Use cases
Use case
Detection of behavior deviations and suspicious activities
Transform your security team's capability from reactive log analysis to proactive threat prevention with automated behavior monitoring and instant anomaly detection.
![](https://cdn.prod.website-files.com/676562f0ffae727cd7165b40/677d68edcc54662503afb903_Behavior.png)
Use Case
Continuous Security Group Optimization
Your exposed web servers usually receive communications only from CloudFlare, but they suddenly started receiving traffic from unexpected sources…..Your workload typically communicates with destinations in a specific geography, but it suddenly begins connecting to regions outside its normal boundaries.You want to quickly identify and address behavior deviations, but continuously tracking logs and behavior patterns is challenging and time-consuming.
![](https://cdn.prod.website-files.com/676562f0ffae727cd7165b40/677d690c41b0102d8e073403_real%20time...png)