As a system user for Anti-spam, I should be able to digitally manage Allow / Block List. |
As a system user for Anti-spam, I should be able to digitally manage Audit Log. |
As a system user for Anti-spam, I should be able to digitally manage Email Archiving. |
As a system user for Anti-spam, I should be able to digitally manage Email Recovery. |
As a system user for Anti-spam, I should be able to digitally manage Email Routing. |
As a system user for Anti-spam, I should be able to digitally manage Encryption. |
As a system user for Anti-spam, I should be able to digitally manage Fraud Detection. |
As a system user for Anti-spam, I should be able to digitally manage Quarantine. |
As a system user for Anti-spam, I should be able to digitally manage Reporting & Statistics. |
As a system user for Anti-spam, I should be able to digitally manage Spam Filter. |
As a system user for Cloud Security, I should be able to digitally manage Anti Virus. |
As a system user for Cloud Security, I should be able to digitally manage Application Security. |
As a system user for Cloud Security, I should be able to digitally manage Behavioral Analytics. |
As a system user for Cloud Security, I should be able to digitally manage Encryption. |
As a system user for Cloud Security, I should be able to digitally manage Endpoint Management. |
As a system user for Cloud Security, I should be able to digitally manage Incident Management. |
As a system user for Cloud Security, I should be able to digitally manage Intrusion Detection System. |
As a system user for Cloud Security, I should be able to digitally manage Threat Intelligence. |
As a system user for Cloud Security, I should be able to digitally manage Two-Factor Authentication. |
As a system user for Cloud Security, I should be able to digitally manage Vulnerability Management. |
As a system user for Cybersecurity, I should be able to digitally manage AI / Machine Learning. |
As a system user for Cybersecurity, I should be able to digitally manage Behavioral Analytics. |
As a system user for Cybersecurity, I should be able to digitally manage Endpoint Management. |
As a system user for Cybersecurity, I should be able to digitally manage Incident Management. |
As a system user for Cybersecurity, I should be able to digitally manage IOC Verification. |
As a system user for Cybersecurity, I should be able to digitally manage Tokenization. |
As a system user for Cybersecurity, I should be able to digitally manage Vulnerability Scanning. |
As a system user for Cybersecurity, I should be able to digitally manage Whitelisting/Blacklisting. |
As a system user for Email Archiving, I should be able to digitally manage Access Control. |
As a system user for Email Archiving, I should be able to digitally manage Backup Management. |
As a system user for Email Archiving, I should be able to digitally manage Compliance Management. |
As a system user for Email Archiving, I should be able to digitally manage Data Deduplication. |
As a system user for Email Archiving, I should be able to digitally manage Data Export. |
As a system user for Email Archiving, I should be able to digitally manage eDiscovery. |
As a system user for Email Archiving, I should be able to digitally manage Encryption. |
As a system user for Email Archiving, I should be able to digitally manage Retention Management. |
As a system user for Email Archiving, I should be able to digitally manage Storage Management. |
As a system user for Email Archiving, I should be able to digitally manage Threat Protection. |
As a system user for Email Management, I should be able to digitally manage Archiving & Retention. |
As a system user for Email Management, I should be able to digitally manage Canned Responses. |
As a system user for Email Management, I should be able to digitally manage Data Recovery. |
As a system user for Email Management, I should be able to digitally manage Email Monitoring. |
As a system user for Email Management, I should be able to digitally manage Queue Management. |
As a system user for Email Management, I should be able to digitally manage Response Management. |
As a system user for Email Management, I should be able to digitally manage Routing. |
As a system user for Email Management, I should be able to digitally manage Shared Inboxes. |
As a system user for Email Management, I should be able to digitally manage Signature Management. |
As a system user for Email Management, I should be able to digitally manage Spam Blocker. |
As a system user for Email Management, I should be able to digitally manage Whitelisting/Blacklisting. |
As a system user for Email Security, I should be able to digitally manage Anti Spam. |
As a system user for Email Security, I should be able to digitally manage Anti Virus. |
As a system user for Email Security, I should be able to digitally manage Email Attachment Protection. |
As a system user for Email Security, I should be able to digitally manage Encryption. |
As a system user for Email Security, I should be able to digitally manage Policy Management. |
As a system user for Email Security, I should be able to digitally manage Quarantine. |
As a system user for Email Security, I should be able to digitally manage Reporting/Analytics. |
As a system user for Email Security, I should be able to digitally manage Whitelisting/Blacklisting. |
As a system user for Network Security, I should be able to digitally manage Access Control. |
As a system user for Network Security, I should be able to digitally manage Activity Monitoring. |
As a system user for Network Security, I should be able to digitally manage Firewalls. |
As a system user for Network Security, I should be able to digitally manage Intrusion Detection System. |
As a system user for Network Security, I should be able to digitally manage Reporting/Analytics. |
As a system user for Network Security, I should be able to digitally manage Threat Response. |
As a system user for Network Security, I should be able to digitally manage VPN. |
As a system user for Network Security, I should be able to digitally manage Vulnerability Scanning. |