Wiz Features
What are the features of Wiz?
Administration
- Policy Enforcement
Security
- Compliance Monitoring
Performance
- Issue Tracking
- Detection Rate
- False Positives
- Automated Scans
Network
- Configuration Monitoring
Configuration
- Configuration Monitoring
- API / Integrations
Visibility
- Multicloud Visibility
- Asset Discovery
Vulnerability Management
- Threat Hunting
- Vulnerability Scanning
- Vulnerability Intelligence
- Risk-Prioritization
Top-Rated Alternatives
Wiz Categories on G2
Filter for Features
Management
Dashboards and Reports | Based on 104 Wiz reviews. Access pre-built and custom reports and dashboards. | 86% (Based on 104 reviews) | |
Workflow Management | As reported in 92 Wiz reviews. Creates new or streamlines existing workflows to better handle IT support tickets and service. | 84% (Based on 92 reviews) | |
Administration Console | As reported in 103 Wiz reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | 93% (Based on 103 reviews) | |
Extensibility | Allows for customized support for hybrid environments This feature was mentioned in 22 Wiz reviews. | 85% (Based on 22 reviews) | |
Workflow Automation | Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. 21 reviewers of Wiz have provided feedback on this feature. | 88% (Based on 21 reviews) | |
Unified Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. This feature was mentioned in 18 Wiz reviews. | 92% (Based on 18 reviews) |
Operations
Governance | Based on 94 Wiz reviews. Allows users to create, edit, and relinquish user access privileges. | 90% (Based on 94 reviews) | |
Logging and Reporting | Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. 97 reviewers of Wiz have provided feedback on this feature. | 86% (Based on 97 reviews) | |
API / Integrations | Based on 97 Wiz reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | 90% (Based on 97 reviews) |
Security Controls
Anomaly Detection | Based on 63 Wiz reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | 84% (Based on 63 reviews) | |
Security Auditing | Based on 91 Wiz reviews. Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. | 90% (Based on 91 reviews) |
Administration
Risk Scoring | Provides risk scoring for suspicious activity, vulnerabilities, and other threats. 174 reviewers of Wiz have provided feedback on this feature. | 89% (Based on 174 reviews) | |
Secrets Management | Based on 164 Wiz reviews. Provides tools for managing authentication credentials such as keys and passwords. | 82% (Based on 164 reviews) | |
Security Auditing | Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. 176 reviewers of Wiz have provided feedback on this feature. | 91% (Based on 176 reviews) | |
Configuration Management | As reported in 171 Wiz reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | 89% (Based on 171 reviews) | |
Policy Enforcement | Allows administrators to set policies for security and data governance. 234 reviewers of Wiz have provided feedback on this feature. | 84% (Based on 234 reviews) | |
Auditing | Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. This feature was mentioned in 209 Wiz reviews. | 86% (Based on 209 reviews) | |
Workflow Management | Creates new or streamlines existing workflows to better handle IT support tickets and service. This feature was mentioned in 223 Wiz reviews. | 83% (Based on 223 reviews) | |
Security Automation | Based on 183 Wiz reviews. Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. | 83% (Based on 183 reviews) | |
Security Integration | As reported in 193 Wiz reviews. Integrates additional security tools to automate security and incident response processes. | 87% (Based on 193 reviews) | |
Multicloud Visibility | As reported in 191 Wiz reviews. Allows users to track and control activity across cloud services and providers. | 91% (Based on 191 reviews) |
Monitoring
Continuous Image Assurance | As reported in 150 Wiz reviews. Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats. | 82% (Based on 150 reviews) | |
Behavior Monitoring | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. 143 reviewers of Wiz have provided feedback on this feature. | 78% (Based on 143 reviews) | |
Observability | Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. This feature was mentioned in 161 Wiz reviews. | 85% (Based on 161 reviews) | |
Gap Analysis | Based on 155 Wiz reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | 85% (Based on 155 reviews) | |
Vulnerability Intelligence | As reported in 168 Wiz reviews. Stores information related to common vulnerabilities and how to resolve them once incidents occur. | 90% (Based on 168 reviews) | |
