Feature-and integration-rich, cyberCTRL powered by TMG, is as robust as it is nimble.

Check out our full list of product features. Find out what’s available right now and what enhancements will be available in the future. Plus, see all the different ways we work with the tools you already have in place to customize an end-to-end cybersecurity and privacy management solution that works for you.

Product Features Always Available Integration Dependent
Compliance Management
 Identity Management System (IMS) or Configuration Management Database (CMDB)
 National Institute of Standards and Technology (NIST) Cybersecurity and Privacy Frameworks
 Workflow/Project Management Engine
 Document Management
 Continuously Updated Default Best Practices, Policies, Standards, Procedures, and Guidelines
 Compliance/Audit Readiness Assessment
 Framework Cross-mapping
Risk Management
 Compliance Controls Mapped to Assets and Risks
 Internal Risk Assessments
 Risk Register
 Continuously Updated Risk Scores (coming soon!)
 Risk Gap Analysis and Mitigation
Governance Management
Centralized Data Storage (data lake)
Threat Detection
 End-user Behavior Analytics
 Vulnerability Scanning
 Endpoint Protection Platform (EPP)/Endpoint Detection and Response (EDR)
 Data Loss Prevention (DLP)
 Network Detection and Response (NDR)
 Unified Endpoint Management (UEM)
 Cloud Workload Protection Platform (CWPP)
 Cloud Access Security Broker (CASB)
 Secure Web Gateway (SWG) & Secure Email Gateway (SEG)
 Intrusion Detection and Intrusion Prevention Systems (IDS/IPS)
 Security Information and Event Management Systems (SIEM)
Threat Intelligence
 Threat Intelligence Aggregation, Curation, and Distribution
 Alert Enrichment
 Threat Hunting
 Threat Intelligence Visualization
 Threat Reporting
 Threat Source Correlation
Security Operations Automation
 Play/Process/Workflow Automation
 Playbook Management
 Log Analysis
 Threat Recommendations
 Threat Elevation
Cybersecurity Incident Response (IR)
 Case/Incident Management
 Incident Knowledgebase
 Cross-department Collaboration
 Full Audit Trail
Security Analytics & Security Reporting
Additional Benefits
 Full and Updated Cybersecurity & Privacy Documentation
 Full, Up-to-the-Second, Audit Trail
 Fully Integrated with Common Ticket Systems, IT portfolios, SIEMs, RMMs, and 3rd Party Vendors
 24×7 Access to Dedicated, Expert Cybersecurity Professionals.
 Secure Encrypted Environment