Introducing G2.ai, the future of software buying.Try now

Best Threat Intelligence Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

This page was last updated on June 9th, 2025

Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies utilize the tools to keep their security standards up to date and fit to combat new threats as they emerge. These tools can improve security performance by providing information on threats to their specific networks, infrastructure, and endpoint devices. These products provide information about hazards and how they function, their capabilities, and remediation techniques. IT administrators and security professionals use the data delivered to better protect their systems from emerging threats and plan for possible vulnerabilities. The tools alert users as new threats emerge and provide information detailing best practices for resolution.

Many products like security information and event management (SIEM) and vulnerability management software can integrate with or provide similar information as threat intelligence products. Those products, though, tend to provide live updates and actionable intelligence, and focus on other components of a security ecosystem.

To qualify for inclusion in the Threat Intelligence category, a product must:

Provide information on emerging threats and vulnerabilities
Detail remediation practices for common and emerging threats
Analyze global threats on different types of networks and devices
Cater threat information to specific IT solutions

Best Threat Intelligence Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
263 Listings in Threat Intelligence Available
(138)4.6 out of 5
7th Easiest To Use in Threat Intelligence software
View top Consulting Services for Recorded Future
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

    Users
    • Threat Intelligence Analyst
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 69% Enterprise
    • 20% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence through rich context, intuitive visuals, and seamless integrations.
    • Users like the platform's ability to provide precise and actionable threat intelligence, its intuitive visuals, seamless integrations, and the support from the responsive and helpful team.
    • Reviewers experienced difficulties with the complex interface, high cost, steep learning curve, and overwhelming volume of data and alerts, which can lead to alert fatigue if not carefully fine-tuned.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Recorded Future Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    65
    Features
    64
    Threat Intelligence
    47
    Threat Detection
    45
    Insights
    42
    Cons
    Expensive
    28
    Complexity
    26
    Learning Curve
    19
    Information Overload
    18
    Difficult Learning
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Recorded Future features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.7
    Intelligence Reports
    Average: 8.9
    7.9
    Endpoint Intelligence
    Average: 8.4
    8.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Somerville, US
    Twitter
    @RecordedFuture
    109,059 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,047 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

Users
  • Threat Intelligence Analyst
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 69% Enterprise
  • 20% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence through rich context, intuitive visuals, and seamless integrations.
  • Users like the platform's ability to provide precise and actionable threat intelligence, its intuitive visuals, seamless integrations, and the support from the responsive and helpful team.
  • Reviewers experienced difficulties with the complex interface, high cost, steep learning curve, and overwhelming volume of data and alerts, which can lead to alert fatigue if not carefully fine-tuned.
Recorded Future Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
65
Features
64
Threat Intelligence
47
Threat Detection
45
Insights
42
Cons
Expensive
28
Complexity
26
Learning Curve
19
Information Overload
18
Difficult Learning
16
Recorded Future features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.7
Intelligence Reports
Average: 8.9
7.9
Endpoint Intelligence
Average: 8.4
8.5
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2009
HQ Location
Somerville, US
Twitter
@RecordedFuture
109,059 Twitter followers
LinkedIn® Page
www.linkedin.com
1,047 employees on LinkedIn®
(304)4.4 out of 5
23rd Easiest To Use in Threat Intelligence software
View top Consulting Services for Microsoft Defender for Cloud
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

    Users
    • Saas Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    166
    Comprehensive Security
    113
    Cloud Security
    99
    Ease of Use
    74
    Threat Protection
    70
    Cons
    Complexity
    37
    Expensive
    36
    False Positives
    26
    Delayed Detection
    25
    Improvement Needed
    25
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    8.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

Users
  • Saas Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Microsoft Defender for Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
166
Comprehensive Security
113
Cloud Security
99
Ease of Use
74
Threat Protection
70
Cons
Complexity
37
Expensive
36
False Positives
26
Delayed Detection
25
Improvement Needed
25
Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
8.7
Ease of Use
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(297)4.7 out of 5
6th Easiest To Use in Threat Intelligence software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    54
    Ease of Use
    43
    Security
    43
    Threat Detection
    38
    Detection
    36
    Cons
    Missing Features
    14
    Expensive
    11
    Limited Features
    11
    Complexity
    10
    Difficult Navigation
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.4
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
54
Ease of Use
43
Security
43
Threat Detection
38
Detection
36
Cons
Missing Features
14
Expensive
11
Limited Features
11
Complexity
10
Difficult Navigation
10
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.4
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.4
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(307)4.4 out of 5
Optimized for quick response
13th Easiest To Use in Threat Intelligence software
View top Consulting Services for Mimecast Advanced Email Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Legal Services
    • Information Technology and Services
    Market Segment
    • 68% Mid-Market
    • 16% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mimecast Advanced Email Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    75
    Ease of Use
    65
    Security
    51
    Features
    44
    Customer Support
    36
    Cons
    Complexity
    24
    UX Improvement
    23
    Configuration Difficulties
    20
    Email Issues
    18
    False Positives
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.4
    Intelligence Reports
    Average: 8.9
    7.3
    Endpoint Intelligence
    Average: 8.4
    8.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mimecast
    Company Website
    Year Founded
    2003
    HQ Location
    London
    Twitter
    @Mimecast
    18,279 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,588 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

Users
  • IT Manager
  • Systems Administrator
Industries
  • Legal Services
  • Information Technology and Services
Market Segment
  • 68% Mid-Market
  • 16% Enterprise
Mimecast Advanced Email Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
75
Ease of Use
65
Security
51
Features
44
Customer Support
36
Cons
Complexity
24
UX Improvement
23
Configuration Difficulties
20
Email Issues
18
False Positives
17
Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.4
Intelligence Reports
Average: 8.9
7.3
Endpoint Intelligence
Average: 8.4
8.0
Ease of Use
Average: 8.8
Seller Details
Seller
Mimecast
Company Website
Year Founded
2003
HQ Location
London
Twitter
@Mimecast
18,279 Twitter followers
LinkedIn® Page
www.linkedin.com
2,588 employees on LinkedIn®
(119)4.6 out of 5
1st Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

    Users
    • Security Threat Analyst
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 70% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberint, a Check Point Company Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    51
    Threat Intelligence
    46
    Threat Detection
    37
    Insights
    34
    Customer Support
    30
    Cons
    Inefficient Alerts
    19
    Inefficient Alert System
    13
    False Positives
    10
    Integration Issues
    10
    Missing Features
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberInt
    Year Founded
    2009
    HQ Location
    Petah Tikva, Israel
    Twitter
    @cyber_int
    1,861 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    161 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

Users
  • Security Threat Analyst
Industries
  • Banking
  • Financial Services
Market Segment
  • 70% Enterprise
  • 20% Mid-Market
Cyberint, a Check Point Company Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
51
Threat Intelligence
46
Threat Detection
37
Insights
34
Customer Support
30
Cons
Inefficient Alerts
19
Inefficient Alert System
13
False Positives
10
Integration Issues
10
Missing Features
9
Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
CyberInt
Year Founded
2009
HQ Location
Petah Tikva, Israel
Twitter
@cyber_int
1,861 Twitter followers
LinkedIn® Page
www.linkedin.com
161 employees on LinkedIn®
(181)4.7 out of 5
17th Easiest To Use in Threat Intelligence software
View top Consulting Services for FortiGate NGFW
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

    Users
    • Network Engineer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGate NGFW Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Features
    12
    Security
    11
    Security Protection
    7
    Customer Support
    6
    Cons
    Update Issues
    5
    Slow Performance
    4
    Upgrade Issues
    4
    Limited Features
    3
    Pricing Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate NGFW features and usability ratings that predict user satisfaction
    9.1
    Security Validation
    Average: 8.9
    9.1
    Intelligence Reports
    Average: 8.9
    8.8
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Users
  • Network Engineer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Mid-Market
  • 20% Enterprise
FortiGate NGFW Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Features
12
Security
11
Security Protection
7
Customer Support
6
Cons
Update Issues
5
Slow Performance
4
Upgrade Issues
4
Limited Features
3
Pricing Issues
3
FortiGate NGFW features and usability ratings that predict user satisfaction
9.1
Security Validation
Average: 8.9
9.1
Intelligence Reports
Average: 8.9
8.8
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(284)4.8 out of 5
4th Easiest To Use in Threat Intelligence software
View top Consulting Services for ThreatLocker
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 61% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatLocker Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    91
    Threat Detection
    86
    Ease of Use
    78
    Security
    71
    Features
    68
    Cons
    Learning Curve
    42
    Difficult Learning Curve
    27
    Difficult Configuration
    14
    Difficult Navigation
    14
    Complexity
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.9
    9.5
    Intelligence Reports
    Average: 8.9
    9.3
    Endpoint Intelligence
    Average: 8.4
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    580 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 61% Small-Business
  • 32% Mid-Market
ThreatLocker Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
91
Threat Detection
86
Ease of Use
78
Security
71
Features
68
Cons
Learning Curve
42
Difficult Learning Curve
27
Difficult Configuration
14
Difficult Navigation
14
Complexity
13
ThreatLocker features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.9
9.5
Intelligence Reports
Average: 8.9
9.3
Endpoint Intelligence
Average: 8.4
8.4
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,217 Twitter followers
LinkedIn® Page
www.linkedin.com
580 employees on LinkedIn®
(52)4.8 out of 5
2nd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

    Users
    • Security Analyst
    Industries
    • Financial Services
    • Airlines/Aviation
    Market Segment
    • 44% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudSEK Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Features
    23
    Customer Support
    22
    Monitoring
    17
    Implementation Ease
    16
    Cons
    False Positives
    9
    Dashboard Issues
    3
    Integration Issues
    3
    UX Improvement
    3
    Poor Detection Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK features and usability ratings that predict user satisfaction
    9.6
    Security Validation
    Average: 8.9
    9.6
    Intelligence Reports
    Average: 8.9
    9.6
    Endpoint Intelligence
    Average: 8.4
    9.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,253 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

Users
  • Security Analyst
Industries
  • Financial Services
  • Airlines/Aviation
Market Segment
  • 44% Enterprise
  • 31% Mid-Market
CloudSEK Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Features
23
Customer Support
22
Monitoring
17
Implementation Ease
16
Cons
False Positives
9
Dashboard Issues
3
Integration Issues
3
UX Improvement
3
Poor Detection Performance
2
CloudSEK features and usability ratings that predict user satisfaction
9.6
Security Validation
Average: 8.9
9.6
Intelligence Reports
Average: 8.9
9.6
Endpoint Intelligence
Average: 8.4
9.5
Ease of Use
Average: 8.8
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,253 Twitter followers
LinkedIn® Page
www.linkedin.com
220 employees on LinkedIn®
(17)4.6 out of 5
19th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Falcon Security and IT operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Ease of Use
    2
    Easy Integrations
    2
    Implementation Ease
    2
    Response Time
    2
    Cons
    Expensive
    3
    Bugs
    1
    Installation Problems
    1
    Insufficient Training
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falcon Security and IT operations features and usability ratings that predict user satisfaction
    8.6
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.1
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 41% Enterprise
Falcon Security and IT operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Ease of Use
2
Easy Integrations
2
Implementation Ease
2
Response Time
2
Cons
Expensive
3
Bugs
1
Installation Problems
1
Insufficient Training
1
Poor Documentation
1
Falcon Security and IT operations features and usability ratings that predict user satisfaction
8.6
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.1
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(31)4.7 out of 5
Optimized for quick response
9th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 74% Enterprise
    • 19% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyble Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Insights
    12
    Monitoring
    12
    Threat Detection
    12
    Features
    10
    Threat Intelligence
    10
    Cons
    Inefficient Alerts
    7
    False Positives
    5
    Inefficient Alert System
    4
    Limited Customization
    4
    Data Inaccuracy
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    9.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    18,518 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 74% Enterprise
  • 19% Mid-Market
Cyble Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Insights
12
Monitoring
12
Threat Detection
12
Features
10
Threat Intelligence
10
Cons
Inefficient Alerts
7
False Positives
5
Inefficient Alert System
4
Limited Customization
4
Data Inaccuracy
3
Cyble features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
9.7
Ease of Use
Average: 8.8
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
18,518 Twitter followers
LinkedIn® Page
www.linkedin.com
230 employees on LinkedIn®
(536)4.5 out of 5
Optimized for quick response
15th Easiest To Use in Threat Intelligence software
View top Consulting Services for Cloudflare Application Security and Performance
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare is the connectivity cloud for the "everywhere world," on a mission to help build a better Internet. We provide a unified platform of networking, security, and developer services delivered f

    Users
    • Web Developer
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 64% Small-Business
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare Application Security and Performance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    61
    Security
    61
    Speed
    40
    Features
    37
    Performance Speed
    37
    Cons
    Technical Issues
    19
    Complex User Interface
    14
    Expensive
    13
    Performance Issues
    13
    Complex Setup
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare Application Security and Performance features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    222,890 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,449 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare is the connectivity cloud for the "everywhere world," on a mission to help build a better Internet. We provide a unified platform of networking, security, and developer services delivered f

Users
  • Web Developer
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 64% Small-Business
  • 26% Mid-Market
Cloudflare Application Security and Performance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
61
Security
61
Speed
40
Features
37
Performance Speed
37
Cons
Technical Issues
19
Complex User Interface
14
Expensive
13
Performance Issues
13
Complex Setup
12
Cloudflare Application Security and Performance features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
222,890 Twitter followers
LinkedIn® Page
www.linkedin.com
5,449 employees on LinkedIn®
(128)4.3 out of 5
Optimized for quick response
10th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CYREBRO Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    35
    Customer Support
    32
    Response Time
    27
    Alerts
    21
    Alerting System
    20
    Cons
    Communication Issues
    15
    Poor Customer Support
    15
    Inefficient Alert System
    14
    Integration Issues
    14
    Ineffective Alerts
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYREBRO features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.9
    8.6
    Intelligence Reports
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYREBRO
    Company Website
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @CYREBRO_IO
    322 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    99 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Mid-Market
  • 24% Small-Business
CYREBRO Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
35
Customer Support
32
Response Time
27
Alerts
21
Alerting System
20
Cons
Communication Issues
15
Poor Customer Support
15
Inefficient Alert System
14
Integration Issues
14
Ineffective Alerts
13
CYREBRO features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.9
8.6
Intelligence Reports
Average: 8.9
8.9
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
CYREBRO
Company Website
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@CYREBRO_IO
322 Twitter followers
LinkedIn® Page
www.linkedin.com
99 employees on LinkedIn®
(30)4.6 out of 5
8th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GreyNoise provides security teams with real-time, verifiable perimeter threat intelligence. We observe and analyze both global and targeted internet scanning and exploitation traffic, and make this in

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GreyNoise Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    4
    Threat Detection
    4
    Integration Capabilities
    3
    Alerts
    2
    Easy Integrations
    2
    Cons
    Integration Issues
    3
    Lack of Automation
    2
    Difficult Learning Curve
    1
    Expensive
    1
    Incomplete Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GreyNoise features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.7
    Intelligence Reports
    Average: 8.9
    8.6
    Endpoint Intelligence
    Average: 8.4
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GreyNoise
    Company Website
    Year Founded
    2017
    HQ Location
    Washington, D.C.
    Twitter
    @GreyNoiseIO
    27,893 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GreyNoise provides security teams with real-time, verifiable perimeter threat intelligence. We observe and analyze both global and targeted internet scanning and exploitation traffic, and make this in

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Mid-Market
  • 37% Small-Business
GreyNoise Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
4
Threat Detection
4
Integration Capabilities
3
Alerts
2
Easy Integrations
2
Cons
Integration Issues
3
Lack of Automation
2
Difficult Learning Curve
1
Expensive
1
Incomplete Information
1
GreyNoise features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.7
Intelligence Reports
Average: 8.9
8.6
Endpoint Intelligence
Average: 8.4
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
GreyNoise
Company Website
Year Founded
2017
HQ Location
Washington, D.C.
Twitter
@GreyNoiseIO
27,893 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
(39)4.8 out of 5
12th Easiest To Use in Threat Intelligence software
Save to My Lists
16% off: $14950 per year
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 41% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SOCRadar Extended Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Insights
    16
    Threat Intelligence
    15
    Features
    14
    Threat Detection
    13
    Ease of Use
    11
    Cons
    Integration Issues
    4
    Limited Features
    4
    False Positives
    3
    Information Overload
    3
    Lack of Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    9.2
    Intelligence Reports
    Average: 8.9
    8.6
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    5,121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

Users
No information available
Industries
  • Financial Services
Market Segment
  • 41% Enterprise
  • 41% Mid-Market
SOCRadar Extended Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Insights
16
Threat Intelligence
15
Features
14
Threat Detection
13
Ease of Use
11
Cons
Integration Issues
4
Limited Features
4
False Positives
3
Information Overload
3
Lack of Features
3
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
9.2
Intelligence Reports
Average: 8.9
8.6
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
5,121 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(40)4.7 out of 5
11th Easiest To Use in Threat Intelligence software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CTM360 is a cybersecurity platform that provides real-time threat detection, external attack surface management, and rapid incident response to protect organizations from digital threats.
    • Reviewers appreciate the platform's proactive approach to cybersecurity, its comprehensive features, ease of use, and the responsive support team that helps enhance overall security posture effectively.
    • Users reported that integrating CTM360 with existing security infrastructures can sometimes be complex, especially in highly customized environments, and the platform doesn't focus enough on region or industry-specific threats.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CTM360 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Features
    8
    Detection
    7
    Threat Detection
    7
    Ease of Use
    6
    Cons
    Complexity
    2
    Limited Customization
    2
    Limited Features
    2
    Complex Searching
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CTM360 features and usability ratings that predict user satisfaction
    8.6
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    7.7
    Endpoint Intelligence
    Average: 8.4
    9.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CTM360
    Company Website
    Year Founded
    2014
    HQ Location
    Manama, Capital Governate
    Twitter
    @teamCTM360
    968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CTM360 is a cybersecurity platform that provides real-time threat detection, external attack surface management, and rapid incident response to protect organizations from digital threats.
  • Reviewers appreciate the platform's proactive approach to cybersecurity, its comprehensive features, ease of use, and the responsive support team that helps enhance overall security posture effectively.
  • Users reported that integrating CTM360 with existing security infrastructures can sometimes be complex, especially in highly customized environments, and the platform doesn't focus enough on region or industry-specific threats.
CTM360 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Features
8
Detection
7
Threat Detection
7
Ease of Use
6
Cons
Complexity
2
Limited Customization
2
Limited Features
2
Complex Searching
1
Complex Setup
1
CTM360 features and usability ratings that predict user satisfaction
8.6
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
7.7
Endpoint Intelligence
Average: 8.4
9.5
Ease of Use
Average: 8.8
Seller Details
Seller
CTM360
Company Website
Year Founded
2014
HQ Location
Manama, Capital Governate
Twitter
@teamCTM360
968 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM X-Force Exchange features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 8.9
    8.1
    Endpoint Intelligence
    Average: 8.4
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 29% Mid-Market
IBM X-Force Exchange features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 8.9
8.1
Endpoint Intelligence
Average: 8.4
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
(12)4.3 out of 5
View top Consulting Services for Microsoft Security Copilot
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Enterprise
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Security Copilot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Security
    5
    Security Protection
    5
    Threat Detection
    5
    Automation
    4
    Cons
    Complexity
    3
    Expensive
    3
    Difficult Learning Curve
    2
    False Positives
    2
    Access Control
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Security Copilot features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 8.9
    8.5
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Enterprise
  • 17% Mid-Market
Microsoft Security Copilot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Security
5
Security Protection
5
Threat Detection
5
Automation
4
Cons
Complexity
3
Expensive
3
Difficult Learning Curve
2
False Positives
2
Access Control
1
Microsoft Security Copilot features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 8.9
8.5
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Censys, founded in 2017 in Ann Arbor, Michigan, provides organizations with the world's most comprehensive real-time view of global networks and devices. Established by the creators of ZMap and truste

    Users
    No information available
    Industries
    • Computer & Network Security
    • Pharmaceuticals
    Market Segment
    • 50% Small-Business
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Censys Search Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Accuracy of Information
    10
    Detailed Analysis
    5
    Features
    4
    Customer Support
    3
    Cons
    Complexity
    4
    Search Functionality Issues
    4
    Incomplete Information
    3
    Limited Functionality
    2
    Poor Visibility
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Censys Search features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 8.9
    7.0
    Intelligence Reports
    Average: 8.9
    8.0
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Censys
    Year Founded
    2017
    HQ Location
    Ann Arbor, MI
    Twitter
    @censysio
    10,142 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Censys, founded in 2017 in Ann Arbor, Michigan, provides organizations with the world's most comprehensive real-time view of global networks and devices. Established by the creators of ZMap and truste

Users
No information available
Industries
  • Computer & Network Security
  • Pharmaceuticals
Market Segment
  • 50% Small-Business
  • 34% Enterprise
Censys Search Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Accuracy of Information
10
Detailed Analysis
5
Features
4
Customer Support
3
Cons
Complexity
4
Search Functionality Issues
4
Incomplete Information
3
Limited Functionality
2
Poor Visibility
2
Censys Search features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 8.9
7.0
Intelligence Reports
Average: 8.9
8.0
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Censys
Year Founded
2017
HQ Location
Ann Arbor, MI
Twitter
@censysio
10,142 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(43)4.5 out of 5
Optimized for quick response
24th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 47% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ZeroFox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    13
    Alerts
    10
    Alert Notifications
    9
    Ease of Use
    9
    Monitoring
    9
    Cons
    Inefficiency
    4
    Complexity
    3
    Missing Features
    3
    Confusing Interface
    2
    Data Breach
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZeroFox features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZeroFox
    Company Website
    Year Founded
    2013
    HQ Location
    Baltimore, MD
    Twitter
    @ZeroFOX
    5,262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    847 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented

Users
No information available
Industries
  • Financial Services
Market Segment
  • 47% Mid-Market
  • 33% Enterprise
ZeroFox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
13
Alerts
10
Alert Notifications
9
Ease of Use
9
Monitoring
9
Cons
Inefficiency
4
Complexity
3
Missing Features
3
Confusing Interface
2
Data Breach
2
ZeroFox features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
7.5
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
ZeroFox
Company Website
Year Founded
2013
HQ Location
Baltimore, MD
Twitter
@ZeroFOX
5,262 Twitter followers
LinkedIn® Page
www.linkedin.com
847 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 42% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Monitoring
    1
    Response Time
    1
    Threat Detection
    1
    Cons
    Lack of Customization
    1
    Limited Functionality
    1
    Navigation Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender Threat Intelligence features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.5
    Intelligence Reports
    Average: 8.9
    8.5
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 42% Small-Business
  • 25% Enterprise
Microsoft Defender Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Monitoring
1
Response Time
1
Threat Detection
1
Cons
Lack of Customization
1
Limited Functionality
1
Navigation Issues
1
Microsoft Defender Threat Intelligence features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.5
Intelligence Reports
Average: 8.9
8.5
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(26)4.6 out of 5
Optimized for quick response
18th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The first line of defense shouldn’t be your infrastructure; optimize your security and defeat attacks before they begin with knowledge of who, how, and when you will be attacked. Group-IB’s Threat I

    Users
    No information available
    Industries
    • Banking
    Market Segment
    • 58% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Group-IB Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    4
    Automation
    2
    Detailed Analysis
    2
    Accuracy of Information
    1
    Helpful
    1
    Cons
    Expensive
    1
    Incomplete Information
    1
    Information Overload
    1
    Lack of Customization
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Group-IB Threat Intelligence features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    8.7
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Group-IB
    Company Website
    Year Founded
    2003
    HQ Location
    Singapore
    Twitter
    @GroupIB
    8,853 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    362 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The first line of defense shouldn’t be your infrastructure; optimize your security and defeat attacks before they begin with knowledge of who, how, and when you will be attacked. Group-IB’s Threat I

Users
No information available
Industries
  • Banking
Market Segment
  • 58% Enterprise
  • 23% Mid-Market
Group-IB Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
4
Automation
2
Detailed Analysis
2
Accuracy of Information
1
Helpful
1
Cons
Expensive
1
Incomplete Information
1
Information Overload
1
Lack of Customization
1
Poor Reporting
1
Group-IB Threat Intelligence features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
8.7
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
Group-IB
Company Website
Year Founded
2003
HQ Location
Singapore
Twitter
@GroupIB
8,853 Twitter followers
LinkedIn® Page
www.linkedin.com
362 employees on LinkedIn®
(22)4.9 out of 5
3rd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cuttin

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatMon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    10
    Monitoring
    9
    Ease of Use
    6
    Threat Intelligence
    6
    Alerts
    5
    Cons
    Information Overload
    4
    Limited Features
    4
    Lack of Customization
    3
    Missing Features
    3
    Poor UI Design
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatMon features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    9.9
    Intelligence Reports
    Average: 8.9
    9.5
    Endpoint Intelligence
    Average: 8.4
    9.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatMon
    Company Website
    Year Founded
    2018
    HQ Location
    Sterling VA
    Twitter
    @MonThreat
    14,043 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    38 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cuttin

Users
No information available
Industries
No information available
Market Segment
  • 41% Mid-Market
  • 36% Enterprise
ThreatMon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
10
Monitoring
9
Ease of Use
6
Threat Intelligence
6
Alerts
5
Cons
Information Overload
4
Limited Features
4
Lack of Customization
3
Missing Features
3
Poor UI Design
3
ThreatMon features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
9.9
Intelligence Reports
Average: 8.9
9.5
Endpoint Intelligence
Average: 8.4
9.8
Ease of Use
Average: 8.8
Seller Details
Seller
ThreatMon
Company Website
Year Founded
2018
HQ Location
Sterling VA
Twitter
@MonThreat
14,043 Twitter followers
LinkedIn® Page
www.linkedin.com
38 employees on LinkedIn®
(44)4.5 out of 5
14th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

    Users
    No information available
    Industries
    • Security and Investigations
    Market Segment
    • 61% Enterprise
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dataminr Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Efficiency Improvement
    3
    Incident Management
    3
    Time-saving
    3
    Artificial Intelligence
    2
    Cons
    Difficult Setup
    1
    Improvement Needed
    1
    Lack of Customization
    1
    Learning Curve
    1
    Limited Functionality
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dataminr features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 8.9
    7.6
    Intelligence Reports
    Average: 8.9
    8.0
    Endpoint Intelligence
    Average: 8.4
    8.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dataminr
    Year Founded
    2009
    HQ Location
    New York, NY
    Twitter
    @Dataminr
    16,533 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    748 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

Users
No information available
Industries
  • Security and Investigations
Market Segment
  • 61% Enterprise
  • 32% Small-Business
Dataminr Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Efficiency Improvement
3
Incident Management
3
Time-saving
3
Artificial Intelligence
2
Cons
Difficult Setup
1
Improvement Needed
1
Lack of Customization
1
Learning Curve
1
Limited Functionality
1
Dataminr features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 8.9
7.6
Intelligence Reports
Average: 8.9
8.0
Endpoint Intelligence
Average: 8.4
8.6
Ease of Use
Average: 8.8
Seller Details
Seller
Dataminr
Year Founded
2009
HQ Location
New York, NY
Twitter
@Dataminr
16,533 Twitter followers
LinkedIn® Page
www.linkedin.com
748 employees on LinkedIn®
(33)4.8 out of 5
20th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppel is built to outsmart the internet’s biggest threat—social engineering. Using generative AI, we don’t just defend; we disrupt attackers' tactics and infrastructures, providing holistic protectio

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 42% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Doppel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    15
    Helpful
    13
    Ease of Use
    11
    Response Time
    10
    Alerts
    4
    Cons
    UX Improvement
    3
    Poor Detection Performance
    2
    Dashboard Issues
    1
    Difficult Setup
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppel features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 8.9
    8.7
    Endpoint Intelligence
    Average: 8.4
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppel
    Company Website
    Year Founded
    2022
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    171 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppel is built to outsmart the internet’s biggest threat—social engineering. Using generative AI, we don’t just defend; we disrupt attackers' tactics and infrastructures, providing holistic protectio

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 42% Small-Business
Doppel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
15
Helpful
13
Ease of Use
11
Response Time
10
Alerts
4
Cons
UX Improvement
3
Poor Detection Performance
2
Dashboard Issues
1
Difficult Setup
1
Expensive
1
Doppel features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 8.9
8.7
Endpoint Intelligence
Average: 8.4
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
Doppel
Company Website
Year Founded
2022
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
171 employees on LinkedIn®
(15)4.8 out of 5
5th Easiest To Use in Threat Intelligence software
Save to My Lists
Entry Level Price:$3,000.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a security software that fills security gaps missed by typical security software and local firewall, designed to stop the data exfiltration component of modern day ransomware events.
    • Reviewers frequently mention the software's proactive monitoring, great communication, easy installation, and ability to provide up-to-the-minute reporting and tools for making security decisions.
    • Reviewers noted that the warnings can be difficult to understand for people without a lot of cybersecurity background, and they wish BlackFog would offer anti-virus and patch software to provide an all-inclusive web interface to monitor security from one console.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackFog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    8
    Security
    8
    Security Protection
    8
    Protection
    6
    Data Protection
    5
    Cons
    Billing Issues
    2
    Complexity
    2
    Learning Curve
    2
    Learning Difficulty
    2
    Limited Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    9.6
    Intelligence Reports
    Average: 8.9
    9.8
    Endpoint Intelligence
    Average: 8.4
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a security software that fills security gaps missed by typical security software and local firewall, designed to stop the data exfiltration component of modern day ransomware events.
  • Reviewers frequently mention the software's proactive monitoring, great communication, easy installation, and ability to provide up-to-the-minute reporting and tools for making security decisions.
  • Reviewers noted that the warnings can be difficult to understand for people without a lot of cybersecurity background, and they wish BlackFog would offer anti-virus and patch software to provide an all-inclusive web interface to monitor security from one console.
BlackFog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
8
Security
8
Security Protection
8
Protection
6
Data Protection
5
Cons
Billing Issues
2
Complexity
2
Learning Curve
2
Learning Difficulty
2
Limited Features
2
BlackFog features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
9.6
Intelligence Reports
Average: 8.9
9.8
Endpoint Intelligence
Average: 8.4
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,480 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 44% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Talos features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    9.2
    Intelligence Reports
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 44% Mid-Market
  • 33% Enterprise
Cisco Talos features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
9.2
Intelligence Reports
Average: 8.9
8.9
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(63)4.6 out of 5
28th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

    Users
    No information available
    Industries
    • Financial Services
    • Security and Investigations
    Market Segment
    • 57% Enterprise
    • 27% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Flashpoint Ignite is a platform that provides extensive collections of surface, deep, and dark web data for cybersecurity purposes, with features such as a search bar, keyword alerts, and integrations with messaging platforms.
    • Reviewers appreciate the platform's user-friendly interface, the ability to easily narrow down searches, the convenience of keyword alerts for tracking emerging threats, and the community feature that allows for collaboration and advice-seeking among users.
    • Users experienced issues with the platform's mobile browser compatibility, the lack of direct chat medium for discussing RFI cases, the generation of false positives from alerts, and the difficulty in navigating the dashboard.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Flashpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Features
    16
    Search Functionality
    13
    Helpful
    12
    Insights
    11
    Cons
    Search Complexity
    6
    User Frustration
    6
    Information Overload
    5
    Lack of Features
    5
    Limited Features
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flashpoint features and usability ratings that predict user satisfaction
    7.2
    Security Validation
    Average: 8.9
    8.5
    Intelligence Reports
    Average: 8.9
    7.1
    Endpoint Intelligence
    Average: 8.4
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    New York, NY
    Twitter
    @FlashpointIntel
    14,098 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    395 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

Users
No information available
Industries
  • Financial Services
  • Security and Investigations
Market Segment
  • 57% Enterprise
  • 27% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Flashpoint Ignite is a platform that provides extensive collections of surface, deep, and dark web data for cybersecurity purposes, with features such as a search bar, keyword alerts, and integrations with messaging platforms.
  • Reviewers appreciate the platform's user-friendly interface, the ability to easily narrow down searches, the convenience of keyword alerts for tracking emerging threats, and the community feature that allows for collaboration and advice-seeking among users.
  • Users experienced issues with the platform's mobile browser compatibility, the lack of direct chat medium for discussing RFI cases, the generation of false positives from alerts, and the difficulty in navigating the dashboard.
Flashpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Features
16
Search Functionality
13
Helpful
12
Insights
11
Cons
Search Complexity
6
User Frustration
6
Information Overload
5
Lack of Features
5
Limited Features
5
Flashpoint features and usability ratings that predict user satisfaction
7.2
Security Validation
Average: 8.9
8.5
Intelligence Reports
Average: 8.9
7.1
Endpoint Intelligence
Average: 8.4
8.4
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
New York, NY
Twitter
@FlashpointIntel
14,098 Twitter followers
LinkedIn® Page
www.linkedin.com
395 employees on LinkedIn®
(18)5.0 out of 5
21st Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Factal gives companies the facts they need in real time to protect people, avoid disruptions and drive automation when the unexpected happens. Factal combines lightning-fast discovery with trusted ver

    Users
    No information available
    Industries
    • Non-Profit Organization Management
    Market Segment
    • 61% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Factal Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Helpful
    6
    Alerts
    5
    Customer Support
    4
    Ease of Use
    4
    Accuracy of Information
    3
    Cons
    Information Overload
    4
    Difficult Learning Curve
    1
    Insufficient Information
    1
    Learning Curve
    1
    Slow Service
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Factal features and usability ratings that predict user satisfaction
    8.5
    Security Validation
    Average: 8.9
    7.3
    Intelligence Reports
    Average: 8.9
    7.8
    Endpoint Intelligence
    Average: 8.4
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Factal
    Year Founded
    2018
    HQ Location
    Seattle, WA
    Twitter
    @factal
    11,530 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Factal gives companies the facts they need in real time to protect people, avoid disruptions and drive automation when the unexpected happens. Factal combines lightning-fast discovery with trusted ver

Users
No information available
Industries
  • Non-Profit Organization Management
Market Segment
  • 61% Enterprise
  • 33% Mid-Market
Factal Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Helpful
6
Alerts
5
Customer Support
4
Ease of Use
4
Accuracy of Information
3
Cons
Information Overload
4
Difficult Learning Curve
1
Insufficient Information
1
Learning Curve
1
Slow Service
1
Factal features and usability ratings that predict user satisfaction
8.5
Security Validation
Average: 8.9
7.3
Intelligence Reports
Average: 8.9
7.8
Endpoint Intelligence
Average: 8.4
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
Factal
Year Founded
2018
HQ Location
Seattle, WA
Twitter
@factal
11,530 Twitter followers
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®
(69)4.3 out of 5
26th Easiest To Use in Threat Intelligence software
View top Consulting Services for Lookout
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 43% Small-Business
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lookout Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Data Security
    1
    Email Security
    1
    Network Security
    1
    Protection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lookout features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.6
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lookout
    Year Founded
    2007
    HQ Location
    San Francisco, CA
    Twitter
    @Lookout
    45,386 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    630 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 43% Small-Business
  • 41% Enterprise
Lookout Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Data Security
1
Email Security
1
Network Security
1
Protection
1
Cons
This product has not yet received any negative sentiments.
Lookout features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.6
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
Lookout
Year Founded
2007
HQ Location
San Francisco, CA
Twitter
@Lookout
45,386 Twitter followers
LinkedIn® Page
www.linkedin.com
630 employees on LinkedIn®
(89)4.3 out of 5
27th Easiest To Use in Threat Intelligence software
Save to My Lists
Entry Level Price:Starting at €1.67
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Learning
    1
    Ease of Management
    1
    Ease of Use
    1
    Easy Integrations
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
    Information Deficiency
    1
    Lack of Features
    1
    Limited Accessibility
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logpoint features and usability ratings that predict user satisfaction
    9.3
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 8.4
    8.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logpoint
    Company Website
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region
    Twitter
    @LogPointSIEM
    996 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 29% Small-Business
Logpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Learning
1
Ease of Management
1
Ease of Use
1
Easy Integrations
1
Implementation Ease
1
Cons
Expensive
1
Information Deficiency
1
Lack of Features
1
Limited Accessibility
1
Limited Features
1
Logpoint features and usability ratings that predict user satisfaction
9.3
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.4
Endpoint Intelligence
Average: 8.4
8.1
Ease of Use
Average: 8.8
Seller Details
Seller
Logpoint
Company Website
Year Founded
2001
HQ Location
Copenhagen, Capital Region
Twitter
@LogPointSIEM
996 Twitter followers
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®
(192)4.5 out of 5
Optimized for quick response
22nd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Integrations
    3
    Features
    3
    Customer Support
    2
    Cybersecurity
    2
    Cons
    Complex Interface
    2
    Improvements Needed
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Integrations
3
Features
3
Customer Support
2
Cybersecurity
2
Cons
Complex Interface
2
Improvements Needed
2
Poor Interface Design
2
UX Improvement
2
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,270 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
(138)4.5 out of 5
Optimized for quick response
25th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 52% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    46
    Security
    45
    Ease of Use
    43
    Automation
    32
    Vulnerability Detection
    32
    Cons
    Expensive
    12
    Limited Scope
    12
    Technical Issues
    11
    Limited Features
    10
    Inadequate Reporting
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    7.8
    Endpoint Intelligence
    Average: 8.4
    8.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,347 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    410 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 52% Enterprise
  • 38% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
46
Security
45
Ease of Use
43
Automation
32
Vulnerability Detection
32
Cons
Expensive
12
Limited Scope
12
Technical Issues
11
Limited Features
10
Inadequate Reporting
9
Pentera features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
7.8
Endpoint Intelligence
Average: 8.4
8.7
Ease of Use
Average: 8.8
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,347 Twitter followers
LinkedIn® Page
www.linkedin.com
410 employees on LinkedIn®
(11)4.8 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence and observables by enabling cybersecurity teams to organize, store, and operationalize threat i

