How does it work?
When a threat is detected, the platform allows isolating the affected device to contain the incident and prevent further spread.
Real Example:
A security team detects suspicious activity on a laptop. It is automatically isolated, preventing malware from spreading across the corporate network.