Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Threat Zone, reclaim access to make changes.
Testiny
Sponsored
Testiny
Visit Website
Product Avatar Image
Threat Zone

By Malwation

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Threat Zone, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.4 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Threat Zone?

Testiny
Sponsored
Testiny
Visit Website

Threat Zone Pricing Overview

Free Trial

Threat Zone Alternatives Pricing

The following is a quick overview of editions offered by other Malware Analysis Tools

ESET PROTECT
ESET PROTECT Advanced
Contact Us
Best-in-class endpoint protection against ransomware & zero-day threats. Cross-platform solution with easy-to-use cloud or on-prem management, server security, advanced threat defense, and full disk encryption.
  • Console
  • Server Security
Contact Us
For individuals
  • Windows 7 32-bit
  • Windows 10 64-bit
  • Android 14
  • Linux Ubuntu 22.04.2 64-bit
  • Interactive access
Coro Cybersecurity
Coro Essentials Suite
Starting at $9.501 User Per Month
Get essential coverage for endpoints, email, and cloud apps, automating resolution of most security incidents.
  • Endpoint Security (Device Posture, Next-gen Antivirus, Allow/Block Lists)
  • Endpoint Detection & Response (EDR)
  • Email Security (Malware Scanning, Phishing Protection, Allow/Block Lists)
  • Cloud App Security (O365, GSuite, Dropbox, Box, Slack, Salesforce)
  • Wifi Phishing

Various alternatives pricing & plans

Free Trial
Pricing information for the above various Threat Zone alternatives is supplied by the respective software provider or retrieved from publicly accessible pricing materials. Final cost negotiations to purchase any of these products must be conducted with the seller.

Threat Zone Pricing Reviews

(1)
Verified User in Banking
UB
Enterprise (> 1000 emp.)
"Powerful Sandbox, Practical for SOCs and IR Teams"
What do you like best about Threat Zone?

1. The Public & community submissions: Being able to view public submissions and analyses from other users is a huge time saver for threat context and quick cross-checks.

2. IOC search & filtering: Fast search across submissions for hashes, domains, and IPs. The useful filters (Informative / Suspicious / Malicious) make prioritization straightforward.

3. Rich report details from a simple scan: A single detonation gave me Whois/website metadata, detailed threat analysis, PCAP/network waterfall, and dropped file artifacts, all immediately actionable. I could also see the IOC pattern.

4. All-in-one experience: The platform provided me majority of the intel I usually have to gather from several open-source tools, which speeds up triage considerably. Review collected by and hosted on G2.com.

What do you dislike about Threat Zone?

The product is excellent. One honest ask would be to review the pricing, to make it more affordable for small teams, researchers, and independent analysts. Review collected by and hosted on G2.com.

Threat Zone Comparisons
Product Avatar Image
ANY.RUN Sandbox
Compare Now
Product Avatar Image
Threat Zone
View Alternatives