# Features

## Platform functions

<table><thead><tr><th width="356">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="operation/platform/dashboard">Dashboards</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/dashboard#asset-operation-center">Asset Operation Center</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><p>Cross Platform <a href="../technical-details/system-requirements#pulsar-agent">Compatibility</a></p><p>(Windows, Linux, MacOS)</p></td><td>true</td><td>true</td><td>true</td></tr><tr><td>PDF-Reports</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Switch <a href="operation/platform/alarme">alerts </a>to deviations and safety events</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/alarme#notifications">Alert notification</a> via email, SMS, Slack, Mattermost, Microsoft Teams</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Group assets with <a href="operation/platform/tags">tags</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Unlimited number of <a href="../operation/platform/einstellungen#team-members">team members</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/einstellungen#roles">Role concept</a> incl. user-defined roles</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Logging of <a href="../operation/platform/dashboard#activities">user activities</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="technical-details/api">API</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="on-premises/configuration/licences-and-organisations">Multi-client capability</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Subordinate clients</td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="../on-premises/configuration/licences-and-organisations#where-can-you-check-available-used-and-free-contingents">License management</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="on-premises/configuration/white-label">White Label</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="on-premises/configuration/mail-server">Own mail server</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="on-premises/configuration/sso-via-office-365">Single Sign On</a> (SSO)</td><td>false</td><td>false</td><td>true</td></tr></tbody></table>

## SIEM - Security Information and Event Management

<table><thead><tr><th width="337">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="operation/platform/siem/data-lake">Log Collection</a> - IT-Assets, Applications and Cloud</td><td>false</td><td>false</td><td>true</td></tr><tr><td>Log Analyse und <a href="operation/platform/siem/incidents">Event Correlation</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td>Log Forensics</td><td>false</td><td>false</td><td>true</td></tr><tr><td>Log Retention</td><td>false</td><td>false</td><td>true</td></tr><tr><td>Daten Normalisierung</td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="operation/platform/siem/cockpits">Dashboards</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td>SIEM <a href="operation/platform/siem/workflows">Workflows</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td>Hersteller Vorlagen</td><td>false</td><td>false</td><td>true</td></tr><tr><td>Managed Event-Streams</td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="operation/platform/siem/collectors">Cloud Connectors</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td>Individual <a href="operation/platform/siem/extractors">Extractors</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="operation/platform/siem/obfuscators">Obfuscators</a></td><td>false</td><td>false</td><td>true</td></tr></tbody></table>

## Vulnerability Management

<table><thead><tr><th width="365">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>CVE Dashboard (Cockpit)</td><td>true</td><td>true</td><td>true</td></tr><tr><td>BSI warning about found CVEs</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE Database</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE recommendations for countermeasures</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#vulnerabilities">Whitebox Scan</a> and Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE <a href="operation/platform/penetration-testing/auth-providers">Greybox </a>Network Scan</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE <a href="operation/platform/penetration-testing">Blackbox </a>Network Scan</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE <a href="../operation/platform/endpunkte/endpoint-details#vulnerabilities">Website </a>Scan and Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE <a href="operation/platform/alarme">alerting </a>by criticality</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="operation/platform/legacy/hosts-agent-pulsar/software-inventory">Software inventory</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="operation/platform/penetration-testing/run-pentest">Penetrationtesting</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Manage and automate <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#autoupdate">updates</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#configuration">Configuration </a>Management</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## Intrusion Detection und Prevention (IDS/IPS)

<table><thead><tr><th width="368">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>Host based <a href="operation/platform/legacy/hosts-agent-pulsar/intrusion-detection-system">attack detection</a> (IDS) detection</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Host based <a href="operation/platform/shield">blocking of attacks</a> (IPS) response</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Logging of all attacks and <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#network-anomalies">classification </a>by severity</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Live visualization of attacks</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Definition of <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#network-anomalies">detection levels</a> according to protection needs</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Definition of <a href="../operation/platform/shield#autonomous-blocking-autonomous-actions">blocking levels</a> according to protection needs</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Define whitelists</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## Microsegmentation

<table><thead><tr><th width="326">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>Software defined <a href="../operation/platform/shield#elements-of-the-microsegment">groupings of IT assets</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/shield#microsegmentation">Management </a>of East-West data traffic according to the Zero Trust principle</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/shield#general-settings-3">Isolation </a>of devices and device groups</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/shield#advanced-settings">Implementation </a>of use case-specific IT security guidelines</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## File Integrity Monitoring

<table><thead><tr><th width="328">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS  Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>Monitoring <a href="../operation/platform/legacy/hosts-agent-pulsar/file-integrity-monitoring#fim-cockpit">access to files and directories</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/legacy/hosts-agent-pulsar/file-integrity-monitoring#logs">Logging </a>of all accesses</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Alerting after unauthorized access</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Provision of <a href="../operation/platform/legacy/hosts-agent-pulsar/file-integrity-monitoring#rules">managed rules</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Definition of individual sets of <a href="../operation/platform/legacy/hosts-agent-pulsar/file-integrity-monitoring#create-rules">rules</a></td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## Automated penetration testing

<table><thead><tr><th width="369">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="operation/platform/penetration-testing/run-pentest">Network segment</a> scan</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Scan of single <a href="operation/platform/penetration-testing/run-pentest">IP-addresses</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Scan of <a href="operation/platform/penetration-testing/target-groups">Websites</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../technical-details/range-of-functions-pentest#information-gathering">Information Gathering</a> (Footprinting of the target systems)</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE-Scan <a href="technical-details/range-of-functions-pentest">Blackbox / Greybox</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Service <a href="../technical-details/range-of-functions-pentest#service-bruteforce">Bruteforce </a>(Check for insecure credentials)</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../technical-details/range-of-functions-pentest#service-discovery">Service Discovery</a> (Specific checks of services for misconfigurations)</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Clear evaluation of <a href="operation/platform/penetration-testing/audits">audits</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="operation/platform/penetration-testing/templates">Automated </a>recurring scans</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Send <a href="operation/platform/penetration-testing/templates">PDF-reports</a> by e-mail</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Store own <a href="operation/platform/penetration-testing/templates">password list</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Extend vectors with <a href="operation/platform/penetration-testing/custom-scripts">custom scripts</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Define <a href="operation/platform/penetration-testing/target-groups">asset inventory</a>, IP addresses or endpoints as target systems</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## Website monitoring

<table><thead><tr><th width="379">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="../operation/platform/endpunkte/endpoint-details#website">Availability and response times</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/endpunkte/endpoint-details#ssl-tls">SSL/TLS</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/endpunkte/endpoint-details#bsi">TLS validation</a> according to BSI <a href="https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03116/BSI-TR-03116-4.html">TR-03116-4</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/endpunkte/endpoint-details#certificate">Certificate Manager</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/endpunkte/endpoint-details#dns">DNS</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/endpunkte/endpoint-details#http-headers">HTTP-Header</a> Security Check</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/endpunkte/endpoint-details#portscan">Port</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/endpunkte/endpoint-details#apps">Footprinting </a>of the application environment</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/endpunkte/endpoint-details#vulnerabilities">CVE-Scan</a></td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## IT monitoring (with agent)

<table><thead><tr><th width="372">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#metrics">Availability monitoring</a>: CPU, RAM, SWAP, network, hard disks</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitoring of <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#custom-metrics">any data</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor metrics with <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#machine-learning">machine learning</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#software">installed software</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#autostarts">Autostarts</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#services">services</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#connections">ports</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#processes">processes</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#system-events">System log</a> monitoring</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## IT monitoring (without agent)

<table><thead><tr><th width="377">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="../operation/platform/observations#ping-monitoring">Ping</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/observations#port-monitoring">Port</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/observations#snmp">SNMP</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Upload <a href="../operation/platform/observations#own-mibs">own MIBs</a></td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## IT inventory

<table><thead><tr><th width="380">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>Permanent <a href="../operation/platform/discoveries#set-up-asset-discovery">monitoring of the network</a> according to its participants</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Complete <a href="../operation/platform/discoveries#inventory">network inventory</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Interactive <a href="../operation/platform/discoveries#asset-map">asset map</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Agent based <a href="../operation/platform/legacy/hosts-agent-pulsar/host-details#device-information">inventory</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="operation/platform/legacy/hosts-agent-pulsar/software-inventory">Software inventory</a></td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## Automation

<table><thead><tr><th width="381">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>Add your own scripts as <a href="operation/platform/legacy/hosts-agent-pulsar/plugins">plugins</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/legacy/hosts-agent-pulsar/plugins#autonomous-reaction-to-system-event-via-alerting">Run scripts regularly</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="../operation/platform/legacy/hosts-agent-pulsar/plugins#example-restart-apache-web-server">Autonomous response</a> to system events</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>
