(119)
4.6 out of 5
Visit Website
Sponsored
Asset Management | As reported in 10 ThreatConnect Threat Intelligence Ops Platform reviews. Lets users group and organize their endpoints to gather threat intelligence on specific technologies. | 78% (Based on 10 reviews) | |
Security Workflow Automation | Based on 11 ThreatConnect Threat Intelligence Ops Platform reviews. Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. | 85% (Based on 11 reviews) | |
Deployment | Based on 11 ThreatConnect Threat Intelligence Ops Platform reviews. The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. | 83% (Based on 11 reviews) | |
Sandboxing | A feature that allows security testing and information gathering to occur in a secure, resource independent environment. This feature was mentioned in 10 ThreatConnect Threat Intelligence Ops Platform reviews. | 70% (Based on 10 reviews) |
Proactive Alerts | Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. 11 reviewers of ThreatConnect Threat Intelligence Ops Platform have provided feedback on this feature. | 77% (Based on 11 reviews) | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. This feature was mentioned in 11 ThreatConnect Threat Intelligence Ops Platform reviews. | 79% (Based on 11 reviews) | |
Intelligence Reports | Based on 11 ThreatConnect Threat Intelligence Ops Platform reviews. The ability for users to produce reports outlining detailed and personalized threat information | 83% (Based on 11 reviews) |
Endpoint Intelligence | Based on 11 ThreatConnect Threat Intelligence Ops Platform reviews. Analysis for users to examine threat intelligence data specific to their endpoint devices. | 79% (Based on 11 reviews) | |
Security Validation | The product has a recurring examination process to update your intelligence reports as new threats emerge. This feature was mentioned in 11 ThreatConnect Threat Intelligence Ops Platform reviews. | 80% (Based on 11 reviews) | |
Dynamic/Code Analysis | The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities. | Not enough data |
Resolution Automation | Diagnose and resolve incidents without the need for human interaction. | Not enough data | |
System Isolation | Cuts off network connection or temporarily inactivate applications until incidents are remedied. | Not enough data | |
Threat Intelligence | Gathers information related to threats in order to gain further information on remedies. | Not enough data |
Incident Logs | Information on each incident is stored in databases for user reference and analytics. | Not enough data | |
Incident Reports | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | Not enough data | |
Resource Usage | Analyzes recurring incidents and remedies to ensure optimal resource usage. | Not enough data |
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | Not enough data | |
Database Management | Adminstrators can access and organize data related to incidents to produce reports or make data more navigable. | Not enough data | |
Workflow Management | Administrators can organize workflows to guide remedies to specific situations incident types. | Not enough data |
Risk Scoring | Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches. | Not enough data | |
Reporting | Creates reports outlining log activity and relevant metrics. | Not enough data | |
Risk-Prioritization | Allows for vulnerability ranking by customized risk and threat priorities. | Not enough data |
Vulnerability Scanning | Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. | Not enough data | |
Vulnerability Intelligence | Stores information related to common vulnerabilities and how to resolve them once incidents occur. | Not enough data | |
Contextual Data | Identify risk data attributes such as description, category, owner, or hierarchy. | Not enough data | |
Dashboards | Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data. | Not enough data |
Automated Remediation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Workflow Automation | Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. | Not enough data | |
Security Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Test Automation | Runs pre-scripted vulnerability scans and security tests without requiring manual work. | Not enough data |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |