Threats
Last updated
Last updated
Software as a Service (SaaS) applications offer a convenient and scalable way to conduct business. However, this ease of cloud-based services also enhances exposure to threats.
Open Threats
This section captures the events that need your attention.
Rule - Names of the open threats along with the security domain these fall into.
Severity - This indicated the potential this threat holds to hamper the security posture of the organization.
Application - The application through which this threat was discovered
Account - The user account associated with the threat
Created - The time of occurance.
Status - Updates the status of rule