User Activity Monitoring - With Insider Threat Monitor Program, you can use data captured features on the endpoint for both employees and thrid party contractors.
When a potential insider threat incident is detected, you can easily turn to investigate the user activity in one place.
After long-term investigation, Insider Threat Monitor Program can help you to send a warning prompts, or using policy control to block user activity.