applications can introduce different kinds of risk. These include:

  • Delivering threats
  • Potentially allowing data to leave the network
  • Enabling unauthorized access
  • Lowering productivity
  • Consuming corporate bandwidth

The Application section provides visbility into the applications in use so you can compare the risk of their continued use to the business benefit.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden