Cyrisma Features
Performance (4)
Issue Tracking
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. This feature was mentioned in 40 Cyrisma reviews.
Detection Rate
The rate at which scans accurately detect all vulnerabilities associated with the target. 43 reviewers of Cyrisma have provided feedback on this feature.
False Positives
The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. This feature was mentioned in 41 Cyrisma reviews.
Automated Scans
Based on 41 Cyrisma reviews. Runs pre-scripted vulnerability scans without requiring manual work.
Network (3)
Compliance Testing
Allows users to scan applications and networks for specific compliance requirements. This feature was mentioned in 39 Cyrisma reviews.
Perimeter Scanning
As reported in 42 Cyrisma reviews. Analyzes network devices, servers and operating systems for vulnerabilities.
Configuration Monitoring
Based on 37 Cyrisma reviews and verified by the G2 Product R&D team. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Application (1)
Black Box Testing
Scans functional applications externally for vulnerabilities like SQL injection or XSS. This feature was mentioned in 31 Cyrisma reviews.
Risk Analysis (3)
Risk Scoring
As reported in 36 Cyrisma reviews. Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Reporting
Creates reports outlining log activity and relevant metrics. This feature was mentioned in 38 Cyrisma reviews.
Risk-Prioritization
Based on 37 Cyrisma reviews. Allows for vulnerability ranking by customized risk and threat priorities.
Vulnerability Assesment (4)
Vulnerability Scanning
As reported in 39 Cyrisma reviews. Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Based on 39 Cyrisma reviews. Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Contextual Data
As reported in 37 Cyrisma reviews. Identify risk data attributes such as description, category, owner, or hierarchy.
Dashboards
Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data. 39 reviewers of Cyrisma have provided feedback on this feature.
Automation (2)
Workflow Automation
Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. 34 reviewers of Cyrisma have provided feedback on this feature.
Test Automation
As reported in 33 Cyrisma reviews. Runs pre-scripted vulnerability scans and security tests without requiring manual work.
Functionality (17)
Structure type
As reported in 21 Cyrisma reviews. Searches structured, semi-structured, and unstructured data for sensitive data.
Contextual search
Based on 22 Cyrisma reviews. Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata.
Template algorithms
Has template rules and pattern matching algorithms (PII, PCI, PHI and more) This feature was mentioned in 20 Cyrisma reviews.
Custom algorithms
Based on 19 Cyrisma reviews. Offers the option to create custom templates and rules based on department, user type and data type.
False-positive management
As reported in 24 Cyrisma reviews. Offers false-positive management functions
Multiple file and location types
Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) This feature was mentioned in 25 Cyrisma reviews.
Dashboard
Offers a dashboard showing specific location of sensitive data. 26 reviewers of Cyrisma have provided feedback on this feature.
Compliance
Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. 24 reviewers of Cyrisma have provided feedback on this feature.
Reporting
Offers reporting functionality. This feature was mentioned in 26 Cyrisma reviews.
Monitoring - Deep Web
Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web. 18 reviewers of Cyrisma have provided feedback on this feature.
Monitoring - Dark Web
Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums. This feature was mentioned in 18 Cyrisma reviews.
Analysis
Based on 18 Cyrisma reviews. Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations.
Ticketing
Integrates into ticketing or CRM platforms via API integrations. 17 reviewers of Cyrisma have provided feedback on this feature.
Simple Search
Search through real-time and historical data without using technical query language. This feature was mentioned in 17 Cyrisma reviews.
Leak Source
Based on 17 Cyrisma reviews. Provides additional context and analysis to help identify the source of leaked information.
Centralized Dashboard
Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software. This feature was mentioned in 17 Cyrisma reviews.
Real-Time Alerts
Based on 17 Cyrisma reviews. Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.
Generative AI - Security Compliance (2)
Predictive Risk
Based on 10 Cyrisma reviews. Can analyze patterns and trends in security data to predict potential compliance risks.
Automated Documentation
As reported in 10 Cyrisma reviews. Can automate the creation of compliance documentation by quickly generating accurate and comprehensive reports.
Agentic AI - Sensitive Data Discovery (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Vulnerability Scanner (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting


