Page 84 - CSI - Cisco Security Instroduction - BT
P. 84

Cisco CloudLock




                                               Secure cloud users, data, and apps


































                    Compromised accounts                                             Data breaches                                   Shadow IT and application

                        and insider threats                                   Data security and compliance                                              risk

                          Threat protection and                                                                                            App visibility and control
                 User and Entity Behavior Analytics
                                   (UEBA)




          87
   79   80   81   82   83   84   85   86   87   88   89