Introducing G2.ai, the future of software buying.Try now

Best Threat Intelligence Software - Page 3

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies use these tools to keep their security standards up to date and fit to address new threats as they emerge. These tools can improve security performance by providing information on threats to their specific networks, infrastructure, and endpoint devices. Threat intelligence software provides information about hazards and how they function, their capabilities, and remediation techniques. IT administrators and security professionals use the delivered data to better protect their systems from emerging threats and plan for possible vulnerabilities. The tools alert users as new threats emerge and provide information detailing best practices for resolution.

Many products, like security information and event management (SIEM) software and vulnerability management software, can integrate with or provide similar information as threat intelligence products. Additionally, these products continue to integrate with artificial intelligence (AI) to better tailor this complex suite of data for specific organizations’ needs. These newer capabilities can include being able to generate threat reports based on newly aggregated threat intelligence data. This data directly pertains to the organization where the software is deployed. The newer capabilities also help in creating threat detection rules based on observed patterns in malicious actors’ behaviors.

To qualify for inclusion in the Threat Intelligence category, a product must:

Provide information on emerging threats and vulnerabilities
Detail remediation practices for common and emerging threats
Analyze global threats on different types of networks and devices
Cater threat information to specific IT solutions
Show More
Show Less

Featured Threat Intelligence Software At A Glance

Free Plan Available:
Domain and IP Intelligence Feeds
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Threat Intelligence Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
174 Listings in Threat Intelligence Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TI Ops is the threat intelligence platform built for operations, not just centralization. It ingests hundreds of internal and external sources, enriches them with AI, and aligns them to your intellige

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Enterprise
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatConnect TI Ops Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    5
    Threat Detection
    5
    Ease of Use
    4
    Automation
    3
    Implementation Ease
    3
    Cons
    UX Improvement
    2
    Additional Costs
    1
    API Limitations
    1
    Difficult Learning Curve
    1
    Difficult Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatConnect TI Ops features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 9.0
    8.1
    Endpoint Intelligence
    Average: 8.5
    7.9
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Arlington, US
    Twitter
    @ThreatConnect
    14,261 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    162 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TI Ops is the threat intelligence platform built for operations, not just centralization. It ingests hundreds of internal and external sources, enriches them with AI, and aligns them to your intellige

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Enterprise
  • 43% Mid-Market
ThreatConnect TI Ops Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
5
Threat Detection
5
Ease of Use
4
Automation
3
Implementation Ease
3
Cons
UX Improvement
2
Additional Costs
1
API Limitations
1
Difficult Learning Curve
1
Difficult Setup
1
ThreatConnect TI Ops features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 9.0
8.1
Endpoint Intelligence
Average: 8.5
7.9
Ease of Use
Average: 9.0
Seller Details
Year Founded
2011
HQ Location
Arlington, US
Twitter
@ThreatConnect
14,261 Twitter followers
LinkedIn® Page
www.linkedin.com
162 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SpyCloud protects businesses from identity-based cyberattacks. We proactively alert security teams when their users' data has been compromised by a malware infection or third-party breach, and automat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SpyCloud features and usability ratings that predict user satisfaction
    7.5
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 9.0
    0.0
    No information available
    9.2
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SpyCloud
    Year Founded
    2016
    HQ Location
    Austin, Texas
    LinkedIn® Page
    www.linkedin.com
    258 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SpyCloud protects businesses from identity-based cyberattacks. We proactively alert security teams when their users' data has been compromised by a malware infection or third-party breach, and automat

Users
No information available
Industries
No information available
Market Segment
  • 46% Mid-Market
  • 38% Enterprise
SpyCloud features and usability ratings that predict user satisfaction
7.5
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 9.0
0.0
No information available
9.2
Ease of Use
Average: 9.0
Seller Details
Seller
SpyCloud
Year Founded
2016
HQ Location
Austin, Texas
LinkedIn® Page
www.linkedin.com
258 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    McAfee GTI for ESM delivers a constantly updated, rich feed that enables rapid discovery of events involving communications with suspicious or malicious IP addresses.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Global Threat Intelligence (GTI) features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 9.0
    8.6
    Endpoint Intelligence
    Average: 8.5
    8.0
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    242,555 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    768 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

McAfee GTI for ESM delivers a constantly updated, rich feed that enables rapid discovery of events involving communications with suspicious or malicious IP addresses.

