Top Rated ANY.RUN Threat Intelligence Alternatives
Join the Conversation
Sponsored
1 ANY.RUN Threat Intelligence Reviews
5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.

SA
Siam A.
Content Creator
Small-Business(50 or fewer emp.)
What do you like best about ANY.RUN Threat Intelligence?
ANY.RUN Threat Intelligence significantly reduces the workload for malware analysts. One of its standout features is the user interface, which provides a well structured presentation of data that clearly shows the behavior of malware samples. This organized approach enables researchers and analysts to identify the techniques and attack vectors used by malware more efficiently. It also provides a more intuitive experience compared to traditional analysis methods in your own isolated virtualized environment. Review collected by and hosted on G2.com.
What do you dislike about ANY.RUN Threat Intelligence?
It would be nice if the UI were more customizable, allowing users to resize different window or elements. Review collected by and hosted on G2.com.
There are not enough reviews of ANY.RUN Threat Intelligence for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Palo Alto Expedition
4.3
(21)
The open-source Expedition tool speeds your migration to next-generation firewall technologies and more efficient processes, enabling you to keep pace with emerging security threats and industry best practices.
2

Suhosin
4.4
(17)
Suhosin is an advanced protection system for PHP 5 installations. It is designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.
3

DeleteMe
4.2
(14)
DeleteMe helps businesses large and small Keep Employee Information Private
4
SecureBridge
4.9
(12)
SecureBridge is a tool that represents clients and servers for SSH, SFTP and SSL protocols as a network security solution, it protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification.
5

mSpy
3.8
(10)
mSpy is a computer security for parental control. Helps parents to give attention to their children online activities. It checks WhatsApp, Facebook, massage and snapchat messages.
6
Execweb
5.0
(6)
Execweb is a leading Cybersecurity Executive Network that connects vendors with CISOs/CIOs via 1:1 virtual meetings & roundtables
7

Outlook PST Recovery
4.7
(5)
Voimakas Outlook PST Recovery is a software that recover emails from corrupted PST file save them into new PST files or existing PST file with whole emails items and attachments and also recovers deleted Outlook emails items without any data defeat.
8

SiteOwl
4.5
(4)
SiteOwl is the world’s first unified, digital platform for security integrators and system managers that provides an end-to-end solution to help users design, install, and manage their security systems.
SiteOwl brings modern technology to the job site by equipping designers, field technicians, and integrator customers with a suite of mobile and cloud-based applications to efficiently manage security system design, installations, and service management.
Positioned as a drag-and-drop solution for security teams, SiteOwl makes it easy to construct powerful security solutions on the fly while receiving real-time updates on customer approvals, installation progress, and more.
9
Message Classification
4.5
(3)
Protect your organization's information assets by allowing users to classify and label all emails at the point of creation.
10

Siemens SiPass Integrated
5.0
(2)
Siemens SiPass Integrated is a powerful and extremely flexible access control system that provides a very high level of security without compromising convenience.
ANY.RUN Threat Intelligence Categories on G2