« Back to Glossary Index

Contains and eradicates threats when an attacker exploits a vulnerability within an organization.

« Back to Glossary Index