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Trellix Global Threat Intelligence (GTI) features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 9.0
8.6
Endpoint Intelligence
Average: 8.5
8.0
Ease of Use
Average: 9.0
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
242,555 Twitter followers
LinkedIn® Page
www.linkedin.com
768 employees on LinkedIn®
(120)4.1 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automated Vulnerability Scanning. Affordably Priced For Everyone! With almost 70 new hidden vulnerabilities identified every day, you would need to be a super hero with X-ray vision to find them all.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 67% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VulScan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    41
    Features
    20
    Reporting Features
    17
    Scanning Efficiency
    17
    Integrations
    16
    Cons
    Inadequate Reporting
    10
    UX Improvement
    10
    Difficult Setup
    8
    Limited Reporting
    8
    Poor Customer Support
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VulScan features and usability ratings that predict user satisfaction
    8.1
    Security Validation
    Average: 8.9
    7.6
    Intelligence Reports
    Average: 9.0
    8.0
    Endpoint Intelligence
    Average: 8.5
    8.1
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,487 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,388 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automated Vulnerability Scanning. Affordably Priced For Everyone! With almost 70 new hidden vulnerabilities identified every day, you would need to be a super hero with X-ray vision to find them all.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 67% Small-Business
  • 32% Mid-Market
VulScan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
41
Features
20
Reporting Features
17
Scanning Efficiency
17
Integrations
16
Cons
Inadequate Reporting
10
UX Improvement
10
Difficult Setup
8
Limited Reporting
8
Poor Customer Support
8
VulScan features and usability ratings that predict user satisfaction
8.1
Security Validation
Average: 8.9
7.6
Intelligence Reports
Average: 9.0
8.0
Endpoint Intelligence
Average: 8.5
8.1
Ease of Use
Average: 9.0
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,487 Twitter followers
LinkedIn® Page
www.linkedin.com
5,388 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Log Management
    5
    Customer Support
    4
    Easy Integrations
    4
    Efficiency
    4
    Cons
    Poor Interface Design
    3
    UX Improvement
    3
    Complexity
    2
    Confusing Interface
    2
    Information Deficiency
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logpoint features and usability ratings that predict user satisfaction
    8.6
    Security Validation
    Average: 8.9
    8.6
    Intelligence Reports
    Average: 9.0
    8.8
    Endpoint Intelligence
    Average: 8.5
    8.3
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logpoint
    Company Website
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region
    Twitter
    @LogPointSIEM
    993 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    247 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 31% Small-Business
Logpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Log Management
5
Customer Support
4
Easy Integrations
4
Efficiency
4
Cons
Poor Interface Design
3
UX Improvement
3
Complexity
2
Confusing Interface
2
Information Deficiency
2
Logpoint features and usability ratings that predict user satisfaction
8.6
Security Validation
Average: 8.9
8.6
Intelligence Reports
Average: 9.0
8.8
Endpoint Intelligence
Average: 8.5
8.3
Ease of Use
Average: 9.0
Seller Details
Seller
Logpoint
Company Website
Year Founded
2001
HQ Location
Copenhagen, Capital Region
Twitter
@LogPointSIEM
993 Twitter followers
LinkedIn® Page
www.linkedin.com
247 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Defendify All-In-One Cybersecurity Solution Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Cybersecurity
    6
    Easy Setup
    5
    Insights
    5
    Monitoring
    5
    Cons
    Inadequate Reporting
    4
    Poor Reporting
    4
    Lack of Information
    2
    Limited Customization
    2
    Limited Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    8.7
    Intelligence Reports
    Average: 9.0
    9.3
    Endpoint Intelligence
    Average: 8.5
    9.4
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    310 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity Solution Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Cybersecurity
6
Easy Setup
5
Insights
5
Monitoring
5
Cons
Inadequate Reporting
4
Poor Reporting
4
Lack of Information
2
Limited Customization
2
Limited Features
2
Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
8.7
Intelligence Reports
Average: 9.0
9.3
Endpoint Intelligence
Average: 8.5
9.4
Ease of Use
Average: 9.0
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
310 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra Brand Protection safeguards organization’s critical digital assets and data by detecting and quickly mitigating lookalike domains, phishing sites, fake social profiles, and other external threa

