Features
Top Performing Features
Vulnerability Intelligence
Software that is able to label and store information about vulnerabilities to access for future use cases.
Category average: 8.3
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 7.9
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 8.2
Automated Threat Identification
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Category average: 7.8
Threat Intelligence
Features for categories that leverage threat intelligence in network security
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 7.9
Vulnerability Classification
Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.
Category average: 8.8
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 8.2
Threat Analysis
Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.
Category average: 7.8
Automated Threat Identification
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Category average: 7.8
Vulnerability Management Tools
Tools that focus on locating, identifying, and prioritizing vulnerabilities in a network that need to be patched.
Web Scanning
Specifically scans webpages for potential threats or vulnerabilities.
Category average: 7.9
Vulnerability Intelligence
Software that is able to label and store information about vulnerabilities to access for future use cases.
Category average: 8.3