Which three options are solutions and features of the cloud apps threat-centric solution? (Choose three.)