Skip to Navigation
Skip to Navigation
G2 - Business Software Reviews
Search software
Software
Expand/Collapse Software
AI Agents
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
For Developers
Use our Developer Portal to test API data
Deals
Leave a Review
Join or Log In
Search
Search Software and Services
Expand/Collapse
Home
...
All Categories
Threat Intelligence Software Discussions
Threat Intelligence Software Discussions
Share
All Threat Intelligence Software Discussions
Search
Most Commented
Most Helpful
Pinned by G2
Newest
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Filter
Filter
Filter by
Expand/Collapse
Sort by
Most Commented
Most Helpful
Pinned by G2
Newest
Filter by
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Posted within
CYREBRO
0
1
What is CYREBRO used for?
What is CYREBRO used for?
Digital Forensics Software
Managed Detection and Response (MDR) Software
Log Analysis Software
Incident Response Software
Threat Intelligence Software
Extended Detection and Response (XDR) Platforms
Show More
1
person commented
CYREBRO
Pinned by G2 as a
common question.
Posted within
OnSecurity
0
1
What is OnSecurity used for?
What is OnSecurity used for?
Penetration Testing Software
Vulnerability Scanner Software
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Cloudflare Application Security and Performance
0
1
How good is Cloudflare DNS?
How good is Cloudflare DNS?
Managed DNS Providers Software
Enterprise Content Delivery Network (eCDN) Software
Content Delivery Network (CDN) Software
DDoS Protection Software
Web Application Firewalls (WAF)
API Security Tools
Bot Detection and Mitigation Software
SSL & TLS Certificates Tools Software
Threat Intelligence Software
DNS Security Solutions
Load Balancing Software
Enterprise Content Management (ECM) Systems
Certificate Lifecycle Management (CLM) Software
Application Shielding Software
Website Security Software
Show More
1
person commented
NF
Nicolas F.
Pinned by G2 as a
common question.
Posted within
Authentic8 Silo for Research
0
0
How has Silo by Authentic8 enhanced your secure browsing experience, and what advice would you gi...
How has Silo by Authentic8 enhanced your secure browsing experience, and what advice would you give to others considering it?
Threat Intelligence Software
Browser Isolation Software
Pinned by G2 as a
common question.
Posted within
Resolver
0
0
What do you like most about Resolver for risk management, and what could be improved?
What do you like most about Resolver for risk management, and what could be improved?
Security Compliance Software
Protective Intelligence Platforms
Risk-based Vulnerability Management Software
Investigation Management Software
Enterprise Risk Management (ERM) Software
Operational Risk Management Software
Third Party & Supplier Risk Management Software
IT Risk Management Software
Audit Management Software
Physical Security Software
Incident Response Software
Threat Intelligence Software
Content Moderation Tools Software
Social Media Listening Tools
Show More
1
person commented
NM
Nick M.
Pinned by G2 as a
common question.
Posted within
Logpoint
0
0
What is your experience with Logpoint for SIEM, and what do you recommend for new users?
What is your experience with Logpoint for SIEM, and what do you recommend for new users?
Log Monitoring Software
Log Analysis Software
Security Information and Event Management (SIEM) Software
Security Orchestration, Automation, and Response (SOAR) Software
Incident Response Software
Threat Intelligence Software
User and Entity Behavior Analytics (UEBA) Software
SAP Store Software
Show More
Pinned by G2 as a
common question.
Posted within
CrowdSec
0
0
What are the benefits and drawbacks of using CrowdSec for cybersecurity, and what do you recommen...
What are the benefits and drawbacks of using CrowdSec for cybersecurity, and what do you recommend for improvement?
Security Orchestration, Automation, and Response (SOAR) Software
Intrusion Detection and Prevention Systems (IDPS)
Container Security Tools
Endpoint Detection & Response (EDR) Software
Threat Intelligence Software
Firewall Software
Show More
Pinned by G2 as a
common question.
Posted within
ActivTrak
0
0
What is ActivTrak used for?
