Features
Feature-and integration-rich, cyberCTRL powered by TMG, is as robust as it is nimble.
Check out our full list of product features. Find out what’s available right now and what enhancements will be available in the future. Plus, see all the different ways we work with the tools you already have in place to customize an end-to-end cybersecurity and privacy management solution that works for you.
Product Features | Always Available | Integration Dependent |
---|---|---|
Compliance Management | ✔ | |
Identity Management System (IMS) or Configuration Management Database (CMDB) | ✔ | |
National Institute of Standards and Technology (NIST) Cybersecurity and Privacy Frameworks | ✔ | |
Workflow/Project Management Engine | ✔ | |
Document Management | ✔ | |
Continuously Updated Default Best Practices, Policies, Standards, Procedures, and Guidelines | ✔ | |
Compliance/Audit Readiness Assessment | ✔ | |
Framework Cross-mapping | ✔ | |
Risk Management | ✔ | |
Compliance Controls Mapped to Assets and Risks | ✔ | |
Internal Risk Assessments | ✔ | |
Risk Register | ✔ | |
Continuously Updated Risk Scores (coming soon!) | ✔ | |
Risk Gap Analysis and Mitigation | ✔ | |
Governance Management | ✔ | |
Centralized Data Storage (data lake) | ✔ | |
Threat Detection | ✔ | |
End-user Behavior Analytics | ✔ | |
Vulnerability Scanning | ✔ | |
Endpoint Protection Platform (EPP)/Endpoint Detection and Response (EDR) | ✔ | |
Data Loss Prevention (DLP) | ✔ | |
Network Detection and Response (NDR) | ✔ | |
Unified Endpoint Management (UEM) | ✔ | |
Cloud Workload Protection Platform (CWPP) | ✔ | |
Cloud Access Security Broker (CASB) | ✔ | |
Secure Web Gateway (SWG) & Secure Email Gateway (SEG) | ✔ | |
Intrusion Detection and Intrusion Prevention Systems (IDS/IPS) | ✔ | |
Security Information and Event Management Systems (SIEM) | ✔ | |
Threat Intelligence | ✔ | |
Threat Intelligence Aggregation, Curation, and Distribution | ✔ | |
Alert Enrichment | ✔ | |
Threat Hunting | ✔ | |
Threat Intelligence Visualization | ✔ | |
Threat Reporting | ✔ | |
Threat Source Correlation | ✔ | |
Security Operations Automation | ✔ | |
Play/Process/Workflow Automation | ✔ | |
Playbook Management | ✔ | |
Log Analysis | ✔ | |
Threat Recommendations | ✔ | |
Threat Elevation | ✔ | |
Cybersecurity Incident Response (IR) | ✔ | |
Case/Incident Management | ✔ | |
Investigation/Triage | ✔ | |
Play/Processes/Workflows | ✔ | |
Incident Knowledgebase | ✔ | |
Cross-department Collaboration | ✔ | |
Full Audit Trail | ✔ | |
Security Analytics & Security Reporting | ✔ | |
Additional Benefits | ✔ | |
Full and Updated Cybersecurity & Privacy Documentation | ✔ | |
Full, Up-to-the-Second, Audit Trail | ✔ | |
Fully Integrated with Common Ticket Systems, IT portfolios, SIEMs, RMMs, and 3rd Party Vendors | ✔ | |
24×7 Access to Dedicated, Expert Cybersecurity Professionals. | ✔ | |
Secure Encrypted Environment | ✔ |