Best Software for 2025 is now live!
Save to My Lists
Paid
Claimed
Optimized for quick response

Resolver Features

What are the features of Resolver?

Response

  • Resolution Automation
  • Resolution Guidance
  • System Isolation

Records

  • Incident Logs
  • Incident Reports
  • Resource Usage

Management

  • Incident Alerts
  • Database Management
  • Workflow Management

Case Management

  • Intake
  • Assignment
  • Escalation

Analytics

  • Monitoring
  • Metrics
  • Compliance

Filter for Features

Orchestration

Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies. This feature was mentioned in 11 Resolver reviews.
68%
(Based on 11 reviews)

Security Workflow Automation

Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. This feature was mentioned in 12 Resolver reviews.
68%
(Based on 12 reviews)

Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. 11 reviewers of Resolver have provided feedback on this feature.
73%
(Based on 11 reviews)

Sandboxing

Based on 13 Resolver reviews. A feature that allows security testing and information gathering to occur in a secure, resource independent environment.
91%
(Based on 13 reviews)

Information

Proactive Alerts

As reported in 11 Resolver reviews. Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.
48%
(Based on 11 reviews)

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Intelligence Reports

The ability for users to produce reports outlining detailed and personalized threat information This feature was mentioned in 11 Resolver reviews.
79%
(Based on 11 reviews)

Personalization

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data

Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge. 10 reviewers of Resolver have provided feedback on this feature.
63%
(Based on 10 reviews)

Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

Not enough data

Response

Resolution Automation

As reported in 45 Resolver reviews. Diagnose and resolve incidents without the need for human interaction.
63%
(Based on 45 reviews)

Resolution Guidance

Based on 45 Resolver reviews. Guide users through the resolution process and give specific instructions to remedy individual occurrences.
69%
(Based on 45 reviews)

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied. This feature was mentioned in 44 Resolver reviews.
65%
(Based on 44 reviews)

Threat Intelligence

Gathers information related to threats in order to gain further information on remedies. This feature was mentioned in 42 Resolver reviews.
59%
(Based on 42 reviews)

Records

Incident Logs

Based on 58 Resolver reviews. Information on each incident is stored in databases for user reference and analytics.
84%
(Based on 58 reviews)

Incident Reports

As reported in 58 Resolver reviews. Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
79%
(Based on 58 reviews)

Resource Usage

Analyzes recurring incidents and remedies to ensure optimal resource usage. This feature was mentioned in 51 Resolver reviews.
72%
(Based on 51 reviews)

Management

Incident Alerts

Based on 53 Resolver reviews. Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
75%
(Based on 53 reviews)

Database Management

Adminstrators can access and organize data related to incidents to produce reports or make data more navigable. This feature was mentioned in 54 Resolver reviews.
81%
(Based on 54 reviews)

Workflow Management

Administrators can organize workflows to guide remedies to specific situations incident types. This feature was mentioned in 54 Resolver reviews.
83%
(Based on 54 reviews)

Case Management

Intake

Based on 54 Resolver reviews. Capture case information from multiple communication channels
81%
(Based on 54 reviews)

Assignment

Deliver rules to assign cases based on type and priority This feature was mentioned in 55 Resolver reviews.
85%
(Based on 55 reviews)

Escalation

Based on 53 Resolver reviews. Ability to escalate cases using workflows
81%
(Based on 53 reviews)

Analytics

Monitoring

Track all activities related to a case, including audit trails 53 reviewers of Resolver have provided feedback on this feature.
80%
(Based on 53 reviews)

Metrics

As reported in 53 Resolver reviews. Provide metrics to track case progress or success rates
80%
(Based on 53 reviews)

Compliance

Based on 51 Resolver reviews. Monitor various types of case compliance
80%
(Based on 51 reviews)

Risk Analysis

Risk Scoring

Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.

Not enough data

Reporting

Creates reports outlining log activity and relevant metrics.

