Cyrisma Features
Performance (4)
Issue Tracking
As reported in 40 Cyrisma reviews.
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
Detection Rate
As reported in 43 Cyrisma reviews.
The rate at which scans accurately detect all vulnerabilities associated with the target.
False Positives
41 reviewers of Cyrisma have provided feedback on this feature.
The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
Automated Scans
As reported in 41 Cyrisma reviews.
Runs pre-scripted vulnerability scans without requiring manual work.
Network (3)
Compliance Testing
This feature was mentioned in 39 Cyrisma reviews.
Allows users to scan applications and networks for specific compliance requirements.
Perimeter Scanning
This feature was mentioned in 42 Cyrisma reviews.
Analyzes network devices, servers and operating systems for vulnerabilities.
Configuration Monitoring
Based on 37 Cyrisma reviews and verified by the G2 Product R&D team.
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Application (1)
Black Box Testing
31 reviewers of Cyrisma have provided feedback on this feature.
Scans functional applications externally for vulnerabilities like SQL injection or XSS.
Risk Analysis (3)
Risk Scoring
This feature was mentioned in 36 Cyrisma reviews.
Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Reporting
Based on 38 Cyrisma reviews.
Creates reports outlining log activity and relevant metrics.
Risk-Prioritization
This feature was mentioned in 37 Cyrisma reviews.
Allows for vulnerability ranking by customized risk and threat priorities.
Vulnerability Assesment (4)
Vulnerability Scanning
Based on 39 Cyrisma reviews.
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
This feature was mentioned in 39 Cyrisma reviews.
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Contextual Data
Based on 37 Cyrisma reviews.
Identify risk data attributes such as description, category, owner, or hierarchy.
Dashboards
This feature was mentioned in 39 Cyrisma reviews.
Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.
Automation (2)
Workflow Automation
This feature was mentioned in 34 Cyrisma reviews.
Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Test Automation
33 reviewers of Cyrisma have provided feedback on this feature.
Runs pre-scripted vulnerability scans and security tests without requiring manual work.
Functionality (17)
Structure type
As reported in 21 Cyrisma reviews.
Searches structured, semi-structured, and unstructured data for sensitive data.
Contextual search
This feature was mentioned in 22 Cyrisma reviews.
Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata.
Template algorithms
As reported in 20 Cyrisma reviews.
Has template rules and pattern matching algorithms (PII, PCI, PHI and more)
Custom algorithms
As reported in 19 Cyrisma reviews.
Offers the option to create custom templates and rules based on department, user type and data type.
False-positive management
Based on 24 Cyrisma reviews.
Offers false-positive management functions
Multiple file and location types
25 reviewers of Cyrisma have provided feedback on this feature.
Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.)
Dashboard
This feature was mentioned in 26 Cyrisma reviews.
Offers a dashboard showing specific location of sensitive data.
Compliance
Based on 24 Cyrisma reviews.
Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others.
Reporting
Based on 26 Cyrisma reviews.
Offers reporting functionality.
Monitoring - Deep Web
As reported in 18 Cyrisma reviews.
Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web.
Monitoring - Dark Web
This feature was mentioned in 18 Cyrisma reviews.
Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums.
Analysis
As reported in 18 Cyrisma reviews.
Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations.
Ticketing
As reported in 17 Cyrisma reviews.
Integrates into ticketing or CRM platforms via API integrations.
Simple Search
This feature was mentioned in 17 Cyrisma reviews.
Search through real-time and historical data without using technical query language.
Leak Source
Based on 17 Cyrisma reviews.
Provides additional context and analysis to help identify the source of leaked information.
Centralized Dashboard
This feature was mentioned in 17 Cyrisma reviews.
Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software.
Real-Time Alerts
This feature was mentioned in 17 Cyrisma reviews.
Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.
Generative AI - Security Compliance (2)
Predictive Risk
As reported in 10 Cyrisma reviews.
Can analyze patterns and trends in security data to predict potential compliance risks.
Automated Documentation
10 reviewers of Cyrisma have provided feedback on this feature.
Can automate the creation of compliance documentation by quickly generating accurate and comprehensive reports.
Agentic AI - Sensitive Data Discovery (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Vulnerability Scanner (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting


