Best Threat Intelligence Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies utilize the tools to keep their security standards up to date and fit to combat new threats as they emerge. These tools can improve security performance by providing information on threats to their specific networks, infrastructure, and endpoint devices. These products provide information about hazards and how they function, their capabilities, and remediation techniques. IT administrators and security professionals use the data delivered to better protect their systems from emerging threats and plan for possible vulnerabilities. The tools alert users as new threats emerge and provide information detailing best practices for resolution.

Many products like security information and event management (SIEM) and vulnerability management software can integrate with or provide similar information as threat intelligence products. Those products, though, tend to provide live updates and actionable intelligence, and focus on other components of a security ecosystem.

To qualify for inclusion in the Threat Intelligence category, a product must:

Provide information on emerging threats and vulnerabilities
Detail remediation practices for common and emerging threats
Analyze global threats on different types of networks and devices
Cater threat information to specific IT solutions

Best Threat Intelligence Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
243 Listings in Threat Intelligence Available
(302)4.4 out of 5
11th Easiest To Use in Threat Intelligence software
View top Consulting Services for Microsoft Defender for Cloud
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

    Users
    • Saas Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    186
    Comprehensive Security
    124
    Cloud Security
    112
    Ease of Use
    88
    Cloud Integration
    76
    Cons
    Complexity
    42
    Expensive
    39
    Improvement Needed
    29
    Missing Features
    28
    Delayed Detection
    27
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,938,794 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    244,190 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

Users
  • Saas Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Microsoft Defender for Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
186
Comprehensive Security
124
Cloud Security
112
Ease of Use
88
Cloud Integration
76
Cons
Complexity
42
Expensive
39
Improvement Needed
29
Missing Features
28
Delayed Detection
27
Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.7
Ease of Use
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,938,794 Twitter followers
LinkedIn® Page
www.linkedin.com
244,190 employees on LinkedIn®
Ownership
MSFT
(127)4.6 out of 5
3rd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

    Users
    • Threat Intelligence Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 17% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Recorded Future is a cloud-based platform that provides end-to-end intelligence, from adversaries to infrastructure, with features such as threat intelligence, sandboxing, and an identity module.
    • Users like the platform's rich data collection, easy-to-use interface, and the ability to provide actionable threat intelligence, along with the support from the customer success team and the platform's adaptability to the evolving threat landscape.
    • Reviewers noted that the platform can be intimidating for new users due to information overload, the user interface can be confusing, and the licensing module is considered expensive, with some users also mentioning issues with customer support responsiveness.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Recorded Future Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    60
    Features
    60
    Threat Intelligence
    44
    Threat Detection
    39
    Insights
    35
    Cons
    Expensive
    24
    Complexity
    22
    Learning Curve
    16
    Pricing Issues
    16
    Difficult Learning
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Recorded Future features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.8
    8.7
    Intelligence Reports
    Average: 8.9
    7.8
    Endpoint Intelligence
    Average: 8.4
    8.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Somerville, US
    Twitter
    @RecordedFuture
    110,878 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,071 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

Users
  • Threat Intelligence Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 17% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Recorded Future is a cloud-based platform that provides end-to-end intelligence, from adversaries to infrastructure, with features such as threat intelligence, sandboxing, and an identity module.
  • Users like the platform's rich data collection, easy-to-use interface, and the ability to provide actionable threat intelligence, along with the support from the customer success team and the platform's adaptability to the evolving threat landscape.
  • Reviewers noted that the platform can be intimidating for new users due to information overload, the user interface can be confusing, and the licensing module is considered expensive, with some users also mentioning issues with customer support responsiveness.
Recorded Future Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
60
Features
60
Threat Intelligence
44
Threat Detection
39
Insights
35
Cons
Expensive
24
Complexity
22
Learning Curve
16
Pricing Issues
16
Difficult Learning
15
Recorded Future features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.8
8.7
Intelligence Reports
Average: 8.9
7.8
Endpoint Intelligence
Average: 8.4
8.5
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2009
HQ Location
Somerville, US
Twitter
@RecordedFuture
110,878 Twitter followers
LinkedIn® Page
www.linkedin.com
1,071 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(118)4.6 out of 5
1st Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patente

