Introducing G2.ai, the future of software buying.Try now

Top Free Threat Intelligence Software

Check out our list of free Threat Intelligence Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Threat Intelligence Software to ensure you get the right product.

View Free Threat Intelligence Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
55 Threat Intelligence Products Available
(299)4.7 out of 5
8th Easiest To Use in Threat Intelligence software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.4
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rajat Kumar B.
    RB
    Easy to use console part. easy to implementation policies. customer support get all time. Frequency to use all day. Number of features like... Read review
    LR
    Does a great job at providing robust threat detection and incident investigation capabilities. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,236 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,347 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.4
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.4
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Rajat Kumar B.
RB
Easy to use console part. easy to implementation policies. customer support get all time. Frequency to use all day. Number of features like... Read review
LR
Does a great job at providing robust threat detection and incident investigation capabilities. Read review
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,236 Twitter followers
LinkedIn® Page
www.linkedin.com
10,347 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(309)4.4 out of 5
Optimized for quick response
12th Easiest To Use in Threat Intelligence software
View top Consulting Services for Mimecast Advanced Email Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Legal Services
    • Information Technology and Services
    Market Segment
    • 69% Mid-Market
    • 16% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.4
    Intelligence Reports
    Average: 8.9
    7.4
    Endpoint Intelligence
    Average: 8.4
    8.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • anushree v.
    AV
    Mimecast security is a wonderful email protection software which prevents malwares, spams, threats and other phishing mails. An excellent product... Read review
    Kapil B.
    KB
    The best part about Mimecast is its expertise and years of experience in the domain of email security. It also bundles many more features along... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mimecast
    Company Website
    Year Founded
    2003
    HQ Location
    London
    Twitter
    @Mimecast
    18,280 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,526 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

Users
  • IT Manager
  • Systems Administrator
Industries
  • Legal Services
  • Information Technology and Services
Market Segment
  • 69% Mid-Market
  • 16% Enterprise
Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.4
Intelligence Reports
Average: 8.9
7.4
Endpoint Intelligence
Average: 8.4
8.0
Ease of Use
Average: 8.8
anushree v.
AV
Mimecast security is a wonderful email protection software which prevents malwares, spams, threats and other phishing mails. An excellent product... Read review
Kapil B.
KB
The best part about Mimecast is its expertise and years of experience in the domain of email security. It also bundles many more features along... Read review
Seller Details
Seller
Mimecast
Company Website
Year Founded
2003
HQ Location
London
Twitter
@Mimecast
18,280 Twitter followers
LinkedIn® Page
www.linkedin.com
2,526 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(192)4.5 out of 5
Optimized for quick response
22nd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kunal H.
    KH
    It was helpful for forensics investigation. Read review
    MK
    I like how intuitive the user interface is and how clean everything looks, it's very user friendly Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,273 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Kunal H.
KH
It was helpful for forensics investigation. Read review
MK
I like how intuitive the user interface is and how clean everything looks, it's very user friendly Read review
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,273 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
(284)4.8 out of 5
4th Easiest To Use in Threat Intelligence software
View top Consulting Services for ThreatLocker
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 61% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.9
    9.5
    Intelligence Reports
    Average: 8.9
    9.3
    Endpoint Intelligence
    Average: 8.4
    8.4
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    We've used ThreatLocker now for over 2 years. We primarily work with micro and small businesses who just expect us to take care of their cyber... Read review
    DF
    ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,227 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    580 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 61% Small-Business
  • 32% Mid-Market
ThreatLocker features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.9
9.5
Intelligence Reports
Average: 8.9
9.3
Endpoint Intelligence
Average: 8.4
8.4
Ease of Use
Average: 8.8
Verified User in Information Technology and Services
AI
We've used ThreatLocker now for over 2 years. We primarily work with micro and small businesses who just expect us to take care of their cyber... Read review
DF
ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,227 Twitter followers
LinkedIn® Page
www.linkedin.com
580 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silo for Research is a fully-isolated, secure and anonymous managed attribution platform that enables users to conduct digital investigations, collect evidence and analyze data across the surface, dee

    Users
    No information available
    Industries
    • Information Technology and Services
    • Telecommunications
    Market Segment
    • 49% Mid-Market
    • 27% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authentic8 Silo for Research features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    9.2
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RS
    Creates an insulation layer between the computer and the web service regardless of computer location Read review
    SB
    Secure web gateway logs and use of internet's infrastructure to keep traffic fully visible and protected Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    Redwood City, US
    Twitter
    @Authentic8
    3,039 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silo for Research is a fully-isolated, secure and anonymous managed attribution platform that enables users to conduct digital investigations, collect evidence and analyze data across the surface, dee

Users
No information available
Industries
  • Information Technology and Services
  • Telecommunications
Market Segment
  • 49% Mid-Market
  • 27% Small-Business
Authentic8 Silo for Research features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
9.2
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
RS
Creates an insulation layer between the computer and the web service regardless of computer location Read review
SB
Secure web gateway logs and use of internet's infrastructure to keep traffic fully visible and protected Read review
Seller Details
Company Website
Year Founded
2010
HQ Location
Redwood City, US
Twitter
@Authentic8
3,039 Twitter followers
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
(538)4.5 out of 5
Optimized for quick response
16th Easiest To Use in Threat Intelligence software
View top Consulting Services for Cloudflare Application Security and Performance
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare is the connectivity cloud for the "everywhere world," on a mission to help build a better Internet. We provide a unified platform of networking, security, and developer services delivered f

    Users
    • Web Developer
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 64% Small-Business
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare Application Security and Performance features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    UI
    It's a pretty easy to integrate and use. This also includes a vital role in increasing the Perfromance of the product ( websites ). As per me It's... Read review
    SK
    The pricing is extremely wide and scales from smaller to larger budgets. Very easy to integrate. I use their services a lot with a wide range of... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    223,531 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,449 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare is the connectivity cloud for the "everywhere world," on a mission to help build a better Internet. We provide a unified platform of networking, security, and developer services delivered f

Users
  • Web Developer
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 64% Small-Business
  • 26% Mid-Market
Cloudflare Application Security and Performance features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Verified User in Information Technology and Services
UI
It's a pretty easy to integrate and use. This also includes a vital role in increasing the Perfromance of the product ( websites ). As per me It's... Read review
SK
The pricing is extremely wide and scales from smaller to larger budgets. Very easy to integrate. I use their services a lot with a wide range of... Read review
Seller Details
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
223,531 Twitter followers
LinkedIn® Page
www.linkedin.com
5,449 employees on LinkedIn®
(55)4.8 out of 5
2nd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

    Users
    • Security Analyst
    Industries
    • Financial Services
    • Airlines/Aviation
    Market Segment
    • 45% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK features and usability ratings that predict user satisfaction
    9.6
    Security Validation
    Average: 8.9
    9.6
    Intelligence Reports
    Average: 8.9
    9.5
    Endpoint Intelligence
    Average: 8.4
    9.5
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rahul G.
    RG
    CloudSEK offers powerful threat intelligence with real-time alerts, a user-friendly dashboard, and strong AI integration. It's great for proactive... Read review
    Karuppiah S.
    KS
    CloudSEK has been a valuable addition to our company security , offering timely and relevant threat intelligence. The platform makes it easy to... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,253 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

Users
  • Security Analyst
Industries
  • Financial Services
  • Airlines/Aviation
Market Segment
  • 45% Enterprise
  • 29% Mid-Market
CloudSEK features and usability ratings that predict user satisfaction
9.6
Security Validation
Average: 8.9
9.6
Intelligence Reports
Average: 8.9
9.5
Endpoint Intelligence
Average: 8.4
9.5
Ease of Use
Average: 8.8
Rahul G.
RG
CloudSEK offers powerful threat intelligence with real-time alerts, a user-friendly dashboard, and strong AI integration. It's great for proactive... Read review
Karuppiah S.
KS
CloudSEK has been a valuable addition to our company security , offering timely and relevant threat intelligence. The platform makes it easy to... Read review
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,253 Twitter followers
LinkedIn® Page
www.linkedin.com
220 employees on LinkedIn®
(87)4.7 out of 5
32nd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 8.9
    8.7
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
    AJ T.
    AT
    Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,685 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 8.9
8.7
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
HH
It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
AJ T.
AT
Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,685 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
(63)4.6 out of 5
28th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

    Users
    No information available
    Industries
    • Security and Investigations
    • Financial Services
    Market Segment
    • 57% Enterprise
    • 27% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Flashpoint Ignite is a platform that provides data from various sources, making it searchable and exportable, and includes features such as keyword alerts and a user-friendly interface.
    • Users like the extensive collection of data, the ease of use, the ability to pull data from messaging apps and forums, the quick search feature, and the notifications they receive when a keyword search is hit.
    • Users mentioned issues such as the limitation of bookmarks to 20 searches, the lack of a mobile browser friendly version, the inability to discuss RFI cases directly over a chat medium, and the difficulty in navigating the dashboard.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flashpoint features and usability ratings that predict user satisfaction
    7.2
    Security Validation
    Average: 8.9
    8.5
    Intelligence Reports
    Average: 8.9
    7.1
    Endpoint Intelligence
    Average: 8.4
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    New York, NY
    Twitter
    @FlashpointIntel
    14,094 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    395 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

Users
No information available
Industries
  • Security and Investigations
  • Financial Services
Market Segment
  • 57% Enterprise
  • 27% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Flashpoint Ignite is a platform that provides data from various sources, making it searchable and exportable, and includes features such as keyword alerts and a user-friendly interface.
  • Users like the extensive collection of data, the ease of use, the ability to pull data from messaging apps and forums, the quick search feature, and the notifications they receive when a keyword search is hit.
  • Users mentioned issues such as the limitation of bookmarks to 20 searches, the lack of a mobile browser friendly version, the inability to discuss RFI cases directly over a chat medium, and the difficulty in navigating the dashboard.
Flashpoint features and usability ratings that predict user satisfaction
7.2
Security Validation
Average: 8.9
8.5
Intelligence Reports
Average: 8.9
7.1
Endpoint Intelligence
Average: 8.4
8.4
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
New York, NY
Twitter
@FlashpointIntel
14,094 Twitter followers
LinkedIn® Page
www.linkedin.com
395 employees on LinkedIn®
(44)4.5 out of 5
14th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

    Users
    No information available
    Industries
    • Security and Investigations
    Market Segment
    • 61% Enterprise
    • 32% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dataminr features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 8.9
    7.6
    Intelligence Reports
    Average: 8.9
    8.0
    Endpoint Intelligence
    Average: 8.4
    8.6
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Aviation & Aerospace
    UA
    Dataminr is easy to use with robust capabilities and frequent improvements. For situational awareness purposes, Dataminr is essential to track... Read review
    Verified User in Information Technology and Services
    AI
    Our relationship with the customer success team, the quality of alerts we get Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dataminr
    Year Founded
    2009
    HQ Location
    New York, NY
    Twitter
    @Dataminr
    16,535 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    750 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dataminr provides a revolutionary real-time AI platform for detecting events, risks and critical information from public data signals. Recognized as one of the world's leading AI companies, Dataminr e

Users
No information available
Industries
  • Security and Investigations
Market Segment
  • 61% Enterprise
  • 32% Small-Business
Dataminr features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 8.9
7.6
Intelligence Reports
Average: 8.9
8.0
Endpoint Intelligence
Average: 8.4
8.6
Ease of Use
Average: 8.8
Verified User in Aviation & Aerospace
UA
Dataminr is easy to use with robust capabilities and frequent improvements. For situational awareness purposes, Dataminr is essential to track... Read review
Verified User in Information Technology and Services
AI
Our relationship with the customer success team, the quality of alerts we get Read review
Seller Details
Seller
Dataminr
Year Founded
2009
HQ Location
New York, NY
Twitter
@Dataminr
16,535 Twitter followers
LinkedIn® Page
www.linkedin.com
750 employees on LinkedIn®
(39)4.8 out of 5
13th Easiest To Use in Threat Intelligence software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 41% Enterprise
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    9.2
    Intelligence Reports
    Average: 8.9
    8.6
    Endpoint Intelligence
    Average: 8.4
    9.1
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Edwin P.
    EP
    Cybersecurity is an increasingly latent issue, there are multiple factors to consider within the possible attack scenarios, the tools alone can not... Read review
    Daniel E.
    DE
    What stands out most about SOCRadar XTI is its ability to provide comprehensive, real-time, and actionable threat intelligence through an... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    5,140 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

