| MALWARE PROTECTION | Yes/No |
| On-Access Scanning | |
| On-Demand Scanning | |
| Virus Definition | |
| Malware Signatures | |
| Malicous Signature detection | |
| Incident Response (Quarantine, Alerts, Actions) | |
| Event Reporting | |
| Email Notifications | |
| |
| MANAGEMENT | |
| Scheduled Scanning | |
| Management Console | |
| Grouping (Asset Groups) | |
| Asset Tagging | |
| Pattern Updates (Downloading definition files) | |
| Adjustable CPU Utilization | |
| Centralized End-Point Management | |
| |
| FIREWALL | |
| Intrusion Prevention System - Unencrypted Traffic | |
| Intrusion Prevention System - SSL Encrypted Traffic | |
| Host based Intrusion Detection System | |
| File integrity Monitoring | |
| Vulnerability detection | |
| |
| ANALYSIS | |
| Events (Authentication, Brute force, etc..) | |
| Web Events (Web Servers) | |
| Custom Audit Events (Defined Policies) | |
| |
| INTEGRATIONS | |
| Containers Friendly | |
| Cloud Agnostic | |
| Pipeline integration | |