Introducing G2.ai, the future of software buying.Try now

Best Threat Intelligence Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies use these tools to keep their security standards up to date and fit to address new threats as they emerge. These tools can improve security performance by providing information on threats to their specific networks, infrastructure, and endpoint devices. Threat intelligence software provides information about hazards and how they function, their capabilities, and remediation techniques. IT administrators and security professionals use the delivered data to better protect their systems from emerging threats and plan for possible vulnerabilities. The tools alert users as new threats emerge and provide information detailing best practices for resolution.

Many products, like security information and event management (SIEM) software and vulnerability management software, can integrate with or provide similar information as threat intelligence products. Additionally, these products continue to integrate with artificial intelligence (AI) to better tailor this complex suite of data for specific organizations’ needs. These newer capabilities can include being able to generate threat reports based on newly aggregated threat intelligence data. This data directly pertains to the organization where the software is deployed. The newer capabilities also help in creating threat detection rules based on observed patterns in malicious actors’ behaviors.

To qualify for inclusion in the Threat Intelligence category, a product must:

Provide information on emerging threats and vulnerabilities
Detail remediation practices for common and emerging threats
Analyze global threats on different types of networks and devices
Cater threat information to specific IT solutions
Show More
Show Less

Featured Threat Intelligence Software At A Glance

Cyberint, a Check Point Company
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Threat Intelligence Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
171 Listings in Threat Intelligence Available
(25)4.9 out of 5
7th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatMon is an AI-powered Cyber Threat Intelligence platform designed to proactively detect, analyze, and respond to external cyber threats targeting organizations’ digital assets and reputation. Thi

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatMon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    10
    Threat Detection
    10
    Ease of Use
    7
    Detailed Analysis
    6
    Threat Intelligence
    6
    Cons
    Excessive Notifications
    4
    Information Overload
    4
    Limited Features
    4
    Inefficient Alerts
    3
    Inefficient Alert System
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatMon features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 9.0
    9.9
    Intelligence Reports
    Average: 9.1
    9.6
    Endpoint Intelligence
    Average: 8.6
    9.7
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatMon
    Company Website
    Year Founded
    2018
    HQ Location
    Sterling VA
    Twitter
    @MonThreat
    15,200 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatMon is an AI-powered Cyber Threat Intelligence platform designed to proactively detect, analyze, and respond to external cyber threats targeting organizations’ digital assets and reputation. Thi

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 36% Enterprise
ThreatMon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
10
Threat Detection
10
Ease of Use
7
Detailed Analysis
6
Threat Intelligence
6
Cons
Excessive Notifications
4
Information Overload
4
Limited Features
4
Inefficient Alerts
3
Inefficient Alert System
3
ThreatMon features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 9.0
9.9
Intelligence Reports
Average: 9.1
9.6
Endpoint Intelligence
Average: 8.6
9.7
Ease of Use
Average: 9.0
Seller Details
Seller
ThreatMon
Company Website
Year Founded
2018
HQ Location
Sterling VA
Twitter
@MonThreat
15,200 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

    Users
    No information available
    Industries
    • Security and Investigations
    Market Segment
    • 59% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dataminr Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Efficiency Improvement
    3
    Incident Management
    3
    Time-saving
    3
    Artificial Intelligence
    2
    Cons
    Difficult Setup
    1
    False Positives
    1
    Improvement Needed
    1
    Inefficient Alerts
    1
    Information Overload
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dataminr features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 9.0
    7.6
    Intelligence Reports
    Average: 9.1
    8.0
    Endpoint Intelligence
    Average: 8.5
    8.5
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dataminr
    Year Founded
    2009
    HQ Location
    New York, NY
    Twitter
    @Dataminr
    16,493 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    742 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

Users
No information available
Industries
  • Security and Investigations
Market Segment
  • 59% Enterprise
  • 33% Small-Business
Dataminr Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Efficiency Improvement
3
Incident Management
3
Time-saving
3
Artificial Intelligence
2
Cons
Difficult Setup
1
False Positives
1
Improvement Needed
1
Inefficient Alerts
1
Information Overload
1
Dataminr features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 9.0
7.6
Intelligence Reports
Average: 9.1
8.0
Endpoint Intelligence
Average: 8.5
8.5
Ease of Use
Average: 9.0
Seller Details
Seller
Dataminr
Year Founded
2009
HQ Location
New York, NY
Twitter
@Dataminr
16,493 Twitter followers
LinkedIn® Page
www.linkedin.com
742 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender Threat Intelligence (MDTI is a comprehensive security solution designed to help organizations identify, understand, and mitigate cyberthreats. By leveraging a vast repository of thr

