Symantec Integrated Cyber Defense Features
Management (3)
Dashboards and Reports
Access pre-built and custom reports and dashboards.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Operations (3)
Governance
Allows users to create, edit, and relinquish user access privileges.
Logging and Reporting
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security Controls (4)
Anomaly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Prevention (5)
Intrusion Prevention
Based on 10 Symantec Integrated Cyber Defense reviews.
Enforces security paramaters to prevent unauthorized access.
Firewall
Based on 11 Symantec Integrated Cyber Defense reviews.
Protects servers, data center infrastructure and information from a variety of attacks and malware threats.
Encryption
Provide some level of encryption of information, protecting sensitive data while it exists within the data center.
Security hardening
Facilitates system and network security by identifying and remediating vulnerabilities
Cloud Data Protection
Provides high quality and wide scope of in-cloud and offline data security capabilities.
Detection (3)
Intrusion Detection
Detects unauthorized access and use of privileged systems.
Security Monitoring
As reported in 11 Symantec Integrated Cyber Defense reviews.
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Anti-Malware / Malware Detection
Based on 10 Symantec Integrated Cyber Defense reviews.
Provides multiple techniques and information sources to alert users of malware occurrences.
Administration (20)
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Administration Console -
Based on 10 Symantec Integrated Cyber Defense reviews.
Provides a centralized console for administation tasks and unified control.
API / integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Data Management
Administrators can access and organize data related to incidents to produce reports or make data more navigable.
Incident Logs
Information on each incident is stored in databases for user reference and analytics.
Reporting
Produces reports detailing trends and vulnerabilities related to bot management and performance.
Policy, User, and Role Management
Creates access requirements and standards and establishes user, roles, and access rights.
Approval Workflows
Allows administrators to approve or reject access changes to using defined workflows.
Automated Provisioning
Automates provisioning and deprovisioning to reduce the amount of administrative manual work.
Bulk Changes
Reduces manual administrative work.
Centralized Management
Manages identity information from on-premise and cloud applications.
Self-Service Access Requests
Automatically allows access if users meet policy requirements.
Compliance
Monitors assets and enforces security policies to audit assets and infrastructure security.
Web Control
Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.
Application Control
Blocks endpoint users from accessing restricted applications.
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Device Control
Manages user network accessibility on laptops and mobile devices.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Scalability
Provides features to allow scaling for large organizations and user bases.
Global Access
Extends SDP network access to users regardless of their physical location.
Governance (3)
Access Control
Supports LDAP Protocol to enable access control and governance.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Data Visibility
Similifies data identification to increase visibility and management capabilities
Security (12)
Encryption
Protects data with within and as it leaves your secure or local network.
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Activity Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Breach Detection
Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.
Security Automation
Allows administrative control over automated security tasks.
Application Security
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Governance
Allows users to create, edit, and relinquish user access privileges.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Data Encryption/Security
Manages policies for user data access and data encryption.
Access Control
Supports LDAP Protocol to enable access control and governance.
Network Management (4)
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Identity Management (3)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Analysis (6)
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Anomoly Detection
Monitors acivity related to user behavior and compares activity to benchmarked patterns.
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Behavioral Analysis
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Functionality (17)
SSO
Provides a single access point for users to access multiple cloud products without multiple logins.
Cloud Registry
Details SaaS products the cloud security product can integrate with and provide security for.
Mobile Device Mangement
Offers the ability to set standards for types of mobile devices and networks capable of accessing data.
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.
Single Sign-On
Provides a single access point for users to access multiple cloud products without multiple logins.
BYOD support
Enables users to bring-your-own-device to access company applications.
Password Vault
Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.
Centralized management
Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.
Role-based security
Allows privileges based on roles, such as business unit or other factors.
Live notifications
Configure which events will trigger a notification to prevent privileged access abuse in real-time.
Live session recording & playback
Offers live session recording and playback for compliance and auditing purposes.
Hide passwords
Offers the option to hide passwords when sharing with users, such as contract workers
Temporary, time-limited privilege
Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Firewall
Protects endpoint devices from a variety of attacks and malware threats.
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Monitoring (7)
Audit Logging
Provides audit logs for compliance reasons.
Activity Logging
Monitors, records, and logs both real-time and post-event activity.
Anomaly Detection
Detects abnormal user behavior to mitigate risks.
Compliance Monitoring
Monitors data and compliance requirements. Sends alerts based on violations or misuse.
Vulnerability Monitoring
Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Reporting (2)
Audit log
Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.
Reporting
Includes reporting functionality.
Protection (4)
Policy Enforcement
Allows administrators to set policies for security and governance.
Security Audit
Allows for deep examination into network-connected devices, policies, and protocols.
Access Control
Supports LDAP Protocol to enable access control and governance.
User Authentication
Authenticates users prior to granting access to networks, applciations, and systems.
ServiceNow Apps (2)
ServiceNow Integration
How satisfied are you with this app/integration in the ServiceNow ecosystem?
Value
How valuable is it to be able to use this product with ServiceNow?
Generative AI (5)
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
Agentic AI - ServiceNow Store Apps (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting

