
It ingests your cloud logs and other signals, cloud events, run time sensor and then it represents all the collected information on security graph and add additional context (network path, vulnerabilities, IAM permissions) to it which can be correlated using rego query language to build controls to detect mis configirations, near real time threats etc. Review collected by and hosted on G2.com.
the inbult ticketing solution needs improvement, you can't check history of an issue once it's resolved. Review collected by and hosted on G2.com.

