Provides a centralized, at-a-glance view of risk, activity, and access across your environment to help you quickly identify issues and prioritize action.
Analyzes access, sensitivity, and activity data to identify, prioritize, and investigate high-risk workspaces and content based on your defined risk criteria.
Surfaces where content is exposed through external sharing, broad access groups, and sharing links, helping you quickly identify and assess overshared data.
Provides visibility into user access and activity, helping you understand how users interact with content and identify potential security or governance risks.
Lets you quickly search for users, groups, or objects to understand their permissions and risk content, and automate recurring searches with scheduled profiles and exported reports.
Enables you to search, filter, and review user and system activities within the retention period, helping you investigate actions and monitor activity across your environment.
Lets you define what 'risk' means for your organization by combining sensitivity and exposure criteria into reusable profiles that drive how Insights scans, analyzes, and prioritizes risky data.
Centralizes configuration for onboarding and operation, allowing you to manage settings that control how Insights collects and analyzes data.