Features
Top Performing Features
Threat Intelligence Reporting
Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)
Category average: 8.1
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 8.1
Automated Threat Identification
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Category average: 7.8
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 7.4
Endpoint Security
Endpoint security software protects enterprise connected devices from malware and cyber attacks.
Infection Remediation
Capability to quarantine infected endpoint and terminate malicious processes.
Category average: 7.2
Threat Intelligence
Features for categories that leverage threat intelligence in network security
Network Analytics
Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.
Category average: 7.3
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 7.4
Vulnerability Classification
Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.
Category average: 7.2
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 8.1
Threat Analysis
Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.
Category average: 7.2
Threat Intelligence Reporting
Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)
Category average: 8.1
Automated Threat Identification
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Category average: 7.8