# Best Threat Intelligence Services Providers

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Threat intelligence services are designed to gather data across the global landscape of potential cyber threats, including existing and emerging threats and cybercrime actors, using state-of-the-art tools and methods. Threat intelligence providers then utilize this data to provide businesses with the most relevant information in order to help them prioritize security measures and stay cognizant of the viruses, scams, and other trends in cybercrime. Businesses can work with these providers in conjunction with [vulnerability assessment services](https://www.g2.com/categories/vulnerability-assessment-services) to get a complete, up-to-date picture of internal security health and potential risks to company data and devices.

Threat intelligence services go hand in hand with [cybersecurity consulting](https://www.g2.com/categories/cybersecurity-consulting), [incident response](https://www.g2.com/categories/incident-response-services), and other [cybersecurity services](https://www.g2.com/categories/cybersecurity-services) to keep companies aware of threats, safe from attacks, and prepared to respond in the event of a breach or related event. Businesses can deploy [threat intelligence software](https://www.g2.com/categories/threat-intelligence) in lieu of or in addition to threat intelligence services in order to maximize awareness and protection.





## Category Overview

**Total Products under this Category:** 86


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 200+ Authentic Reviews
- 86+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.



---

**Sponsored**

### Red River Managed Services

Whether you’re looking to migrate to the cloud, strengthen your cybersecurity posture, enhance network services or have a need for ongoing help desk support, Red River Managed Services helps customers across the entire IT lifecycle. Managed IT services mitigate risks, prevent issues in your technology environment and provide the expert support needed to tackle any challenge IT Transformation sends your way. Cloud Services - Cloud management requires both technical expertise and practical application to be effective. Red River specializes in ensuring the right fit technology for every environment. Cybersecurity Services - From end user security to identity access and data protection, Red River provides ongoing support across the enterprise to maintain a secure profile.  End User Experience Services - Day-to-day operations depend on IT and downtime is not an option. With service desk, deskside support and unified end point management, Red River ensures business continuity. Modern Infrastructure Services - Red River supports business continuity through a series of infrastructure services including support from our network operations center and expert management of the network and data center operations that help organizations run smoothly.  Collaboration Services - The world revolves around digital collaboration and calling to enable hybrid work environments. Red River leverages third-party applications and unified communications management to ensure a seamless centralized system for collaboration. 



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1100&amp;secure%5Bdisplayable_resource_id%5D=1749&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=neighbor_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1097&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1096&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1767510&amp;secure%5Bresource_id%5D=1100&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fthreat-intelligence-services%3Fpage%3D3&amp;secure%5Btoken%5D=2ef020aaaa9e04a2f0b80839552de5f9eddc2d801dea1594c4198b0a9a0401b9&amp;secure%5Burl%5D=https%3A%2F%2Fhubs.ly%2FQ04bfNjd0&amp;secure%5Burl_type%5D=custom_url)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Sophos Professional Services](https://www.g2.com/products/sophos-professional-services/reviews)
  Sophos Professional Services helps ensure that your Sophos products are deployed per our best practices, getting our customers started off on the right foot. We offer Guided Onboarding services, training and can build custom tools leveraging our APIs to meet customer needs in their unique environments.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 17


**Seller Details:**

- **Seller:** [Sophos](https://www.g2.com/sellers/sophos)
- **Year Founded:** 1985
- **HQ Location:** Oxfordshire
- **Twitter:** @Sophos (36,759 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5053/ (5,561 employees on LinkedIn®)
- **Ownership:** LSE:SOPH

**Reviewer Demographics:**
  - **Company Size:** 53% Mid-Market, 24% Small-Business


### 2. [Cisco Security Services](https://www.g2.com/products/cisco-security-services/reviews)
  Work with our strategic and technical advisors to align security, compliance, and threat management with your business goals.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 13


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,388 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Reviewer Demographics:**
  - **Company Size:** 54% Enterprise, 38% Mid-Market


### 3. [Nomic Networks](https://www.g2.com/products/nomic-networks/reviews)
  To combat increasingly sophisticated cybersecurity threats, you need an equally sophisticated network-based approach. Nomic&#39;s managed NDR thwarts stealthy intrusion and exploit attempts, and shines a light on anomalous network traffic. Nomic makes your network completely invisible to outside attackers. Our MNDR solution goes beyond signature-based tools, using techniques like AI and machine learning to continuously monitor a network for malicious activity. We support small to midsize businesses, state, local government and municipalities, and companies with lean IT departments that simply don’t have the security expertise or the time to put one more thing on their already overflowing plates.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 30


**Seller Details:**

- **Seller:** [Nomic Networks](https://www.g2.com/sellers/nomic-networks)
- **Year Founded:** 1995
- **HQ Location:** Dallas, TX
- **Twitter:** @NomicNetworks (1,445 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/9461312/ (13 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Government Administration, Information Technology and Services
  - **Company Size:** 67% Mid-Market, 23% Enterprise


### 4. [Webroot Threat Intelligence](https://www.g2.com/products/webroot-threat-intelligence/reviews)
  Webroot BrightCloud® Threat Intelligence services provide highly accurate threat intelligence on URLs, IP addresses, files, and mobile applications to over 100 of the world’s leading and most innovative network and security vendors. Our predictive intelligence keeps your solutions ahead of the internet landscape to ensure that your customers are safe from threats and comply with regulatory policies. You can integrate BrightCloud Threat Intelligence services seamlessly and customize them for your unique needs and use case. Power your solutions with the speed and accuracy you need to protect your customers from today’s most sophisticated attacks.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 18


**Seller Details:**

- **Seller:** [OpenText](https://www.g2.com/sellers/opentext)
- **Year Founded:** 1991
- **HQ Location:** Waterloo, ON
- **Twitter:** @OpenText (21,588 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2709/ (23,339 employees on LinkedIn®)
- **Ownership:** NASDAQ:OTEX

**Reviewer Demographics:**
  - **Company Size:** 56% Small-Business, 44% Mid-Market


### 5. [RSA Services](https://www.g2.com/products/rsa-services/reviews)
  RSA Business-Driven Security solutions help customers comprehensively and rapidly link security incidents with business context, enabling them to respond effectively and protect what matters most.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 45


**Seller Details:**

- **Seller:** [RSA Security](https://www.g2.com/sellers/rsa-security-520d10cb-0052-4033-b6ef-85c594df8c8b)
- **HQ Location:** Bedford, MA
- **Twitter:** @RSAsecurity (110,527 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/rsasecurity/ (2,735 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 62% Enterprise, 29% Mid-Market


### 6. [Kaspersky Cybersecurity Services](https://www.g2.com/products/kaspersky-cybersecurity-services/reviews)
  Kaspersky is the world&#39;s largest privately held vendor of endpoint cybersecurity solutions.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 17


**Seller Details:**

- **Seller:** [Kaspersky](https://www.g2.com/sellers/kaspersky-bce2dc7f-2586-4e87-96da-114de2c40584)
- **Year Founded:** 1997
- **HQ Location:** Moscow
- **Twitter:** @kasperskylabind (1,294 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaspersky/ (4,494 employees on LinkedIn®)
- **Phone:** 1-866-328-5700

**Reviewer Demographics:**
  - **Company Size:** 53% Small-Business, 29% Mid-Market


### 7. [AT&amp;T Network Services](https://www.g2.com/products/at-t-network-services/reviews)
  Our cybersecurity products and services are powered by AT&amp;T Threat Intellecta proprietary combination of cutting-edge technology, experienced staff, and proven processes. Threat Intellect provides a revolutionary security experience, so you can focus on what you do best.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 6


**Seller Details:**

- **Seller:** [AT&amp;T Inc.](https://www.g2.com/sellers/at-t-inc)
- **Year Founded:** 1876
- **HQ Location:** Dallas, TX
- **Twitter:** @ATT (877,621 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/att/ (181,042 employees on LinkedIn®)
- **Ownership:** NYSE: T

**Reviewer Demographics:**
  - **Company Size:** 67% Mid-Market, 17% Enterprise


### 8. [Malware Patrol](https://www.g2.com/products/malware-patrol/reviews)
  Malware Patrol is a provider of high-quality, actionable cyber threat intelligence, assisting organizations in enhancing their security defenses since 2005. By delivering data that can be utilized for blocking threats, enrichment, correlation, triaging, and threat hunting, Malware Patrol ensures that security operations remain agile and effective against a wide range of cyber threats. Their solutions cater to enterprises, small to medium-sized businesses (SMBs, and DNS providers, offering customizable feeds compatible with various security platforms. Key Features and Functionality: - Threat Intelligence Data Feeds: Offers a wide range of Indicators of Compromise (IoC feeds, including malware URLs and samples, malicious IPs, command and control servers (C2s, domain generation algorithms (DGAs, cryptomining sites, and newly registered domains. These feeds are customizable to meet specific data or ingestion requirements. - DNS Firewall: Provides a DNS Response Policy Zone (RPZ firewall with five separate zone files updated every five minutes, protecting users against C2s, DGAs, malware, cryptominers, and phishing sites. - Business Protect – SMB Protection: Designed for small to medium-sized businesses, this service offers data feeds that protect against the latest malware and ransomware campaigns, compatible with popular security tools and platforms. - Easy Integration: Threat intelligence feeds are compatible with common cybersecurity tools and platforms, including IPS/IDS, firewalls, Threat Intelligence Platforms (TIPs, and Security Information and Event Management (SIEM systems. - Accurate and Actionable Data: Maintains a low false positive rate through rigorous daily validation, including DNS resolution and URL visits, ensuring the accuracy of data. - Dedicated Support: Provides prompt, dedicated support with assigned teams familiar with specific customer needs and environments. Primary Value and Problem Solved: Malware Patrol addresses the challenge organizations face in managing and interpreting vast amounts of threat data by transforming it into actionable intelligence. This enables security teams to proactively defend against cyber threats, reduce response times, and enhance overall security posture. By offering customizable and easily integrable threat intelligence feeds, Malware Patrol ensures that organizations can effectively protect their networks, data, and users from evolving cyber threats.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 4


**Seller Details:**

- **Seller:** [Malware Patrol](https://www.g2.com/sellers/malware-patrol)
- **Year Founded:** 2005
- **HQ Location:** Saint Petersburg, US
- **Twitter:** @MalwarePatrol (8,893 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/malware-patrol/ (10 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 75% Small-Business, 25% Mid-Market


### 9. [Proofpoint Premium Threat Information Service](https://www.g2.com/products/proofpoint-premium-threat-information-service/reviews)
  Proofpoint Premium Threat Information Service provides deeper understanding of the ongoing threat landscape and your organization&#39;s place in it, enabling you.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 4


**Seller Details:**

- **Seller:** [Proofpoint](https://www.g2.com/sellers/proofpoint)
- **Year Founded:** 2002
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @proofpoint (31,141 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/proofpoint (5,020 employees on LinkedIn®)
- **Ownership:** NASDAQ: PFPT

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 50% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Email Security (2 reviews)
- Detection Efficiency (1 reviews)
- Management Ease (1 reviews)
- Scanning Efficiency (1 reviews)

**Cons:**

- Insufficient Training (1 reviews)
- Integration Issues (1 reviews)

### 10. [Rapid7 Security Services](https://www.g2.com/products/rapid7-security-services/reviews)
  Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations.


  **Average Rating:** 3.5/5.0
  **Total Reviews:** 12


**Seller Details:**

- **Seller:** [Rapid7](https://www.g2.com/sellers/rapid7)
- **Year Founded:** 2000
- **HQ Location:** Boston, MA
- **Twitter:** @rapid7 (124,080 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/39624/ (3,249 employees on LinkedIn®)
- **Ownership:** NASDAQ:RPD

**Reviewer Demographics:**
  - **Company Size:** 33% Enterprise, 33% Mid-Market


### 11. [Ernst &amp; Young](https://www.g2.com/products/ernst-young/reviews)
  One of the world&#39;s leading professional services organizations, helps companies across the globe to identify and capitalize on business opportunities.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 20


**Seller Details:**

- **Seller:** [Ernst &amp; Young (E&amp;Y)](https://www.g2.com/sellers/ernst-young-e-y)
- **Year Founded:** 1989
- **HQ Location:** London
- **LinkedIn® Page:** https://www.linkedin.com/company/ernstandyoung (395,189 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 70% Enterprise, 40% Mid-Market


### 12. [Forcepoint CyberSecurity Intelligence (CSI)](https://www.g2.com/products/forcepoint-cybersecurity-intelligence-csi/reviews)
  Forcepoint CyberSecurity Intelligence (CSI) helps you protect IP with systems that eliminate security blind spots by understanding people&#39;s behaviors and motivations as they interact with your critical business data everywhere.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 3


**Seller Details:**

- **Seller:** [Raytheon](https://www.g2.com/sellers/raytheon)
- **Year Founded:** 2020
- **HQ Location:** Arlington, Virginia, United States
- **LinkedIn® Page:** https://www.linkedin.com/company/rtx/ (134,755 employees on LinkedIn®)
- **Ownership:** NYSE:RTN
- **Total Revenue (USD mm):** $29

**Reviewer Demographics:**
  - **Company Size:** 67% Enterprise, 33% Mid-Market


### 13. [Microsoft Defender Experts for XDR](https://www.g2.com/products/microsoft-defender-experts-for-xdr/reviews)
  Effective contingency plans, processes, and tools are key to swift security response. Work with security support engineers and onsite incident response teams to investigate suspicious events, detect malicious attacks, and respond to security breaches.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 17


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,844 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Company Size:** 47% Mid-Market, 35% Small-Business


### 14. [OneNeck IT Solutions](https://www.g2.com/products/oneneck-it-solutions/reviews)
  OneNeck’s US-based experts deliver a diverse portfolio of hybrid IT solutions that include: - Multi-cloud: Public, hosted private, on-prem and hybrid cloud - Infrastructure: Network, systems and storage, wired/wireless access, data protection - Collaboration: Voice, video, messaging and meetings - Data Modernization: Modern data platforms, data transformation and AI - Security: Risk assessments, roadmaps, mitigation and 24x7 response - Managed Services: Infrastructure, OS, database, application and multi-cloud Through advanced engineering and security best practices, we help our customers stabilize and protect their IT environments, navigate a path to IT modernization and take full advantage of new and innovative technologies in the cloud to achieve strong business growth.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 26


**Seller Details:**

- **Seller:** [OneNeck IT Solutions](https://www.g2.com/sellers/oneneck-it-solutions)
- **Year Founded:** 1993
- **HQ Location:** Madison, US
- **Twitter:** @OneNeck_IT (1,153 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/oneneck-it-solutions/ (235 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Hospital &amp; Health Care
  - **Company Size:** 62% Mid-Market, 23% Enterprise


### 15. [Trustwave Services](https://www.g2.com/products/trustwave-services/reviews)
  Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 7


**Seller Details:**

- **Seller:** [Singtel](https://www.g2.com/sellers/singtel)
- **Year Founded:** 1879
- **HQ Location:** Singapore, SG
- **Twitter:** @Singtel (41,220 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/singtel/ (8,305 employees on LinkedIn®)
- **Ownership:** SGX:Z74

**Reviewer Demographics:**
  - **Company Size:** 57% Small-Business, 29% Mid-Market


### 16. [GateWatcher](https://www.g2.com/products/gatewatcher/reviews)
  Gatewatcher is the leading publisher of cyber security software specializing in advanced intrusion detection.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 2


**Seller Details:**

- **Seller:** [GateWatcher](https://www.g2.com/sellers/gatewatcher)
- **Year Founded:** 2015
- **HQ Location:** Paris, FR
- **LinkedIn® Page:** https://www.linkedin.com/company/gatewatcher (126 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 50% Small-Business


### 17. [AKTEK iO](https://www.g2.com/products/aktek-io/reviews)
  AKTEK iO is a powerful intelligence management platform designed to centralize, analyze, and act on critical intelligence.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [AKTEK](https://www.g2.com/sellers/aktek)
- **Year Founded:** 2016
- **HQ Location:** London, GB
- **Twitter:** @aktekio (118 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/aktek-ltd/ (21 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (1 reviews)
- Features (1 reviews)
- Security (1 reviews)

**Cons:**

- Limitations (1 reviews)

### 18. [BAE Systems](https://www.g2.com/products/bae-systems/reviews)
  BAE Systems is a global defence, aerospace and security company employing around 88,200 people worldwide. Our wide-ranging products and services cover air, land and naval forces, as well as advanced electronics, security, information technology, and support services.


  **Average Rating:** 1.5/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [BAE Systems](https://www.g2.com/sellers/bae-systems-a8f5cb6b-ebbf-4b81-90df-cda9511f0020)
- **Year Founded:** 2016
- **HQ Location:** Falls Church, US
- **Twitter:** @BAES_Careers (1,919 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1881 (16,381 employees on LinkedIn®)
- **Ownership:** LON: BA

