Introducing G2.ai, the future of software buying.Try now

Wiz Features

What are the features of Wiz?

Administration

  • Policy Enforcement

Security

  • Compliance Monitoring

Performance

  • Issue Tracking
  • Detection Rate
  • False Positives
  • Automated Scans

Network

  • Configuration Monitoring

Configuration

  • Configuration Monitoring
  • API / Integrations

Visibility

  • Multicloud Visibility
  • Asset Discovery

Vulnerability Management

  • Threat Hunting
  • Vulnerability Scanning
  • Vulnerability Intelligence
  • Risk-Prioritization

Filter for Features

Management

Dashboards and Reports

Access pre-built and custom reports and dashboards. 102 reviewers of Wiz have provided feedback on this feature.
86%
(Based on 102 reviews)

Workflow Management

As reported in 90 Wiz reviews. Creates new or streamlines existing workflows to better handle IT support tickets and service.
84%
(Based on 90 reviews)

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks 101 reviewers of Wiz have provided feedback on this feature.
93%
(Based on 101 reviews)

Extensibility

Allows for customized support for hybrid environments 21 reviewers of Wiz have provided feedback on this feature.
85%
(Based on 21 reviews)

Workflow Automation

As reported in 20 Wiz reviews. Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
88%
(Based on 20 reviews)

Unified Visibility

As reported in 17 Wiz reviews. Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
92%
(Based on 17 reviews)

Operations

Governance

Allows users to create, edit, and relinquish user access privileges. 92 reviewers of Wiz have provided feedback on this feature.
90%
(Based on 92 reviews)

Logging and Reporting

Based on 95 Wiz reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
86%
(Based on 95 reviews)

API / Integrations

As reported in 95 Wiz reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
90%
(Based on 95 reviews)

Security Controls

Anomaly Detection

Based on 61 Wiz reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
83%
(Based on 61 reviews)

Security Auditing

Based on 89 Wiz reviews. Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
90%
(Based on 89 reviews)

Administration

Risk Scoring

Provides risk scoring for suspicious activity, vulnerabilities, and other threats. 168 reviewers of Wiz have provided feedback on this feature.
89%
(Based on 168 reviews)

Secrets Management

Based on 159 Wiz reviews. Provides tools for managing authentication credentials such as keys and passwords.
82%
(Based on 159 reviews)

Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. 171 reviewers of Wiz have provided feedback on this feature.
91%
(Based on 171 reviews)

Configuration Management

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. This feature was mentioned in 166 Wiz reviews.
89%
(Based on 166 reviews)

Policy Enforcement

Allows administrators to set policies for security and data governance. This feature was mentioned in 228 Wiz reviews.
85%
(Based on 228 reviews)

Auditing

Based on 203 Wiz reviews. Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
87%
(Based on 203 reviews)

Workflow Management

Creates new or streamlines existing workflows to better handle IT support tickets and service. This feature was mentioned in 217 Wiz reviews.
83%
(Based on 217 reviews)

Security Automation

Based on 178 Wiz reviews. Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
83%
(Based on 178 reviews)

Security Integration

As reported in 188 Wiz reviews. Integrates additional security tools to automate security and incident response processes.
87%
(Based on 188 reviews)

Multicloud Visibility

Allows users to track and control activity across cloud services and providers. 186 reviewers of Wiz have provided feedback on this feature.
91%
(Based on 186 reviews)

Monitoring

Continuous Image Assurance

Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats. This feature was mentioned in 145 Wiz reviews.
82%
(Based on 145 reviews)

Behavior Monitoring

As reported in 138 Wiz reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
78%
(Based on 138 reviews)

Observability

Based on 156 Wiz reviews. Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
86%
(Based on 156 reviews)

Gap Analysis

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. This feature was mentioned in 152 Wiz reviews.
85%
(Based on 152 reviews)

Vulnerability Intelligence

As reported in 165 Wiz reviews. Stores information related to common vulnerabilities and how to resolve them once incidents occur.
90%
(Based on 165 reviews)

Compliance Monitoring

Based on 157 Wiz reviews. Monitors data quality and sends alerts based on violations or misuse.
87%
(Based on 157 reviews)

Continuous Monitoring

Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response. 165 reviewers of Wiz have provided feedback on this feature.
89%
(Based on 165 reviews)

Resource utilization

Based on 86 Wiz reviews. Optimizes resource allocation.
85%
(Based on 86 reviews)

Real-time monitoring

As reported in 97 Wiz reviews. Consistently monitors processes for applications and IT infrastructure to detect anomalies in real-time.
85%
(Based on 97 reviews)

Performance baseline

Sets up standard performance baseline to compare live container activities. This feature was mentioned in 84 Wiz reviews.
85%
(Based on 84 reviews)

