Introducing G2.ai, the future of software buying.Try now

Top Free Threat Intelligence Software - Page 2

Check out our list of free Threat Intelligence Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Threat Intelligence Software to ensure you get the right product.

View Free Threat Intelligence Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
46 Threat Intelligence Products Available
(30)4.9 out of 5
7th Easiest To Use in Threat Intelligence software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 63% Small-Business
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a software that aims to provide data security and prevent exfiltration for various clients, including those in the legal, medical, and insurance fields.
    • Users like the software's user-friendly interface, efficient management console, and its ability to detect and stop digital threats on systems, providing a sense of security and peace of mind.
    • Reviewers experienced interruptions when trying to access client websites, false positives that require time to clear, and a lack of an option to require a password before uninstalling the app.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    9.7
    Intelligence Reports
    Average: 9.0
    9.8
    Endpoint Intelligence
    Average: 8.5
    9.3
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 63% Small-Business
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a software that aims to provide data security and prevent exfiltration for various clients, including those in the legal, medical, and insurance fields.
  • Users like the software's user-friendly interface, efficient management console, and its ability to detect and stop digital threats on systems, providing a sense of security and peace of mind.
  • Reviewers experienced interruptions when trying to access client websites, false positives that require time to clear, and a lack of an option to require a password before uninstalling the app.
BlackFog features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
9.7
Intelligence Reports
Average: 9.0
9.8
Endpoint Intelligence
Average: 8.5
9.3
Ease of Use
Average: 9.0
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,480 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • threatER features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 9.0
    10.0
    Endpoint Intelligence
    Average: 8.5
    9.5
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AK
    1.The interface is very user friendly. 2. Easy to whitelist / blacklist IPs and domains. 3. Great responsive support. 4. Great logging. 5.... Read review
    Michael M.
    MM
    While your SIEM may alert you of threats, Threatblockr allows you to retrieve threat intel from TAXII/STIX feeds and blocks it. Most firewalls do... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    threatER
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 27% Enterprise
threatER features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 9.0
10.0
Endpoint Intelligence
Average: 8.5
9.5
Ease of Use
Average: 9.0
AK
1.The interface is very user friendly. 2. Easy to whitelist / blacklist IPs and domains. 3. Great responsive support. 4. Great logging. 5.... Read review
Michael M.
MM
While your SIEM may alert you of threats, Threatblockr allows you to retrieve threat intel from TAXII/STIX feeds and blocks it. Most firewalls do... Read review
Seller Details
Seller
threatER
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LMNTRIX features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 9.0
    9.4
    Endpoint Intelligence
    Average: 8.5
    9.6
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Utilities
    EU
    24/7 Incident Validation and Response to reduce the noise, and 24/7 SOC services without the hefty price tag of running your own. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LMNTRIX
    Year Founded
    2015
    HQ Location
    Orange, California
    Twitter
    @lmntrixlabs
    75 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Enterprise
LMNTRIX features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 9.0
9.4
Endpoint Intelligence
Average: 8.5
9.6
Ease of Use
Average: 9.0
Verified User in Utilities
EU
24/7 Incident Validation and Response to reduce the noise, and 24/7 SOC services without the hefty price tag of running your own. Read review
Seller Details
Seller
LMNTRIX
Year Founded
2015
HQ Location
Orange, California
Twitter
@lmntrixlabs
75 Twitter followers
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatWorx features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 9.0
    9.2
    Endpoint Intelligence
    Average: 8.5
    9.2
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Parikshit S.
    PS
    Ease of use - agent-less and scan-less approach. Comprehensiveness - Helps us secure cloud, container and code. Effectiveness (improved... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    LOS GATOS, US
    Twitter
    @threatwatch
    101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
ThreatWorx features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 9.0
9.2
Endpoint Intelligence
Average: 8.5
9.2
Ease of Use
Average: 9.0
Parikshit S.
PS
Ease of use - agent-less and scan-less approach. Comprehensiveness - Helps us secure cloud, container and code. Effectiveness (improved... Read review
Seller Details
Year Founded
2016
HQ Location
LOS GATOS, US
Twitter
@threatwatch
101 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
(14)4.5 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MetaDefender provides comprehensive file upload security to protect against malware and data breaches.​ OPSWAT designed MetaDefender to secure the world’s critical infrastructure from the most sophist

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaDefender features and usability ratings that predict user satisfaction
    7.2
    Security Validation
    Average: 8.9
    7.8
    Intelligence Reports
    Average: 9.0
    6.7
    Endpoint Intelligence
    Average: 8.5
    9.0
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Jose P.
    JP
    Metadefender offers on its website software that allows us to analyze suspicious files and thus protect our computer, we are very happy with this... Read review
    Verified User in Computer & Network Security
    CC
    Its price is low and it's easy to use and implement it. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Company Website
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,222 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,045 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MetaDefender provides comprehensive file upload security to protect against malware and data breaches.​ OPSWAT designed MetaDefender to secure the world’s critical infrastructure from the most sophist

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
MetaDefender features and usability ratings that predict user satisfaction
7.2
Security Validation
Average: 8.9
7.8
Intelligence Reports
Average: 9.0
6.7
Endpoint Intelligence
Average: 8.5
9.0
Ease of Use
Average: 9.0
Jose P.
JP
Metadefender offers on its website software that allows us to analyze suspicious files and thus protect our computer, we are very happy with this... Read review
Verified User in Computer & Network Security
CC
Its price is low and it's easy to use and implement it. Read review
Seller Details
Seller
OPSWAT
Company Website
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,222 Twitter followers
LinkedIn® Page
www.linkedin.com
1,045 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 88% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReversingLabs features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 9.0
    8.3
    Endpoint Intelligence
    Average: 8.5
    9.0
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Guercy Miguel  D.
    GD
    I appreciate the real-world scenarios and hands-on challenges that sharpen my reverse engineering and malware analysis skills. Read review
    Verified User in Financial Services
    UF
    It's really easy to use and help me to maintain save my pc. I used to use it a lot every day, and I fell constable using it. It was easy to... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Cambridge, US
    Twitter
    @ReversingLabs
    6,921 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    328 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

Users
No information available
Industries
No information available
Market Segment
  • 88% Small-Business
ReversingLabs features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 9.0
8.3
Endpoint Intelligence
Average: 8.5
9.0
Ease of Use
Average: 9.0
Guercy Miguel  D.
GD
I appreciate the real-world scenarios and hands-on challenges that sharpen my reverse engineering and malware analysis skills. Read review
Verified User in Financial Services
UF
It's really easy to use and help me to maintain save my pc. I used to use it a lot every day, and I fell constable using it. It was easy to... Read review
Seller Details
Year Founded
2009
HQ Location
Cambridge, US
Twitter
@ReversingLabs
6,921 Twitter followers
LinkedIn® Page
www.linkedin.com
328 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Styx Intelligence features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Banking
    IB
    Styx Intelligence provides clear, actionable insights that make monitoring and analysis much easier. The dashboard is intuitive, and the support... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Vancouver, CA
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 29% Mid-Market
Styx Intelligence features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 9.0
Verified User in Banking
IB
Styx Intelligence provides clear, actionable insights that make monitoring and analysis much easier. The dashboard is intuitive, and the support... Read review
Seller Details
Year Founded
2020
HQ Location
Vancouver, CA
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatBolt is the only Intelligence-sharing platform thoughtfully designed to meet SOC/MSSP needs. It utilizes AI/ML Powered engine for threat analysis and classification, delivering high-fidelity thr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 20% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatBolt features and usability ratings that predict user satisfaction
    9.6
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 9.0
    7.8
    Endpoint Intelligence
    Average: 8.5
    9.3
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AC
    An easy to use platform, free of cost, for gathering threat intelligence. Can be integrated via API easily for automated enrichment. It also gives... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    India, IN
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatBolt is the only Intelligence-sharing platform thoughtfully designed to meet SOC/MSSP needs. It utilizes AI/ML Powered engine for threat analysis and classification, delivering high-fidelity thr

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 20% Mid-Market
ThreatBolt features and usability ratings that predict user satisfaction
9.6
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 9.0
7.8
Endpoint Intelligence
Average: 8.5
9.3
Ease of Use
Average: 9.0
AC
An easy to use platform, free of cost, for gathering threat intelligence. Can be integrated via API easily for automated enrichment. It also gives... Read review
Seller Details
Year Founded
2023
HQ Location
India, IN
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    7.5
    Intelligence Reports
    Average: 9.0
    7.5
    Endpoint Intelligence
    Average: 8.5
    10.0
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Adam B.
    AB
    The team were friendly, easy to work with and the intelligence feed works well, providing reliable, high quality output. We compared the web... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Salt Lake City, US
    Twitter
    @alphamountainai
    48 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
7.5
Intelligence Reports
Average: 9.0
7.5
Endpoint Intelligence
Average: 8.5
10.0
Ease of Use
Average: 9.0
Adam B.
AB
The team were friendly, easy to work with and the intelligence feed works well, providing reliable, high quality output. We compared the web... Read review
Seller Details
Year Founded
2020
HQ Location
Salt Lake City, US
Twitter
@alphamountainai
48 Twitter followers
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Feedly Threat Intelligence helps teams collect, analyze, and share open-source threat intelligence in minutes instead of hours. Feedly uses AI Feeds to collect specific and relevant intelligence from

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Feedly for Threat Intelligence features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Intelligence Reports
    Average: 9.0
    0.0
    No information available
    10.0
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Denise DC D.
    DD
    Overall, the system has surpassed our expectations. It is highly effective in collecting the intelligence we require, significantly expediting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Feedly
    HQ Location
    Palo Alto, CA
    Twitter
    @feedly
    104,355 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    63 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Feedly Threat Intelligence helps teams collect, analyze, and share open-source threat intelligence in minutes instead of hours. Feedly uses AI Feeds to collect specific and relevant intelligence from

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Feedly for Threat Intelligence features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Intelligence Reports
Average: 9.0
0.0
No information available
10.0
Ease of Use
Average: 9.0
Denise DC D.
DD
Overall, the system has surpassed our expectations. It is highly effective in collecting the intelligence we require, significantly expediting... Read review
Seller Details
Seller
Feedly
HQ Location
Palo Alto, CA
Twitter
@feedly
104,355 Twitter followers
LinkedIn® Page
www.linkedin.com
63 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fraudlogix empowers businesses to maintain traffic quality and prevent fraud with enterprise-grade solutions. Designed for industries like Affiliate Marketing, Ad Tech, E-commerce, Cybersecurity, and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fraudlogix features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 9.0
    10.0
    Endpoint Intelligence
    Average: 8.5
    8.9
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Delon F.
    DF
    It is easy to use and offers a free trial version. If you choose to buy the license it is also relatively cheaper than its competitors. It is... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Hallandale Beach, US
    Twitter
    @fraudlogix
    303 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fraudlogix empowers businesses to maintain traffic quality and prevent fraud with enterprise-grade solutions. Designed for industries like Affiliate Marketing, Ad Tech, E-commerce, Cybersecurity, and

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Mid-Market
Fraudlogix features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 9.0
10.0
Endpoint Intelligence
Average: 8.5
8.9
Ease of Use
Average: 9.0
Delon F.
DF
It is easy to use and offers a free trial version. If you choose to buy the license it is also relatively cheaper than its competitors. It is... Read review
Seller Details
Year Founded
2010
HQ Location
Hallandale Beach, US
Twitter
@fraudlogix
303 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IntSights is the leading external threat intelligence and protection platform, designed to neutralize threats outside the wire. The IntSights solution suite equips cybersecurity teams worldwide to mor

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threat Command by Rapid7 features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AG
    The platform is fairly easy to use. The newly revamped assets page is much better than before. Read review
    Verified User in Environmental Services
    UE
    Everything can be found in just place yet easily identifiable. It is very easy to add a new system and run the scans. It shows deep insights into... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    123,171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,071 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

IntSights is the leading external threat intelligence and protection platform, designed to neutralize threats outside the wire. The IntSights solution suite equips cybersecurity teams worldwide to mor

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Threat Command by Rapid7 features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 9.0
AG
The platform is fairly easy to use. The newly revamped assets page is much better than before. Read review
Verified User in Environmental Services
UE
Everything can be found in just place yet easily identifiable. It is very easy to add a new system and run the scans. It shows deep insights into... Read review
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
123,171 Twitter followers
LinkedIn® Page
www.linkedin.com
3,071 employees on LinkedIn®
Ownership
NASDAQ:RPD
Entry Level Price:$0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Axur is a cost-effective external cybersecurity solution that empowers security teams to handle threats beyond the perimeter. Our platform detects, inspects, and responds to brand impersonation, phish

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Axur features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Daniel V.
    DV
    Is impressive how it helps fight the cybercrime with fast reliable information of emails and passwords leaked Read review
    Aman S.
    AS
    With the ease of implementation, It prevent data breaching in a more effective way & also very less chances of errors. Easy to monitor & also have... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Axur
    HQ Location
    Miami, US
    LinkedIn® Page
    www.linkedin.com
    222 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Axur is a cost-effective external cybersecurity solution that empowers security teams to handle threats beyond the perimeter. Our platform detects, inspects, and responds to brand impersonation, phish

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
Axur features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 9.0
Daniel V.
DV
Is impressive how it helps fight the cybercrime with fast reliable information of emails and passwords leaked Read review
Aman S.
AS
With the ease of implementation, It prevent data breaching in a more effective way & also very less chances of errors. Easy to monitor & also have... Read review
Seller Details
Seller
Axur
HQ Location
Miami, US
LinkedIn® Page
www.linkedin.com
222 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mandiant Advantage is a multi-vendor XDR platform that delivers Mandiant’s transformative expertise and frontline intelligence to security teams of all sizes.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Threat Intelligence features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Semih G.
    SG
    Integration with data platforms like splunk and qradar Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,524,859 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,307 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Mandiant Advantage is a multi-vendor XDR platform that delivers Mandiant’s transformative expertise and frontline intelligence to security teams of all sizes.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Google Threat Intelligence features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Semih G.
SG
Integration with data platforms like splunk and qradar Read review
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,524,859 Twitter followers
LinkedIn® Page
www.linkedin.com
325,307 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We provide organizations with relevant and actionable dark web threat intelligence to help them identify and prevent criminal activity. Founded in 2017 with a mission to stop criminals acting with imp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Searchlight Cyber features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Saurabh S.
    SS
    The user-friendly interface and helpful notifications facilitate effectively addressing and resolving issues. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Port Solent, GB
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

We provide organizations with relevant and actionable dark web threat intelligence to help them identify and prevent criminal activity. Founded in 2017 with a mission to stop criminals acting with imp

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Searchlight Cyber features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 9.0
Saurabh S.
SS
The user-friendly interface and helpful notifications facilitate effectively addressing and resolving issues. Read review
Seller Details
Year Founded
2017
HQ Location
Port Solent, GB
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®