| A | B | C | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Prophet | Subcategory | Vendor answer | ||||||||||||||||||||||
2 | Demonstrated efficiency improvements | Major improvements with it comes to MTTI/MTTR | |||||||||||||||||||||||
3 | Alert escalation rate, True/False positive accuracy and verification method | 2% alert escalation rate. 95% accuracy rating. ISO standard used for Quality control (!). | |||||||||||||||||||||||
4 | Investigation speed, Scalability and performance during peak load | 10 000's investigations per week without hitting performance thresholds. Investigation speed in minutes. | |||||||||||||||||||||||
5 | Context enrichment and artifact analysis | API calls used to gather additional context. Platform offer its own private sandbox and brings threat intelligence sources for free with unlimited use. | |||||||||||||||||||||||
6 | Detection of novel/unknown threats/AI evastion handling | Prompt scanning in place to detect AI manipulation techniques. Detection of novel threats supported by comparing previous activity of users in a UEBA-like workflow. | |||||||||||||||||||||||
7 | Explainability, Human feedback integration and learning speed | Explainability and human feedback integration are built in. | |||||||||||||||||||||||
8 | Time to full operation | The platform is plug and play - full operation within 30 minutes of connecting data sources. | |||||||||||||||||||||||
9 | Integrations (out of the box, headless, custom) | Robust out of the box integrations. Chatbot like workflow using Teams and Slack. Headless mode supported. ~30 total integrations supported. | |||||||||||||||||||||||
10 | Multi-tenancy, data retention, export, governance, delection control | Multi tenancy, data control supported | |||||||||||||||||||||||
11 | Additional capabilities beyond detection and response | Threat hunting using natural language, support for keeping data in customers' cloud environments | |||||||||||||||||||||||
12 | Compliance with security standards | SOC 2 type 2 | |||||||||||||||||||||||
13 | Licensing model, Total cost of ownership and hidden costs | Licensing per investigation | |||||||||||||||||||||||
14 | Roadmap visibility and feature requestability | Roadmap is communicated and allows for feature requests. | |||||||||||||||||||||||
15 | Support availability and SLAs | Support avialable and reachable through multiple channels | |||||||||||||||||||||||
16 |