SecureFlag Features
Risk Analysis (3)
Risk Scoring
Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Reporting
Creates reports outlining log activity and relevant metrics.
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities.
Vulnerability Assesment (4)
Vulnerability Scanning
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Contextual Data
Identify risk data attributes such as description, category, owner, or hierarchy.
Dashboards
Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.
Automation (1)
Workflow Automation
Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Extensibility (3)
-
Customization
Customizable solution so administers can adjust content to industry, position, etc.
-
White-Labeling
Allows users to implement their own branding throughout the platform.
-
Content Library
Provides users with a pre-built library of useable security-related informational content.
Analysis (3)
-
Reporting
Provides analytics tools that reveal important business metrics and track progress.
-
Baselining
Assess current state of user security training, prior to training, which can be used to track performance and improvement.
-
Real-Time Code Analysis
Continuously scans application source code for security flaws without executing it.
Assessment (4)
-
Integrated Learning
Provides educational resources for developers as security issues are detected.
-
Gamification
Contains gamification tools, including but not limited to badges, leaderboards, and point scoring.
-
Continuous Assesment
The abillity to automate secure code assesment or have assesments scheduled and delivered continuously.
-
Developer Assesment
Provides challenges, simulations or other assesment features to test developers for common security mistakes





