Introducing G2.ai, the future of software buying.Try now

Best Enterprise Threat Intelligence Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Threat Intelligence category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Threat Intelligence to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Enterprise Business Threat Intelligence category.

In addition to qualifying for inclusion in the Threat Intelligence Software category, to qualify for inclusion in the Enterprise Business Threat Intelligence Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

23 Listings in Enterprise Threat Intelligence Software Available

(138)4.6 out of 5
7th Easiest To Use in Threat Intelligence software
View top Consulting Services for Recorded Future
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

    Users
    • Threat Intelligence Analyst
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 69% Enterprise
    • 20% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence through rich context, intuitive visuals, and seamless integrations.
    • Reviewers appreciate the platform's ability to provide precise and actionable threat intelligence, its intuitive visuals, seamless integrations, and the responsive and helpful customer support team.
    • Reviewers experienced challenges with the platform's complex interface, high cost, steep learning curve, and overwhelming volume of data and alerts, which can lead to alert fatigue if not carefully fine-tuned.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Recorded Future Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    65
    Features
    64
    Threat Intelligence
    47
    Threat Detection
    45
    Insights
    42
    Cons
    Expensive
    28
    Complexity
    26
    Learning Curve
    19
    Information Overload
    18
    Difficult Learning
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Recorded Future features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.7
    Intelligence Reports
    Average: 8.9
    7.9
    Endpoint Intelligence
    Average: 8.4
    8.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Somerville, US
    Twitter
    @RecordedFuture
    109,033 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,064 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

Users
  • Threat Intelligence Analyst
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 69% Enterprise
  • 20% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence through rich context, intuitive visuals, and seamless integrations.
  • Reviewers appreciate the platform's ability to provide precise and actionable threat intelligence, its intuitive visuals, seamless integrations, and the responsive and helpful customer support team.
  • Reviewers experienced challenges with the platform's complex interface, high cost, steep learning curve, and overwhelming volume of data and alerts, which can lead to alert fatigue if not carefully fine-tuned.
Recorded Future Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
65
Features
64
Threat Intelligence
47
Threat Detection
45
Insights
42
Cons
Expensive
28
Complexity
26
Learning Curve
19
Information Overload
18
Difficult Learning
16
Recorded Future features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.7
Intelligence Reports
Average: 8.9
7.9
Endpoint Intelligence
Average: 8.4
8.5
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2009
HQ Location
Somerville, US
Twitter
@RecordedFuture
109,033 Twitter followers
LinkedIn® Page
www.linkedin.com
1,064 employees on LinkedIn®
(303)4.4 out of 5
23rd Easiest To Use in Threat Intelligence software
View top Consulting Services for Microsoft Defender for Cloud
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

    Users
    • Saas Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    166
    Comprehensive Security
    113
    Cloud Security
    99
    Ease of Use
    74
    Threat Protection
    70
    Cons
    Complexity
    37
    Expensive
    36
    False Positives
    26
    Delayed Detection
    25
    Improvement Needed
    25
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,134 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    234,872 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

Users
  • Saas Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Microsoft Defender for Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
166
Comprehensive Security
113
Cloud Security
99
Ease of Use
74
Threat Protection
70
Cons
Complexity
37
Expensive
36
False Positives
26
Delayed Detection
25
Improvement Needed
25
Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.7
Ease of Use
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,134 Twitter followers
LinkedIn® Page
www.linkedin.com
234,872 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(299)4.7 out of 5
8th Easiest To Use in Threat Intelligence software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    54
    Ease of Use
    43
    Security
    43
    Threat Detection
    38
    Detection
    36
    Cons
    Missing Features
    14
    Expensive
    11
    Limited Features
    11
    Complexity
    10
    Difficult Navigation
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.4
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,236 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,347 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
54
Ease of Use
43
Security
43
Threat Detection
38
Detection
36
Cons
Missing Features
14
Expensive
11
Limited Features
11
Complexity
10
Difficult Navigation
10
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.4
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.4
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,236 Twitter followers
LinkedIn® Page
www.linkedin.com
10,347 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(119)4.6 out of 5
1st Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

