# Best Threat Intelligence Software - Page 3

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies use these tools to keep their security standards up to date and fit to address new threats as they emerge. These tools can improve security performance by providing information on threats to their specific networks, infrastructure, and endpoint devices. Threat intelligence software provides information about hazards and how they function, their capabilities, and remediation techniques. IT administrators and security professionals use the delivered data to better protect their systems from emerging threats and plan for possible vulnerabilities. The tools alert users as new threats emerge and provide information detailing best practices for resolution.

Many products, like [security information and event management (SIEM) software](https://www.g2.com/categories/security-information-and-event-management-siem) and [vulnerability management software](https://www.g2.com/categories/vulnerability-management), can integrate with or provide similar information as threat intelligence products. Additionally, these products continue to integrate with artificial intelligence (AI) to better tailor this complex suite of data for specific organizations’ needs. These newer capabilities can include being able to generate threat reports based on newly aggregated threat intelligence data. This data directly pertains to the organization where the software is deployed. The newer capabilities also help in creating threat detection rules based on observed patterns in malicious actors’ behaviors.

To qualify for inclusion in the Threat Intelligence category, a product must:

- Provide information on emerging threats and vulnerabilities
- Detail remediation practices for common and emerging threats
- Analyze global threats on different types of networks and devices
- Cater threat information to specific IT solutions





## Category Overview

**Total Products under this Category:** 184


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 4,500+ Authentic Reviews
- 184+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Threat Intelligence Software At A Glance

- **Leader:** [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews)
- **Highest Performer:** [CTM360](https://www.g2.com/products/ctm360-ctm360/reviews)
- **Easiest to Use:** [CloudSEK](https://www.g2.com/products/cloudsek/reviews)
- **Top Trending:** [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews)
- **Best Free Software:** [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews)


---

**Sponsored**

### Whiteintel Dark Web Intelligence

Whiteintel.io is a dark web monitoring and threat intelligence platform. It scans underground forums, marketplaces, paste sites, and data breach sources to identify exposed credentials and sensitive data linked to an organization&#39;s domains, employees, or customers. The platform detects compromised credentials from data breaches and info stealer malware infections. When devices are infected with info stealers, Whiteintel.io identifies harvested credentials before they can be used for unauthorized access. Users receive alerts when their organization&#39;s data appears in dark web sources or known breach datasets. Whiteintel.io aggregates findings into a centralized dashboard where security teams can search, filter, and investigate exposures. The platform supports domain monitoring, email-based credential lookups, and threat actor activity tracking.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1080&amp;secure%5Bdisplayable_resource_id%5D=1080&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1080&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1795498&amp;secure%5Bresource_id%5D=1080&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fthreat-intelligence%3Fpage%3D10&amp;secure%5Btoken%5D=25420a5de042b66733d6b4070a7ca3e6159f351856508c4f137516bdc62cd576&amp;secure%5Burl%5D=https%3A%2F%2Fwhiteintel.io&amp;secure%5Burl_type%5D=custom_url)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [LMNTRIX](https://www.g2.com/products/lmntrix/reviews)
  LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we created new methods for confounding even the most advanced attackers. We believe that in a time of continuous compromise you need continuous response – not incident response. Our approach turns inward and assumes that you’re already breached and that you’re continually going to be breached, so we take a pro-active, offensive, hunting, and adversarial pursuit stance as opposed to a reactive, defensive, legacy stance with analysts staring at a SIEM console wishing they could detect an APT. LMNTRIX Active Defense is a best in class Managed Detection &amp; Response (MDR) service that detects and responds to advanced threats that bypass perimeter controls. We combine deep expertise with cutting-edge technology, leading intelligence, and advanced analytics to detect and investigate threats with great speed, accuracy, and focus. The outcomes we deliver clients are validated breaches that are investigated, contained and remediated. All incidents are aligned to the kill chain and Mitre ATT&amp;CK frameworks and contain detailed investigative actions and recommendations that your organisation follows to protect against the unknown, insider threat and malicious attacker. Active Defense is made up of 3 elements: LMNTRIX GRID (XDR) – This is our cyber defence SaaS platform that provides a new utility model for enterprise security, delivering pervasive visibility, automated threat detection &amp; prevention, threat hunting, investigation, validation and unlimited forensic exploration on-demand and entirely from the cloud. It is a single investigative platform for insights into threats on enterprise, cloud, hybrid, and industrial control systems (ICS) networks. The LMNTRIX Grid delivers unique advantages over current network security solutions. It is a holistic and multi-vector platform with unlimited retention window of full-fidelity network traffic, innovative security visualizations, and the ease and cost-savings of an on-demand deployment model. LMNTRIX Technology Stack –This is our powerful proprietary threat detection stack that is deployed onsite, behind existing controls. It combines multiple threat detection systems, with deceptions everywhere, machine learning, threat intel, correlation, static file analysis, heuristics, and behavior and anomaly detection techniques to find threats in real-time. It decreases alarm fatigue by automatically determining which alerts should be elevated to security events, and reduces false positives by requiring consensus across detection. LMNTRIX Cyber Defense Centers - While these technologies are without peer, what sets us apart from the pack is our team of cybersecurity professionals who continually monitor our clients environments 24x7 while simultaneously hunting threats internally as well as monitoring developments on the deep and dark web. Our CDC&#39;s are a global network of cyber defense centers with highly trained and certified intrusion analysts who provide constant vigilance and on-demand analysis of your networks. Our intrusion analysts monitor your networks and endpoints 24x7, applying the latest intelligence and proprietary methodologies to look for signs of compromise. When a potential compromise is detected, the team performs an in- depth analysis on affected systems to confirm the breach. When data theft or lateral movement is imminent, our automated perimeter containment blocks attackers in their tracks while endpoint containment feature makes immediate reaction possible by quarantining affected hosts, whether they are on or off your corporate network, significantly reducing or eliminating the consequences of a breach.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Security Validation:** 10.0/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 10.0/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 9.4/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.6/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [LMNTRIX](https://www.g2.com/sellers/lmntrix)
- **Year Founded:** 2015
- **HQ Location:** Orange, California
- **Twitter:** @lmntrixlabs (75 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/lmntrix (54 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 60% Mid-Market, 20% Enterprise


