Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Dataminr Features

What are the features of Dataminr?

Orchestration

  • Asset Management
  • Security Workflow Automation

Information

  • Proactive Alerts

Top Rated Dataminr Alternatives

Filter for Features

Orchestration

Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies. 10 reviewers of Dataminr have provided feedback on this feature.
80%
(Based on 10 reviews)

Security Workflow Automation

Based on 10 Dataminr reviews. Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.
78%
(Based on 10 reviews)

Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.

Not enough data

Sandboxing

A feature that allows security testing and information gathering to occur in a secure, resource independent environment.

Not enough data

Information

Proactive Alerts

Based on 10 Dataminr reviews. Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.
90%
(Based on 10 reviews)

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Intelligence Reports

The ability for users to produce reports outlining detailed and personalized threat information

Not enough data

Personalization

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data

Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

Not enough data

Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

Not enough data

Media Channels

Broadcast Media

Monitors broadcast media such as television and radio news

Not enough data

Online Media

Monitors online media such as blogs, websites, and social media

Not enough data

Geographic Coverage

Local Media

Monitors media channels at the local level

Not enough data

National Media

Monitors media channels at the national level

Not enough data

International Media

Monitors international news coverage

Not enough data

Reporting

Keyword Targeting

Enables users to search media channels for specific keywords, brand mentions, or topics

Not enough data

Custom Feeds and Alerts

Allows users to create custom feeds and/or receive real-time alerts for relevant media mentions

Not enough data

Custom Reports

Allows users to build custom reports that can be shared with clients and stakeholders

Not enough data

Dashboards

Provides dashboards for quick visualizations of relevant media coverage and analytics

Not enough data

Functionality

Monitoring - Deep Web

Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web.

Not enough data

Monitoring - Dark Web

Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums.

Not enough data

Analysis

Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations.

Not enough data

Ticketing

Integrates into ticketing or CRM platforms via API integrations.

Not enough data

Simple Search

Search through real-time and historical data without using technical query language.

Not enough data

Leak Source

Provides additional context and analysis to help identify the source of leaked information.

Not enough data

Centralized Dashboard

Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software.

Not enough data

Real-Time Alerts

Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.

Not enough data

Platform

Reporting and Analytics

Produces summative reports for threats, and creates threat trend analysis using historical data.

Not enough data

Connections and Integrations

Connects to a variety of software and hardware, including IoT devices, vehicles, and other public and private databases.

Not enough data

Collaboration Tools

Offers communication, workflow, and dashboard customizations to support collaborative response on multiple threats.

Not enough data

Threat Monitoring

Threat Alerts

Allows real-time rules and alerts to be triggered based on pre-set criteria.

Not enough data

Continuous Monitoring

Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.

Not enough data

Investigation Management

Provides customizable investigation workflows, data governance, and audit tracking to support threat investigation and mitigation, for both safety and legal reasons.

Not enough data

Threat Assessment

Graphical and Link Analysis

Allows users to visually link connections and relationships, and utlize graphs, GIS, and maps to identify trends more easily.

Not enough data

Threat Scoring

Allows threat methodology to be applied to individual threats to assess their priority.

Not enough data

Threat Identification

Proactive Listening

Continuously monitors various social media channels, deep and dark web, and situational signals to proactively identify potential threats.

Not enough data

External Data Mining

Compiles data from various public research databases, including OSINT, public records, and criminal and civil records.

Not enough data

Emergency Management

Mass Alerts and Notifications

Broadcasts real-time updates and alerts to internal and external individuals when an incident escalates, and allows targeted updates to users based on location.

Not enough data

Threat Monitoring

Offers risk intelligence tools to proactively monitor and assess threats as they arise.

Not enough data

Geolocation

Utilizes geolocation to track personnel, and supports geo-tagged media for field updates.

Not enough data

Integrated Response

Integrates with necessary business systems, such as IT and communications platforms, to facilitate faster alerts and responses.

Not enough data

Crisis Communication

Enables collaboration and communication between public and private partner organizations to resolve an incident.

Not enough data

Post-Event Analysis

Generates reports and insights after each event to assess response efficiency and compliance, and identify areas for improvement.

Not enough data

Emergency Planning

Scenario Planning

Stores emergency planning documentation and task assignments for a variety of scenarios.

Not enough data

Automated Workflows

Configures thresholds for triggering automated incident initiation responses based on user preferences.

Not enough data

Auditing & Compliance

Maintains audit trails and mandated compliance for emergency management protocols.

Not enough data

Generative AI

AI Text Summarization

Condenses long documents or text into a brief summary.

Not enough data

AI Text Summarization

Condenses long documents or text into a brief summary.

Not enough data