Compliance Monitoring | As reported in 159 Wiz reviews. Monitors data quality and sends alerts based on violations or misuse. | 87% (Based on 159 reviews) | |
Continuous Monitoring | Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response. This feature was mentioned in 168 Wiz reviews. | 89% (Based on 168 reviews) | |
Resource utilization | Optimizes resource allocation. This feature was mentioned in 89 Wiz reviews. | 84% (Based on 89 reviews) | |
Real-time monitoring | As reported in 100 Wiz reviews. Consistently monitors processes for applications and IT infrastructure to detect anomalies in real-time. | 84% (Based on 100 reviews) | |
Performance baseline | Sets up standard performance baseline to compare live container activities. This feature was mentioned in 86 Wiz reviews. | 84% (Based on 86 reviews) | |
API monitoring | Traces connections between different containerized environments and detects anomalies in functionality, user accessibility, traffic flows, and tampering. 89 reviewers of Wiz have provided feedback on this feature. | 78% (Based on 89 reviews) |
Protection
Dynamic Image Scanning | Based on 156 Wiz reviews. Scans application and image source code for security flaws without executing it in a live environment | 84% (Based on 156 reviews) | |
Runtime Protection | Monitors container activities and detects threats across containers, networks, and cloud service providers. This feature was mentioned in 150 Wiz reviews. | 78% (Based on 150 reviews) | |
Network Segmentation | As reported in 144 Wiz reviews. Allows administrative control over network components, mapping, and segmentation. | 76% (Based on 144 reviews) |
Security
Compliance Monitoring | Monitors data quality and sends alerts based on violations or misuse. 246 reviewers of Wiz have provided feedback on this feature. | 90% (Based on 246 reviews) | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. 196 reviewers of Wiz have provided feedback on this feature. | 82% (Based on 196 reviews) | |
Cloud Gap Analytics | As reported in 223 Wiz reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | 88% (Based on 223 reviews) | |
Compliance Monitoring | As reported in 187 Wiz reviews. Monitors data quality and send alerts based on violations or misuse. | 86% (Based on 187 reviews) | |
Risk Analysis | See feature definition | Identifies potential network security risks, vulnerabilities, and compliance impacts. This feature was mentioned in 195 Wiz reviews. | 89% (Based on 195 reviews) |
Reporting | As reported in 201 Wiz reviews. Creates reports outlining log activity and relevant metrics. | 83% (Based on 201 reviews) |
Compliance
Governance | Allows users to create, edit, and relinquish user access privileges. 218 reviewers of Wiz have provided feedback on this feature. | 86% (Based on 218 reviews) | |
Data Governance | As reported in 205 Wiz reviews. Ensures user access management, data lineage, and data encryption. | 83% (Based on 205 reviews) | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 204 Wiz reviews. | 83% (Based on 204 reviews) |
Performance
Issue Tracking | Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. 248 reviewers of Wiz have provided feedback on this feature. | 83% (Based on 248 reviews) | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. 245 reviewers of Wiz have provided feedback on this feature. | 87% (Based on 245 reviews) | |
False Positives | Based on 246 Wiz reviews. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | 74% (Based on 246 reviews) | |
Automated Scans | Runs pre-scripted vulnerability scans without requiring manual work. 250 reviewers of Wiz have provided feedback on this feature. | 90% (Based on 250 reviews) |
Network
Compliance Testing | Based on 231 Wiz reviews. Allows users to scan applications and networks for specific compliance requirements. | 87% (Based on 231 reviews) | |
Perimeter Scanning | Based on 227 Wiz reviews. Analyzes network devices, servers and operating systems for vulnerabilities. | 85% (Based on 227 reviews) | |
Configuration Monitoring | As reported in 246 Wiz reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | 88% (Based on 246 reviews) |
Functionality - Software Composition Analysis
Language Support | Supports a useful and wide variety of programming languages. This feature was mentioned in 49 Wiz reviews. | 88% (Based on 49 reviews) | |
Integration | Integrates seamlessly with the build environment and development tools like repositories, package managers, etc. This feature was mentioned in 53 Wiz reviews. | 93% (Based on 53 reviews) | |
Transparency | As reported in 51 Wiz reviews. Grants comprehensive user-friendly insight into all open source components. | 92% (Based on 51 reviews) |
Effectiveness - Software Composition Analysis
Remediation Suggestions | Provides relevant and helpful suggestions for vulnerability remediation upon detection. 54 reviewers of Wiz have provided feedback on this feature. | 87% (Based on 54 reviews) | |
Continuous Monitoring | As reported in 53 Wiz reviews. Monitors open source components proactively and continuously. | 92% (Based on 53 reviews) | |
Thorough Detection | As reported in 55 Wiz reviews. Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues. | 93% (Based on 55 reviews) |
Activity Monitoring
API Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. This feature was mentioned in 167 Wiz reviews. | 74% (Based on 167 reviews) | |
Activity Monitoring | Actively monitors status of work stations either on-premise or remote. This feature was mentioned in 179 Wiz reviews. | 79% (Based on 179 reviews) |
Detection & Response
Response Automation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. This feature was mentioned in 23 Wiz reviews. | 91% (Based on 23 reviews) | |
Threat Hunting | Based on 22 Wiz reviews. Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. | 92% (Based on 22 reviews) | |
Rule-Based Detection | Based on 22 Wiz reviews. Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance. | 95% (Based on 22 reviews) | |
Real-Time Detection | Constantly monitors system to detect anomalies in real time. This feature was mentioned in 22 Wiz reviews. | 83% (Based on 22 reviews) |
Analytics
Threat Intelligence | Stores information related to common threats and how to resolve them once incidents occur. This feature was mentioned in 23 Wiz reviews. | 87% (Based on 23 reviews) | |
Artificial Intelligence & Machine Learning | Based on 22 Wiz reviews. Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis. | 82% (Based on 22 reviews) | |
Data Collection | Collects information from multiple sources to cross reference and build contextual to correlate intelligence. This feature was mentioned in 23 Wiz reviews. | 89% (Based on 23 reviews) |
Configuration
Configuration Monitoring | Based on 246 Wiz reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | 88% (Based on 246 reviews) | |
Unified Policy Management | Allows users to track and control security policies across cloud services and providers. 222 reviewers of Wiz have provided feedback on this feature. | 83% (Based on 222 reviews) | |
Adaptive Access Control | As reported in 220 Wiz reviews. Provides a risk-based approach to determining trust within the network. | 80% (Based on 220 reviews) | |
API / Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 234 Wiz reviews. | 85% (Based on 234 reviews) |
Visibility
Multicloud Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. This feature was mentioned in 247 Wiz reviews. | 92% (Based on 247 reviews) | |
Asset Discovery | Based on 253 Wiz reviews. Detect new assets as they enter a cloud environments and networks to add to asset inventory. | 91% (Based on 253 reviews) |
Vulnerability Management
Threat Hunting | Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. 235 reviewers of Wiz have provided feedback on this feature. | 83% (Based on 235 reviews) | |
Vulnerability Scanning | Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised. 259 reviewers of Wiz have provided feedback on this feature. | 91% (Based on 259 reviews) | |
Vulnerability Intelligence | Stores information related to new and common vulnerabilities and how to resolve them once incidents occur. 246 reviewers of Wiz have provided feedback on this feature. | 89% (Based on 246 reviews) | |
Risk-Prioritization | Allows for vulnerability ranking by customized risk and threat priorities. 252 reviewers of Wiz have provided feedback on this feature. | 90% (Based on 252 reviews) |
Asset Management
Asset Discovery | Based on 172 Wiz reviews. Detects new assets as they enter cloud environments and networks to add to asset inventory. | 93% (Based on 172 reviews) | |
Shadow IT Detection | Based on 147 Wiz reviews. Identifies unsanctioned software. | 78% (Based on 147 reviews) | |
Change Management | Provides tools to track and implement required security policy changes. This feature was mentioned in 146 Wiz reviews. | 75% (Based on 146 reviews) |
Risk Management
Risk-Prioritization | Based on 188 Wiz reviews. Allows for vulnerability ranking by customized risk and threat priorities. | 92% (Based on 188 reviews) | |
Reconnaissance | Based on 176 Wiz reviews. Gathers information about the system and potential exploits to be tested. | 85% (Based on 176 reviews) | |
At-Risk Analysis | As reported in 174 Wiz reviews. Uses machine learning to identify at-risk data. | 86% (Based on 174 reviews) | |
Threat Intelligence | Based on 176 Wiz reviews. Stores information related to common threats and how to resolve them once incidents occur. | 85% (Based on 176 reviews) |
Alerts management
Multi-mode alerts | Alerts over email, text, phone call, or more to multiple parties. This feature was mentioned in 93 Wiz reviews. | 88% (Based on 93 reviews) | |
Opimization alerts | As reported in 96 Wiz reviews. Provides information related to unnecessary spending and unused resources. | 85% (Based on 96 reviews) | |
Incident alerts | Gives alerts when incidents arise. 104 reviewers of Wiz have provided feedback on this feature. | 90% (Based on 104 reviews) |
Automation
Resolution automation | Based on 93 Wiz reviews. Diagnoses and resolves incidents without the need for human interaction. | 82% (Based on 93 reviews) | |
Automation | Based on 97 Wiz reviews. Efficiently scales resource usage to optimize spend whith increased or decreased resource usage requirements. | 86% (Based on 97 reviews) |
Analysis
Search | Based on 110 Wiz reviews. Allows users to search logs for troubleshooting and open-ended exploration of data. | 87% (Based on 110 reviews) | |
Reporting | Creates reports outlining resource, underutilization, cost trends, and/or functional overlap. This feature was mentioned in 108 Wiz reviews. | 85% (Based on 108 reviews) | |
Visualization | Presents information and analytics in a digestible, intuitive, and visually appealing way. This feature was mentioned in 109 Wiz reviews. | 92% (Based on 109 reviews) | |
Track trends | Allows users to track log trends. This feature was mentioned in 100 Wiz reviews. | 85% (Based on 100 reviews) |
Issue Resolution
Root cause identification | Based on 101 Wiz reviews. Directly identifies, or increases identification speed for, root causes for container issues. | 85% (Based on 101 reviews) | |
Resolution guidance | Based on 106 Wiz reviews. Provides paths, suggestions, or other general assistance towards issue resolution. | 89% (Based on 106 reviews) | |
Proactive identification | Based on 99 Wiz reviews. Proactively identifies trends on container systems that could lead to failures or errors. | 90% (Based on 99 reviews) |
Generative AI
AI Text Summarization | As reported in 81 Wiz reviews. Condenses long documents or text into a brief summary. | 78% (Based on 81 reviews) |
Access control - Cloud Infrastructure Entitlement Management (CIEM)
Policy Management | As reported in 35 Wiz reviews. Helps define policies for access management | 80% (Based on 35 reviews) | |
Fine-Grained Access Control | Based on 36 Wiz reviews. Uses principle of least privilege to ensure access control at granular level of specific resources and apps | 86% (Based on 36 reviews) | |
Role-Based Access Control (RBAC) | As reported in 36 Wiz reviews. Enables organization to define roles and assign access based on these roles | 84% (Based on 36 reviews) | |
AI-driven access control | Streamlines the management of user access through AI 34 reviewers of Wiz have provided feedback on this feature. | 64% (Based on 34 reviews) |
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
Monitoring | Tracks and logs user activities, access requests, and changes to entitlements 37 reviewers of Wiz have provided feedback on this feature. | 82% (Based on 37 reviews) | |
AI-based detection | Detects and remediates risky, misconfigured permissions for human and machine identities using AI 36 reviewers of Wiz have provided feedback on this feature. | 69% (Based on 36 reviews) |
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
Visibility | As reported in 39 Wiz reviews. Provides visibility into all users and identities across the system | 90% (Based on 39 reviews) | |
Compliance Reporting | Provides reporting capabilities to demonstrate compliance 39 reviewers of Wiz have provided feedback on this feature. | 89% (Based on 39 reviews) |
Security - Cloud-Native Application Protection Platform (CNAPP)
Workload and container security | Scans containers, workloads, and kubernetes clusters for any misconfigurations or vulnerabilities. | Not enough data | |
Threat detection and response | Monitor live environments for anomalies, risks and threats to ensure rapid response. | Not enough data | |
