Introducing G2.ai, the future of software buying.Try now

OpenCTI by Filigran Features

What are the features of OpenCTI by Filigran?

Orchestration

  • Asset Management
  • Security Workflow Automation
  • Deployment
  • Sandboxing

Information

  • Proactive Alerts
  • Intelligence Reports

Personalization

  • Endpoint Intelligence

Generative AI

  • AI Text Summarization

Filter for Features

Orchestration

Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies. This feature was mentioned in 11 OpenCTI by Filigran reviews.
85%
(Based on 11 reviews)

Security Workflow Automation

Based on 11 OpenCTI by Filigran reviews. Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.
89%
(Based on 11 reviews)

Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. This feature was mentioned in 11 OpenCTI by Filigran reviews.
80%
(Based on 11 reviews)

Sandboxing

A feature that allows security testing and information gathering to occur in a secure, resource independent environment. This feature was mentioned in 10 OpenCTI by Filigran reviews.
68%
(Based on 10 reviews)

Information

Proactive Alerts

Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. This feature was mentioned in 10 OpenCTI by Filigran reviews.
85%
(Based on 10 reviews)

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Intelligence Reports

Based on 11 OpenCTI by Filigran reviews. The ability for users to produce reports outlining detailed and personalized threat information
92%
(Based on 11 reviews)

Personalization

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices. 10 reviewers of OpenCTI by Filigran have provided feedback on this feature.
90%
(Based on 10 reviews)

Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

Not enough data

Response

Resolution Automation

Diagnose and resolve incidents without the need for human interaction.

Not enough data

Resolution Guidance

Guide users through the resolution process and give specific instructions to remedy individual occurrences.

Not enough data

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

Not enough data

Threat Intelligence

Gathers information related to threats in order to gain further information on remedies.

Not enough data

Records

Incident Logs

Information on each incident is stored in databases for user reference and analytics.

Not enough data

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Resource Usage

Analyzes recurring incidents and remedies to ensure optimal resource usage.

Not enough data

Management

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Workflow Management

Administrators can organize workflows to guide remedies to specific situations incident types.

Not enough data

Administration

Reports & Analytics

The ability to digest a large amount of data into visual representations and analytics.

Not enough data

Dashboard

The ability to view a large amount of data in one place using customizable widgets.

Not enough data

Generative AI

AI Text Summarization

Condenses long documents or text into a brief summary. This feature was mentioned in 10 OpenCTI by Filigran reviews.
58%
(Based on 10 reviews)

AI Text Generation

Allows users to generate text based on a text prompt.

Not enough data

AI Text Summarization

Condenses long documents or text into a brief summary.

Not enough data

Agentic AI - Threat Intelligence

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Multi-step Planning

Ability to break down and plan multi-step processes

Not enough data

Proactive Assistance

Anticipates needs and offers suggestions without prompting

Not enough data

Decision Making

Makes informed choices based on available data and objectives

Not enough data