### 2. [Criminal IP TI](https://www.g2.com/products/criminal-ip-ti/reviews)
  Criminal IP equips security teams with the actionable Threat Intelligence needed to proactively identify, analyze, and respond to emerging threats. Powered by AI and OSINT, it delivers threat scoring, reputation data, and real-time detection of a wide array of malicious indicators, ranging from C2 servers and IOCs to masking services like VPNs, proxies, and anonymous VPNs, across IPs, domains, and URLs. Its API-first architecture ensures seamless integration into security workflows to boost visibility, automation, and response.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 7

**User Satisfaction Scores:**

- **Security Validation:** 10.0/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 10.0/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 8.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [AI Spera](https://www.g2.com/sellers/ai-spera)
- **Company Website:** https://www.criminalip.io/
- **Year Founded:** 2017
- **HQ Location:** Las Vegas, US
- **LinkedIn® Page:** https://www.linkedin.com/company/aispera (27 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


#### Pros & Cons

**Pros:**

- Automation (1 reviews)
- Ease of Use (1 reviews)
- Features (1 reviews)
- Response Time (1 reviews)
- Setup Ease (1 reviews)

**Cons:**

- Difficult Learning Curve (1 reviews)
- Insufficient Training (1 reviews)
- Slow Loading (1 reviews)

### 3. [Cyber Hawk](https://www.g2.com/products/cyber-hawk/reviews)
  Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-detect critical changes in your network. Avoid the negative consequences of unplanned or unauthorized changes in your IT environment. Catch unauthorized log-in attempts, track suspicious changes to network settings, and identify anomalous user behavior


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 9

**User Satisfaction Scores:**

- **Security Validation:** 8.3/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 8.7/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 8.8/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Kaseya](https://www.g2.com/sellers/kaseya)
- **Year Founded:** 2000
- **HQ Location:** Miami, FL
- **Twitter:** @KaseyaCorp (17,431 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaseya/ (5,512 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 44% Mid-Market, 33% Enterprise


#### Pros & Cons

**Pros:**

- Cloud Security (1 reviews)
- Detailed Analysis (1 reviews)
- Ease of Use (1 reviews)
- Insights (1 reviews)
- Monitoring (1 reviews)

**Cons:**

- Network Issues (1 reviews)
- Slow Loading (1 reviews)
- Slow Performance (1 reviews)

### 4. [ReversingLabs](https://www.g2.com/products/reversinglabs/reviews)
  ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity vendors, RL Spectra Core powers the software supply chain and file security insights, tracking over 422 billion searchable files with the ability to deconstruct full software binaries in seconds to minutes. Only ReversingLabs provides that final exam to determine whether a single file or full software binary presents a risk to your organization and your customers.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Security Validation:** 9.2/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 8.3/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 8.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [ReversingLabs](https://www.g2.com/sellers/reversinglabs)
- **Year Founded:** 2009
- **HQ Location:** Cambridge, US
- **Twitter:** @ReversingLabs (6,986 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/reversinglabs/ (330 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 80% Small-Business, 10% Mid-Market


#### Pros & Cons

**Pros:**

- Accuracy of Information (2 reviews)
- Customer Support (2 reviews)
- Efficiency (2 reviews)
- Prioritization (2 reviews)
- Reliability (2 reviews)

**Cons:**

- Complex Querying (1 reviews)
- Confusing Interface (1 reviews)
- Navigation Issues (1 reviews)
- UX Improvement (1 reviews)

### 5. [ThreatWorx](https://www.g2.com/products/threatworx/reviews)
  ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWorx serves multiple use cases including threat intelligence, DevSecOps, cloud security, vulnerability management and third party risk assessment.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 9

**User Satisfaction Scores:**

- **Security Validation:** 8.9/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 8.9/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 9.2/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.2/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Threatwatch](https://www.g2.com/sellers/threatwatch)
- **Year Founded:** 2016
- **HQ Location:** LOS GATOS, US
- **Twitter:** @threatwatch (100 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/threatwatch/ (5 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 40% Small-Business, 40% Mid-Market


### 6. [Bitdefender Advanced Threat Intelligence](https://www.g2.com/products/bitdefender-advanced-threat-intelligence/reviews)
  Bitdefender Advanced Threat Intelligence is a comprehensive cybersecurity solution designed to provide organizations with real-time, actionable insights into the global threat landscape. By leveraging a vast network of over 500 million sensors and advanced analytics, it delivers enriched intelligence on sophisticated threats, including Advanced Persistent Threats (APTs, ransomware, phishing schemes, and command-and-control infrastructures. This empowers security teams to proactively detect, analyze, and respond to emerging cyber threats, enhancing overall security posture and operational efficiency. Key Features and Functionality: - Unique Insights into Emerging Threats: Offers early detection of hard-to-identify APTs and command-and-control servers, enabling preemptive defense measures. - High-Quality Intelligence Sources: Utilizes data from a global telemetry network, including endpoints, web crawlers, email traps, honeypots, and monitored botnets, ensuring accurate and comprehensive threat information. - Expert Cyber-Threat Analysis: Backed by Bitdefender&#39;s Cyber-Threat Intelligence Labs, comprising over 800 researchers and developers employing AI, deep learning, and anomaly detection to maintain precise threat intelligence feeds. - Seamless Integration: Compatible with leading threat intelligence platforms (TIPs, Security Information and Event Management (SIEM systems, and Security Orchestration, Automation, and Response (SOAR applications, facilitating streamlined operations. Primary Value and User Solutions: Bitdefender Advanced Threat Intelligence addresses critical cybersecurity challenges by providing organizations with timely and context-rich threat data. This enables security teams to prioritize alerts effectively, reduce false positives, and accelerate incident response times. By integrating seamlessly with existing security infrastructures, it enhances threat detection capabilities and supports proactive defense strategies, ultimately safeguarding sensitive data and maintaining business continuity.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 6

**User Satisfaction Scores:**

- **Security Validation:** 9.0/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 9.7/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 9.0/10 (Category avg: 8.6/10)
- **Ease of Use:** 6.1/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Bitdefender](https://www.g2.com/sellers/bitdefender)
- **Year Founded:** 2001
- **HQ Location:** Bucuresti, Romania
- **Twitter:** @Bitdefender (113,880 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6825/ (2,317 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 83% Small-Business, 17% Mid-Market


#### Pros & Cons

**Pros:**

- Alerts (1 reviews)
- Automation (1 reviews)
- Detailed Analysis (1 reviews)
- Recommendations (1 reviews)
- Scanning Efficiency (1 reviews)

**Cons:**

- Complex Implementation (1 reviews)
- Information Overload (1 reviews)

### 7. [Palo Alto Networks Cortex XSOAR](https://www.g2.com/products/palo-alto-networks-cortex-xsoar/reviews)
  Palo Alto Networks&#39; Cortex XSOAR is a comprehensive Security Orchestration, Automation, and Response (SOAR) platform designed to streamline and enhance security operations. By integrating automation, case management, real-time collaboration, and threat intelligence management, Cortex XSOAR empowers security teams to respond to incidents more efficiently and effectively. Key Features and Functionality: - Process Standardization and Automation: Cortex XSOAR offers over 270 out-of-the-box playbooks, enabling the automation of numerous security use cases. These playbooks orchestrate response actions across more than 350 third-party products, facilitating seamless integration and operational consistency. - Security-Focused Case Management: The platform unifies alerts, incidents, and indicators from various sources into a single case management framework. This consolidation accelerates incident response by providing a comprehensive view of security events. - Real-Time Collaboration: Cortex XSOAR includes a Virtual War Room equipped with built-in ChatOps and a command-line interface. This feature allows security teams to collaborate in real time, execute commands across the entire product stack, and manage incidents more effectively. - Threat Intelligence Management: The platform aggregates disparate threat intelligence sources, customizes and scores feeds, and matches indicators against the organization&#39;s specific environment. This capability enables security teams to take informed actions swiftly. Primary Value and Problem Solving: Cortex XSOAR addresses the challenges faced by security teams, such as the overwhelming volume of alerts and the need for rapid incident response. By automating repetitive tasks and standardizing processes, the platform reduces the time spent on incidents by up to 90%, allowing analysts to focus on critical threats. The integration of threat intelligence management with SOAR capabilities ensures that organizations can operationalize threat feeds effectively, enhancing their overall security posture. Additionally, the platform&#39;s extensive integration ecosystem, with over 360 third-party integrations, enables organizations to orchestrate complex workflows across their existing security infrastructure without extensive custom development.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Security Validation:** 9.2/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 9.2/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 8.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.7/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,686 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 52% Enterprise, 30% Mid-Market


#### Pros & Cons

**Pros:**

- Incident Management (3 reviews)
- User Interface (2 reviews)
- Accuracy of Information (1 reviews)
- Automation (1 reviews)
- Customer Support (1 reviews)

**Cons:**

- Learning Curve (2 reviews)
- Limited Customization (1 reviews)
- Logging Issues (1 reviews)
- Log Management Issues (1 reviews)
- Poor Reporting (1 reviews)

### 8. [ServiceNow Security Operations](https://www.g2.com/products/servicenow-security-operations/reviews)
  ServiceNow Security Operations is a sophisticated software solution designed to enhance threat and vulnerability management as well as incident response for organizations. By leveraging artificial intelligence, this platform empowers security teams to operate more efficiently and effectively, allowing for streamlined collaboration across IT, security, and risk management departments. The primary goal of ServiceNow Security Operations is to simplify complex security processes while minimizing risks associated with cybersecurity threats. Targeted at security teams within organizations of various sizes, ServiceNow Security Operations addresses the need for a cohesive approach to managing security incidents and vulnerabilities. It is particularly beneficial for organizations that utilize multiple security tools, as it integrates security and vulnerability data from these existing systems. This integration enables teams to respond to threats more rapidly by automating critical workflows and processes, thus reducing the manual effort traditionally required in incident response. Key features of ServiceNow Security Operations include intelligent workflows that automate routine tasks, allowing security professionals to focus on more strategic initiatives. The platform’s AI-driven capabilities facilitate the automatic correlation of threat intelligence from diverse sources, such as the MITRE ATT&amp;CK framework. This feature enhances situational awareness and enables teams to prioritize threats effectively based on real-time data. Additionally, the ability to take action within other security or IT management tools from a centralized console streamlines operations, ensuring that teams can respond to incidents without unnecessary delays. Moreover, the use of digital security workflows and orchestration significantly accelerates tasks such as analysis, prioritization, and remediation. By automating these processes, organizations can not only improve their response times but also enhance their overall cybersecurity posture. The integration of AI-driven automation within the ServiceNow AI Platform® further strengthens the platform&#39;s capabilities, enabling organizations to drive cyber resilience and reduce their exposure to potential threats. In summary, ServiceNow Security Operations is a comprehensive solution that addresses the complexities of modern cybersecurity challenges. By automating and simplifying threat and vulnerability management, it empowers security teams to respond more effectively, thereby enhancing the overall security framework of an organization.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 36

