Dataminr Features
Orchestration (4)
Asset Management
Lets users group and organize their endpoints to gather threat intelligence on specific technologies. This feature was mentioned in 10 Dataminr reviews.
Security Workflow Automation
Based on 10 Dataminr reviews. Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.
Deployment
The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.
Sandboxing
A feature that allows security testing and information gathering to occur in a secure, resource independent environment.
Information (3)
Proactive Alerts
Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. 10 reviewers of Dataminr have provided feedback on this feature.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Intelligence Reports
The ability for users to produce reports outlining detailed and personalized threat information
Personalization (3)
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Security Validation
The product has a recurring examination process to update your intelligence reports as new threats emerge.
Dynamic/Code Analysis
The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.
Media Channels (2)
Broadcast Media
Monitors broadcast media such as television and radio news
Online Media
Monitors online media such as blogs, websites, and social media
Geographic Coverage (3)
Local Media
Monitors media channels at the local level
National Media
Monitors media channels at the national level
International Media
Monitors international news coverage
Reporting (4)
Keyword Targeting
Enables users to search media channels for specific keywords, brand mentions, or topics
Custom Feeds and Alerts
Allows users to create custom feeds and/or receive real-time alerts for relevant media mentions
Custom Reports
Allows users to build custom reports that can be shared with clients and stakeholders
Dashboards
Provides dashboards for quick visualizations of relevant media coverage and analytics
Functionality (8)
Monitoring - Deep Web
Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web.
Monitoring - Dark Web
Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums.
Analysis
Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations.
Ticketing
Integrates into ticketing or CRM platforms via API integrations.
Simple Search
Search through real-time and historical data without using technical query language.
Leak Source
Provides additional context and analysis to help identify the source of leaked information.
Centralized Dashboard
Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software.
Real-Time Alerts
Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.
Platform (3)
Reporting and Analytics
Produces summative reports for threats, and creates threat trend analysis using historical data.
Connections and Integrations
Connects to a variety of software and hardware, including IoT devices, vehicles, and other public and private databases.
Collaboration Tools
Offers communication, workflow, and dashboard customizations to support collaborative response on multiple threats.
Threat Monitoring (3)
Threat Alerts
Allows real-time rules and alerts to be triggered based on pre-set criteria.
Continuous Monitoring
Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.
Investigation Management
Provides customizable investigation workflows, data governance, and audit tracking to support threat investigation and mitigation, for both safety and legal reasons.
Threat Assessment (2)
Graphical and Link Analysis
Allows users to visually link connections and relationships, and utlize graphs, GIS, and maps to identify trends more easily.
Threat Scoring
Allows threat methodology to be applied to individual threats to assess their priority.
Threat Identification (2)
Proactive Listening
Continuously monitors various social media channels, deep and dark web, and situational signals to proactively identify potential threats.
External Data Mining
Compiles data from various public research databases, including OSINT, public records, and criminal and civil records.
Emergency Management (6)
Mass Alerts and Notifications
Broadcasts real-time updates and alerts to internal and external individuals when an incident escalates, and allows targeted updates to users based on location.
Threat Monitoring
Offers risk intelligence tools to proactively monitor and assess threats as they arise.
Geolocation
Utilizes geolocation to track personnel, and supports geo-tagged media for field updates.
Integrated Response
Integrates with necessary business systems, such as IT and communications platforms, to facilitate faster alerts and responses.
Crisis Communication
Enables collaboration and communication between public and private partner organizations to resolve an incident.
Post-Event Analysis
Generates reports and insights after each event to assess response efficiency and compliance, and identify areas for improvement.
Emergency Planning (3)
Scenario Planning
Stores emergency planning documentation and task assignments for a variety of scenarios.
Automated Workflows
Configures thresholds for triggering automated incident initiation responses based on user preferences.
Auditing & Compliance
Maintains audit trails and mandated compliance for emergency management protocols.
Generative AI (6)
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
Condenses long documents or text into a brief summary.
Generate Attack Scenarios
Use AI to propose possible threat actor tactics, techniques, and procedures against specific environments or assets.
Generate Threat Detection Rules
Use AI to automatically create detection rules based on observed patterns.
Generate Threat Summaries
Use AI to produce concise summaries of complex threat reports or alerts.
Data Sources - Risk Intelligence (5)
Dark Web Monitoring,
Gathers data from the dark web.
Industry-Specific Data
Tailors data sources relevant to specific industries like media, tourism, healthcare, and finance.
Data Timeliness
Updates data in real time or near real time.
Government and Public Records
Provides data from government documents and public records such as public financial filings, sanctions lists, and patent information.
Media Monitoring
Monitors traditional and social media, including blogs and podcasts.
Analysis & Reporting - Risk Intelligence (5)
Benchmarking
Benchmarks against industry peers and provides competitive analysis.
Risk Scoring
Risk factors are scored based on severity, probability of occurrence, and potential impact.
Artificial Intelligence
Generates data insights and analysis using AI.
Dashboard
Offers customizable data analysis dashboard.
Integrations
Integrates with risk management and communication tools.
Agentic AI - Threat Intelligence (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Media Monitoring (5)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting

You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.




