Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Cofense Intelligence


Cofense Intelligence uses proprietary techniques to analyze millions of messages daily from a wide variety of sources.

Work for Cofense Intelligence?

Learning about Cofense Intelligence?

We can help you find the solution that fits you best.

Cofense Intelligence Reviews

Ask Cofense Intelligence a Question
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
Showing 1 Cofense Intelligence review
LinkedIn Connections
Cofense Intelligence review by Megan J.
Megan J.
Validated Reviewer
Verified Current User
Review Source

"PhishMe Experience"

What do you like best?

I like the ability to customize a scenario and tailor it to the person or group I am phishing.

What do you dislike?

I dislike the limited options there are for a file attachment option in English. I wish there could be more options to choose from that are more work related or technology related as to become more believable.

Recommendations to others considering the product

It is a good software to go with as the on-boarding is very easy and thorough process. Everyone is very helpful and it is easy to start creating your own scenarios and then implementing them throughout your business or workplace.

What business problems are you solving with the product? What benefits have you realized?

We are discovering how many people are susceptible to phishing scams or viruses in a professional environment. We are also determining how many people would need extra training or advice on how to stop email scams.

Sign in to G2 to see what your connections have to say about Cofense Intelligence

What Threat Intelligence solution do you use?

Thanks for letting us know!

There are not enough reviews of Cofense Intelligence for G2 to provide buying insight. Below are some alternatives with more reviews:

McAfee Threat Intelligence Exchange Logo
McAfee Threat Intelligence Exchange
McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.
F-Secure Logo
Going beyond malware protection, F-Secure provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.
Amazon GuardDuty Logo
Amazon GuardDuty
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
Cisco Talos Logo
Cisco Talos
Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.
Alert Logic Cybersecurity Logo
Alert Logic Cybersecurity
Alert Logic provides flexible security and compliance offerings to deliver optimal coverage across your environments.
Vectra AI Logo
Vectra AI
Vectra AI provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.
SolarWinds MSP Threat Monitor Logo
SolarWinds MSP Threat Monitor
SolarWinds Threat Monitor empowers MSSPs of all sizes by reducing the complexity and cost of threat detection, response, and reporting. You get an all-in-one security operations center (SOC) that is unified, scalable, and affordable.
Flowmon Logo
Flowmon Networks provides a solution that helps companies to enhance performance of their networks and secure them against modern cyber threats.
FortiSandbox Logo
FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.
SecureWorks Logo
SCWX is a cybersecurity company that works to provide an early warning system for evolving cyber threats, enabling to prevent, detect, rapidly respond to and predict cyberattacks.
Show more
Kate from G2

Learning about Cofense Intelligence?

I can help.
* We monitor all Cofense Intelligence reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.