{"_id":"579aca6a34b5fd0e00b9e143","user":"56688ec8ee1dbf0d008f62ae","__v":1,"project":"55db8f8f1a91690d007ad975","category":{"_id":"55db8f901a91690d007ad979","__v":10,"project":"55db8f8f1a91690d007ad975","version":"55db8f901a91690d007ad978","pages":["55db8f911a91690d007ad97b","55db92ffade8080d00c73833","55dc71fa7fa0290d00559111","55dc728900a8811900c230d1","55dc75a700a8811900c230e5","55dc764400a8811900c230eb","55dc7a2f6f16451700843e25","55dc977f6cce01230001ec4b","55dc98abc755b63700dc840f","55dc9aa9c755b63700dc841d"],"sync":{"url":"","isSync":false},"reference":false,"createdAt":"2015-08-24T21:41:36.606Z","from_sync":false,"order":0,"slug":"general","title":"Getting Started"},"githubsync":"","parentDoc":null,"version":{"_id":"55db8f901a91690d007ad978","project":"55db8f8f1a91690d007ad975","__v":17,"createdAt":"2015-08-24T21:41:36.034Z","releaseDate":"2015-08-24T21:41:36.034Z","categories":["55db8f901a91690d007ad979","55db9856b3d6540d00886426","55dc751b00a8811900c230e3","55dc766255be9f21004ee250","55dc769200a8811900c230ed","55e4c701177b6e0d003330fa","55f4915caf0bc71900a53130","55f491b2be9c2b2100f0635d","560b22739c7be70d00100bd8","57488c53e8c6a420000b729c","574cefd95953e20e00f40f9f","5798edfd7700d30e00ad250c","579ac88234b5fd0e00b9e140","57c81c6d690c200e0047b72e","57d9b8fbda17c30e003897f1","57d9b90e608ea00e00f358d8","57d9b91cda17c30e003897f4"],"is_deprecated":false,"is_hidden":false,"is_beta":false,"is_stable":true,"codename":"","version_clean":"1.0.0","version":"1.0"},"updates":[],"next":{"pages":[],"description":""},"createdAt":"2016-07-29T03:15:54.208Z","link_external":false,"link_url":"","sync_unique":"","hidden":false,"api":{"results":{"codes":[]},"settings":"","auth":"required","params":[],"url":""},"isReference":false,"order":4,"body":"IMMUNIO provides comprehensive support and monitoring of security events from your applications. The main use cases are described in the following chapters of this document:\n  * [Security Intelligence](https://docs.immun.io/docs/suspicious-behavior-group)\n  * [Account Takeover Protection](https://docs.immun.io/docs/account-protection-threats-group)\n  * [Code Protection](https://docs.immun.io/docs/overview-3)","excerpt":"","slug":"overview-1","type":"basic","title":"Key Use Cases"}
IMMUNIO provides comprehensive support and monitoring of security events from your applications. The main use cases are described in the following chapters of this document: * [Security Intelligence](https://docs.immun.io/docs/suspicious-behavior-group) * [Account Takeover Protection](https://docs.immun.io/docs/account-protection-threats-group) * [Code Protection](https://docs.immun.io/docs/overview-3)