2020-04-27T13:20:58+00:00
- Detect changes in real time and differentiate authorized from unauthorized changes—then prioritize response based on business context.
- Discover assets and scan for vulnerabilities with granular risk scoring to prioritize the most urgent business risks.
- Reliably collects, normalizes, analyzes and stores log data for immediate alerting of suspicious behaviors and to support detailed forensic analysis.
- Keep configurations in a known and trusted state and identify and remediate non-compliant changes using our nearly 800 policy/platform combinations.
- Network and Data Security.
- Security Policy Management and Enforcement.
- Security Compliance.