A. Perform real-time analysis of network, endpoint, vulnerability and threat data to detect advanced threats in realtime.
B. Conduct real-time enforcement of endpoint policies, including configuration and patching to prevent and detect threats.
C. Combine data from security solutions, external threat feeds, configuration management systems and other databases to support rapid incident response.
D. Combine machine-led analytics and human-led analysis to quickly find hidden connections and critical patterns in internal, external and open-source data.