|
Attribute
|
Essential
|
Advanced
|
Dynatrace
|
|
Focus
|
|||
|
Extras
|
None
|
None
|
|
|
Headcount
|
|||
|
Headcount Distribution
|
|||
|
Headcount Growth
|
|||
|
Headquarters
|
|||
|
Countries
|
AT, PL and US | ||
|
Reputation
|
Same
|
||
|
Followers
|
Same
|
||
|
Research firms
|
None
|
None
|
|
|
Founded
|
2001 | ||
|
Funding
|
Bootstrapped
|
Same
|
$21.9M USD in 4 round from 3 investors
|
|
Acquisitions
|
None
|
None
|
|
|
Revenue
|
|||
|
CVE
|
0 CVEs reported to MITRE
|
||
|
Compliance
|
CSA STAR Level 1, CSA STAR Level 2, FedRAMP, ISO/IEC 27001, SOC 1 type II, SOC 2 Type II and StateRAMP Authorized | ||
|
Bug Bounty
|
|||
|
Visits
|
|||
|
Authority
|
|||
|
Vulnerability database
|
None
|
||
|
Content
|
|||
|
Knowledge base
|
13 KB
sections, 7 in common and 6 additional
|
8 KB
sections, 7 in common and 1 additional
|
|
|
Community
|
|||
|
Sync training
|
1 workshop
|
||
|
Async training
|
3 product use courses, all free
|
13 product use courses (free)
|
|
|
Distribution
|
Same
|
||
| Marketplaces | AWS, Azure and GCP | ||
|
Freemium
|
No
|
No
|
No
|
|
Free trial
|
|||
|
Demo
|
|||
|
Open Demo
|
No
|
No
|
No
|
|
Pricing
|
|||
|
Pricing tiers
|
1 plan
|
1 plan
|
7 plans (Application Security, Full-Stack
Monitoring, Infrastructure Monitoring, Kubernetes Platform Monitoring, Log
Management & Analytics, Real User Monitoring and Synthetic Monitoring)
|
|
Minimum term
|
|||
|
Minimum payment period
|
|||
|
Minimum capabilities
|
|||
|
Minimum scope
|
1 author
|
||
|
Pricing drivers
|
|||
|
Minimum monthly payment
|
|
Attribute
|
Essential
|
Advanced
|
Dynatrace
|
|
PTaaS
|
No
|
No
|
|
|
Reverse engineering
|
No
|
No | |
|
Secure code review
|
No
|
No
|
|
|
Pivoting
|
No
|
No
|
|
|
Exploitation
|
No
|
No
|
|
|
Manual reattacks
|
Not applicable
|
Not applicable
|
|
|
Zero-day
vulnerabilities
|
None
|
Continuous zero-day vulnerability research
|
None
|
|
SLA
|
Availability and support | ||
|
Min availability
|
>=99.95% per minute LTM
|
>=99.95% per month
|
|
|
After-sale guarantees
|
No
|
Yes
|
|
|
Accreditations
|
Amazon Linux Ready Product, Amazon RDS Ready Product, AWS Lambda Ready Product, AWS PrivateLink Ready Product, AWS Outposts Ready Product, AWS Graviton Ready Product, Cloud Operations Software, Containers ISV, DevOps ISV, Government ISV, Machine Learning ISV, Migration and Modernization
ISV and Security ISV
|
||
|
Hacker certifications
|
Not
applicable
|
Not applicable
|
|
|
Type of contract
|
Employee
|
Same
|
|
|
Endpoint control
|
Not applicable
|
Total
|
Not applicable
|
|
Channel control
|
Not applicable
|
Total
|
Not applicable
|
|
Standards
|
Some
requirements from 67 standards, 6 in common and 61
additional
|
All requirements from the same standards
|
15 standards, 6 in common and 9
additional
|
|
Detection method
|
Automated tools and AI
|
||
|
Remediation
|
5, 1 in common and 4 additional
|
Same, plus 1
|
1 in common
|
|
Outputs
|
5, 3 in common and 2 additional
|
Same, plus 2
|
7, 3 in common and 4 additional
|
|
Attribute
|
Essential |
Advanced
|
Dynatrace
|
|
ASPM
|
No
|
||
|
API
|
|||
|
IDE
|
5 functionalities, none in common
|
Same, plus 1 functionality
|
|
|
CLI
|
|||
|
CI/CD
|
|||
|
Vulnerability sources
|
4 sources
|
2 sources, none in common
|
|
|
Threat model alignment
|
No
|
||
|
Priority criteria
|
|||
|
Custom prioritization
|
No
|
||
|
Scanner origin
|
|||
|
SCA
|
No
|
||
|
AI security
|
No
|
||
|
Reachability
|
12 languages
|
No
|
|
|
Reachability type
|
Not applicable
|
||
|
SBOM
|
Yes. No information available
|
||
|
Malware detection
|
Yes
|
Yes
|
No
|
|
Autofix on components
|
No
|
No
|
No
|
|
Containers
|
No
|
||
|
Source SAST
(languages)
|
No
|
||
|
Source
SAST
(frameworks)
|
No |
||
|
Custom rules
|
No
|
No
|
No
|
|
IaC
|
No
|
||
|
Binary SAST
|
1 type of binary
|
Same, plus 2 types of binaries
|
No
|
|
DAST
|
No |
||
|
API security testing
|
No
|
No
|
|
|
IAST
|
No
|
No
|
No
|
|
CSPM
|
Yes | ||
|
ASM
|
No
|
No
|
No
|
|
Secrets
|
Same, plus verify other attack vectors and secrets
exploitability
|
No
|
|
|
AI
|
3 functions, 2 in common and 1 additional
|
2 functions, all in common
|
|
|
MCP
|
|||
|
Open-source
|
Not applicable
|
No
|
|
|
Provisioning as Code
|
No
|
||
|
Deployment
|
SaaS and on-premises
|
||
| Regions | |||
|
Status
|
|||
|
Incidents
|
No information available
|
|
Attribute
|
Essential
|
Advanced
|
Dynatrace
|
|
SCM
|
None
|
||
|
Binary repositories
|
None
|
None
|
None
|
|
Ticketing
|
3, 1 in common and 2 additional
|
1 in common |
|
|
ChatOps
|
None |
None
|
|
|
IDE
|
3,
2 in common and 1 additional
|
2, all in common |
|
|
CI/CD
|
21, 5 in common and 16 additional
|
6, 5 in common and 1 additional
|
|
|
SCA
|
|||
|
Container
|
|||
|
SAST
|
|||
|
DAST
|
None |
||
|
IAST
|
None |
None
|
None
|
|
Cloud
|
3, all in common
|
6, 3 in common and 2 additional
|
|
|
CSPM
|
3 | ||
|
Secrets
|
None |
||
|
Remediation
|
None
|
None
|
None
|
|
Bug bounty
|
None
|
None
|
None
|
|
Vulnerability management
|
None
|
None
|
|
|
Compliance
|
None
|
None
|