G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
Cyber Intelligence House empowers Managed Security Service Providers (MSSPs), Cyber Insurers and cybersecurity consultancies with advanced Cyber Exposure and Threat Intelligence capabilities. Our
Cyber Threat Intelligence Feed delivers continuous up-to-the-minute information and context about cyberattacks that threaten an organization's safety. It enables comprehensive monitoring, detection, a
Darkweb Tracker is an advanced deep and dark web intelligence platform developed by StealthMole. Leveraging cutting-edge AI technology and open-source intelligence (OSINT) techniques, it systematicall
Dataminr Pulse for Cyber Risk is an AI-driven solution designed to enhance organizational resilience by providing real-time detection of external cyber events, risks, and threats. By analyzing over on
DynaRisk's Breach Defence software empowers small to medium sized businesses to be safer online. Cyber attacks are constant and are always evolving. 60% of SMEs can go out of business within 6 months
EclecticIQ Platform re-imagines intelligence, hunting and response, by delivering intelligence-led solutions to Threat Intelligence, Endpoint Security and Security Operations challenges.
Falcon Feeds.io is a cutting-edge, cloud-native SaaS platform that specializes in cyber threat intelligence. It vigilantly monitors and delivers the latest security incidents and insights on threat ac
Horizon® is an open source intelligence and data analysis platform that enables organizations to collect, analyze, and operationalize publicly available online information to support investigations, s
Infrawatch scans the global public IPv4 and IPv6 ranges for malicious infrastructure. Identify malicious hosts before they are operationalised by an adversary. Discover, block, and explore residential
Harness InQuest’s unique perspective and insight to find threats months before the competition. Our Threat Intelligence team gathers and analyzes unique data sources from open source industry feeds,
Ivanti Neurons for Vulnerability Knowledge Base (VULN KB) arms security experts with authoritative vulnerability threat intelligence plus risk-based scoring of vulnerabilities. Its intelligence is der
Jizô is a network observability platform that enables decision-makers to anticipate, identify and block cyber-attacks, thanks to unique and innovative AI. Jizô has proved to be highly effective on a
KELA’s Unified Threat Intelligence Platform is an all-in-one solution for Cyber Threat Intelligence (CTI), External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Third
Liferaft utilizes OSINT tools to provide a comprehensive and curated overview of active physical threats, information leaks, security exposures, and risks to your assets, operations, and people, all i