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 49% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fortra Brand Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    5
    Monitoring
    5
    Ease of Use
    3
    Response Time
    3
    Security
    3
    Cons
    Expensive
    3
    Difficult Initial Setup
    1
    Difficult Learning Curve
    1
    Difficult Setup
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra Brand Protection features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 9.0
    9.2
    Endpoint Intelligence
    Average: 8.5
    8.7
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Company Website
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,565 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,694 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra Brand Protection safeguards organization’s critical digital assets and data by detecting and quickly mitigating lookalike domains, phishing sites, fake social profiles, and other external threa

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 49% Mid-Market
  • 29% Small-Business
Fortra Brand Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
5
Monitoring
5
Ease of Use
3
Response Time
3
Security
3
Cons
Expensive
3
Difficult Initial Setup
1
Difficult Learning Curve
1
Difficult Setup
1
Learning Curve
1
Fortra Brand Protection features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 9.0
9.2
Endpoint Intelligence
Average: 8.5
8.7
Ease of Use
Average: 9.0
Seller Details
Seller
Fortra
Company Website
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,565 Twitter followers
LinkedIn® Page
www.linkedin.com
1,694 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 65% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point SandBlast Advanced Network Threat Prevention Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Integrations
    3
    Threat Detection
    3
    Security Protection
    2
    Accuracy of Information
    1
    Cons
    Cost
    2
    Expensive
    2
    High Resource Usage
    1
    Incomplete Information
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point SandBlast Advanced Network Threat Prevention features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 9.0
    9.0
    Endpoint Intelligence
    Average: 8.5
    7.8
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 65% Mid-Market
  • 29% Enterprise
Check Point SandBlast Advanced Network Threat Prevention Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Integrations
3
Threat Detection
3
Security Protection
2
Accuracy of Information
1
Cons
Cost
2
Expensive
2
High Resource Usage
1
Incomplete Information
1
Limited Customization
1
Check Point SandBlast Advanced Network Threat Prevention features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 9.0
9.0
Endpoint Intelligence
Average: 8.5
7.8
Ease of Use
Average: 9.0
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,953 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SIRP features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 9.0
    9.8
    Endpoint Intelligence
    Average: 8.5
    9.5
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SIRP
    Year Founded
    2017
    HQ Location
    London
    Twitter
    @sirp_io
    73 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Small-Business
  • 37% Mid-Market
SIRP features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 9.0
9.8
Endpoint Intelligence
Average: 8.5
9.5
Ease of Use
Average: 9.0
Seller Details
Seller
SIRP
Year Founded
2017
HQ Location
London
Twitter
@sirp_io
73 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    9.3
    Security Validation
    Average: 8.9
    9.5
    Intelligence Reports
    Average: 9.0
    8.9
    Endpoint Intelligence
    Average: 8.5
    7.9
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    14,153 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego features and usability ratings that predict user satisfaction
9.3
Security Validation
Average: 8.9
9.5
Intelligence Reports
Average: 9.0
8.9
Endpoint Intelligence
Average: 8.5
7.9
Ease of Use
Average: 9.0
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
14,153 Twitter followers
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zignal's real-time intelligence technology helps the world's largest organizations protect their people, places, and position.

