| Platform Feature |
| Behavioral Analytics and Protection | Y | Y |
| Automated Secops | L | Y |
| Containment and Remediation | O | Y |
| Machine Learning and Artificial Intelligence | Y | Y |
| XDR Dahsboard/Portal | Y | Y |
| XDR Dahsboard/Portal Whitelabaleing + Custom URL | N | Y |
| SIEM Integration | Y | Y |
| Cloud-Based Solution | Y | Y |
| Compliance and Reporting | Y | Y |
| Data Sovereignty | Y | Y |
| Customer Specific Tenancy | Y | Y |
| Powerful Visualizations | Y | Y |
| MDR |
| 24 x 7 Monitoring | O | Y |
| End-to-End Platform & Tech Stack Management | Y | Y |
| Proactive Threat Hunting (endpoint+network) | O | Y |
| Active Threat Hunting (endpoint+network) | O | Y |
| Forensic Investigation (endpoint+network) | O | Y |
| False Positive Reduction | O | Y |
| Managed Remote Host Tactical Threat Containment | Y | Y |
| Managed Remote Network Tactical Threat Containment | N | Y |
| Managed Remote Cloud-Based Threat Containment | N | Y |
| Managed Remote Web Security Threat Containment | N | Y |
| Managed Remote Email Security Threat Containment | N | Y |
| Unlimited Remediation Support | N | Y |
| Automated Threat Response to Known Threats | Y | Y |
| Incident Response and Forensics | O | Y |
| Breach Warranty | O | N |
| Managed Security Services Support | Y | Y |
| Tech Stack |
| Multilayered endpoint protection | Y | Y |
| SIEM – NextGen SIEM (UBA, ML, Graph Analysis) | Y | Y |
| Packet Capture – Network forensics | N | Y |
| Attack Paths | N | Y |
| AD Audit – AD Topology Best Practices Report | N | Y |
| Endpoint Protection & Visibility (NGAV+EDR) | Y | Y |
| Network Visibility (NDR, Packets) | Y | Y |
| Log Visibility (SIEM – on-premises & cloud) | Y | Y |
| Cloud Visibility (CSPM, CIEM, CDR) | N | Y |
| Mobile Security (MTD) | Y | Y |
| Identity Protection | N | Y |
| Automated Attack Validation (Automated PenTest) | N | Y |
| Threat Intelligence Platform (TIP) | Y | Y |
| Device Control (USB) | Y | N |
| Local Host Firewall Management | Y | L |
| Deception Technology | N | Y |
| Deep and Dark Web Intelligence | N | Y |
| Multi-Vector Detection | L | Y |
| Operational Technology: SCADA/ICS Support | N | Y |
| Cloud Security Analytics | Y | Y |
| Threat Intelligence Feeds | Y | Y |
| Attack Surface Reduction | Y | Y |
| Next-Generation Signatureless AV Protection | Y | Y |
| Vulnerability Management | Y | N |
| Vulnerability Scanning | Y | N |
| Patch Management | N | N |
| Sandboxing | Y | Y |