| S.No | Feature | Application Security Monitoring | Application Security as a Service | 
|---|---|---|---|
| 1 | Initial vulnerability scan | ![]()  | 
                      ![]()  | 
                    
| 2 | Yearly application penetration test | ![]()  | 
                      ![]()  | 
                    
| 3 | Findings discussion with client | ![]()  | 
                       ![]()  | 
                    
| 4 | Remediation discussions with vendor | ![]()  | 
                       ![]()  | 
                    
| 5 | Re-test of resultant patch | ![]()  | 
                       ![]()  | 
                    
| 6 | Security monitoring configuration | ![]()  | 
                       ![]()  | 
                    
| 7 | Identification of in-scope systems | ![]()  | 
                       ![]()  | 
                    
| 8 | Monitoring appliance | ![]()  | 
                       ![]()  | 
                    
| 9 | Full OWASP Top 10 Analysis | ![]()  | 
                       ![]()  | 
                    
| 10 | Appliance configuration and on-boarding | ![]()  | 
                       ![]()  | 
                    
| 11 | Customer security portal configuration | ![]()  | 
                       ![]()  | 
                    
| 12 | Data categorization | ![]()  | 
                       ![]()  | 
                    
| 13 | Data parsing | ![]()  | 
                       ![]()  | 
                    
| 14 | Data normalization | ![]()  | 
                       ![]()  | 
                    
| 15 | Dashboard configuration | ![]()  | 
                       ![]()  | 
                    
| 16 | Data forwarding (upon request) | ![]()  | 
                       ![]()  | 
                    
| 17 | Alert forwarding (to customer security team) | ![]()  | 
                       ![]()  | 
                    
| 18 | Named cybersecurity team | ![]()  | 
                       ![]()  | 
                    
| 19 | 24x7 incident validation | ![]()  | 
                       ![]()  | 
                    
| 20 | Log and SIEM management | ![]()  | 
                       ![]()  | 
                    
| 21 | Maintenance of data collection systems | ![]()  | 
                       ![]()  | 
                    
| 22 | Recommendations for patching and security updates | ![]()  | 
                       ![]()  | 
                    
| 23 | Monthly reporting | ![]()  | 
                       ![]()  | 
                    
| 24 | 24x7 Monitoring | ![]()  | 
                       ![]()  | 
                    
| 25 | Custom security use-case configuration | ![]()  | 
                       ![]()  | 
                    
| 26 | Proactive log analysis | ![]()  | 
                       ![]()  | 
                    
| 27 | Quarterly review by a Senior Cybersecurity Engineer | ![]()  | 
                       ![]()  | 
                    
| 28 | End-to-end responsibility for application security monitoring | ![]()  | 
                       ![]()  | 
                    
| 29 | Monthly reporting with optional engineer calls | ![]()  | 
                       ![]()  |