Inside-Out Defense Feature Comparison
Identity Catalog (human & non-human)
Forensic Access Audit Log
Policy Guardrails (Indiv, Group & Environment)
Real-Time Access Governance Posture (Individual)
Real-Time Privilege Abuse Posture (Individual)
Real-Time Privilege Abuse Detection
Real-Time In-Line Privilege Abuse Remediation
Hidden Behavior Detection and Remediation
Unknown Behavior Detection and Remediation
Integrations to custom environments*
*Includes on-prem workload connectivity such as custom applications, identity systems, etc.