Threat Detection enhances security by providing visibility into abnormal activity across protected resources.
Threat Detection monitors and identifies the following abnormal activities:
-
Anomalies: Identifies anomalies in files and backup jobs that may indicate ransomware, data corruption, or unauthorized file activity. The system uses historical baselines, statistical thresholds, and file metadata validation to detect unusual behavior.
-
Threats: Scans for malware and encryption threats within backup data. Multiple detection engines and models analyze backup content to identify threats with high accuracy.