2026 Best Software Awards are here!See the list

Top Free Threat Intelligence Software

Check out our list of free Threat Intelligence Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Threat Intelligence Software to ensure you get the right product.

View Free Threat Intelligence Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
48 Threat Intelligence Products Available
(383)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Threat Intelligence software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

    Users
    • Security Analyst
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Enterprise
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.4
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 9.0
    9.4
    Endpoint Intelligence
    Average: 8.6
    9.0
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Bibek M.
    BM
    The best part is definitely the single, lightweight agent. Unlike our old antivirus, which used to slow down laptops and require constant reboots... Read review
    MN
    CrowdStrike Falcon endpoint protection platform and it is could native architecture real time threat detection and response. CrowdStrike provides... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    109,396 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,831 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

Users
  • Security Analyst
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Enterprise
  • 42% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.4
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 9.0
9.4
Endpoint Intelligence
Average: 8.6
9.0
Ease of Use
Average: 9.1
Bibek M.
BM
The best part is definitely the single, lightweight agent. Unlike our old antivirus, which used to slow down laptops and require constant reboots... Read review
MN
CrowdStrike Falcon endpoint protection platform and it is could native architecture real time threat detection and response. CrowdStrike provides... Read review
Seller Details
Company Website
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
109,396 Twitter followers
LinkedIn® Page
www.linkedin.com
10,831 employees on LinkedIn®
(149)4.8 out of 5
Optimized for quick response
3rd Easiest To Use in Threat Intelligence software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is an AI-native cybersecurity solution designed to help organizations enhance their digital security posture through real-time intelligence, detection, and response capabilities. By leveraging a

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Enterprise
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    9.3
    Security Validation
    Average: 8.9
    9.6
    Intelligence Reports
    Average: 9.0
    9.3
    Endpoint Intelligence
    Average: 8.6
    9.5
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • SM
    I use Cyble for our comprehensive cyber defense strategy as a one-stop toolkit, which helps us in brand protection, dark web monitoring, and... Read review
    AB
    I really appreciate Cyble for its amazing speed of threat detection. Its new-age features provide a single data lake for faster correlation, which... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    16,653 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    246 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is an AI-native cybersecurity solution designed to help organizations enhance their digital security posture through real-time intelligence, detection, and response capabilities. By leveraging a

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Enterprise
  • 17% Mid-Market
Cyble features and usability ratings that predict user satisfaction
9.3
Security Validation
Average: 8.9
9.6
Intelligence Reports
Average: 9.0
9.3
Endpoint Intelligence
Average: 8.6
9.5
Ease of Use
Average: 9.1
SM
I use Cyble for our comprehensive cyber defense strategy as a one-stop toolkit, which helps us in brand protection, dark web monitoring, and... Read review
AB
I really appreciate Cyble for its amazing speed of threat detection. Its new-age features provide a single data lake for faster correlation, which... Read review
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
16,653 Twitter followers
LinkedIn® Page
www.linkedin.com
246 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(130)4.8 out of 5
1st Easiest To Use in Threat Intelligence software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

    Users
    • Security Analyst
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 52% Enterprise
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK features and usability ratings that predict user satisfaction
    9.4
    Security Validation
    Average: 8.9
    9.5
    Intelligence Reports
    Average: 9.0
    9.4
    Endpoint Intelligence
    Average: 8.6
    9.6
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Naveez S.
    NS
    CloudSEK is the best application is Al-based threat management platform that detects, analyses, and reports actionable threats to organizations. In... Read review
    Aditya  S.
    AS
    CloudSEK (specifically their XVigil platform) turns noise into actual "hey, you should fix this" alerts. Instead of "hackers are talking." Their... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,385 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    231 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

Users
  • Security Analyst
Industries
  • Financial Services
  • Banking
Market Segment
  • 52% Enterprise
  • 27% Mid-Market
CloudSEK features and usability ratings that predict user satisfaction
9.4
Security Validation
Average: 8.9
9.5
Intelligence Reports
Average: 9.0
9.4
Endpoint Intelligence
Average: 8.6
9.6
Ease of Use
Average: 9.1
Naveez S.
NS
CloudSEK is the best application is Al-based threat management platform that detects, analyses, and reports actionable threats to organizations. In... Read review
Aditya  S.
AS
CloudSEK (specifically their XVigil platform) turns noise into actual "hey, you should fix this" alerts. Instead of "hackers are talking." Their... Read review
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,385 Twitter followers
LinkedIn® Page
www.linkedin.com
231 employees on LinkedIn®
(105)4.7 out of 5
5th Easiest To Use in Threat Intelligence software
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 43% Mid-Market
    • 29% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CTM360 is a digital risk protection platform that provides comprehensive external threat monitoring and quick remediation, enhancing cyber risk visibility and response.
    • Reviewers frequently mention the platform's user-friendly design, efficient setup, and its ability to detect and take down brand impersonation attempts across multiple platforms over the internet and dark web.
    • Users reported that the interface can be complex at times, the Android app lacks certain features available on the web portal, and the CYNA module needs to authenticate threat actor claims more rigorously before publishing it.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CTM360 features and usability ratings that predict user satisfaction
    8.6
    Security Validation
    Average: 8.9
    8.7
    Intelligence Reports
    Average: 9.0
    7.8
    Endpoint Intelligence
    Average: 8.6
    9.2
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CTM360
    Company Website
    Year Founded
    2014
    HQ Location
    Manama, BH
    Twitter
    @teamCTM360
    991 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    121 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 43% Mid-Market
  • 29% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CTM360 is a digital risk protection platform that provides comprehensive external threat monitoring and quick remediation, enhancing cyber risk visibility and response.
  • Reviewers frequently mention the platform's user-friendly design, efficient setup, and its ability to detect and take down brand impersonation attempts across multiple platforms over the internet and dark web.
  • Users reported that the interface can be complex at times, the Android app lacks certain features available on the web portal, and the CYNA module needs to authenticate threat actor claims more rigorously before publishing it.
CTM360 features and usability ratings that predict user satisfaction
8.6
Security Validation
Average: 8.9
8.7
Intelligence Reports
Average: 9.0
7.8
Endpoint Intelligence
Average: 8.6
9.2
Ease of Use
Average: 9.1
Seller Details
Seller
CTM360
Company Website
Year Founded
2014
HQ Location
Manama, BH
Twitter
@teamCTM360
991 Twitter followers
LinkedIn® Page
www.linkedin.com
121 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Since 2019, SOCRadar has been a pioneer in SaaS cybersecurity, now serving over 900 customers across 75 countries. Our mission is to provide accessible, proactive threat intelligence. Today, SOCRadar

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 41% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.9
    9.1
    Intelligence Reports
    Average: 9.0
    8.4
    Endpoint Intelligence
    Average: 8.6
    9.1
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Logistics and Supply Chain
    AL
    You get pretty much all the options your heart desires. The service is five stars and they provide great integration/implementation support +... Read review
    Serdar A.
    SA
    I can use it as a Dark Web tool. That is very interesting and powerful. I can perform an external vulnerability scan with SocRadar and more. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    5,553 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Since 2019, SOCRadar has been a pioneer in SaaS cybersecurity, now serving over 900 customers across 75 countries. Our mission is to provide accessible, proactive threat intelligence. Today, SOCRadar

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 41% Enterprise
  • 40% Mid-Market
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.9
9.1
Intelligence Reports
Average: 9.0
8.4
Endpoint Intelligence
Average: 8.6
9.1
Ease of Use
Average: 9.1
Verified User in Logistics and Supply Chain
AL
You get pretty much all the options your heart desires. The service is five stars and they provide great integration/implementation support +... Read review
Serdar A.
SA
I can use it as a Dark Web tool. That is very interesting and powerful. I can perform an external vulnerability scan with SocRadar and more. Read review
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
5,553 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Flashpoint is the largest privately held threat intelligence provider, enabling mission-critical organizations to proactively confront security challenges globally. Flashpoint Ignite, our unified t

    Users
    No information available
    Industries
    • Financial Services
    • Security and Investigations
    Market Segment
    • 63% Enterprise
    • 23% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Flashpoint is a data collection and threat intelligence platform that gathers information from multiple sources and provides tools for in-depth research on potential threats.
    • Users frequently mention the ease of use, the advanced filtering options, the quick search feature, the ability to set keyword alerts, and the integration with Slack as key benefits of the platform.
    • Users mentioned issues with missing or contradictory data, difficulties in setting up the platform, lack of direct chat communication for RFI cases, non-intuitive navigation, and disruptions caused by constant platform changes and lack of documentation.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flashpoint features and usability ratings that predict user satisfaction
    7.1
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 9.0
    7.0
    Endpoint Intelligence
    Average: 8.6
    8.4
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    New York, NY
    Twitter
    @FlashpointIntel
    13,844 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    358 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Flashpoint is the largest privately held threat intelligence provider, enabling mission-critical organizations to proactively confront security challenges globally. Flashpoint Ignite, our unified t

Users
No information available
Industries
  • Financial Services
  • Security and Investigations
Market Segment
  • 63% Enterprise
  • 23% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Flashpoint is a data collection and threat intelligence platform that gathers information from multiple sources and provides tools for in-depth research on potential threats.
  • Users frequently mention the ease of use, the advanced filtering options, the quick search feature, the ability to set keyword alerts, and the integration with Slack as key benefits of the platform.
  • Users mentioned issues with missing or contradictory data, difficulties in setting up the platform, lack of direct chat communication for RFI cases, non-intuitive navigation, and disruptions caused by constant platform changes and lack of documentation.
Flashpoint features and usability ratings that predict user satisfaction
7.1
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 9.0
7.0
Endpoint Intelligence
Average: 8.6
8.4
Ease of Use
Average: 9.1
Seller Details
Year Founded
2010
HQ Location
New York, NY
Twitter
@FlashpointIntel
13,844 Twitter followers
LinkedIn® Page
www.linkedin.com
358 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 9.0
    8.7
    Endpoint Intelligence
    Average: 8.6
    8.8
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
    AJ T.
    AT
    Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,560 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 9.0
8.7
Endpoint Intelligence
Average: 8.6
8.8
Ease of Use
Average: 9.1
HH
It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
AJ T.
AT
Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,560 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
(51)4.5 out of 5
15th Easiest To Use in Threat Intelligence software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

    Users
    No information available
    Industries
    • Security and Investigations
    Market Segment
    • 53% Enterprise
    • 31% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dataminr features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 8.9
    7.6
    Intelligence Reports
    Average: 9.0
    8.0
    Endpoint Intelligence
    Average: 8.6
    8.6
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Aviation & Aerospace
    UA
    Dataminr is easy to use with robust capabilities and frequent improvements. For situational awareness purposes, Dataminr is essential to track... Read review
    Verified User in Information Technology and Services
    AI
    Our relationship with the customer success team, the quality of alerts we get Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dataminr
    Year Founded
    2009
    HQ Location
    New York, NY
    Twitter
    @Dataminr
    16,479 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    776 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

Users
No information available
Industries
  • Security and Investigations
Market Segment
  • 53% Enterprise
  • 31% Small-Business
Dataminr features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 8.9
7.6
Intelligence Reports
Average: 9.0
8.0
Endpoint Intelligence
Average: 8.6
8.6
Ease of Use
Average: 9.1
Verified User in Aviation & Aerospace
UA
Dataminr is easy to use with robust capabilities and frequent improvements. For situational awareness purposes, Dataminr is essential to track... Read review
Verified User in Information Technology and Services
AI
Our relationship with the customer success team, the quality of alerts we get Read review
Seller Details
Seller
Dataminr
Year Founded
2009
HQ Location
New York, NY
Twitter
@Dataminr
16,479 Twitter followers
LinkedIn® Page
www.linkedin.com
776 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenCTI is an open-source threat intelligence platform built by practitioners, for practitioners - to break data silos and make threat intelligence available and actionable. Make threat intelligence f

