Dataminr Features
What are the features of Dataminr?
Orchestration
- Asset Management
- Security Workflow Automation
Information
- Proactive Alerts
Top Rated Dataminr Alternatives
(17)
4.7 out of 5
Visit Website
Sponsored
Dataminr Categories on G2
Filter for Features
Orchestration
Asset Management | Lets users group and organize their endpoints to gather threat intelligence on specific technologies. 10 reviewers of Dataminr have provided feedback on this feature. | 80% (Based on 10 reviews) | |
Security Workflow Automation | Based on 10 Dataminr reviews. Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. | 78% (Based on 10 reviews) | |
Deployment | The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. | Not enough data | |
Sandboxing | A feature that allows security testing and information gathering to occur in a secure, resource independent environment. | Not enough data |
Information
Proactive Alerts | Based on 10 Dataminr reviews. Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. | 90% (Based on 10 reviews) | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data | |
Intelligence Reports | The ability for users to produce reports outlining detailed and personalized threat information | Not enough data |
Personalization
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Security Validation | The product has a recurring examination process to update your intelligence reports as new threats emerge. | Not enough data | |
Dynamic/Code Analysis | The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities. | Not enough data |
Media Channels
Broadcast Media | Monitors broadcast media such as television and radio news | Not enough data | |
Online Media | Monitors online media such as blogs, websites, and social media | Not enough data |
Geographic Coverage
Local Media | Monitors media channels at the local level | Not enough data | |
National Media | Monitors media channels at the national level | Not enough data | |
International Media | Monitors international news coverage | Not enough data |
Reporting
Keyword Targeting | Enables users to search media channels for specific keywords, brand mentions, or topics | Not enough data | |
Custom Feeds and Alerts | Allows users to create custom feeds and/or receive real-time alerts for relevant media mentions | Not enough data | |
Custom Reports | Allows users to build custom reports that can be shared with clients and stakeholders | Not enough data | |
Dashboards | Provides dashboards for quick visualizations of relevant media coverage and analytics | Not enough data |
Functionality
Monitoring - Deep Web | Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web. | Not enough data | |
Monitoring - Dark Web | Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums. | Not enough data | |
Analysis | Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations. | Not enough data | |
Ticketing | Integrates into ticketing or CRM platforms via API integrations. | Not enough data | |
Simple Search | Search through real-time and historical data without using technical query language. | Not enough data | |
Leak Source | Provides additional context and analysis to help identify the source of leaked information. | Not enough data | |
Centralized Dashboard | Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software. | Not enough data | |
Real-Time Alerts | Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts. | Not enough data |
Platform
Reporting and Analytics | Produces summative reports for threats, and creates threat trend analysis using historical data. | Not enough data | |
Connections and Integrations | Connects to a variety of software and hardware, including IoT devices, vehicles, and other public and private databases. | Not enough data | |
Collaboration Tools | Offers communication, workflow, and dashboard customizations to support collaborative response on multiple threats. | Not enough data |
Threat Monitoring
Threat Alerts | Allows real-time rules and alerts to be triggered based on pre-set criteria. | Not enough data | |
Continuous Monitoring | Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response. | Not enough data | |
Investigation Management | Provides customizable investigation workflows, data governance, and audit tracking to support threat investigation and mitigation, for both safety and legal reasons. | Not enough data |
Threat Assessment
Graphical and Link Analysis | Allows users to visually link connections and relationships, and utlize graphs, GIS, and maps to identify trends more easily. | Not enough data | |
Threat Scoring | Allows threat methodology to be applied to individual threats to assess their priority. | Not enough data |
Threat Identification
Proactive Listening | Continuously monitors various social media channels, deep and dark web, and situational signals to proactively identify potential threats. | Not enough data | |
External Data Mining | Compiles data from various public research databases, including OSINT, public records, and criminal and civil records. | Not enough data |
Emergency Management
Mass Alerts and Notifications | Broadcasts real-time updates and alerts to internal and external individuals when an incident escalates, and allows targeted updates to users based on location. | Not enough data | |
Threat Monitoring | Offers risk intelligence tools to proactively monitor and assess threats as they arise. | Not enough data | |
Geolocation | Utilizes geolocation to track personnel, and supports geo-tagged media for field updates. | Not enough data | |
Integrated Response | Integrates with necessary business systems, such as IT and communications platforms, to facilitate faster alerts and responses. | Not enough data | |
Crisis Communication | Enables collaboration and communication between public and private partner organizations to resolve an incident. | Not enough data | |
Post-Event Analysis | Generates reports and insights after each event to assess response efficiency and compliance, and identify areas for improvement. | Not enough data |
Emergency Planning
Scenario Planning | Stores emergency planning documentation and task assignments for a variety of scenarios. | Not enough data | |
Automated Workflows | Configures thresholds for triggering automated incident initiation responses based on user preferences. | Not enough data | |
Auditing & Compliance | Maintains audit trails and mandated compliance for emergency management protocols. | Not enough data |
Generative AI
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data | |
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data |