Users
No information available
Industries
  • Financial Services
Market Segment
  • 41% Enterprise
  • 41% Mid-Market
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
9.2
Intelligence Reports
Average: 8.9
8.6
Endpoint Intelligence
Average: 8.4
9.1
Ease of Use
Average: 8.8
Edwin P.
EP
Cybersecurity is an increasingly latent issue, there are multiple factors to consider within the possible attack scenarios, the tools alone can not... Read review
Daniel E.
DE
What stands out most about SOCRadar XTI is its ability to provide comprehensive, real-time, and actionable threat intelligence through an... Read review
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
5,140 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(41)4.7 out of 5
11th Easiest To Use in Threat Intelligence software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 51% Enterprise
    • 37% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CTM360 is an external threat management solution that integrates functions such as intelligence gathering, monitoring, protection against digital risks, and takedown services.
    • Reviewers appreciate the platform's user-friendly interface, its proactive approach to cybersecurity, real-time threat detection, and the responsiveness of the support team.
    • Users experienced issues with the overwhelming amount of features and modules, lack of customization in reporting views, performance lag during peak usage times, and limitations in the takedown process.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CTM360 features and usability ratings that predict user satisfaction
    8.6
    Security Validation
    Average: 8.9
    8.4
    Intelligence Reports
    Average: 8.9
    7.7
    Endpoint Intelligence
    Average: 8.4
    9.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CTM360
    Company Website
    Year Founded
    2014
    HQ Location
    Manama, Capital Governate
    Twitter
    @teamCTM360
    968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 51% Enterprise
  • 37% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CTM360 is an external threat management solution that integrates functions such as intelligence gathering, monitoring, protection against digital risks, and takedown services.
  • Reviewers appreciate the platform's user-friendly interface, its proactive approach to cybersecurity, real-time threat detection, and the responsiveness of the support team.
  • Users experienced issues with the overwhelming amount of features and modules, lack of customization in reporting views, performance lag during peak usage times, and limitations in the takedown process.
CTM360 features and usability ratings that predict user satisfaction
8.6
Security Validation
Average: 8.9
8.4
Intelligence Reports
Average: 8.9
7.7
Endpoint Intelligence
Average: 8.4
9.5
Ease of Use
Average: 8.8
Seller Details
Seller
CTM360
Company Website
Year Founded
2014
HQ Location
Manama, Capital Governate
Twitter
@teamCTM360
968 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
(31)4.7 out of 5
Optimized for quick response
9th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 74% Enterprise
    • 19% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    9.7
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    II
    Cyble consistently delivers results with a proactive approach and is always used to introduce new features to help monitor all the Dark Web... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    18,298 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    227 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 74% Enterprise
  • 19% Mid-Market
Cyble features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
9.7
Ease of Use
Average: 8.8
Verified User in Information Technology and Services
II
Cyble consistently delivers results with a proactive approach and is always used to introduce new features to help monitor all the Dark Web... Read review
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
18,298 Twitter followers
LinkedIn® Page
www.linkedin.com
227 employees on LinkedIn®
(26)4.6 out of 5
Optimized for quick response
18th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The first line of defense shouldn’t be your infrastructure; optimize your security and defeat attacks before they begin with knowledge of who, how, and when you will be attacked. Group-IB’s Threat I

    Users
    No information available
    Industries
    • Banking
    Market Segment
    • 58% Enterprise
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Group-IB Threat Intelligence features and usability ratings that predict user satisfaction
    8.7
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    8.7
    Endpoint Intelligence
    Average: 8.4
    8.8
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • LT
    GIB TI is unlike others, they provide filtered and related threat intelligence information to the customer, for example: banking customers who... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Group-IB
    Company Website
    Year Founded
    2003
    HQ Location
    Singapore
    Twitter
    @GroupIB
    8,900 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    400 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The first line of defense shouldn’t be your infrastructure; optimize your security and defeat attacks before they begin with knowledge of who, how, and when you will be attacked. Group-IB’s Threat I

Users
No information available
Industries
  • Banking
Market Segment
  • 58% Enterprise
  • 23% Mid-Market
Group-IB Threat Intelligence features and usability ratings that predict user satisfaction
8.7
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
8.7
Endpoint Intelligence
Average: 8.4
8.8
Ease of Use
Average: 8.8
LT
GIB TI is unlike others, they provide filtered and related threat intelligence information to the customer, for example: banking customers who... Read review
Seller Details
Seller
Group-IB
Company Website
Year Founded
2003
HQ Location
Singapore
Twitter
@GroupIB
8,900 Twitter followers
LinkedIn® Page
www.linkedin.com
400 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    9.3
    Security Validation
    Average: 8.9
    9.5
    Intelligence Reports
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 8.4
    7.9
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in International Affairs
    UI
    Intuitive and easy to use even without a robust background in computer science. Read review
    NZ
    It is all about the Data Aggregation! Maltego integrates with numerous data sources and APIs, allowing me to aggregate information from various... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    13,832 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego features and usability ratings that predict user satisfaction
9.3
Security Validation
Average: 8.9
9.5
Intelligence Reports
Average: 8.9
8.9
Endpoint Intelligence
Average: 8.4
7.9
Ease of Use
Average: 8.8
Verified User in International Affairs
UI
Intuitive and easy to use even without a robust background in computer science. Read review
NZ
It is all about the Data Aggregation! Maltego integrates with numerous data sources and APIs, allowing me to aggregate information from various... Read review
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
13,832 Twitter followers
LinkedIn® Page
www.linkedin.com
152 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity® Solution features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    8.7
    Intelligence Reports
    Average: 8.9
    9.3
    Endpoint Intelligence
    Average: 8.4
    9.4
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ryan J.
    RJ
    Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
    Verified User in Marketing and Advertising
    AM
    Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    312 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity® Solution features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
8.7
Intelligence Reports
Average: 8.9
9.3
Endpoint Intelligence
Average: 8.4
9.4
Ease of Use
Average: 8.8
Ryan J.
RJ
Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
Verified User in Marketing and Advertising
AM
Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
312 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
(18)5.0 out of 5
21st Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Factal gives companies the facts they need in real time to protect people, avoid disruptions and drive automation when the unexpected happens. Factal combines lightning-fast discovery with trusted ver

    Users
    No information available
    Industries
    • Non-Profit Organization Management
    Market Segment
    • 61% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Factal features and usability ratings that predict user satisfaction
    8.5
    Security Validation
    Average: 8.9
    7.3
    Intelligence Reports
    Average: 8.9
    7.8
    Endpoint Intelligence
    Average: 8.4
    9.3
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Non-Profit Organization Management
    AN
    Particularly in light of having a limited budget and staffing resources, Factal has been a fantastic resource that I strongly recommend. The... Read review
    Verified User in Non-Profit Organization Management
    AN
    Free to use for NGOs and providing verified information in near real time. Factal provides use with the abiity to zoom into reporting quickly and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Factal
    Year Founded
    2018
    HQ Location
    Seattle, WA
    Twitter
    @factal
    11,543 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Factal gives companies the facts they need in real time to protect people, avoid disruptions and drive automation when the unexpected happens. Factal combines lightning-fast discovery with trusted ver

Users
No information available
Industries
  • Non-Profit Organization Management
Market Segment
  • 61% Enterprise
  • 33% Mid-Market
Factal features and usability ratings that predict user satisfaction
8.5
Security Validation
Average: 8.9
7.3
Intelligence Reports
Average: 8.9
7.8
Endpoint Intelligence
Average: 8.4
9.3
Ease of Use
Average: 8.8
Verified User in Non-Profit Organization Management
AN
Particularly in light of having a limited budget and staffing resources, Factal has been a fantastic resource that I strongly recommend. The... Read review
Verified User in Non-Profit Organization Management
AN
Free to use for NGOs and providing verified information in near real time. Factal provides use with the abiity to zoom into reporting quickly and... Read review
Seller Details
Seller
Factal
Year Founded
2018
HQ Location
Seattle, WA
Twitter
@factal
11,543 Twitter followers
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SIRP features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    9.8
    Endpoint Intelligence
    Average: 8.4
    9.5
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Tommy J.
    TJ
    The best thing SIRP is offering is simplification of our security operations. Our cyber security is now maintained on SIRP by a small group of... Read review
    Syed Z.
    SZ
    SIRP has a vast range of modules that have closely packed our asset information and data with a faster threat indication and response system.System... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SIRP
    Year Founded
    2017
    HQ Location
    London
    Twitter
    @sirp_io
    72 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Small-Business
  • 37% Mid-Market
SIRP features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
9.8
Endpoint Intelligence
Average: 8.4
9.5
Ease of Use
Average: 8.8
Tommy J.
TJ
The best thing SIRP is offering is simplification of our security operations. Our cyber security is now maintained on SIRP by a small group of... Read review
Syed Z.
SZ
SIRP has a vast range of modules that have closely packed our asset information and data with a faster threat indication and response system.System... Read review
Seller Details
Seller
SIRP
Year Founded
2017
HQ Location
London
Twitter
@sirp_io
72 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
(15)4.8 out of 5
5th Easiest To Use in Threat Intelligence software
Save to My Lists
Entry Level Price:$3,000.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a security software designed to fill security gaps, prevent data exfiltration, and protect against modern day ransomware events.
    • Reviewers like the software's proactive monitoring, easy installation, comprehensive reporting, and the ability to make security decisions based on the provided tools.
    • Users reported issues with understanding the warnings for those without a cybersecurity background, cumbersome billing process, and the inability of the software to remove malicious software exfiltrating data.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.8
    Security Validation
    Average: 8.9
    9.6
    Intelligence Reports
    Average: 8.9
    9.8
    Endpoint Intelligence
    Average: 8.4
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,481 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a security software designed to fill security gaps, prevent data exfiltration, and protect against modern day ransomware events.
  • Reviewers like the software's proactive monitoring, easy installation, comprehensive reporting, and the ability to make security decisions based on the provided tools.
  • Users reported issues with understanding the warnings for those without a cybersecurity background, cumbersome billing process, and the inability of the software to remove malicious software exfiltrating data.
BlackFog features and usability ratings that predict user satisfaction
9.8
Security Validation
Average: 8.9
9.6
Intelligence Reports
Average: 8.9
9.8
Endpoint Intelligence
Average: 8.4
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,481 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
(11)4.8 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence and observables by enabling cybersecurity teams to organize, store, and operationalize threat i

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenCTI by Filigran features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Intelligence Reports
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 8.4
    8.5
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Telecommunications
    AT
    I really appreciate the interface. It is very user-friendly. The fact that the platform is built around the STIX 2.1 format is impressive. The... Read review
    Verified User in Banking
    UB
    I've been using OpenCTI daily for threat intelligence and incident response, and it's been a great addition. The dashboard is clean and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Filigran
    Company Website
    Year Founded
    2022
    HQ Location
    New York, US
    Twitter
    @FiligranHQ
    716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence and observables by enabling cybersecurity teams to organize, store, and operationalize threat i

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 36% Mid-Market
OpenCTI by Filigran features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Intelligence Reports
Average: 8.9
9.0
Endpoint Intelligence
Average: 8.4
8.5
Ease of Use
Average: 8.8
Verified User in Telecommunications
AT
I really appreciate the interface. It is very user-friendly. The fact that the platform is built around the STIX 2.1 format is impressive. The... Read review
Verified User in Banking
UB
I've been using OpenCTI daily for threat intelligence and incident response, and it's been a great addition. The dashboard is clean and... Read review
Seller Details
Seller
Filigran
Company Website
Year Founded
2022
HQ Location
New York, US
Twitter
@FiligranHQ
716 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range o

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threater features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 8.4
    9.5
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AK
    1.The interface is very user friendly. 2. Easy to whitelist / blacklist IPs and domains. 3. Great responsive support. 4. Great logging. 5.... Read review
    Michael M.
    MM
    While your SIEM may alert you of threats, Threatblockr allows you to retrieve threat intel from TAXII/STIX feeds and blocks it. Most firewalls do... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Threater
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range o

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 27% Enterprise
Threater features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
10.0
Endpoint Intelligence
Average: 8.4
9.5
Ease of Use
Average: 8.8
AK
1.The interface is very user friendly. 2. Easy to whitelist / blacklist IPs and domains. 3. Great responsive support. 4. Great logging. 5.... Read review
Michael M.
MM
While your SIEM may alert you of threats, Threatblockr allows you to retrieve threat intel from TAXII/STIX feeds and blocks it. Most firewalls do... Read review
Seller Details
Seller
Threater
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Small-Business
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Randori Recon features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    7.9
    Intelligence Reports
    Average: 8.9
    8.8
    Endpoint Intelligence
    Average: 8.4
    8.3
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ADESH J.
    AJ
    I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
    Parth S.
    PS
    I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Small-Business
  • 35% Enterprise
IBM Security Randori Recon features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
7.9
Intelligence Reports
Average: 8.9
8.8
Endpoint Intelligence
Average: 8.4
8.3
Ease of Use
Average: 8.8
ADESH J.
AJ
I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
Parth S.
PS
I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LMNTRIX features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 8.4
    9.6
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Utilities
    EU
    24/7 Incident Validation and Response to reduce the noise, and 24/7 SOC services without the hefty price tag of running your own. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LMNTRIX
    Year Founded
    2015
    HQ Location
    Orange, California
    Twitter
    @lmntrixlabs
    77 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    53 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Enterprise
LMNTRIX features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
9.4
Endpoint Intelligence
Average: 8.4
9.6
Ease of Use
Average: 8.8
Verified User in Utilities
EU
24/7 Incident Validation and Response to reduce the noise, and 24/7 SOC services without the hefty price tag of running your own. Read review
Seller Details
Seller
LMNTRIX
Year Founded
2015
HQ Location
Orange, California
Twitter
@lmntrixlabs
77 Twitter followers
LinkedIn® Page
www.linkedin.com
53 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations n

