Flashpoint Features
Orchestration (2)
Security Workflow Automation
Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. 48 reviewers of Flashpoint have provided feedback on this feature.
Deployment
As reported in 48 Flashpoint reviews. The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.
Information (3)
Proactive Alerts
Based on 57 Flashpoint reviews. Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences. 46 reviewers of Flashpoint have provided feedback on this feature.
Intelligence Reports
The ability for users to produce reports outlining detailed and personalized threat information This feature was mentioned in 59 Flashpoint reviews.
Personalization (2)
Endpoint Intelligence
As reported in 53 Flashpoint reviews. Analysis for users to examine threat intelligence data specific to their endpoint devices.
Security Validation
The product has a recurring examination process to update your intelligence reports as new threats emerge. This feature was mentioned in 50 Flashpoint reviews.
Detection (4)
Payment Verification
Requires verification of credit card, debit card, and money transfers prior to accepting payments This feature was mentioned in 10 Flashpoint reviews.
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud. This feature was mentioned in 10 Flashpoint reviews.
Real-Time Monitoring
As reported in 11 Flashpoint reviews. Constantly monitors system to detect anomalies in real time.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined. This feature was mentioned in 10 Flashpoint reviews.
Analysis (3)
ID Analytics
As reported in 10 Flashpoint reviews. Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud. 11 reviewers of Flashpoint have provided feedback on this feature.
Incident Reports
Produces reports detailing trends and vulnerabilities related to payments and fraud. This feature was mentioned in 11 Flashpoint reviews.
Administration (3)
Fraud Markers
As reported in 10 Flashpoint reviews. Tags users suspected of committing fraud and identifies them upon return.
Transaction Scoring
Based on 10 Flashpoint reviews. Rates each transaction's risk based on specific factors and their benchmarked scores.
Blacklisting
As reported in 10 Flashpoint reviews. Prevents previous committers of fraud from future transactions.
Risk Analysis (3)
Risk Scoring
Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Reporting
Creates reports outlining log activity and relevant metrics.
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities.
Vulnerability Assesment (4)
Vulnerability Scanning
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Contextual Data
Identify risk data attributes such as description, category, owner, or hierarchy.
Dashboards
Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.
Automation (4)
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Workflow Automation
Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Testing
Allows users to perfrom hands-on live simulations and penetration tests.
Test Automation
Runs pre-scripted vulnerability scans and security tests without requiring manual work.
Functionality (8)
Monitoring - Deep Web
Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web. This feature was mentioned in 50 Flashpoint reviews.
Monitoring - Dark Web
Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums. This feature was mentioned in 50 Flashpoint reviews.
Analysis
Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations. 48 reviewers of Flashpoint have provided feedback on this feature.
Ticketing
As reported in 39 Flashpoint reviews. Integrates into ticketing or CRM platforms via API integrations.
Simple Search
Based on 48 Flashpoint reviews. Search through real-time and historical data without using technical query language.
Leak Source
As reported in 45 Flashpoint reviews. Provides additional context and analysis to help identify the source of leaked information.
Centralized Dashboard
As reported in 47 Flashpoint reviews. Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software.
Real-Time Alerts
As reported in 47 Flashpoint reviews. Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.
Platform (3)
Reporting and Analytics
Produces summative reports for threats, and creates threat trend analysis using historical data.
Connections and Integrations
Connects to a variety of software and hardware, including IoT devices, vehicles, and other public and private databases.
Collaboration Tools
Offers communication, workflow, and dashboard customizations to support collaborative response on multiple threats.
Threat Monitoring (3)
Threat Alerts
Allows real-time rules and alerts to be triggered based on pre-set criteria.
Continuous Monitoring
Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.
Investigation Management
Provides customizable investigation workflows, data governance, and audit tracking to support threat investigation and mitigation, for both safety and legal reasons.
Threat Assessment (2)
Graphical and Link Analysis
Allows users to visually link connections and relationships, and utlize graphs, GIS, and maps to identify trends more easily.
Threat Scoring
Allows threat methodology to be applied to individual threats to assess their priority.
Threat Identification (4)
Proactive Listening
Continuously monitors various social media channels, deep and dark web, and situational signals to proactively identify potential threats.
External Data Mining
Compiles data from various public research databases, including OSINT, public records, and criminal and civil records.
POI Profiles
Enables users to create individual records for persons of interest, pulling in data from connected systems as well as user input.
Threat Reporting
Offers a public and/or private portal to collect tips and reports about potential threats.
Generative AI (4)
AI Text Summarization
Condenses long documents or text into a brief summary. 42 reviewers of Flashpoint have provided feedback on this feature.
Generate Attack Scenarios
Use AI to propose possible threat actor tactics, techniques, and procedures against specific environments or assets.
Generate Threat Detection Rules
Use AI to automatically create detection rules based on observed patterns.
Generate Threat Summaries
Use AI to produce concise summaries of complex threat reports or alerts.
Agentic AI - Threat Intelligence (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input This feature was mentioned in 16 Flashpoint reviews.
Multi-step Planning
Ability to break down and plan multi-step processes 16 reviewers of Flashpoint have provided feedback on this feature.
Proactive Assistance
As reported in 16 Flashpoint reviews. Anticipates needs and offers suggestions without prompting
Decision Making
Based on 16 Flashpoint reviews. Makes informed choices based on available data and objectives
Agentic AI - Fraud Detection (3)
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives





