Hi Hi
I hope my answer will help you.
1-Detection engine consisting of static and dynamic analysis to capture both malware attributes and techniques
2-Emulation of various device OS including Windows, macOS, Linux, and SCADA/ICS, and associated applications and protocols
3-Accepts a multitude of sources including network packets, file shares, on-demand submission and automated submissions by NGFW, SEG, EPP/EDR, and WAF, other integrated security controls
4-Reporting and automated sharing of threat intelligence
5-Flexible deployment modes such as appliance, VM, SaaS and Public Cloud to fit various on-prem and cloud environments
Thanks