
Asset Discovery
- API-powered asset discovery
- Network asset discovery
- Software and services discovery
Vulnerability Assessment
- Network vulnerability scanning
- Cloud vulnerability scanning
- Cloud infrastructure assessment
Intrusion Detection
- Network Intrusion Detection (NIDS)
- Cloud Intrusion Detection
Endpoint Detection and Response
- Host-based Intrusion Detection (HIDS)
- File integrity monitoring
- Continuous endpoint monitoring & proactive querying
Behavioral Monitoring
- Asset access logs
- Cloud access and activity logs (Azure Monitor, AWS: CloudTrail, CloudWatch, S3, ELB)
- AWS VPC Flow monitoring
- VMware ESXi access logs
SIEM & Log Management
- Event correlation
- Log management