Offers more advanced capabilities, providing real-time and historical visibility and the ability to investigate the data produced by endpoints.
Leverages signature-based attacks and software-based behavior modeling to identify anomalous network or user behavior once it bypasses the perimeter firewall.
Ensures availability and retention of logs via a centralized repository to assist with analysis.