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Exabeam New-Scale Fusion features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    9.6
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.4
    9.2
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    Exabeam a several things going for it. First it is by far the most cost effective platform out there, second the UI is extremely clean and well... Read review
    Marc P.
    MP
    Exabeam provides a user-friendly and transparent platform. The ability to navigate the console is second to none. And the granularity of data for... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,347 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    943 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations n

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 31% Mid-Market
Exabeam New-Scale Fusion features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
9.6
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.4
9.2
Ease of Use
Average: 8.8
Verified User in Financial Services
UF
Exabeam a several things going for it. First it is by far the most cost effective platform out there, second the UI is extremely clean and well... Read review
Marc P.
MP
Exabeam provides a user-friendly and transparent platform. The ability to navigate the console is second to none. And the granularity of data for... Read review
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,347 Twitter followers
LinkedIn® Page
www.linkedin.com
943 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatWorx features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.4
    9.2
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Parikshit S.
    PS
    Ease of use - agent-less and scan-less approach. Comprehensiveness - Helps us secure cloud, container and code. Effectiveness (improved... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    LOS GATOS, US
    Twitter
    @threatwatch
    102 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
ThreatWorx features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.4
9.2
Ease of Use
Average: 8.8
Parikshit S.
PS
Ease of use - agent-less and scan-less approach. Comprehensiveness - Helps us secure cloud, container and code. Effectiveness (improved... Read review
Seller Details
Year Founded
2016
HQ Location
LOS GATOS, US
Twitter
@threatwatch
102 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MetaDefender provides comprehensive file upload security to protect against malware and data breaches.​ OPSWAT designed MetaDefender to secure the world’s critical infrastructure from the most sophist

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaDefender features and usability ratings that predict user satisfaction
    7.2
    Security Validation
    Average: 8.9
    7.8
    Intelligence Reports
    Average: 8.9
    6.7
    Endpoint Intelligence
    Average: 8.4
    9.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Jose P.
    JP
    Metadefender offers on its website software that allows us to analyze suspicious files and thus protect our computer, we are very happy with this... Read review
    Verified User in Computer & Network Security
    CC
    Its price is low and it's easy to use and implement it. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,240 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    982 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MetaDefender provides comprehensive file upload security to protect against malware and data breaches.​ OPSWAT designed MetaDefender to secure the world’s critical infrastructure from the most sophist

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
MetaDefender features and usability ratings that predict user satisfaction
7.2
Security Validation
Average: 8.9
7.8
Intelligence Reports
Average: 8.9
6.7
Endpoint Intelligence
Average: 8.4
9.0
Ease of Use
Average: 8.8
Jose P.
JP
Metadefender offers on its website software that allows us to analyze suspicious files and thus protect our computer, we are very happy with this... Read review
Verified User in Computer & Network Security
CC
Its price is low and it's easy to use and implement it. Read review
Seller Details
Seller
OPSWAT
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,240 Twitter followers
LinkedIn® Page
www.linkedin.com
982 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blackbird.AI leads the ‘Narrative Intelligence' category to protect against a new threat vector called ‘Narrative Attacks’ created by deepfakes, misinformation and disinformation. Our AI-driven Conste

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blackbird.AI features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    7.1
    Endpoint Intelligence
    Average: 8.4
    7.1
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JS
    Blackbird.ai is extremely helpful in uncovering audience details about conversations as well as identifying key narratives working for and against... Read review
    GY
    Most social tools I've used provide the same thing -- a relatively "flat" view of mentions and comments, total engagements and derivatives of those... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blackbird.AI leads the ‘Narrative Intelligence' category to protect against a new threat vector called ‘Narrative Attacks’ created by deepfakes, misinformation and disinformation. Our AI-driven Conste

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Blackbird.AI features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
7.1
Endpoint Intelligence
Average: 8.4
7.1
Ease of Use
Average: 8.8
JS
Blackbird.ai is extremely helpful in uncovering audience details about conversations as well as identifying key narratives working for and against... Read review
GY
Most social tools I've used provide the same thing -- a relatively "flat" view of mentions and comments, total engagements and derivatives of those... Read review
Seller Details
Year Founded
2017
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Darknet and Dark Web Monitoring: Affordable Darknet Threat Intel covering Social Media, Paste, Git, Data Breaches, Ransomware Sites, Onion Sites, hacker Forums etc.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 25% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaduu features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User
    A
    Very current information at a superb low price Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaduu AG
    Year Founded
    2018
    HQ Location
    Zug, CH
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Darknet and Dark Web Monitoring: Affordable Darknet Threat Intel covering Social Media, Paste, Git, Data Breaches, Ransomware Sites, Onion Sites, hacker Forums etc.

Users
No information available
Industries
No information available
Market Segment
  • 25% Mid-Market
  • 25% Small-Business
Kaduu features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.8
Verified User
A
Very current information at a superb low price Read review
Seller Details
Seller
Kaduu AG
Year Founded
2018
HQ Location
Zug, CH
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReversingLabs features and usability ratings that predict user satisfaction
    9.2
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ramil M.
    RM
    Titanium Platform is a user-friendly open-source mobile application development framework. It provides tools and APIs that help developers create... Read review
    Verified User in Computer Software
    UC
    ANALYZES AND SECURES SOFTWARE PACKAGE, CONTAINER AND FILE, AT INCREDIBLE SPEEDS! Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Cambridge, US
    Twitter
    @ReversingLabs
    6,674 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    314 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ReversingLabs features and usability ratings that predict user satisfaction
9.2
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Ramil M.
RM
Titanium Platform is a user-friendly open-source mobile application development framework. It provides tools and APIs that help developers create... Read review
Verified User in Computer Software
UC
ANALYZES AND SECURES SOFTWARE PACKAGE, CONTAINER AND FILE, AT INCREDIBLE SPEEDS! Read review
Seller Details
Year Founded
2009
HQ Location
Cambridge, US
Twitter
@ReversingLabs
6,674 Twitter followers
LinkedIn® Page
www.linkedin.com
314 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatBolt is the only Intelligence-sharing platform thoughtfully designed to meet SOC/MSSP needs. It utilizes AI/ML Powered engine for threat analysis and classification, delivering high-fidelity thr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatBolt features and usability ratings that predict user satisfaction
    9.4
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    7.8
    Endpoint Intelligence
    Average: 8.4
    9.2
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AC
    An easy to use platform, free of cost, for gathering threat intelligence. Can be integrated via API easily for automated enrichment. It also gives... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    India, IN
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatBolt is the only Intelligence-sharing platform thoughtfully designed to meet SOC/MSSP needs. It utilizes AI/ML Powered engine for threat analysis and classification, delivering high-fidelity thr

