Skip to Navigation
Skip to Navigation
G2 - Business Software Reviews
Search software
Software
Expand/Collapse Software
AI Agents
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
For Developers
Use our Developer Portal to test API data
Deals
Leave a Review
Join or Log In
Search
Search Software and Services
Expand/Collapse
Home
...
Threat Intelligence Software
DeCYFIR by CYFIRMA
Microsoft Defender Threat...
DeCYFIR by CYFIRMA-vs-Microsoft Defender Threat...
Compare DeCYFIR by CYFIRMA and Microsoft Defender Threat Intelligence
Social Share Options
All Categories
Threat Intelligence
All Reviewers
Small-Business Reviewers
Mid-Market Reviewers
Large Enterprise Reviewers
Save to Research Board
Featured Products
Sponsored
ReversingLabs
4.7/5
(10)
Visit Website
Sponsored
Ideally
4.8/5
(48)
Visit Website
Sponsored
Aikido Security
4.6/5
(139)
Visit Website
At a Glance
Pricing
Ratings
Features
Reviews
Alternatives
Discussions
Add Product
DeCYFIR by CYFIRMA
(23)
4.7
out of
5
DeCYFIR by CYFIRMA
By
CYFIRMA
Microsoft Defender Threat Intelligence
(23)
4.3
out of
5
Microsoft Defender Threat Intelligence
By
Microsoft
At a Glance
Star Rating
(23)
4.7
out of
5
(23)
4.3
out of
5
Market Segments
Small-Business (43.5% of reviews)
Information
Small-Business (42.1% of reviews)
Information
Pros & Cons
Threat Detection
(12)
Threat Intelligence
(10)
Not User-Friendly
(4)
Complexity
(3)
Ease of Use
(4)
Automation
(1)
Incomplete Information
(2)
Information Overload
(1)
Entry-Level Pricing
No pricing available
No pricing available
DeCYFIR by CYFIRMA
Star Rating
(23)
4.7
out of
5
Market Segments
Small-Business (43.5% of reviews)
Information
Pros & Cons
Threat Detection
(12)
Threat Intelligence
(10)
Not User-Friendly
(4)
Complexity
(3)
Entry-Level Pricing
No pricing available
Learn more about DeCYFIR by CYFIRMA
Microsoft Defender Threat Intelligence
Star Rating
(23)
4.3
out of
5
Market Segments
Small-Business (42.1% of reviews)
Information
Pros & Cons
Ease of Use
(4)
Automation
(1)
Incomplete Information
(2)
Information Overload
(1)
Entry-Level Pricing
No pricing available
Learn more about Microsoft Defender Threat Intelligence
DeCYFIR by CYFIRMA vs Microsoft Defender Threat Intelligence
Reviewers felt that DeCYFIR by CYFIRMA meets the needs of their business better than Microsoft Defender Threat Intelligence.
When comparing quality of ongoing product support, reviewers felt that DeCYFIR by CYFIRMA is the preferred option.
For feature updates and roadmaps, our reviewers preferred the direction of Microsoft Defender Threat Intelligence over DeCYFIR by CYFIRMA.
Pricing
Entry-Level Pricing
DeCYFIR by CYFIRMA
No pricing available
Microsoft Defender Threat Intelligence
No pricing available
Free Trial
DeCYFIR by CYFIRMA
No trial information available
Microsoft Defender Threat Intelligence
No trial information available
Ratings
Meets Requirements
9.2
21
8.7
18
Ease of Use
8.8
23
8.6
18
Ease of Setup
8.8
20
8.3
6
Ease of Admin
9.0
13
Not enough data
Quality of Support
9.0
21
8.7
18
Has the product been a good partner in doing business?
