Policy Manager Features
Network Management (8)
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Network Mapping
Provides visual displays network connections, services, and endpoints.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Reporting
Documents suspicious activity within a network and provide analysis of potential threats or vulnerabilities.
Console
Provides a centralized console for administration tasks and unified control.
Security (8)
Security Automation
Allows administrative control over automated security tasks.
Application Security
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Compliance Monitoring
Monitors data quality and sends alerts based on violations or misuse.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Identity Management (3)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Network Maintenance (3)
Policy Optimization
Identifies redundent processes and policies, automates changes to reduce unnecessary policy enforcement.
Risk Analysis
Identifies potential network security risks, vulnerabilities, and compliance impacts.
Auditing
Allows for deep examination into network-connected devices, policies, and protocols.
Network Monitoring (3)
Network Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Change Management
Tools to track and implement required network policy changes.
Compliance (3)
Governance
Allows users to create, edit, and relinquish user access privileges.
Data Governance
Ensures user access management, data lineage, and data encryption.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Administration (3)
Policy Enforcement
Allows administrators to set policies for security and data governance.
Auditing
Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Generative AI (2)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.





