| Platform Feature | 
| Behavioral Analytics and Protection | Y | Y | 
| Automated Secops | L | Y | 
| Containment and Remediation | Y | Y | 
| Machine Learning and Artificial Intelligence | Y | Y | 
| XDR Dahsboard/Portal | N | Y | 
| XDR Dahsboard/Portal Whitelabaleing + Custom URL | N | Y | 
| SIEM Integration | Y | Y | 
| Cloud-Based Solution | Y | Y | 
| Compliance and Reporting | Y | Y | 
| Data Sovereignty | Y | Y | 
| Customer Specific Tenancy | N | Y | 
| Powerful Visualizations | Y | Y | 
| MDR | 
| 24 x 7 Monitoring | O | Y | 
| End-to-End Platform & Tech Stack Management | Y | Y | 
| Proactive Threat Hunting (endpoint+network) | O | Y | 
| Active Threat Hunting (endpoint+network) | O | Y | 
| Forensic Investigation (endpoint+network) | O | Y | 
| False Positive Reduction | O | Y | 
| Managed Remote Host Tactical Threat Containment | Y | Y | 
| Managed Remote Network Tactical Threat Containment | Y | Y | 
| Managed Remote Cloud-Based Threat Containment | N | Y | 
| Managed Remote Web Security Threat Containment | N | Y | 
| Managed Remote Email Security Threat Containment | N | Y | 
| Unlimited Remediation Support | N | Y | 
| Automated Threat Response to Known Threats | Y | Y | 
| Incident Response and Forensics | O | Y | 
| Breach Warranty | N | N | 
| Managed Security Services Support | Y | Y | 
| Tech Stack | 
| Multilayered endpoint protection | Y | Y | 
| SIEM – NextGen SIEM (UBA, ML, Graph Analysis) | N | Y | 
| Packet Capture – Network forensics | Y | Y | 
| Attack Paths | N | Y | 
| AD Audit – AD Topology Best Practices Report | N | Y | 
| Endpoint Protection & Visibility (NGAV+EDR) | Y | Y | 
| Network Visibility (NDR, Packets) | Y | Y | 
| Log Visibility (SIEM – on-premises & cloud) | N | Y | 
| Cloud Visibility (CSPM, CIEM, CDR) | Y | Y | 
| Mobile Security (MTD) | Y | Y | 
| Identity Protection | Y | Y | 
| Automated Attack Validation (Automated PenTest) | N | Y | 
| Threat Intelligence Platform (TIP) | Y | Y | 
| Device Control (USB) | Y | N | 
| Local Host Firewall Management | N | L | 
| Deception Technology | N | Y | 
| Deep and Dark Web Intelligence | N | Y | 
| Multi-Vector Detection | Y | Y | 
| Operational Technology: SCADA/ICS Support | Y | Y | 
| Cloud Security Analytics | Y | Y | 
| Threat Intelligence Feeds | Y | Y | 
| Attack Surface Reduction | N | Y | 
| Next-Generation Signatureless AV Protection | Y | Y | 
| Vulnerability Management | Y | N | 
| Vulnerability Scanning | Y | N | 
| Patch Management | N | N | 
| Sandboxing | Y | Y |