| S.No | Feature | Application Security Monitoring | Application Security as a Service |
|---|---|---|---|
| 1 | Initial vulnerability scan | ![]() |
![]() |
| 2 | Yearly application penetration test | ![]() |
![]() |
| 3 | Findings discussion with client | ![]() |
![]() |
| 4 | Remediation discussions with vendor | ![]() |
![]() |
| 5 | Re-test of resultant patch | ![]() |
![]() |
| 6 | Security monitoring configuration | ![]() |
![]() |
| 7 | Identification of in-scope systems | ![]() |
![]() |
| 8 | Monitoring appliance | ![]() |
![]() |
| 9 | Full OWASP Top 10 Analysis | ![]() |
![]() |
| 10 | Appliance configuration and on-boarding | ![]() |
![]() |
| 11 | Customer security portal configuration | ![]() |
![]() |
| 12 | Data categorization | ![]() |
![]() |
| 13 | Data parsing | ![]() |
![]() |
| 14 | Data normalization | ![]() |
![]() |
| 15 | Dashboard configuration | ![]() |
![]() |
| 16 | Data forwarding (upon request) | ![]() |
![]() |
| 17 | Alert forwarding (to customer security team) | ![]() |
![]() |
| 18 | Named cybersecurity team | ![]() |
![]() |
| 19 | 24x7 incident validation | ![]() |
![]() |
| 20 | Log and SIEM management | ![]() |
![]() |
| 21 | Maintenance of data collection systems | ![]() |
![]() |
| 22 | Recommendations for patching and security updates | ![]() |
![]() |
| 23 | Monthly reporting | ![]() |
![]() |
| 24 | 24x7 Monitoring | ![]() |
![]() |
| 25 | Custom security use-case configuration | ![]() |
![]() |
| 26 | Proactive log analysis | ![]() |
![]() |
| 27 | Quarterly review by a Senior Cybersecurity Engineer | ![]() |
![]() |
| 28 | End-to-end responsibility for application security monitoring | ![]() |
![]() |
| 29 | Monthly reporting with optional engineer calls | ![]() |
![]() |