CTM360 Features
Orchestration (3)
Asset Management
Based on 48 CTM360 reviews.
Lets users group and organize their endpoints to gather threat intelligence on specific technologies.
Security Workflow Automation
48 reviewers of CTM360 have provided feedback on this feature.
Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.
Deployment
45 reviewers of CTM360 have provided feedback on this feature.
The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.
Information (3)
Proactive Alerts
Based on 47 CTM360 reviews.
Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.
Malware Detection
47 reviewers of CTM360 have provided feedback on this feature.
Provides multiple techniques and information sources to alert users of malware occurrences.
Intelligence Reports
This feature was mentioned in 46 CTM360 reviews.
The ability for users to produce reports outlining detailed and personalized threat information
Personalization (2)
Endpoint Intelligence
Based on 47 CTM360 reviews.
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Security Validation
As reported in 44 CTM360 reviews.
The product has a recurring examination process to update your intelligence reports as new threats emerge.
Diagnostics (3)
Account Overview
This feature was mentioned in 20 CTM360 reviews.
Dashboard of registered domains.
DMARC Alignment
This feature was mentioned in 20 CTM360 reviews.
Status of DMARC compliance across domains.
Analytics
Based on 20 CTM360 reviews.
Additional reporting on account activity, history, and performance.
Compliance (4)
Policy Configuration
19 reviewers of CTM360 have provided feedback on this feature.
Settings for establishing and modifying DMARC enforcement within domains.
Alerts
19 reviewers of CTM360 have provided feedback on this feature.
Notifications for compliance issues or potential fraudulent email activity.
Inbound Emails
This feature was mentioned in 20 CTM360 reviews.
DMARC alignment on inbound emails.
Outbound Emails
This feature was mentioned in 20 CTM360 reviews.
DMARC alignment on outbound emails.
Protection (4)
Threat Identifications
This feature was mentioned in 20 CTM360 reviews.
Timely identification of fraudlent emails.
Threat Interception
Based on 20 CTM360 reviews.
Blocking fraudlent emails from reaching destination.
Threat Removal
This feature was mentioned in 20 CTM360 reviews.
Eliminating or deleting fraudulent emails and containing threats.
Integrations
As reported in 20 CTM360 reviews.
Integrations with security tools related to threat identification and removal.
Detection (3)
Bot Mitigation
As reported in 25 CTM360 reviews.
Monitors for and rids systems of bots suspected of committing fraud.
Real-Time Monitoring
This feature was mentioned in 24 CTM360 reviews.
Constantly monitors system to detect anomalies in real time.
Alerts
This feature was mentioned in 24 CTM360 reviews.
Alerts administrators when fraud is suspected or transactions have been declined.
Analysis (3)
ID Analytics
24 reviewers of CTM360 have provided feedback on this feature.
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Intelligence Reporting
This feature was mentioned in 24 CTM360 reviews.
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
Incident Reports
Based on 24 CTM360 reviews.
Produces reports detailing trends and vulnerabilities related to payments and fraud.
Administration (3)
Fraud Markers
This feature was mentioned in 24 CTM360 reviews.
Tags users suspected of committing fraud and identifies them upon return.
Transaction Scoring
As reported in 24 CTM360 reviews.
Rates each transaction's risk based on specific factors and their benchmarked scores.
Blacklisting
24 reviewers of CTM360 have provided feedback on this feature.
Prevents previous committers of fraud from future transactions.
Identification (3)
Reseller Database
38 reviewers of CTM360 have provided feedback on this feature.
Provide a database or authorized and unauthorized resellers
Monitoring
As reported in 40 CTM360 reviews.
Monitor online product and pricing information
Violations
As reported in 37 CTM360 reviews.
Identify pricing or brand policy violations
Enforcement (3)
Communication
This feature was mentioned in 37 CTM360 reviews.
Ability to warn resellers about violations
Plans
As reported in 37 CTM360 reviews.
Provide plans to enforce pricing and brand policies
Track
36 reviewers of CTM360 have provided feedback on this feature.
Track the effectiveness of enforcement activities
Functionality (11)
Centralized Vendor Catalog
As reported in 11 CTM360 reviews.
Allows companies to assess vendors profiles in a centralized catalog
Questionnaire Templates
11 reviewers of CTM360 have provided feedback on this feature.
Offers standardized security and privacy framework questionnaire templates
User Access Control
As reported in 11 CTM360 reviews.
Offers role based access controls to allow only permissioned users to utilize various parts of the software.
Monitoring - Deep Web
As reported in 34 CTM360 reviews.
Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web.
Monitoring - Dark Web
Based on 31 CTM360 reviews.
Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums.
Analysis
31 reviewers of CTM360 have provided feedback on this feature.
Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations.
Ticketing
30 reviewers of CTM360 have provided feedback on this feature.
Integrates into ticketing or CRM platforms via API integrations.
Simple Search
This feature was mentioned in 29 CTM360 reviews.
Search through real-time and historical data without using technical query language.
Leak Source
Based on 31 CTM360 reviews.
Provides additional context and analysis to help identify the source of leaked information.
Centralized Dashboard
As reported in 33 CTM360 reviews.
Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software.
Real-Time Alerts
This feature was mentioned in 30 CTM360 reviews.
Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.
Risk assessment (3)
Risk Scoring
As reported in 11 CTM360 reviews.
Offers built-in or automated vendor risk scoring
4th Party Assessments
11 reviewers of CTM360 have provided feedback on this feature.
Offers tools to assess fourth parties -- your vendor's vendors
Monitoring And Alerts
11 reviewers of CTM360 have provided feedback on this feature.
Monitors changes in risk and sends notifications, alerts, and reminders for specific actions including: upcoming assessments, profile access requests, etc
Monitoring (4)
Gap Analysis
24 reviewers of CTM360 have provided feedback on this feature.
