Cyrisma Features
Performance (4)
Issue Tracking
40 reviewers of Cyrisma have provided feedback on this feature.
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
Detection Rate
As reported in 43 Cyrisma reviews.
The rate at which scans accurately detect all vulnerabilities associated with the target.
False Positives
As reported in 41 Cyrisma reviews.
The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
Automated Scans
As reported in 41 Cyrisma reviews.
Runs pre-scripted vulnerability scans without requiring manual work.
Network (3)
Compliance Testing
39 reviewers of Cyrisma have provided feedback on this feature.
Allows users to scan applications and networks for specific compliance requirements.
Perimeter Scanning
42 reviewers of Cyrisma have provided feedback on this feature.
Analyzes network devices, servers and operating systems for vulnerabilities.
Configuration Monitoring
Based on 37 Cyrisma reviews and verified by the G2 Product R&D team.
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Application (1)
Black Box Testing
This feature was mentioned in 31 Cyrisma reviews.
Scans functional applications externally for vulnerabilities like SQL injection or XSS.
Risk Analysis (3)
Risk Scoring
This feature was mentioned in 36 Cyrisma reviews.
Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Reporting
As reported in 38 Cyrisma reviews.
Creates reports outlining log activity and relevant metrics.
Risk-Prioritization
37 reviewers of Cyrisma have provided feedback on this feature.
Allows for vulnerability ranking by customized risk and threat priorities.
Vulnerability Assesment (4)
Vulnerability Scanning
This feature was mentioned in 39 Cyrisma reviews.
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Based on 39 Cyrisma reviews.
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Contextual Data
Based on 37 Cyrisma reviews.
Identify risk data attributes such as description, category, owner, or hierarchy.
Dashboards
Based on 39 Cyrisma reviews.
Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.
Automation (2)
Workflow Automation
This feature was mentioned in 34 Cyrisma reviews.
Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Test Automation
As reported in 33 Cyrisma reviews.
Runs pre-scripted vulnerability scans and security tests without requiring manual work.
Functionality (17)
Structure type
Based on 21 Cyrisma reviews.
Searches structured, semi-structured, and unstructured data for sensitive data.
Contextual search
Based on 22 Cyrisma reviews.
Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata.
Template algorithms
20 reviewers of Cyrisma have provided feedback on this feature.
Has template rules and pattern matching algorithms (PII, PCI, PHI and more)
Custom algorithms
Based on 19 Cyrisma reviews.
Offers the option to create custom templates and rules based on department, user type and data type.
False-positive management
24 reviewers of Cyrisma have provided feedback on this feature.
Offers false-positive management functions
Multiple file and location types
25 reviewers of Cyrisma have provided feedback on this feature.
Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.)
Dashboard
As reported in 26 Cyrisma reviews.
Offers a dashboard showing specific location of sensitive data.
Compliance
24 reviewers of Cyrisma have provided feedback on this feature.
Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others.
Reporting
Based on 26 Cyrisma reviews.
Offers reporting functionality.
Monitoring - Deep Web
This feature was mentioned in 18 Cyrisma reviews.
Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web.
Monitoring - Dark Web
This feature was mentioned in 18 Cyrisma reviews.
Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums.
Analysis
18 reviewers of Cyrisma have provided feedback on this feature.
Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations.
Ticketing
As reported in 17 Cyrisma reviews.
Integrates into ticketing or CRM platforms via API integrations.
Simple Search
This feature was mentioned in 17 Cyrisma reviews.
Search through real-time and historical data without using technical query language.
Leak Source
Based on 17 Cyrisma reviews.
Provides additional context and analysis to help identify the source of leaked information.
Centralized Dashboard
As reported in 17 Cyrisma reviews.
Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software.
Real-Time Alerts
As reported in 17 Cyrisma reviews.
Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.
Generative AI - Security Compliance (2)
Predictive Risk
As reported in 10 Cyrisma reviews.
Can analyze patterns and trends in security data to predict potential compliance risks.
Automated Documentation
As reported in 10 Cyrisma reviews.
Can automate the creation of compliance documentation by quickly generating accurate and comprehensive reports.
Agentic AI - Sensitive Data Discovery (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Vulnerability Scanner (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting


