Wiz Features
Management (6)
Dashboards and Reports
118 reviewers of Wiz have provided feedback on this feature.
Access pre-built and custom reports and dashboards.
Workflow Management
This feature was mentioned in 105 Wiz reviews.
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Administration Console
Based on 118 Wiz reviews.
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Extensibility
26 reviewers of Wiz have provided feedback on this feature.
Allows for customized support for hybrid environments
Workflow Automation
As reported in 25 Wiz reviews.
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Unified Visibility
As reported in 22 Wiz reviews.
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Operations (3)
Governance
This feature was mentioned in 106 Wiz reviews.
Allows users to create, edit, and relinquish user access privileges.
Logging and Reporting
This feature was mentioned in 109 Wiz reviews.
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
This feature was mentioned in 110 Wiz reviews.
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security Controls (2)
Anomaly Detection
Based on 75 Wiz reviews.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Security Auditing
105 reviewers of Wiz have provided feedback on this feature.
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Administration (10)
Risk Scoring
Based on 193 Wiz reviews.
Provides risk scoring for suspicious activity, vulnerabilities, and other threats.
Secrets Management
Based on 183 Wiz reviews.
Provides tools for managing authentication credentials such as keys and passwords.
Security Auditing
As reported in 196 Wiz reviews.
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Configuration Management
This feature was mentioned in 190 Wiz reviews.
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Policy Enforcement
This feature was mentioned in 259 Wiz reviews.
Allows administrators to set policies for security and data governance.
Auditing
This feature was mentioned in 233 Wiz reviews.
Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
Workflow Management
Based on 248 Wiz reviews.
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Security Automation
This feature was mentioned in 201 Wiz reviews.
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Integration
This feature was mentioned in 211 Wiz reviews.
Integrates additional security tools to automate security and incident response processes.
Multicloud Visibility
As reported in 211 Wiz reviews.
Allows users to track and control activity across cloud services and providers.
Monitoring (11)
Continuous Image Assurance
169 reviewers of Wiz have provided feedback on this feature.
Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats.
Behavior Monitoring
162 reviewers of Wiz have provided feedback on this feature.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Observability
This feature was mentioned in 180 Wiz reviews.
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Gap Analysis
Based on 176 Wiz reviews.
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Vulnerability Intelligence
This feature was mentioned in 189 Wiz reviews.
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Compliance Monitoring
This feature was mentioned in 178 Wiz reviews.
Monitors data quality and sends alerts based on violations or misuse.
Continuous Monitoring
Based on 187 Wiz reviews.
Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.
Resource utilization
104 reviewers of Wiz have provided feedback on this feature.
Optimizes resource allocation.
Real-time monitoring
115 reviewers of Wiz have provided feedback on this feature.
Consistently monitors processes for applications and IT infrastructure to detect anomalies in real-time.
Performance baseline
This feature was mentioned in 101 Wiz reviews.
Sets up standard performance baseline to compare live container activities.
API monitoring
Based on 104 Wiz reviews.
Traces connections between different containerized environments and detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Protection (3)
Dynamic Image Scanning
As reported in 174 Wiz reviews.
Scans application and image source code for security flaws without executing it in a live environment
Runtime Protection
169 reviewers of Wiz have provided feedback on this feature.
Monitors container activities and detects threats across containers, networks, and cloud service providers.
Network Segmentation
163 reviewers of Wiz have provided feedback on this feature.
Allows administrative control over network components, mapping, and segmentation.
Security (6)
Compliance Monitoring
This feature was mentioned in 275 Wiz reviews.
Monitors data quality and sends alerts based on violations or misuse.
Anomoly Detection
Based on 224 Wiz reviews.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Cloud Gap Analytics
As reported in 250 Wiz reviews.
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
This feature was mentioned in 204 Wiz reviews.
Monitors data quality and send alerts based on violations or misuse.
Risk Analysis
This feature was mentioned in 214 Wiz reviews.
Identifies potential network security risks, vulnerabilities, and compliance impacts.
Reporting
220 reviewers of Wiz have provided feedback on this feature.
Creates reports outlining log activity and relevant metrics.
Compliance (3)
Governance
This feature was mentioned in 244 Wiz reviews.
Allows users to create, edit, and relinquish user access privileges.
Data Governance
This feature was mentioned in 231 Wiz reviews.
Ensures user access management, data lineage, and data encryption.
Sensitive Data Compliance
230 reviewers of Wiz have provided feedback on this feature.
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Performance (4)
Issue Tracking
This feature was mentioned in 279 Wiz reviews.
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
Detection Rate
274 reviewers of Wiz have provided feedback on this feature.
The rate at which scans accurately detect all vulnerabilities associated with the target.
False Positives
Based on 274 Wiz reviews.
The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
Automated Scans
This feature was mentioned in 279 Wiz reviews.
Runs pre-scripted vulnerability scans without requiring manual work.
Network (3)
Compliance Testing
Based on 258 Wiz reviews.
Allows users to scan applications and networks for specific compliance requirements.
Perimeter Scanning
Based on 254 Wiz reviews.
Analyzes network devices, servers and operating systems for vulnerabilities.
Configuration Monitoring
As reported in 274 Wiz reviews.
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Functionality - Software Composition Analysis (3)
Language Support
54 reviewers of Wiz have provided feedback on this feature.
Supports a useful and wide variety of programming languages.
Integration
Based on 59 Wiz reviews.
Integrates seamlessly with the build environment and development tools like repositories, package managers, etc.
Transparency
This feature was mentioned in 56 Wiz reviews.
Grants comprehensive user-friendly insight into all open source components.
Effectiveness - Software Composition Analysis (3)
Remediation Suggestions
This feature was mentioned in 59 Wiz reviews.
Provides relevant and helpful suggestions for vulnerability remediation upon detection.
Continuous Monitoring
This feature was mentioned in 58 Wiz reviews.
Monitors open source components proactively and continuously.
Thorough Detection
This feature was mentioned in 60 Wiz reviews.
Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues.
Activity Monitoring (2)
API Monitoring
As reported in 183 Wiz reviews.
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Activity Monitoring
This feature was mentioned in 196 Wiz reviews.
Actively monitors status of work stations either on-premise or remote.
Detection & Response (4)
Response Automation
Based on 27 Wiz reviews.
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Threat Hunting
This feature was mentioned in 26 Wiz reviews.
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Rule-Based Detection
Based on 26 Wiz reviews.
Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance.
Real-Time Detection
As reported in 27 Wiz reviews.
Constantly monitors system to detect anomalies in real time.
Analytics (3)
Threat Intelligence
This feature was mentioned in 27 Wiz reviews.
Stores information related to common threats and how to resolve them once incidents occur.
Artificial Intelligence & Machine Learning
This feature was mentioned in 26 Wiz reviews.
Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Data Collection
This feature was mentioned in 27 Wiz reviews.
Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
Configuration (4)
Configuration Monitoring
As reported in 278 Wiz reviews.
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Unified Policy Management
As reported in 251 Wiz reviews.
Allows users to track and control security policies across cloud services and providers.
Adaptive Access Control
As reported in 248 Wiz reviews.
Provides a risk-based approach to determining trust within the network.
API / Integrations
As reported in 264 Wiz reviews.
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Visibility (2)
Multicloud Visibility
282 reviewers of Wiz have provided feedback on this feature.
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Asset Discovery
285 reviewers of Wiz have provided feedback on this feature.
Detect new assets as they enter a cloud environments and networks to add to asset inventory.
Vulnerability Management (4)
Threat Hunting
This feature was mentioned in 266 Wiz reviews.
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Vulnerability Scanning
293 reviewers of Wiz have provided feedback on this feature.
Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
As reported in 274 Wiz reviews.
Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.
Risk-Prioritization
289 reviewers of Wiz have provided feedback on this feature.
Allows for vulnerability ranking by customized risk and threat priorities.
Asset Management (3)
Asset Discovery
192 reviewers of Wiz have provided feedback on this feature.
Detects new assets as they enter cloud environments and networks to add to asset inventory.
Shadow IT Detection
This feature was mentioned in 166 Wiz reviews.
Identifies unsanctioned software.
