Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Software logo
  • Vendor
  • What is this Software?
  • Website
  • Cybersecurity Regulations, Standards and Guidelines Tested
  • Other Cybersecurity Regulations, Standards and Guidelines Supported
  • Deployment
  • Environment
  • Region
  • Industry
  • Capabilities
  • AI Governance, Model Documentation & Quality Capabilities
  • API Security Capabilities
  • Application Execution Control & Endpoint Hardening Capabilities
  • Application Security & Fraud Prevention Capabilities
  • Business Continuity & Disaster Recovery Capabilities
  • Cloud Security Posture Management Capabilities
  • Configuration, Asset & Baseline Management Capabilities Configuration, Asset & Baseline Management Capabilities
  • Continuous Monitoring, Logging & Threat Intelligence Capabilities
  • Data Discovery, DLP & Privacy Automation Capabilities
  • Data Governance & Data Lifecycle Management Capabilities
  • Data Protection, Encryption & Key Management Capabilities
  • Email Security & Anti-Phishing Protection Capabilities
  • GRC / Compliance Automation Capabilities
  • Identity & Access Management / Privileged Access Management Capabilities
  • Identity Threat Detection & Response Capabilities
  • Malicious Code & Exploit Protection Capabilities
  • Mobile Device & Application Security Capabilities
  • Network Segmentation & Perimeter Security Capabilities
  • OT / ICS Security & Resilience Capabilities
  • Physical & Environmental Access Control & Monitoring Capabilities
  • Secure Software Development & SDLC Automation Capabilities
  • Security Monitoring & Event Management (SIEM) Capabilities
  • Software Supply Chain Integrity & Provenance Capabilities
  • Supply Chain & Third-Party Risk Management Capabilities
  • Testing, Simulation & Validation Capabilities
  • Vulnerability & Patch Management Capabilities
  • MITRE Mitigations Enterprise Supported by the Software
  • NIST CSF Controls Supported by the Software
  • NIST SP6800-53 (LOW) Controls Supported by the Software
  • NIST SSDF Controls Supported by the Software
  • HIPAA Requirements Supported by the Software
  • ISO/IEC 27001 Requirements Supported by the Software
  • NERC CIP Requirements Supported by the Software
  • PCI DSS Requirements Supported by the Software
  • DORA Requirements Supported by the Software
  • ZTA Logical Architecture Component Supported by the Software
  • OT Components Supported by the Software
  • EU AI Act Requirements Supported by the Software
  • GDPR Requirements Supported by the Software
  • NIST AI RMF Subcategories
  • NIS 2 Requirements
  • MAS & ABS Requirement
  • CCPA/CPRA Requirements
  • PSD2 Requirements
  • CMMC Requirements
  • NCA OTCC Requirements
  • MITRE ATT&CK ICS Mitigations
  • PCI CP & PLS Requirements
  • PCI 3DS Requirements
  • Scope Impact
  • Periodic compliance activities supported by the Software
  • The Software store, process, or transmit
  • The Software requires to be integrated with other systems impacting the cybersecurity or compliance of the customer
  • Software modules implemented
  • Software vendor Third-Party Service Providers (TPSPs) used
  • Software NERC CIP scoping
  • Software NIST SSDF scoping
  • Software PCI DSS scoping
Compare
Compare ×
View comparison Continue browsing software