● Real-time policies for all SaaS, IaaS, and web
● Unified policies for SaaS, IaaS, and web security
● Web classification and content filtering
● User and remediation workflows
● Encrypt structured data
● Encrypt structured data via BYOK
● Encrypt unstructured data
● Reduce false positives
● Find and control sensitive data at rest
● Closed-loop incident management
● Compliance
● Role-based access controls