Change Management
Based on 163 Wiz reviews.
Provides tools to track and implement required security policy changes.
Risk Management (4)
Risk-Prioritization
This feature was mentioned in 207 Wiz reviews.
Allows for vulnerability ranking by customized risk and threat priorities.
Reconnaissance
As reported in 195 Wiz reviews.
Gathers information about the system and potential exploits to be tested.
At-Risk Analysis
192 reviewers of Wiz have provided feedback on this feature.
Uses machine learning to identify at-risk data.
Threat Intelligence
Based on 196 Wiz reviews.
Stores information related to common threats and how to resolve them once incidents occur.
Alerts management (3)
Multi-mode alerts
Based on 109 Wiz reviews.
Alerts over email, text, phone call, or more to multiple parties.
Opimization alerts
110 reviewers of Wiz have provided feedback on this feature.
Provides information related to unnecessary spending and unused resources.
Incident alerts
119 reviewers of Wiz have provided feedback on this feature.
Gives alerts when incidents arise.
Automation (2)
Resolution automation
This feature was mentioned in 109 Wiz reviews.
Diagnoses and resolves incidents without the need for human interaction.
Automation
Based on 112 Wiz reviews.
Efficiently scales resource usage to optimize spend whith increased or decreased resource usage requirements.
Analysis (4)
Search
126 reviewers of Wiz have provided feedback on this feature.
Allows users to search logs for troubleshooting and open-ended exploration of data.
Reporting
This feature was mentioned in 123 Wiz reviews.
Creates reports outlining resource, underutilization, cost trends, and/or functional overlap.
Visualization
As reported in 126 Wiz reviews.
Presents information and analytics in a digestible, intuitive, and visually appealing way.
Track trends
This feature was mentioned in 114 Wiz reviews.
Allows users to track log trends.
Issue Resolution (3)
Root cause identification
117 reviewers of Wiz have provided feedback on this feature.
Directly identifies, or increases identification speed for, root causes for container issues.
Resolution guidance
122 reviewers of Wiz have provided feedback on this feature.
Provides paths, suggestions, or other general assistance towards issue resolution.
Proactive identification
As reported in 114 Wiz reviews.
Proactively identifies trends on container systems that could lead to failures or errors.
Generative AI (1)
AI Text Summarization
Based on 101 Wiz reviews.
Condenses long documents or text into a brief summary.
Access control - Cloud Infrastructure Entitlement Management (CIEM) (4)
Policy Management
This feature was mentioned in 44 Wiz reviews.
Helps define policies for access management
Fine-Grained Access Control
45 reviewers of Wiz have provided feedback on this feature.
Uses principle of least privilege to ensure access control at granular level of specific resources and apps
Role-Based Access Control (RBAC)
45 reviewers of Wiz have provided feedback on this feature.
Enables organization to define roles and assign access based on these roles
AI-driven access control
43 reviewers of Wiz have provided feedback on this feature.
Streamlines the management of user access through AI
Monitoring - Cloud Infrastructure Entitlement Management (CIEM) (2)
Monitoring
As reported in 46 Wiz reviews.
Tracks and logs user activities, access requests, and changes to entitlements
AI-based detection
45 reviewers of Wiz have provided feedback on this feature.
Detects and remediates risky, misconfigured permissions for human and machine identities using AI
Auditing - Cloud Infrastructure Entitlement Management (CIEM) (2)
Visibility
Based on 49 Wiz reviews.
Provides visibility into all users and identities across the system
Compliance Reporting
This feature was mentioned in 49 Wiz reviews.
Provides reporting capabilities to demonstrate compliance
Security - Cloud-Native Application Protection Platform (CNAPP) (4)
Workload and container security
As reported in 19 Wiz reviews.
Scans containers, workloads, and kubernetes clusters for any misconfigurations or vulnerabilities.
Threat detection and response
Based on 19 Wiz reviews.
Monitor live environments for anomalies, risks and threats to ensure rapid response.
DevSecOps Integrations
19 reviewers of Wiz have provided feedback on this feature.
Integrates with CI/CD pipelines to detect security risks early in the development life cycle.
