This section describes how CEM scans and analyzes your connected cloud workspaces, and how to use the information provided by CEM to take action and reduce the attack surface.
In this section:
In this topic: