Graph-based risk modeling
Assets, identities, configurations, and vulnerabilities are modeled as interconnected entities in a continuously updated graph.
This enables attack-path analysis, impact assessment, and contextual prioritization beyond static rule checks.