Features
Top Performing Features
Secure Web Gateways
Provides user protection from malicious web-based attacks while implementing company-approved use policies.
Category average: 8.8
Network Data Encryption
Encrypting data so that only the network users with the proper privileges may see and access the data.
Category average: 8.8
Multi-Factor Authentication
Using multiple, independent components to gain access
Category average: 8.8
Network Flow Control
Controls the flow of network traffic between assets using privilege restrictions to hide assets from unauthorized users.
Category average: 8.7
Identity Management
Identity management software manages information about the identity of software users and controls access to corporate resources
Multi-Factor Authentication
Using multiple, independent components to gain access
Category average: 8.8
Endpoint Security
Endpoint security software protects enterprise connected devices from malware and cyber attacks.
Endpoint Detection and Response (EDR)
Continuous monitoring and response to advanced internet threats by endpoint agents.
Category average: 8.9
Threat Intelligence
Features for categories that leverage threat intelligence in network security
Network Analytics
Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.
Category average: 8.2
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 8
Vulnerability Classification
Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.
Category average: 8.2
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 8.2
Threat Analysis
Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.
Category average: 8.6
Threat Intelligence Reporting
Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)
Category average: 8.4
Automated Threat Identification
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Category average: 8.4
Zero Trust Security
Network and application access that abides by zero trust policies, where users are given access only to what they need and on an individual case basis.
Continuous Verification
The ability to continuously validate users and services inside and outside a network before granting or keeping access to applications or data.
Category average: 8.6
Secure Web Gateways
Provides user protection from malicious web-based attacks while implementing company-approved use policies.
Category average: 8.8
Network Flow Control
Controls the flow of network traffic between assets using privilege restrictions to hide assets from unauthorized users.
Category average: 8.7
Network Traffic Analysis
Software that monitors network traffic and provides detailed reports on the users who access the network.
Category average: 8.5
Segmentation Leveraging
The ability to reduce the impact of an external attack by restricting the access of specified accounts, applications, or services during an attack.
Category average: 8
Admin Access Control
Administrator-defined access control privileges that are assigned based on a user's need to access certain applications or areas of the network.
Category average: 9
Network Data Encryption
Encrypting data so that only the network users with the proper privileges may see and access the data.
Category average: 8.8
Network Topology Mapping
The ability to map a network, in detail, to show performance metrics, device and software connections, and resource utilization.
Category average: 8.5