    Users
    • Security Threat Analyst
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 69% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Argos™ Threat Intelligence Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    56
    Threat Intelligence
    52
    Threat Detection
    39
    Insights
    37
    Customer Support
    36
    Cons
    Inefficient Alerts
    18
    Inefficient Alert System
    13
    False Positives
    11
    Integration Issues
    11
    Missing Features
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Argos™ Threat Intelligence Platform features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.8
    8.9
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberInt
    Year Founded
    2009
    HQ Location
    Petah Tikva, Israel
    Twitter
    @cyber_int
    1,828 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    170 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patente

Users
  • Security Threat Analyst
Industries
  • Banking
  • Financial Services
Market Segment
  • 69% Enterprise
  • 20% Mid-Market
Argos™ Threat Intelligence Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
56
Threat Intelligence
52
Threat Detection
39
Insights
37
Customer Support
36
Cons
Inefficient Alerts
18
Inefficient Alert System
13
False Positives
11
Integration Issues
11
Missing Features
11
Argos™ Threat Intelligence Platform features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.8
8.9
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
CyberInt
Year Founded
2009
HQ Location
Petah Tikva, Israel
Twitter
@cyber_int
1,828 Twitter followers
LinkedIn® Page
www.linkedin.com
170 employees on LinkedIn®
(287)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    55
    Ease of Use
    45
    Security
    43
    Detection
    40
    Threat Detection
    40
    Cons
    Missing Features
    15
    Limited Features
    13
    Complexity
    11
    Difficult Navigation
    11
    False Positives
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.3
    Security Validation
    Average: 8.8
    9.3
    Intelligence Reports
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,961 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,641 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 39% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
55
Ease of Use
45
Security
43
Detection
40
Threat Detection
40
Cons
Missing Features
15
Limited Features
13
Complexity
11
Difficult Navigation
11
False Positives
11
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.3
Security Validation
Average: 8.8
9.3
Intelligence Reports
Average: 8.9
9.4
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,961 Twitter followers
LinkedIn® Page
www.linkedin.com
9,641 employees on LinkedIn®
(288)4.4 out of 5
Optimized for quick response
5th Easiest To Use in Threat Intelligence software
View top Consulting Services for Mimecast Advanced Email Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Legal Services
    • Information Technology and Services
    Market Segment
    • 68% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mimecast Advanced Email Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    71
    Ease of Use
    63
    Security
    49
    Features
    42
    Spam Blocking
    35
    Cons
    Poor User Interface
    21
    Complexity
    19
    Configuration Difficulties
    17
    Navigation Difficulty
    16
    Email Issues
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.8
    8.3
    Intelligence Reports
    Average: 8.9
    7.0
    Endpoint Intelligence
    Average: 8.4
    8.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mimecast
    Company Website
    Year Founded
    2003
    HQ Location
    London
    Twitter
    @Mimecast
    18,723 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,607 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

Users
  • IT Manager
  • Systems Administrator
Industries
  • Legal Services
  • Information Technology and Services
Market Segment
  • 68% Mid-Market
  • 17% Enterprise
Mimecast Advanced Email Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
71
Ease of Use
63
Security
49
Features
42
Spam Blocking
35
Cons
Poor User Interface
21
Complexity
19
Configuration Difficulties
17
Navigation Difficulty
16
Email Issues
15
Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.8
8.3
Intelligence Reports
Average: 8.9
7.0
Endpoint Intelligence
Average: 8.4
8.0
Ease of Use
Average: 8.8
Seller Details
Seller
Mimecast
Company Website
Year Founded
2003
HQ Location
London
Twitter
@Mimecast
18,723 Twitter followers
LinkedIn® Page
www.linkedin.com
2,607 employees on LinkedIn®
(174)4.7 out of 5
14th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

    Users
    • Network Engineer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGate NGFW Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Features
    12
    Security
    12
    Network Connectivity
    8
    Customization
    7
    Cons
    Update Issues
    5
    Complexity
    4
    Slow Performance
    4
    Expertise Required
    3
    Poor User Interface
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate NGFW features and usability ratings that predict user satisfaction
    9.1
    Security Validation
    Average: 8.8
    9.1
    Intelligence Reports
    Average: 8.9
    8.7
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for FortiGate NGFW, left between June 2021 and September 2022.
    • Reviewers like FortiGate NGFW’s security features including IPS, IDS, antivirus, and advanced cybersecurity protection.
    • Reviewers value FortiGate’s secure access to remote deployments.
    • Reviewers appreciate FortiGate’s management console for the network administrators, but it is hard to use for reporting and investigating the network.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    152,690 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Users
  • Network Engineer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Mid-Market
  • 20% Enterprise
FortiGate NGFW Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Features
12
Security
12
Network Connectivity
8
Customization
7
Cons
Update Issues
5
Complexity
4
Slow Performance
4
Expertise Required
3
Poor User Interface
3
FortiGate NGFW features and usability ratings that predict user satisfaction
9.1
Security Validation
Average: 8.8
9.1
Intelligence Reports
Average: 8.9
8.7
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for FortiGate NGFW, left between June 2021 and September 2022.
  • Reviewers like FortiGate NGFW’s security features including IPS, IDS, antivirus, and advanced cybersecurity protection.
  • Reviewers value FortiGate’s secure access to remote deployments.
  • Reviewers appreciate FortiGate’s management console for the network administrators, but it is hard to use for reporting and investigating the network.
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
152,690 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 47% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Falcon Security and IT operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Easy Integrations
    7
    Security Protection
    7
    Security
    6
    Customer Support
    5
    Cons
    Expensive
    4
    Bugs
    3
    Poor Documentation
    2
    Slow Loading
    2
    Slow Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falcon Security and IT operations features and usability ratings that predict user satisfaction
    8.5
    Security Validation
    Average: 8.8
    9.3
    Intelligence Reports
    Average: 8.9
    9.1
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,961 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,641 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 47% Enterprise
Falcon Security and IT operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Easy Integrations
7
Security Protection
7
Security
6
Customer Support
5
Cons
Expensive
4
Bugs
3
Poor Documentation
2
Slow Loading
2
Slow Performance
2
Falcon Security and IT operations features and usability ratings that predict user satisfaction
8.5
Security Validation
Average: 8.8
9.3
Intelligence Reports
Average: 8.9
9.1
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,961 Twitter followers
LinkedIn® Page
www.linkedin.com
9,641 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(101)4.4 out of 5
Optimized for quick response
7th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 68% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CYREBRO Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    29
    Customer Support
    25
    Response Time
    23
    Support
    20
    Threat Detection
    16
    Cons
    Communication Issues
    12
    Inefficient Alert System
    12
    Integration Issues
    12
    Poor Customer Support
    12
    False Positives
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYREBRO features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.8
    8.5
    Intelligence Reports
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYREBRO
    Company Website
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @CYREBRO_IO
    344 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    114 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 68% Mid-Market
  • 20% Small-Business
CYREBRO Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
29
Customer Support
25
Response Time
23
Support
20
Threat Detection
16
Cons
Communication Issues
12
Inefficient Alert System
12
Integration Issues
12
Poor Customer Support
12
False Positives
11
CYREBRO features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.8
8.5
Intelligence Reports
Average: 8.9
8.9
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
CYREBRO
Company Website
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@CYREBRO_IO
344 Twitter followers
LinkedIn® Page
www.linkedin.com
114 employees on LinkedIn®
(529)4.5 out of 5
Optimized for quick response
13th Easiest To Use in Threat Intelligence software
View top Consulting Services for Cloudflare Application Security and Performance
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare is the cloud for the “everywhere world”. At Cloudflare, we have our eyes set on an ambitious goal -- to help build a better Internet. Today, everything needs to be connected to everything

    Users
    • Web Developer
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 64% Small-Business
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare Application Security and Performance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    63
    Ease of Use
    61
    Speed
    46
    Speed Performance
    42
    Performance Speed
    40
    Cons
    Technical Issues
    19
    Expensive
    15
    Complex User Interface
    14
    Performance Issues
    14
    Pricing Issues
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare Application Security and Performance features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.8
    8.3
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    211,069 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,964 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare is the cloud for the “everywhere world”. At Cloudflare, we have our eyes set on an ambitious goal -- to help build a better Internet. Today, everything needs to be connected to everything

Users
  • Web Developer
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 64% Small-Business
  • 26% Mid-Market
Cloudflare Application Security and Performance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
63
Ease of Use
61
Speed
46
Speed Performance
42
Performance Speed
40
Cons
Technical Issues
19
Expensive
15
Complex User Interface
14
Performance Issues
14
Pricing Issues
13
Cloudflare Application Security and Performance features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.8
8.3
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
211,069 Twitter followers
LinkedIn® Page
www.linkedin.com
4,964 employees on LinkedIn®
(44)4.5 out of 5
9th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

    Users
    No information available
    Industries
    • Security and Investigations
    Market Segment
    • 61% Enterprise
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dataminr Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Efficiency Improvement
    3
    Incident Management
    3
    Time-saving
    3
    Artificial Intelligence
    2
    Cons
    Difficult Setup
    1
    Improvement Needed
    1
    Lack of Customization
    1
    Learning Curve
    1
    Limited Functionality
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dataminr features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 8.8
    7.6
    Intelligence Reports
    Average: 8.9
    8.0
    Endpoint Intelligence
    Average: 8.4
    8.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dataminr
    Year Founded
    2009
    HQ Location
    New York, NY
    Twitter
    @Dataminr
    16,862 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    762 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

Users
No information available
Industries
  • Security and Investigations
Market Segment
  • 61% Enterprise
  • 32% Small-Business
Dataminr Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Efficiency Improvement
3
Incident Management
3
Time-saving
3
Artificial Intelligence
2
Cons
Difficult Setup
1
Improvement Needed
1
Lack of Customization
1
Learning Curve
1
Limited Functionality
1
Dataminr features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 8.8
7.6
Intelligence Reports
Average: 8.9
8.0
Endpoint Intelligence
Average: 8.4
8.6
Ease of Use
Average: 8.8
Seller Details
Seller
Dataminr
Year Founded
2009
HQ Location
New York, NY
Twitter
@Dataminr
16,862 Twitter followers
LinkedIn® Page
www.linkedin.com
762 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM X-Force Exchange features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.8
    8.8
    Intelligence Reports
    Average: 8.9
    8.1
    Endpoint Intelligence
    Average: 8.4
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    714,459 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 29% Mid-Market
IBM X-Force Exchange features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.8
8.8
Intelligence Reports
Average: 8.9
8.1
Endpoint Intelligence
Average: 8.4
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
714,459 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
Ownership
SWX:IBM
(33)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 48% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ZeroFox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    19
    Ease of Use
    19
    Features
    10
    Security
    10
    Service Quality
    10
    Cons
    Inefficient Alerts
    8
    False Alarms
    6
    False Positives
    6
    Inefficiency
    6
    Complexity
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZeroFox features and usability ratings that predict user satisfaction
    8.6
    Security Validation
    Average: 8.8
    8.5
    Intelligence Reports
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZeroFox
    Company Website
    Year Founded
    2013
    HQ Location
    Baltimore, MD
    Twitter
    @ZeroFOX
    5,342 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    790 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented

Users
No information available
Industries
  • Financial Services
Market Segment
  • 48% Mid-Market
  • 33% Enterprise
ZeroFox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
19
Ease of Use
19
Features
10
Security
10
Service Quality
10
Cons
Inefficient Alerts
8
False Alarms
6
False Positives
6
Inefficiency
6
Complexity
4
ZeroFox features and usability ratings that predict user satisfaction
8.6
Security Validation
Average: 8.8
8.5
Intelligence Reports
Average: 8.9
7.5
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
Seller
ZeroFox
Company Website
Year Founded
2013
HQ Location
Baltimore, MD
Twitter
@ZeroFOX
5,342 Twitter followers
LinkedIn® Page
www.linkedin.com
790 employees on LinkedIn®
(163)4.8 out of 5
10th Easiest To Use in Threat Intelligence software
View top Consulting Services for ThreatLocker
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 60% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatLocker Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    64
    Customer Support
    58
    Security
    47
    Features
    42
    Threat Detection
    33
    Cons
    Learning Curve
    27
    Difficult Learning Curve
    17
    Complexity
    13
    Difficult Configuration
    11
    Compatibility Issues
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker features and usability ratings that predict user satisfaction
    9.1
    Security Validation
    Average: 8.8
    9.5
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.4
    8.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    1,943 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    528 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 60% Small-Business
  • 34% Mid-Market
ThreatLocker Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
64
Customer Support
58
Security
47
Features
42
Threat Detection
33
Cons
Learning Curve
27
Difficult Learning Curve
17
Complexity
13
Difficult Configuration
11
Compatibility Issues
10
ThreatLocker features and usability ratings that predict user satisfaction
9.1
Security Validation
Average: 8.8
9.5
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.4
8.5
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
1,943 Twitter followers
LinkedIn® Page
www.linkedin.com
528 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Censys, founded in 2017 in Ann Arbor, Michigan, provides organizations with the world's most comprehensive real-time view of global networks and devices. Established by the creators of ZMap and truste

    Users
    No information available
    Industries
    • Computer & Network Security
    • Pharmaceuticals
    Market Segment
    • 50% Small-Business
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Censys Search Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Accuracy of Information
    9
    Detailed Analysis
    6
    Features