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
ThreatBolt features and usability ratings that predict user satisfaction
9.4
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
7.8
Endpoint Intelligence
Average: 8.4
9.2
Ease of Use
Average: 8.8
AC
An easy to use platform, free of cost, for gathering threat intelligence. Can be integrated via API easily for automated enrichment. It also gives... Read review
Seller Details
Year Founded
2023
HQ Location
India, IN
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    7.5
    Intelligence Reports
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 8.4
    10.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Adam B.
    AB
    The team were friendly, easy to work with and the intelligence feed works well, providing reliable, high quality output. We compared the web... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Draper, UT
    Twitter
    @alphamountainai
    38 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
7.5
Intelligence Reports
Average: 8.9
7.5
Endpoint Intelligence
Average: 8.4
10.0
Ease of Use
Average: 8.8
Adam B.
AB
The team were friendly, easy to work with and the intelligence feed works well, providing reliable, high quality output. We compared the web... Read review
Seller Details
Year Founded
2020
HQ Location
Draper, UT
Twitter
@alphamountainai
38 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Feedly Threat Intelligence helps teams collect, analyze, and share open-source threat intelligence in minutes instead of hours. Feedly uses AI Feeds to collect specific and relevant intelligence from

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Feedly for Threat Intelligence features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Intelligence Reports
    Average: 8.9
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Denise DC D.
    DD
    Overall, the system has surpassed our expectations. It is highly effective in collecting the intelligence we require, significantly expediting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Feedly
    HQ Location
    Palo Alto, CA
    Twitter
    @feedly
    105,420 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Feedly Threat Intelligence helps teams collect, analyze, and share open-source threat intelligence in minutes instead of hours. Feedly uses AI Feeds to collect specific and relevant intelligence from

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Feedly for Threat Intelligence features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Intelligence Reports
Average: 8.9
0.0
No information available
10.0
Ease of Use
Average: 8.8
Denise DC D.
DD
Overall, the system has surpassed our expectations. It is highly effective in collecting the intelligence we require, significantly expediting... Read review
Seller Details
Seller
Feedly
HQ Location
Palo Alto, CA
Twitter
@feedly
105,420 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fraudlogix empowers businesses to maintain traffic quality and prevent fraud with enterprise-grade solutions. Designed for industries like Affiliate Marketing, Ad Tech, E-commerce, Cybersecurity, and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fraudlogix features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 8.4
    8.9
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Delon F.
    DF
    It is easy to use and offers a free trial version. If you choose to buy the license it is also relatively cheaper than its competitors. It is... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    Twitter
    @fraudlogix
    306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fraudlogix empowers businesses to maintain traffic quality and prevent fraud with enterprise-grade solutions. Designed for industries like Affiliate Marketing, Ad Tech, E-commerce, Cybersecurity, and

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Mid-Market
Fraudlogix features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
10.0
Endpoint Intelligence
Average: 8.4
8.9
Ease of Use
Average: 8.8
Delon F.
DF
It is easy to use and offers a free trial version. If you choose to buy the license it is also relatively cheaper than its competitors. It is... Read review
Seller Details
Year Founded
2010
Twitter
@fraudlogix
306 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Driving Business Continuity and Resiliency forward, iluminr is an all-in-one platform that connects preparedness and engagement with response, helping teams build resilience against any threat all yea

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iluminr features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Scott S.
    SS
    In security management, it is very precise in the functionality it provides, providing a high-quality service and keeping the entire system free of... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    iluminr
    Year Founded
    2019
    HQ Location
    Sydney, AU
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Driving Business Continuity and Resiliency forward, iluminr is an all-in-one platform that connects preparedness and engagement with response, helping teams build resilience against any threat all yea

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
iluminr features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.8
Scott S.
SS
In security management, it is very precise in the functionality it provides, providing a high-quality service and keeping the entire system free of... Read review
Seller Details
Seller
iluminr
Year Founded
2019
HQ Location
Sydney, AU
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IntSights is the leading external threat intelligence and protection platform, designed to neutralize threats outside the wire. The IntSights solution suite equips cybersecurity teams worldwide to mor

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threat Command by Rapid7 features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AG
    The platform is fairly easy to use. The newly revamped assets page is much better than before. Read review
    Verified User in Environmental Services
    UE
    Everything can be found in just place yet easily identifiable. It is very easy to add a new system and run the scans. It shows deep insights into... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,458 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,035 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

IntSights is the leading external threat intelligence and protection platform, designed to neutralize threats outside the wire. The IntSights solution suite equips cybersecurity teams worldwide to mor

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Threat Command by Rapid7 features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.8
AG
The platform is fairly easy to use. The newly revamped assets page is much better than before. Read review
Verified User in Environmental Services
UE
Everything can be found in just place yet easily identifiable. It is very easy to add a new system and run the scans. It shows deep insights into... Read review
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,458 Twitter followers
LinkedIn® Page
www.linkedin.com
3,035 employees on LinkedIn®
Ownership
NASDAQ:RPD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiAppSec Cloud - the next evolution of FortiWeb Cloud - simplifies and strengthens web application security and delivery across your cloud environments. This SaaS platform secures network availabil

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 19% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiAppSec Cloud features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Zaid T.
    ZT
    I like this Fortinet firewall a lot because it is powerful, reliable and fast software with which it is possible to verify and implement an... Read review
    Ava H.
    AH
    FortiWeb WAF has truly valuable features, one of which is that it provides the user with reliable, versatile and affordable software for small,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Company Website
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,589 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,343 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FortiAppSec Cloud - the next evolution of FortiWeb Cloud - simplifies and strengthens web application security and delivery across your cloud environments. This SaaS platform secures network availabil

