Introducing G2.ai, the future of software buying.Try now

Best Threat Intelligence Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies use these tools to keep their security standards up to date and fit to address new threats as they emerge. These tools can improve security performance by providing information on threats to their specific networks, infrastructure, and endpoint devices. Threat intelligence software provides information about hazards and how they function, their capabilities, and remediation techniques. IT administrators and security professionals use the delivered data to better protect their systems from emerging threats and plan for possible vulnerabilities. The tools alert users as new threats emerge and provide information detailing best practices for resolution.

Many products, like security information and event management (SIEM) software and vulnerability management software, can integrate with or provide similar information as threat intelligence products. Additionally, these products continue to integrate with artificial intelligence (AI) to better tailor this complex suite of data for specific organizations’ needs. These newer capabilities can include being able to generate threat reports based on newly aggregated threat intelligence data. This data directly pertains to the organization where the software is deployed. The newer capabilities also help in creating threat detection rules based on observed patterns in malicious actors’ behaviors.

To qualify for inclusion in the Threat Intelligence category, a product must:

Provide information on emerging threats and vulnerabilities
Detail remediation practices for common and emerging threats
Analyze global threats on different types of networks and devices
Cater threat information to specific IT solutions
Show More
Show Less

Featured Threat Intelligence Software At A Glance

Intezer
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Threat Intelligence Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
174 Listings in Threat Intelligence Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Flashpoint is the largest privately held threat intelligence provider, enabling mission-critical organizations to proactively confront security challenges globally. Flashpoint Ignite, our unified t

    Users
    No information available
    Industries
    • Financial Services
    • Security and Investigations
    Market Segment
    • 64% Enterprise
    • 22% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Flashpoint is a platform that offers a large amount of data and sources for research and setting up alerts, and is used for Vulnerability Management and Threat Intel.
    • Reviewers like the advanced filtering options, the ease of use, the collections feature, the AI summary capability, the clear roadmap for enhancements, the professional analysts, the ability to post by hacktivist groups and ransomware groups, and the extensive access to various sites and platforms.
    • Users experienced issues with the navigation being overwhelming or not intuitive, the alerting feature not matching with the alerting emails, constant platform changes and lack of documentation disrupting workflows, the RFI credits system being difficult to budget, the keyword alerting system being clunky, lack of actual intelligence reports, bugs and issues recurring, and some parts of the platform having separate interfaces.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Flashpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    21
    Features
    20
    Helpful
    14
    Search Functionality
    12
    Insights
    11
    Cons
    Complexity
    7
    Lack of Features
    7
    Limited Features
    6
    User Frustration
    6
    Confusing Interface
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flashpoint features and usability ratings that predict user satisfaction
    7.1
    Security Validation
    Average: 8.9
    8.2
    Intelligence Reports
    Average: 9.0
    7.0
    Endpoint Intelligence
    Average: 8.5
    8.4
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    New York, NY
    Twitter
    @FlashpointIntel
    13,887 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    341 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Flashpoint is the largest privately held threat intelligence provider, enabling mission-critical organizations to proactively confront security challenges globally. Flashpoint Ignite, our unified t

Users
No information available
Industries
  • Financial Services
  • Security and Investigations
Market Segment
  • 64% Enterprise
  • 22% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Flashpoint is a platform that offers a large amount of data and sources for research and setting up alerts, and is used for Vulnerability Management and Threat Intel.
  • Reviewers like the advanced filtering options, the ease of use, the collections feature, the AI summary capability, the clear roadmap for enhancements, the professional analysts, the ability to post by hacktivist groups and ransomware groups, and the extensive access to various sites and platforms.
  • Users experienced issues with the navigation being overwhelming or not intuitive, the alerting feature not matching with the alerting emails, constant platform changes and lack of documentation disrupting workflows, the RFI credits system being difficult to budget, the keyword alerting system being clunky, lack of actual intelligence reports, bugs and issues recurring, and some parts of the platform having separate interfaces.
Flashpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
21
Features
20
Helpful
14
Search Functionality
12
Insights
11
Cons
Complexity
7
Lack of Features
7
Limited Features
6
User Frustration
6
Confusing Interface
5
Flashpoint features and usability ratings that predict user satisfaction
7.1
Security Validation
Average: 8.9
8.2
Intelligence Reports
Average: 9.0
7.0
Endpoint Intelligence
Average: 8.5
8.4
Ease of Use
Average: 9.0
Seller Details
Company Website
Year Founded
2010
HQ Location
New York, NY
Twitter
@FlashpointIntel
13,887 Twitter followers
LinkedIn® Page
www.linkedin.com
341 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosyst

    Users
    • Software Engineer
    • Security Consultant
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 65% Mid-Market
    • 34% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RiskProfiler - External Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    65
    Features
    29
    Easy Integrations
    28
    Threat Detection
    28
    Customer Support
    27
    Cons
    Difficult Learning
    13
    Complexity
    12
    Learning Curve
    12
    Complex Setup
    8
    Learning Difficulty
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.9
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    181 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    29 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosyst

Users
  • Software Engineer
  • Security Consultant
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 65% Mid-Market
  • 34% Small-Business
RiskProfiler - External Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
65
Features
29
Easy Integrations
28
Threat Detection
28
Customer Support
27
Cons
Difficult Learning
13
Complexity
12
Learning Curve
12
Complex Setup
8
Learning Difficulty
7
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.9
Ease of Use
Average: 9.0
Seller Details
Company Website
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
181 Twitter followers
LinkedIn® Page
www.linkedin.com
29 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(25)4.9 out of 5
9th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatMon is an AI-powered Cyber Threat Intelligence platform designed to proactively detect, analyze, and respond to external cyber threats targeting organizations’ digital assets and reputation. Thi

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatMon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    10
    Threat Detection
    10
    Ease of Use
    7
    Detailed Analysis
    6
    Threat Intelligence
    6
    Cons
    Excessive Notifications
    4
    Information Overload
    4
    Limited Features
    4
    Inefficient Alerts
    3
    Inefficient Alert System
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatMon features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    9.9
    Intelligence Reports
    Average: 9.0
    9.6
    Endpoint Intelligence
    Average: 8.5
    9.7
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatMon
    Company Website
    Year Founded
    2018
    HQ Location
    Sterling VA
    Twitter
    @MonThreat
    15,473 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatMon is an AI-powered Cyber Threat Intelligence platform designed to proactively detect, analyze, and respond to external cyber threats targeting organizations’ digital assets and reputation. Thi

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 36% Enterprise
ThreatMon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
10
Threat Detection
10
Ease of Use
7
Detailed Analysis
6
Threat Intelligence
6
Cons
Excessive Notifications
4
Information Overload
4
Limited Features
4
Inefficient Alerts
3
Inefficient Alert System
3
ThreatMon features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
9.9
Intelligence Reports
Average: 9.0
9.6
Endpoint Intelligence
Average: 8.5
9.7
Ease of Use
Average: 9.0
Seller Details
Seller
ThreatMon
Company Website
Year Founded
2018
HQ Location
Sterling VA
Twitter
@MonThreat
15,473 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppel is built to outsmart the internet’s biggest threat—social engineering. Using generative AI, we don’t just defend; we disrupt attackers' tactics and infrastructures, providing holistic protectio

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Doppel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    12
    Helpful
    10
    Alerts
    8
    Response Time
    8
    Ease of Use
    7
    Cons
    Expensive
    2
    Not User-Friendly
    2
    Poor Detection Performance
    2
    Dashboard Issues
    1
    Information Overload
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppel features and usability ratings that predict user satisfaction
    9.1
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 9.0
    8.7
    Endpoint Intelligence
    Average: 8.5
    9.2
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppel
    Company Website
    Year Founded
    2022
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    236 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppel is built to outsmart the internet’s biggest threat—social engineering. Using generative AI, we don’t just defend; we disrupt attackers' tactics and infrastructures, providing holistic protectio

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Doppel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
12
Helpful
10
Alerts
8
Response Time
8
Ease of Use
7
Cons
Expensive
2
Not User-Friendly
2
Poor Detection Performance
2
Dashboard Issues
1
Information Overload
1
Doppel features and usability ratings that predict user satisfaction
9.1
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 9.0
8.7
Endpoint Intelligence
Average: 8.5
9.2
Ease of Use
Average: 9.0
Seller Details
Seller
Doppel
Company Website
Year Founded
2022
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
236 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

