Cyrisma Features
Performance (4)
Issue Tracking
As reported in 40 Cyrisma reviews.
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
Detection Rate
This feature was mentioned in 43 Cyrisma reviews.
The rate at which scans accurately detect all vulnerabilities associated with the target.
False Positives
This feature was mentioned in 41 Cyrisma reviews.
The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
Automated Scans
Based on 41 Cyrisma reviews.
Runs pre-scripted vulnerability scans without requiring manual work.
Network (3)
Compliance Testing
As reported in 39 Cyrisma reviews.
Allows users to scan applications and networks for specific compliance requirements.
Perimeter Scanning
This feature was mentioned in 42 Cyrisma reviews.
Analyzes network devices, servers and operating systems for vulnerabilities.
Configuration Monitoring
Based on 37 Cyrisma reviews and verified by the G2 Product R&D team.
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Application (1)
Black Box Testing
Based on 31 Cyrisma reviews.
Scans functional applications externally for vulnerabilities like SQL injection or XSS.
Risk Analysis (3)
Risk Scoring
This feature was mentioned in 36 Cyrisma reviews.
Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Reporting
38 reviewers of Cyrisma have provided feedback on this feature.
Creates reports outlining log activity and relevant metrics.
Risk-Prioritization
Based on 37 Cyrisma reviews.
Allows for vulnerability ranking by customized risk and threat priorities.
Vulnerability Assesment (4)
Vulnerability Scanning
This feature was mentioned in 39 Cyrisma reviews.
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
39 reviewers of Cyrisma have provided feedback on this feature.
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Contextual Data
This feature was mentioned in 37 Cyrisma reviews.
Identify risk data attributes such as description, category, owner, or hierarchy.
Dashboards
This feature was mentioned in 39 Cyrisma reviews.
Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.
Automation (2)
Workflow Automation
As reported in 34 Cyrisma reviews.
Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Test Automation
This feature was mentioned in 33 Cyrisma reviews.
Runs pre-scripted vulnerability scans and security tests without requiring manual work.
Functionality (17)
Structure type
As reported in 21 Cyrisma reviews.
Searches structured, semi-structured, and unstructured data for sensitive data.
Contextual search
This feature was mentioned in 22 Cyrisma reviews.
Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata.
Template algorithms
This feature was mentioned in 20 Cyrisma reviews.
Has template rules and pattern matching algorithms (PII, PCI, PHI and more)
Custom algorithms
19 reviewers of Cyrisma have provided feedback on this feature.
Offers the option to create custom templates and rules based on department, user type and data type.
False-positive management
Based on 24 Cyrisma reviews.
Offers false-positive management functions
Multiple file and location types
Based on 25 Cyrisma reviews.
Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.)
Dashboard
As reported in 26 Cyrisma reviews.
Offers a dashboard showing specific location of sensitive data.
Compliance
Based on 24 Cyrisma reviews.
Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others.
Reporting
26 reviewers of Cyrisma have provided feedback on this feature.
Offers reporting functionality.
Monitoring - Deep Web
Based on 18 Cyrisma reviews.
Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web.
Monitoring - Dark Web
Based on 18 Cyrisma reviews.
Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums.
Analysis
Based on 18 Cyrisma reviews.
Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations.
Ticketing
Based on 17 Cyrisma reviews.
Integrates into ticketing or CRM platforms via API integrations.
Simple Search
As reported in 17 Cyrisma reviews.
Search through real-time and historical data without using technical query language.
Leak Source
This feature was mentioned in 17 Cyrisma reviews.
Provides additional context and analysis to help identify the source of leaked information.
Centralized Dashboard
17 reviewers of Cyrisma have provided feedback on this feature.
Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software.
Real-Time Alerts
As reported in 17 Cyrisma reviews.
Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.
Generative AI - Security Compliance (2)
Predictive Risk
Based on 10 Cyrisma reviews.
Can analyze patterns and trends in security data to predict potential compliance risks.
Automated Documentation
This feature was mentioned in 10 Cyrisma reviews.
Can automate the creation of compliance documentation by quickly generating accurate and comprehensive reports.
Agentic AI - Sensitive Data Discovery (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Vulnerability Scanner (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting


