Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Phish Report, reclaim access to make changes.
Cyberint, a Check Point Company
Sponsored
Cyberint, a Check Point Company
Visit Website
Product Avatar Image
Phish Report

By Phish Report

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Phish Report, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Phish Report?

Cyberint, a Check Point Company
Sponsored
Cyberint, a Check Point Company
Visit Website
It's been two months since this profile received a new review
Leave a Review

Phish Report Reviews & Product Details

Pricing

Pricing provided by Phish Report.

Starter

$49.00
Per Month

Unlimited

$119.00
Per Month

Phish Report Media

Phish Report Demo - Simple to use: Spend less time reporting
Reporting phishing shouldn't be complicated. With Phish Report it takes just one minute to report a phishing site and begin the takedown process. As much work as possible is automated so you only need a single click.
Phish Report Demo - Get sites suspended faster
Phish Report works with providers to fight phishing sites from multiple vectors: Integrations with browsers to warn end-users they're visiting a phishing site Identifies and emails the hosting providers to get the site taken down Shares threat intelligence with security companies to trac...
Phish Report Demo - Monitor the impact of attacks
Phish Report monitors the status of phishing sites giving you to the minute info about: When the site first became active How quickly you detected it What actions were taken When the attack became inactive
Product Avatar Image

Have you used Phish Report before?

Answer a few questions to help the Phish Report community

Phish Report Reviews (1)

Reviews

Phish Report Reviews (1)

4.0
1 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Nat L.
NL
Creative Design Senior Specialist
Enterprise (> 1000 emp.)
"One of the most necessary software for a company with any kind of email usage."
What do you like best about Phish Report?

Having an anti-Phishing software installed on email clients is essential for safety of employees and the data of the company. The bigger the company, the more important it is to protect your information from Phish Attacks. It's automated processes makes it easy to work without interfering with your day to day work too much. Review collected by and hosted on G2.com.

What do you dislike about Phish Report?

It's not something a normal user can integrate and adjust. IT is the only one who can fleet it out and update it, so it's usefulness is laid solely on how often our IT promotes and pushes it to our teams. Review collected by and hosted on G2.com.

There are not enough reviews of Phish Report for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Prisync Logo
Prisync
4.7
(161)
Prisync is a competitor price tracking software that delivers online retailers a dynamic view of competitor's prices and product assortments with its dashboard and reports, sends daily or instant price and stock change notifications, detailed Excel reports from the market, to keep updated and dynamic.
2
Cyberint, a Check Point Company Logo
Cyberint, a Check Point Company
4.6
(151)
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.
3
Cyble Logo
Cyble
4.8
(149)
Cyble Vision, our SaaS-based enterprise platform collects real-time intelligence data from both open and closed sources to map, monitor, and mitigate digital risk.
4
CloudSEK Logo
CloudSEK
4.8
(128)
Cloudsek is an Infosec Risk assessment company which provides intelligence needed to tackle online threats.
5
BrandShield Logo
BrandShield
4.7
(115)
BrandShield empowers brands to protect customer trust by providing comprehensive solutions against online brand infringement and external cyber threats. The platform defends against counterfeits, fake marketplace listings, brand impersonations, and fraudulent ads, as well as phishing, domain squatting, rogue mobile apps, and dark web threats. With an easy-to-deploy SaaS solution, BrandShield offers a managed takedown service led by cybersecurity and IP legal experts to ensure swift, effective removal of harmful content and brand threats. Trusted by industry leaders across finance, retail, e-commerce, and pharmaceuticals—including eToro, Arc'teryx, Dropbox, Tiffany & Co., and Levi's—BrandShield delivers unmatched protection for high-profile organizations. By combining advanced technology with expert insights, BrandShield enables brands to focus on growth while their security needs are seamlessly managed.
6
CTM360 Logo
CTM360
4.7
(102)
An extensive amount of cyber threat intelligence is generated on a daily basis, and it can be difficult to cut through the noise. Simplify the process with our fully automated and highly specific threat intelligence, which provides detection on an ongoing basis. CTM360 generates actionable threat intel, providing insights specifically catered to your organization, its brand and executives. 1. Noise-free data relevant to your organization 2. Know precisely what is targeting you 3. Tackling emerging threats 4. Filtered data across deep & dark web targeting your organization
7
Price2Spy Logo
Price2Spy
4.8
(84)
Price2Spy is an online price monitoring, pricing analytics, and dynamic pricing tool. It helps eCommerce professionals monitor, analyze pricing data, and reprice their products while saving up to 92% of costs related to manual price checks.
8
Dataweave Logo
Dataweave
4.4
(81)
DataWeave helps businesses make data-driven decisions by providing relevant actionable data.
9
SOCRadar Extended Threat Intelligence Logo
SOCRadar Extended Threat Intelligence
4.8
(86)
SOCRadar Extended Threat Intelligenceprovides a big-data powered threat investigation module to help Threat Intelligence Teams searching for deeper context, real-time threat research and analysis. The suite is fed by massive data sources across surface, deep and dark web from Paste Sites to Underground Dark Web forums. The product also includes API-ready intelligence feeds pulled from a broad variety of sources to provide IOCs of potential threats and threat actors targeting your industry.
10
ZeroFox Logo
ZeroFox
4.5
(78)
With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFOX Platform protects you from cyber, brand and physical threats on social media & digital platforms.
Show More
Discussions related to Phish Report

Discussions for this product are not available at this time. Be the first one to Start a discussion

Pricing Options

Pricing provided by Phish Report.

Starter

$49.00
Per Month

Unlimited

$119.00
Per Month
Product Avatar Image
Phish Report
View Alternatives