2026 Best Software Awards are here!See the list

Best Threat Intelligence Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies use these tools to keep their security standards up to date and fit to address new threats as they emerge. These tools can improve security performance by providing information on threats to their specific networks, infrastructure, and endpoint devices. Threat intelligence software provides information about hazards and how they function, their capabilities, and remediation techniques. IT administrators and security professionals use the delivered data to better protect their systems from emerging threats and plan for possible vulnerabilities. The tools alert users as new threats emerge and provide information detailing best practices for resolution.

Many products, like security information and event management (SIEM) software and vulnerability management software, can integrate with or provide similar information as threat intelligence products. Additionally, these products continue to integrate with artificial intelligence (AI) to better tailor this complex suite of data for specific organizations’ needs. These newer capabilities can include being able to generate threat reports based on newly aggregated threat intelligence data. This data directly pertains to the organization where the software is deployed. The newer capabilities also help in creating threat detection rules based on observed patterns in malicious actors’ behaviors.

To qualify for inclusion in the Threat Intelligence category, a product must:

Provide information on emerging threats and vulnerabilities
Detail remediation practices for common and emerging threats
Analyze global threats on different types of networks and devices
Cater threat information to specific IT solutions
Show More
Show Less

Featured Threat Intelligence Software At A Glance

Free Plan Available:
ReversingLabs
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
185 Listings in Threat Intelligence Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Flashpoint is the largest privately held threat intelligence provider, enabling mission-critical organizations to proactively confront security challenges globally. Flashpoint Ignite, our unified t

    Users
    No information available
    Industries
    • Financial Services
    • Security and Investigations
    Market Segment
    • 63% Enterprise
    • 23% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Flashpoint is a data collection and threat intelligence platform that gathers information from multiple sources and provides tools for in-depth research on potential threats.
    • Users frequently mention the ease of use, the advanced filtering options, the quick search feature, the ability to set keyword alerts, and the integration with Slack as key benefits of the platform.
    • Users mentioned issues with missing or contradictory data, difficulties in setting up the platform, lack of direct chat communication for RFI cases, non-intuitive navigation, and disruptions caused by constant platform changes and lack of documentation.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Flashpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    21
    Features
    20
    Helpful
    14
    Search Functionality
    12
    Insights
    11
    Cons
    Complexity
    7
    Lack of Features
    7
    Limited Features
    6
    User Frustration
    6
    Confusing Interface
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flashpoint features and usability ratings that predict user satisfaction
    7.1
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 9.0
    7.0
    Endpoint Intelligence
    Average: 8.6
    8.4
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    New York, NY
    Twitter
    @FlashpointIntel
    13,851 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    358 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Flashpoint is the largest privately held threat intelligence provider, enabling mission-critical organizations to proactively confront security challenges globally. Flashpoint Ignite, our unified t

Users
No information available
Industries
  • Financial Services
  • Security and Investigations
Market Segment
  • 63% Enterprise
  • 23% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Flashpoint is a data collection and threat intelligence platform that gathers information from multiple sources and provides tools for in-depth research on potential threats.
  • Users frequently mention the ease of use, the advanced filtering options, the quick search feature, the ability to set keyword alerts, and the integration with Slack as key benefits of the platform.
  • Users mentioned issues with missing or contradictory data, difficulties in setting up the platform, lack of direct chat communication for RFI cases, non-intuitive navigation, and disruptions caused by constant platform changes and lack of documentation.
Flashpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
21
Features
20
Helpful
14
Search Functionality
12
Insights
11
Cons
Complexity
7
Lack of Features
7
Limited Features
6
User Frustration
6
Confusing Interface
5
Flashpoint features and usability ratings that predict user satisfaction
7.1
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 9.0
7.0
Endpoint Intelligence
Average: 8.6
8.4
Ease of Use
Average: 9.1
Seller Details
Year Founded
2010
HQ Location
New York, NY
Twitter
@FlashpointIntel
13,851 Twitter followers
LinkedIn® Page
www.linkedin.com
358 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosyst

    Users
    • Software Engineer
    • Security Consultant
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 66% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RiskProfiler - External Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    69
    Features
    31
    Customer Support
    30
    Threat Detection
    29
    Ease of Use
    28
    Cons
    Learning Curve
    16
    Complexity
    15
    Difficult Learning
    15
    Learning Difficulty
    9
    Complex Setup
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Intelligence Reports
    Average: 9.0
    0.0
    No information available
    9.9
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    187 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosyst

Users
  • Software Engineer
  • Security Consultant
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 66% Mid-Market
  • 33% Small-Business
RiskProfiler - External Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
69
Features
31
Customer Support
30
Threat Detection
29
Ease of Use
28
Cons
Learning Curve
16
Complexity
15
Difficult Learning
15
Learning Difficulty
9
Complex Setup
8
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Intelligence Reports
Average: 9.0
0.0
No information available
9.9
Ease of Use
Average: 9.1
Seller Details
Company Website
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
187 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(51)4.5 out of 5
15th Easiest To Use in Threat Intelligence software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

    Users
    No information available
    Industries
    • Security and Investigations
    Market Segment
    • 53% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dataminr Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Efficiency
    3
    Efficiency Improvement
    3
    Incident Management
    3
    Time-saving
    3
    Cons
    Inefficient Alerts
    2
    Information Overload
    2
    Lack of Customization
    2
    Complexity
    1
    Difficult Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dataminr features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 8.9
    7.6
    Intelligence Reports
    Average: 9.0
    8.0
    Endpoint Intelligence
    Average: 8.6
    8.6
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dataminr
    Year Founded
    2009
    HQ Location
    New York, NY
    Twitter
    @Dataminr
    16,484 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    776 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

Users
No information available
Industries
  • Security and Investigations
Market Segment
  • 53% Enterprise
  • 31% Small-Business
Dataminr Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Efficiency
3
Efficiency Improvement
3
Incident Management
3
Time-saving
3
Cons
Inefficient Alerts
2
Information Overload
2
Lack of Customization
2
Complexity
1
Difficult Setup
1
Dataminr features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 8.9
7.6
Intelligence Reports
Average: 9.0
8.0
Endpoint Intelligence
Average: 8.6
8.6
Ease of Use
Average: 9.1
Seller Details
Seller
Dataminr
Year Founded
2009
HQ Location
New York, NY
Twitter
@Dataminr
16,484 Twitter followers
LinkedIn® Page
www.linkedin.com
776 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenCTI is an open-source threat intelligence platform built by practitioners, for practitioners - to break data silos and make threat intelligence available and actionable. Make threat intelligence f

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 56% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenCTI by Filigran Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    14
    Ease of Use
    13
    Customer Support
    10
    Integrations
    9
    Integration Capabilities
    8
    Cons
    Feature Limitations
    5
    Complexity
    3
    Difficult Learning Curve
    3
    Learning Curve
    3
    Not User-Friendly
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenCTI by Filigran features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.0
    Intelligence Reports
    Average: 9.0
    8.1
    Endpoint Intelligence
    Average: 8.6
    8.1
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Filigran
    Company Website
    Year Founded
    2022
    HQ Location
    New York, US
    Twitter
    @FiligranHQ
    792 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    218 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenCTI is an open-source threat intelligence platform built by practitioners, for practitioners - to break data silos and make threat intelligence available and actionable. Make threat intelligence f

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 56% Enterprise
  • 28% Mid-Market
OpenCTI by Filigran Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
14
Ease of Use
13
Customer Support
10
Integrations
9
Integration Capabilities
8
Cons
Feature Limitations
5
Complexity
3
Difficult Learning Curve
3
Learning Curve
3
Not User-Friendly
3
OpenCTI by Filigran features and usability ratings that predict user satisfaction
0.0
No information available
9.0
Intelligence Reports
Average: 9.0
8.1
Endpoint Intelligence
Average: 8.6
8.1
Ease of Use
Average: 9.1
Seller Details
Seller
Filigran
Company Website
Year Founded
2022
HQ Location
New York, US
Twitter
@FiligranHQ
792 Twitter followers
LinkedIn® Page
www.linkedin.com
218 employees on LinkedIn®
(21)4.5 out of 5
Optimized for quick response
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MetaDefender Platform is an advanced threat prevention solution that lets organizations embed multi-layer file security into existing applications and security architectures, especially to protect com

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 43% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • MetaDefender is a tool that scans files from external sources and integrates into existing security workflows.
    • Users frequently mention the tool's ability to deliver clear scan results, its consistent performance even during high volumes, and its easy integration into existing systems.
    • Reviewers noted that the tool requires initial setup and policy tuning, especially for uncommon file types, and careful testing to avoid unnecessary blocking.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • MetaDefender Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    6
    Ease of Use
    5
    Security
    5
    Customer Support
    4
    Integrations
    4
    Cons
    Lack of Features
    2
    Limited Features
    2
    Compatibility Issues
    1
    Inadequate Protection
    1
    Limited OS Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaDefender features and usability ratings that predict user satisfaction
    7.2
    Security Validation
    Average: 8.9
    7.8
    Intelligence Reports
    Average: 9.0
    6.7
    Endpoint Intelligence
    Average: 8.6
    9.2
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Company Website
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,243 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MetaDefender Platform is an advanced threat prevention solution that lets organizations embed multi-layer file security into existing applications and security architectures, especially to protect com