    Users
    • Security Threat Analyst
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 70% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberint, a Check Point Company Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    51
    Threat Intelligence
    46
    Threat Detection
    37
    Insights
    34
    Customer Support
    30
    Cons
    Inefficient Alerts
    19
    Inefficient Alert System
    13
    False Positives
    10
    Integration Issues
    10
    Missing Features
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberInt
    Year Founded
    2009
    HQ Location
    Petah Tikva, Israel
    Twitter
    @cyber_int
    1,863 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    161 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

Users
  • Security Threat Analyst
Industries
  • Banking
  • Financial Services
Market Segment
  • 70% Enterprise
  • 20% Mid-Market
Cyberint, a Check Point Company Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
51
Threat Intelligence
46
Threat Detection
37
Insights
34
Customer Support
30
Cons
Inefficient Alerts
19
Inefficient Alert System
13
False Positives
10
Integration Issues
10
Missing Features
9
Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
CyberInt
Year Founded
2009
HQ Location
Petah Tikva, Israel
Twitter
@cyber_int
1,863 Twitter followers
LinkedIn® Page
www.linkedin.com
161 employees on LinkedIn®
(183)4.7 out of 5
15th Easiest To Use in Threat Intelligence software
View top Consulting Services for FortiGate NGFW
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

    Users
    • Network Engineer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGate NGFW Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Features
    12
    Security
    11
    Security Protection
    7
    Customer Support
    6
    Cons
    Update Issues
    5
    Slow Performance
    4
    Upgrade Issues
    4
    Limited Features
    3
    Pricing Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate NGFW features and usability ratings that predict user satisfaction
    9.1
    Security Validation
    Average: 8.9
    9.1
    Intelligence Reports
    Average: 8.9
    8.8
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,589 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,343 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Users
  • Network Engineer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Mid-Market
  • 20% Enterprise
FortiGate NGFW Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Features
12
Security
11
Security Protection
7
Customer Support
6
Cons
Update Issues
5
Slow Performance
4
Upgrade Issues
4
Limited Features
3
Pricing Issues
3
FortiGate NGFW features and usability ratings that predict user satisfaction
9.1
Security Validation
Average: 8.9
9.1
Intelligence Reports
Average: 8.9
8.8
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,589 Twitter followers
LinkedIn® Page
www.linkedin.com
15,343 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(55)4.8 out of 5
2nd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

    Users
    • Security Analyst
    Industries
    • Financial Services
    • Airlines/Aviation
    Market Segment
    • 45% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudSEK Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Features
    23
    Customer Support
    22
    Monitoring
    17
    Implementation Ease
    16
    Cons
    False Positives
    9
    Dashboard Issues
    3
    Integration Issues
    3
    UX Improvement
    3
    Poor Detection Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK features and usability ratings that predict user satisfaction
    9.6
    Security Validation
    Average: 8.9
    9.6
    Intelligence Reports
    Average: 8.9
    9.5
    Endpoint Intelligence
    Average: 8.4
    9.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,253 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

Users
  • Security Analyst
Industries
  • Financial Services
  • Airlines/Aviation
Market Segment
  • 45% Enterprise
  • 29% Mid-Market
CloudSEK Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Features
23
Customer Support
22
Monitoring
17
Implementation Ease
16
Cons
False Positives
9
Dashboard Issues
3
Integration Issues
3
UX Improvement
3
Poor Detection Performance
2
CloudSEK features and usability ratings that predict user satisfaction
9.6
Security Validation
Average: 8.9
9.6
Intelligence Reports
Average: 8.9
9.5
Endpoint Intelligence
Average: 8.4
9.5
Ease of Use
Average: 8.8
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,253 Twitter followers
LinkedIn® Page
www.linkedin.com
220 employees on LinkedIn®
(31)4.7 out of 5
Optimized for quick response
9th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 74% Enterprise
    • 19% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyble Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Insights
    12
    Monitoring
    12
    Threat Detection
    12
    Features
    10
    Threat Intelligence
    10
    Cons
    Inefficient Alerts
    7
    False Positives
    5
    Inefficient Alert System
    4
    Limited Customization
    4
    Data Inaccuracy
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    9.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    18,298 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    227 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 74% Enterprise
  • 19% Mid-Market
Cyble Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Insights
12
Monitoring
12
Threat Detection
12
Features
10
Threat Intelligence
10
Cons
Inefficient Alerts
7
False Positives
5
Inefficient Alert System
4
Limited Customization
4
Data Inaccuracy
3
Cyble features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
9.7
Ease of Use
Average: 8.8
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
18,298 Twitter followers
LinkedIn® Page
www.linkedin.com
227 employees on LinkedIn®
(44)4.5 out of 5
14th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