Unified Visibility
21 reviewers of Wiz have provided feedback on this feature.
Consolidate all security data across the tech and cloud stacks into one dashboard.
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP) (3)
Intelligent remediations and suggestions
As reported in 19 Wiz reviews.
Offers an AI-powered engine to provide remediation guidance to the user based on the type of threat.
Risk prioritization
This feature was mentioned in 20 Wiz reviews.
Uses context-aware analysis to identify critical and non-critical risks across vulnerabilities.
Anomaly detection using machine learning
Based on 18 Wiz reviews.
Help detect anomalies across cloud workloads which could help present a potential breach.
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP) (2)
Multi-cloud visibility
This feature was mentioned in 20 Wiz reviews.
Offers a unified view of all cloud assets across multi-cloud platforms such as AWS, Azure, GCP etc.
Cloud Security Posture Management (CSPM)
20 reviewers of Wiz have provided feedback on this feature.
Continuously scans cloud environments for any misconfigurations, and provide benchmarks and guided remediation.
Generative AI - Exposure Management Platforms (2)
Predictive Analytics
Based on 14 Wiz reviews.
Uses AI-driven models to analyze historical and current data to enable organizations to manage new exposures proactively.
Automated Threat Detection
13 reviewers of Wiz have provided feedback on this feature.
Uses AI algorithms to analyze data for patterns and anomalies that signify potential risks.
Risk Identification and Assessment - Exposure Management Platforms (2)
Comprehensive Risk Assessment
13 reviewers of Wiz have provided feedback on this feature.
Identifies, evaluates, and monitors various types of risks to understand the overall risk exposure and prioritize them based on potential impact.
Advanced Analytics and Reporting
Based on 13 Wiz reviews.
Includes tools for deep analysis of risk data, providing insights into trends and patterns that support strategic risk assessment and decision-making.
Monitoring and Integration - Exposure Management Platforms (2)
Integration and Data Consolidation
13 reviewers of Wiz have provided feedback on this feature.
Ensures seamless interaction with other systems and unification of risk data, enabling a comprehensive view and efficient management of risk exposure.
Real-time Monitoring and Alerts
Based on 13 Wiz reviews.
Allows for continuous surveillance of risk factors, providing timely alerts to mitigate emerging risks effectively.
Agentic AI - Vulnerability Scanner (2)
Autonomous Task Execution
Based on 29 Wiz reviews.
Capability to perform complex tasks without constant human input
Proactive Assistance
As reported in 29 Wiz reviews.
Anticipates needs and offers suggestions without prompting
Agentic AI - Cloud Security Monitoring and Analytics (3)
Autonomous Task Execution
As reported in 20 Wiz reviews.
Capability to perform complex tasks without constant human input
Proactive Assistance
20 reviewers of Wiz have provided feedback on this feature.
Anticipates needs and offers suggestions without prompting
Decision Making
As reported in 19 Wiz reviews.
Makes informed choices based on available data and objectives
Agentic AI - Extended Detection and Response (XDR) Platforms (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Cloud-Native Application Protection Platform (CNAPP) (2)
Autonomous Task Execution
As reported in 18 Wiz reviews.
Capability to perform complex tasks without constant human input
Adaptive Learning
As reported in 17 Wiz reviews.
Improves performance based on feedback and experience
Agentic AI - Cloud Detection and Response (CDR) (3)
Autonomous Task Execution
This feature was mentioned in 11 Wiz reviews.
Capability to perform complex tasks without constant human input
Proactive Assistance
This feature was mentioned in 11 Wiz reviews.
Anticipates needs and offers suggestions without prompting
Decision Making
11 reviewers of Wiz have provided feedback on this feature.
Makes informed choices based on available data and objectives
Services - Extended Detection and Response (XDR) (1)
Managed Services
Offers managed detection and response services.
Services - Cloud Detection and Response (CDR) (1)
Managed Services
As reported in 12 Wiz reviews.
Offers managed detection and response services.
Discovery & Classification - Data Security Posture Management (DSPM) (3)
Continuous real‑time monitoring
Provide real‑time visibility into data exposures and activities.
