Best Software for 2025 is now live!
By Wiz
Show rating breakdown
Save to My Lists
Paid
Claimed
Optimized for quick response

Wiz Features

What are the features of Wiz?

Administration

  • Policy Enforcement

Security

  • Compliance Monitoring

Performance

  • Issue Tracking
  • Detection Rate
  • False Positives
  • Automated Scans

Network

  • Configuration Monitoring

Configuration

  • Configuration Monitoring
  • API / Integrations

Visibility

  • Multicloud Visibility
  • Asset Discovery

Vulnerability Management

  • Threat Hunting
  • Vulnerability Scanning
  • Vulnerability Intelligence
  • Risk-Prioritization

Filter for Features

Management

Dashboards and Reports

Based on 100 Wiz reviews. Access pre-built and custom reports and dashboards.
86%
(Based on 100 reviews)

Workflow Management

Based on 88 Wiz reviews. Creates new or streamlines existing workflows to better handle IT support tickets and service.
84%
(Based on 88 reviews)

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks This feature was mentioned in 99 Wiz reviews.
93%
(Based on 99 reviews)

Extensibility

Allows for customized support for hybrid environments This feature was mentioned in 21 Wiz reviews.
85%
(Based on 21 reviews)

Workflow Automation

Based on 20 Wiz reviews. Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
88%
(Based on 20 reviews)

Unified Visibility

As reported in 17 Wiz reviews. Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
92%
(Based on 17 reviews)

Operations

Governance

As reported in 90 Wiz reviews. Allows users to create, edit, and relinquish user access privileges.
89%
(Based on 90 reviews)

Logging and Reporting

Based on 93 Wiz reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
86%
(Based on 93 reviews)

API / Integrations

Based on 93 Wiz reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
90%
(Based on 93 reviews)

Security Controls

Anomaly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. 59 reviewers of Wiz have provided feedback on this feature.
82%
(Based on 59 reviews)

Security Auditing

Based on 87 Wiz reviews. Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
90%
(Based on 87 reviews)

Administration

Risk Scoring

Based on 166 Wiz reviews. Provides risk scoring for suspicious activity, vulnerabilities, and other threats.
89%
(Based on 166 reviews)

Secrets Management

Based on 157 Wiz reviews. Provides tools for managing authentication credentials such as keys and passwords.
82%
(Based on 157 reviews)

Security Auditing

As reported in 169 Wiz reviews. Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
91%
(Based on 169 reviews)

Configuration Management

Based on 164 Wiz reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
89%
(Based on 164 reviews)

Policy Enforcement

Allows administrators to set policies for security and data governance. This feature was mentioned in 228 Wiz reviews.
85%
(Based on 228 reviews)

Auditing

Based on 203 Wiz reviews. Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
87%
(Based on 203 reviews)

Workflow Management

As reported in 217 Wiz reviews. Creates new or streamlines existing workflows to better handle IT support tickets and service.
83%
(Based on 217 reviews)

Security Automation

Based on 178 Wiz reviews. Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
83%
(Based on 178 reviews)

Security Integration

Integrates additional security tools to automate security and incident response processes. This feature was mentioned in 188 Wiz reviews.
87%
(Based on 188 reviews)

Multicloud Visibility

Based on 186 Wiz reviews. Allows users to track and control activity across cloud services and providers.
91%
(Based on 186 reviews)

Monitoring

Continuous Image Assurance

Based on 143 Wiz reviews. Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats.
82%
(Based on 143 reviews)

Behavior Monitoring

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. This feature was mentioned in 135 Wiz reviews.
78%
(Based on 135 reviews)

Observability

Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. This feature was mentioned in 154 Wiz reviews.
86%
(Based on 154 reviews)

Gap Analysis

Based on 150 Wiz reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
85%
(Based on 150 reviews)

Vulnerability Intelligence

Stores information related to common vulnerabilities and how to resolve them once incidents occur. This feature was mentioned in 163 Wiz reviews.
90%
(Based on 163 reviews)

Compliance Monitoring

As reported in 154 Wiz reviews. Monitors data quality and sends alerts based on violations or misuse.
88%
(Based on 154 reviews)

Continuous Monitoring

Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response. 163 reviewers of Wiz have provided feedback on this feature.
89%
(Based on 163 reviews)

Resource utilization

Based on 84 Wiz reviews. Optimizes resource allocation.
85%
(Based on 84 reviews)

Real-time monitoring

Based on 96 Wiz reviews. Consistently monitors processes for applications and IT infrastructure to detect anomalies in real-time.
85%
(Based on 96 reviews)

Performance baseline

Sets up standard performance baseline to compare live container activities. This feature was mentioned in 83 Wiz reviews.
85%
(Based on 83 reviews)

API monitoring

Traces connections between different containerized environments and detects anomalies in functionality, user accessibility, traffic flows, and tampering. This feature was mentioned in 84 Wiz reviews.
80%
(Based on 84 reviews)

Protection

Dynamic Image Scanning

As reported in 149 Wiz reviews. Scans application and image source code for security flaws without executing it in a live environment
84%
(Based on 149 reviews)

Runtime Protection

As reported in 142 Wiz reviews. Monitors container activities and detects threats across containers, networks, and cloud service providers.
78%
(Based on 142 reviews)

Network Segmentation

Allows administrative control over network components, mapping, and segmentation. 137 reviewers of Wiz have provided feedback on this feature.
77%
(Based on 137 reviews)

Security

Compliance Monitoring

As reported in 240 Wiz reviews. Monitors data quality and sends alerts based on violations or misuse.
90%
(Based on 240 reviews)

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. 190 reviewers of Wiz have provided feedback on this feature.
82%
(Based on 190 reviews)

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. 217 reviewers of Wiz have provided feedback on this feature.
88%
(Based on 217 reviews)

Compliance Monitoring

Based on 181 Wiz reviews. Monitors data quality and send alerts based on violations or misuse.
86%
(Based on 181 reviews)

Risk AnalysisView full feature definition

See feature definition
Identifies potential network security risks, vulnerabilities, and compliance impacts. 190 reviewers of Wiz have provided feedback on this feature.
89%
(Based on 190 reviews)

Reporting

Based on 196 Wiz reviews. Creates reports outlining log activity and relevant metrics.
83%
(Based on 196 reviews)

Compliance

Governance

Allows users to create, edit, and relinquish user access privileges. 212 reviewers of Wiz have provided feedback on this feature.
87%
(Based on 212 reviews)

Data Governance

Ensures user access management, data lineage, and data encryption. This feature was mentioned in 200 Wiz reviews.
83%
(Based on 200 reviews)

Sensitive Data Compliance

Based on 198 Wiz reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
83%
(Based on 198 reviews)

Performance

Issue Tracking

Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. 239 reviewers of Wiz have provided feedback on this feature.
83%
(Based on 239 reviews)

Detection Rate

As reported in 236 Wiz reviews. The rate at which scans accurately detect all vulnerabilities associated with the target.
88%
(Based on 236 reviews)

False Positives

Based on 237 Wiz reviews. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
74%
(Based on 237 reviews)

Automated Scans

As reported in 241 Wiz reviews. Runs pre-scripted vulnerability scans without requiring manual work.
90%
(Based on 241 reviews)

Network

Compliance Testing

Based on 222 Wiz reviews. Allows users to scan applications and networks for specific compliance requirements.
87%
(Based on 222 reviews)

Perimeter Scanning

As reported in 218 Wiz reviews. Analyzes network devices, servers and operating systems for vulnerabilities.
85%
(Based on 218 reviews)

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. 237 reviewers of Wiz have provided feedback on this feature.
88%
(Based on 237 reviews)

Functionality - Software Composition Analysis

Language Support

As reported in 46 Wiz reviews. Supports a useful and wide variety of programming languages.
88%
(Based on 46 reviews)