    Users
    No information available
    Industries
    • Security and Investigations
    Market Segment
    • 61% Enterprise
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dataminr Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Efficiency Improvement
    3
    Incident Management
    3
    Time-saving
    3
    Artificial Intelligence
    2
    Cons
    Difficult Setup
    1
    Improvement Needed
    1
    Lack of Customization
    1
    Learning Curve
    1
    Limited Functionality
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dataminr features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 8.9
    7.6
    Intelligence Reports
    Average: 8.9
    8.0
    Endpoint Intelligence
    Average: 8.4
    8.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dataminr
    Year Founded
    2009
    HQ Location
    New York, NY
    Twitter
    @Dataminr
    16,535 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    750 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

Users
No information available
Industries
  • Security and Investigations
Market Segment
  • 61% Enterprise
  • 32% Small-Business
Dataminr Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Efficiency Improvement
3
Incident Management
3
Time-saving
3
Artificial Intelligence
2
Cons
Difficult Setup
1
Improvement Needed
1
Lack of Customization
1
Learning Curve
1
Limited Functionality
1
Dataminr features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 8.9
7.6
Intelligence Reports
Average: 8.9
8.0
Endpoint Intelligence
Average: 8.4
8.6
Ease of Use
Average: 8.8
Seller Details
Seller
Dataminr
Year Founded
2009
HQ Location
New York, NY
Twitter
@Dataminr
16,535 Twitter followers
LinkedIn® Page
www.linkedin.com
750 employees on LinkedIn®
(41)4.7 out of 5
11th Easiest To Use in Threat Intelligence software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 51% Enterprise
    • 37% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CTM360 is an external threat management solution that integrates functions such as intelligence gathering, monitoring, protection against digital risks, and takedown services.
    • Reviewers appreciate the platform's user-friendly interface, its proactive approach to cybersecurity, real-time threat detection, and the responsiveness of the support team.
    • Users experienced issues with the overwhelming amount of features and modules, lack of customization in reporting views, performance lag during peak usage times, and limitations in the takedown process.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CTM360 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Features
    8
    Detection
    7
    Threat Detection
    7
    Ease of Use
    6
    Cons
    Complexity
    2
    Limited Customization
    2
    Limited Features
    2
    Complex Searching
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CTM360 features and usability ratings that predict user satisfaction
    8.6
    Security Validation
    Average: 8.9
    8.4
    Intelligence Reports
    Average: 8.9
    7.7
    Endpoint Intelligence
    Average: 8.4
    9.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CTM360
    Company Website
    Year Founded
    2014
    HQ Location
    Manama, Capital Governate
    Twitter
    @teamCTM360
    968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 51% Enterprise
  • 37% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CTM360 is an external threat management solution that integrates functions such as intelligence gathering, monitoring, protection against digital risks, and takedown services.
  • Reviewers appreciate the platform's user-friendly interface, its proactive approach to cybersecurity, real-time threat detection, and the responsiveness of the support team.
  • Users experienced issues with the overwhelming amount of features and modules, lack of customization in reporting views, performance lag during peak usage times, and limitations in the takedown process.
CTM360 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Features
8
Detection
7
Threat Detection
7
Ease of Use
6
Cons
Complexity
2
Limited Customization
2
Limited Features
2
Complex Searching
1
Complex Setup
1
CTM360 features and usability ratings that predict user satisfaction
8.6
Security Validation
Average: 8.9
8.4
Intelligence Reports
Average: 8.9
7.7
Endpoint Intelligence
Average: 8.4
9.5
Ease of Use
Average: 8.8
Seller Details
Seller
CTM360
Company Website
Year Founded
2014
HQ Location
Manama, Capital Governate
Twitter
@teamCTM360
968 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
(39)4.8 out of 5
13th Easiest To Use in Threat Intelligence software
Save to My Lists
16% off: $14950 per year
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 41% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SOCRadar Extended Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Insights
    16
    Threat Intelligence
    15
    Features
    14
    Threat Detection
    13
    Ease of Use
    11
    Cons
    Integration Issues
    4
    Limited Features
    4
    False Positives
    3
    Information Overload
    3
    Lack of Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    9.2
    Intelligence Reports
    Average: 8.9
    8.6
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    5,140 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

