Wiz Features
Management (6)
Dashboards and Reports
Access pre-built and custom reports and dashboards. 112 reviewers of Wiz have provided feedback on this feature.
Workflow Management
Based on 101 Wiz reviews. Creates new or streamlines existing workflows to better handle IT support tickets and service.
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks 112 reviewers of Wiz have provided feedback on this feature.
Extensibility
Allows for customized support for hybrid environments This feature was mentioned in 24 Wiz reviews.
Workflow Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. 23 reviewers of Wiz have provided feedback on this feature.
Unified Visibility
As reported in 20 Wiz reviews. Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Operations (3)
Governance
Allows users to create, edit, and relinquish user access privileges. This feature was mentioned in 103 Wiz reviews.
Logging and Reporting
As reported in 106 Wiz reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. 106 reviewers of Wiz have provided feedback on this feature.
Security Controls (2)
Anomaly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 72 Wiz reviews.
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. 100 reviewers of Wiz have provided feedback on this feature.
Administration (10)
Risk Scoring
Provides risk scoring for suspicious activity, vulnerabilities, and other threats. This feature was mentioned in 191 Wiz reviews.
Secrets Management
Provides tools for managing authentication credentials such as keys and passwords. This feature was mentioned in 181 Wiz reviews.
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. This feature was mentioned in 193 Wiz reviews.
Configuration Management
Based on 188 Wiz reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Policy Enforcement
Based on 253 Wiz reviews. Allows administrators to set policies for security and data governance.
Auditing
Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. This feature was mentioned in 228 Wiz reviews.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service. This feature was mentioned in 243 Wiz reviews.
Security Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. 195 reviewers of Wiz have provided feedback on this feature.
Security Integration
As reported in 206 Wiz reviews. Integrates additional security tools to automate security and incident response processes.
Multicloud Visibility
As reported in 204 Wiz reviews. Allows users to track and control activity across cloud services and providers.
Monitoring (11)
Continuous Image Assurance
Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats. This feature was mentioned in 167 Wiz reviews.
Behavior Monitoring
Based on 160 Wiz reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. 178 reviewers of Wiz have provided feedback on this feature.
Gap Analysis
Based on 171 Wiz reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Vulnerability Intelligence
As reported in 184 Wiz reviews. Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Compliance Monitoring
Monitors data quality and sends alerts based on violations or misuse. This feature was mentioned in 174 Wiz reviews.
Continuous Monitoring
Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response. 182 reviewers of Wiz have provided feedback on this feature.
Resource utilization
Based on 103 Wiz reviews. Optimizes resource allocation.
Real-time monitoring
Consistently monitors processes for applications and IT infrastructure to detect anomalies in real-time. This feature was mentioned in 114 Wiz reviews.
Performance baseline
Based on 100 Wiz reviews. Sets up standard performance baseline to compare live container activities.
API monitoring
Based on 103 Wiz reviews. Traces connections between different containerized environments and detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Protection (3)
Dynamic Image Scanning
As reported in 172 Wiz reviews. Scans application and image source code for security flaws without executing it in a live environment
Runtime Protection
Based on 167 Wiz reviews. Monitors container activities and detects threats across containers, networks, and cloud service providers.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation. 161 reviewers of Wiz have provided feedback on this feature.
Security (6)
Compliance Monitoring
Monitors data quality and sends alerts based on violations or misuse. This feature was mentioned in 267 Wiz reviews.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 217 Wiz reviews.
Cloud Gap Analytics
As reported in 244 Wiz reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse. This feature was mentioned in 199 Wiz reviews.
Risk Analysis
Identifies potential network security risks, vulnerabilities, and compliance impacts. 209 reviewers of Wiz have provided feedback on this feature.
Reporting
Creates reports outlining log activity and relevant metrics. This feature was mentioned in 214 Wiz reviews.
Compliance (3)
Governance
Allows users to create, edit, and relinquish user access privileges. 238 reviewers of Wiz have provided feedback on this feature.
Data Governance
Ensures user access management, data lineage, and data encryption. 225 reviewers of Wiz have provided feedback on this feature.
