Intezer Features
Orchestration (8)
Asset Management
Based on 27 Intezer reviews. Lets users group and organize their endpoints to gather threat intelligence on specific technologies.
Security Workflow Automation
Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. 32 reviewers of Intezer have provided feedback on this feature.
Deployment
As reported in 31 Intezer reviews. The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.
Sandboxing
A feature that allows security testing and information gathering to occur in a secure, resource independent environment. This feature was mentioned in 37 Intezer reviews.
Security Orchestration
Integrates additional security tools to automate security and incident response processes.
Data Collection
Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Data Visualization
Offer pre-built and custom reporting and dashboards for quick insights into system states.
Information (3)
Proactive Alerts
Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. 30 reviewers of Intezer have provided feedback on this feature.
Malware Detection
Based on 42 Intezer reviews. Provides multiple techniques and information sources to alert users of malware occurrences.
Intelligence Reports
The ability for users to produce reports outlining detailed and personalized threat information 40 reviewers of Intezer have provided feedback on this feature.
Personalization (3)
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices. 28 reviewers of Intezer have provided feedback on this feature.
Security Validation
The product has a recurring examination process to update your intelligence reports as new threats emerge. This feature was mentioned in 32 Intezer reviews.
Dynamic/Code Analysis
Based on 38 Intezer reviews. The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.
Response (10)
Resolution Automation
Diagnose and resolve incidents without the need for human interaction.
Resolution Guidance
Guide users through the resolution process and give specific instructions to remedy individual occurrences.
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Threat Intelligence
Gathers information related to threats in order to gain further information on remedies.
Alerting
Clearly notifies users with relevant information and anomalies in a timely manner.
Performance Baselin
Sets a standard performance baseline by which to compare log activity.
High Availability/Disaster Recovery
Allows platform to scale to size of desired environment and configured with high availability and disaster recovery capabilities.
Response Automation
Based on 55 Intezer reviews. Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Malware Removal
Facilitates the remediation of network, endpoint, and application malware malware. This feature was mentioned in 47 Intezer reviews.
Data Protection
As reported in 45 Intezer reviews. Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Records (3)
Incident Logs
Information on each incident is stored in databases for user reference and analytics.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Resource Usage
Analyzes recurring incidents and remedies to ensure optimal resource usage.
Management (3)
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Database Management
Adminstrators can access and organize data related to incidents to produce reports or make data more navigable.
Workflow Management
Administrators can organize workflows to guide remedies to specific situations incident types.
Sandbox (1)
Sandbox
An environment isolated from a network where threats can be safely evaluated.
Evaluation (4)
Malware Evaluation
Tools to test an object to see whether or not it qualifies as malware.
Automatic Submission
The ability for a system to evaluate objects and automatically submit them to the sandbox.
Automatic Evaluation
The ability for a system to evaluate objects within the sandbax and assign a malware probability score.
Malware Probability Scores
The ability to assign objects a score based on their probability of being malware.
Automation (3)
Workflow Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Log Monitoring
Constantly monitors logs to detect anomalies in real time.
Detection (3)
Malware Detection
As reported in 87 Intezer reviews. Provides multiple techniques and information sources to alert users of malware occurrences.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse. 55 reviewers of Intezer have provided feedback on this feature.
Threat Alerting
As reported in 66 Intezer reviews. Identifies and alerts administrators of threats, issues, incidents and requests related to SaaS applications.
Analysis (4)
Malware Evaluation
Based on 88 Intezer reviews. Tools to test an object to see whether or not it qualifies as malware.
Sandboxing
Based on 76 Intezer reviews. Provides a resource-isolated environment to examine malware and evaluate objects against a database of known threats.
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur. This feature was mentioned in 79 Intezer reviews.
File Analysis
Analyze file contents to identify malware components or unknown and advanced threats. This feature was mentioned in 84 Intezer reviews.
Platform Features (7)
24/7 support
Provides 24/7 support to customers with technical questions.
Proactive report alerts
Proactively sends reports or alerts to customers.
Application control
Lets users detect and block applications that are not a security threat.
Proactive threat hunting
Proactively hunts threats.
Rapid response time
Provides rapid reponse time to cyber threats.
Customizeable reports
Provides the ability to customize reports.
Managed Services
Offers MDR as a service.
Automation Capabilities (3)
Automated remediation
Ability to automatically neutralize or eliminate active vulnerabilities.
Automated investigation
Ability to automatically investigate networks and endpoints for threats.
AI Agents
Utilizes AI agents for detection and response tasks.
Generative AI (7)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
Condenses long documents or text into a brief summary.
Generate Attack Scenarios
Use AI to propose possible threat actor tactics, techniques, and procedures against specific environments or assets.
Generate Threat Detection Rules
Use AI to automatically create detection rules based on observed patterns.
Generate Threat Summaries
Use AI to produce concise summaries of complex threat reports or alerts.
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
Agentic AI - Threat Intelligence (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Services - Endpoint Detection & Response (EDR) (1)
Managed Services
Offers managed detection and response services.
Threat Detection & Triage - AI SOC Agents (3)
Anomaly Detection & Correlation
Detect and link suspicious activities across systems in real time.
False‑Positive Suppression
Identify and dismiss non‑threats through intelligent pattern recognition.
AI‑Driven Alert Triage
Reduce noise by automatically evaluating and prioritizing alerts based on risk and context.
Investigation & Enrichment - AI SOC Agents (3)
Autonomous Case Investigation
Investigate alerts end‑to‑end, gathering evidence and building incident timelines.
Contextual Enrichment from Multiple Sources
Enrich cases with data from SIEM, EDR, cloud, identity, and threat‑intel feeds.
Attack Path Mapping
Create visual maps of threat propagation and lateral movement through networks.
InfoSec Experience & Governance - AI SOC Agents (3)
Conversational Analyst Interface
Allow SOC teams to query agents via natural language about ongoing cases.
Manual Feedback Learning Loop
Improve agent performance through adaptive learning from security team corrections.
Explainability & Audit Trail
Provide human‑readable reasoning trails and decision justifications.
Response & Remediation - AI SOC Agents (3)
Mean Time Reduction Metrics
Track and lower MTTD/MTTR/MTTC through autonomous reactions.
Playbook‑Free Dynamic Workflows
Adapt remediation actions without requiring static SOAR playbooks.
Automated Response Execution
Execute predefined or adaptive responses (e.g., isolate endpoints, revoke credentials).