API monitoring

Based on 86 Wiz reviews. Traces connections between different containerized environments and detects anomalies in functionality, user accessibility, traffic flows, and tampering.
79%
(Based on 86 reviews)

Protection

Dynamic Image Scanning

As reported in 151 Wiz reviews. Scans application and image source code for security flaws without executing it in a live environment
84%
(Based on 151 reviews)

Runtime Protection

Based on 145 Wiz reviews. Monitors container activities and detects threats across containers, networks, and cloud service providers.
78%
(Based on 145 reviews)

Network Segmentation

Based on 139 Wiz reviews. Allows administrative control over network components, mapping, and segmentation.
76%
(Based on 139 reviews)

Security

Compliance Monitoring

Monitors data quality and sends alerts based on violations or misuse. 240 reviewers of Wiz have provided feedback on this feature.
90%
(Based on 240 reviews)

Anomoly Detection

As reported in 190 Wiz reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
82%
(Based on 190 reviews)

Cloud Gap Analytics

Based on 217 Wiz reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
88%
(Based on 217 reviews)

Compliance Monitoring

As reported in 182 Wiz reviews. Monitors data quality and send alerts based on violations or misuse.
86%
(Based on 182 reviews)

Risk AnalysisView full feature definition

See feature definition
Based on 190 Wiz reviews. Identifies potential network security risks, vulnerabilities, and compliance impacts.
89%
(Based on 190 reviews)

Reporting

As reported in 196 Wiz reviews. Creates reports outlining log activity and relevant metrics.
83%
(Based on 196 reviews)

Compliance

Governance

As reported in 212 Wiz reviews. Allows users to create, edit, and relinquish user access privileges.
87%
(Based on 212 reviews)

Data Governance

As reported in 200 Wiz reviews. Ensures user access management, data lineage, and data encryption.
83%
(Based on 200 reviews)

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. 198 reviewers of Wiz have provided feedback on this feature.
83%
(Based on 198 reviews)

Performance

Issue Tracking

As reported in 242 Wiz reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
83%
(Based on 242 reviews)

Detection Rate

The rate at which scans accurately detect all vulnerabilities associated with the target. This feature was mentioned in 239 Wiz reviews.
88%
(Based on 239 reviews)

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. 240 reviewers of Wiz have provided feedback on this feature.
74%
(Based on 240 reviews)

Automated Scans

Runs pre-scripted vulnerability scans without requiring manual work. This feature was mentioned in 244 Wiz reviews.
90%
(Based on 244 reviews)

Network

Compliance Testing

Based on 225 Wiz reviews. Allows users to scan applications and networks for specific compliance requirements.
87%
(Based on 225 reviews)

Perimeter Scanning

Analyzes network devices, servers and operating systems for vulnerabilities. This feature was mentioned in 221 Wiz reviews.
85%
(Based on 221 reviews)

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. This feature was mentioned in 240 Wiz reviews.
88%
(Based on 240 reviews)

Functionality - Software Composition Analysis

Language Support

As reported in 47 Wiz reviews. Supports a useful and wide variety of programming languages.
88%
(Based on 47 reviews)

Integration

Integrates seamlessly with the build environment and development tools like repositories, package managers, etc. 51 reviewers of Wiz have provided feedback on this feature.
93%
(Based on 51 reviews)

Transparency

Grants comprehensive user-friendly insight into all open source components. 49 reviewers of Wiz have provided feedback on this feature.
93%
(Based on 49 reviews)

Effectiveness - Software Composition Analysis

Remediation Suggestions

Provides relevant and helpful suggestions for vulnerability remediation upon detection. 52 reviewers of Wiz have provided feedback on this feature.
87%
(Based on 52 reviews)

Continuous Monitoring

Monitors open source components proactively and continuously. This feature was mentioned in 51 Wiz reviews.
92%
(Based on 51 reviews)

Thorough Detection

Based on 53 Wiz reviews. Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues.
93%
(Based on 53 reviews)

Activity Monitoring

API Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering. 162 reviewers of Wiz have provided feedback on this feature.
75%
(Based on 162 reviews)

Activity Monitoring

Actively monitors status of work stations either on-premise or remote. This feature was mentioned in 174 Wiz reviews.
80%
(Based on 174 reviews)

Detection & Response

Response Automation

As reported in 22 Wiz reviews. Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
92%
(Based on 22 reviews)

Threat Hunting

Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. This feature was mentioned in 21 Wiz reviews.
92%
(Based on 21 reviews)

Rule-Based Detection

Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance. This feature was mentioned in 21 Wiz reviews.
96%
(Based on 21 reviews)

Real-Time Detection

As reported in 21 Wiz reviews. Constantly monitors system to detect anomalies in real time.
83%
(Based on 21 reviews)

Analytics

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur. 22 reviewers of Wiz have provided feedback on this feature.
88%
(Based on 22 reviews)

Artificial Intelligence & Machine Learning

Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis. 21 reviewers of Wiz have provided feedback on this feature.
83%
(Based on 21 reviews)

Data Collection

Based on 22 Wiz reviews. Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
89%
(Based on 22 reviews)

Configuration

Configuration Monitoring

As reported in 239 Wiz reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
88%
(Based on 239 reviews)

Unified Policy Management

Allows users to track and control security policies across cloud services and providers. 215 reviewers of Wiz have provided feedback on this feature.
83%
(Based on 215 reviews)

Adaptive Access Control

Provides a risk-based approach to determining trust within the network. This feature was mentioned in 213 Wiz reviews.
80%
(Based on 213 reviews)

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 227 Wiz reviews.
85%
(Based on 227 reviews)

Visibility

Multicloud Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. 240 reviewers of Wiz have provided feedback on this feature.
92%
(Based on 240 reviews)

Asset Discovery

Detect new assets as they enter a cloud environments and networks to add to asset inventory. 246 reviewers of Wiz have provided feedback on this feature.
91%
(Based on 246 reviews)

Vulnerability Management

Threat Hunting

Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. This feature was mentioned in 228 Wiz reviews.
83%
(Based on 228 reviews)

Vulnerability Scanning

Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised. This feature was mentioned in 252 Wiz reviews.
91%
(Based on 252 reviews)

Vulnerability Intelligence

Stores information related to new and common vulnerabilities and how to resolve them once incidents occur. 239 reviewers of Wiz have provided feedback on this feature.
89%
(Based on 239 reviews)

Risk-Prioritization

As reported in 245 Wiz reviews. Allows for vulnerability ranking by customized risk and threat priorities.
90%
(Based on 245 reviews)

Asset Management

Asset Discovery

Based on 169 Wiz reviews. Detects new assets as they enter cloud environments and networks to add to asset inventory.
93%
(Based on 169 reviews)

Shadow IT Detection

Identifies unsanctioned software. 144 reviewers of Wiz have provided feedback on this feature.
78%
(Based on 144 reviews)

Change Management

Provides tools to track and implement required security policy changes. This feature was mentioned in 143 Wiz reviews.
75%
(Based on 143 reviews)

Risk Management

Risk-Prioritization

As reported in 186 Wiz reviews. Allows for vulnerability ranking by customized risk and threat priorities.
92%
(Based on 186 reviews)

Reconnaissance

Based on 173 Wiz reviews. Gathers information about the system and potential exploits to be tested.
85%
(Based on 173 reviews)

At-Risk Analysis

As reported in 171 Wiz reviews. Uses machine learning to identify at-risk data.
86%
(Based on 171 reviews)

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur. This feature was mentioned in 173 Wiz reviews.
85%
(Based on 173 reviews)

Alerts management

Multi-mode alerts

As reported in 90 Wiz reviews. Alerts over email, text, phone call, or more to multiple parties.
89%
(Based on 90 reviews)

Opimization alerts

Provides information related to unnecessary spending and unused resources. This feature was mentioned in 93 Wiz reviews.
86%
(Based on 93 reviews)

Incident alerts

Based on 101 Wiz reviews. Gives alerts when incidents arise.
91%
(Based on 101 reviews)

Automation

Resolution automation

Diagnoses and resolves incidents without the need for human interaction. This feature was mentioned in 90 Wiz reviews.
84%
(Based on 90 reviews)

Automation

As reported in 95 Wiz reviews. Efficiently scales resource usage to optimize spend whith increased or decreased resource usage requirements.
86%
(Based on 95 reviews)

Analysis

Search

Allows users to search logs for troubleshooting and open-ended exploration of data. 107 reviewers of Wiz have provided feedback on this feature.
87%
(Based on 107 reviews)

Reporting

As reported in 105 Wiz reviews. Creates reports outlining resource, underutilization, cost trends, and/or functional overlap.
85%
(Based on 105 reviews)

Visualization

As reported in 107 Wiz reviews. Presents information and analytics in a digestible, intuitive, and visually appealing way.
93%
(Based on 107 reviews)

Track trends

Allows users to track log trends. This feature was mentioned in 98 Wiz reviews.
85%
(Based on 98 reviews)

Issue Resolution

Root cause identification

Based on 99 Wiz reviews. Directly identifies, or increases identification speed for, root causes for container issues.
85%
(Based on 99 reviews)

Resolution guidance

As reported in 104 Wiz reviews. Provides paths, suggestions, or other general assistance towards issue resolution.
89%
(Based on 104 reviews)

Proactive identification

Based on 97 Wiz reviews. Proactively identifies trends on container systems that could lead to failures or errors.
91%
(Based on 97 reviews)

Generative AI

AI Text Summarization

As reported in 78 Wiz reviews. Condenses long documents or text into a brief summary.
79%
(Based on 78 reviews)

Access control - Cloud Infrastructure Entitlement Management (CIEM)

Policy Management

Helps define policies for access management This feature was mentioned in 31 Wiz reviews.
80%
(Based on 31 reviews)

Fine-Grained Access Control

As reported in 33 Wiz reviews. Uses principle of least privilege to ensure access control at granular level of specific resources and apps
86%
(Based on 33 reviews)

Role-Based Access Control (RBAC)

Based on 33 Wiz reviews. Enables organization to define roles and assign access based on these roles
84%
(Based on 33 reviews)

AI-driven access control

Streamlines the management of user access through AI 31 reviewers of Wiz have provided feedback on this feature.
68%
(Based on 31 reviews)

Monitoring - Cloud Infrastructure Entitlement Management (CIEM)

Monitoring

Tracks and logs user activities, access requests, and changes to entitlements This feature was mentioned in 33 Wiz reviews.
84%
(Based on 33 reviews)

AI-based detection

Detects and remediates risky, misconfigured permissions for human and machine identities using AI 32 reviewers of Wiz have provided feedback on this feature.
72%
(Based on 32 reviews)

Auditing - Cloud Infrastructure Entitlement Management (CIEM)

Visibility

Provides visibility into all users and identities across the system This feature was mentioned in 35 Wiz reviews.
91%
(Based on 35 reviews)

Compliance Reporting

Provides reporting capabilities to demonstrate compliance This feature was mentioned in 35 Wiz reviews.
90%
(Based on 35 reviews)

Security - Cloud-Native Application Protection Platform (CNAPP)

Workload and container security

Scans containers, workloads, and kubernetes clusters for any misconfigurations or vulnerabilities.

Not enough data

Threat detection and response

Monitor live environments for anomalies, risks and threats to ensure rapid response.

Not enough data

DevSecOps Integrations

Integrates with CI/CD pipelines to detect security risks early in the development life cycle.

Not enough data

Unified Visibility

Consolidate all security data across the tech and cloud stacks into one dashboard.

Not enough data

Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)

Intelligent remediations and suggestions

Offers an AI-powered engine to provide remediation guidance to the user based on the type of threat.

Not enough data

Risk prioritization

Uses context-aware analysis to identify critical and non-critical risks across vulnerabilities.

Not enough data

Anomaly detection using machine learning

Help detect anomalies across cloud workloads which could help present a potential breach.

Not enough data

Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)

Multi-cloud visibility

Offers a unified view of all cloud assets across multi-cloud platforms such as AWS, Azure, GCP etc.

Not enough data

Cloud Security Posture Management (CSPM)

Continuously scans cloud environments for any misconfigurations, and provide benchmarks and guided remediation.

Not enough data

Generative AI - Exposure Management Platforms

Predictive Analytics

Uses AI-driven models to analyze historical and current data to enable organizations to manage new exposures proactively.

Not enough data

Automated Threat Detection

Uses AI algorithms to analyze data for patterns and anomalies that signify potential risks.

Not enough data

Risk Identification and Assessment - Exposure Management Platforms

Comprehensive Risk Assessment

Identifies, evaluates, and monitors various types of risks to understand the overall risk exposure and prioritize them based on potential impact.

Not enough data

Advanced Analytics and Reporting

Includes tools for deep analysis of risk data, providing insights into trends and patterns that support strategic risk assessment and decision-making.

Not enough data

Monitoring and Integration - Exposure Management Platforms

Integration and Data Consolidation

Ensures seamless interaction with other systems and unification of risk data, enabling a comprehensive view and efficient management of risk exposure.

Not enough data

Real-time Monitoring and Alerts

Allows for continuous surveillance of risk factors, providing timely alerts to mitigate emerging risks effectively.

Not enough data

Agentic AI - Vulnerability Scanner

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Proactive Assistance

Anticipates needs and offers suggestions without prompting

Not enough data

Agentic AI - Cloud Security Monitoring and Analytics

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Proactive Assistance

Anticipates needs and offers suggestions without prompting

Not enough data

Decision Making

Makes informed choices based on available data and objectives

Not enough data

Agentic AI - Extended Detection and Response (XDR) Platforms

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Proactive Assistance

Anticipates needs and offers suggestions without prompting

Not enough data

Decision Making

Makes informed choices based on available data and objectives

Not enough data

Agentic AI - Cloud-Native Application Protection Platform (CNAPP)

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Adaptive Learning

Improves performance based on feedback and experience

Not enough data

Agentic AI - Cloud Detection and Response (CDR)

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Proactive Assistance

Anticipates needs and offers suggestions without prompting

Not enough data

Decision Making

Makes informed choices based on available data and objectives

Not enough data