Sensitive Data Compliance
As reported in 224 Wiz reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Performance (4)
Issue Tracking
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. 270 reviewers of Wiz have provided feedback on this feature.
Detection Rate
The rate at which scans accurately detect all vulnerabilities associated with the target. This feature was mentioned in 267 Wiz reviews.
False Positives
As reported in 267 Wiz reviews. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
Automated Scans
Runs pre-scripted vulnerability scans without requiring manual work. 271 reviewers of Wiz have provided feedback on this feature.
Network (3)
Compliance Testing
As reported in 252 Wiz reviews. Allows users to scan applications and networks for specific compliance requirements.
Perimeter Scanning
Analyzes network devices, servers and operating systems for vulnerabilities. This feature was mentioned in 248 Wiz reviews.
Configuration Monitoring
Based on 267 Wiz reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Functionality - Software Composition Analysis (3)
Language Support
As reported in 53 Wiz reviews. Supports a useful and wide variety of programming languages.
Integration
Integrates seamlessly with the build environment and development tools like repositories, package managers, etc. 57 reviewers of Wiz have provided feedback on this feature.
Transparency
Grants comprehensive user-friendly insight into all open source components. 55 reviewers of Wiz have provided feedback on this feature.
Effectiveness - Software Composition Analysis (3)
Remediation Suggestions
Provides relevant and helpful suggestions for vulnerability remediation upon detection. 58 reviewers of Wiz have provided feedback on this feature.
Continuous Monitoring
Monitors open source components proactively and continuously. This feature was mentioned in 57 Wiz reviews.
Thorough Detection
Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues. 59 reviewers of Wiz have provided feedback on this feature.
Activity Monitoring (2)
API Monitoring
As reported in 179 Wiz reviews. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Activity Monitoring
Actively monitors status of work stations either on-premise or remote. 191 reviewers of Wiz have provided feedback on this feature.
Detection & Response (4)
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly. This feature was mentioned in 25 Wiz reviews.
Threat Hunting
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. This feature was mentioned in 24 Wiz reviews.
Rule-Based Detection
Based on 24 Wiz reviews. Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance.
Real-Time Detection
Constantly monitors system to detect anomalies in real time. 24 reviewers of Wiz have provided feedback on this feature.
Analytics (3)
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur. This feature was mentioned in 25 Wiz reviews.
Artificial Intelligence & Machine Learning
Based on 24 Wiz reviews. Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Data Collection
Collects information from multiple sources to cross reference and build contextual to correlate intelligence. 25 reviewers of Wiz have provided feedback on this feature.
Configuration (4)
Configuration Monitoring
Based on 269 Wiz reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Unified Policy Management
Based on 244 Wiz reviews. Allows users to track and control security policies across cloud services and providers.
Adaptive Access Control
As reported in 242 Wiz reviews. Provides a risk-based approach to determining trust within the network.
API / Integrations
Based on 255 Wiz reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Visibility (2)
Multicloud Visibility
As reported in 270 Wiz reviews. Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Asset Discovery
As reported in 275 Wiz reviews. Detect new assets as they enter a cloud environments and networks to add to asset inventory.
Vulnerability Management (4)
Threat Hunting
As reported in 258 Wiz reviews. Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Vulnerability Scanning
Based on 281 Wiz reviews. Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Stores information related to new and common vulnerabilities and how to resolve them once incidents occur. This feature was mentioned in 268 Wiz reviews.
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities. 275 reviewers of Wiz have provided feedback on this feature.
Asset Management (3)
Asset Discovery
Detects new assets as they enter cloud environments and networks to add to asset inventory. This feature was mentioned in 188 Wiz reviews.
Shadow IT Detection
Based on 163 Wiz reviews. Identifies unsanctioned software.
Change Management
Based on 160 Wiz reviews. Provides tools to track and implement required security policy changes.
Risk Management (4)
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities. This feature was mentioned in 203 Wiz reviews.
Reconnaissance
Gathers information about the system and potential exploits to be tested. This feature was mentioned in 191 Wiz reviews.
At-Risk Analysis
Based on 188 Wiz reviews. Uses machine learning to identify at-risk data.
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur. 192 reviewers of Wiz have provided feedback on this feature.