**User Satisfaction Scores:**

- **Security Validation:** 10.0/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 10.0/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 10.0/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.4/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [ServiceNow](https://www.g2.com/sellers/servicenow)
- **Company Website:** https://www.servicenow.com/
- **Year Founded:** 2004
- **HQ Location:** Santa Clara, CA
- **Twitter:** @servicenow (54,113 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/29352/ (32,701 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 55% Enterprise, 18% Mid-Market


#### Pros & Cons

**Pros:**

- Integration Capabilities (11 reviews)
- Integration Support (10 reviews)
- Ease of Use (9 reviews)
- Integrations (8 reviews)
- Incident Management (7 reviews)

**Cons:**

- Difficult Setup (4 reviews)
- Integration Issues (4 reviews)
- Licensing Issues (3 reviews)
- Complexity (2 reviews)
- Difficult Customization (2 reviews)

### 9. [TechOwl Shield](https://www.g2.com/products/techowl-shield/reviews)
  TechOwl&#39;s Attack Surface Dashboard epitomizes the sophistication of our SaaS solution, providing a comprehensive view of your digital threat landscape. This state-of-the-art dashboard offers an interactive heatmap of active alerts, enabling you to effortlessly discern the severity and age of potential threats.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 6

**User Satisfaction Scores:**

- **Security Validation:** 9.3/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 9.0/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 8.0/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.6/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [TechOwl Infosec](https://www.g2.com/sellers/techowl-infosec)
- **Year Founded:** 2013
- **HQ Location:** Surat, IN
- **LinkedIn® Page:** https://www.linkedin.com/company/techowlindia/ (29 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 83% Mid-Market, 17% Small-Business


#### Pros & Cons

**Pros:**

- Threat Detection (4 reviews)
- Alerts (2 reviews)
- Ease of Use (2 reviews)
- Monitoring (2 reviews)
- Reporting (2 reviews)

**Cons:**

- False Positives (2 reviews)
- Lack of Customization (2 reviews)
- UX Improvement (1 reviews)

### 10. [BLINDSPOT](https://www.g2.com/products/prodaft-blindspot/reviews)
  With BLINDSPOT, keep your supply chain safe by exposing hidden risks and predicting future threats. Our risk intelligence platform keeps watch on your organization&#39;s digital footprint to quickly identify and manage weak links on your supply chain before they have a chance to harm your business.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Ease of Use:** 10.0/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [PRODAFT](https://www.g2.com/sellers/prodaft)
- **Year Founded:** 2012
- **HQ Location:** Yverdon-les-Bains, CH
- **LinkedIn® Page:** https://www.linkedin.com/company/2801043 (50 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 20% Enterprise, 20% Mid-Market


#### Pros & Cons

**Pros:**

- Accuracy of Information (2 reviews)
- Customer Support (2 reviews)
- Ease of Use (2 reviews)
- Setup Ease (2 reviews)
- Detailed Analysis (1 reviews)

**Cons:**

- Complexity (1 reviews)
- Difficult Learning Curve (1 reviews)

### 11. [Domain and IP Intelligence Feeds](https://www.g2.com/products/domain-and-ip-intelligence-feeds/reviews)
  Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk and determine content classifications of hosts, alphaMountain provides real-time threat verdicts for any domain or IP address on the internet. alphaMountain&#39;s approach to domain risk is based on three key differentiators: Freshness - real-time domain and IP threat assessments based on first-party algorithms; Fidelity - granularity and context that enable better security outcomes; Factors - contributing rationale that drive all investigations to quick, confident conclusions; By integrating alphaMountain&#39;s data into their products, cybersecurity vendors improve the accuracy and performance of their solutions. Security operations teams speed up their investigations through alphaMountain&#39;s integrations with leading intelligence platforms including Splunk, SecureX, Maltego, VirusTotal, and more.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 6

**User Satisfaction Scores:**

- **Security Validation:** 10.0/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 7.5/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 7.5/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [alphaMountain AI](https://www.g2.com/sellers/alphamountain-ai)
- **Year Founded:** 2020
- **HQ Location:** Salt Lake City, US
- **Twitter:** @alphamountainai (54 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/alphamountain/ (14 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 33% Small-Business


#### Pros & Cons

**Pros:**

- Accuracy of Information (5 reviews)
- Alerts (2 reviews)
- Customer Support (2 reviews)
- Ease of Use (2 reviews)
- Automation (1 reviews)

**Cons:**

- False Positives (2 reviews)
- Expensive (1 reviews)
- Poor Detection Performance (1 reviews)

### 12. [DomainTools](https://www.g2.com/products/domaintools/reviews)
  DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world&#39;s most advanced security teams use our solutions to identify external risks, investigate threats, and proactively protect their organizations in a constantly evolving threat landscape. DomainTools constantly monitors the Internet and brings together the most comprehensive and trusted domain, website and DNS data to provide immediate context and machine-learning driven risk analytics delivered in near real-time. Visit domaintools.com to experience firsthand why DomainTools is the first stop for advanced security teams when they need to know.


