Provides information on corporate machines, network resources, access credentials, business data, and email correspondence that may have been compromised by malware. Enabling security professionals to identify gaps in existing processes and adjust or crea ...