What is ActivTrak used for?
Employee Monitoring Software
User and Entity Behavior Analytics (UEBA) Software
Threat Intelligence Software
Insider Threat Management (ITM) Software
Pinned by G2 as a
common question.
Posted within
Mimecast Advanced Email Security
0
0
What is Mimecast Email Security with Targeted Threat Protection used for?
What is Mimecast Email Security with Targeted Threat Protection used for?
Intelligent Email Protection Software
Cloud Email Security Solutions
Secure Email Gateway Software
Threat Intelligence Software
Browser Isolation Software
Show More
2
people commented
DB
Dencel B.
DG
Pinned by G2 as a
common question.
Posted within
FortiGate-VM NGFW
0
0
What is FortiGate NGFW used for?
What is FortiGate NGFW used for?
Threat Intelligence Software
Firewall Software
Data Center Security Solutions
Unified Threat Management Software
1
person commented
SA
sohrab a.
Pinned by G2 as a
common question.
Posted within
Authentic8 Silo for Research
0
0
What is Silo by Authentic8 used for?
What is Silo by Authentic8 used for?
Browser Isolation Software
Secure Web Gateways
Threat Intelligence Software
Zero Trust Networking Software
Pinned by G2 as a
common question.
Posted within
CrowdSec
0
0
What is CrowdSec used for?
What is CrowdSec used for?
Security Orchestration, Automation, and Response (SOAR) Software
Intrusion Detection and Prevention Systems (IDPS)
Container Security Tools
Endpoint Detection & Response (EDR) Software
Threat Intelligence Software
Firewall Software
Show More
1
person commented
AK
Alex K.
Pinned by G2 as a
common question.
Posted within
Lookout
0
0
What is Lookout used for?
What is Lookout used for?
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Endpoint Management Software
Threat Intelligence Software
Secure Access Service Edge (SASE) Platforms
Secure Web Gateways
Zero Trust Networking Software
Cloud Edge Security Software
Show More
Pinned by G2 as a
common question.
Posted within
Trellix Threat Intelligence Exchange
0
0
What is McAfee Threat Intelligence Exchange used for?
What is McAfee Threat Intelligence Exchange used for?
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Zignal Labs
0
0
What is Zignal Labs used for?
What is Zignal Labs used for?
Protective Intelligence Platforms
Threat Intelligence Software
Social Media Analytics Software
social media monitoring tools
Pinned by G2 as a
common question.
Posted within
Defendify All-In-One Cybersecurity Solution
0
0
What is Defendify Cybersecurity Platform used for?
What is Defendify Cybersecurity Platform used for?
Dark Web Monitoring Tools
Breach and Attack Simulation (BAS) Software
Managed Detection and Response (MDR) Software
Penetration Testing Software
Website Security Software
Vulnerability Scanner Software
Security Awareness Training Software
Incident Response Software
Threat Intelligence Software
Vulnerability Management Software
Show More
Pinned by G2 as a
common question.
Posted within
Logpoint
0
0
What is LogPoint used for?
What is LogPoint used for?
Log Monitoring Software
Log Analysis Software
Security Information and Event Management (SIEM) Software
Security Orchestration, Automation, and Response (SOAR) Software
Incident Response Software
Threat Intelligence Software
User and Entity Behavior Analytics (UEBA) Software
SAP Store Software
Show More
Pinned by G2 as a
common question.
Posted within
Cisco Talos
0
0
What is Cisco Talos used for?
What is Cisco Talos used for?
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Cloudflare Application Security and Performance
0
0
What is Cloudflare Spectrum used for?
What is Cloudflare Spectrum used for?
Web Application Firewalls (WAF)
Enterprise Content Delivery Network (eCDN) Software
Content Delivery Network (CDN) Software
DDoS Protection Software
API Security Tools
Bot Detection and Mitigation Software
SSL & TLS Certificates Tools Software
Threat Intelligence Software
DNS Security Solutions
Load Balancing Software
Enterprise Content Management (ECM) Systems
Certificate Lifecycle Management (CLM) Software
Application Shielding Software
Website Security Software
Show More
Pinned by G2 as a
common question.