Integration

As reported in 50 Wiz reviews. Integrates seamlessly with the build environment and development tools like repositories, package managers, etc.
94%
(Based on 50 reviews)

Transparency

Based on 48 Wiz reviews. Grants comprehensive user-friendly insight into all open source components.
93%
(Based on 48 reviews)

Effectiveness - Software Composition Analysis

Remediation Suggestions

Provides relevant and helpful suggestions for vulnerability remediation upon detection. This feature was mentioned in 51 Wiz reviews.
88%
(Based on 51 reviews)

Continuous Monitoring

Monitors open source components proactively and continuously. 50 reviewers of Wiz have provided feedback on this feature.
92%
(Based on 50 reviews)

Thorough Detection

Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues. 52 reviewers of Wiz have provided feedback on this feature.
94%
(Based on 52 reviews)

Activity Monitoring

API Monitoring

Based on 162 Wiz reviews. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
75%
(Based on 162 reviews)

Activity Monitoring

Actively monitors status of work stations either on-premise or remote. This feature was mentioned in 174 Wiz reviews.
80%
(Based on 174 reviews)

Detection & Response

Response Automation

As reported in 22 Wiz reviews. Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
92%
(Based on 22 reviews)

Threat Hunting

As reported in 21 Wiz reviews. Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
92%
(Based on 21 reviews)

Rule-Based Detection

As reported in 21 Wiz reviews. Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance.
96%
(Based on 21 reviews)

Real-Time Detection

Constantly monitors system to detect anomalies in real time. 21 reviewers of Wiz have provided feedback on this feature.
83%
(Based on 21 reviews)

Analytics

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur. 22 reviewers of Wiz have provided feedback on this feature.
88%
(Based on 22 reviews)

Artificial Intelligence & Machine Learning

Based on 21 Wiz reviews. Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
83%
(Based on 21 reviews)

Data Collection

Collects information from multiple sources to cross reference and build contextual to correlate intelligence. 22 reviewers of Wiz have provided feedback on this feature.
89%
(Based on 22 reviews)

Configuration

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. 236 reviewers of Wiz have provided feedback on this feature.
89%
(Based on 236 reviews)

Unified Policy Management

As reported in 212 Wiz reviews. Allows users to track and control security policies across cloud services and providers.
83%
(Based on 212 reviews)

Adaptive Access Control

Based on 210 Wiz reviews. Provides a risk-based approach to determining trust within the network.
80%
(Based on 210 reviews)

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. 224 reviewers of Wiz have provided feedback on this feature.
85%
(Based on 224 reviews)

Visibility

Multicloud Visibility

As reported in 237 Wiz reviews. Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
92%
(Based on 237 reviews)

Asset Discovery

Detect new assets as they enter a cloud environments and networks to add to asset inventory. 243 reviewers of Wiz have provided feedback on this feature.
91%
(Based on 243 reviews)

Vulnerability Management

Threat Hunting

Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. 225 reviewers of Wiz have provided feedback on this feature.
83%
(Based on 225 reviews)

Vulnerability Scanning

Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised. This feature was mentioned in 249 Wiz reviews.
91%
(Based on 249 reviews)

Vulnerability Intelligence

Based on 236 Wiz reviews. Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.
89%
(Based on 236 reviews)

Risk-Prioritization

Based on 242 Wiz reviews. Allows for vulnerability ranking by customized risk and threat priorities.
90%
(Based on 242 reviews)

Asset Management

Asset Discovery

Detects new assets as they enter cloud environments and networks to add to asset inventory. 167 reviewers of Wiz have provided feedback on this feature.
93%
(Based on 167 reviews)

Shadow IT Detection

Identifies unsanctioned software. 141 reviewers of Wiz have provided feedback on this feature.
78%
(Based on 141 reviews)

Change Management

Provides tools to track and implement required security policy changes. This feature was mentioned in 140 Wiz reviews.
76%
(Based on 140 reviews)