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Vulnerability Intelligence
As reported in 24 CTM360 reviews.
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Compliance Monitoring
24 reviewers of CTM360 have provided feedback on this feature.
Monitors data quality and sends alerts based on violations or misuse.
Continuous Monitoring
25 reviewers of CTM360 have provided feedback on this feature.
Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.
Asset Management (3)
Asset Discovery
Based on 24 CTM360 reviews.
Detects new assets as they enter cloud environments and networks to add to asset inventory.
Shadow IT Detection
This feature was mentioned in 24 CTM360 reviews.
Identifies unsanctioned software.
Change Management
As reported in 21 CTM360 reviews.
Provides tools to track and implement required security policy changes.
Risk Management (4)
Risk-Prioritization
This feature was mentioned in 25 CTM360 reviews.
Allows for vulnerability ranking by customized risk and threat priorities.
Reconnaissance
This feature was mentioned in 25 CTM360 reviews.
Gathers information about the system and potential exploits to be tested.
At-Risk Analysis
Based on 24 CTM360 reviews.
Uses machine learning to identify at-risk data.
Threat Intelligence
As reported in 25 CTM360 reviews.
Stores information related to common threats and how to resolve them once incidents occur.
Generative AI (5)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
Based on 37 CTM360 reviews.
Condenses long documents or text into a brief summary.
Generate Attack Scenarios
10 reviewers of CTM360 have provided feedback on this feature.
Use AI to propose possible threat actor tactics, techniques, and procedures against specific environments or assets.
Generate Threat Detection Rules
This feature was mentioned in 10 CTM360 reviews.
Use AI to automatically create detection rules based on observed patterns.
Generate Threat Summaries
Use AI to produce concise summaries of complex threat reports or alerts.
Vulnerability Management - Digital Risk Protection (DRP) Platforms (5)
Vulnerability Assessment
This feature was mentioned in 22 CTM360 reviews.
Incorporates real-time data from various sources to identify potential threats and vulnerabilities.
Digital Footprint Mapping
This feature was mentioned in 24 CTM360 reviews.
Creates a digital footprint of an organization's ecosystem to identify exposed digital assets.
Fraud Detection
23 reviewers of CTM360 have provided feedback on this feature.
Identifies and mitigates fraudulent websites, phishing attacks, and other social engineering attacks targeting employees and customers.
Data Leak Detection
This feature was mentioned in 23 CTM360 reviews.
Detects sensitive data published on the dark web and other paste sites.
Brand Protection
Based on 24 CTM360 reviews.
Analyzes an organization’s online presence to identify instances of brand impersonation.
Incident Response Digital Risk Protection (DRP) Platforms (3)
Threat Remediation
As reported in 24 CTM360 reviews.
Outlines clear takedown processes for threats.
Automated Reponses
This feature was mentioned in 22 CTM360 reviews.
Implements automated responses to certain types of incidents.
Incident Response Capabilities
As reported in 23 CTM360 reviews.
Provides resources for a coordinated and efficient response to security incidents, facilitating investigation, containment, and recovery efforts.
Reporting and Analytics - Digital Risk Protection (DRP) Platforms (3)
Threat Trends Analysis
Based on 22 CTM360 reviews.
Offers analytics features to provide insights into digital risk trends and the effectiveness of mitigation strategies
Risk Assessment Reports
As reported in 22 CTM360 reviews.
Generates reports that assess the overall digital risk posture of an organization. Reports may include an analysis of the identified threats and vulnerabilities.
Customizable Dashboards
Based on 22 CTM360 reviews.
Offers dashboards that can be customized based on the key performance indicators of an organization.
Generative AI - Exposure Management Platforms (2)
Predictive Analytics
Based on 16 CTM360 reviews.
Uses AI-driven models to analyze historical and current data to enable organizations to manage new exposures proactively.
Automated Threat Detection
As reported in 16 CTM360 reviews.
Uses AI algorithms to analyze data for patterns and anomalies that signify potential risks.
Risk Identification and Assessment - Exposure Management Platforms (2)
Comprehensive Risk Assessment
This feature was mentioned in 16 CTM360 reviews.
Identifies, evaluates, and monitors various types of risks to understand the overall risk exposure and prioritize them based on potential impact.
Advanced Analytics and Reporting
As reported in 16 CTM360 reviews.
Includes tools for deep analysis of risk data, providing insights into trends and patterns that support strategic risk assessment and decision-making.
Monitoring and Integration - Exposure Management Platforms (2)
Integration and Data Consolidation
Based on 16 CTM360 reviews.
Ensures seamless interaction with other systems and unification of risk data, enabling a comprehensive view and efficient management of risk exposure.
Real-time Monitoring and Alerts
16 reviewers of CTM360 have provided feedback on this feature.
Allows for continuous surveillance of risk factors, providing timely alerts to mitigate emerging risks effectively.
Agentic AI - Threat Intelligence (4)
Autonomous Task Execution
This feature was mentioned in 25 CTM360 reviews.
Capability to perform complex tasks without constant human input
Multi-step Planning
26 reviewers of CTM360 have provided feedback on this feature.
Ability to break down and plan multi-step processes
Proactive Assistance
26 reviewers of CTM360 have provided feedback on this feature.
Anticipates needs and offers suggestions without prompting
Decision Making
As reported in 26 CTM360 reviews.
Makes informed choices based on available data and objectives
Agentic AI - Fraud Detection (3)
Cross-system Integration
10 reviewers of CTM360 have provided feedback on this feature.
Works across multiple software systems or databases
Adaptive Learning
As reported in 10 CTM360 reviews.
Improves performance based on feedback and experience
Decision Making
As reported in 10 CTM360 reviews.
Makes informed choices based on available data and objectives