Users
No information available
Industries
  • Financial Services
Market Segment
  • 41% Mid-Market
  • 41% Enterprise
SOCRadar Extended Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Insights
16
Threat Intelligence
15
Features
14
Threat Detection
13
Ease of Use
11
Cons
Integration Issues
4
Limited Features
4
False Positives
3
Information Overload
3
Lack of Features
3
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
9.2
Intelligence Reports
Average: 8.9
8.6
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
5,140 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(284)4.8 out of 5
4th Easiest To Use in Threat Intelligence software
View top Consulting Services for ThreatLocker
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 61% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatLocker Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    91
    Threat Detection
    86
    Ease of Use
    78
    Security
    71
    Features
    68
    Cons
    Learning Curve
    42
    Difficult Learning Curve
    27
    Difficult Configuration
    14
    Difficult Navigation
    14
    Complexity
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.9
    9.5
    Intelligence Reports
    Average: 8.9
    9.3
    Endpoint Intelligence
    Average: 8.4
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,227 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    580 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 61% Small-Business
  • 32% Mid-Market
ThreatLocker Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
91
Threat Detection
86
Ease of Use
78
Security
71
Features
68
Cons
Learning Curve
42
Difficult Learning Curve
27
Difficult Configuration
14
Difficult Navigation
14
Complexity
13
ThreatLocker features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.9
9.5
Intelligence Reports
Average: 8.9
9.3
Endpoint Intelligence
Average: 8.4
8.4
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,227 Twitter followers
LinkedIn® Page
www.linkedin.com
580 employees on LinkedIn®
(26)4.6 out of 5
Optimized for quick response
18th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The first line of defense shouldn’t be your infrastructure; optimize your security and defeat attacks before they begin with knowledge of who, how, and when you will be attacked. Group-IB’s Threat I

    Users
    No information available
    Industries
    • Banking
    Market Segment
    • 58% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Group-IB Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    4
    Automation
    2
    Detailed Analysis
    2
    Accuracy of Information
    1
    Helpful
    1
    Cons
    Expensive
    1
    Incomplete Information
    1
    Information Overload
    1
    Lack of Customization
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Group-IB Threat Intelligence features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    8.7
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Group-IB
    Company Website
    Year Founded
    2003
    HQ Location
    Singapore
    Twitter
    @GroupIB
    8,900 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    400 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The first line of defense shouldn’t be your infrastructure; optimize your security and defeat attacks before they begin with knowledge of who, how, and when you will be attacked. Group-IB’s Threat I

Users
No information available
Industries
  • Banking
Market Segment
  • 58% Enterprise
  • 23% Mid-Market
Group-IB Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
4
Automation
2
Detailed Analysis
2
Accuracy of Information
1
Helpful
1
Cons
Expensive
1
Incomplete Information
1
Information Overload
1
Lack of Customization
1
Poor Reporting
1
Group-IB Threat Intelligence features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
8.7
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
Group-IB
Company Website
Year Founded
2003
HQ Location
Singapore
Twitter
@GroupIB
8,900 Twitter followers
LinkedIn® Page
www.linkedin.com
400 employees on LinkedIn®
(63)4.6 out of 5
28th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

