Our solution can detect malware that evades firewalls and anti-virus, such as policy violations, misconfigurations, phishing, zero-day exploits, crypto mining, living off the land attacks, potentially unwanted programs (PUPs), espionage, and of course, ransomware and more. If it’s not something we would expect to see in a normal business environment, it will be investigated by our cyber threat hunters.