Risk Management

Risk-Prioritization

Allows for vulnerability ranking by customized risk and threat priorities. 183 reviewers of Wiz have provided feedback on this feature.
92%
(Based on 183 reviews)

Reconnaissance

As reported in 170 Wiz reviews. Gathers information about the system and potential exploits to be tested.
85%
(Based on 170 reviews)

At-Risk Analysis

Uses machine learning to identify at-risk data. 169 reviewers of Wiz have provided feedback on this feature.
86%
(Based on 169 reviews)

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur. 171 reviewers of Wiz have provided feedback on this feature.
85%
(Based on 171 reviews)

Alerts management

Multi-mode alerts

As reported in 89 Wiz reviews. Alerts over email, text, phone call, or more to multiple parties.
88%
(Based on 89 reviews)

Opimization alerts

Provides information related to unnecessary spending and unused resources. 91 reviewers of Wiz have provided feedback on this feature.
86%
(Based on 91 reviews)

Incident alerts

Gives alerts when incidents arise. 100 reviewers of Wiz have provided feedback on this feature.
91%
(Based on 100 reviews)

Automation

Resolution automation

Diagnoses and resolves incidents without the need for human interaction. 88 reviewers of Wiz have provided feedback on this feature.
84%
(Based on 88 reviews)

Automation

Efficiently scales resource usage to optimize spend whith increased or decreased resource usage requirements. 93 reviewers of Wiz have provided feedback on this feature.
86%
(Based on 93 reviews)

Analysis

Search

Allows users to search logs for troubleshooting and open-ended exploration of data. This feature was mentioned in 106 Wiz reviews.
87%
(Based on 106 reviews)

Reporting

As reported in 104 Wiz reviews. Creates reports outlining resource, underutilization, cost trends, and/or functional overlap.
85%
(Based on 104 reviews)

Visualization

Presents information and analytics in a digestible, intuitive, and visually appealing way. 106 reviewers of Wiz have provided feedback on this feature.
93%
(Based on 106 reviews)

Track trends

As reported in 97 Wiz reviews. Allows users to track log trends.
85%
(Based on 97 reviews)

Issue Resolution

Root cause identification

Directly identifies, or increases identification speed for, root causes for container issues. This feature was mentioned in 98 Wiz reviews.
85%
(Based on 98 reviews)

Resolution guidance

As reported in 103 Wiz reviews. Provides paths, suggestions, or other general assistance towards issue resolution.
89%
(Based on 103 reviews)

Proactive identification

Proactively identifies trends on container systems that could lead to failures or errors. This feature was mentioned in 96 Wiz reviews.
91%
(Based on 96 reviews)

Access control - Cloud Infrastructure Entitlement Management (CIEM)

Policy Management

Helps define policies for access management This feature was mentioned in 30 Wiz reviews.
79%
(Based on 30 reviews)

Fine-Grained Access Control

Based on 32 Wiz reviews. Uses principle of least privilege to ensure access control at granular level of specific resources and apps
86%
(Based on 32 reviews)

Role-Based Access Control (RBAC)

Based on 32 Wiz reviews. Enables organization to define roles and assign access based on these roles
83%
(Based on 32 reviews)

AI-driven access control

As reported in 30 Wiz reviews. Streamlines the management of user access through AI
67%
(Based on 30 reviews)

Monitoring - Cloud Infrastructure Entitlement Management (CIEM)

Monitoring

As reported in 32 Wiz reviews. Tracks and logs user activities, access requests, and changes to entitlements
83%
(Based on 32 reviews)

AI-based detection

As reported in 31 Wiz reviews. Detects and remediates risky, misconfigured permissions for human and machine identities using AI
72%
(Based on 31 reviews)

Auditing - Cloud Infrastructure Entitlement Management (CIEM)

Visibility

As reported in 34 Wiz reviews. Provides visibility into all users and identities across the system
91%
(Based on 34 reviews)

Compliance Reporting

Provides reporting capabilities to demonstrate compliance This feature was mentioned in 34 Wiz reviews.
90%
(Based on 34 reviews)