Key features
Vulnerability Management
Network Security Monitoring
Endpoint Detection and Response
Threat Hunting
Orchestration and Automated Response
Centralized Security Event Management
Intelligence Information Management
Information Security Alert Management