suspicious activities can occurs, including mobile users.
looking into a scenario where more and more users have a big number of devices. ATA can be usefull.
For exemple: how to detect witch is the devices being used for a specific user? is this access using this device an attack?
ATA can help enterprise security team, over these new scenarios.
Proposed as answer byhocaferrThursday, February 25, 2016 8:18 PM