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 50% Small-Business
    • 30% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Monitoring
    1
    Response Time
    1
    Threat Detection
    1
    Cons
    Lack of Customization
    1
    Limited Functionality
    1
    Navigation Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender Threat Intelligence features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 9.0
    8.5
    Intelligence Reports
    Average: 9.1
    8.5
    Endpoint Intelligence
    Average: 8.6
    8.7
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,133,301 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender Threat Intelligence (MDTI is a comprehensive security solution designed to help organizations identify, understand, and mitigate cyberthreats. By leveraging a vast repository of thr

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 50% Small-Business
  • 30% Enterprise
Microsoft Defender Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Monitoring
1
Response Time
1
Threat Detection
1
Cons
Lack of Customization
1
Limited Functionality
1
Navigation Issues
1
Microsoft Defender Threat Intelligence features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 9.0
8.5
Intelligence Reports
Average: 9.1
8.5
Endpoint Intelligence
Average: 8.6
8.7
Ease of Use
Average: 9.0
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,133,301 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppel is built to outsmart the internet’s biggest threat—social engineering. Using generative AI, we don’t just defend; we disrupt attackers' tactics and infrastructures, providing holistic protectio

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Doppel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    14
    Helpful
    12
    Response Time
    10
    Ease of Use
    9
    Alerts
    8
    Cons
    Expensive
    2
    Not User-Friendly
    2
    Poor Detection Performance
    2
    Dashboard Issues
    1
    Information Overload
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppel features and usability ratings that predict user satisfaction
    9.1
    Security Validation
    Average: 9.0
    8.9
    Intelligence Reports
    Average: 9.1
    8.7
    Endpoint Intelligence
    Average: 8.6
    9.2
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppel
    Company Website
    Year Founded
    2022
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    236 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppel is built to outsmart the internet’s biggest threat—social engineering. Using generative AI, we don’t just defend; we disrupt attackers' tactics and infrastructures, providing holistic protectio

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Doppel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
14
Helpful
12
Response Time
10
Ease of Use
9
Alerts
8
Cons
Expensive
2
Not User-Friendly
2
Poor Detection Performance
2
Dashboard Issues
1
Information Overload
1
Doppel features and usability ratings that predict user satisfaction
9.1
Security Validation
Average: 9.0
8.9
Intelligence Reports
Average: 9.1
8.7
Endpoint Intelligence
Average: 8.6
9.2
Ease of Use
Average: 9.0
Seller Details
Seller
Doppel
Company Website
Year Founded
2022
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
236 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bitsight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    14
    Risk Management
    12
    Ease of Use
    11
    Customer Support
    9
    Features
    8
    Cons
    Missing Features
    5
    Delay Issues
    3
    Improvement Needed
    3
    Inadequate Remediation
    3
    Information Management
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitsight features and usability ratings that predict user satisfaction
    8.5
    Security Validation
    Average: 9.0
    9.0
    Intelligence Reports
    Average: 9.1
    7.5
    Endpoint Intelligence
    Average: 8.6
    8.5
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,484 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    738 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

Users
No information available
Industries
  • Hospital & Health Care
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 23% Mid-Market
Bitsight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
14
Risk Management
12
Ease of Use
11
Customer Support
9
Features
8
Cons
Missing Features
5
Delay Issues
3
Improvement Needed
3
Inadequate Remediation
3
Information Management
3
Bitsight features and usability ratings that predict user satisfaction
8.5
Security Validation
Average: 9.0
9.0
Intelligence Reports
Average: 9.1
7.5
Endpoint Intelligence
Average: 8.6
8.5
Ease of Use
Average: 9.0
Seller Details
Seller
Bitsight
Company Website
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,484 Twitter followers
LinkedIn® Page
www.linkedin.com
738 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosyst

    Users
    • Software Engineer
    • Security Consultant
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 66% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RiskProfiler - External Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    56
    Threat Detection
    28
    Features
    27
    Customer Support
    26
    Easy Integrations
    24
    Cons
    Complexity
    11
    Difficult Learning
    9
    Learning Curve
    8
    Complex Setup
    7
    Slow Performance
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.9
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    182 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    29 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosyst

Users
  • Software Engineer
  • Security Consultant
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 66% Mid-Market
  • 33% Small-Business
RiskProfiler - External Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
56
Threat Detection
28
Features
27
Customer Support
26
Easy Integrations
24
Cons
Complexity
11
Difficult Learning
9
Learning Curve
8
Complex Setup
7
Slow Performance
6
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.9
Ease of Use
Average: 9.0
Seller Details
Company Website
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
182 Twitter followers
LinkedIn® Page
www.linkedin.com
29 employees on LinkedIn®
(31)4.7 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenCTI is an open-source threat intelligence platform built by practitioners, for practitioners - to break data silos and make threat intelligence available and actionable. Make threat intelligence f

