How do AMP’s device trajectory capabilities help address customers’ breach remediation issues?
A. It analyzes the data from suspicious files to provide a new level of threat intelligence
B. It searches for potential threats based on identified activities and behaviors.
C. It determines the scope and cause of an outbreak and tracks suspicious files
D. It tracks file behavior across the network to see which devices it enters and exits