9.2
14
Not enough data
Product Direction (% positive)
9.3
17
10.0
18
Features by Category
Vulnerability Scanner
Hide 12 Features
Show 12 Features
Not enough data
Not enough data
Performance
Issue Tracking
Not enough data
Not enough data
Detection Rate
Not enough data
Not enough data
False Positives
Not enough data
Not enough data
Automated Scans
Not enough data
Not enough data
Network
Compliance Testing
Not enough data
Not enough data
Perimeter Scanning
Not enough data
Not enough data
Configuration Monitoring
Not enough data
Not enough data
Application
Manual Application Testing
Not enough data
Not enough data
Static Code Analysis
Not enough data
Not enough data
Black Box Testing
Not enough data
Not enough data
Agentic AI - Vulnerability Scanner
Autonomous Task Execution
Not enough data
Not enough data
Proactive Assistance
Not enough data
Not enough data
Risk-Based Vulnerability Management
Hide 11 Features
Show 11 Features
Not enough data
Not enough data
Risk Analysis
Risk Scoring
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Risk-Prioritization
Not enough data
Not enough data
Vulnerability Assesment
Vulnerability Scanning
Not enough data
Not enough data
Vulnerability Intelligence
Not enough data
Not enough data
Contextual Data
Not enough data
Not enough data
Dashboards
Not enough data
Not enough data
Automation
Automated Remediation
Not enough data
Not enough data
Workflow Automation
Not enough data
Not enough data
Security Testing
Not enough data
Not enough data
Test Automation
Not enough data
Not enough data
Malware Analysis Tools
Hide 11 Features
Show 11 Features
Not enough data
Not enough data
Detection
Malware Detection
Not enough data
Not enough data
Compliance Monitoring
Not enough data
Not enough data
Threat Alerting
Not enough data
Not enough data
Analysis
Malware Evaluation
Not enough data
Not enough data
Sandboxing
Not enough data
Not enough data
Threat Intelligence
Not enough data
Not enough data
File Analysis
Not enough data
Not enough data
Response
Response Automation
Not enough data
Not enough data
Malware Removal
Not enough data
Not enough data
Data Protection
Not enough data
Not enough data
Generative AI
AI Text Summarization
Not enough data
Not enough data
Dark Web Monitoring
Hide 8 Features
Show 8 Features
Not enough data
Not enough data
Functionality
Monitoring - Deep Web
Not enough data
Not enough data
Monitoring - Dark Web
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Ticketing
Not enough data
Not enough data
Simple Search
Not enough data
Not enough data
Leak Source
Not enough data
Not enough data
Centralized Dashboard
Not enough data
Not enough data
Real-Time Alerts
Not enough data
Not enough data
Attack Surface Management
Hide 12 Features
Show 12 Features
Not enough data
Not enough data
Asset Management
Asset Discovery
Not enough data
Not enough data
Shadow IT Detection
Not enough data
Not enough data
Change Management
Not enough data
Not enough data
Monitoring
Gap Analysis
Not enough data
Not enough data
Vulnerability Intelligence
Not enough data
Not enough data
Compliance Monitoring
Not enough data
Not enough data
Continuous Monitoring
Not enough data
Not enough data
Risk Management
Risk-Prioritization
Not enough data
Not enough data
Reconnaissance
Not enough data
Not enough data
At-Risk Analysis
Not enough data
Not enough data
Threat Intelligence
Not enough data
Not enough data
Generative AI
AI Text Summarization
Not enough data
Not enough data
Disinformation Detection Tools
Hide 2 Features
Show 2 Features
Not enough data
Not enough data
Functionality
Detection
Not enough data
Not enough data
Media type
Not enough data
Not enough data
Brand Intelligence
Hide 5 Features
Show 5 Features
Not enough data
Not enough data
Brand Signals
Comparison
Not enough data
Not enough data
AI
Not enough data
Not enough data
Brand Health
Not enough data
Not enough data
Brand Analytics
Trend Analysis
Not enough data
Not enough data
Tracking
Not enough data
Not enough data
Digital Risk Protection (DRP) Platforms
Hide 12 Features
Show 12 Features
Not enough data
Not enough data
Vulnerability Management - Digital Risk Protection (DRP) Platforms
Vulnerability Assessment
Not enough data
Not enough data
Digital Footprint Mapping
Not enough data
Not enough data
Fraud Detection
Not enough data
Not enough data
Data Leak Detection
Not enough data
Not enough data
Anti-Counterfeiting
Not enough data
Not enough data
Brand Protection
Not enough data
Not enough data
Incident Response Digital Risk Protection (DRP) Platforms
Threat Remediation
Not enough data
Not enough data
Automated Reponses
Not enough data
Not enough data
Incident Response Capabilities
Not enough data
Not enough data
Reporting and Analytics - Digital Risk Protection (DRP) Platforms
Threat Trends Analysis
Not enough data
Not enough data
Risk Assessment Reports
Not enough data
Not enough data
Customizable Dashboards
Not enough data
Not enough data
Threat Intelligence
Hide 18 Features
Show 18 Features
8.9
14
8.3
13
Orchestration
Asset Management
8.7
(won by 0.6)
14
8.1
9
Security Workflow Automation
8.7
(won by 0.7)
14
8.0
9
Deployment
9.3
(won by 0.6)
14
8.7
10
Sandboxing
9.0
(won by 0.7)
14
8.3
10
Information
Proactive Alerts
9.2
(won by 1.2)
14
8.0
11
Malware Detection
9.3
(won by 1.0)
14
8.3
11
Intelligence Reports
9.0
(won by 0.5)
14
8.5
9
Personalization
Endpoint Intelligence
9.2
(won by 0.7)
14
8.5
10
Security Validation
9.0
(won by 0.8)
14
8.2
10
Dynamic/Code Analysis
9.0
(won by 0.7)
14
8.3
10
Generative AI
AI Text Summarization
9.0
(won by default)
12
Not enough data
Generate Attack Scenarios
Not enough data
Not enough data
Generate Threat Detection Rules
Not enough data
Not enough data
Generate Threat Summaries
Not enough data
Not enough data
Agentic AI - Threat Intelligence
Autonomous Task Execution
8.5
(won by default)
11
Not enough data
Multi-step Planning
8.8
(won by default)
11
Not enough data
Proactive Assistance
8.6
(won by default)
11
Not enough data
Decision Making
8.5
(won by default)
11
Not enough data
Categories
Categories
Shared Categories
DeCYFIR by CYFIRMA
Microsoft Defender Threat Intelligence
DeCYFIR by CYFIRMA and Microsoft Defender Threat Intelligence are categorized as
Threat Intelligence
Unique Categories
DeCYFIR by CYFIRMA is categorized as
Digital Risk Protection (DRP) Platforms
,
Brand Intelligence
,
Risk-Based Vulnerability Management
,
Vulnerability Scanner
,
Dark Web Monitoring
,
Disinformation Detection Tools
,
Attack Surface Management
, and
Malware Analysis Tools
Microsoft Defender Threat Intelligence has no unique categories
Reviews
Reviewers' Company Size
DeCYFIR by CYFIRMA
Small-Business
(50 or fewer emp.)
43.5%
Mid-Market
(51-1000 emp.)
34.8%
Enterprise
(> 1000 emp.)
21.7%
Microsoft Defender Threat Intelligence
Small-Business
(50 or fewer emp.)
42.1%
Mid-Market
(51-1000 emp.)
26.3%
Enterprise
(> 1000 emp.)
31.6%
Small-Business
(50 or fewer emp.)
43.5%
42.1%
Mid-Market
(51-1000 emp.)
34.8%
26.3%
Enterprise
(> 1000 emp.)
21.7%
31.6%
Reviewers' Industry
DeCYFIR by CYFIRMA
Information Technology and Services
43.5%
Computer & Network Security
17.4%
Telecommunications
13.0%
Consulting
8.7%
Higher Education
4.3%
Other
13.0%
Microsoft Defender Threat Intelligence
Computer & Network Security
26.3%
Computer Software
15.8%
Information Technology and Services
10.5%
Security and Investigations
5.3%
Retail
5.3%
Other
36.8%
Alternatives
DeCYFIR by CYFIRMA Alternatives
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Wiz
Add Wiz
Qualtrics Strategy & Research
Add Qualtrics Strategy & Research
LastPass
Add LastPass
See all alternatives
Microsoft Defender Threat Intelligence Alternatives
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Cloudflare Application...
Add Cloudflare Application Security and Performance
Recorded Future
Add Recorded Future
Cisco Talos
Add Cisco Talos
See all alternatives
Discussions
DeCYFIR by CYFIRMA Discussions
DeCYFIR by CYFIRMA has no discussions with answers
See all discussions
Microsoft Defender Threat Intelligence Discussions
Microsoft Defender Threat Intelligence has no discussions with answers
See all discussions
Ask DeCYFIR by CYFIRMA a Question
Contact DeCYFIR by CYFIRMA
Ask Microsoft Defender Threat... a Question
Contact Microsoft Defender Threat...
Spotlight Categories
SMS Marketing Software
Auto Dialer Software
Accounts Receivable Software
Board Management Software
At a Glance
Pricing
Ratings
Features
Reviews
Alternatives
Discussions
Add Product
DeCYFIR by CYFIRMA
Microsoft Defender Threat Intelligence
Hunting for software
insights
?
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google
By proceeding, you agree to our
Terms of Use
and
Privacy Policy
Add more products
Search for Software and Services
Suggested Products
Cisco Talos
(42)
4.4
out of
5
Add
Recorded Future
(220)
4.6
out of
5
Add
Lookout
(69)
4.3
out of
5
Add