Introducing G2.ai, the future of software buying.Try now
It's been two months since this profile received a new review
Leave a Review

Threat Command by Rapid7 Reviews & Product Details

Profile Status

This profile is currently managed by Threat Command by Rapid7 but has limited features.

Are you part of the Threat Command by Rapid7 team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Threat Command by Rapid7 Media

Threat Command by Rapid7 Demo - IntSights - Threat Command
Main dashboard of IntSights Threat Command.
Threat Command by Rapid7 Demo - IntSights - Threat Alerts - Analyst View
View of automated threat alerts, tailored to the organization's digital footprint and digital assets.
Threat Command by Rapid7 Demo - IntSights - Threat Investigation - TIP
The module within IntSights Threat Intelligence Platform to conduct in-depth investigations and external threat hunting.
Threat Command by Rapid7 Demo - IntSights - Technology Alliance Partners - TAP Integrations
Current list of IntSights' Technology Alliance Partners (TAPs) with technical integrations to and from IntSights External Threat Protection Suite.
Product Avatar Image

Have you used Threat Command by Rapid7 before?

Answer a few questions to help the Threat Command by Rapid7 community

Threat Command by Rapid7 Reviews (2)

Reviews

Threat Command by Rapid7 Reviews (2)

4.0
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Environmental Services
UE
Mid-Market (51-1000 emp.)
"Threat Command is the software to use for Cybersecurity Solutions"
What do you like best about Threat Command by Rapid7?

Everything can be found in just place yet easily identifiable. It is very easy to add a new system and run the scans. It shows deep insights into the vulnerabilities found in the network and how to remediate them. Review collected by and hosted on G2.com.

What do you dislike about Threat Command by Rapid7?

Sometimes it also shows an extra vulnerability that might not exactly relate to your application, and you end up researching about it and then after all that time, you come to know that it is not for you. Review collected by and hosted on G2.com.

AG
Investigator
Enterprise (> 1000 emp.)
"Was better before"
What do you like best about Threat Command by Rapid7?

The platform is fairly easy to use. The newly revamped assets page is much better than before. Review collected by and hosted on G2.com.

What do you dislike about Threat Command by Rapid7?

Policies and alert profiler are complicated to set up. Review collected by and hosted on G2.com.

There are not enough reviews of Threat Command by Rapid7 for G2 to provide buying insight. Below are some alternatives with more reviews:

1
LastPass Logo
LastPass
4.4
(1,942)
LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).
2
Progress WhatsUp Gold Logo
Progress WhatsUp Gold
4.4
(385)
WhatsUp Gold is unified infrastructure and application monitoring software that gives modern IT teams the ability to monitor their increasingly complex IT environment with a single product.
3
1Password Logo
1Password
4.6
(1,608)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.
4
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,180)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
5
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(579)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
6
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.6
(363)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
7
usecure Logo
usecure
4.7
(293)
usecure enables businesses to measure their employee security posture against evolving cyber threats, reduce security incidents caused by human error and demonstrate compliance with core security standards To manage human cyber risk, usecure combines user-tailored security awareness training programs, custom phishing simulations, ongoing dark web monitoring, simplified policy management processes and ongoing human risk scoring.
8
Recorded Future Logo
Recorded Future
4.6
(215)
Recorded Future Intelligence Cloud elevates your existing security defenses by enhancing the depth and breadth of protection by giving you insights into threats and attacks before they impact, so you can stay ahead of attackers, at the speed and scale of today’s threat environment.
9
Intezer Logo
Intezer
4.5
(193)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
10
Cyberint, a Check Point Company Logo
Cyberint, a Check Point Company
4.6
(151)
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.
Show More
Discussions related to Threat Command by Rapid7

Discussions for this product are not available at this time. Be the first one to Start a discussion

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Threat Command by Rapid7
View Alternatives