CYRISMA Features
What are the features of CYRISMA?
Performance
- Issue Tracking
- Detection Rate
- False Positives
- Automated Scans
Network
- Compliance Testing
- Perimeter Scanning
- Configuration Monitoring
Risk Analysis
- Risk Scoring
- Reporting
- Risk-Prioritization
Vulnerability Assesment
- Vulnerability Scanning
- Vulnerability Intelligence
- Contextual Data
- Dashboards
Automation
- Test Automation
Top Rated CYRISMA Alternatives
CYRISMA Categories on G2
Filter for Features
Performance
Issue Tracking | As reported in 30 CYRISMA reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | 83% (Based on 30 reviews) | |
Detection Rate | Based on 34 CYRISMA reviews. The rate at which scans accurately detect all vulnerabilities associated with the target. | 86% (Based on 34 reviews) | |
False Positives | The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. 32 reviewers of CYRISMA have provided feedback on this feature. | 80% (Based on 32 reviews) | |
Automated Scans | As reported in 32 CYRISMA reviews. Runs pre-scripted vulnerability scans without requiring manual work. | 87% (Based on 32 reviews) |
Network
Compliance Testing | Based on 30 CYRISMA reviews. Allows users to scan applications and networks for specific compliance requirements. | 82% (Based on 30 reviews) | |
Perimeter Scanning | Analyzes network devices, servers and operating systems for vulnerabilities. This feature was mentioned in 33 CYRISMA reviews. | 85% (Based on 33 reviews) | |
Configuration Monitoring | Based on 28 CYRISMA reviews and verified by the G2 Product R&D team. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | 79% (Based on 28 reviews) |
Application
Black Box Testing | Scans functional applications externally for vulnerabilities like SQL injection or XSS. This feature was mentioned in 22 CYRISMA reviews. | 76% (Based on 22 reviews) |
Risk Analysis
Risk Scoring | Based on 25 CYRISMA reviews. Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches. | 90% (Based on 25 reviews) | |
Reporting | As reported in 28 CYRISMA reviews. Creates reports outlining log activity and relevant metrics. | 83% (Based on 28 reviews) | |
Risk-Prioritization | As reported in 26 CYRISMA reviews. Allows for vulnerability ranking by customized risk and threat priorities. | 85% (Based on 26 reviews) |
Vulnerability Assesment
Vulnerability Scanning | As reported in 29 CYRISMA reviews. Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. | 90% (Based on 29 reviews) | |
Vulnerability Intelligence | As reported in 29 CYRISMA reviews. Stores information related to common vulnerabilities and how to resolve them once incidents occur. | 88% (Based on 29 reviews) | |
Contextual Data | As reported in 26 CYRISMA reviews. Identify risk data attributes such as description, category, owner, or hierarchy. | 79% (Based on 26 reviews) | |
Dashboards | Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data. This feature was mentioned in 29 CYRISMA reviews. | 83% (Based on 29 reviews) |
Automation
Workflow Automation | Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. 23 reviewers of CYRISMA have provided feedback on this feature. | 75% (Based on 23 reviews) | |
Test Automation | As reported in 23 CYRISMA reviews. Runs pre-scripted vulnerability scans and security tests without requiring manual work. | 75% (Based on 23 reviews) |
Functionality
Structure type | As reported in 14 CYRISMA reviews. Searches structured, semi-structured, and unstructured data for sensitive data. | 82% (Based on 14 reviews) | |
Contextual search | Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. This feature was mentioned in 15 CYRISMA reviews. | 82% (Based on 15 reviews) | |
Template algorithms | Has template rules and pattern matching algorithms (PII, PCI, PHI and more) 13 reviewers of CYRISMA have provided feedback on this feature. | 82% (Based on 13 reviews) | |
Custom algorithms | As reported in 12 CYRISMA reviews. Offers the option to create custom templates and rules based on department, user type and data type. | 75% (Based on 12 reviews) | |
False-positive management | Based on 17 CYRISMA reviews. Offers false-positive management functions | 76% (Based on 17 reviews) | |
Multiple file and location types | Based on 18 CYRISMA reviews. Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) | 86% (Based on 18 reviews) | |
Dashboard | As reported in 20 CYRISMA reviews. Offers a dashboard showing specific location of sensitive data. | 88% (Based on 20 reviews) | |
Compliance | Based on 18 CYRISMA reviews. Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. | 81% (Based on 18 reviews) | |
Reporting | As reported in 20 CYRISMA reviews. Offers reporting functionality. | 83% (Based on 20 reviews) | |
Monitoring - Deep Web | As reported in 11 CYRISMA reviews. Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web. | 74% (Based on 11 reviews) | |
Monitoring - Dark Web | Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums. 11 reviewers of CYRISMA have provided feedback on this feature. | 79% (Based on 11 reviews) | |
Analysis | Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations. This feature was mentioned in 11 CYRISMA reviews. | 70% (Based on 11 reviews) | |
Ticketing | Integrates into ticketing or CRM platforms via API integrations. This feature was mentioned in 10 CYRISMA reviews. | 58% (Based on 10 reviews) | |
Simple Search | Search through real-time and historical data without using technical query language. This feature was mentioned in 10 CYRISMA reviews. | 65% (Based on 10 reviews) | |
Leak Source | As reported in 10 CYRISMA reviews. Provides additional context and analysis to help identify the source of leaked information. | 60% (Based on 10 reviews) | |
Centralized Dashboard | Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software. This feature was mentioned in 10 CYRISMA reviews. | 83% (Based on 10 reviews) | |
Real-Time Alerts | As reported in 10 CYRISMA reviews. Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts. | 75% (Based on 10 reviews) |