Posted within
Alienbrain Studio
0
0
What is Alienbrain Studio used for?
What is Alienbrain Studio used for?
Digital Asset Management Software
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Flashpoint
0
0
What is Echosec Systems used for?
What is Echosec Systems used for?
Protective Intelligence Platforms
Dark Web Monitoring Tools
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
FortiGate-VM NGFW
0
0
What is FortiGate-VM used for?
What is FortiGate-VM used for?
Firewall Software
Threat Intelligence Software
Data Center Security Solutions
Unified Threat Management Software
2
people commented
MS
Mohammed S.
AP
Pinned by G2 as a
common question.
Posted within
Check Point Exposure Management
0
0
What is Argos™ Threat Intelligence Platform used for?
What is Argos™ Threat Intelligence Platform used for?
Dark Web Monitoring Tools
Risk-based Vulnerability Management Software
Brand Protection Software
Security Risk Analysis Software
Threat Intelligence Software
Attack Surface Management Software
Show More
1
person commented
Check Point Exposure Management
Pinned by G2 as a
common question.
Posted within
Azure Front Door
0
0
What is Azure Front Door used for?
What is Azure Front Door used for?
Threat Intelligence Software
Content Delivery Network (CDN) Software
Pinned by G2 as a
common question.
Posted within
ThreatWorx
0
0
What is ThreatWorx used for?
What is ThreatWorx used for?
Software Composition Analysis Tools
Container Security Tools
Threat Intelligence Software
Vendor Security and Privacy Assessment Software
Pinned by G2 as a
common question.
Posted within
Cloudflare Application Security and Performance
0
0
What is Cloudflare Bot Management used for?
What is Cloudflare Bot Management used for?
Bot Detection and Mitigation Software
Enterprise Content Delivery Network (eCDN) Software
Content Delivery Network (CDN) Software
DDoS Protection Software
Web Application Firewalls (WAF)
API Security Tools
SSL & TLS Certificates Tools Software
Threat Intelligence Software
DNS Security Solutions
Load Balancing Software
Enterprise Content Management (ECM) Systems
Certificate Lifecycle Management (CLM) Software
Application Shielding Software
Website Security Software
Show More
Pinned by G2 as a
common question.
Posted within
LMNTRIX
0
0
What is LMNTRIX used for?
What is LMNTRIX used for?
Deception Technology Software
Network Detection and Response (NDR) Software
Endpoint Detection & Response (EDR) Software
Incident Response Software
Threat Intelligence Software
Managed Detection and Response (MDR) Software
Show More
Pinned by G2 as a
common question.
Posted within
N-able Risk Intelligence
0
0
What is N-able Risk Intelligence used for?
What is N-able Risk Intelligence used for?
Threat Intelligence Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Trellix Global Threat Intelligence (GTI)
0
0
What is McAfee Global Threat Intelligence (GTI) for ESM used for?
What is McAfee Global Threat Intelligence (GTI) for ESM used for?
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Media Sonar
0
0
What is Media Sonar used for?
What is Media Sonar used for?
Dark Web Monitoring Tools
Social Discovery Software
Security Risk Analysis Software
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
DomainTools
0
0
What is DomainTools used for?
What is DomainTools used for?
DNS Security Solutions
Threat Intelligence Software
Incident Response Software
Digital Forensics Software
Security Risk Analysis Software
Show More
Pinned by G2 as a
common question.
Posted within
ThreatCloud AI
0
0
What is ThreatCloud IntelliStore used for?
What is ThreatCloud IntelliStore used for?
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Whois API Webservice
0
0
What is Whois API Webservice used for?
What is Whois API Webservice used for?
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Vigilante Operative
0
0
What is Vigilante Operative used for?
What is Vigilante Operative used for?
