License editions: To understand the applicable license editions, see Plans & Pricing.
This is a service designed primarily to respond to Ransomware attacks, identified by detecting anomalies and suspicious behavior for data protected across data sources including data center and endpoints. It enables administrators to:
- Control access to data by tracking the source from where the data is coming in and the destination, such as restore and download requests, to where the data is going out from your organization
- Proactively monitor and identify the potential data breach and security incidents existing in and from outside the organization
- Respond instantly and recover from Ransomware and malware attacks