  **Average Rating:** 3.8/5.0
  **Total Reviews:** 13

**User Satisfaction Scores:**

- **Security Validation:** 7.2/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 6.7/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 7.8/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.1/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [DomainTools](https://www.g2.com/sellers/domaintools)
- **Year Founded:** 2004
- **HQ Location:** Seattle, WA, Washington
- **Twitter:** @DomainTools (13,189 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/domaintools (141 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 62% Small-Business, 31% Enterprise


### 13. [Pure Signal™ Recon](https://www.g2.com/products/pure-signal-recon/reviews)
  Pure Signal™Recon is a web based Threat Intelligence query platform. It allows Security Analysts access to Team Cymru’s proprietary data called Pure Signal™, enabling them to create searches and filters to discover insights from over 40 datasets. These datasets include NetFlow, PDNS and x509 Certificates among others. Pure Signal™ Recon is designed for highly advanced users, and mostly used for the purpose of Cyber Reconnaissance, Cyber Threat Hunting, Cyber Incident Response, Victimology and Third Party Digital Risks. Pure Signal™ Recon is licensed per user as an annual subscription, with a range of options to suit the budget and requirements of customer needs.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Security Validation:** 6.3/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 8.3/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 7.5/10 (Category avg: 8.6/10)
- **Ease of Use:** 7.7/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Team Cymru](https://www.g2.com/sellers/team-cymru)
- **Year Founded:** 1998
- **HQ Location:**  Lake Mary, FL
- **Twitter:** @teamcymru (41,101 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/team-cymru/ (130 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 60% Small-Business, 20% Enterprise


#### Pros & Cons

**Pros:**

- Detailed Analysis (1 reviews)
- Helpful (1 reviews)
- Monitoring (1 reviews)

**Cons:**

- Inadequate Security (1 reviews)
- Information Overload (1 reviews)

### 14. [StyxView](https://www.g2.com/products/styxview/reviews)
  Styx Intelligence is a leading global SaaS cybersecurity company offering a unified, AI-driven External Digital &amp; Cyber Risk Protection platform that helps protect your brand, people, and external digital infrastructure from cyber threats. Built on a proprietary framework, Styx helps organizations monitor, detect, prioritize, and act on threats such as brand and executive impersonation, phishing attacks, disinformation campaigns, data leakage, exposed assets, and third-party risk across the open web, social media, news, and the dark web. Styx Intelligence helps organizations gain visibility into threats that exist outside the traditional perimeter and take action before they impact trust, operations, or revenue by: - Discovering exposed assets, brands, domains, executive identities, social media impersonations, leaked credentials, and third-party risks - Monitoring external threats across the open web, social media, news, app stores, forums, and the dark web - Validating and prioritizing the risks that matter most with clear context and business impact - Disrupting threats through automated takedowns and response actions before they cause harm The platform is designed for resource-constrained security teams and brings together brand protection, executive protection, social media and news monitoring, dark web monitoring, third-party risk, threat intelligence, disinformation security, and takedown services in one unified solution for the modern external threat landscape.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 7

**User Satisfaction Scores:**

- **Ease of Use:** 8.3/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Styx Intelligence](https://www.g2.com/sellers/styx-intelligence)
- **Year Founded:** 2020
- **HQ Location:** Vancouver, CA
- **LinkedIn® Page:** https://www.linkedin.com/company/styx-intelligence/ (25 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 71% Enterprise, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (7 reviews)
- Detailed Analysis (4 reviews)
- Ease of Use (4 reviews)
- Helpful (4 reviews)
- Efficiency (3 reviews)

**Cons:**

- Software Bugs (2 reviews)
- Technical Issues (2 reviews)
- Bugs (1 reviews)
- False Positives (1 reviews)
- Improvement Needed (1 reviews)

### 15. [ThreatBolt](https://www.g2.com/products/threatbolt/reviews)
  ThreatBolt is the only Intelligence-sharing platform thoughtfully designed to meet SOC/MSSP needs. It utilizes AI/ML Powered engine for threat analysis and classification, delivering high-fidelity threat intelligence feeds in real-time with precise scores and industry’s best enrichment.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Security Validation:** 9.6/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 10.0/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 7.8/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Cyberxtron](https://www.g2.com/sellers/cyberxtron)
- **Year Founded:** 2023
- **HQ Location:** India, IN
- **LinkedIn® Page:** https://www.linkedin.com/company/cyberxtron-technologies/ (10 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 60% Enterprise, 20% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Deployment Ease (1 reviews)
- Ease of Use (1 reviews)
- Integration Capabilities (1 reviews)
- Security (1 reviews)

**Cons:**

- Lack of Customization (1 reviews)

### 16. [ThreatCloud AI](https://www.g2.com/products/threatcloud-ai/reviews)
  Check Point offers comprehensive intelligence to proactively stop threats, manage security services to monitor networks and incident response to quickly respond to and resolve attacks.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Security Validation:** 9.2/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 8.3/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 9.2/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.9/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,978 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Company Size:** 40% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Deployment Ease (1 reviews)
- Ease of Use (1 reviews)
- Security (1 reviews)
- Security Protection (1 reviews)


### 17. [Cisco Secure Malware Analytics (Threat Grid)](https://www.g2.com/products/cisco-secure-malware-analytics-threat-grid/reviews)
  Threat Grid combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware. With a robust, context-rich malware knowledge base, you will understand what malware is doing, or attempting to do, how large a threat it poses, and how to defend against it.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 4

**User Satisfaction Scores:**

- **Security Validation:** 10.0/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 10.0/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 10.0/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.8/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,388 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Reviewer Demographics:**
  - **Company Size:** 75% Enterprise, 25% Mid-Market


### 18. [CybelAngel](https://www.g2.com/products/cybelangel/reviews)
  CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies available. Built upon close to a decade of machine learning, our advanced platform scans the entirety of the internet every 24 hours to uncover unknown assets and shadow IT, cloud services, connected devices, fraudulent domains and exposed credentials — the sources attackers use to access confidential data, launch phishing campaigns or initiate destructive ransomware attacks. CybelAngel&#39;s combination of machine learning and expert human analysis provides deep visibility into the most critical threats, long before they’re exploited.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Endpoint Intelligence:** 8.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [CybelAngel](https://www.g2.com/sellers/cybelangel)
- **Year Founded:** 2013
- **HQ Location:** Paris, Île-de-France, France
- **Twitter:** @CybelAngel (3,415 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cybelangel (163 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 80% Enterprise, 20% Mid-Market


### 19. [PreCrime Intelligence](https://www.g2.com/products/precrime-intelligence/reviews)
  PreCrime Intelligence is cybersecurity’s fastest, most accurate predictive intelligence solution, using behavioral AI to predict and preempt attacks weeks before they happen. The exponential growth of network infrastructure has created more attack surfaces than ever before. We use continuous threat exposure management (CTEM) to proactively monitor the internet for suspicious behaviors and dangerous domains. We raise the flag on anomalous activities, before they become a security breach. We go beyond reactive blocklists to equip your team with the most extensive dataset of future malicious infrastructure. Our intelligence feed deliver indicators of future attacks instead of reactive alerts and allows you to establish a proactive security posture. The result: Only 3% overlap with traditional TI, or: 97% unique, proactive data. Every 10 minutes, we monitor the entire internet and evaluate infrastructures based on their behavior. Our AI continuously evolves, requiring less human input while sharpening its accuracy in anomaly detection and risk assessment. Deny malicious infrastructure in near real-time before they launch attacks. Features: - 18 days ahead of traditional intelligence feeds (median) - 99.95% accuracy (less than 0.05% false positives) - ~100,000 proactive indicators of future attacks (IoFA) every day - 20+ million suspicious infrastructures continuously monitored - Easy integration into Firewalls, SIEM/SOAR/TIP, XDR/EDR or DNS resolvers


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 4

**User Satisfaction Scores:**

- **Intelligence Reports:** 10.0/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 8.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.8/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [BforeAI](https://www.g2.com/sellers/bforeai)
- **Year Founded:** 2020
- **HQ Location:** New York, New York, United States
- **LinkedIn® Page:** https://www.linkedin.com/company/bforeai (81 employees on LinkedIn®)
- **Ownership:** Privately owned

**Reviewer Demographics:**
  - **Company Size:** 50% Small-Business, 25% Mid-Market


#### Pros & Cons

**Pros:**

- Investigation Management (2 reviews)
- Threat Detection (2 reviews)
- Alerts (1 reviews)
- Detailed Analysis (1 reviews)
- Easy Integrations (1 reviews)

**Cons:**

- Slow Performance (1 reviews)

### 20. [RiskIQ](https://www.g2.com/products/riskiq/reviews)
  RiskIQ is the leader in attack surface management. A subsidiary of Microsoft, we help organizations discover, understand, and mitigate threats and exposures.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 4

**User Satisfaction Scores:**

- **Security Validation:** 10.0/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 10.0/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 10.0/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.6/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [RiskIQ](https://www.g2.com/sellers/riskiq)
- **Year Founded:** 2009
- **HQ Location:** San Francisco, US
- **Twitter:** @RiskIQ (10,999 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/riskiq_2 (33 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Small-Business, 25% Enterprise


### 21. [RiskProfiler - Cyber Threat Intelligence](https://www.g2.com/products/riskprofiler-cyber-threat-intelligence/reviews)
  RiskProfiler offers external threat intelligence and risk management services aimed at helping organizations monitor and mitigate various risks, including brand, vendor, and supply chain threats. Their suite of products includes automated tools for external attack surface management, third-party risk management, and real-time monitoring of dark web activities. Serving industries such as automotive, finance, healthcare, and technology, RiskProfiler focuses on enhancing cybersecurity and protecting businesses from digital fraud and impersonation. By leveraging advanced analytics and AI-driven insights, RiskProfiler empowers organizations to proactively defend against potential threats.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 4

**User Satisfaction Scores:**

- **Ease of Use:** 10.0/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Riskprofiler](https://www.g2.com/sellers/riskprofiler)
- **Year Founded:** 2019
- **HQ Location:** Rock Hill , US
- **Twitter:** @riskprofilerio (211 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/riskprofiler (28 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 75% Mid-Market, 25% Small-Business


#### Pros & Cons

**Pros:**

- Detailed Analysis (2 reviews)
- Threat Detection (2 reviews)
- Accuracy of Information (1 reviews)
- Automation (1 reviews)
- Ease of Use (1 reviews)

**Cons:**

- Slow Loading (1 reviews)

### 22. [Threat Intelligence API Platform](https://www.g2.com/products/threat-intelligence-api-platform/reviews)
  We provide threat intelligence APIs with comprehensive information on hosts and the infrastructure behind them. By combining data obtained from various providers, our own exhaustive internal databases, and by analyzing host configuration in real-time, we provide threat intelligence APIs that offer an in-depth perspective on the target host and crucial threat detection for any system.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 4

**User Satisfaction Scores:**

- **Security Validation:** 9.4/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 9.6/10 (Category avg: 9.1/10)
- **Ease of Use:** 9.2/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Threat Intelligence Platform](https://www.g2.com/sellers/threat-intelligence-platform)
- **Year Founded:** 2017
- **HQ Location:** Walnut, US
- **LinkedIn® Page:** https://www.linkedin.com/company/threat-intelligence-platform (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 50% Small-Business


### 23. [Bolster AI](https://www.g2.com/products/bolster-ai/reviews)
  Bolster is an AI-powered security platform designed to help organizations monitor, detect, and eliminate threats that target their brand and customers. This comprehensive solution focuses on safeguarding businesses across various digital channels, including websites, email, social media, the dark web, app stores, and domain registrations. By leveraging advanced artificial intelligence, Bolster provides real-time protection against a range of cyber threats, ensuring that brands can maintain their integrity and customer trust. The platform is particularly relevant for businesses that operate in highly competitive and digital environments, where brand impersonation and phishing attacks can have severe consequences. These threats not only compromise security but also lead to financial losses and damage to a company&#39;s reputation. Bolster&#39;s proactive approach to security allows organizations to stay ahead of potential risks, making it an essential tool for brand protection in today&#39;s digital landscape. Bolster&#39;s key features include continuous monitoring of online channels, real-time detection of fraudulent activities, and automated takedown processes that can resolve issues within hours. This rapid response capability sets Bolster apart from traditional security solutions, which often involve lengthy investigation and remediation processes. The platform&#39;s AI algorithms are designed to identify anomalies and potential threats swiftly, allowing businesses to mitigate risks before they escalate. The benefits of using Bolster extend beyond immediate threat detection. By ensuring a secure online presence, businesses can foster customer trust and loyalty, which are critical components of long-term success. The platform&#39;s ability to protect against brand impersonation and phishing attacks helps maintain a company&#39;s reputation, ultimately leading to increased customer confidence and reduced financial impact from security breaches. Founded in 2017 by seasoned security industry professionals, Bolster is headquartered in Los Altos, California. The company&#39;s commitment to innovation and excellence in cybersecurity has made it a trusted partner for some of the world&#39;s largest brands. By choosing Bolster, organizations can leverage cutting-edge technology to safeguard their digital assets and ensure a secure experience for their customers.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 7

**User Satisfaction Scores:**

- **Ease of Use:** 9.0/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Bolster](https://www.g2.com/sellers/bolster-5a70a712-87bb-4a4b-8c7a-86c1af12d8b5)
- **Company Website:** https://bolster.ai/
- **Year Founded:** 2017
- **HQ Location:** Santa Clara, US
- **LinkedIn® Page:** https://www.linkedin.com/company/bolster-ai/ (83 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 43% Mid-Market, 29% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Protection (2 reviews)
- Security (2 reviews)
- Threat Intelligence (2 reviews)
- Accuracy of Information (1 reviews)

**Cons:**

- Complex Usability (1 reviews)
- Fraud Management (1 reviews)
- Incomplete Information (1 reviews)
- Insufficient Information (1 reviews)
- Lack of Transparency (1 reviews)

### 24. [Centripetal CleanINTERNET ®](https://www.g2.com/products/centripetal-cleaninternet/reviews)
  CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alternative protection strategy at significantly lower cost. CleanINTERNET® presents an alternative approach to cybersecurity, putting threat intelligence at the forefront, moving from reactive to proactive defense, and helping security teams be more efficient and effective. Now available as a cloud-based solution, Centripetal&#39;s CleanINTERNET® service is a revolutionary approach to defending your cloud based enterprise assets from cyber threats by leveraging dynamic threat intelligence on a mass scale. CleanINTERNET® CLOUD is designed to protect cloud environments, providing unparalleled cyber defense and removing the need for more costly cybersecurity infrastructure.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Security Validation:** 10.0/10 (Category avg: 9.0/10)
- **Intelligence Reports:** 8.3/10 (Category avg: 9.1/10)
- **Endpoint Intelligence:** 0.0/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Centripetal](https://www.g2.com/sellers/centripetal-9291e3f9-fc74-4f11-8f6c-18c15042e2b7)
- **Year Founded:** 2009
- **HQ Location:** Reston, US
- **Twitter:** @Centripetal_AI (467 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/centripetal-ai (118 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 80% Mid-Market, 20% Small-Business