Not enough data

Risk-Prioritization

Allows for vulnerability ranking by customized risk and threat priorities.

Not enough data

Vulnerability Assesment

Vulnerability Scanning

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.

Not enough data

Vulnerability Intelligence

Stores information related to common vulnerabilities and how to resolve them once incidents occur.

Not enough data

Contextual Data

Identify risk data attributes such as description, category, owner, or hierarchy.

Not enough data

Dashboards

Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.

Not enough data

Automation

Automated Remediation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Workflow Automation

Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.

Not enough data

Security Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data

Test Automation

Runs pre-scripted vulnerability scans and security tests without requiring manual work.

Not enough data

Audit Management

Audit Types

Based on 21 Resolver reviews and verified by the G2 Product R&D team. Define different types of audits such as regular, ad-hoc, or industry-specific.
74%
(Based on 21 reviews)

Validation Rules

Based on 20 Resolver reviews and verified by the G2 Product R&D team. Provide rules that can be used to validate audits based on predefined criteria.
69%
(Based on 20 reviews)

Templates & Forms

Based on 22 Resolver reviews and verified by the G2 Product R&D team. Provide out of the box audit templates and forms for various processes and industries.
76%
(Based on 22 reviews)

Checklists

Auditors can use checklists for multiple processes, both online and offline. 18 reviewers of Resolver have provided feedback on this feature.
70%
(Based on 18 reviews)

Audit Trail

Based on 22 Resolver reviews and verified by the G2 Product R&D team. Displays all the changes made during audits, including details such as username, timestamp, or type of change.
83%
(Based on 22 reviews)

Regulatory Change Management

Content Library

Based on 26 Resolver reviews and verified by the G2 Product R&D team. Create and maintain a library of regulatory content for compliance purposes.
79%
(Based on 26 reviews)

Updates

Based on 25 Resolver reviews and verified by the G2 Product R&D team. Ability to maintain regulatory content and documents up to date.
79%
(Based on 25 reviews)

Action Plans

Based on 25 Resolver reviews and verified by the G2 Product R&D team. Define and implement corrective and preventive action plans for regulatory change.
80%
(Based on 25 reviews)

Tests

Based on 24 Resolver reviews and verified by the G2 Product R&D team. Include models and tools to perform internal tests that simulate regulatory controls.
73%
(Based on 24 reviews)

Impact Analysis

Based on 20 Resolver reviews and verified by the G2 Product R&D team. Estimate the impact of regulatory changes on the operations of the company.
78%
(Based on 20 reviews)

Risk Management

Risk Identification

Based on 24 Resolver reviews and verified by the G2 Product R&D team. Identify various risk factors such as the inadequate use of technology, human factor, or external risks.
87%
(Based on 24 reviews)

Risk Classification

Based on 24 Resolver reviews and verified by the G2 Product R&D team. Ability to classify risks based on risk type, severity, and custom criteria.
88%
(Based on 24 reviews)

Risk Methodology

Based on 23 Resolver reviews and verified by the G2 Product R&D team. Support for various methodologies and frameworks for risk management.
86%
(Based on 23 reviews)

Goals Monitoring

Based on 23 Resolver reviews and verified by the G2 Product R&D team. Monitor risk management performance against goals and objectives.
75%
(Based on 23 reviews)

Third Party & Supplier Risk Management

Supplier Scoring

Based on 19 Resolver reviews and verified by the G2 Product R&D team. Users can assign scores to suppliers based on the estimated risk of doing business with them.
55%
(Based on 19 reviews)

Business Continuity Management

Recovery Plans

Based on 18 Resolver reviews and verified by the G2 Product R&D team. Ability to create and compare recovery plans using standard out of the box templates.
67%
(Based on 18 reviews)

Platform

Integration

Based on 19 Resolver reviews and verified by the G2 Product R&D team. Delivers APIs and standard integrations with other software systems.
69%
(Based on 19 reviews)

