| Platform Feature |
| Behavioral Analytics and Protection |
Y |
Y |
| Automated Secops |
L |
Y |
| Containment and Remediation |
O |
Y |
| Machine Learning and Artificial Intelligence |
Y |
Y |
| XDR Dahsboard/Portal |
Y |
Y |
| XDR Dahsboard/Portal Whitelabaleing + Custom URL |
N |
Y |
| SIEM Integration |
Y |
Y |
| Cloud-Based Solution |
Y |
Y |
| Compliance and Reporting |
Y |
Y |
| Data Sovereignty |
Y |
Y |
| Customer Specific Tenancy |
Y |
Y |
| Powerful Visualizations |
Y |
Y |
| MDR |
| 24 x 7 Monitoring |
O |
Y |
| End-to-End Platform & Tech Stack Management |
Y |
Y |
| Proactive Threat Hunting (endpoint+network) |
O |
Y |
| Active Threat Hunting (endpoint+network) |
O |
Y |
| Forensic Investigation (endpoint+network) |
O |
Y |
| False Positive Reduction |
O |
Y |
| Managed Remote Host Tactical Threat Containment |
Y |
Y |
| Managed Remote Network Tactical Threat Containment |
Y |
Y |
| Managed Remote Cloud-Based Threat Containment |
Y |
Y |
| Managed Remote Web Security Threat Containment |
Y |
Y |
| Managed Remote Email Security Threat Containment |
Y |
Y |
| Unlimited Remediation Support |
N |
Y |
| Automated Threat Response to Known Threats |
Y |
Y |
| Incident Response and Forensics |
O |
Y |
| Breach Warranty |
O |
N |
| Managed Security Services Support |
Y |
Y |
| Tech Stack |
| Multilayered endpoint protection |
Y |
Y |
| SIEM – NextGen SIEM (UBA, ML, Graph Analysis) |
Y |
Y |
| Packet Capture – Network forensics |
N |
Y |
| Attack Paths |
N |
Y |
| AD Audit – AD Topology Best Practices Report |
N |
Y |
| Endpoint Protection & Visibility (NGAV+EDR) |
Y |
Y |
| Network Visibility (NDR, Packets) |
N |
Y |
| Log Visibility (SIEM – on-premises & cloud) |
Y |
Y |
| Cloud Visibility (CSPM, CIEM, CDR) |
Y |
Y |
| Mobile Security (MTD) |
Y |
Y |
| Identity Protection |
Y |
Y |
| Automated Attack Validation (Automated PenTest) |
N |
Y |
| Threat Intelligence Platform (TIP) |
Y |
Y |
| Device Control (USB) |
Y |
N |
| Local Host Firewall Management |
Y |
L |
| Deception Technology |
N |
Y |
| Deep and Dark Web Intelligence |
Y |
Y |
| Multi-Vector Detection |
L |
Y |
| Operational Technology: SCADA/ICS Support |
N |
Y |
| Cloud Security Analytics |
Y |
Y |
| Threat Intelligence Feeds |
Y |
Y |
| Attack Surface Reduction |
Y |
Y |
| Next-Generation Signatureless AV Protection |
Y |
Y |
| Vulnerability Management |
Y |
N |
| Vulnerability Scanning |
Y |
N |
| Patch Management |
N |
N |
| Sandboxing |
Y |
Y |