Previously we looked at the way in which Traps detects and prevents exploits and other malicious activity. Continuing on from that, we then took a brief look at the technical architecture behind Traps and the EndPoint Agent itself.
In this final part three of the series, we’re going to look over the Management of Traps with the ESM Console and the platforms that Traps supports.