S.No | Feature | Application Security Monitoring | Application Security as a Service |
---|---|---|---|
1 | Initial vulnerability scan | ![]() |
![]() |
2 | Yearly application penetration test | ![]() |
![]() |
3 | Findings discussion with client | ![]() |
![]() |
4 | Remediation discussions with vendor | ![]() |
![]() |
5 | Re-test of resultant patch | ![]() |
![]() |
6 | Security monitoring configuration | ![]() |
![]() |
7 | Identification of in-scope systems | ![]() |
![]() |
8 | Monitoring appliance | ![]() |
![]() |
9 | Full OWASP Top 10 Analysis | ![]() |
![]() |
10 | Appliance configuration and on-boarding | ![]() |
![]() |
11 | Customer security portal configuration | ![]() |
![]() |
12 | Data categorization | ![]() |
![]() |
13 | Data parsing | ![]() |
![]() |
14 | Data normalization | ![]() |
![]() |
15 | Dashboard configuration | ![]() |
![]() |
16 | Data forwarding (upon request) | ![]() |
![]() |
17 | Alert forwarding (to customer security team) | ![]() |
![]() |
18 | Named cybersecurity team | ![]() |
![]() |
19 | 24x7 incident validation | ![]() |
![]() |
20 | Log and SIEM management | ![]() |
![]() |
21 | Maintenance of data collection systems | ![]() |
![]() |
22 | Recommendations for patching and security updates | ![]() |
![]() |
23 | Monthly reporting | ![]() |
![]() |
24 | 24x7 Monitoring | ![]() |
![]() |
25 | Custom security use-case configuration | ![]() |
![]() |
26 | Proactive log analysis | ![]() |
![]() |
27 | Quarterly review by a Senior Cybersecurity Engineer | ![]() |
![]() |
28 | End-to-end responsibility for application security monitoring | ![]() |
![]() |
29 | Monthly reporting with optional engineer calls | ![]() |
![]() |