    Users
    No information available
    Industries
    • Public Relations and Communications
    Market Segment
    • 40% Enterprise
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zignal Labs features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    7.2
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    San Francisco, California
    Twitter
    @ZignalLabs
    3,363 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    66 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zignal's real-time intelligence technology helps the world's largest organizations protect their people, places, and position.

Users
No information available
Industries
  • Public Relations and Communications
Market Segment
  • 40% Enterprise
  • 30% Mid-Market
Zignal Labs features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
7.2
Ease of Use
Average: 9.0
Seller Details
Year Founded
2011
HQ Location
San Francisco, California
Twitter
@ZignalLabs
3,363 Twitter followers
LinkedIn® Page
www.linkedin.com
66 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 9.0
    8.7
    Endpoint Intelligence
    Average: 8.5
    8.8
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,630 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 9.0
8.7
Endpoint Intelligence
Average: 8.5
8.8
Ease of Use
Average: 9.0
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,630 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OnSecurity is a leading CREST-accredited penetration testing vendor based in the UK, dedicated to delivering high-impact, high-intelligence penetration testing services to businesses of all sizes. B

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 64% Small-Business
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OnSecurity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.6
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Bristol, GB
    Twitter
    @weareonsecurity
    1,352 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OnSecurity is a leading CREST-accredited penetration testing vendor based in the UK, dedicated to delivering high-impact, high-intelligence penetration testing services to businesses of all sizes. B

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 64% Small-Business
  • 31% Mid-Market
OnSecurity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.6
Ease of Use
Average: 9.0
Seller Details
Year Founded
2018
HQ Location
Bristol, GB
Twitter
@weareonsecurity
1,352 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scout Ultimate is a web-based threat intelligence tool for security analysts of all experience levels. With a simple GUI, graphical displays, tagged results, and easy to use searches, it helps quickl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Mid-Market
    • 22% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pure Signal™ Scout features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    9.4
    Intelligence Reports
    Average: 9.0
    7.9
    Endpoint Intelligence
    Average: 8.5
    9.6
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1998
    HQ Location
    Lake Mary, FL
    Twitter
    @teamcymru
    41,175 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    121 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scout Ultimate is a web-based threat intelligence tool for security analysts of all experience levels. With a simple GUI, graphical displays, tagged results, and easy to use searches, it helps quickl

Users
No information available
Industries
No information available
Market Segment
  • 56% Mid-Market
  • 22% Enterprise
Pure Signal™ Scout features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
9.4
Intelligence Reports
Average: 9.0
7.9
Endpoint Intelligence
Average: 8.5
9.6
Ease of Use
Average: 9.0
Seller Details
Company Website
Year Founded
1998
HQ Location
Lake Mary, FL
Twitter
@teamcymru
41,175 Twitter followers
LinkedIn® Page
www.linkedin.com
121 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Social Links is a global OSINT (Open Source Intelligence) vendor that empowers investigators and security professionals with ground-breaking AI-powered products. We assemble massive volumes of data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Small-Business
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SL Professional features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 9.0
    10.0
    Endpoint Intelligence
    Average: 8.5
    9.7
    Ease of Use
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    New York, US
    Twitter
    @_SocialLinks_
    13,851 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    90 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Social Links is a global OSINT (Open Source Intelligence) vendor that empowers investigators and security professionals with ground-breaking AI-powered products. We assemble massive volumes of data

Users
No information available
Industries
No information available
Market Segment
  • 73% Small-Business
  • 18% Mid-Market
SL Professional features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 9.0
10.0
Endpoint Intelligence
Average: 8.5
9.7
Ease of Use
Average: 9.0
Seller Details
Year Founded
2015
HQ Location
New York, US
Twitter
@_SocialLinks_
13,851 Twitter followers
LinkedIn® Page
www.linkedin.com
90 employees on LinkedIn®