Skip to main content

Device Isolation

Disconnect compromised devices from the network to prevent the spread of threats and protect infrastructure.

Updated over 10 months ago

How does it work?

When a threat is detected, the platform allows isolating the affected device to contain the incident and prevent further spread.

Real Example:

A security team detects suspicious activity on a laptop. It is automatically isolated, preventing malware from spreading across the corporate network.

Did this answer your question?