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 56% Enterprise
    • 28% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenCTI by Filigran features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.0
    Intelligence Reports
    Average: 9.0
    8.1
    Endpoint Intelligence
    Average: 8.6
    8.1
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • PK
    It's Open Source and flexible. Has so many great features (impossible to mention one-by-one) and they help push CTI best practices forward. They... Read review
    CP
    I really appreciate OpenCTI by Filigran for its open-source OSINT focus and community mentality. The playbook and dashboard functionality are... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Filigran
    Company Website
    Year Founded
    2022
    HQ Location
    New York, US
    Twitter
    @FiligranHQ
    788 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    218 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenCTI is an open-source threat intelligence platform built by practitioners, for practitioners - to break data silos and make threat intelligence available and actionable. Make threat intelligence f

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 56% Enterprise
  • 28% Mid-Market
OpenCTI by Filigran features and usability ratings that predict user satisfaction
0.0
No information available
9.0
Intelligence Reports
Average: 9.0
8.1
Endpoint Intelligence
Average: 8.6
8.1
Ease of Use
Average: 9.1
PK
It's Open Source and flexible. Has so many great features (impossible to mention one-by-one) and they help push CTI best practices forward. They... Read review
CP
I really appreciate OpenCTI by Filigran for its open-source OSINT focus and community mentality. The playbook and dashboard functionality are... Read review
Seller Details
Seller
Filigran
Company Website
Year Founded
2022
HQ Location
New York, US
Twitter
@FiligranHQ
788 Twitter followers
LinkedIn® Page
www.linkedin.com
218 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosyst

    Users
    • Software Engineer
    • Security Consultant
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 66% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Intelligence Reports
    Average: 9.0
    0.0
    No information available
    9.9
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Krishna Chaitanya P.
    KP
    Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
    Tanuj M.
    TM
    Its the best security solution. Has helped us in managing external as well as internal threats efficiently. It can also be used to manage multiple... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    183 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    29 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosyst

Users
  • Software Engineer
  • Security Consultant
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 66% Mid-Market
  • 33% Small-Business
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Intelligence Reports
Average: 9.0
0.0
No information available
9.9
Ease of Use
Average: 9.1
Krishna Chaitanya P.
KP
Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
Tanuj M.
TM
Its the best security solution. Has helped us in managing external as well as internal threats efficiently. It can also be used to manage multiple... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
183 Twitter followers
LinkedIn® Page
www.linkedin.com
29 employees on LinkedIn®
(28)4.7 out of 5
Optimized for quick response
12th Easiest To Use in Threat Intelligence software
View top Consulting Services for Group-IB Threat Intelligence
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The first line of defense shouldn’t be your infrastructure; optimize your security and defeat attacks before they begin with knowledge of who, how, and when you will be attacked. Group-IB’s Threat I

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 61% Enterprise
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Group-IB Threat Intelligence features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 9.0
    8.7
    Endpoint Intelligence
    Average: 8.6
    8.9
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • LT
    GIB TI is unlike others, they provide filtered and related threat intelligence information to the customer, for example: banking customers who... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Group-IB
    Company Website
    Year Founded
    2003
    HQ Location
    Singapore
    Twitter
    @GroupIB
    9,352 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    490 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The first line of defense shouldn’t be your infrastructure; optimize your security and defeat attacks before they begin with knowledge of who, how, and when you will be attacked. Group-IB’s Threat I

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 61% Enterprise
  • 21% Mid-Market
Group-IB Threat Intelligence features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 9.0
8.7
Endpoint Intelligence
Average: 8.6
8.9
Ease of Use
Average: 9.1
LT
GIB TI is unlike others, they provide filtered and related threat intelligence information to the customer, for example: banking customers who... Read review
Seller Details
Seller
Group-IB
Company Website
Year Founded
2003
HQ Location
Singapore
Twitter
@GroupIB
9,352 Twitter followers
LinkedIn® Page
www.linkedin.com
490 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    9.3
    Security Validation
    Average: 8.9
    9.5
    Intelligence Reports
    Average: 9.0
    8.9
    Endpoint Intelligence
    Average: 8.6
    7.9
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in International Affairs
    UI
    Intuitive and easy to use even without a robust background in computer science. Read review
    NZ
    It is all about the Data Aggregation! Maltego integrates with numerous data sources and APIs, allowing me to aggregate information from various... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    14,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    168 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego features and usability ratings that predict user satisfaction
9.3
Security Validation
Average: 8.9
9.5
Intelligence Reports
Average: 9.0
8.9
Endpoint Intelligence
Average: 8.6
7.9
Ease of Use
Average: 9.1
Verified User in International Affairs
UI
Intuitive and easy to use even without a robust background in computer science. Read review
NZ
It is all about the Data Aggregation! Maltego integrates with numerous data sources and APIs, allowing me to aggregate information from various... Read review
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
14,270 Twitter followers
LinkedIn® Page
www.linkedin.com
168 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    8.7
    Intelligence Reports
    Average: 9.0
    9.3
    Endpoint Intelligence
    Average: 8.6
    9.4
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ryan J.
    RJ
    Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
    Verified User in Marketing and Advertising
    AM
    Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    307 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
8.7
Intelligence Reports
Average: 9.0
9.3
Endpoint Intelligence
Average: 8.6
9.4
Ease of Use
Average: 9.1
Ryan J.
RJ
Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
Verified User in Marketing and Advertising
AM
Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
307 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SIRP is an AI-native Autonomous SOC platform designed to evolve traditional Security Orchestration, Automation, and Response (SOAR) into governed, decision-driven security operations. Unlike legacy

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SIRP features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 9.0
    9.8
    Endpoint Intelligence
    Average: 8.6
    9.5
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Tommy J.
    TJ
    The best thing SIRP is offering is simplification of our security operations. Our cyber security is now maintained on SIRP by a small group of... Read review
    Syed Z.
    SZ
    SIRP has a vast range of modules that have closely packed our asset information and data with a faster threat indication and response system.System... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SIRP
    Year Founded
    2017
    HQ Location
    Bethesda, Maryland
    Twitter
    @sirp_io
    72 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SIRP is an AI-native Autonomous SOC platform designed to evolve traditional Security Orchestration, Automation, and Response (SOAR) into governed, decision-driven security operations. Unlike legacy

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Small-Business
  • 37% Mid-Market
SIRP features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 9.0
9.8
Endpoint Intelligence
Average: 8.6
9.5
Ease of Use
Average: 9.1
Tommy J.
TJ
The best thing SIRP is offering is simplification of our security operations. Our cyber security is now maintained on SIRP by a small group of... Read review
Syed Z.
SZ
SIRP has a vast range of modules that have closely packed our asset information and data with a faster threat indication and response system.System... Read review
Seller Details
Seller
SIRP
Year Founded
2017
HQ Location
Bethesda, Maryland
Twitter
@sirp_io
72 Twitter followers
LinkedIn® Page
www.linkedin.com
61 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • threatER features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    7.5
    Intelligence Reports
    Average: 9.0
    10.0
    Endpoint Intelligence
    Average: 8.6
    9.5
    Ease of Use
    Average: 9.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AK
    1.The interface is very user friendly. 2. Easy to whitelist / blacklist IPs and domains. 3. Great responsive support. 4. Great logging. 5.... Read review
    Michael M.
    MM
    While your SIEM may alert you of threats, Threatblockr allows you to retrieve threat intel from TAXII/STIX feeds and blocks it. Most firewalls do... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    threatER
    Company Website
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 34% Enterprise
threatER features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
7.5
Intelligence Reports
Average: 9.0
10.0
Endpoint Intelligence
Average: 8.6
9.5
Ease of Use
Average: 9.1
AK
1.The interface is very user friendly. 2. Easy to whitelist / blacklist IPs and domains. 3. Great responsive support. 4. Great logging. 5.... Read review
Michael M.
MM
While your SIEM may alert you of threats, Threatblockr allows you to retrieve threat intel from TAXII/STIX feeds and blocks it. Most firewalls do... Read review
Seller Details
Seller
threatER
Company Website
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®