Automated investigation and response: Look into alerts and immediately respond to most cybersecurity threats with 24x7 automatic responses.Message encryption: Enable defend delicate info by encrypting e-mail and documents making sure that only authorized consumers can examine them.Protected attachments: Scan attachments for malicious content materi