### 25. [Darktrace / EMAIL](https://www.g2.com/products/darktrace-email/reviews)
  Darktrace / EMAIL is an email security platform powered by Self-Learning AI that protects organizations against the most advanced threats across email and collaboration tools that other solutions miss. Recognized as a Leader in Gartner’s Magic Quadrant and Leaders in the 2025 Voice of the Customer award for Email Security Platforms, it is designed to address the growing sophistication of communication-based attacks. Traditional secure email gateways often rely on static rules or signatures, which struggle against modern threats such as business email compromise and supply chain attacks. Darktrace / EMAIL takes a different approach by using Self-Learning AI to understand the unique communication patterns of each organization and user. This allows it to detect subtle anomalies across inbound, outbound, and lateral messages, and respond with precise, autonomous actions. Key capabilities include: - Behavioral threat detection: Identifies phishing, ransomware, account takeovers, and insider risks by learning “normal” communication behavior of internal and external users. - Protection beyond the inbox: Extends security to collaboration platforms like Microsoft Teams and SaaS applications, addressing the shift of phishing into new channels. - Adaptive response: Suspicious emails are automatically quarantined, links are rewritten, or attachments are removed, all without interrupting legitimate business communication. This approach enforces regular communication and ensures that as much safe, non-malicious content as possible is retained. - Data protection: Provides behavioral data loss prevention and assists with your DMARC configuration and monitoring to safeguard sensitive information and brand reputation. For security teams, Darktrace / EMAIL reduces operational overhead by automating triage and response. Its Cyber AI Analyst provides contextual insights, while end-users benefit from clear, in-app narratives that explain why a message is suspicious—helping to reduce false phishing reports and improve awareness. Benefits for organizations include: - Comprehensive coverage across email, collaboration, and SaaS platforms. - Reduced workload for security teams through automation and AI-driven analysis. - Seamless integration with Microsoft 365, Exchange, and Google Workspace without disrupting mail flow. In summary, Darktrace / EMAIL delivers adaptive, AI-driven protection across the full communication ecosystem. Its dual recognition as a Gartner Leader in both the Voice of the Customer award and the Magic Quadrant for Email Security Platforms in 2025 highlights its effectiveness in helping organizations defend against today’s most complex and fast-evolving threats.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Ease of Use:** 7.6/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Darktrace](https://www.g2.com/sellers/darktrace)
- **Company Website:** https://www.darktrace.com
- **Year Founded:** 2013
- **HQ Location:** Cambridgeshire, England
- **Twitter:** @Darktrace (18,180 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5013440/ (2,548 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 73% Mid-Market, 13% Small-Business


#### Pros & Cons

**Pros:**

- AI Technology (2 reviews)
- Customer Support (2 reviews)
- Detection Efficiency (2 reviews)
- Product Quality (2 reviews)
- Reliability (2 reviews)

**Cons:**

- Expensive (4 reviews)
- Poor Integration (2 reviews)
- Complexity (1 reviews)
- False Positives (1 reviews)
- Update Issues (1 reviews)



## Parent Category

[System Security Software](https://www.g2.com/categories/system-security)



## Related Categories

- [Dark Web Monitoring Tools](https://www.g2.com/categories/dark-web-monitoring)
- [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management)
- [Digital Risk Protection (DRP) Platforms](https://www.g2.com/categories/digital-risk-protection-drp-platforms)



---

## Buyer Guide

### What You Should Know About Threat Intelligence Software

### Threat Intelligence Software FAQs

### What are the best threat intelligence software options for small businesses?

Here are some of the best threat intelligence software solutions designed to protect [small businesses](https://www.g2.com/categories/threat-intelligence/small-business):

- [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews) provides small businesses with real-time threat detection and security recommendations across cloud environments.
- [ThreatLocker](https://www.g2.com/products/threatlocker-inc-threatlocker/reviews) delivers application whitelisting and ringfencing controls, helping small teams prevent unauthorized access and malware execution.
- [Cloudflare Application Security and Performance](https://www.g2.com/products/cloudflare-application-security-and-performance/reviews) combines threat protection with performance optimization, ideal for small businesses running web-based services.
- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) offers lightweight, cloud-delivered endpoint protection that detects threats quickly without overloading system resources.
- [FortiGate NGFW](https://www.g2.com/products/fortigate-ngfw/reviews) delivers enterprise-grade firewall and threat intelligence capabilities in a scalable package suited for small business networks.

### What are the best-rated threat intelligence apps for IT teams?

Here are some of the highest-rated threat intelligence apps tailored for IT teams managing complex environments:

- [Recorded Future](https://www.g2.com/products/recorded-future/reviews) delivers real-time threat intelligence with deep web insights, helping IT teams proactively detect and prioritize risks.
- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) combines threat detection with automated response tools, enabling IT teams to secure endpoints at scale.
- [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews) provides integrated threat detection and security posture management across multi-cloud and hybrid environments.
- [Cyberint, a Check Point Company](https://www.g2.com/products/cyberint-a-check-point-company/reviews), offers external threat intelligence focused on digital risk protection, empowering IT teams to counter emerging threats beyond the firewall.
- [ZeroFox](https://www.g2.com/products/zerofox/reviews) specializes in identifying external threats across social media, domains, and the dark web, equipping IT teams with actionable intelligence.

### What are the best-rated threat intelligence platforms for startups?

Here are some of the most reliable threat intelligence platforms well-suited for agile and growing startups:

- [Cloudflare Application Security and Performance](https://www.g2.com/products/cloudflare-application-security-and-performance/reviews) combines powerful DDoS protection and threat intelligence in a lightweight, cost-effective platform ideal for startups scaling web infrastructure.
- [ThreatLocker](https://www.g2.com/products/threatlocker-inc-threatlocker/reviews) offers granular application control and real-time threat blocking, giving startups enterprise-grade security without complexity.
- [CrowdStrike Falcon Endpoint Protection Platfor](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) delivers scalable, cloud-native endpoint protection that’s easy for lean startup teams to deploy and manage.
- [CloudSEK](https://www.g2.com/products/cloudsek/reviews) provides AI-driven threat detection and digital risk monitoring, helping startups stay ahead of emerging threats across assets and brand mentions.
- [Censys Search](https://www.g2.com/products/censys-search/reviews) enables startups to continuously map and monitor their attack surface, offering visibility and threat data without heavy setup.