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 19% Enterprise
FortiAppSec Cloud features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.2
Ease of Use
Average: 8.8
Zaid T.
ZT
I like this Fortinet firewall a lot because it is powerful, reliable and fast software with which it is possible to verify and implement an... Read review
Ava H.
AH
FortiWeb WAF has truly valuable features, one of which is that it provides the user with reliable, versatile and affordable software for small,... Read review
Seller Details
Seller
Fortinet
Company Website
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,589 Twitter followers
LinkedIn® Page
www.linkedin.com
15,343 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mandiant Advantage is a multi-vendor XDR platform that delivers Mandiant’s transformative expertise and frontline intelligence to security teams of all sizes.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mandiant Advantage features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Semih G.
    SG
    Integration with data platforms like splunk and qradar Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,753,487 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,860 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Mandiant Advantage is a multi-vendor XDR platform that delivers Mandiant’s transformative expertise and frontline intelligence to security teams of all sizes.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Mandiant Advantage features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Semih G.
SG
Integration with data platforms like splunk and qradar Read review
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,753,487 Twitter followers
LinkedIn® Page
www.linkedin.com
310,860 employees on LinkedIn®
Ownership
NASDAQ:GOOG
Entry Level Price:$49.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Phish Report lets you quickly report any phishing site with an interactive guide. The abuse contact database means you're always reporting to the right place.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Phish Report features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 8.4
    6.7
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Nat L.
    NL
    Having an anti-Phishing software installed on email clients is essential for safety of employees and the data of the company. The bigger the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Phish Report lets you quickly report any phishing site with an interactive guide. The abuse contact database means you're always reporting to the right place.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Phish Report features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
10.0
Endpoint Intelligence
Average: 8.4
6.7
Ease of Use
Average: 8.8
Nat L.
NL
Having an anti-Phishing software installed on email clients is essential for safety of employees and the data of the company. The bigger the... Read review
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We provide organizations with relevant and actionable dark web threat intelligence to help them identify and prevent criminal activity. Founded in 2017 with a mission to stop criminals acting with imp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Searchlight Cyber features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Saurabh S.
    SS
    The user-friendly interface and helpful notifications facilitate effectively addressing and resolving issues. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Port Solent, GB
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

We provide organizations with relevant and actionable dark web threat intelligence to help them identify and prevent criminal activity. Founded in 2017 with a mission to stop criminals acting with imp

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Searchlight Cyber features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.8
Saurabh S.
SS
The user-friendly interface and helpful notifications facilitate effectively addressing and resolving issues. Read review
Seller Details
Year Founded
2017
HQ Location
Port Solent, GB
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silobreaker is a platform-as-a-service (SaaS) offering aimed at providing intelligence teams with the necessary tools to effectively gather, analyse and disseminate data. It caters to a range of intel

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silobreaker features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Intelligence Reports
    Average: 8.9
    0.0
    No information available
    7.5
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Lalith K.
    LK
    I like the cyber threat Intelligence service that they provide. The product they offer is straightforward to map data and create a dashboard in a... Read review
    Aman P.
    AP
    The Inbuilt configuration covers all the use cases for the darkweb monitoring for the assest belongs to the organization Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    London, UK
    Twitter
    @Silobreaker
    1,925 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silobreaker is a platform-as-a-service (SaaS) offering aimed at providing intelligence teams with the necessary tools to effectively gather, analyse and disseminate data. It caters to a range of intel

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Silobreaker features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Intelligence Reports
Average: 8.9
0.0
No information available
7.5
Ease of Use
Average: 8.8
Lalith K.
LK
I like the cyber threat Intelligence service that they provide. The product they offer is straightforward to map data and create a dashboard in a... Read review
Aman P.
AP
The Inbuilt configuration covers all the use cases for the darkweb monitoring for the assest belongs to the organization Read review
Seller Details
Year Founded
2005
HQ Location
London, UK
Twitter
@Silobreaker
1,925 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations pla

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatQ features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 8.4
    10.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Human Resources
    AH
    I like the instant feed of data - a lot of data. The library option is great for new users. The amount of data is a bit overwhelming but the... Read review
    Verified User in Hospital & Health Care
    AH
    What I like most are the support and services that the organization has to offer. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Reston, Virginia
    Twitter
    @ThreatQuotient
    2,283 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations pla

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
ThreatQ features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
10.0
Endpoint Intelligence
Average: 8.4
10.0
Ease of Use
Average: 8.8
Verified User in Human Resources
AH
I like the instant feed of data - a lot of data. The library option is great for new users. The amount of data is a bit overwhelming but the... Read review
Verified User in Hospital & Health Care
AH
What I like most are the support and services that the organization has to offer. Read review
Seller Details
Year Founded
2013
HQ Location
Reston, Virginia
Twitter
@ThreatQuotient
2,283 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sandboxing reinvented against the threats of today - and tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we dev

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Enterprise
    • 14% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VMRay features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    Safe and secure sandbox with multiple ways to submit. Read review
    Verified User in Pharmaceuticals
    AP
    The VMRay platform is robust and capable at detecting a variety of threats, and is certainly a leader in malware sandbox tech. Their customer... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VMRay
    Company Website
    Year Founded
    2013
    HQ Location
    Bochum, Germany
    Twitter
    @vmray
    3,800 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sandboxing reinvented against the threats of today - and tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we dev

Users
No information available
Industries
No information available
Market Segment
  • 86% Enterprise
  • 14% Small-Business
VMRay features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.0
Ease of Use
Average: 8.8
Verified User in Financial Services
UF
Safe and secure sandbox with multiple ways to submit. Read review
Verified User in Pharmaceuticals
AP
The VMRay platform is robust and capable at detecting a variety of threats, and is certainly a leader in malware sandbox tech. Their customer... Read review
Seller Details
Seller
VMRay
Company Website
Year Founded
2013
HQ Location
Bochum, Germany
Twitter
@vmray
3,800 Twitter followers
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A next-generation Cyber Threat Intelligence platform, which provides exploit and vulnerability intelligence directly into the tools, processes, programs, and systems that need it to outpace adversarie

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VulnCheck Exploit and Vulnerability Intelligence features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    10.0
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.4
    10.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Brian C.
    BC
    We found integrating VulnCheck Exploit and Vulnerability Intelligence into the Sevco Security Platform quick and easy. The process is well... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VulnCheck
    Year Founded
    2021
    HQ Location
    Lexington, US
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A next-generation Cyber Threat Intelligence platform, which provides exploit and vulnerability intelligence directly into the tools, processes, programs, and systems that need it to outpace adversarie

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
VulnCheck Exploit and Vulnerability Intelligence features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
10.0
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.4
10.0
Ease of Use
Average: 8.8
Brian C.
BC
We found integrating VulnCheck Exploit and Vulnerability Intelligence into the Sevco Security Platform quick and easy. The process is well... Read review
Seller Details
Seller
VulnCheck
Year Founded
2021
HQ Location
Lexington, US
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chariot features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @praetorianlabs
    8,289 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Chariot features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@praetorianlabs
8,289 Twitter followers
LinkedIn® Page
www.linkedin.com
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DynaRisk's Breach Defence software empowers small to medium sized businesses to be safer online. Cyber attacks are constant and are always evolving. 60% of SMEs can go out of business within 6 months

