Anomalous Data Transfer or Data Leak Data leakage (misused DNS, SSH, HTTP(s), …)Anomalous data transferAnomalous internal file transfersPreparation for data theft by an employee and other internal threatsTunneled traffic (ICMP, DNS, SSH, HTTP(s), …)Automatic data harvesting (e-shop) Do you have any question? Please leave us your contact details so we can deliver a personalized offer tailored to your company’s needs. Schedule a Demo Schedule a Demo Contact Us Contact Us