    Users
    No information available
    Industries
    • Security and Investigations
    • Financial Services
    Market Segment
    • 57% Enterprise
    • 27% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Flashpoint Ignite is a platform that provides data from various sources, making it searchable and exportable, and includes features such as keyword alerts and a user-friendly interface.
    • Users like the extensive collection of data, the ease of use, the ability to pull data from messaging apps and forums, the quick search feature, and the notifications they receive when a keyword search is hit.
    • Users mentioned issues such as the limitation of bookmarks to 20 searches, the lack of a mobile browser friendly version, the inability to discuss RFI cases directly over a chat medium, and the difficulty in navigating the dashboard.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Flashpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Features
    16
    Search Functionality
    13
    Helpful
    12
    Insights
    11
    Cons
    Search Complexity
    6
    User Frustration
    6
    Information Overload
    5
    Lack of Features
    5
    Limited Features
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flashpoint features and usability ratings that predict user satisfaction
    7.2
    Security Validation
    Average: 8.9
    8.5
    Intelligence Reports
    Average: 8.9
    7.1
    Endpoint Intelligence
    Average: 8.4
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    New York, NY
    Twitter
    @FlashpointIntel
    14,094 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    395 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

Users
No information available
Industries
  • Security and Investigations
  • Financial Services
Market Segment
  • 57% Enterprise
  • 27% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Flashpoint Ignite is a platform that provides data from various sources, making it searchable and exportable, and includes features such as keyword alerts and a user-friendly interface.
  • Users like the extensive collection of data, the ease of use, the ability to pull data from messaging apps and forums, the quick search feature, and the notifications they receive when a keyword search is hit.
  • Users mentioned issues such as the limitation of bookmarks to 20 searches, the lack of a mobile browser friendly version, the inability to discuss RFI cases directly over a chat medium, and the difficulty in navigating the dashboard.
Flashpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Features
16
Search Functionality
13
Helpful
12
Insights
11
Cons
Search Complexity
6
User Frustration
6
Information Overload
5
Lack of Features
5
Limited Features
5
Flashpoint features and usability ratings that predict user satisfaction
7.2
Security Validation
Average: 8.9
8.5
Intelligence Reports
Average: 8.9
7.1
Endpoint Intelligence
Average: 8.4
8.4
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
New York, NY
Twitter
@FlashpointIntel
14,094 Twitter followers
LinkedIn® Page
www.linkedin.com
395 employees on LinkedIn®
(167)4.3 out of 5
Optimized for quick response
30th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Resolver gathers all risk data and analyzes it in context—revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks —w

    Users
    No information available
    Industries
    • Security and Investigations
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Resolver Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    50
    Customization
    39
    Customer Support
    38
    Customizability
    37
    Features
    36
    Cons
    Complexity
    31
    Improvement Needed
    21
    Limited Features
    19
    Difficult Learning
    17
    Difficulty
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Resolver features and usability ratings that predict user satisfaction
    6.9
    Security Validation
    Average: 8.9
    8.2
    Intelligence Reports
    Average: 8.9
    7.3
    Endpoint Intelligence
    Average: 8.4
    7.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Resolver
    Company Website
    HQ Location
    Toronto, Canada
    Twitter
    @Resolver
    5,020 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    748 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Resolver gathers all risk data and analyzes it in context—revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks —w

Users
No information available
Industries
  • Security and Investigations
  • Financial Services
Market Segment
  • 49% Enterprise
  • 38% Mid-Market
Resolver Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
50
Customization
39
Customer Support
38
Customizability
37
Features
36
Cons
Complexity
31
Improvement Needed
21
Limited Features
19
Difficult Learning
17
Difficulty
17
Resolver features and usability ratings that predict user satisfaction
6.9
Security Validation
Average: 8.9
8.2
Intelligence Reports
Average: 8.9
7.3
Endpoint Intelligence
Average: 8.4
7.9
Ease of Use
Average: 8.8
Seller Details
Seller
Resolver
Company Website
HQ Location
Toronto, Canada
Twitter
@Resolver
5,020 Twitter followers
LinkedIn® Page
www.linkedin.com
748 employees on LinkedIn®
(69)4.3 out of 5
26th Easiest To Use in Threat Intelligence software
View top Consulting Services for Lookout
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 43% Small-Business
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lookout Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Data Security
    1
    Email Security
    1
    Network Security
    1
    Protection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lookout features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.6
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lookout
    Year Founded
    2007
    HQ Location
    San Francisco, CA
    Twitter
    @Lookout
    45,385 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    578 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 43% Small-Business
  • 41% Enterprise
Lookout Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Data Security
1
Email Security
1
Network Security
1
Protection
1
Cons
This product has not yet received any negative sentiments.
Lookout features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.6
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
Lookout
Year Founded
2007
HQ Location
San Francisco, CA
Twitter
@Lookout
45,385 Twitter followers
LinkedIn® Page
www.linkedin.com
578 employees on LinkedIn®
(309)4.4 out of 5
Optimized for quick response
12th Easiest To Use in Threat Intelligence software
View top Consulting Services for Mimecast Advanced Email Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Legal Services
    • Information Technology and Services
    Market Segment
    • 69% Mid-Market
    • 16% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mimecast Advanced Email Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    75
    Ease of Use
    65
    Security
    51
    Features
    44
    Customer Support
    36
    Cons
    Complexity
    24
    UX Improvement
    23
    Configuration Difficulties
    20
    Email Issues
    18
    False Positives
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.4
    Intelligence Reports
    Average: 8.9
    7.4
    Endpoint Intelligence
    Average: 8.4
    8.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mimecast
    Company Website
    Year Founded
    2003
    HQ Location
    London
    Twitter
    @Mimecast
    18,280 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,526 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

Users
  • IT Manager
  • Systems Administrator
Industries
  • Legal Services
  • Information Technology and Services
Market Segment
  • 69% Mid-Market
  • 16% Small-Business
Mimecast Advanced Email Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
75
Ease of Use
65
Security
51
Features
44
Customer Support
36
Cons
Complexity
24
UX Improvement
23
Configuration Difficulties
20
Email Issues
18
False Positives
17
Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.4
Intelligence Reports
Average: 8.9
7.4
Endpoint Intelligence
Average: 8.4
8.0
Ease of Use
Average: 8.8
Seller Details
Seller
Mimecast
Company Website
Year Founded
2003
HQ Location
London
Twitter
@Mimecast
18,280 Twitter followers
LinkedIn® Page
www.linkedin.com
2,526 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 44% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Talos features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    9.2
    Intelligence Reports
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    729,024 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94,810 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 44% Mid-Market
  • 33% Enterprise
Cisco Talos features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
9.2
Intelligence Reports
Average: 8.9
8.9
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
729,024 Twitter followers
LinkedIn® Page
www.linkedin.com
94,810 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(192)4.5 out of 5
Optimized for quick response
22nd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Integrations
    3
    Features
    3
    Customer Support
    2
    Cybersecurity
    2
    Cons
    Complex Interface
    2
    Improvements Needed
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,273 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Integrations
3
Features
3
Customer Support
2
Cybersecurity
2
Cons
Complex Interface
2
Improvements Needed
2
Poor Interface Design
2
UX Improvement
2
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,273 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
(128)4.3 out of 5
Optimized for quick response
10th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CYREBRO Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    35
    Customer Support
    32
    Response Time
    27
    Alerts
    21
    Alerting System
    20
    Cons
    Communication Issues
    15
    Poor Customer Support
    15
    Inefficient Alert System
    14
    Integration Issues
    14
    Ineffective Alerts
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYREBRO features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.9
    8.6
    Intelligence Reports
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYREBRO
    Company Website
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @CYREBRO_IO
    322 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    99 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Mid-Market
  • 24% Small-Business
CYREBRO Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
35
Customer Support
32
Response Time
27
Alerts
21
Alerting System
20
Cons
Communication Issues
15
Poor Customer Support
15
Inefficient Alert System
14
Integration Issues
14
Ineffective Alerts
13
CYREBRO features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.9
8.6
Intelligence Reports
Average: 8.9
8.9
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
CYREBRO
Company Website
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@CYREBRO_IO
322 Twitter followers
LinkedIn® Page
www.linkedin.com
99 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Censys, founded in 2017 in Ann Arbor, Michigan, provides organizations with the world's most comprehensive real-time view of global networks and devices. Established by the creators of ZMap and truste

