Features
Top Performing Features
Network Analytics
Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.
Category average: 7.3
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 7.9
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 8.2
Threat Analysis
Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.
Category average: 7.8
Threat Intelligence
Features for categories that leverage threat intelligence in network security
Network Analytics
Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.
Category average: 7.3
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 7.9
Vulnerability Classification
Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.
Category average: 8.8
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 8.2
Threat Analysis
Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.
Category average: 7.8
Threat Intelligence Reporting
Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)
Category average: 7.5
Automated Threat Identification
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Category average: 7.8
Vulnerability Management Tools
Tools that focus on locating, identifying, and prioritizing vulnerabilities in a network that need to be patched.
IT Asset Realization
Scans a network to identify hardware and software assets on the network.
Category average: 8.4
Authentication
Authentication of users and services within a network to prevent vulnerabilities from being introduced to the network.
Category average: 8.1
Configuration Monitoring
Constant monitoring of a network set up to identify vulnerabilities as they occur within the network or tech stack on the network.
Category average: 8.4
Web Scanning
Specifically scans webpages for potential threats or vulnerabilities.
Category average: 7.9
Vulnerability Intelligence
Software that is able to label and store information about vulnerabilities to access for future use cases.
Category average: 8.3