It investigates the threat at early stage by evaluating the data entering into your network, either via internet or the network connected devices and then protect the detected threats from entering into the network.