| Platform Feature | 
| Behavioral Analytics and Protection | 
Y | 
Y | 
| Automated Secops | 
L | 
Y | 
| Containment and Remediation | 
O | 
Y | 
| Machine Learning and Artificial Intelligence | 
Y | 
Y | 
| XDR Dahsboard/Portal | 
Y | 
Y | 
| XDR Dahsboard/Portal Whitelabaleing + Custom URL | 
N | 
Y | 
| SIEM Integration | 
Y | 
Y | 
| Cloud-Based Solution | 
Y | 
Y | 
| Compliance and Reporting | 
Y | 
Y | 
| Data Sovereignty | 
Y | 
Y | 
| Customer Specific Tenancy | 
Y | 
Y | 
| Powerful Visualizations | 
Y | 
Y | 
| MDR | 
| 24 x 7 Monitoring | 
O | 
Y | 
| End-to-End Platform & Tech Stack Management | 
Y | 
Y | 
| Proactive Threat Hunting (endpoint+network) | 
O | 
Y | 
| Active Threat Hunting (endpoint+network) | 
O | 
Y | 
| Forensic Investigation (endpoint+network) | 
O | 
Y | 
| False Positive Reduction | 
O | 
Y | 
| Managed Remote Host Tactical Threat Containment | 
Y | 
Y | 
| Managed Remote Network Tactical Threat Containment | 
Y | 
Y | 
| Managed Remote Cloud-Based Threat Containment | 
Y | 
Y | 
| Managed Remote Web Security Threat Containment | 
Y | 
Y | 
| Managed Remote Email Security Threat Containment | 
Y | 
Y | 
| Unlimited Remediation Support | 
N | 
Y | 
| Automated Threat Response to Known Threats | 
Y | 
Y | 
| Incident Response and Forensics | 
O | 
Y | 
| Breach Warranty | 
O | 
N | 
| Managed Security Services Support | 
Y | 
Y | 
| Tech Stack | 
| Multilayered endpoint protection | 
Y | 
Y | 
| SIEM – NextGen SIEM (UBA, ML, Graph Analysis) | 
Y | 
Y | 
| Packet Capture – Network forensics | 
N | 
Y | 
| Attack Paths | 
N | 
Y | 
| AD Audit – AD Topology Best Practices Report | 
N | 
Y | 
| Endpoint Protection & Visibility (NGAV+EDR) | 
Y | 
Y | 
| Network Visibility (NDR, Packets) | 
N | 
Y | 
| Log Visibility (SIEM – on-premises & cloud) | 
Y | 
Y | 
| Cloud Visibility (CSPM, CIEM, CDR) | 
Y | 
Y | 
| Mobile Security (MTD) | 
Y | 
Y | 
| Identity Protection | 
Y | 
Y | 
| Automated Attack Validation (Automated PenTest) | 
N | 
Y | 
| Threat Intelligence Platform (TIP) | 
Y | 
Y | 
| Device Control (USB) | 
Y | 
N | 
| Local Host Firewall Management | 
Y | 
L | 
| Deception Technology | 
N | 
Y | 
| Deep and Dark Web Intelligence | 
Y | 
Y | 
| Multi-Vector Detection | 
L | 
Y | 
| Operational Technology: SCADA/ICS Support | 
N | 
Y | 
| Cloud Security Analytics | 
Y | 
Y | 
| Threat Intelligence Feeds | 
Y | 
Y | 
| Attack Surface Reduction | 
Y | 
Y | 
| Next-Generation Signatureless AV Protection | 
Y | 
Y | 
| Vulnerability Management | 
Y | 
N | 
| Vulnerability Scanning | 
Y | 
N | 
| Patch Management | 
N | 
N | 
| Sandboxing | 
Y | 
Y |