    Users
    No information available
    Industries
    • Computer & Network Security
    • Pharmaceuticals
    Market Segment
    • 50% Small-Business
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Censys Search Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Accuracy of Information
    10
    Detailed Analysis
    5
    Features
    4
    Customer Support
    3
    Cons
    Complexity
    4
    Search Functionality Issues
    4
    Incomplete Information
    3
    Limited Functionality
    2
    Poor Visibility
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Censys Search features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 8.9
    7.0
    Intelligence Reports
    Average: 8.9
    8.0
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Censys
    Year Founded
    2017
    HQ Location
    Ann Arbor, MI
    Twitter
    @censysio
    10,155 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Censys, founded in 2017 in Ann Arbor, Michigan, provides organizations with the world's most comprehensive real-time view of global networks and devices. Established by the creators of ZMap and truste

Users
No information available
Industries
  • Computer & Network Security
  • Pharmaceuticals
Market Segment
  • 50% Small-Business
  • 34% Enterprise
Censys Search Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Accuracy of Information
10
Detailed Analysis
5
Features
4
Customer Support
3
Cons
Complexity
4
Search Functionality Issues
4
Incomplete Information
3
Limited Functionality
2
Poor Visibility
2
Censys Search features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 8.9
7.0
Intelligence Reports
Average: 8.9
8.0
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Censys
Year Founded
2017
HQ Location
Ann Arbor, MI
Twitter
@censysio
10,155 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(57)4.0 out of 5
29th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Threat Intelligence Exchange Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Investigation Management
    1
    Threat Detection
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Threat Intelligence Exchange features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.6
    Intelligence Reports
    Average: 8.9
    8.1
    Endpoint Intelligence
    Average: 8.4
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,223 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    823 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 37% Small-Business
Trellix Threat Intelligence Exchange Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Investigation Management
1
Threat Detection
1
Cons
Integration Issues
1
Trellix Threat Intelligence Exchange features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.6
Intelligence Reports
Average: 8.9
8.1
Endpoint Intelligence
Average: 8.4
8.4
Ease of Use
Average: 8.8
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,223 Twitter followers
LinkedIn® Page
www.linkedin.com
823 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silo for Research is a fully-isolated, secure and anonymous managed attribution platform that enables users to conduct digital investigations, collect evidence and analyze data across the surface, dee

    Users
    No information available
    Industries
    • Information Technology and Services
    • Telecommunications
    Market Segment
    • 49% Mid-Market
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Authentic8 Silo for Research Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Security
    6
    Implementation Ease
    3
    Installation Ease
    3
    Security Protection
    3
    Cons
    Expensive
    1
    Poor Customer Support
    1
    Slow Service
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authentic8 Silo for Research features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    9.2
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    Redwood City, US
    Twitter
    @Authentic8
    3,039 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silo for Research is a fully-isolated, secure and anonymous managed attribution platform that enables users to conduct digital investigations, collect evidence and analyze data across the surface, dee

Users
No information available
Industries
  • Information Technology and Services
  • Telecommunications
Market Segment
  • 49% Mid-Market
  • 27% Small-Business
Authentic8 Silo for Research Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Security
6
Implementation Ease
3
Installation Ease
3
Security Protection
3
Cons
Expensive
1
Poor Customer Support
1
Slow Service
1
UX Improvement
1
Authentic8 Silo for Research features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
9.2
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
Redwood City, US
Twitter
@Authentic8
3,039 Twitter followers
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zignal's real-time intelligence technology helps the world's largest organizations protect their people, places, and position.

    Users
    No information available
    Industries
    • Public Relations and Communications
    Market Segment
    • 40% Enterprise
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zignal Labs features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    7.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    San Francisco, California
    Twitter
    @ZignalLabs
    3,402 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zignal's real-time intelligence technology helps the world's largest organizations protect their people, places, and position.

Users
No information available
Industries
  • Public Relations and Communications
Market Segment
  • 40% Enterprise
  • 30% Mid-Market
Zignal Labs features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
7.2
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
San Francisco, California
Twitter
@ZignalLabs
3,402 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®