Alerts management (3)
Multi-mode alerts
As reported in 108 Wiz reviews. Alerts over email, text, phone call, or more to multiple parties.
Opimization alerts
Provides information related to unnecessary spending and unused resources. This feature was mentioned in 109 Wiz reviews.
Incident alerts
As reported in 118 Wiz reviews. Gives alerts when incidents arise.
Automation (2)
Resolution automation
Diagnoses and resolves incidents without the need for human interaction. This feature was mentioned in 108 Wiz reviews.
Automation
Efficiently scales resource usage to optimize spend whith increased or decreased resource usage requirements. This feature was mentioned in 111 Wiz reviews.
Analysis (4)
Search
Based on 125 Wiz reviews. Allows users to search logs for troubleshooting and open-ended exploration of data.
Reporting
Creates reports outlining resource, underutilization, cost trends, and/or functional overlap. 122 reviewers of Wiz have provided feedback on this feature.
Visualization
Presents information and analytics in a digestible, intuitive, and visually appealing way. This feature was mentioned in 124 Wiz reviews.
Track trends
Allows users to track log trends. This feature was mentioned in 113 Wiz reviews.
Issue Resolution (3)
Root cause identification
Directly identifies, or increases identification speed for, root causes for container issues. This feature was mentioned in 116 Wiz reviews.
Resolution guidance
Provides paths, suggestions, or other general assistance towards issue resolution. This feature was mentioned in 120 Wiz reviews.
Proactive identification
Proactively identifies trends on container systems that could lead to failures or errors. 113 reviewers of Wiz have provided feedback on this feature.
Generative AI (1)
AI Text Summarization
Based on 97 Wiz reviews. Condenses long documents or text into a brief summary.
Access control - Cloud Infrastructure Entitlement Management (CIEM) (4)
Policy Management
As reported in 43 Wiz reviews. Helps define policies for access management
Fine-Grained Access Control
Uses principle of least privilege to ensure access control at granular level of specific resources and apps This feature was mentioned in 44 Wiz reviews.
Role-Based Access Control (RBAC)
Enables organization to define roles and assign access based on these roles This feature was mentioned in 44 Wiz reviews.
AI-driven access control
Streamlines the management of user access through AI 42 reviewers of Wiz have provided feedback on this feature.
Monitoring - Cloud Infrastructure Entitlement Management (CIEM) (2)
Monitoring
Tracks and logs user activities, access requests, and changes to entitlements This feature was mentioned in 45 Wiz reviews.
AI-based detection
Detects and remediates risky, misconfigured permissions for human and machine identities using AI This feature was mentioned in 44 Wiz reviews.
Auditing - Cloud Infrastructure Entitlement Management (CIEM) (2)
Visibility
Based on 48 Wiz reviews. Provides visibility into all users and identities across the system
Compliance Reporting
Provides reporting capabilities to demonstrate compliance 48 reviewers of Wiz have provided feedback on this feature.
Security - Cloud-Native Application Protection Platform (CNAPP) (4)
Workload and container security
Scans containers, workloads, and kubernetes clusters for any misconfigurations or vulnerabilities. 14 reviewers of Wiz have provided feedback on this feature.
Threat detection and response
Based on 14 Wiz reviews. Monitor live environments for anomalies, risks and threats to ensure rapid response.
DevSecOps Integrations
As reported in 14 Wiz reviews. Integrates with CI/CD pipelines to detect security risks early in the development life cycle.
Unified Visibility
Consolidate all security data across the tech and cloud stacks into one dashboard. 14 reviewers of Wiz have provided feedback on this feature.
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP) (3)
Intelligent remediations and suggestions
Based on 13 Wiz reviews. Offers an AI-powered engine to provide remediation guidance to the user based on the type of threat.
Risk prioritization
Uses context-aware analysis to identify critical and non-critical risks across vulnerabilities. 14 reviewers of Wiz have provided feedback on this feature.
Anomaly detection using machine learning
As reported in 13 Wiz reviews. Help detect anomalies across cloud workloads which could help present a potential breach.
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP) (2)
Multi-cloud visibility
Offers a unified view of all cloud assets across multi-cloud platforms such as AWS, Azure, GCP etc. 14 reviewers of Wiz have provided feedback on this feature.