Security Risk Analysis Software
Threat Intelligence Software
Dark Web Monitoring Tools
Pinned by G2 as a
common question.
Posted within
Digital Vaccine Labs
0
0
What is Digital Vaccine Labs used for?
What is Digital Vaccine Labs used for?
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
BlackFog
0
0
What is BlackFog used for?
What is BlackFog used for?
Insider Threat Management (ITM) Software
User and Entity Behavior Analytics (UEBA) Software
Cloud Data Security Software
Endpoint Management Software
Threat Intelligence Software
Show More
Pinned by G2 as a
common question.
Posted within
OPSWAT
0
0
What is OPSWAT used for?
What is OPSWAT used for?
Zero Trust Networking Software
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Pulsedive
0
0
What is Pulsedive used for?
What is Pulsedive used for?
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Anomali Security Analytics
0
0
What is Anomali used for?
What is Anomali used for?
Threat Intelligence Software
Extended Detection and Response (XDR) Platforms
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Anomali Security Analytics
0
0
What is Anomali used for?
What is Anomali used for?
Threat Intelligence Software
Extended Detection and Response (XDR) Platforms
Incident Response Software
Pinned by G2 as a
common question.
Posted within
iManage Threat Manager
0
0
What is iManage Threat Manager used for?
What is iManage Threat Manager used for?
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
DigitalStakeout
0
0
What is DigitalStakeout Scout used for?
What is DigitalStakeout Scout used for?
Threat Intelligence Software
Dark Web Monitoring Tools
Pinned by G2 as a
common question.
Posted within
Quantum Armor
0
0
What is Quantum Armor used for?
What is Quantum Armor used for?
Attack Surface Management Software
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
RiskIQ
0
0
What is RiskIQ used for?
What is RiskIQ used for?
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Proofpoint Emerging Threats Intelligence
0
0
What is Proofpoint Emerging Threats Intelligence used for?
What is Proofpoint Emerging Threats Intelligence used for?
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
ThreatQ
0
0
What is ThreatQ used for?
What is ThreatQ used for?
Threat Intelligence Software
Security Orchestration, Automation, and Response (SOAR) Software
1
person commented
ThreatQ
Pinned by G2 as a
common question.
Posted within
Google Threat Intelligence
0
0
What is Mandiant Advantage used for?
What is Mandiant Advantage used for?
Threat Intelligence Software
Extended Detection and Response (XDR) Platforms
Pinned by G2 as a
common question.
Posted within
The Respond Analyst
0
0
What is The Respond Analyst used for?
What is The Respond Analyst used for?
Security Risk Analysis Software
Incident Response Software
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
MetaDefender
0
0
What is Metadefender used for?
What is Metadefender used for?
Antivirus Software
Data Loss Prevention (DLP) Software
Threat Intelligence Software
Cloud File Security Software
Vulnerability Scanner Software
Show More
1
person commented
MA
Mansi A.
Pinned by G2 as a
common question.
Posted within
Intezer
0
0
What is genetic malware analysis?
What is genetic malware analysis?
Malware Analysis Tools
Threat Intelligence Software
1
person commented
AR
Animesh R.
Pinned by G2 as a
common question.
‹ Prev
‹ Prev
1
2
3
4
5
Next ›
Next ›
Top Contributors in Threat Intelligence Software
1
DM
Loading...
Dur-e-Nayab M.
Marketing Manager
11 pts
2
DP
Loading...
Drew P.
Marketing Director
5 pts
3
AW
Loading...
Ariel W.
5 pts
4
IT
Loading...
Intezer T.
5 pts
5
JJ
Loading...
Jeff J.
IT
3 pts
Popular Discussions without Comments
0
1
Which is the best threat intelligence software for a small business?
0
1
What is onsecurity used for?
0
1
Cloudflare vs networksolutions vs fix
0
1
Get a free voip security assessment report for a limited time.
0
1
Gdd
Hunting for software
insights
?
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google
By proceeding, you agree to our
Terms of Use
and
Privacy Policy