
It ingests your cloud logs and other signals, cloud events, run time sensor and then it represents all the collected information on security graph and add additional context (network path, vulnerabilities, IAM permissions) to it which can be correlated using rego query language to build controls to detect mis configirations, near real time threats etc. Review collected by and hosted on G2.com.
the inbult ticketing solution needs improvement, you can't check history of an issue once it's resolved. Review collected by and hosted on G2.com.
At G2, we prefer fresh reviews and we like to follow up with reviewers. They may not have updated their review text, but have updated their review.
Validated through LinkedIn
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.