Platform Feature |
Behavioral Analytics and Protection |
Y |
Y |
Automated Secops |
L |
Y |
Containment and Remediation |
O |
Y |
Machine Learning and Artificial Intelligence |
Y |
Y |
XDR Dahsboard/Portal |
Y |
Y |
XDR Dahsboard/Portal Whitelabaleing + Custom URL |
N |
Y |
SIEM Integration |
Y |
Y |
Cloud-Based Solution |
Y |
Y |
Compliance and Reporting |
Y |
Y |
Data Sovereignty |
Y |
Y |
Customer Specific Tenancy |
Y |
Y |
Powerful Visualizations |
Y |
Y |
MDR |
24 x 7 Monitoring |
O |
Y |
End-to-End Platform & Tech Stack Management |
Y |
Y |
Proactive Threat Hunting (endpoint+network) |
O |
Y |
Active Threat Hunting (endpoint+network) |
O |
Y |
Forensic Investigation (endpoint+network) |
O |
Y |
False Positive Reduction |
O |
Y |
Managed Remote Host Tactical Threat Containment |
Y |
Y |
Managed Remote Network Tactical Threat Containment |
N |
Y |
Managed Remote Cloud-Based Threat Containment |
N |
Y |
Managed Remote Web Security Threat Containment |
N |
Y |
Managed Remote Email Security Threat Containment |
N |
Y |
Unlimited Remediation Support |
N |
Y |
Automated Threat Response to Known Threats |
Y |
Y |
Incident Response and Forensics |
O |
Y |
Breach Warranty |
O |
N |
Managed Security Services Support |
Y |
Y |
Tech Stack |
Multilayered endpoint protection |
Y |
Y |
SIEM – NextGen SIEM (UBA, ML, Graph Analysis) |
Y |
Y |
Packet Capture – Network forensics |
N |
Y |
Attack Paths |
N |
Y |
AD Audit – AD Topology Best Practices Report |
N |
Y |
Endpoint Protection & Visibility (NGAV+EDR) |
Y |
Y |
Network Visibility (NDR, Packets) |
Y |
Y |
Log Visibility (SIEM – on-premises & cloud) |
Y |
Y |
Cloud Visibility (CSPM, CIEM, CDR) |
N |
Y |
Mobile Security (MTD) |
Y |
Y |
Identity Protection |
N |
Y |
Automated Attack Validation (Automated PenTest) |
N |
Y |
Threat Intelligence Platform (TIP) |
Y |
Y |
Device Control (USB) |
Y |
N |
Local Host Firewall Management |
Y |
L |
Deception Technology |
N |
Y |
Deep and Dark Web Intelligence |
N |
Y |
Multi-Vector Detection |
L |
Y |
Operational Technology: SCADA/ICS Support |
N |
Y |
Cloud Security Analytics |
Y |
Y |
Threat Intelligence Feeds |
Y |
Y |
Attack Surface Reduction |
Y |
Y |
Next-Generation Signatureless AV Protection |
Y |
Y |
Vulnerability Management |
Y |
N |
Vulnerability Scanning |
Y |
N |
Patch Management |
N |
N |
Sandboxing |
Y |
Y |