Scrut Automation Features
Security (4)
Compliance Monitoring
Monitors data quality and sends alerts based on violations or misuse.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance (3)
Governance
Allows users to create, edit, and relinquish user access privileges.
Data Governance
Ensures user access management, data lineage, and data encryption.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Administration (3)
Policy Enforcement
Allows administrators to set policies for security and data governance.
Auditing
Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Asset Inventory (5)
Hardware Asset Inventory
Create an inventory of a company's hardware assets.
Software Asset Inventory
Create an inventory of a company's software assets.
Cloud Asset Inventory
Create an inventory of a company's cloud assets.
Mobile Asset Inventory
Create an inventory of a company's mobile assets.
Asset Discovery
Detect new assets as they enter a network and add them to asset inventory.
Management (4)
Central Dashboard
Provide immediate insights, information, and updates on IT assets from a central dashboard.
Asset Policy Management
Design and implement custom or pre-built policies for asset management, onboarding, and maintenance.
Risk Management
Implement risk management policies, and push policy updates to various assets across a business network.
Integrations
Integrate with other software solutions, such as spend management and software asset management.
Functionality (4)
Customized Vendor Pages
Allows vendors to own and update their vendor page with security and compliance documentation to share with customers
Centralized Vendor Catalog
Allows companies to assess vendors profiles in a centralized catalog
Questionnaire Templates
Offers standardized security and privacy framework questionnaire templates
User Access Control
Offers role based access controls to allow only permissioned users to utilize various parts of the software.
Risk assessment (4)
Risk Scoring
Offers built-in or automated vendor risk scoring
4th Party Assessments
Offers tools to assess fourth parties -- your vendor's vendors
Monitoring And Alerts
Monitors changes in risk and sends notifications, alerts, and reminders for specific actions including: upcoming assessments, profile access requests, etc
AI Monitoring
Uses AI to alert administrators to changes in risk scoring through continuous monitoring.
Configuration (5)
DLP Configuration
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Unified Policy Management
Allows users to track and control security policies across cloud services and providers.
Adaptive Access Control
Provides a risk-based approach to determining trust within the network.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Visibility (2)
Multicloud Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Asset Discovery
Detect new assets as they enter a cloud environments and networks to add to asset inventory.
Vulnerability Management (4)
Threat Hunting
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Vulnerability Scanning
Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities.
Monitoring (4)
Gap Analysis
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Vulnerability Intelligence
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Compliance Monitoring
Monitors data quality and sends alerts based on violations or misuse.
Continuous Monitoring
Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.
Asset Management (3)
Asset Discovery
Detects new assets as they enter cloud environments and networks to add to asset inventory.
Shadow IT Detection
Identifies unsanctioned software.
Change Management
Provides tools to track and implement required security policy changes.
Risk Management (4)
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities.
Reconnaissance
Gathers information about the system and potential exploits to be tested.
At-Risk Analysis
Uses machine learning to identify at-risk data.
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Generative AI (8)
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Generation
Allows users to generate text based on a text prompt.
Workflows - Audit Management (5)
Audit Trail
Displays all the changes made during audits, including details such as username, timestamp, or type of change in a centralized repository.
Recommendations
Coordinate and track recommended remediation actions.
Collaboration Tools
Facilitates collaboration between teams and stakeholders through shared workspaces.
Integrations
Integrates with risk management platforms, GRC tools, and other systems.
Planning & Scheduling
Facilitates the creation of audit plans, schedules, and reminders.
Documentation - Audit Management (2)
Templates & Forms
Provide out of the box audit templates and forms for various processes and industries.
Checklists
Provides checklists
Reporting & Analytics - Audit Management (3)
Dashboard
Dashboard provides real time or near real time updates and notifications in a centralized location.
Audit Performance
Provide information on the performance of the audit activities and processes.
Industry Compliance
Ensures audits are compliant with industry-specific regulations and standards.
Generative AI - Security Compliance (2)
Predictive Risk
Can analyze patterns and trends in security data to predict potential compliance risks.
Automated Documentation
Can automate the creation of compliance documentation by quickly generating accurate and comprehensive reports.
Generative AI - Vendor Security and Privacy Assessment (2)
Text Summarization
Utilizes AI to summarize security questionnaires.
Text Generation
Automate text responses to common security assessment questions.
Monitoring - IT Risk Management (1)
AI Monitoring
Utillizes AI to monitor and report on incidents in real-time.
Platform AI Features - Policy Management (2)
Reports
Can generate reports on policy compliance trends using AI.
Workflow Management
Uses AI to automate common workflow tasks such as policy creation, distribution, and updates.
Agentic AI - IT Risk Management (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Agentic AI - IT Asset Management (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives





