How does AMP’s device trajectory capabilities help address customer ’s issues?
It determines the scope and cause of an outbreak and tracks suspicious files
It searches for potential threats based on identified activities and behaviors
It isolates suspicious files and runs them in a sa ndbox environment to determine their authenticity
It analyses the data from suspicious files to provide a new level of threat intelligence
Submit