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DynaRisk features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DynaRisk
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

DynaRisk's Breach Defence software empowers small to medium sized businesses to be safer online. Cyber attacks are constant and are always evolving. 60% of SMEs can go out of business within 6 months

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DynaRisk features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
DynaRisk
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With EBRAND Digital Risk Protection, you'll disarm cyberthreats and fuel your cybersecurity strategy with vital threat intelligence. We deliver powerful search and action tools for all relevant attack

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EBRAND Digital Risk Protection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    EBRAND
    Year Founded
    2006
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With EBRAND Digital Risk Protection, you'll disarm cyberthreats and fuel your cybersecurity strategy with vital threat intelligence. We deliver powerful search and action tools for all relevant attack

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
EBRAND Digital Risk Protection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
EBRAND
Year Founded
2006
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Falcon Feeds.io is a cutting-edge, cloud-native SaaS platform that specializes in cyber threat intelligence. It vigilantly monitors and delivers the latest security incidents and insights on threat ac

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falconfeedsio features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    Twitter
    @FalconFeedsio
    57,272 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Falcon Feeds.io is a cutting-edge, cloud-native SaaS platform that specializes in cyber threat intelligence. It vigilantly monitors and delivers the latest security incidents and insights on threat ac

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Falconfeedsio features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
Twitter
@FalconFeedsio
57,272 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lupovis is a Deception as a Service platform that provides precise, high-fidelity threat identification with a drastically reduced alert to noise ratio.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lupovis Snare features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lupovis
    HQ Location
    N/A
    Twitter
    @LupovisDefence
    495 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lupovis is a Deception as a Service platform that provides precise, high-fidelity threat identification with a drastically reduced alert to noise ratio.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Lupovis Snare features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Lupovis
HQ Location
N/A
Twitter
@LupovisDefence
495 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Quantum Armor is an Attack Surface Management (ASM) platform. It lets your company have an instant snapshot of your cyber security posture and provides tips to reduce your exposure to potential data b

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Quantum Armor features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Yuri M.
    YM
    Very intuitive and easy to use the software even for non Cybersecurity experts. This tool gives the ability to gain essential information to... Read review
    Verified User in Market Research
    AM
    The dashboard is extremely to use and a great help in monitoring assets for unauthorized changes and vulnerabilities. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    New York, NY
    Twitter
    @SilentBreach
    4,840 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Quantum Armor is an Attack Surface Management (ASM) platform. It lets your company have an instant snapshot of your cyber security posture and provides tips to reduce your exposure to potential data b

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
Quantum Armor features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Yuri M.
YM
Very intuitive and easy to use the software even for non Cybersecurity experts. This tool gives the ability to gain essential information to... Read review
Verified User in Market Research
AM
The dashboard is extremely to use and a great help in monitoring assets for unauthorized changes and vulnerabilities. Read review
Seller Details
Year Founded
2015
HQ Location
New York, NY
Twitter
@SilentBreach
4,840 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAGA® is an innovative platform designed to automate the monitoring of the surface, deep, and dark web, enhancing cybersecurity. It is tailored to protect businesses, organizations, and individuals fr

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAGA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Munit.io
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

SAGA® is an innovative platform designed to automate the monitoring of the surface, deep, and dark web, enhancing cybersecurity. It is tailored to protect businesses, organizations, and individuals fr

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SAGA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Munit.io
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Skurio is an innovative Digital Risk Protection platform that automates monitoring the surface, deep and Dark Web for your critical business data and potential cyber threats to your business. The pla

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Skurio Digital Risk Protection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • MK
    Skurio Digital Risk Protection allows us to easily keep track of potential data breaches across so many different platforms. Giving us the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Skurio
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Skurio is an innovative Digital Risk Protection platform that automates monitoring the surface, deep and Dark Web for your critical business data and potential cyber threats to your business. The pla

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Skurio Digital Risk Protection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
MK
Skurio Digital Risk Protection allows us to easily keep track of potential data breaches across so many different platforms. Giving us the... Read review
Seller Details
Seller
Skurio
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StyxView features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Vancouver, CA
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
StyxView features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
Vancouver, CA
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatKey is a highly automated security operations SaaS solution. It gathers enough context about your environments to fix security issues at the click of a button. With the information gathered from

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatKey features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DJ
    It's user-friendly and integrates seamlessly with our existing systems. It helps us quickly identify and address security threats, which has... Read review
    SS
    I have found ThreatKey by Vijilan useful for my small business. I agree with Vijilan’s terms of deployment, monitoring, and incident handling... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatKey
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatKey is a highly automated security operations SaaS solution. It gathers enough context about your environments to fix security issues at the click of a button. With the information gathered from

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Enterprise
ThreatKey features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.8
DJ
It's user-friendly and integrates seamlessly with our existing systems. It helps us quickly identify and address security threats, which has... Read review
SS
I have found ThreatKey by Vijilan useful for my small business. I agree with Vijilan’s terms of deployment, monitoring, and incident handling... Read review
Seller Details
Seller
ThreatKey
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PRODAFT, which stands for "PROactive Defense Against Future Threats", is a Swiss cyber threat intelligence company focusing on preventing breaches before they happen. We provide actionable insights ri

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • U.S.T.A. features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PRODAFT
    Year Founded
    2012
    HQ Location
    Yverdon-les-Bains, CH
    LinkedIn® Page
    www.linkedin.com
    55 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PRODAFT, which stands for "PROactive Defense Against Future Threats", is a Swiss cyber threat intelligence company focusing on preventing breaches before they happen. We provide actionable insights ri

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
U.S.T.A. features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
PRODAFT
Year Founded
2012
HQ Location
Yverdon-les-Bains, CH
LinkedIn® Page
www.linkedin.com
55 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Verimatrix XTD stands at the forefront of application security, offering unmatched protection for mobile, web desktop and embedded applications in critical industries while streamlining implementation

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Verimatrix XTD features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Diego, CA
    Twitter
    @VerimatrixInc
    4,809 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    297 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Verimatrix XTD stands at the forefront of application security, offering unmatched protection for mobile, web desktop and embedded applications in critical industries while streamlining implementation

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Verimatrix XTD features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Diego, CA
Twitter
@VerimatrixInc
4,809 Twitter followers
LinkedIn® Page
www.linkedin.com
297 employees on LinkedIn®