Centralized internal oversight for suspicious activity, operational risk, and incident response.
Security detections, privileged activity alerts, suspicious sessions, and cyber triage workflows will appear here.