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenCTI by Filigran Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    6
    Integration Capabilities
    5
    Ease of Use
    4
    Threat Detection
    4
    Automation
    3
    Cons
    Poor Customer Support
    2
    Deployment Difficulties
    1
    Difficult Customization
    1
    Difficult Learning Curve
    1
    Lack of Automation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenCTI by Filigran features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    8.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Filigran
    Company Website
    Year Founded
    2022
    HQ Location
    New York, US
    Twitter
    @FiligranHQ
    715 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence and observables by enabling cybersecurity teams to organize, store, and operationalize threat i

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 36% Mid-Market
OpenCTI by Filigran Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
6
Integration Capabilities
5
Ease of Use
4
Threat Detection
4
Automation
3
Cons
Poor Customer Support
2
Deployment Difficulties
1
Difficult Customization
1
Difficult Learning Curve
1
Lack of Automation
1
OpenCTI by Filigran features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
8.5
Ease of Use
Average: 8.8
Seller Details
Seller
Filigran
Company Website
Year Founded
2022
HQ Location
New York, US
Twitter
@FiligranHQ
715 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
(167)4.3 out of 5
Optimized for quick response
30th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Resolver gathers all risk data and analyzes it in context—revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks —w

    Users
    No information available
    Industries
    • Security and Investigations
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Resolver Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    50
    Customization
    39
    Customer Support
    38
    Customizability
    37
    Features
    36
    Cons
    Complexity
    31
    Improvement Needed
    21
    Limited Features
    19
    Difficult Learning
    17
    Difficulty
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Resolver features and usability ratings that predict user satisfaction
    6.9
    Security Validation
    Average: 8.9
    8.2
    Intelligence Reports
    Average: 8.9
    7.3
    Endpoint Intelligence
    Average: 8.4
    7.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Resolver
    Company Website
    HQ Location
    Toronto, Canada
    Twitter
    @Resolver
    5,023 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    436 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Resolver gathers all risk data and analyzes it in context—revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks —w

Users
No information available
Industries
  • Security and Investigations
  • Financial Services
Market Segment
  • 49% Enterprise
  • 38% Mid-Market
Resolver Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
50
Customization
39
Customer Support
38
Customizability
37
Features
36
Cons
Complexity
31
Improvement Needed
21
Limited Features
19
Difficult Learning
17
Difficulty
17
Resolver features and usability ratings that predict user satisfaction
6.9
Security Validation
Average: 8.9
8.2
Intelligence Reports
Average: 8.9
7.3
Endpoint Intelligence
Average: 8.4
7.9
Ease of Use
Average: 8.8
Seller Details
Seller
Resolver
Company Website
HQ Location
Toronto, Canada
Twitter
@Resolver
5,023 Twitter followers
LinkedIn® Page
www.linkedin.com
436 employees on LinkedIn®
(57)4.0 out of 5
29th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Threat Intelligence Exchange Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Investigation Management
    1
    Threat Detection
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Threat Intelligence Exchange features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.6
    Intelligence Reports
    Average: 8.9
    8.1
    Endpoint Intelligence
    Average: 8.4
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 37% Small-Business
Trellix Threat Intelligence Exchange Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Investigation Management
1
Threat Detection
1
Cons
Integration Issues
1
Trellix Threat Intelligence Exchange features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.6
Intelligence Reports
Average: 8.9
8.1
Endpoint Intelligence
Average: 8.4
8.4
Ease of Use
Average: 8.8
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Small-Business
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SophosLabs Intelix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    3
    Ease of Use
    3
    Speed
    3
    Implementation Ease
    2
    Email Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SophosLabs Intelix features and usability ratings that predict user satisfaction
    7.3
    Security Validation
    Average: 8.9
    7.8
    Intelligence Reports
    Average: 8.9
    7.2
    Endpoint Intelligence
    Average: 8.4
    7.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,926 employees on LinkedIn®
    Ownership
    LSE:SOPH
Users
No information available
Industries
No information available
Market Segment
  • 64% Small-Business
  • 29% Mid-Market
SophosLabs Intelix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
3
Ease of Use
3
Speed
3
Implementation Ease
2
Email Security
1
Cons
This product has not yet received any negative sentiments.
SophosLabs Intelix features and usability ratings that predict user satisfaction
7.3
Security Validation
Average: 8.9
7.8
Intelligence Reports
Average: 8.9
7.2
Endpoint Intelligence
Average: 8.4
7.3
Ease of Use
Average: 8.8
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
4,926 employees on LinkedIn®
Ownership
LSE:SOPH
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatConnect Threat Intelligence Operations (TIOps) Platform lets organizations truly operationalize and evolve their cyber threat intel program, enabling cybersecurity operations teams to measur

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 58% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatConnect Threat Intelligence Ops Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Features
    3
    Threat Detection
    3
    Cybersecurity
    2
    Implementation Ease
    2
    Cons
    Inadequate Reporting
    1
    Navigation Issues
    1
    Poor Navigation
    1
    Poor Reporting
    1
    Software Bugs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatConnect Threat Intelligence Ops Platform features and usability ratings that predict user satisfaction
    8.0
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    7.9
    Endpoint Intelligence
    Average: 8.4
    7.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Arlington, US
    Twitter
    @ThreatConnect
    14,337 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    167 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatConnect Threat Intelligence Operations (TIOps) Platform lets organizations truly operationalize and evolve their cyber threat intel program, enabling cybersecurity operations teams to measur

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 58% Enterprise
  • 50% Mid-Market
ThreatConnect Threat Intelligence Ops Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Features
3
Threat Detection
3
Cybersecurity
2
Implementation Ease
2
Cons
Inadequate Reporting
1
Navigation Issues
1
Poor Navigation
1
Poor Reporting
1
Software Bugs
1
ThreatConnect Threat Intelligence Ops Platform features and usability ratings that predict user satisfaction
8.0
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
7.9
Endpoint Intelligence
Average: 8.4
7.8
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Arlington, US
Twitter
@ThreatConnect
14,337 Twitter followers
LinkedIn® Page
www.linkedin.com
167 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    McAfee GTI for ESM delivers a constantly updated, rich feed that enables rapid discovery of events involving communications with suspicious or malicious IP addresses.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Global Threat Intelligence (GTI) features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 8.9
    8.6
    Endpoint Intelligence
    Average: 8.4
    8.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

McAfee GTI for ESM delivers a constantly updated, rich feed that enables rapid discovery of events involving communications with suspicious or malicious IP addresses.

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Trellix Global Threat Intelligence (GTI) features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 8.9
8.6
Endpoint Intelligence
Average: 8.4
8.0
Ease of Use
Average: 8.8
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Defendify All-In-One Cybersecurity® Solution Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    3
    Scanning Efficiency
    3
    Threat Detection
    3
    Affordable
    2
    Automated Scanning
    2
    Cons
    Integration Issues
    1
    Poor Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity® Solution features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    8.7
    Intelligence Reports
    Average: 8.9
    9.3
    Endpoint Intelligence
    Average: 8.4
    9.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    312 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity® Solution Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
3
Scanning Efficiency
3
Threat Detection
3
Affordable
2
Automated Scanning
2
Cons
Integration Issues
1
Poor Integration
1
Defendify All-In-One Cybersecurity® Solution features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
8.7
Intelligence Reports
Average: 8.9
9.3
Endpoint Intelligence
Average: 8.4
9.4
Ease of Use
Average: 8.8
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
312 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SpyCloud protects businesses from identity-based cyberattacks. We proactively alert security teams when their users' data has been compromised by a malware infection or third-party breach, and automat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SpyCloud features and usability ratings that predict user satisfaction
    7.5
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    0.0
    No information available
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SpyCloud
    Year Founded
    2016
    HQ Location
    Austin, Texas
    LinkedIn® Page
    www.linkedin.com
    225 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SpyCloud protects businesses from identity-based cyberattacks. We proactively alert security teams when their users' data has been compromised by a malware infection or third-party breach, and automat

Users
No information available
Industries
No information available
Market Segment
  • 46% Mid-Market
  • 38% Enterprise
SpyCloud features and usability ratings that predict user satisfaction
7.5
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
0.0
No information available
9.2
Ease of Use
Average: 8.8
Seller Details
Seller
SpyCloud
Year Founded
2016
HQ Location
Austin, Texas
LinkedIn® Page
www.linkedin.com
225 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra's PhishLabs is a cyber threat intelligence company that delivers Digital Risk Protection through curated threat intelligence and complete mitigation. PhishLabs provides brand impersonation, acc

    Users
    No information available
    Industries
    • Computer & Network Security
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 28% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PhishLabs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    7
    Alerts
    4
    Security
    4
    Threat Detection
    4
    Ease of Use
    3
    Cons
    Expensive
    2
    Integration Issues
    1
    Limited Features
    1
    Outdated Interface
    1
    Poor Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PhishLabs features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    9.0
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Company Website
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra's PhishLabs is a cyber threat intelligence company that delivers Digital Risk Protection through curated threat intelligence and complete mitigation. PhishLabs provides brand impersonation, acc

Users
No information available
Industries
  • Computer & Network Security
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 28% Small-Business
PhishLabs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
7
Alerts
4
Security
4
Threat Detection
4
Ease of Use
3
Cons
Expensive
2
Integration Issues
1
Limited Features
1
Outdated Interface
1
Poor Design
1
PhishLabs features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
9.0
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
Seller
Fortra
Company Website
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
(106)4.2 out of 5
Optimized for quick response
31st Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automated Vulnerability Scanning. Affordably Priced For Everyone! With almost 70 new hidden vulnerabilities identified every day, you would need to be a super hero with X-ray vision to find them all.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 67% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VulScan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    35
    Features
    20
    Scanning Efficiency
    20
    Automated Scanning
    17
    Reporting Features
    17
    Cons
    Inadequate Reporting
    9
    Limited Reporting
    9
    Setup Difficulties
    9
    UX Improvement
    9
    Difficult Setup
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VulScan features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    7.7
    Intelligence Reports
    Average: 8.9
    8.0
    Endpoint Intelligence
    Average: 8.4
    8.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automated Vulnerability Scanning. Affordably Priced For Everyone! With almost 70 new hidden vulnerabilities identified every day, you would need to be a super hero with X-ray vision to find them all.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 67% Small-Business
  • 31% Mid-Market
VulScan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
35
Features
20
Scanning Efficiency
20
Automated Scanning
17
Reporting Features
17
Cons
Inadequate Reporting
9
Limited Reporting
9
Setup Difficulties
9
UX Improvement
9
Difficult Setup
8
VulScan features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
7.7
Intelligence Reports
Average: 8.9
8.0
Endpoint Intelligence
Average: 8.4
8.2
Ease of Use
Average: 8.8
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point SandBlast Network Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Protection
    2
    Threat Detection
    2
    Accuracy of Information
    1
    Customer Support
    1
    Deployment Ease
    1
    Cons
    Cost
    1
    Expensive
    1
    Limited Customization
    1
    Slow Loading
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point SandBlast Network features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    7.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Check Point SandBlast Network Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Protection
2
Threat Detection
2
Accuracy of Information
1
Customer Support
1
Deployment Ease
1
Cons
Cost
1
Expensive
1
Limited Customization
1
Slow Loading
1
UX Improvement
1
Check Point SandBlast Network features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
7.4
Ease of Use
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silo for Research is a fully-isolated, secure and anonymous managed attribution platform that enables users to conduct digital investigations, collect evidence and analyze data across the surface, dee

