Capture Threat Assessment User Guide

Glimpse of the Threats

Artificial intelligence is required to understand your risk exposure. This sections details the application exploits, spyware, adware, malware and unseen malware and, botnet activity observed on your network. Deep Packet Inspection takes the information collected and examines the next layers to find and track any threats that are actively trying to evade discovery.

In addition to seeing what is found on your network, bar graphs are used to compare your environment to the industry average and the average is for all organizations.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden