SECURITY OFFERINGS |
PROTECT |
SETECT |
RESPOND |
IDENTITY |
Eliminate Passwords, use multi-factor authentication, move to risk-based conditional access |
Proactive notification of suspicious behavior and unusual authentications |
Automatically elevate access requirements based on risks |
DEVICE |
Device encryption management of devices,consistent compliance |
Auto-identify suspicious or compromised endpoints |
Block, quarantine suspicious devices |
APPS & INFRASTRUCTURE |
Identify unsanctioned apps and enforce policies on cloud resources, monitor cloud data |
Detect any deviations from baseline, policies, or behavior |
Deploy new controls and block risky apps |
DATA |
policy-based data separation,containment,classification, |
Notification of any attempts for unauthorized data access |
Revoke unauthorized access to documents,wipe device data |