    Users
    No information available
    Industries
    • Information Technology and Services
    • Telecommunications
    Market Segment
    • 49% Mid-Market
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Authentic8 Silo for Research Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Security
    6
    Implementation Ease
    3
    Installation Ease
    3
    Security Protection
    3
    Cons
    Expensive
    1
    Poor Customer Support
    1
    Slow Service
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authentic8 Silo for Research features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    9.2
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    Redwood City, US
    Twitter
    @Authentic8
    3,031 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    123 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silo for Research is a fully-isolated, secure and anonymous managed attribution platform that enables users to conduct digital investigations, collect evidence and analyze data across the surface, dee

Users
No information available
Industries
  • Information Technology and Services
  • Telecommunications
Market Segment
  • 49% Mid-Market
  • 27% Small-Business
Authentic8 Silo for Research Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Security
6
Implementation Ease
3
Installation Ease
3
Security Protection
3
Cons
Expensive
1
Poor Customer Support
1
Slow Service
1
UX Improvement
1
Authentic8 Silo for Research features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
9.2
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
Redwood City, US
Twitter
@Authentic8
3,031 Twitter followers
LinkedIn® Page
www.linkedin.com
123 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SIRP features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    9.8
    Endpoint Intelligence
    Average: 8.4
    9.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SIRP
    Year Founded
    2017
    HQ Location
    London
    Twitter
    @sirp_io
    72 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Small-Business
  • 37% Mid-Market
SIRP features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
9.8
Endpoint Intelligence
Average: 8.4
9.5
Ease of Use
Average: 8.8
Seller Details
Seller
SIRP
Year Founded
2017
HQ Location
London
Twitter
@sirp_io
72 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Maltego Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    2
    Artificial Intelligence
    1
    Data Protection
    1
    Detailed Analysis
    1
    Easy Integrations
    1
    Cons
    Access Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    9.3
    Security Validation
    Average: 8.9
    9.5
    Intelligence Reports
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 8.4
    7.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    13,804 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
2
Artificial Intelligence
1
Data Protection
1
Detailed Analysis
1
Easy Integrations
1
Cons
Access Limitations
1
Maltego features and usability ratings that predict user satisfaction
9.3
Security Validation
Average: 8.9
9.5
Intelligence Reports
Average: 8.9
8.9
Endpoint Intelligence
Average: 8.4
7.9
Ease of Use
Average: 8.8
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
13,804 Twitter followers
LinkedIn® Page
www.linkedin.com
152 employees on LinkedIn®
(87)4.7 out of 5
32nd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 8.9
    8.7
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,694 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 8.9
8.7
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,694 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zignal's real-time intelligence technology helps the world's largest organizations protect their people, places, and position.

    Users
    No information available
    Industries
    • Public Relations and Communications
    Market Segment
    • 40% Enterprise
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zignal Labs features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    7.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    San Francisco, California
    Twitter
    @ZignalLabs
    3,399 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zignal's real-time intelligence technology helps the world's largest organizations protect their people, places, and position.

Users
No information available
Industries
  • Public Relations and Communications
Market Segment
  • 40% Enterprise
  • 30% Small-Business
Zignal Labs features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
7.2
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
San Francisco, California
Twitter
@ZignalLabs
3,399 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OnSecurity is a leading CREST-accredited penetration testing vendor based in the UK, dedicated to delivering high-impact, high-intelligence penetration testing services to businesses of all sizes. B

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 64% Small-Business
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OnSecurity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Bristol, GB
    Twitter
    @weareonsecurity
    1,362 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    57 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OnSecurity is a leading CREST-accredited penetration testing vendor based in the UK, dedicated to delivering high-impact, high-intelligence penetration testing services to businesses of all sizes. B

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 64% Small-Business
  • 31% Mid-Market
OnSecurity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.6
Ease of Use
Average: 8.8
Seller Details
Year Founded
2018
HQ Location
Bristol, GB
Twitter
@weareonsecurity
1,362 Twitter followers
LinkedIn® Page
www.linkedin.com
57 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Use intelligent insights and guidance to strengthen your organization’s security posture with Microsoft Secure Score.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Secure Score Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Recommendations
    2
    Security
    1
    Cons
    False Positives
    1
    Incomplete Information
    1
    Limited Functionality
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Secure Score features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    6.7
    Intelligence Reports
    Average: 8.9
    5.0
    Endpoint Intelligence
    Average: 8.4
    8.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @cloudworxs
    15 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Use intelligent insights and guidance to strengthen your organization’s security posture with Microsoft Secure Score.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 40% Enterprise
Microsoft Secure Score Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Recommendations
2
Security
1
Cons
False Positives
1
Incomplete Information
1
Limited Functionality
1
Microsoft Secure Score features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
6.7
Intelligence Reports
Average: 8.9
5.0
Endpoint Intelligence
Average: 8.4
8.6
Ease of Use
Average: 8.8
Seller Details
HQ Location
N/A
Twitter
@cloudworxs
15 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scout Ultimate is a web-based threat intelligence tool for security analysts of all experience levels. With a simple GUI, graphical displays, tagged results, and easy to use searches, it helps quickl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Mid-Market
    • 22% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pure Signal™ Scout Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Features
    5
    Accuracy of Information
    4
    Detailed Analysis
    4
    Investigation Management
    3
    Cons
    Poor Visibility
    4
    UX Improvement
    4
    Lack of Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pure Signal™ Scout features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    9.4
    Intelligence Reports
    Average: 8.9
    7.9
    Endpoint Intelligence
    Average: 8.4
    9.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1998
    HQ Location
    Lake Mary, FL
    Twitter
    @teamcymru
    41,478 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scout Ultimate is a web-based threat intelligence tool for security analysts of all experience levels. With a simple GUI, graphical displays, tagged results, and easy to use searches, it helps quickl

Users
No information available
Industries
No information available
Market Segment
  • 56% Mid-Market
  • 22% Enterprise
Pure Signal™ Scout Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Features
5
Accuracy of Information
4
Detailed Analysis
4
Investigation Management
3
Cons
Poor Visibility
4
UX Improvement
4
Lack of Customization
1
Pure Signal™ Scout features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
9.4
Intelligence Reports
Average: 8.9
7.9
Endpoint Intelligence
Average: 8.4
9.6
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
1998
HQ Location
Lake Mary, FL
Twitter
@teamcymru
41,478 Twitter followers
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Social Links is a global OSINT (Open Source Intelligence) vendor that empowers investigators and security professionals with ground-breaking AI-powered products. We assemble massive volumes of data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Small-Business
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SL Professional features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 8.4
    9.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    New York, US
    Twitter
    @_SocialLinks_
    13,811 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    90 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Social Links is a global OSINT (Open Source Intelligence) vendor that empowers investigators and security professionals with ground-breaking AI-powered products. We assemble massive volumes of data

Users
No information available
Industries
No information available
Market Segment
  • 73% Small-Business
  • 18% Mid-Market
SL Professional features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
10.0
Endpoint Intelligence
Average: 8.4
9.7
Ease of Use
Average: 8.8
Seller Details
Year Founded
2015
HQ Location
New York, US
Twitter
@_SocialLinks_
13,811 Twitter followers
LinkedIn® Page
www.linkedin.com
90 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range o

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threater features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 8.4
    9.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Threater
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range o

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 27% Enterprise
Threater features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
10.0
Endpoint Intelligence
Average: 8.4
9.5
Ease of Use
Average: 8.8
Seller Details
Seller
Threater
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
Entry Level Price:Starting at $15.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 63% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veriato Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Monitoring
    11
    Customer Support
    8
    Employee Monitoring
    8
    Activity Monitoring
    7
    Cons
    Setup Difficulties
    9
    Difficult Setup
    8
    Technical Issues
    8
    Complex Setup
    6
    Software Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veriato features and usability ratings that predict user satisfaction
    7.8
    Security Validation
    Average: 8.9
    8.1
    Intelligence Reports
    Average: 8.9
    7.8
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veriato
    Year Founded
    1998
    HQ Location
    West Palm Beach, US
    Twitter
    @Veriato
    1,337 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

Users
No information available
Industries
  • Financial Services
Market Segment
  • 63% Mid-Market
  • 29% Small-Business
Veriato Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Monitoring
11
Customer Support
8
Employee Monitoring
8
Activity Monitoring
7
Cons
Setup Difficulties
9
Difficult Setup
8
Technical Issues
8
Complex Setup
6
Software Issues
5
Veriato features and usability ratings that predict user satisfaction
7.8
Security Validation
Average: 8.9
8.1
Intelligence Reports
Average: 8.9
7.8
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Veriato
Year Founded
1998
HQ Location
West Palm Beach, US
Twitter
@Veriato
1,337 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZeroTrusted.ai provides robust LLM Firewall solutions to safeguard your data and identity in the AI landscape. Our cutting-edge service ensures your sensitive information remains secure by offering pr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ZeroTrusted.ai Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Protection
    6
    Security
    3
    Ease of Use
    2
    Reliability
    2
    Accuracy of Information
    1
    Cons
    Difficult Setup
    2
    Not User-Friendly
    2
    Dashboard Issues
    1
    Expensive
    1
    Insufficient Training
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZeroTrusted.ai features and usability ratings that predict user satisfaction
    9.4
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Kissimmee, US
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZeroTrusted.ai provides robust LLM Firewall solutions to safeguard your data and identity in the AI landscape. Our cutting-edge service ensures your sensitive information remains secure by offering pr

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ZeroTrusted.ai Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Protection
6
Security
3
Ease of Use
2
Reliability
2
Accuracy of Information
1
Cons
Difficult Setup
2
Not User-Friendly
2
Dashboard Issues
1
Expensive
1
Insufficient Training
1
ZeroTrusted.ai features and usability ratings that predict user satisfaction
9.4
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
9.4
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
HQ Location
Kissimmee, US
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Security Randori Recon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    9
    Threat Detection
    8
    Vulnerability Identification
    8
    Ease of Use
    7
    Features
    7
    Cons
    Integration Issues
    7
    Lack of Integration
    6
    Difficult Setup
    3
    Expensive
    3
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Randori Recon features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    7.9
    Intelligence Reports
    Average: 8.9
    8.8
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
IBM Security Randori Recon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
9
Threat Detection
8
Vulnerability Identification
8
Ease of Use
7
Features
7
Cons
Integration Issues
7
Lack of Integration
6
Difficult Setup
3
Expensive
3
Complexity
2
IBM Security Randori Recon features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
7.9
Intelligence Reports
Average: 8.9
8.8
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LMNTRIX features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 8.4
    9.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LMNTRIX
    Year Founded
    2015
    HQ Location
    Orange, California
    Twitter
    @lmntrixlabs
    76 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Enterprise
LMNTRIX features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
9.4
Endpoint Intelligence
Average: 8.4
9.6
Ease of Use
Average: 8.8
Seller Details
Seller
LMNTRIX
Year Founded
2015
HQ Location
Orange, California
Twitter
@lmntrixlabs
76 Twitter followers
LinkedIn® Page
www.linkedin.com
56 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reflectiz keeps online businesses safe by mitigating security and privacy risks resulting from next generation third-party threats on your website, without adding a single line of code.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Reflectiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Monitoring
    3
    Real-time Monitoring
    3
    Alerts
    2
    Customer Support
    2
    Cons
    Expensive
    2
    Complexity
    1
    Insufficient Training
    1
    Learning Difficulty
    1
    Limited Functionality
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Reflectiz features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Reflectiz
    Year Founded
    2016
    HQ Location
    Ramat Gan, IL
    Twitter
    @_Reflectiz_
    2,207 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reflectiz keeps online businesses safe by mitigating security and privacy risks resulting from next generation third-party threats on your website, without adding a single line of code.

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 27% Mid-Market
Reflectiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Monitoring
3
Real-time Monitoring
3
Alerts
2
Customer Support
2
Cons
Expensive
2
Complexity
1
Insufficient Training
1
Learning Difficulty
1
Limited Functionality
1
Reflectiz features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
Reflectiz
Year Founded
2016
HQ Location
Ramat Gan, IL
Twitter
@_Reflectiz_
2,207 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Semperis Directory Services Protector puts Active Directory security and identity threat detection and response on autopilot with continuous AD threat monitoring, real-time alerts, and autonomous reme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 76% Enterprise
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Semperis Directory Services Protector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Features
    7
    Alerts
    5
    Customer Support
    5
    Monitoring
    5
    Cons
    Poor Reporting
    3
    Communication Issues
    2
    Complex Setup
    2
    Data Inconsistency
    2
    Deployment Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Semperis Directory Services Protector features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    9.2
    Intelligence Reports
    Average: 8.9
    5.8
    Endpoint Intelligence
    Average: 8.4
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Semperis
    Company Website
    Year Founded
    2015
    HQ Location
    Hoboken, New Jersey
    Twitter
    @SemperisTech
    10,097 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    510 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Semperis Directory Services Protector puts Active Directory security and identity threat detection and response on autopilot with continuous AD threat monitoring, real-time alerts, and autonomous reme

Users
No information available
Industries
No information available
Market Segment
  • 76% Enterprise
  • 24% Mid-Market
Semperis Directory Services Protector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Features
7
Alerts
5
Customer Support
5
Monitoring
5
Cons
Poor Reporting
3
Communication Issues
2
Complex Setup
2
Data Inconsistency
2
Deployment Issues
2
Semperis Directory Services Protector features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
9.2
Intelligence Reports
Average: 8.9
5.8
Endpoint Intelligence
Average: 8.4
9.2
Ease of Use
Average: 8.8
Seller Details
Seller
Semperis
Company Website
Year Founded
2015
HQ Location
Hoboken, New Jersey
Twitter
@SemperisTech
10,097 Twitter followers
LinkedIn® Page
www.linkedin.com
510 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyber Hawk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    2
    Ease of Use
    2
    Monitoring
    2
    Threat Detection
    2
    Cloud Security
    1
    Cons
    Expensive
    2
    Pricing Issues
    2
    Slow Performance
    2
    High Resource Usage
    1
    Network Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber Hawk features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.7
    Intelligence Reports
    Average: 8.9
    8.8
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 33% Enterprise
Cyber Hawk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
2
Ease of Use
2
Monitoring
2
Threat Detection
2
Cloud Security
1
Cons
Expensive
2
Pricing Issues
2
Slow Performance
2
High Resource Usage
1
Network Issues
1
Cyber Hawk features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.7
Intelligence Reports
Average: 8.9
8.8
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Seller Details
Seller
Kaseya
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations n

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Exabeam New-Scale Fusion Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    2
    Features
    2
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Information Deficiency
    1
    Insufficient Detail
    1
    Not User-Friendly
    1
    Parsing Issues
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Exabeam New-Scale Fusion features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    9.6
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.4
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,344 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    943 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations n

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 31% Mid-Market
Exabeam New-Scale Fusion Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
2
Features
2
Integration Capabilities
1
Integrations
1
Cons
Information Deficiency
1
Insufficient Detail
1
Not User-Friendly
1
Parsing Issues
1
Poor Interface Design
1
Exabeam New-Scale Fusion features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
9.6
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.4
9.2
Ease of Use
Average: 8.8
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,344 Twitter followers
LinkedIn® Page
www.linkedin.com
943 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk Intelligence Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Insights
    4
    Detailed Analysis
    3
    Features
    3
    Accuracy of Information
    2
    Cons
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Expensive
    3
    Learning Curve
    3
    Additional Costs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Intelligence Management features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    8.6
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Splunk Intelligence Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Insights
4
Detailed Analysis
3
Features
3
Accuracy of Information
2
Cons
Difficult Learning
3
Difficult Learning Curve
3
Expensive
3
Learning Curve
3
Additional Costs
1
Splunk Intelligence Management features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
8.6
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Small-Business
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatWorx features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.4
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    LOS GATOS, US
    Twitter
    @threatwatch
    102 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

Users
No information available
Industries
No information available
Market Segment
  • 40% Small-Business
  • 40% Mid-Market
ThreatWorx features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.4
9.2
Ease of Use
Average: 8.8
Seller Details
Year Founded
2016
HQ Location
LOS GATOS, US
Twitter
@threatwatch
102 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Small-Business
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bitdefender Advanced Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    2
    Detailed Analysis
    2
    Security
    2
    Threat Detection
    2
    Accuracy of Information
    1
    Cons
    Complex Implementation
    1
    Complexity
    1
    Difficult Learning Curve
    1
    Information Overload
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitdefender Advanced Threat Intelligence features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.9
    9.7
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    6.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    Bucuresti, Romania
    Twitter
    @Bitdefender
    113,319 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,287 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 83% Small-Business
  • 17% Mid-Market
Bitdefender Advanced Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
2
Detailed Analysis
2
Security
2
Threat Detection
2
Accuracy of Information
1
Cons
Complex Implementation
1
Complexity
1
Difficult Learning Curve
1
Information Overload
1
Bitdefender Advanced Threat Intelligence features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.9
9.7
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
6.1
Ease of Use
Average: 8.8
Seller Details
Year Founded
2001
HQ Location
Bucuresti, Romania
Twitter
@Bitdefender
113,319 Twitter followers
LinkedIn® Page
www.linkedin.com
2,287 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MetaDefender provides comprehensive file upload security to protect against malware and data breaches.​ OPSWAT designed MetaDefender to secure the world’s critical infrastructure from the most sophist

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • MetaDefender Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Affordable
    3
    Ease of Use
    3
    Pricing
    3
    Protection
    3
    Cons
    Lack of Features
    2
    Limited Features
    2
    Compatibility Issues
    1
    Inadequate Protection
    1
    Limited OS Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaDefender features and usability ratings that predict user satisfaction
    7.2
    Security Validation
    Average: 8.9
    7.8
    Intelligence Reports
    Average: 8.9
    6.7
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,232 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    982 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MetaDefender provides comprehensive file upload security to protect against malware and data breaches.​ OPSWAT designed MetaDefender to secure the world’s critical infrastructure from the most sophist

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
MetaDefender Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Affordable
3
Ease of Use
3
Pricing
3
Protection
3
Cons
Lack of Features
2
Limited Features
2
Compatibility Issues
1
Inadequate Protection
1
Limited OS Support
1
MetaDefender features and usability ratings that predict user satisfaction
7.2
Security Validation
Average: 8.9
7.8
Intelligence Reports
Average: 8.9
6.7
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Seller Details
Seller
OPSWAT
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,232 Twitter followers
LinkedIn® Page
www.linkedin.com
982 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Combining detection, threat intelligence and robust disruption & takedown, Netcraft’s automated digital risk protection platform keeps your organization and customers safe from phishing, scams, fr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Netcraft Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    1
    Security Protection
    1
    Threat Detection
    1
    Cons
    Lack of Customization
    1
    Limited Features
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netcraft features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netcraft
    Year Founded
    1994
    Twitter
    @Netcraft
    4,498 Twitter followers
    LinkedIn® Page
    linkedin.com
    167 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Combining detection, threat intelligence and robust disruption & takedown, Netcraft’s automated digital risk protection platform keeps your organization and customers safe from phishing, scams, fr

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Mid-Market
Netcraft Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
1
Security Protection
1
Threat Detection
1
Cons
Lack of Customization
1
Limited Features
1
Poor Reporting
1
Netcraft features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Netcraft
Year Founded
1994
Twitter
@Netcraft
4,498 Twitter followers
LinkedIn® Page
linkedin.com
167 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TechOwl's Attack Surface Dashboard epitomizes the sophistication of our SaaS solution, providing a comprehensive view of your digital threat landscape. This state-of-the-art dashboard offers an intera

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Mid-Market
    • 17% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • TechOwl Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    3
    Monitoring
    2
    Reporting
    2
    Alerts
    1
    Customer Support
    1
    Cons
    False Positives
    1
    Lack of Customization
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TechOwl Shield features and usability ratings that predict user satisfaction
    9.3
    Security Validation
    Average: 8.9
    9.0
    Intelligence Reports
    Average: 8.9
    8.0
    Endpoint Intelligence
    Average: 8.4
    8.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Surat, IN
    LinkedIn® Page
    www.linkedin.com
    29 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TechOwl's Attack Surface Dashboard epitomizes the sophistication of our SaaS solution, providing a comprehensive view of your digital threat landscape. This state-of-the-art dashboard offers an intera

Users
No information available
Industries
No information available
Market Segment
  • 83% Mid-Market
  • 17% Small-Business
TechOwl Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
3
Monitoring
2
Reporting
2
Alerts
1
Customer Support
1
Cons
False Positives
1
Lack of Customization
1
UX Improvement
1
TechOwl Shield features and usability ratings that predict user satisfaction
9.3
Security Validation
Average: 8.9
9.0
Intelligence Reports
Average: 8.9
8.0
Endpoint Intelligence
Average: 8.4
8.6
Ease of Use
Average: 8.8
Seller Details
Year Founded
2013
HQ Location
Surat, IN
LinkedIn® Page
www.linkedin.com
29 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    c/side protects organizations from advanced client-side threats such as script injection, data skimming, and browser-based attacks, risks often overlooked by traditional security measures. It also add

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • c/side Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Monitoring
    1
    Network Security
    1
    Response Time
    1
    Threat Detection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • c/side features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 8.4
    9.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    cside
Product Description
How are these determined?Information
This description is provided by the seller.

c/side protects organizations from advanced client-side threats such as script injection, data skimming, and browser-based attacks, risks often overlooked by traditional security measures. It also add

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 20% Mid-Market
c/side Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Monitoring
1
Network Security
1
Response Time
1
Threat Detection
1
Cons
This product has not yet received any negative sentiments.
c/side features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
7.5
Endpoint Intelligence
Average: 8.4
9.6
Ease of Use
Average: 8.8
Seller Details
Seller
cside
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Small-Business
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DomainTools Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Detailed Analysis
    1
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Cons
    False Positives
    2
    Complexity
    1
    Data Management
    1
    Expensive
    1
    Incomplete Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DomainTools features and usability ratings that predict user satisfaction
    7.2
    Security Validation
    Average: 8.9
    6.7
    Intelligence Reports
    Average: 8.9
    7.8
    Endpoint Intelligence
    Average: 8.4
    8.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Seattle, WA, Washington
    Twitter
    @DomainTools
    13,238 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    149 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify

Users
No information available
Industries
No information available
Market Segment
  • 62% Small-Business
  • 31% Enterprise
DomainTools Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Detailed Analysis
1
Ease of Use
1
Easy Integrations
1
Features
1
Cons
False Positives
2
Complexity
1
Data Management
1
Expensive
1
Incomplete Information
1
DomainTools features and usability ratings that predict user satisfaction
7.2
Security Validation
Average: 8.9
6.7
Intelligence Reports
Average: 8.9
7.8
Endpoint Intelligence
Average: 8.4
8.1
Ease of Use
Average: 8.8
Seller Details
Year Founded
2004
HQ Location
Seattle, WA, Washington
Twitter
@DomainTools
13,238 Twitter followers
LinkedIn® Page
www.linkedin.com
149 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pure Signal™Recon is a web based Threat Intelligence query platform. It allows Security Analysts access to Team Cymru’s proprietary data called Pure Signal™, enabling them to create searches and filt

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pure Signal™ Recon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    1
    Helpful
    1
    Monitoring
    1
    Cons
    Inadequate Security
    1
    Information Overload
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pure Signal™ Recon features and usability ratings that predict user satisfaction
    6.3
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 8.4
    7.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Lake Mary, FL
    Twitter
    @teamcymru
    41,478 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pure Signal™Recon is a web based Threat Intelligence query platform. It allows Security Analysts access to Team Cymru’s proprietary data called Pure Signal™, enabling them to create searches and filt

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 20% Enterprise
Pure Signal™ Recon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
1
Helpful
1
Monitoring
1
Cons
Inadequate Security
1
Information Overload
1
Pure Signal™ Recon features and usability ratings that predict user satisfaction
6.3
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
7.5
Endpoint Intelligence
Average: 8.4
7.7
Ease of Use
Average: 8.8
Seller Details
Year Founded
1998
HQ Location
Lake Mary, FL
Twitter
@teamcymru
41,478 Twitter followers
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blackbird.AI leads the ‘Narrative Intelligence' category to protect against a new threat vector called ‘Narrative Attacks’ created by deepfakes, misinformation and disinformation. Our AI-driven Conste

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blackbird.AI Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Knowledge Access
    3
    Solutions
    3
    Understanding
    3
    Detailed Analysis
    2
    Features
    2
    Cons
    Integration Issues
    2
    Limited Functionality
    2
    Difficult Learning
    1
    Difficult Learning Curve
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blackbird.AI features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    7.1
    Endpoint Intelligence
    Average: 8.4
    7.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blackbird.AI leads the ‘Narrative Intelligence' category to protect against a new threat vector called ‘Narrative Attacks’ created by deepfakes, misinformation and disinformation. Our AI-driven Conste

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Blackbird.AI Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Knowledge Access
3
Solutions
3
Understanding
3
Detailed Analysis
2
Features
2
Cons
Integration Issues
2
Limited Functionality
2
Difficult Learning
1
Difficult Learning Curve
1
Expensive
1
Blackbird.AI features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
7.1
Endpoint Intelligence
Average: 8.4
7.1
Ease of Use
Average: 8.8
Seller Details
Year Founded
2017
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threat Grid combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware. With a robust, context-rich malware knowledge base, you will understa

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Malware Analytics (Threat Grid) features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Threat Grid combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware. With a robust, context-rich malware knowledge base, you will understa

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
Cisco Secure Malware Analytics (Threat Grid) features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
10.0
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Quickly scan and identify security gaps to determine the most efficient security strategy for your customers. ConnectWise Fortify Protection combines intelligent profiling and alerting technology with

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ConnectWise Cybersecurity Management – Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Integrations
    3
    Integrations
    3
    Security
    3
    Detection Efficiency
    2
    Cons
    Outdated Software
    2
    Alert Management
    1
    Complexity
    1
    Expensive
    1
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ConnectWise Cybersecurity Management – Protection features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    6.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1982
    HQ Location
    Tampa, FL
    Twitter
    @ConnectWise
    14,998 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,224 employees on LinkedIn®
    Phone
    800-671-6898
Product Description
How are these determined?Information
This description is provided by the seller.

Quickly scan and identify security gaps to determine the most efficient security strategy for your customers. ConnectWise Fortify Protection combines intelligent profiling and alerting technology with

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Mid-Market
ConnectWise Cybersecurity Management – Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Integrations
3
Integrations
3
Security
3
Detection Efficiency
2
Cons
Outdated Software
2
Alert Management
1
Complexity
1
Expensive
1
Inefficient Alert System
1
ConnectWise Cybersecurity Management – Protection features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
6.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
1982
HQ Location
Tampa, FL
Twitter
@ConnectWise
14,998 Twitter followers
LinkedIn® Page
www.linkedin.com
3,224 employees on LinkedIn®
Phone
800-671-6898
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Darknet and Dark Web Monitoring: Affordable Darknet Threat Intel covering Social Media, Paste, Git, Data Breaches, Ransomware Sites, Onion Sites, hacker Forums etc.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 25% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaduu features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaduu AG
    Year Founded
    2018
    HQ Location
    Zug, CH
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Darknet and Dark Web Monitoring: Affordable Darknet Threat Intel covering Social Media, Paste, Git, Data Breaches, Ransomware Sites, Onion Sites, hacker Forums etc.

Users
No information available
Industries
No information available
Market Segment
  • 25% Mid-Market
  • 25% Small-Business
Kaduu features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Kaduu AG
Year Founded
2018
HQ Location
Zug, CH
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    N-able MSP Risk Intelligence makes it concrete by assigning value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tac

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • N-able Risk Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automated Scanning
    1
    Data Discovery
    1
    Detailed Analysis
    1
    Detection Efficiency
    1
    Monitoring
    1
    Cons
    False Positives
    1
    Incomplete Information
    1
    Lack of Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • N-able Risk Intelligence features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    16,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,892 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

N-able MSP Risk Intelligence makes it concrete by assigning value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tac

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 20% Mid-Market
N-able Risk Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automated Scanning
1
Data Discovery
1
Detailed Analysis
1
Detection Efficiency
1
Monitoring
1
Cons
False Positives
1
Incomplete Information
1
Lack of Information
1
N-able Risk Intelligence features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
N-able
HQ Location
Morrisville, North Carolina
Twitter
@Nable
16,217 Twitter followers
LinkedIn® Page
www.linkedin.com
1,892 employees on LinkedIn®
Ownership
NYSE: NABL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AutoFocus contextual threat intelligence service accelerates analysis, correlation and prevention workflows. Unique, targeted attacks are automatically prioritized with full context, allowing security

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks AutoFocus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Management
    1
    Detailed Analysis
    1
    Cons
    Data Privacy
    1
    Integration Issues
    1
    Lack of Automation
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks AutoFocus features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

AutoFocus contextual threat intelligence service accelerates analysis, correlation and prevention workflows. Unique, targeted attacks are automatically prioritized with full context, allowing security

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Enterprise
Palo Alto Networks AutoFocus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Management
1
Detailed Analysis
1
Cons
Data Privacy
1
Integration Issues
1
Lack of Automation
1
Limited Features
1
Palo Alto Networks AutoFocus features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.8
Ease of Use
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Premium Threat Information Service provides deeper understanding of the ongoing threat landscape and your organization's place in it, enabling you.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Premium Threat Information Service features and usability ratings that predict user satisfaction
    9.4
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,756 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Premium Threat Information Service provides deeper understanding of the ongoing threat landscape and your organization's place in it, enabling you.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Enterprise
Proofpoint Premium Threat Information Service features and usability ratings that predict user satisfaction
9.4
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
8.9
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,886 Twitter followers
LinkedIn® Page
www.linkedin.com
4,756 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ReversingLabs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Information
    1
    Ease of Use
    1
    Easy Integrations
    1
    Easy Setup
    1
    Efficiency
    1
    Cons
    Difficult Learning Curve
    1
    Difficulty for Beginners
    1
    Lack of Clarity
    1
    Learning Difficulty
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReversingLabs features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Cambridge, US
    Twitter
    @ReversingLabs
    6,663 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    314 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ReversingLabs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Information
1
Ease of Use
1
Easy Integrations
1
Easy Setup
1
Efficiency
1
Cons
Difficult Learning Curve
1
Difficulty for Beginners
1
Lack of Clarity
1
Learning Difficulty
1
Poor Documentation
1
ReversingLabs features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
Year Founded
2009
HQ Location
Cambridge, US
Twitter
@ReversingLabs
6,663 Twitter followers
LinkedIn® Page
www.linkedin.com
314 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskIQ is the leader in attack surface management. A subsidiary of Microsoft, we help organizations discover, understand, and mitigate threats and exposures.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskIQ features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 8.4
    9.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RiskIQ
    Year Founded
    2009
    HQ Location
    San Francisco, CA
    Twitter
    @RiskIQ
    11,139 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskIQ is the leader in attack surface management. A subsidiary of Microsoft, we help organizations discover, understand, and mitigate threats and exposures.

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Mid-Market
RiskIQ features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
10.0
Endpoint Intelligence
Average: 8.4
9.6
Ease of Use
Average: 8.8
Seller Details
Seller
RiskIQ
Year Founded
2009
HQ Location
San Francisco, CA
Twitter
@RiskIQ
11,139 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maximise security and minimise complexity. SenseOn offers a comprehensive Extended Detection & Response solution that empowers resource-conscious IT leaders to deliver enterprise-level security—wi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Mid-Market
    • 14% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SenseOn Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    5
    Response Time
    3
    Alerts
    2
    Deployment Ease
    2
    Ease of Use
    2
    Cons
    Difficult Learning Curve
    1
    Expensive
    1
    Information Overload
    1
    Integration Issues
    1
    Poor Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SenseOn features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    7.9
    Intelligence Reports
    Average: 8.9
    7.9
    Endpoint Intelligence
    Average: 8.4
    8.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SenseOn
    Year Founded
    2017
    HQ Location
    London, UK
    Twitter
    @SenseonTech
    1,231 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maximise security and minimise complexity. SenseOn offers a comprehensive Extended Detection & Response solution that empowers resource-conscious IT leaders to deliver enterprise-level security—wi

Users
No information available
Industries
No information available
Market Segment
  • 86% Mid-Market
  • 14% Enterprise
SenseOn Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
5
Response Time
3
Alerts
2
Deployment Ease
2
Ease of Use
2
Cons
Difficult Learning Curve
1
Expensive
1
Information Overload
1
Integration Issues
1
Poor Management
1
SenseOn features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
7.9
Intelligence Reports
Average: 8.9
7.9
Endpoint Intelligence
Average: 8.4
8.1
Ease of Use
Average: 8.8
Seller Details
Seller
SenseOn
Year Founded
2017
HQ Location
London, UK
Twitter
@SenseonTech
1,231 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simplify and automate threat and vulnerability management and incident response while reducing risks to your organization. ServiceNow Security Operations powered by AI Agents helps security teams scal

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 62% Enterprise
    • 21% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ServiceNow Security Operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integration Capabilities
    8
    Integration Support
    7
    Ease of Use
    5
    Implementation Ease
    5
    Incident Management
    5
    Cons
    Difficult Setup
    3
    Integration Issues
    3
    Expensive
    2
    Learning Curve
    2
    Licensing Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ServiceNow Security Operations features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2004
    HQ Location
    Santa Clara, CA
    Twitter
    @servicenow
    51,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30,776 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Simplify and automate threat and vulnerability management and incident response while reducing risks to your organization. ServiceNow Security Operations powered by AI Agents helps security teams scal

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 62% Enterprise
  • 21% Small-Business
ServiceNow Security Operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integration Capabilities
8
Integration Support
7
Ease of Use
5
Implementation Ease
5
Incident Management
5
Cons
Difficult Setup
3
Integration Issues
3
Expensive
2
Learning Curve
2
Licensing Issues
2
ServiceNow Security Operations features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.4
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2004
HQ Location
Santa Clara, CA
Twitter
@servicenow
51,662 Twitter followers
LinkedIn® Page
www.linkedin.com
30,776 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatBolt is the only Intelligence-sharing platform thoughtfully designed to meet SOC/MSSP needs. It utilizes AI/ML Powered engine for threat analysis and classification, delivering high-fidelity thr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatBolt Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    2
    Detailed Analysis
    2
    Ease of Use
    2
    Accuracy of Information
    1
    Easy Integrations
    1
    Cons
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatBolt features and usability ratings that predict user satisfaction
    9.4
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    7.8
    Endpoint Intelligence
    Average: 8.4
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    India, IN
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatBolt is the only Intelligence-sharing platform thoughtfully designed to meet SOC/MSSP needs. It utilizes AI/ML Powered engine for threat analysis and classification, delivering high-fidelity thr

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
ThreatBolt Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
2
Detailed Analysis
2
Ease of Use
2
Accuracy of Information
1
Easy Integrations
1
Cons
Limited Features
1
ThreatBolt features and usability ratings that predict user satisfaction
9.4
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
7.8
Endpoint Intelligence
Average: 8.4
9.2
Ease of Use
Average: 8.8
Seller Details
Year Founded
2023
HQ Location
India, IN
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point offers comprehensive intelligence to proactively stop threats, manage security services to monitor networks and incident response to quickly respond to and resolve attacks.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatCloud IntelliStore Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Information
    1
    Customer Support
    1
    Customizability
    1
    Ease of Use
    1
    Easy Integrations
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatCloud IntelliStore features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.4
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point offers comprehensive intelligence to proactively stop threats, manage security services to monitor networks and incident response to quickly respond to and resolve attacks.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
ThreatCloud IntelliStore Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Information
1
Customer Support
1
Customizability
1
Ease of Use
1
Easy Integrations
1
Cons
This product has not yet received any negative sentiments.
ThreatCloud IntelliStore features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.4
9.2
Ease of Use
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We provide threat intelligence APIs with comprehensive information on hosts and the infrastructure behind them. By combining data obtained from various providers, our own exhaustive internal databases

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threat Intelligence API Platform features and usability ratings that predict user satisfaction
    9.4
    Security Validation
    Average: 8.9
    9.6
    Intelligence Reports
    Average: 8.9
    0.0
    No information available
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Walnut, California
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

We provide threat intelligence APIs with comprehensive information on hosts and the infrastructure behind them. By combining data obtained from various providers, our own exhaustive internal databases

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Threat Intelligence API Platform features and usability ratings that predict user satisfaction
9.4
Security Validation
Average: 8.9
9.6
Intelligence Reports
Average: 8.9
0.0
No information available
9.2
Ease of Use
Average: 8.8
Seller Details
Year Founded
2017
HQ Location
Walnut, California
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix Helix integrates your security tools and augments them with next-generation security information and event management (SIEM), orchestration, and threat intelligence capabilities to capture the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Helix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    2
    Features
    2
    Integration Support
    2
    Log Management
    2
    Cons
    Information Deficiency
    1
    Information Overload
    1
    Insufficient Information
    1
    Limited Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Helix features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix Helix integrates your security tools and augments them with next-generation security information and event management (SIEM), orchestration, and threat intelligence capabilities to capture the

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Trellix Helix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
2
Features
2
Integration Support
2
Log Management
2
Cons
Information Deficiency
1
Information Overload
1
Insufficient Information
1
Limited Information
1
Trellix Helix features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Centripetal CleanINTERNET ® Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Implementation Ease
    1
    Integration Capabilities
    1
    Network Security
    1
    Reliability
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    0.0
    Endpoint Intelligence
    Average: 8.4
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Reston, VA
    Twitter
    @Centripetal_AI
    475 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Small-Business
Centripetal CleanINTERNET ® Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Implementation Ease
1
Integration Capabilities
1
Network Security
1
Reliability
1
Security
1
Cons
This product has not yet received any negative sentiments.
Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
0.0
Endpoint Intelligence
Average: 8.4
9.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
2009
HQ Location
Reston, VA
Twitter
@Centripetal_AI
475 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies availab

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CybelAngel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    2
    Accuracy of Information
    1
    Actionable Intelligence
    1
    Alert Notifications
    1
    Communication
    1
    Cons
    False Positives
    1
    Poor Detection Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CybelAngel features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    7.5
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Paris, FR
    Twitter
    @CybelAngel
    3,442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    169 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies availab

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
CybelAngel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
2
Accuracy of Information
1
Actionable Intelligence
1
Alert Notifications
1
Communication
1
Cons
False Positives
1
Poor Detection Performance
1
CybelAngel features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
7.5
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Year Founded
2013
HQ Location
Paris, FR
Twitter
@CybelAngel
3,442 Twitter followers
LinkedIn® Page
www.linkedin.com
169 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 69% Mid-Market
    • 15% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

Users
No information available
Industries
No information available
Market Segment
  • 69% Mid-Market
  • 15% Enterprise
FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.6
Ease of Use
Average: 8.8
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prevent IoT threats from disrupting business operations. Identify, assess, and respond to potential security threats in real time.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Outpost24 features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Outpost24
    Year Founded
    2001
    HQ Location
    Karlskrona, Blekinge County
    Twitter
    @outpost24
    1,635 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    180 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Prevent IoT threats from disrupting business operations. Identify, assess, and respond to potential security threats in real time.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Outpost24 features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Outpost24
Year Founded
2001
HQ Location
Karlskrona, Blekinge County
Twitter
@outpost24
1,635 Twitter followers
LinkedIn® Page
www.linkedin.com
180 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PreCrime Intelligence is cybersecurity’s fastest, most accurate predictive intelligence solution, using behavioral AI to predict and preempt attacks weeks before they happen. The exponential growth

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PreCrime Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Investigation Management
    2
    Threat Detection
    2
    Alerts
    1
    Detailed Analysis
    1
    Easy Integrations
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PreCrime Intelligence features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BforeAI
    Year Founded
    2020
    HQ Location
    New York City, US
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PreCrime Intelligence is cybersecurity’s fastest, most accurate predictive intelligence solution, using behavioral AI to predict and preempt attacks weeks before they happen. The exponential growth

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
PreCrime Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Investigation Management
2
Threat Detection
2
Alerts
1
Detailed Analysis
1
Easy Integrations
1
Cons
Slow Performance
1
PreCrime Intelligence features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
BforeAI
Year Founded
2020
HQ Location
New York City, US
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Taegis XDR is a cloud-native extended detection and response security platform that consolidates best-of-breed security components into a holistic ecosystem to provide proactive protection against com

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Secureworks Taegis XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Network Security
    2
    Alerting
    1
    Alerts
    1
    Customer Support
    1
    Easy Integrations
    1
    Cons
    Expensive
    1
    False Positives
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secureworks Taegis XDR features and usability ratings that predict user satisfaction
    7.5
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    7.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,926 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Taegis XDR is a cloud-native extended detection and response security platform that consolidates best-of-breed security components into a holistic ecosystem to provide proactive protection against com

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Secureworks Taegis XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Network Security
2
Alerting
1
Alerts
1
Customer Support
1
Easy Integrations
1
Cons
Expensive
1
False Positives
1
UX Improvement
1
Secureworks Taegis XDR features and usability ratings that predict user satisfaction
7.5
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
7.9
Ease of Use
Average: 8.8
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
4,926 employees on LinkedIn®
Ownership
LSE:SOPH
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatWarrior is a leader in cloud-native network detection and response, helping organizations see, learn about, and act to stop cyber threats before they cause damage. The cyber defense platform del

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatWarrior Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Network Security
    1
    Cons
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatWarrior features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin
    Twitter
    @ThreatWarrior
    79 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatWarrior is a leader in cloud-native network detection and response, helping organizations see, learn about, and act to stop cyber threats before they cause damage. The cyber defense platform del

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Small-Business
ThreatWarrior Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Network Security
1
Cons
Update Issues
1
ThreatWarrior features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.0
Ease of Use
Average: 8.8
Seller Details
HQ Location
Austin
Twitter
@ThreatWarrior
79 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Provides the registration details, also known as the Whois Record, of a domain name or an IP address.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Whois API Webservice features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    9.4
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Covina, US
    LinkedIn® Page
    linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Provides the registration details, also known as the Whois Record, of a domain name or an IP address.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Whois API Webservice features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
9.4
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
HQ Location
Covina, US
LinkedIn® Page
linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 68% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bitsight Cyber Risk Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Risk Management
    6
    Assessment Process
    5
    Helpful
    5
    Ease of Use
    4
    Cons
    Poor Notifications
    3
    Delay Issues
    2
    Improvement Needed
    2
    Learning Curve
    2
    Vendor Management
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitsight Cyber Risk Intelligence features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,462 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    748 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 68% Enterprise
  • 30% Mid-Market
Bitsight Cyber Risk Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Risk Management
6
Assessment Process
5
Helpful
5
Ease of Use
4
Cons
Poor Notifications
3
Delay Issues
2
Improvement Needed
2
Learning Curve
2
Vendor Management
2
Bitsight Cyber Risk Intelligence features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.4
Ease of Use
Average: 8.8
Seller Details
Seller
Bitsight
Company Website
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,462 Twitter followers
LinkedIn® Page
www.linkedin.com
748 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberReveal, a suite of products for enhancing cyber security operations and protecting your business in the connected world.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cyber_reveal features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Falls Church, US
    Twitter
    @BAES_Careers
    1,915 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,960 employees on LinkedIn®
    Ownership
    LON: BA
Product Description
How are these determined?Information
This description is provided by the seller.

CyberReveal, a suite of products for enhancing cyber security operations and protecting your business in the connected world.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
cyber_reveal features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
9.2
Ease of Use
Average: 8.8
Seller Details
Year Founded
2016
HQ Location
Falls Church, US
Twitter
@BAES_Careers
1,915 Twitter followers
LinkedIn® Page
www.linkedin.com
15,960 employees on LinkedIn®
Ownership
LON: BA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybersixgill was founded in 2014 with a single mission: To disrupt the threat intelligence sector by improving the availability of threat intelligence from the clear, deep and dark web. Fast forward

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cybersixgill Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    2
    Detailed Information
    2
    Actionable Intelligence
    1
    Customer Support
    1
    Customizability
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cybersixgill features and usability ratings that predict user satisfaction
    7.5
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    6.7
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,462 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    748 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybersixgill was founded in 2014 with a single mission: To disrupt the threat intelligence sector by improving the availability of threat intelligence from the clear, deep and dark web. Fast forward

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Cybersixgill Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
2
Detailed Information
2
Actionable Intelligence
1
Customer Support
1
Customizability
1
Cons
This product has not yet received any negative sentiments.
Cybersixgill features and usability ratings that predict user satisfaction
7.5
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
6.7
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Bitsight
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,462 Twitter followers
LinkedIn® Page
www.linkedin.com
748 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Domain and IP Intelligence Feeds Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Information
    2
    Alerts
    1
    Automation
    1
    Ease of Use
    1
    Helpful
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    7.5
    Intelligence Reports
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 8.4
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Draper, UT
    Twitter
    @alphamountainai
    38 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Domain and IP Intelligence Feeds Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Information
2
Alerts
1
Automation
1
Ease of Use
1
Helpful
1
Cons
Expensive
1
Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
7.5
Intelligence Reports
Average: 8.9
7.5
Endpoint Intelligence
Average: 8.4
10.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
2020
HQ Location
Draper, UT
Twitter
@alphamountainai
38 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Feedly Threat Intelligence helps teams collect, analyze, and share open-source threat intelligence in minutes instead of hours. Feedly uses AI Feeds to collect specific and relevant intelligence from

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Feedly for Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Threat Detection
    2
    Automation
    1
    Customer Support
    1
    Customizability
    1
    Cons
    Slow Loading
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Feedly for Threat Intelligence features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Intelligence Reports
    Average: 8.9
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Feedly
    HQ Location
    Palo Alto, CA
    Twitter
    @feedly
    105,408 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Feedly Threat Intelligence helps teams collect, analyze, and share open-source threat intelligence in minutes instead of hours. Feedly uses AI Feeds to collect specific and relevant intelligence from

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Feedly for Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Threat Detection
2
Automation
1
Customer Support
1
Customizability
1
Cons
Slow Loading
1
Feedly for Threat Intelligence features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Intelligence Reports
Average: 8.9
0.0
No information available
10.0
Ease of Use
Average: 8.8
Seller Details
Seller
Feedly
HQ Location
Palo Alto, CA
Twitter
@feedly
105,408 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,142 employees on LinkedIn®
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.2
Ease of Use
Average: 8.8
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,429 Twitter followers
LinkedIn® Page
www.linkedin.com
1,142 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fraudlogix empowers businesses to maintain traffic quality and prevent fraud with enterprise-grade solutions. Designed for industries like Affiliate Marketing, Ad Tech, E-commerce, Cybersecurity, and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fraudlogix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Performance Improvement
    1
    Reliability
    1
    Service Quality
    1
    Cons
    Dashboard Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fraudlogix features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    Twitter
    @fraudlogix
    307 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fraudlogix empowers businesses to maintain traffic quality and prevent fraud with enterprise-grade solutions. Designed for industries like Affiliate Marketing, Ad Tech, E-commerce, Cybersecurity, and

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Mid-Market
Fraudlogix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Performance Improvement
1
Reliability
1
Service Quality
1
Cons
Dashboard Issues
1
Fraudlogix features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
10.0
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
Year Founded
2010
Twitter
@fraudlogix
307 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®

Learn More About Threat Intelligence Software

Threat Intelligence Software FAQs

What are the best threat intelligence software options for small businesses?

Here are some of the best threat intelligence software solutions designed to protect small businesses:

  • Microsoft Defender for Cloud provides small businesses with real-time threat detection and security recommendations across cloud environments.
  • ThreatLocker delivers application whitelisting and ringfencing controls, helping small teams prevent unauthorized access and malware execution.
  • Cloudflare Application Security and Performance combines threat protection with performance optimization, ideal for small businesses running web-based services.
  • CrowdStrike Falcon Endpoint Protection Platform offers lightweight, cloud-delivered endpoint protection that detects threats quickly without overloading system resources.
  • FortiGate NGFW delivers enterprise-grade firewall and threat intelligence capabilities in a scalable package suited for small business networks.

What are the best-rated threat intelligence apps for IT teams?

Here are some of the highest-rated threat intelligence apps tailored for IT teams managing complex environments:

  • Recorded Future delivers real-time threat intelligence with deep web insights, helping IT teams proactively detect and prioritize risks.
  • CrowdStrike Falcon Endpoint Protection Platform combines threat detection with automated response tools, enabling IT teams to secure endpoints at scale.
  • Microsoft Defender for Cloud provides integrated threat detection and security posture management across multi-cloud and hybrid environments.
  • Cyberint, a Check Point Company, offers external threat intelligence focused on digital risk protection, empowering IT teams to counter emerging threats beyond the firewall.
  • ZeroFox specializes in identifying external threats across social media, domains, and the dark web, equipping IT teams with actionable intelligence.

What are the best-rated threat intelligence platforms for startups?

Here are some of the most reliable threat intelligence platforms well-suited for agile and growing startups:

  • Cloudflare Application Security and Performance combines powerful DDoS protection and threat intelligence in a lightweight, cost-effective platform ideal for startups scaling web infrastructure.
  • ThreatLocker offers granular application control and real-time threat blocking, giving startups enterprise-grade security without complexity.
  • CrowdStrike Falcon Endpoint Protection Platfor delivers scalable, cloud-native endpoint protection that’s easy for lean startup teams to deploy and manage.
  • CloudSEK provides AI-driven threat detection and digital risk monitoring, helping startups stay ahead of emerging threats across assets and brand mentions.
  • Censys Search enables startups to continuously map and monitor their attack surface, offering visibility and threat data without heavy setup.