DevSecOps Integrations | Integrates with CI/CD pipelines to detect security risks early in the development life cycle. | Not enough data | |
Unified Visibility | Consolidate all security data across the tech and cloud stacks into one dashboard. | Not enough data |
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Intelligent remediations and suggestions | Offers an AI-powered engine to provide remediation guidance to the user based on the type of threat. | Not enough data | |
Risk prioritization | Uses context-aware analysis to identify critical and non-critical risks across vulnerabilities. | Not enough data | |
Anomaly detection using machine learning | Help detect anomalies across cloud workloads which could help present a potential breach. | Not enough data |
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Multi-cloud visibility | Offers a unified view of all cloud assets across multi-cloud platforms such as AWS, Azure, GCP etc. | Not enough data | |
Cloud Security Posture Management (CSPM) | Continuously scans cloud environments for any misconfigurations, and provide benchmarks and guided remediation. | Not enough data |
Generative AI - Exposure Management Platforms
Predictive Analytics | Uses AI-driven models to analyze historical and current data to enable organizations to manage new exposures proactively. | Not enough data | |
Automated Threat Detection | Uses AI algorithms to analyze data for patterns and anomalies that signify potential risks. | Not enough data |
Risk Identification and Assessment - Exposure Management Platforms
Comprehensive Risk Assessment | Identifies, evaluates, and monitors various types of risks to understand the overall risk exposure and prioritize them based on potential impact. | Not enough data | |
Advanced Analytics and Reporting | Includes tools for deep analysis of risk data, providing insights into trends and patterns that support strategic risk assessment and decision-making. | Not enough data |
Monitoring and Integration - Exposure Management Platforms
Integration and Data Consolidation | Ensures seamless interaction with other systems and unification of risk data, enabling a comprehensive view and efficient management of risk exposure. | Not enough data | |
Real-time Monitoring and Alerts | Allows for continuous surveillance of risk factors, providing timely alerts to mitigate emerging risks effectively. | Not enough data |
Agentic AI - Vulnerability Scanner
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data |
Agentic AI - Cloud Security Monitoring and Analytics
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |
Agentic AI - Extended Detection and Response (XDR) Platforms
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Adaptive Learning | Improves performance based on feedback and experience | Not enough data |
Agentic AI - Cloud Detection and Response (CDR)
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |
Services - Extended Detection and Response (XDR)
Managed Services | Offers managed detection and response services. | Not enough data |
Services - Cloud Detection and Response (CDR)
Managed Services | Offers managed detection and response services. | Not enough data |
Discovery & Classification - Data Security Posture Management (DSPM)
Continuous real‑time monitoring | Provide real‑time visibility into data exposures and activities. | Not enough data | |
Discover & classify sensitive data | Automatically scan across cloud, SaaS, on‑prem environments to locate and tag sensitive data. | Not enough data | |
Custom classification support | Allow business‑specific or regulatory data labels beyond default frameworks. | Not enough data |
Risk Prioritization - Data Security Posture Management (DSPM)
Detect excessive entitlements & toxic combinations | Identify over‑permissioned users, roles, or accounts in combination with misconfigurations. | Not enough data | |
Compliance posture assessment | Assess data risks against regulatory frameworks and internal policies. | Not enough data | |
Risk‑based exposure scoring | Prioritize findings based on data sensitivity, exploitability, and business impact. | Not enough data |
Remediation & Governance - Data Security Posture Management (DSPM)
Guided remediation actions | Provide context‑aware recommendations for fixing exposures (e.g., revoke access, encrypt, misconfiguration remediation). | Not enough data | |
Integration with enforcement tools | Integrate with CSPM, CIEM, SOAR, SIEM for automated policy enforcement. | Not enough data | |
Track remediation progress & trends | Monitor posture over time and track remediation efforts. | Not enough data |
Wiz Comparisons