**Reviewer Demographics:**
  - **Company Size:** 100% Mid-Market


### 19. [CyberDefenses](https://www.g2.com/products/cyberdefenses/reviews)
  CyberDefenses is a managed security services provider that offers top caliber guidance, services and training to protect clients against cyber attack.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [CyberDefenses](https://www.g2.com/sellers/cyberdefenses)
- **Year Founded:** 2002
- **HQ Location:** Dallas, Texas, United States
- **Twitter:** @CyberDefenses (276 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/99051/ (53 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 20. [IPrating.net](https://www.g2.com/products/iprating-net/reviews)
  IPrating.net is a comprehensive IP intelligence API designed to empower businesses with real-time data for location tracking, content localization, and cybersecurity. Serving as a robust infrastructure layer for developers and digital enterprises, the platform transforms raw IP addresses into actionable business intelligence, helping organizations better understand and protect their web traffic. At its core, the platform offers high-precision IP Geolocation, covering 247 countries with city-level accuracy and a 98% success rate. This capability allows businesses to automatically redirect users to regional sites, enforce geo-compliance, and streamline checkout processes by pre-filling location data. Beyond geography, iprating.net drives revenue through Commerce Localization. The API instantly identifies the local currency (supporting 180+ currencies) and native languages associated with a user&#39;s connection. This enables e-commerce platforms to deliver hyper-personalized experiences, such as displaying correct pricing formats and localizing content immediately upon a user&#39;s arrival. Crucially, the service acts as a frontline defense for Cybersecurity. It provides advanced proxy detection by analyzing IPs for high-risk attributes. The system detects the use of VPNs, open proxies, and Tor nodes, assigning a real-time risk score (0-100) to every visitor. This feature allows fraud teams to proactively block malicious bots, prevent chargebacks, and secure user accounts without adding friction for legitimate customers. Travel and logistics information is also available in the product, facilitating delivery time calculation, travel safety and automatic travel option selection based on IP information. Built for speed and reliability, iprating.net is the ideal solution for SaaS companies, e-commerce stores, and financial institutions looking to de-anonymize traffic and secure their digital perimeter.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [IPrating.net](https://www.g2.com/sellers/iprating-net)
- **Year Founded:** 2025
- **HQ Location:** Nicosia, CY
- **LinkedIn® Page:** https://www.linkedin.com/company/iprating-net/ (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 21. [Northrop Grumman](https://www.g2.com/products/northrop-grumman/reviews)
  In todays conflicts, a new battlefield is arising one where traditional systems arent the only ones targeted. At Northrop Grumman, we create unrivaled, full-spectrum cyber solutions to actively combat these threats.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Northrop Grumman](https://www.g2.com/sellers/northrop-grumman)
- **HQ Location:** Falls Church, Virginia, United States
- **Twitter:** @northropgrumman (343,748 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/northrop-grumman-corporation/ (79,314 employees on LinkedIn®)
- **Ownership:** NYSE: NOC

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 22. [NTT Security Services](https://www.g2.com/products/ntt-security-services/reviews)
  With a focus on managed security services (MSS) and global threat intelligence, NTT Security protects traditional and virtual IT infrastructures, cloud environments and mobile data.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [NTT Security](https://www.g2.com/sellers/ntt-security)
- **Year Founded:** 2000
- **HQ Location:** Omaha, US
- **Twitter:** @NTTSecurity_US (3,373 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/14196 (79 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Enterprise


### 23. [Ping0](https://www.g2.com/products/ping0/reviews)
  Ping0.xyz provides cutting-edge cybersecurity tools focused on IP address intelligence. We specialize in unmasking the true identity of web traffic, offering a comprehensive suite of detection services including VPNs, Tor nodes, and compromised proxies. Our mission is to empower developers with the data they need to block fraud, stop account takeovers, and enforce geo-restrictions effectively. Whether you are protecting a fintech platform or a gaming server, Ping0 delivers the speed and accuracy you need.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Ping0](https://www.g2.com/sellers/ping0)
- **Year Founded:** 2025
- **HQ Location:** Washington D.C, US
- **LinkedIn® Page:** https://www.linkedin.com/company/ping0/ (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 24. [Silent Push](https://www.g2.com/products/silent-push/reviews)
  Silent Push was founded to redefine how organizations worldwide track, monitor, and counteract global cyber threats. Using Indicators of Future Attack™ (IOFA™), Silent Push empowers preemptive cyber defense by revealing threat actor infrastructure as it is being set up. By mapping the internet through an attacker’s lens, Silent Push enables security teams to neutralize threats before they strike, moving far beyond the limitations of reactive cybersecurity.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Silent Push ](https://www.g2.com/sellers/silent-push)
- **Year Founded:** 2020
- **HQ Location:** Reston, Virginia
- **Twitter:** @silentpush (2,209 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/silent-push-inc/ (59 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 25. [Verizon Network Threat Advanced Analytics](https://www.g2.com/products/verizon-network-threat-advanced-analytics/reviews)
  Network Threat Advanced Analytics combines automated detection and human intelligence from our Security Operations Centers (SOCs) that provide visibility into external network threats. Together, they move customers from simply monitoring issues to proactively addressing potential cyber security threats.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Verizon Enterprise](https://www.g2.com/sellers/verizon-enterprise)
- **Year Founded:** 1988
- **HQ Location:** Basking Ridge, NJ
- **Twitter:** @VerizonEnterpr (6 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1094/ (15,946 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Enterprise




## Parent Category

[Security and Privacy Services Providers](https://www.g2.com/categories/security-and-privacy-services)



## Related Categories

- [Incident Response Services Providers](https://www.g2.com/categories/incident-response-services)
- [IT Compliance Services Providers](https://www.g2.com/categories/it-compliance-services)
- [Vulnerability Assessment Services Providers](https://www.g2.com/categories/vulnerability-assessment-services)




