A. Meraki
B. WSA
C. Investigate
D. CES
E. ESA
F. Umbrella
A. Data Center
B. Web
C. Cloud
D. Mobile
E. Email
A. automation
B. orchestration
C. visibility
D. management
A. Web
B. Cloud
C. Mobile
D. Email
E. Endpoints
A. Voicemail
C. Cloud apps
E. Campus and branch
A. Investigation
B. Threat protection
C. Anomaly detection
D. Network control
A. AnyConnect
B. Stealthwatch
C. Next Generation Firewall
D. AMP Threat Grid
E. Cloudlock
F. TrustSec
A. 3rd party applications integrated through comprehensive APIs
B. Detection of threats communicated within 48 hours of occurrence
C. Real-time threat information
D. Blocks threats in real time
A. antivirus defense
B. web proxy
C. fuzzy fingerprinting
D. URL filtering
E. remote VPN