Lohan A.
"Vetting Prospective Clients with Threat Intel Data"
What do you like best about Threat Intelligence API Platform?
I’ve been working in marketing for 10 years now. So far, TIP’s products are possibly the easiest I used for conducting background checks on a client’s IT infrastructure. For instance, the vendor’s products allow uncovering a potential partner’s exposed cyber assets with SSL Configuration Analysis API.
The second thing I particularly like about the products is their straightforward user interfaces (UIs) for overall threat intelligence analysis. The dashboard doesn’t require much input. Often, only a domain name is required for queries. Review collected by and hosted on G2.com.
What do you dislike about Threat Intelligence API Platform?
Perhaps nontechnical users may feel a bit intimidated about the output formats when they first use the products. But they’ll soon discover that the benchmarks used in the analyses are in layman’s terms. There are also detailed descriptions available on the vendor’s site for each output parameter. Review collected by and hosted on G2.com.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through a business email account
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.