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenCTI by Filigran Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Features
    12
    Customer Support
    9
    Integrations
    8
    Integration Capabilities
    7
    Cons
    Feature Limitations
    5
    Complexity
    3
    Difficult Learning Curve
    3
    Learning Curve
    3
    Not User-Friendly
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenCTI by Filigran features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.8
    Intelligence Reports
    Average: 9.1
    8.1
    Endpoint Intelligence
    Average: 8.6
    8.2
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Filigran
    Company Website
    Year Founded
    2022
    HQ Location
    New York, US
    Twitter
    @FiligranHQ
    768 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenCTI is an open-source threat intelligence platform built by practitioners, for practitioners - to break data silos and make threat intelligence available and actionable. Make threat intelligence f

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Enterprise
  • 32% Mid-Market
OpenCTI by Filigran Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Features
12
Customer Support
9
Integrations
8
Integration Capabilities
7
Cons
Feature Limitations
5
Complexity
3
Difficult Learning Curve
3
Learning Curve
3
Not User-Friendly
3
OpenCTI by Filigran features and usability ratings that predict user satisfaction
0.0
No information available
8.8
Intelligence Reports
Average: 9.1
8.1
Endpoint Intelligence
Average: 8.6
8.2
Ease of Use
Average: 9.0
Seller Details
Seller
Filigran
Company Website
Year Founded
2022
HQ Location
New York, US
Twitter
@FiligranHQ
768 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®
(130)4.3 out of 5
14th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 64% Mid-Market
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CYREBRO Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Customer Support
    13
    Alerts
    8
    Alerting System
    7
    Dashboard Usability
    7
    Cons
    Communication Issues
    6
    Poor Customer Support
    5
    Update Issues
    5
    Ineffective Alerts
    4
    Inefficient Alert System
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYREBRO features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 9.0
    8.6
    Intelligence Reports
    Average: 9.1
    8.9
    Endpoint Intelligence
    Average: 8.6
    8.8
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYREBRO
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @CYREBRO_IO
    316 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 64% Mid-Market
  • 25% Small-Business
CYREBRO Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Customer Support
13
Alerts
8
Alerting System
7
Dashboard Usability
7
Cons
Communication Issues
6
Poor Customer Support
5
Update Issues
5
Ineffective Alerts
4
Inefficient Alert System
4
CYREBRO features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 9.0
8.6
Intelligence Reports
Average: 9.1
8.9
Endpoint Intelligence
Average: 8.6
8.8
Ease of Use
Average: 9.0
Seller Details
Seller
CYREBRO
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@CYREBRO_IO
316 Twitter followers
LinkedIn® Page
www.linkedin.com
95 employees on LinkedIn®
(29)4.9 out of 5
6th Easiest To Use in Threat Intelligence software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 66% Small-Business
    • 28% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a software solution that aims to prevent data exfiltration and secure files across various platforms.
    • Reviewers frequently mention the software's ease of use, efficient deployment process, and its ability to effectively block threats and secure data across various fields such as legal, medical, and insurance.
    • Reviewers experienced issues with false positives, requiring time and resources to clear, and some found the user interface to be less than ideal, with specific mention of an odd-looking translucent windowing.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackFog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    16
    Security
    16
    Customer Support
    12
    Ease of Use
    11
    Security Protection
    10
    Cons
    UX Improvement
    4
    MDM Issues
    3
    Alert Management
    2
    Complexity
    2
    Inadequate Security
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 9.0
    9.7
    Intelligence Reports
    Average: 9.1
    9.8
    Endpoint Intelligence
    Average: 8.6
    9.3
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,477 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 66% Small-Business
  • 28% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a software solution that aims to prevent data exfiltration and secure files across various platforms.
  • Reviewers frequently mention the software's ease of use, efficient deployment process, and its ability to effectively block threats and secure data across various fields such as legal, medical, and insurance.
  • Reviewers experienced issues with false positives, requiring time and resources to clear, and some found the user interface to be less than ideal, with specific mention of an odd-looking translucent windowing.
BlackFog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
16
Security
16
Customer Support
12
Ease of Use
11
Security Protection
10
Cons
UX Improvement
4
MDM Issues
3
Alert Management
2
Complexity
2
Inadequate Security
2
BlackFog features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 9.0
9.7
Intelligence Reports
Average: 9.1
9.8
Endpoint Intelligence
Average: 8.6
9.3
Ease of Use
Average: 9.0
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,477 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
(143)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    45
    Ease of Use
    43
    Security
    43
    Automation
    33
    Vulnerability Detection
    31
    Cons
    Expensive
    13
    Limited Scope
    11
    Technical Issues
    11
    Inadequate Reporting
    10
    Lack of Detail
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 9.0
    8.9
    Intelligence Reports
    Average: 9.1
    7.8
    Endpoint Intelligence
    Average: 8.6
    8.7
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,400 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    428 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
45
Ease of Use
43
Security
43
Automation
33
Vulnerability Detection
31
Cons
Expensive
13
Limited Scope
11
Technical Issues
11
Inadequate Reporting
10
Lack of Detail
9
Pentera features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 9.0
8.9
Intelligence Reports
Average: 9.1
7.8
Endpoint Intelligence
Average: 8.6
8.7
Ease of Use
Average: 9.0
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,400 Twitter followers
LinkedIn® Page
www.linkedin.com
428 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM X-Force Exchange features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 9.0
    8.8
    Intelligence Reports
    Average: 9.1
    8.1
    Endpoint Intelligence
    Average: 8.6
    9.3
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 29% Mid-Market
IBM X-Force Exchange features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 9.0
8.8
Intelligence Reports
Average: 9.1
8.1
Endpoint Intelligence
Average: 8.6
9.3
Ease of Use
Average: 9.0
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,117 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DeCYFIR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    12
    Threat Intelligence
    10
    Cybersecurity
    9
    Features
    7
    Security
    7
    Cons
    Not User-Friendly
    4
    Complexity
    3
    Learning Curve
    3
    Limited Customization
    3
    Complex Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DeCYFIR features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 9.0
    9.0
    Intelligence Reports
    Average: 9.1
    9.2
    Endpoint Intelligence
    Average: 8.6
    8.8
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYFIRMA
    Year Founded
    2017
    HQ Location
    Singapore, SG
    Twitter
    @cyfirma
    984 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    122 employees on LinkedIn®
    Phone
    marketing@cyfirma.com
Product Description
How are these determined?Information
This description is provided by the seller.

DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Small-Business
  • 35% Mid-Market
DeCYFIR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
12
Threat Intelligence
10
Cybersecurity
9
Features
7
Security
7
Cons
Not User-Friendly
4
Complexity
3
Learning Curve
3
Limited Customization
3
Complex Setup
2
DeCYFIR features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 9.0
9.0
Intelligence Reports
Average: 9.1
9.2
Endpoint Intelligence
Average: 8.6
8.8
Ease of Use
Average: 9.0
Seller Details
Seller
CYFIRMA
Year Founded
2017
HQ Location
Singapore, SG
Twitter
@cyfirma
984 Twitter followers
LinkedIn® Page
www.linkedin.com
122 employees on LinkedIn®
Phone
marketing@cyfirma.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection Accuracy
    3
    Ease of Use
    3
    Security
    3
    Accuracy of Information
    2
    Customer Support
    2
    Cons
    Complex Interface
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Access Control
    1
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 9.0
    9.3
    Intelligence Reports
    Average: 9.1
    9.0
    Endpoint Intelligence
    Average: 8.6
    9.0
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,324 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection Accuracy
3
Ease of Use
3
Security
3
Accuracy of Information
2
Customer Support
2
Cons
Complex Interface
2
Poor Interface Design
2
UX Improvement
2
Access Control
1
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 9.0
9.3
Intelligence Reports
Average: 9.1
9.0
Endpoint Intelligence
Average: 8.6
9.0
Ease of Use
Average: 9.0
Seller Details
Seller
Intezer
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,324 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 37% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Threat Intelligence Exchange features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 9.0
    8.6
    Intelligence Reports
    Average: 9.1
    8.1
    Endpoint Intelligence
    Average: 8.6
    8.4
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    242,656 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    768 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 37% Small-Business
Trellix Threat Intelligence Exchange features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 9.0
8.6
Intelligence Reports
Average: 9.1
8.1
Endpoint Intelligence
Average: 8.6
8.4
Ease of Use
Average: 9.0
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
242,656 Twitter followers
LinkedIn® Page
www.linkedin.com
768 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SophosLabs Intelix is a cloud-based threat intelligence and analysis platform that empowers developers and security professionals to enhance their applications and infrastructure with advanced cyberse

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SophosLabs Intelix features and usability ratings that predict user satisfaction
    7.3
    Security Validation
    Average: 9.0
    7.8
    Intelligence Reports
    Average: 9.1
    7.2
    Endpoint Intelligence
    Average: 8.6
    7.3
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,464 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

SophosLabs Intelix is a cloud-based threat intelligence and analysis platform that empowers developers and security professionals to enhance their applications and infrastructure with advanced cyberse

Users
No information available
Industries
No information available
Market Segment
  • 64% Small-Business
  • 29% Mid-Market
SophosLabs Intelix features and usability ratings that predict user satisfaction
7.3
Security Validation
Average: 9.0
7.8
Intelligence Reports
Average: 9.1
7.2
Endpoint Intelligence
Average: 8.6
7.3
Ease of Use
Average: 9.0
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,803 Twitter followers
LinkedIn® Page
www.linkedin.com
5,464 employees on LinkedIn®
Ownership
LSE:SOPH