Professional Documents
Culture Documents
Installation & Data Collection. What you need to consider when selecting
tooling to support your current and future infrastructure.
Network Security. What to consider now that your network has an increasing
amount of connections that are constantly moving.
SCORING SCALE
Please input the response in the boxes below that you feel best describe the capabilities
of each vendor you’re considering using the following scale.
RUNTIME SECURITY
Activity auditing
Service-based forensics
Auto correlation between user,
process, & network activity
Breach Replay & Rewind
Sub-second network and system captures
Ability to capture system traces upon alert trigger
Ability to take captures outside of production
environments and do analysis in a local
environment
Ability to see full network payload and file
contents surrounding any policy violation
NETWORK SECURITY
ADMINISTRATION
LDAP Integration
Single sign on
API Access
Administrator's Dashboard for Status
of all agents, policies etc.
Robust integrations for alert outputs
(PagerDuty, Slack, etc)
Webhook output
Sub Total
COMPANY / EXECUTION
Responsive Support
Customer Success / Technical Account
Management
Live Chat within Application
Roadmap
Stable company
Experienced team / track record
Pricing Structure
Sub Total
SUMMARY SCORECARD
SYSDIG Alternate Alternate
FEATURES
SECURE Vendor Vendor
RUNTIME SECURITY
NETWORK SECURITY
ADMINISTRATION
COMPANY / EXECUTION
Total Scores