OpenCTI by Filigran Features
What are the features of OpenCTI by Filigran?
Orchestration
- Asset Management
- Security Workflow Automation
- Deployment
- Sandboxing
Information
- Proactive Alerts
- Intelligence Reports
Personalization
- Endpoint Intelligence
Generative AI
- AI Text Summarization
OpenCTI by Filigran Categories on G2
Filter for Features
Orchestration
Asset Management | Lets users group and organize their endpoints to gather threat intelligence on specific technologies. This feature was mentioned in 11 OpenCTI by Filigran reviews. | 85% (Based on 11 reviews) | |
Security Workflow Automation | Based on 11 OpenCTI by Filigran reviews. Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. | 89% (Based on 11 reviews) | |
Deployment | The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. This feature was mentioned in 11 OpenCTI by Filigran reviews. | 80% (Based on 11 reviews) | |
Sandboxing | A feature that allows security testing and information gathering to occur in a secure, resource independent environment. This feature was mentioned in 10 OpenCTI by Filigran reviews. | 68% (Based on 10 reviews) |
Information
Proactive Alerts | Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. This feature was mentioned in 10 OpenCTI by Filigran reviews. | 85% (Based on 10 reviews) | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data | |
Intelligence Reports | Based on 11 OpenCTI by Filigran reviews. The ability for users to produce reports outlining detailed and personalized threat information | 92% (Based on 11 reviews) |
Personalization
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. 10 reviewers of OpenCTI by Filigran have provided feedback on this feature. | 90% (Based on 10 reviews) | |
Dynamic/Code Analysis | The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities. | Not enough data |
Response
Resolution Automation | Diagnose and resolve incidents without the need for human interaction. | Not enough data | |
Resolution Guidance | Guide users through the resolution process and give specific instructions to remedy individual occurrences. | Not enough data | |
System Isolation | Cuts off network connection or temporarily inactivate applications until incidents are remedied. | Not enough data | |
Threat Intelligence | Gathers information related to threats in order to gain further information on remedies. | Not enough data |
Records
Incident Logs | Information on each incident is stored in databases for user reference and analytics. | Not enough data | |
Incident Reports | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | Not enough data | |
Resource Usage | Analyzes recurring incidents and remedies to ensure optimal resource usage. | Not enough data |
Management
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | Not enough data | |
Workflow Management | Administrators can organize workflows to guide remedies to specific situations incident types. | Not enough data |
Administration
Reports & Analytics | The ability to digest a large amount of data into visual representations and analytics. | Not enough data | |
Dashboard | The ability to view a large amount of data in one place using customizable widgets. | Not enough data |
Generative AI
AI Text Summarization | Condenses long documents or text into a brief summary. This feature was mentioned in 10 OpenCTI by Filigran reviews. | 58% (Based on 10 reviews) | |
AI Text Generation | Allows users to generate text based on a text prompt. | Not enough data | |
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data |
Agentic AI - Threat Intelligence
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |