• Real-time automated querying
• Real-time alerting, and historical querying, working with new-threat intelligence
• Manual and automated vulnerability identification
• Scanning capability for comprehensive network monitoring
• Manual/Human Intel Analysis
• Active Hunting and Query Design
• Automated Query Argument on past packet data and go-forward packet data