| Architecture |
| Cloud-native, auto-scaling control plane | - | ✓ |
| Native parity across AWS, Azure, IBM Cloud, and on-prem | - | ✓ |
| Backup-agnostic across Commvault, Veeam, Rubrik, Cohesity, NetApp | - | ✓ |
| Tightly coupled to a single backup vendor stack | ✓ | - |
| Per-server architecture with manual load balancing | ✓ | - |
| Where Inspection Happens |
| Inspection before data lands in the vault | - | ✓ |
| Inspection inside the vault in an isolated clean room | ~ | ✓ |
| Inspection of live data on production systems | - | ✓ |
| Inspection of replicated data and snapshots | - | ✓ |
| Inspection of backup data | ✓ | ✓ |
| Detection Methodology |
| Deep File Inspection that opens and examines file contents | ~ | ✓ |
| Statistical and content-based feature analysis | ✓ | ~ |
| Deterministic pass or fail per file, per recovery point | - | ✓ |
| Named threat output with ransomware family identification | - | ✓ |
| Intermittent encryption detection | ~ | ✓ |
| Low-entropy encryption detection | ~ | ✓ |
| Zero-day ransomware detection without known signature | ~ | ✓ |
| Operational Footprint |
| No new accounts or access paths into the vault | - | ✓ |
| Ephemeral compute. No persistent scanner infrastructure inside the vault | - | ✓ |
| Auto-scaling to zero when no Hunt jobs are queued | - | ✓ |
| SOC interpretation step required to determine threat type | ✓ | - |
| Threshold tuning required to manage false positive volume | ✓ | - |
| Recovery Assurance |
| Last Known Clean recovery point, continuously maintained | - | ✓ |
| Resilience RPO (R-RPO) measurement | - | ✓ |
| Provable recovery compliance reporting for regulators and auditors | - | ✓ |
| Recovery context survives loss of SaaS portal | ~ | ✓ |