Used words

ABAC 7 Account Takeover 5 Agent 6 Alert 6 Anomalous behavior API 4 Application Programming Interface 4 ATO Attribute Based Access Control Authenticator Boldon James 2 BYOD CASB 5 Compromised user Content Classification 1 inspection Context Data activity monitoring at Rest 3 classification 1 context discovery in Motion Use Loss Prevention 2 Detector Dictionaries Digital Rights Management DLP 3 Document fingerprinting DRM EDM email endpoint Enterprise Exact Matching False positives Identity Incident In-line (real-time) Insider Threat Management (ITM) Threats Investigations ITM Labels Luhn algorithm Malicious Message revocation Metadata tagging MFA Microsoft Information Protection MIP Multi-Factor Authentication Near real-time Negligent Notification OAuth OCR Optical Character Recognition Partial Fingerprinting Privilege abuse Proofpoint tags Proximity Quarantine RBAC RegEx Regular Expressions Remediation Remote Browser Isolation Role Rule Scan cloud Sensor Smart ID Send Tags Telemetry hunting Titus Classification Suite Tracking UAM UEBA Unmanaged device User and Entity Behavior Analytics VDIs Visual capture Watchlist Workflow status
Create your own
... AND SHOP IT!

Hey, your artwork is awesome!

Did you know that you can easily buy one of these cool products?

Share your Artwork