Features
Top Performing Features
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 7.9
Vulnerability Classification
Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.
Category average: 8.7
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 8
Threat Analysis
Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.
Category average: 8.1
Threat Intelligence
Features for categories that leverage threat intelligence in network security
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 7.9
Vulnerability Classification
Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.
Category average: 8.7
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 8
Threat Analysis
Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.
Category average: 8.1
Threat Intelligence Reporting
Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)
Category average: 7.7
Automated Threat Identification
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Category average: 7.8
Vulnerability Management Tools
Tools that focus on locating, identifying, and prioritizing vulnerabilities in a network that need to be patched.
IT Asset Realization
Scans a network to identify hardware and software assets on the network.
Category average: 8.4
Configuration Monitoring
Constant monitoring of a network set up to identify vulnerabilities as they occur within the network or tech stack on the network.
Category average: 8.3
Vulnerability Intelligence
Software that is able to label and store information about vulnerabilities to access for future use cases.
Category average: 8.2