Discover & classify sensitive data
Automatically scan across cloud, SaaS, on‑prem environments to locate and tag sensitive data.
Custom classification support
Allow business‑specific or regulatory data labels beyond default frameworks.
Risk Prioritization - Data Security Posture Management (DSPM) (3)
Detect excessive entitlements & toxic combinations
Identify over‑permissioned users, roles, or accounts in combination with misconfigurations.
Compliance posture assessment
Assess data risks against regulatory frameworks and internal policies.
Risk‑based exposure scoring
Prioritize findings based on data sensitivity, exploitability, and business impact.
Remediation & Governance - Data Security Posture Management (DSPM) (3)
Guided remediation actions
This feature was mentioned in 10 Wiz reviews.
Provide context‑aware recommendations for fixing exposures (e.g., revoke access, encrypt, misconfiguration remediation).
Integration with enforcement tools
Integrate with CSPM, CIEM, SOAR, SIEM for automated policy enforcement.
Track remediation progress & trends
Monitor posture over time and track remediation efforts.
Model Protection - AI Security Solutions (4)
Input Hardening
Provides specific capability to defend AI assets from adversarial attacks (including prompt injection, data poisoning, model inversion or extraction) without requiring retraining of the underlying model.
Input/Output Inspection
Enables automatic inspection of model inputs (prompts) and/or outputs (responses) to prevent unsafe, sensitive or manipulated content.
Integrity Monitoring
Monitors the integrity of model weights, dependencies or metadata (for example via SBOM/AIBOM) to detect tampering, drift or unauthorised modification.
Model Access Control
Verifies the ability to enforce who or what (users, agents, systems) may access a model or LLM asset.
Runtime Monitoring - AI Security Solutions (2)
AI Behavior Anomaly Detection
Detects unusual or harmful runtime behaviour of AI models, agents or workflows (such as unexpected output patterns, excessive permissions use, or unknown agents).
Audit Trail
Provides a persistent, searchable audit log of AI‑asset inputs, outputs and interactions (including who/what invoked the model, when, and with what data) for forensics and compliance.
Policy Enforcement and Compliance - AI Security Solutions (4)
Scalable Governance
Ensures that the AI‑security platform supports scaling of AI‑asset protection (models, agents, multi‑cloud deployments) and applies governance/compliance frameworks as AI usage grows.
Integrations
Enables integration of the AI‑security solution with traditional security stacks (SIEM, SOAR, cloud security, application security, identity/access management) to unify visibility and response.
Shadow AI
Offers visibility into unmanaged or unauthorized AI/agent use (“shadow AI”) across the organisation and enforces control over such usage (e.g., agent creation, LLM‑based services).
Policy‑as‑Code for AI Assets
Supports codified, machine‑enforceable security policies targeting AI models/agents (for example, blocking certain categories of prompts, enforcing least‑privilege for model use, enforcing “no external data” rules).
Functionality - AI Security Posture Management (AI-SPM) Tools (5)
Security Ecosystem Integration
Integrate with existing security infrastructure (SIEM, CASB, IAM, DSPM/CSPM/SSPM) to bring AI‑SPM into the wider security ecosystem.
AI Asset Discovery
Discover AI applications, agents, chatbots and integrations across SaaS, APIs and other environments.
Adaptive Policy Updates
Support continuous updates to policies and controls as AI‑tool usage evolves and new threats emerge.
Access and Permissions Monitoring
Monitor data flows, permissions and resource access associated with AI integrations and tools.
Policy Enforcement
Enforce AI‑specific security policies in real time, such as limiting agent permissions and blocking unauthorized AI activity.
Risk Assessment - AI Security Posture Management (AI-SPM) Tools (2)
AI Risk Assessment
Continuously assess AI integration risks including misconfigurations, policy violations and exposure to external AI services.
AI Asset Posture Scoring
Provide dashboards, risk scores and prioritisation for remediation across the AI‑asset estate.
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools (2)
AI‑Generated Content Controls
Monitor AI‑generated content for sensitive/regulated information and apply remediation or blocking controls.
Audit Trails
Maintain audit logs, governance controls and reporting tied specifically to AI assets, agent behaviours and integrations.





