- Threat Detection, Investigation, and Response (TDIR) Use Case Categories
- Threat Detection, Investigation, and Response (TDIR) Use Case Categories Hierarchy
- Compromised Insiders Use Case Category
- External Threats Use Case Category
- Malicious Insiders Use Case Category
PrevNext
Data Leak via Email Scenario
Learn about the Data Leak Data Leak via Email scenario.
The Data Leak via Email scenario describes when an insider illicitly exfiltrates data outside your organization using email. Data leaks are one of the biggest threats to an organization and can harm your organization's operations, finances, and reputation.
In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Data Leak via Email scenario falls under the Data Leak use case.