(183)
4.8 out of 5
Visit Website
Sponsored
Dashboards and Reports | Access pre-built and custom reports and dashboards. | Not enough data | |
Workflow Management | Creates new or streamlines existing workflows to better handle IT support tickets and service. | Not enough data | |
Administration Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | Not enough data |
Governance | Allows users to create, edit, and relinquish user access privileges. | Not enough data | |
Logging and Reporting | Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. | Not enough data | |
API / Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Anomaly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Data Loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | Not enough data | |
Security Auditing | Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. | Not enough data | |
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data |
Issue Tracking | Based on 16 InsightVM (Nexpose) reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | 84% (Based on 16 reviews) | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. This feature was mentioned in 18 InsightVM (Nexpose) reviews. | 88% (Based on 18 reviews) | |
False Positives | As reported in 18 InsightVM (Nexpose) reviews. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | 61% (Based on 18 reviews) | |
Automated Scans | Based on 18 InsightVM (Nexpose) reviews. Runs pre-scripted vulnerability scans without requiring manual work. | 94% (Based on 18 reviews) |
Compliance Testing | Based on 18 InsightVM (Nexpose) reviews. Allows users to scan applications and networks for specific compliance requirements. | 84% (Based on 18 reviews) | |
Perimeter Scanning | Based on 19 InsightVM (Nexpose) reviews. Analyzes network devices, servers and operating systems for vulnerabilities. | 90% (Based on 19 reviews) | |
Configuration Monitoring | Based on 17 InsightVM (Nexpose) reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | 84% (Based on 17 reviews) |
Manual Application Testing | Allows users to perfrom hands-on live simulations and penetration tests. This feature was mentioned in 12 InsightVM (Nexpose) reviews. | 79% (Based on 12 reviews) | |
Static Code Analysis | Based on 12 InsightVM (Nexpose) reviews. Scans application source code for security flaws without executing it. | 76% (Based on 12 reviews) | |
Black Box Testing | Scans functional applications externally for vulnerabilities like SQL injection or XSS. This feature was mentioned in 14 InsightVM (Nexpose) reviews. | 75% (Based on 14 reviews) |
Risk Scoring | Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches. This feature was mentioned in 17 InsightVM (Nexpose) reviews. | 91% (Based on 17 reviews) | |
Reporting | As reported in 17 InsightVM (Nexpose) reviews. Creates reports outlining log activity and relevant metrics. | 84% (Based on 17 reviews) | |
Risk-Prioritization | As reported in 17 InsightVM (Nexpose) reviews. Allows for vulnerability ranking by customized risk and threat priorities. | 89% (Based on 17 reviews) |
Vulnerability Scanning | Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. 17 reviewers of InsightVM (Nexpose) have provided feedback on this feature. | 94% (Based on 17 reviews) | |
Vulnerability Intelligence | Stores information related to common vulnerabilities and how to resolve them once incidents occur. 17 reviewers of InsightVM (Nexpose) have provided feedback on this feature. | 91% (Based on 17 reviews) | |
Contextual Data | Identify risk data attributes such as description, category, owner, or hierarchy. 15 reviewers of InsightVM (Nexpose) have provided feedback on this feature. | 87% (Based on 15 reviews) | |
Dashboards | As reported in 17 InsightVM (Nexpose) reviews. Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data. | 90% (Based on 17 reviews) |
Automated Remediation | As reported in 13 InsightVM (Nexpose) reviews. Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | 78% (Based on 13 reviews) | |
Workflow Automation | Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. 14 reviewers of InsightVM (Nexpose) have provided feedback on this feature. | 77% (Based on 14 reviews) | |
Security Testing | As reported in 15 InsightVM (Nexpose) reviews. Allows users to perfrom hands-on live simulations and penetration tests. | 89% (Based on 15 reviews) | |
Test Automation | Runs pre-scripted vulnerability scans and security tests without requiring manual work. This feature was mentioned in 15 InsightVM (Nexpose) reviews. | 83% (Based on 15 reviews) |
Usage Monitoring | Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste. | Not enough data | |
Database Monitoring | Monitors performance and statistics related to memory, caches and connections. | Not enough data | |
API Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Activity Monitoring | Actively monitors status of work stations either on-premise or remote. | Not enough data |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. | Not enough data | |
Risk Analysis | See feature definition | Identifies potential network security risks, vulnerabilities, and compliance impacts. | Not enough data |
Reporting | Creates reports outlining log activity and relevant metrics. | Not enough data |
Security Automation | Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. | Not enough data | |
Security Integration | Integrates additional security tools to automate security and incident response processes. | Not enough data | |
Multicloud Visibility | Allows users to track and control activity across cloud services and providers. | Not enough data |
ServiceNow Integration | How satisfied are you with this app/integration in the ServiceNow ecosystem? | Not enough data | |
Value | How valuable is it to be able to use this product with ServiceNow? | Not enough data |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data |