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 43% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • MetaDefender is a tool that scans files from external sources and integrates into existing security workflows.
  • Users frequently mention the tool's ability to deliver clear scan results, its consistent performance even during high volumes, and its easy integration into existing systems.
  • Reviewers noted that the tool requires initial setup and policy tuning, especially for uncommon file types, and careful testing to avoid unnecessary blocking.
MetaDefender Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
6
Ease of Use
5
Security
5
Customer Support
4
Integrations
4
Cons
Lack of Features
2
Limited Features
2
Compatibility Issues
1
Inadequate Protection
1
Limited OS Support
1
MetaDefender features and usability ratings that predict user satisfaction
7.2
Security Validation
Average: 8.9
7.8
Intelligence Reports
Average: 9.0
6.7
Endpoint Intelligence
Average: 8.6
9.2
Ease of Use
Average: 9.1
Seller Details
Seller
OPSWAT
Company Website
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,243 Twitter followers
LinkedIn® Page
www.linkedin.com
1,124 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppel is built to outsmart the internet’s biggest threat—social engineering. Using generative AI, we don’t just defend; we disrupt attackers' tactics and infrastructures, providing holistic protectio

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Doppel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    11
    Helpful
    9
    Alerts
    8
    Response Time
    8
    Ease of Use
    7
    Cons
    Expensive
    2
    Not User-Friendly
    2
    Poor Detection Performance
    2
    Dashboard Issues
    1
    Information Overload
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppel features and usability ratings that predict user satisfaction
    9.1
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 9.0
    8.7
    Endpoint Intelligence
    Average: 8.6
    9.2
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppel
    Company Website
    Year Founded
    2022
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    269 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppel is built to outsmart the internet’s biggest threat—social engineering. Using generative AI, we don’t just defend; we disrupt attackers' tactics and infrastructures, providing holistic protectio

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Doppel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
11
Helpful
9
Alerts
8
Response Time
8
Ease of Use
7
Cons
Expensive
2
Not User-Friendly
2
Poor Detection Performance
2
Dashboard Issues
1
Information Overload
1
Doppel features and usability ratings that predict user satisfaction
9.1
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 9.0
8.7
Endpoint Intelligence
Average: 8.6
9.2
Ease of Use
Average: 9.1
Seller Details
Seller
Doppel
Company Website
Year Founded
2022
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
269 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,500 customers and 6

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 74% Enterprise
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bitsight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    14
    Risk Management
    13
    Ease of Use
    12
    Features
    10
    Customer Support
    9
    Cons
    Missing Features
    5
    Lack of Clarity
    4
    Poor Notifications
    4
    Delay Issues
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitsight features and usability ratings that predict user satisfaction
    8.5
    Security Validation
    Average: 8.9
    9.0
    Intelligence Reports
    Average: 9.0
    7.5
    Endpoint Intelligence
    Average: 8.6
    8.5
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,491 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    740 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,500 customers and 6

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 74% Enterprise
  • 22% Mid-Market
Bitsight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
14
Risk Management
13
Ease of Use
12
Features
10
Customer Support
9
Cons
Missing Features
5
Lack of Clarity
4
Poor Notifications
4
Delay Issues
3
Improvement Needed
3
Bitsight features and usability ratings that predict user satisfaction
8.5
Security Validation
Average: 8.9
9.0
Intelligence Reports
Average: 9.0
7.5
Endpoint Intelligence
Average: 8.6
8.5
Ease of Use
Average: 9.1
Seller Details
Seller
Bitsight
Company Website
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,491 Twitter followers
LinkedIn® Page
www.linkedin.com
740 employees on LinkedIn®
(25)4.9 out of 5
9th Easiest To Use in Threat Intelligence software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatMon is an AI-powered Cyber Threat Intelligence platform designed to proactively detect, analyze, and respond to external cyber threats targeting organizations’ digital assets and reputation. Thi

