Product Avatar Image

CyberInt

Mostrar desglose de calificaciones
118 reseñas
  • Perfiles de 1
  • Categorías de 5
Calificación promedio de estrellas
4.6
#1 en categorías de 1
Líder de la Grid®
Atendiendo a clientes desde
2009

Profile Name

Star Rating

95
22
1
0
0

CyberInt Reviews

Review Filters
Profile Name
Star Rating
95
22
1
0
0
GM
Germano M.
06/17/2024
Revisor validado
Fuente de la revisión: Orgánico

They're good in all modules

User Friendly interface, SSO, large set of available services, amd they're always on-time, quick and concrete with the warnings. Also the grouping in logical domains is fine, for those like us that have several companies in our enterprise group.
Simcha A.
SA
Simcha A.
06/16/2024
Revisor validado
Usuario actual verificado
Fuente de la revisión: Orgánico

User-Friendly Platform

The platform is easy to use. The customer support is great! Any time we have a problem, they are happy to help us out and try to provide a solution.
CQ
Charles Q.
06/14/2024
Revisor validado
Usuario actual verificado
Fuente de la revisión: Orgánico

Excellent Tool with Great Support Team

User friendly UI, discovery and monitoring of company assets/info on the dark web and a great service/support team.

About

Contact

HQ Location:
Petah Tikva, Israel

Social

@cyber_int

What is CyberInt?

Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patented technology provides superior visibility through continuous discovery of the evolving attack surface, combined with the automated collection and analysis of vast quantities of intelligence from across the open, deep and dark web. A team of global military-grade cybersecurity experts work alongside customers to rapidly detect, investigate, and disrupt relevant threats – before they have the chance to develop into major incidents. Global customers, including Fortune 500 leaders across all major market verticals, rely on Cyberint to protect themselves from an array of external risks, including vulnerabilities, misconfigurations, phishing, impersonation attacks, malware infections, exposed credentials, data leaks, fraud, and 3rd party risks.

Details

Año de fundación
2009