Resolver Features
What are the features of Resolver?
Response
- Resolution Automation
- Resolution Guidance
- System Isolation
Records
- Incident Logs
- Incident Reports
- Resource Usage
Management
- Incident Alerts
- Database Management
- Workflow Management
Case Management
- Intake
- Assignment
- Escalation
Analytics
- Monitoring
- Metrics
- Compliance
Top Rated Resolver Alternatives
Filter for Features
Orchestration
Asset Management | Lets users group and organize their endpoints to gather threat intelligence on specific technologies. This feature was mentioned in 11 Resolver reviews. | 68% (Based on 11 reviews) | |
Security Workflow Automation | Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. This feature was mentioned in 12 Resolver reviews. | 68% (Based on 12 reviews) | |
Deployment | The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. 11 reviewers of Resolver have provided feedback on this feature. | 73% (Based on 11 reviews) | |
Sandboxing | Based on 13 Resolver reviews. A feature that allows security testing and information gathering to occur in a secure, resource independent environment. | 91% (Based on 13 reviews) |
Information
Proactive Alerts | As reported in 11 Resolver reviews. Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. | 48% (Based on 11 reviews) | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data | |
Intelligence Reports | The ability for users to produce reports outlining detailed and personalized threat information This feature was mentioned in 11 Resolver reviews. | 79% (Based on 11 reviews) |
Personalization
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Security Validation | The product has a recurring examination process to update your intelligence reports as new threats emerge. 10 reviewers of Resolver have provided feedback on this feature. | 63% (Based on 10 reviews) | |
Dynamic/Code Analysis | The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities. | Not enough data |
Response
Resolution Automation | As reported in 45 Resolver reviews. Diagnose and resolve incidents without the need for human interaction. | 63% (Based on 45 reviews) | |
Resolution Guidance | Based on 45 Resolver reviews. Guide users through the resolution process and give specific instructions to remedy individual occurrences. | 69% (Based on 45 reviews) | |
System Isolation | Cuts off network connection or temporarily inactivate applications until incidents are remedied. This feature was mentioned in 44 Resolver reviews. | 65% (Based on 44 reviews) | |
Threat Intelligence | Gathers information related to threats in order to gain further information on remedies. This feature was mentioned in 42 Resolver reviews. | 59% (Based on 42 reviews) |
Records
Incident Logs | Based on 58 Resolver reviews. Information on each incident is stored in databases for user reference and analytics. | 84% (Based on 58 reviews) | |
Incident Reports | As reported in 58 Resolver reviews. Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | 79% (Based on 58 reviews) | |
Resource Usage | Analyzes recurring incidents and remedies to ensure optimal resource usage. This feature was mentioned in 51 Resolver reviews. | 72% (Based on 51 reviews) |
Management
Incident Alerts | Based on 53 Resolver reviews. Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | 75% (Based on 53 reviews) | |
Database Management | Adminstrators can access and organize data related to incidents to produce reports or make data more navigable. This feature was mentioned in 54 Resolver reviews. | 81% (Based on 54 reviews) | |
Workflow Management | Administrators can organize workflows to guide remedies to specific situations incident types. This feature was mentioned in 54 Resolver reviews. | 83% (Based on 54 reviews) |
Case Management
Intake | Based on 54 Resolver reviews. Capture case information from multiple communication channels | 81% (Based on 54 reviews) | |
Assignment | Deliver rules to assign cases based on type and priority This feature was mentioned in 55 Resolver reviews. | 85% (Based on 55 reviews) | |
Escalation | Based on 53 Resolver reviews. Ability to escalate cases using workflows | 81% (Based on 53 reviews) |
Analytics
Monitoring | Track all activities related to a case, including audit trails 53 reviewers of Resolver have provided feedback on this feature. | 80% (Based on 53 reviews) | |
Metrics | As reported in 53 Resolver reviews. Provide metrics to track case progress or success rates | 80% (Based on 53 reviews) | |
Compliance | Based on 51 Resolver reviews. Monitor various types of case compliance | 80% (Based on 51 reviews) |
Risk Analysis
Risk Scoring | Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches. | Not enough data | |
Reporting | Creates reports outlining log activity and relevant metrics. | Not enough data | |
Risk-Prioritization | Allows for vulnerability ranking by customized risk and threat priorities. | Not enough data |
Vulnerability Assesment
Vulnerability Scanning | Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. | Not enough data | |
Vulnerability Intelligence | Stores information related to common vulnerabilities and how to resolve them once incidents occur. | Not enough data | |
Contextual Data | Identify risk data attributes such as description, category, owner, or hierarchy. | Not enough data | |
Dashboards | Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data. | Not enough data |
Automation
Automated Remediation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Workflow Automation | Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. | Not enough data | |
Security Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Test Automation | Runs pre-scripted vulnerability scans and security tests without requiring manual work. | Not enough data |
Audit Management
Audit Types | Based on 21 Resolver reviews and verified by the G2 Product R&D team. Define different types of audits such as regular, ad-hoc, or industry-specific. | 74% (Based on 21 reviews) | |
Validation Rules | Based on 20 Resolver reviews and verified by the G2 Product R&D team. Provide rules that can be used to validate audits based on predefined criteria. | 69% (Based on 20 reviews) | |
Templates & Forms | Based on 22 Resolver reviews and verified by the G2 Product R&D team. Provide out of the box audit templates and forms for various processes and industries. | 76% (Based on 22 reviews) | |
Checklists | Auditors can use checklists for multiple processes, both online and offline. 18 reviewers of Resolver have provided feedback on this feature. | 70% (Based on 18 reviews) | |
Audit Trail | Based on 22 Resolver reviews and verified by the G2 Product R&D team. Displays all the changes made during audits, including details such as username, timestamp, or type of change. | 83% (Based on 22 reviews) |
Regulatory Change Management
Content Library | Based on 26 Resolver reviews and verified by the G2 Product R&D team. Create and maintain a library of regulatory content for compliance purposes. | 79% (Based on 26 reviews) | |
Updates | Based on 25 Resolver reviews and verified by the G2 Product R&D team. Ability to maintain regulatory content and documents up to date. | 79% (Based on 25 reviews) | |
Action Plans | Based on 25 Resolver reviews and verified by the G2 Product R&D team. Define and implement corrective and preventive action plans for regulatory change. | 80% (Based on 25 reviews) | |
Tests | Based on 24 Resolver reviews and verified by the G2 Product R&D team. Include models and tools to perform internal tests that simulate regulatory controls. | 73% (Based on 24 reviews) | |
Impact Analysis | Based on 20 Resolver reviews and verified by the G2 Product R&D team. Estimate the impact of regulatory changes on the operations of the company. | 78% (Based on 20 reviews) |
Risk Management
Risk Identification | Based on 24 Resolver reviews and verified by the G2 Product R&D team. Identify various risk factors such as the inadequate use of technology, human factor, or external risks. | 87% (Based on 24 reviews) | |
Risk Classification | Based on 24 Resolver reviews and verified by the G2 Product R&D team. Ability to classify risks based on risk type, severity, and custom criteria. | 88% (Based on 24 reviews) | |
Risk Methodology | Based on 23 Resolver reviews and verified by the G2 Product R&D team. Support for various methodologies and frameworks for risk management. | 86% (Based on 23 reviews) | |
Goals Monitoring | Based on 23 Resolver reviews and verified by the G2 Product R&D team. Monitor risk management performance against goals and objectives. | 75% (Based on 23 reviews) |
Third Party & Supplier Risk Management
Supplier Scoring | Based on 19 Resolver reviews and verified by the G2 Product R&D team. Users can assign scores to suppliers based on the estimated risk of doing business with them. | 55% (Based on 19 reviews) |
Business Continuity Management
Recovery Plans | Based on 18 Resolver reviews and verified by the G2 Product R&D team. Ability to create and compare recovery plans using standard out of the box templates. | 67% (Based on 18 reviews) |
Platform
Integration | Based on 19 Resolver reviews and verified by the G2 Product R&D team. Delivers APIs and standard integrations with other software systems. | 69% (Based on 19 reviews) | |
Security & Privacy | Based on 24 Resolver reviews and verified by the G2 Product R&D team. Complies with security and privacy regulations and standards. | 85% (Based on 24 reviews) | |
Mobile Access | Based on 21 Resolver reviews and verified by the G2 Product R&D team. Allows users to access the software using mobile devices. | 55% (Based on 21 reviews) | |
Flexibility | Based on 24 Resolver reviews and verified by the G2 Product R&D team. Facilitates software configuration without the need for technical experise. | 76% (Based on 24 reviews) | |
Reporting and Analytics | Produces summative reports for threats, and creates threat trend analysis using historical data. | Not enough data | |
Connections and Integrations | Connects to a variety of software and hardware, including IoT devices, vehicles, and other public and private databases. | Not enough data | |
Collaboration Tools | Offers communication, workflow, and dashboard customizations to support collaborative response on multiple threats. | Not enough data |
Services
Implementation | Based on 24 Resolver reviews and verified by the G2 Product R&D team. Assists customes through all the phases of the implementation process. | 81% (Based on 24 reviews) | |
Training & Learning | Based on 25 Resolver reviews and verified by the G2 Product R&D team. Provides software users with training courses and learning content. | 78% (Based on 25 reviews) | |
Customer Support | Based on 26 Resolver reviews and verified by the G2 Product R&D team. Delivers customer and technical support, directly or trough partners. | 89% (Based on 26 reviews) | |
Professional Services | Based on 22 Resolver reviews and verified by the G2 Product R&D team. The vendor provides consulting services such as business process reengineering. | 87% (Based on 22 reviews) |
Monitoring & Listening
Social Measurement | Measure campaigns, brands, and products for quantitative metrics such as conversation volume, when conversations are happening, and your brand's share of voice. | Not enough data | |
Influencer Identification | Identifies who is talking about your brand along with their influence over social communities. | Not enough data | |
Brand Monitoring | Monitors social media channels for brand mentions and reports on the quality and quantity of conversations about a brand or product. | Not enough data | |
Keyword Tracking | Provides features for monitoring multiple keywords, topics, or hashtags, with the ability to increase the number of terms being tracked. | Not enough data | |
Trend Analysis | Identifies and analyzes trends in topics, hashtags, or audiences to help brands anticipate changes in consumer attitudes. | Not enough data | |
Competitor Analysis | Allows users to monitor conversations about competitors and measure performance against them. | Not enough data |
Data Management & Analysis
Sentiment Analysis | Determines whether mentions of your brand are positive, negative or neutral. | Not enough data | |
Social Reporting | Access custom reports and dashboards to measure social activity and engagement opportunities. Allows users to export data and graphs into various formats. | Not enough data | |
Alerts and Notifications | Self-monitors important metrics and sends notifications to users in-app or through email, text message or otherwise. | Not enough data | |
Advanced Data Filtering | Provides advanced data filtering capabilities to help users drill down, sort, filter, aggregate, and group social listening data. | Not enough data |
Threat Monitoring
Threat Alerts | Allows real-time rules and alerts to be triggered based on pre-set criteria. | Not enough data | |
Continuous Monitoring | Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response. | Not enough data | |
Investigation Management | Provides customizable investigation workflows, data governance, and audit tracking to support threat investigation and mitigation, for both safety and legal reasons. | Not enough data |
Threat Assessment
Graphical and Link Analysis | Allows users to visually link connections and relationships, and utlize graphs, GIS, and maps to identify trends more easily. | Not enough data | |
Threat Scoring | Allows threat methodology to be applied to individual threats to assess their priority. | Not enough data |
Threat Identification
Proactive Listening | Continuously monitors various social media channels, deep and dark web, and situational signals to proactively identify potential threats. | Not enough data | |
External Data Mining | Compiles data from various public research databases, including OSINT, public records, and criminal and civil records. | Not enough data | |
POI Profiles | Enables users to create individual records for persons of interest, pulling in data from connected systems as well as user input. | Not enough data | |
Threat Reporting | Offers a public and/or private portal to collect tips and reports about potential threats. | Not enough data |
Risk Assessment
Content | Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology). | Not enough data | |
Contracts | Ability to review supplier contracts and identify critical requirements or potential risks. | Not enough data | |
Scoring | Users can assign scores to suppliers based on the estimated risk of doing business with them. | Not enough data |
Risk Control
Reviews | Review vendor contracts and profiles to ensure compliance with regulation and internal policies. | Not enough data | |
Policies | Manage and enforce internal policies related to vendor risk management and controls. | Not enough data | |
Workflows | Provide workflows to mitigate risk and escalate issues proactively. | Not enough data |
Monitoring
Vendor Performance | Track vendor performance using supplier data such as a history of transactions and contracts. | Not enough data | |
Notifications | Send alerts and notifications when corrective actions are needed to address supplier risk. | Not enough data | |
Oversight | Perform ongoing due diligence activities to auto calculate overall risk for each vendor. | Not enough data |
Reporting
KPIs | Track vendor risk KPIs such as the time it takes vendors to respond to security incidents. | Not enough data | |
Templates | Include reporting templates for activities such as audits and vendor evaluation. | Not enough data | |
Centralized Data | Consolidate data from multiple systems that manage supplier information. | Not enough data | |
360 View | Provide a 360 view of suppliers which can be shared with internal or external users. | Not enough data |
Moderation - Content Moderation Tools
Text Moderation | Automatically analyzes text for non-compliant or inapproriate content. | Not enough data | |
User Violation Enforcement | Detects and takes action against users who violate content guidelines. | Not enough data | |
Audio Moderation | Automatically analyzes audio for non-compliant or inapproriate content. | Not enough data | |
Image/Video Moderation | Automatically analyzes images and videos for non-compliant or inapproriate content. | Not enough data |
Platform - Content Moderation Tools
Toxicity Detection | Automatically detects profanity, spam, threats, and other harmful content. | Not enough data | |
Custom AI Model | Allows users to train custom AI models for specific use cases. | Not enough data | |
Analytics and Reporting | Provides insights on content performance and/or user behavior . | Not enough data | |
Dashboard | Provides a dashboard to monitor and manage all moderation processes. | Not enough data | |
Customization | Allows user to create customized moderation rules. | Not enough data |
Workflows - Audit Management
Audit Trail | Displays all the changes made during audits, including details such as username, timestamp, or type of change in a centralized repository. 16 reviewers of Resolver have provided feedback on this feature. | 81% (Based on 16 reviews) | |
Recommendations | Based on 16 Resolver reviews. Coordinate and track recommended remediation actions. | 83% (Based on 16 reviews) | |
Collaboration Tools | As reported in 16 Resolver reviews. Facilitates collaboration between teams and stakeholders through shared workspaces. | 74% (Based on 16 reviews) | |
Integrations | Integrates with risk management platforms, GRC tools, and other systems. This feature was mentioned in 16 Resolver reviews. | 73% (Based on 16 reviews) | |
Planning & Scheduling | Facilitates the creation of audit plans, schedules, and reminders. 16 reviewers of Resolver have provided feedback on this feature. | 73% (Based on 16 reviews) |
Documentation - Audit Management
Templates & Forms | As reported in 15 Resolver reviews. Provide out of the box audit templates and forms for various processes and industries. | 79% (Based on 15 reviews) | |
Checklists | Based on 16 Resolver reviews. Provides checklists | 69% (Based on 16 reviews) |
Reporting & Analytics - Audit Management
Dashboard | Dashboard provides real time or near real time updates and notifications in a centralized location. This feature was mentioned in 16 Resolver reviews. | 84% (Based on 16 reviews) | |
Audit Performance | As reported in 16 Resolver reviews. Provide information on the performance of the audit activities and processes. | 78% (Based on 16 reviews) | |
Industry Compliance | Ensures audits are compliant with industry-specific regulations and standards. This feature was mentioned in 16 Resolver reviews. | 71% (Based on 16 reviews) |