Features
Top Performing Features
Anti-Exploit Technology
In-memory and application layer attack blocking (e.g. ransomeware)
Category average: 10
Network Analytics
Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.
Category average: 10
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 10
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 10
Endpoint Security
Endpoint security software protects enterprise connected devices from malware and cyber attacks.
Anti-Exploit Technology
In-memory and application layer attack blocking (e.g. ransomeware)
Category average: 10
Threat Intelligence
Features for categories that leverage threat intelligence in network security
Network Analytics
Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.
Category average: 10
Threat Recognition
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
Category average: 10
Vulnerability Classification
Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.
Category average: 8
Automated Alerts and Reporting
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
Category average: 10
Threat Analysis
Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.
Category average: 10
Threat Intelligence Reporting
Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)
Category average: 8
Automated Threat Identification
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Category average: 10
Threat Hunting Tools
Tools that actively scan a network for threats. These tools will commonly integrate with and use threat intelligence databases for threat identification and elimination.
Scanning for Vulnerabilities
Scans that identify vulnerable areas within a network.
Category average: 8
Behavioral Analytics
Using threat behavior to establish a pattern which can be used to identify the similar threats faster in the future.
Category average: 10