    Users
    No information available
    Industries
    • Security and Investigations
    Market Segment
    • 59% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dataminr Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Efficiency
    3
    Efficiency Improvement
    3
    Incident Management
    3
    Time-saving
    3
    Cons
    Inefficient Alerts
    2
    Information Overload
    2
    Lack of Customization
    2
    Complexity
    1
    Difficult Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dataminr features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 8.9
    7.6
    Intelligence Reports
    Average: 9.0
    8.0
    Endpoint Intelligence
    Average: 8.5
    8.5
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dataminr
    Year Founded
    2009
    HQ Location
    New York, NY
    Twitter
    @Dataminr
    16,480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    742 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

Users
No information available
Industries
  • Security and Investigations
Market Segment
  • 59% Enterprise
  • 33% Small-Business
Dataminr Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Efficiency
3
Efficiency Improvement
3
Incident Management
3
Time-saving
3
Cons
Inefficient Alerts
2
Information Overload
2
Lack of Customization
2
Complexity
1
Difficult Setup
1
Dataminr features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 8.9
7.6
Intelligence Reports
Average: 9.0
8.0
Endpoint Intelligence
Average: 8.5
8.5
Ease of Use
Average: 9.0
Seller Details
Seller
Dataminr
Year Founded
2009
HQ Location
New York, NY
Twitter
@Dataminr
16,480 Twitter followers
LinkedIn® Page
www.linkedin.com
742 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Information Technology and Services
    Market Segment
    • 73% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bitsight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    14
    Risk Management
    13
    Ease of Use
    12
    Customer Support
    9
    Features
    9
    Cons
    Missing Features
    5
    Poor Notifications
    4
    Delay Issues
    3
    Improvement Needed
    3
    Inadequate Remediation
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitsight features and usability ratings that predict user satisfaction
    8.5
    Security Validation
    Average: 8.9
    9.0
    Intelligence Reports
    Average: 9.0
    7.5
    Endpoint Intelligence
    Average: 8.5
    8.5
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,486 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    738 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

Users
No information available
Industries
  • Hospital & Health Care
  • Information Technology and Services
Market Segment
  • 73% Enterprise
  • 23% Mid-Market
Bitsight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
14
Risk Management
13
Ease of Use
12
Customer Support
9
Features
9
Cons
Missing Features
5
Poor Notifications
4
Delay Issues
3
Improvement Needed
3
Inadequate Remediation
3
Bitsight features and usability ratings that predict user satisfaction
8.5
Security Validation
Average: 8.9
9.0
Intelligence Reports
Average: 9.0
7.5
Endpoint Intelligence
Average: 8.5
8.5
Ease of Use
Average: 9.0
Seller Details
Seller
Bitsight
Company Website
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,486 Twitter followers
LinkedIn® Page
www.linkedin.com
738 employees on LinkedIn®
(30)4.9 out of 5
7th Easiest To Use in Threat Intelligence software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 63% Small-Business
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a software that aims to provide data security and prevent exfiltration for various clients, including those in the legal, medical, and insurance fields.
    • Users like the software's user-friendly interface, efficient management console, and its ability to detect and stop digital threats on systems, providing a sense of security and peace of mind.
    • Reviewers experienced interruptions when trying to access client websites, false positives that require time to clear, and a lack of an option to require a password before uninstalling the app.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackFog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    16
    Security
    16
    Customer Support
    12
    Ease of Use
    11
    Security Protection
    10
    Cons
    UX Improvement
    4
    MDM Issues
    3
    Alert Management
    2
    Complexity
    2
    Inadequate Security
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    9.7
    Intelligence Reports
    Average: 9.0
    9.8
    Endpoint Intelligence
    Average: 8.5
    9.3
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 63% Small-Business
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a software that aims to provide data security and prevent exfiltration for various clients, including those in the legal, medical, and insurance fields.
  • Users like the software's user-friendly interface, efficient management console, and its ability to detect and stop digital threats on systems, providing a sense of security and peace of mind.
  • Reviewers experienced interruptions when trying to access client websites, false positives that require time to clear, and a lack of an option to require a password before uninstalling the app.
BlackFog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
16
Security
16
Customer Support
12
Ease of Use
11
Security Protection
10
Cons
UX Improvement
4
MDM Issues
3
Alert Management
2
Complexity
2
Inadequate Security
2
BlackFog features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
9.7
Intelligence Reports
Average: 9.0
9.8
Endpoint Intelligence
Average: 8.5
9.3
Ease of Use
Average: 9.0
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,480 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 64% Mid-Market
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CYREBRO Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Customer Support
    13
    Alerts
    8
    Alerting System
    7
    Dashboard Usability
    7
    Cons
    Communication Issues
    6
    Poor Customer Support
    5
    Update Issues
    5
    Ineffective Alerts
    4
    Inefficient Alert System
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYREBRO features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.9
    8.6
    Intelligence Reports
    Average: 9.0
    8.9
    Endpoint Intelligence
    Average: 8.5
    8.8
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYREBRO
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @CYREBRO_IO
    315 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    101 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 64% Mid-Market
  • 25% Small-Business
CYREBRO Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Customer Support
13
Alerts
8
Alerting System
7
Dashboard Usability
7
Cons
Communication Issues
6
Poor Customer Support
5
Update Issues
5
Ineffective Alerts
4
Inefficient Alert System
4
CYREBRO features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.9
8.6
Intelligence Reports
Average: 9.0
8.9
Endpoint Intelligence
Average: 8.5
8.8
Ease of Use
Average: 9.0
Seller Details
Seller
CYREBRO
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@CYREBRO_IO
315 Twitter followers
LinkedIn® Page
www.linkedin.com
101 employees on LinkedIn®
(31)4.7 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenCTI is an open-source threat intelligence platform built by practitioners, for practitioners - to break data silos and make threat intelligence available and actionable. Make threat intelligence f