Security & Privacy

Based on 24 Resolver reviews and verified by the G2 Product R&D team. Complies with security and privacy regulations and standards.
85%
(Based on 24 reviews)

Mobile Access

Based on 21 Resolver reviews and verified by the G2 Product R&D team. Allows users to access the software using mobile devices.
55%
(Based on 21 reviews)

Flexibility

Based on 24 Resolver reviews and verified by the G2 Product R&D team. Facilitates software configuration without the need for technical experise.
76%
(Based on 24 reviews)

Reporting and Analytics

Produces summative reports for threats, and creates threat trend analysis using historical data.

Not enough data

Connections and Integrations

Connects to a variety of software and hardware, including IoT devices, vehicles, and other public and private databases.

Not enough data

Collaboration Tools

Offers communication, workflow, and dashboard customizations to support collaborative response on multiple threats.

Not enough data

Services

Implementation

Based on 24 Resolver reviews and verified by the G2 Product R&D team. Assists customes through all the phases of the implementation process.
81%
(Based on 24 reviews)

Training & Learning

Based on 25 Resolver reviews and verified by the G2 Product R&D team. Provides software users with training courses and learning content.
78%
(Based on 25 reviews)

Customer Support

Based on 26 Resolver reviews and verified by the G2 Product R&D team. Delivers customer and technical support, directly or trough partners.
89%
(Based on 26 reviews)

Professional Services

Based on 22 Resolver reviews and verified by the G2 Product R&D team. The vendor provides consulting services such as business process reengineering.
87%
(Based on 22 reviews)

Monitoring & Listening

Social Measurement

Measure campaigns, brands, and products for quantitative metrics such as conversation volume, when conversations are happening, and your brand's share of voice.

Not enough data

Influencer Identification

Identifies who is talking about your brand along with their influence over social communities.

Not enough data

Brand Monitoring

Monitors social media channels for brand mentions and reports on the quality and quantity of conversations about a brand or product.

Not enough data

Keyword Tracking

Provides features for monitoring multiple keywords, topics, or hashtags, with the ability to increase the number of terms being tracked.

Not enough data

Trend Analysis

Identifies and analyzes trends in topics, hashtags, or audiences to help brands anticipate changes in consumer attitudes.

Not enough data

Competitor Analysis

Allows users to monitor conversations about competitors and measure performance against them.

Not enough data

Data Management & Analysis

Sentiment Analysis

Determines whether mentions of your brand are positive, negative or neutral.

Not enough data

Social Reporting

Access custom reports and dashboards to measure social activity and engagement opportunities. Allows users to export data and graphs into various formats.

Not enough data

Alerts and Notifications

Self-monitors important metrics and sends notifications to users in-app or through email, text message or otherwise.

Not enough data

Advanced Data Filtering

Provides advanced data filtering capabilities to help users drill down, sort, filter, aggregate, and group social listening data.

Not enough data

Threat Monitoring

Threat Alerts

Allows real-time rules and alerts to be triggered based on pre-set criteria.

Not enough data

Continuous Monitoring

Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.

Not enough data

Investigation Management

Provides customizable investigation workflows, data governance, and audit tracking to support threat investigation and mitigation, for both safety and legal reasons.

Not enough data

Threat Assessment

Graphical and Link Analysis

Allows users to visually link connections and relationships, and utlize graphs, GIS, and maps to identify trends more easily.

Not enough data

Threat Scoring

Allows threat methodology to be applied to individual threats to assess their priority.

Not enough data

Threat Identification

Proactive Listening

Continuously monitors various social media channels, deep and dark web, and situational signals to proactively identify potential threats.

Not enough data

External Data Mining

Compiles data from various public research databases, including OSINT, public records, and criminal and civil records.

Not enough data

POI Profiles

Enables users to create individual records for persons of interest, pulling in data from connected systems as well as user input.

