Metomic Features
What are the features of Metomic?
Administration
- Reporting
Governance
- Data Visibility
Top Rated Metomic Alternatives
(153)
4.6 out of 5
Visit Website
Sponsored
Metomic Categories on G2
Filter for Features
Administration
Data Management | Administrators can access and organize data related to incidents to produce reports or make data more navigable. | Not enough data | |
Incident Logs | Information on each incident is stored in databases for user reference and analytics. | Not enough data | |
Reporting | Based on 10 Metomic reviews. Produces reports detailing trends and vulnerabilities related to bot management and performance. | 90% (Based on 10 reviews) | |
Auditing | Documents access and alterations of the database for analytics and reporting. | Not enough data | |
Data Discovery | Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. | Not enough data | |
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data |
Governance
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Data Visibility | Similifies data identification to increase visibility and management capabilities 10 reviewers of Metomic have provided feedback on this feature. | 93% (Based on 10 reviews) |
Security
Encryption | Protects data with within and as it leaves your secure or local network. | Not enough data | |
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Activity Monitoring | Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. | Not enough data | |
Breach Detection | Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks. | Not enough data | |
Sensitive Data Discovery | Discovers where sensitive data resides in SaaS environments and identifies users with access to it | Not enough data | |
Data Movement Monitoring | Monitors how sensitive data moves across different applications | Not enough data | |
Automatic Remediation | Automatically determines the best set of actions to be taken upon detecting SaaS security issues. | Not enough data | |
Dashboard | Offers dashboards that show information about unauthorized users, potential threats, and remediation actions | Not enough data |
Data Protection
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. | Not enough data | |
Data Encryption/Security | Manages policies for user data access and data encryption. | Not enough data | |
Data loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | Not enough data | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data |
Analysis
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. | Not enough data | |
User Analytics | Allows for reporting and documentation of individual user behavior and privileges. | Not enough data |
Functionality
Structure type | Searches structured, semi-structured, and unstructured data for sensitive data. | Not enough data | |
Contextual search | Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. | Not enough data | |
Template algorithms | Has template rules and pattern matching algorithms (PII, PCI, PHI and more) | Not enough data | |
Custom algorithms | Offers the option to create custom templates and rules based on department, user type and data type. | Not enough data | |
False-positive management | Offers false-positive management functions | Not enough data | |
Multiple file and location types | Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) | Not enough data | |
Real-time monitoring | Monitors data stores in real-time searching for newly created sensitive data. | Not enough data | |
Dashboard | Offers a dashboard showing specific location of sensitive data. | Not enough data | |
Compliance | Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. | Not enough data | |
Reporting | Offers reporting functionality. | Not enough data | |
Silent Deploy | Silently deploys on endpoints without alerting users. | Not enough data | |
Detect Data Movement | Detects data movement to external USBs or external drives or uploaded to cloud storage or emails and excessive printer-usage. | Not enough data | |
File and Application Activity | Tracks activities taken on files or in applications, including save, print, or delete actions. | Not enough data | |
Trigger Alerts | Sends alerts to administrators when users take insider threat actions . | Not enough data | |
Searchable Evidence | Maintains active and historical evidence in a searchable format. | Not enough data | |
Risk Scoring | Provides risk scoring for suspicious activity. | Not enough data |
Monitoring
Screen Recording | Records video or screenshots of endpoint sessions. | Not enough data | |
Keystroke Logging | Logs keystrokes of users. | Not enough data | |
Sentiment Analysis | Analyzes user writing patterns to determine sentiment changes to identify disgruntled workers. | Not enough data | |
Automatic Misconfiguration Discovery | Continuously monitors misconfigurations in SaaS applications environment | Not enough data | |
User Permission Monitoring | Monitors user permissions settings and flags excessive permissions | Not enough data | |
Compliance Risk Monitoring | Detects and fixes compliance issues with regard to different security frameworks | Not enough data |