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatMon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    10
    Threat Detection
    10
    Ease of Use
    7
    Detailed Analysis
    6
    Threat Intelligence
    6
    Cons
    Excessive Notifications
    4
    Information Overload
    4
    Limited Features
    4
    Inefficient Alerts
    3
    Inefficient Alert System
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatMon features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    9.9
    Intelligence Reports
    Average: 9.0
    9.6
    Endpoint Intelligence
    Average: 8.6
    9.7
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatMon
    Company Website
    Year Founded
    2018
    HQ Location
    Sterling VA
    Twitter
    @MonThreat
    15,794 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatMon is an AI-powered Cyber Threat Intelligence platform designed to proactively detect, analyze, and respond to external cyber threats targeting organizations’ digital assets and reputation. Thi

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 36% Enterprise
ThreatMon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
10
Threat Detection
10
Ease of Use
7
Detailed Analysis
6
Threat Intelligence
6
Cons
Excessive Notifications
4
Information Overload
4
Limited Features
4
Inefficient Alerts
3
Inefficient Alert System
3
ThreatMon features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
9.9
Intelligence Reports
Average: 9.0
9.6
Endpoint Intelligence
Average: 8.6
9.7
Ease of Use
Average: 9.1
Seller Details
Seller
ThreatMon
Company Website
Year Founded
2018
HQ Location
Sterling VA
Twitter
@MonThreat
15,794 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
(30)4.9 out of 5
8th Easiest To Use in Threat Intelligence software
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 63% Small-Business
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a software designed to prevent data exfiltration, a common component of modern ransomware attacks, and is compatible with major platforms including Windows, Mac OS, iOS, Android, and ChromeOS.
    • Users frequently mention the ease of deployment and management, the up-to-date threat intel available in the admin portal, and the minimal interruption to the end user as standout features of BlackFog.
    • Reviewers experienced issues such as the inability of BlackFog to remove malicious software exfiltrating data, requiring reliance on other solutions or manual processes, and the occurrence of false positives that need clearing.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackFog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    16
    Security
    16
    Customer Support
    12
    Ease of Use
    11
    Security Protection
    10
    Cons
    UX Improvement
    4
    MDM Issues
    3
    Alert Management
    2
    Complexity
    2
    Inadequate Security
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    9.7
    Intelligence Reports
    Average: 9.0
    9.8
    Endpoint Intelligence
    Average: 8.6
    9.3
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,487 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 63% Small-Business
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a software designed to prevent data exfiltration, a common component of modern ransomware attacks, and is compatible with major platforms including Windows, Mac OS, iOS, Android, and ChromeOS.
  • Users frequently mention the ease of deployment and management, the up-to-date threat intel available in the admin portal, and the minimal interruption to the end user as standout features of BlackFog.
  • Reviewers experienced issues such as the inability of BlackFog to remove malicious software exfiltrating data, requiring reliance on other solutions or manual processes, and the occurrence of false positives that need clearing.
BlackFog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
16
Security
16
Customer Support
12
Ease of Use
11
Security Protection
10
Cons
UX Improvement
4
MDM Issues
3
Alert Management
2
Complexity
2
Inadequate Security
2
BlackFog features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
9.7
Intelligence Reports
Average: 9.0
9.8
Endpoint Intelligence
Average: 8.6
9.3
Ease of Use
Average: 9.1
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,487 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
(143)4.5 out of 5
Optimized for quick response
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Vulnerability Identification
    8
    Automation
    7
    Customer Support
    7
    Security
    6
    Cons
    Inadequate Reporting
    3
    Access Control
    2
    False Positives
    2
    Limited Reporting
    2
    Missing Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 9.0
    7.8
    Endpoint Intelligence
    Average: 8.6
    8.7
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,365 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    486 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Vulnerability Identification
8
Automation
7
Customer Support
7
Security
6
Cons
Inadequate Reporting
3
Access Control
2
False Positives
2
Limited Reporting
2
Missing Features
2
Pentera features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 9.0
7.8
Endpoint Intelligence
Average: 8.6
8.7
Ease of Use
Average: 9.1
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,365 Twitter followers
LinkedIn® Page
www.linkedin.com
486 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM X-Force Exchange features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 9.0
    8.1
    Endpoint Intelligence
    Average: 8.6
    9.3
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,081 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 29% Mid-Market
IBM X-Force Exchange features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 9.0
8.1
Endpoint Intelligence
Average: 8.6
9.3
Ease of Use
Average: 9.1
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,081 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DeCYFIR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    12
    Threat Intelligence
    10
    Cybersecurity
    9
    Features
    7
    Security
    7
    Cons
    Not User-Friendly
    4
    Complexity
    3
    Learning Curve
    3
    Limited Customization
    3
    Complex Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DeCYFIR features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.9
    9.0
    Intelligence Reports
    Average: 9.0
    9.2
    Endpoint Intelligence
    Average: 8.6
    8.8
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYFIRMA
    Year Founded
    2017
    HQ Location
    Singapore, SG
    Twitter
    @cyfirma
    1,001 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
    Phone
    marketing@cyfirma.com
Product Description
How are these determined?Information
This description is provided by the seller.

DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Small-Business
  • 35% Mid-Market
DeCYFIR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
12
Threat Intelligence
10
Cybersecurity
9
Features
7
Security
7
Cons
Not User-Friendly
4
Complexity
3
Learning Curve
3
Limited Customization
3
Complex Setup
2
DeCYFIR features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.9
9.0
Intelligence Reports
Average: 9.0
9.2
Endpoint Intelligence
Average: 8.6
8.8
Ease of Use
Average: 9.1
Seller Details
Seller
CYFIRMA
Year Founded
2017
HQ Location
Singapore, SG
Twitter
@cyfirma
1,001 Twitter followers
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
Phone
marketing@cyfirma.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 64% Mid-Market
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CYREBRO Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Customer Support
    13
    Alerts
    8
    Alerting System
    7
    Dashboard Usability
    7
    Cons
    Communication Issues
    6
    Poor Customer Support
    5
    Update Issues
    5
    Ineffective Alerts
    4
    Inefficient Alert System
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYREBRO features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.9
    8.6
    Intelligence Reports
    Average: 9.0
    8.9
    Endpoint Intelligence
    Average: 8.6
    8.8
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYREBRO
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @CYREBRO_IO
    315 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    99 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 64% Mid-Market
  • 25% Small-Business
CYREBRO Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Customer Support
13
Alerts
8
Alerting System
7
Dashboard Usability
7
Cons
Communication Issues
6
Poor Customer Support
5
Update Issues
5
Ineffective Alerts
4
Inefficient Alert System
4
CYREBRO features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.9
8.6
Intelligence Reports
Average: 9.0
8.9
Endpoint Intelligence
Average: 8.6
8.8
Ease of Use
Average: 9.1
Seller Details
Seller
CYREBRO
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@CYREBRO_IO
315 Twitter followers
LinkedIn® Page
www.linkedin.com
99 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 54% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection Accuracy
    3
    Ease of Use
    3
    Malware Protection
    3
    Security
    3
    Security Protection
    3
    Cons
    Complex Interface
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Access Control
    1
    Data Privacy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 9.0
    9.0
    Endpoint Intelligence
    Average: 8.6
    9.1
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,261 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    82 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 54% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection Accuracy
3
Ease of Use
3
Malware Protection
3
Security
3
Security Protection
3
Cons
Complex Interface
2
Poor Interface Design
2
UX Improvement
2
Access Control
1
Data Privacy
1
Intezer features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 9.0
9.0
Endpoint Intelligence
Average: 8.6
9.1
Ease of Use
Average: 9.1
Seller Details
Seller
Intezer
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,261 Twitter followers
LinkedIn® Page
www.linkedin.com
82 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TI Ops is the threat intelligence platform built for operations, not just centralization. It ingests hundreds of internal and external sources, enriches them with AI, and aligns them to your intellige

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Enterprise
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatConnect TI Ops Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    5
    Threat Detection
    5
    Ease of Use
    4
    Automation
    3
    Implementation Ease
    3
    Cons
    UX Improvement
    2
    Additional Costs
    1
    API Limitations
    1
    Difficult Learning Curve
    1
    Difficult Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatConnect TI Ops features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 9.0
    8.1
    Endpoint Intelligence
    Average: 8.6
    7.9
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Arlington, US
    Twitter
    @ThreatConnect
    14,220 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    155 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TI Ops is the threat intelligence platform built for operations, not just centralization. It ingests hundreds of internal and external sources, enriches them with AI, and aligns them to your intellige

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Enterprise
  • 43% Mid-Market
ThreatConnect TI Ops Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
5
Threat Detection
5
Ease of Use
4
Automation
3
Implementation Ease
3
Cons
UX Improvement
2
Additional Costs
1
API Limitations
1
Difficult Learning Curve
1
Difficult Setup
1
ThreatConnect TI Ops features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 9.0
8.1
Endpoint Intelligence
Average: 8.6
7.9
Ease of Use
Average: 9.1
Seller Details
Year Founded
2011
HQ Location
Arlington, US
Twitter
@ThreatConnect
14,220 Twitter followers
LinkedIn® Page
www.linkedin.com
155 employees on LinkedIn®