Cloud Security Posture Management (CSPM)
As reported in 13 Wiz reviews. Continuously scans cloud environments for any misconfigurations, and provide benchmarks and guided remediation.
Generative AI - Exposure Management Platforms (2)
Predictive Analytics
Uses AI-driven models to analyze historical and current data to enable organizations to manage new exposures proactively. 12 reviewers of Wiz have provided feedback on this feature.
Automated Threat Detection
Uses AI algorithms to analyze data for patterns and anomalies that signify potential risks. 11 reviewers of Wiz have provided feedback on this feature.
Risk Identification and Assessment - Exposure Management Platforms (2)
Comprehensive Risk Assessment
Identifies, evaluates, and monitors various types of risks to understand the overall risk exposure and prioritize them based on potential impact. 11 reviewers of Wiz have provided feedback on this feature.
Advanced Analytics and Reporting
Based on 11 Wiz reviews. Includes tools for deep analysis of risk data, providing insights into trends and patterns that support strategic risk assessment and decision-making.
Monitoring and Integration - Exposure Management Platforms (2)
Integration and Data Consolidation
Ensures seamless interaction with other systems and unification of risk data, enabling a comprehensive view and efficient management of risk exposure. 11 reviewers of Wiz have provided feedback on this feature.
Real-time Monitoring and Alerts
As reported in 11 Wiz reviews. Allows for continuous surveillance of risk factors, providing timely alerts to mitigate emerging risks effectively.
Agentic AI - Vulnerability Scanner (2)
Autonomous Task Execution
Based on 24 Wiz reviews. Capability to perform complex tasks without constant human input
Proactive Assistance
As reported in 24 Wiz reviews. Anticipates needs and offers suggestions without prompting
Agentic AI - Cloud Security Monitoring and Analytics (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input 16 reviewers of Wiz have provided feedback on this feature.
Proactive Assistance
As reported in 16 Wiz reviews. Anticipates needs and offers suggestions without prompting
Decision Making
Based on 15 Wiz reviews. Makes informed choices based on available data and objectives
Agentic AI - Extended Detection and Response (XDR) Platforms (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Cloud-Native Application Protection Platform (CNAPP) (2)
Autonomous Task Execution
Based on 13 Wiz reviews. Capability to perform complex tasks without constant human input
Adaptive Learning
As reported in 12 Wiz reviews. Improves performance based on feedback and experience
Agentic AI - Cloud Detection and Response (CDR) (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input This feature was mentioned in 10 Wiz reviews.
Proactive Assistance
As reported in 10 Wiz reviews. Anticipates needs and offers suggestions without prompting
Decision Making
As reported in 10 Wiz reviews. Makes informed choices based on available data and objectives
Services - Extended Detection and Response (XDR) (1)
Managed Services
Offers managed detection and response services.
Services - Cloud Detection and Response (CDR) (1)
Managed Services
Offers managed detection and response services. This feature was mentioned in 11 Wiz reviews.
Discovery & Classification - Data Security Posture Management (DSPM) (3)
Continuous real‑time monitoring
Provide real‑time visibility into data exposures and activities.
Discover & classify sensitive data
Automatically scan across cloud, SaaS, on‑prem environments to locate and tag sensitive data.
Custom classification support
Allow business‑specific or regulatory data labels beyond default frameworks.
Risk Prioritization - Data Security Posture Management (DSPM) (3)
Detect excessive entitlements & toxic combinations
Identify over‑permissioned users, roles, or accounts in combination with misconfigurations.
Compliance posture assessment
Assess data risks against regulatory frameworks and internal policies.
Risk‑based exposure scoring
Prioritize findings based on data sensitivity, exploitability, and business impact.
Remediation & Governance - Data Security Posture Management (DSPM) (3)
Guided remediation actions
Provide context‑aware recommendations for fixing exposures (e.g., revoke access, encrypt, misconfiguration remediation).
Integration with enforcement tools
Integrate with CSPM, CIEM, SOAR, SIEM for automated policy enforcement.
Track remediation progress & trends
Monitor posture over time and track remediation efforts.





