S.No | Feature | Application Security Monitoring | Application Security as a Service |
---|---|---|---|
1 | Initial vulnerability scan | ||
2 | Yearly application penetration test | ||
3 | Findings discussion with client | ||
4 | Remediation discussions with vendor | ||
5 | Re-test of resultant patch | ||
6 | Security monitoring configuration | ||
7 | Identification of in-scope systems | ||
8 | Monitoring appliance | ||
9 | Full OWASP Top 10 Analysis | ||
10 | Appliance configuration and on-boarding | ||
11 | Customer security portal configuration | ||
12 | Data categorization | ||
13 | Data parsing | ||
14 | Data normalization | ||
15 | Dashboard configuration | ||
16 | Data forwarding (upon request) | ||
17 | Alert forwarding (to customer security team) | ||
18 | Named cybersecurity team | ||
19 | 24x7 incident validation | ||
20 | Log and SIEM management | ||
21 | Maintenance of data collection systems | ||
22 | Recommendations for patching and security updates | ||
23 | Monthly reporting | ||
24 | 24x7 Monitoring | ||
25 | Custom security use-case configuration | ||
26 | Proactive log analysis | ||
27 | Quarterly review by a Senior Cybersecurity Engineer | ||
28 | End-to-end responsibility for application security monitoring | ||
29 | Monthly reporting with optional engineer calls |