Not enough data

Threat Reporting

Offers a public and/or private portal to collect tips and reports about potential threats.

Not enough data

Risk Assessment

Content

Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology).

Not enough data

Contracts

Ability to review supplier contracts and identify critical requirements or potential risks.

Not enough data

Scoring

Users can assign scores to suppliers based on the estimated risk of doing business with them.

Not enough data

Risk Control

Reviews

Review vendor contracts and profiles to ensure compliance with regulation and internal policies.

Not enough data

Policies

Manage and enforce internal policies related to vendor risk management and controls.

Not enough data

Workflows

Provide workflows to mitigate risk and escalate issues proactively.

Not enough data

Monitoring

Vendor Performance

Track vendor performance using supplier data such as a history of transactions and contracts.

Not enough data

Notifications

Send alerts and notifications when corrective actions are needed to address supplier risk.

Not enough data

Oversight

Perform ongoing due diligence activities to auto calculate overall risk for each vendor.

Not enough data

Reporting

KPIs

Track vendor risk KPIs such as the time it takes vendors to respond to security incidents.

Not enough data

Templates

Include reporting templates for activities such as audits and vendor evaluation.

Not enough data

Centralized Data

Consolidate data from multiple systems that manage supplier information.

Not enough data

360 View

Provide a 360 view of suppliers which can be shared with internal or external users.

Not enough data

Moderation - Content Moderation Tools

Text Moderation

Automatically analyzes text for non-compliant or inapproriate content.

Not enough data

User Violation Enforcement

Detects and takes action against users who violate content guidelines.

Not enough data

Audio Moderation

Automatically analyzes audio for non-compliant or inapproriate content.

Not enough data

Image/Video Moderation

Automatically analyzes images and videos for non-compliant or inapproriate content.

Not enough data

Platform - Content Moderation Tools

Toxicity Detection

Automatically detects profanity, spam, threats, and other harmful content.

Not enough data

Custom AI Model

Allows users to train custom AI models for specific use cases.

Not enough data

Analytics and Reporting

Provides insights on content performance and/or user behavior .

Not enough data

Dashboard

Provides a dashboard to monitor and manage all moderation processes.

Not enough data

Customization

Allows user to create customized moderation rules.

Not enough data

Workflows - Audit Management

Audit Trail

Displays all the changes made during audits, including details such as username, timestamp, or type of change in a centralized repository. 16 reviewers of Resolver have provided feedback on this feature.
81%
(Based on 16 reviews)

Recommendations

Based on 16 Resolver reviews. Coordinate and track recommended remediation actions.
83%
(Based on 16 reviews)

Collaboration Tools

As reported in 16 Resolver reviews. Facilitates collaboration between teams and stakeholders through shared workspaces.
74%
(Based on 16 reviews)

Integrations

Integrates with risk management platforms, GRC tools, and other systems. This feature was mentioned in 16 Resolver reviews.
73%
(Based on 16 reviews)

Planning & Scheduling

Facilitates the creation of audit plans, schedules, and reminders. 16 reviewers of Resolver have provided feedback on this feature.
73%
(Based on 16 reviews)

Documentation - Audit Management

Templates & Forms

As reported in 15 Resolver reviews. Provide out of the box audit templates and forms for various processes and industries.
79%
(Based on 15 reviews)

Checklists

Based on 16 Resolver reviews. Provides checklists
69%
(Based on 16 reviews)

Reporting & Analytics - Audit Management

Dashboard

Dashboard provides real time or near real time updates and notifications in a centralized location. This feature was mentioned in 16 Resolver reviews.
84%
(Based on 16 reviews)

Audit Performance

As reported in 16 Resolver reviews. Provide information on the performance of the audit activities and processes.
78%
(Based on 16 reviews)

Industry Compliance

Ensures audits are compliant with industry-specific regulations and standards. This feature was mentioned in 16 Resolver reviews.
71%
(Based on 16 reviews)