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenCTI by Filigran Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Features
    13
    Customer Support
    10
    Integrations
    8
    Integration Capabilities
    7
    Cons
    Feature Limitations
    5
    Complexity
    3
    Difficult Learning Curve
    3
    Learning Curve
    3
    Not User-Friendly
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenCTI by Filigran features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.8
    Intelligence Reports
    Average: 9.0
    8.1
    Endpoint Intelligence
    Average: 8.5
    8.2
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Filigran
    Company Website
    Year Founded
    2022
    HQ Location
    New York, US
    Twitter
    @FiligranHQ
    773 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenCTI is an open-source threat intelligence platform built by practitioners, for practitioners - to break data silos and make threat intelligence available and actionable. Make threat intelligence f

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Enterprise
  • 32% Mid-Market
OpenCTI by Filigran Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Features
13
Customer Support
10
Integrations
8
Integration Capabilities
7
Cons
Feature Limitations
5
Complexity
3
Difficult Learning Curve
3
Learning Curve
3
Not User-Friendly
3
OpenCTI by Filigran features and usability ratings that predict user satisfaction
0.0
No information available
8.8
Intelligence Reports
Average: 9.0
8.1
Endpoint Intelligence
Average: 8.5
8.2
Ease of Use
Average: 9.0
Seller Details
Seller
Filigran
Company Website
Year Founded
2022
HQ Location
New York, US
Twitter
@FiligranHQ
773 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DeCYFIR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    12
    Threat Intelligence
    10
    Cybersecurity
    9
    Features
    7
    Security
    7
    Cons
    Not User-Friendly
    4
    Complexity
    3
    Learning Curve
    3
    Limited Customization
    3
    Complex Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DeCYFIR features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.9
    9.0
    Intelligence Reports
    Average: 9.0
    9.2
    Endpoint Intelligence
    Average: 8.5
    8.8
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYFIRMA
    Year Founded
    2017
    HQ Location
    Singapore, SG
    Twitter
    @cyfirma
    996 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    122 employees on LinkedIn®
    Phone
    marketing@cyfirma.com
Product Description
How are these determined?Information
This description is provided by the seller.

DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Small-Business
  • 35% Mid-Market
DeCYFIR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
12
Threat Intelligence
10
Cybersecurity
9
Features
7
Security
7
Cons
Not User-Friendly
4
Complexity
3
Learning Curve
3
Limited Customization
3
Complex Setup
2
DeCYFIR features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.9
9.0
Intelligence Reports
Average: 9.0
9.2
Endpoint Intelligence
Average: 8.5
8.8
Ease of Use
Average: 9.0
Seller Details
Seller
CYFIRMA
Year Founded
2017
HQ Location
Singapore, SG
Twitter
@cyfirma
996 Twitter followers
LinkedIn® Page
www.linkedin.com
122 employees on LinkedIn®
Phone
marketing@cyfirma.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM X-Force Exchange features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 9.0
    8.1
    Endpoint Intelligence
    Average: 8.5
    9.3
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    708,845 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 29% Mid-Market
IBM X-Force Exchange features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 9.0
8.1
Endpoint Intelligence
Average: 8.5
9.3
Ease of Use
Average: 9.0
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
708,845 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
Ownership
SWX:IBM
(143)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Vulnerability Identification
    8
    Automation
    7
    Customer Support
    7
    Security
    6
    Cons
    Inadequate Reporting
    3
    Access Control
    2
    False Positives
    2
    Limited Reporting
    2
    Missing Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 9.0
    7.8
    Endpoint Intelligence
    Average: 8.5
    8.7
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,380 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    428 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Vulnerability Identification
8
Automation
7
Customer Support
7
Security
6
Cons
Inadequate Reporting
3
Access Control
2
False Positives
2
Limited Reporting
2
Missing Features
2
Pentera features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 9.0
7.8
Endpoint Intelligence
Average: 8.5
8.7
Ease of Use
Average: 9.0
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,380 Twitter followers
LinkedIn® Page
www.linkedin.com
428 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 54% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Information
    2
    Detection Accuracy
    2
    Ease of Use
    2
    Information Accuracy
    2
    Malware Protection
    2
    Cons
    Complex Interface
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Access Control
    1
    Data Privacy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 9.0
    9.0
    Endpoint Intelligence
    Average: 8.5
    9.1
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,295 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 54% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Information
2
Detection Accuracy
2
Ease of Use
2
Information Accuracy
2
Malware Protection
2
Cons
Complex Interface
2
Poor Interface Design
2
UX Improvement
2
Access Control
1
Data Privacy
1
Intezer features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 9.0
9.0
Endpoint Intelligence
Average: 8.5
9.1
Ease of Use
Average: 9.0
Seller Details
Seller
Intezer
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,295 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 37% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Threat Intelligence Exchange features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.6
    Intelligence Reports
    Average: 9.0
    8.1
    Endpoint Intelligence
    Average: 8.5
    8.4
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    242,437 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    812 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 37% Small-Business
Trellix Threat Intelligence Exchange features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.6
Intelligence Reports
Average: 9.0
8.1
Endpoint Intelligence
Average: 8.5
8.4
Ease of Use
Average: 9.0
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
242,437 Twitter followers
LinkedIn® Page
www.linkedin.com
812 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SophosLabs Intelix is a cloud-based threat intelligence and analysis platform that empowers developers and security professionals to enhance their applications and infrastructure with advanced cyberse

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SophosLabs Intelix features and usability ratings that predict user satisfaction
    7.3
    Security Validation
    Average: 8.9
    7.8
    Intelligence Reports
    Average: 9.0
    7.2
    Endpoint Intelligence
    Average: 8.5
    7.3
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,779 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,477 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

SophosLabs Intelix is a cloud-based threat intelligence and analysis platform that empowers developers and security professionals to enhance their applications and infrastructure with advanced cyberse

Users
No information available
Industries
No information available
Market Segment
  • 64% Small-Business
  • 29% Mid-Market
SophosLabs Intelix features and usability ratings that predict user satisfaction
7.3
Security Validation
Average: 8.9
7.8
Intelligence Reports
Average: 9.0
7.2
Endpoint Intelligence
Average: 8.5
7.3
Ease of Use
Average: 9.0
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,779 Twitter followers
LinkedIn® Page
www.linkedin.com
5,477 employees on LinkedIn®
Ownership
LSE:SOPH