Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed

CYRISMA Features

What are the features of CYRISMA?

Performance

  • Issue Tracking
  • Detection Rate
  • False Positives
  • Automated Scans

Network

  • Compliance Testing
  • Perimeter Scanning
  • Configuration Monitoring

Risk Analysis

  • Risk Scoring
  • Reporting
  • Risk-Prioritization

Vulnerability Assesment

  • Vulnerability Scanning
  • Vulnerability Intelligence
  • Contextual Data
  • Dashboards

Automation

  • Test Automation

Filter for Features

Performance

Issue Tracking

As reported in 30 CYRISMA reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
83%
(Based on 30 reviews)

Detection Rate

Based on 34 CYRISMA reviews. The rate at which scans accurately detect all vulnerabilities associated with the target.
86%
(Based on 34 reviews)

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. 32 reviewers of CYRISMA have provided feedback on this feature.
80%
(Based on 32 reviews)

Automated Scans

As reported in 32 CYRISMA reviews. Runs pre-scripted vulnerability scans without requiring manual work.
87%
(Based on 32 reviews)

Network

Compliance Testing

Based on 30 CYRISMA reviews. Allows users to scan applications and networks for specific compliance requirements.
82%
(Based on 30 reviews)

Perimeter Scanning

Analyzes network devices, servers and operating systems for vulnerabilities. This feature was mentioned in 33 CYRISMA reviews.
85%
(Based on 33 reviews)

Configuration Monitoring

Based on 28 CYRISMA reviews and verified by the G2 Product R&D team. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
79%
(Based on 28 reviews)

Application

Black Box Testing

Scans functional applications externally for vulnerabilities like SQL injection or XSS. This feature was mentioned in 22 CYRISMA reviews.
76%
(Based on 22 reviews)

Risk Analysis

Risk Scoring

Based on 25 CYRISMA reviews. Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
90%
(Based on 25 reviews)

Reporting

As reported in 28 CYRISMA reviews. Creates reports outlining log activity and relevant metrics.
83%
(Based on 28 reviews)

Risk-Prioritization

As reported in 26 CYRISMA reviews. Allows for vulnerability ranking by customized risk and threat priorities.
85%
(Based on 26 reviews)

Vulnerability Assesment

Vulnerability Scanning

As reported in 29 CYRISMA reviews. Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
90%
(Based on 29 reviews)

Vulnerability Intelligence

As reported in 29 CYRISMA reviews. Stores information related to common vulnerabilities and how to resolve them once incidents occur.
88%
(Based on 29 reviews)

Contextual Data

As reported in 26 CYRISMA reviews. Identify risk data attributes such as description, category, owner, or hierarchy.
79%
(Based on 26 reviews)

Dashboards

Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data. This feature was mentioned in 29 CYRISMA reviews.
83%
(Based on 29 reviews)

Automation

Workflow Automation

Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. 23 reviewers of CYRISMA have provided feedback on this feature.
75%
(Based on 23 reviews)

Test Automation

As reported in 23 CYRISMA reviews. Runs pre-scripted vulnerability scans and security tests without requiring manual work.
75%
(Based on 23 reviews)

Functionality

Structure type

As reported in 14 CYRISMA reviews. Searches structured, semi-structured, and unstructured data for sensitive data.
82%
(Based on 14 reviews)

Contextual search

Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. This feature was mentioned in 15 CYRISMA reviews.
82%
(Based on 15 reviews)

Template algorithms

Has template rules and pattern matching algorithms (PII, PCI, PHI and more) 13 reviewers of CYRISMA have provided feedback on this feature.
82%
(Based on 13 reviews)

Custom algorithms

As reported in 12 CYRISMA reviews. Offers the option to create custom templates and rules based on department, user type and data type.
75%
(Based on 12 reviews)

False-positive management

Based on 17 CYRISMA reviews. Offers false-positive management functions
76%
(Based on 17 reviews)

Multiple file and location types

Based on 18 CYRISMA reviews. Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.)
86%
(Based on 18 reviews)

Dashboard

As reported in 20 CYRISMA reviews. Offers a dashboard showing specific location of sensitive data.
88%
(Based on 20 reviews)

Compliance

Based on 18 CYRISMA reviews. Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others.
81%
(Based on 18 reviews)

Reporting

As reported in 20 CYRISMA reviews. Offers reporting functionality.
83%
(Based on 20 reviews)

Monitoring - Deep Web

As reported in 11 CYRISMA reviews. Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web.
74%
(Based on 11 reviews)

Monitoring - Dark Web

Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums. 11 reviewers of CYRISMA have provided feedback on this feature.
79%
(Based on 11 reviews)

Analysis

Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations. This feature was mentioned in 11 CYRISMA reviews.
70%
(Based on 11 reviews)

Ticketing

Integrates into ticketing or CRM platforms via API integrations. This feature was mentioned in 10 CYRISMA reviews.
58%
(Based on 10 reviews)

Simple Search

Search through real-time and historical data without using technical query language. This feature was mentioned in 10 CYRISMA reviews.
65%
(Based on 10 reviews)

Leak Source

As reported in 10 CYRISMA reviews. Provides additional context and analysis to help identify the source of leaked information.
60%
(Based on 10 reviews)

Centralized Dashboard

Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software. This feature was mentioned in 10 CYRISMA reviews.
83%
(Based on 10 reviews)

Real-Time Alerts

As reported in 10 CYRISMA reviews. Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.
75%
(Based on 10 reviews)