-First, let's talk about the tool: The interface is quite easy to see and well described from the dashboard to each case.
Easily filter and track processing status.
- The second is about Coordination: Quick answers and support for most requested cases. Processing rate up to 98% Review collected by and hosted on G2.com.
There are a small number of undetected violations in practice, we manually detect about 2 cases a month that the tool does not detect (the tool detects about 60 cases on average). Review collected by and hosted on G2.com.
Very in-depth reports about cybercrime groups. Extensive database of leaked information relating to us or our customers. Review collected by and hosted on G2.com.
Intelligence information about software vulnerabilities is not very detailed. Review collected by and hosted on G2.com.
The ability to detect violations is always improved, the customer support attitude is very professional. Review collected by and hosted on G2.com.
Sometimes slow response to local attack campaigns (perhaps a common problem for companies providing a global service). The portal interface sometimes has errors. Review collected by and hosted on G2.com.
- Beautiful interface, easy to use, clear functions.
- Very good ability to detect information leaks from malicious cnc channels and forums
- Allows custom match rules with information leak events from git, github, databreach, Darkweb...
-Support service from the team is good and fast. Review collected by and hosted on G2.com.
Some records of account information leaks were discovered later than in reality. However this is acceptable. Overall, nothing disappointed me. Review collected by and hosted on G2.com.
1. latest Threats
2. Phishing
3. Take down service
4. investigation of threats Review collected by and hosted on G2.com.
1. UI need improvement
2. detection of phishing URLs
3. Fake social media pages should be along with existing portal
4. new features expected eg. Sandbox Review collected by and hosted on G2.com.
The ability to interact with Threat Actors, the availability of breaches and the possibility to talk to analysts quickly to resolve any issues Review collected by and hosted on G2.com.
It happens that analysts do not read inquiries carefully and respond by giving incorrect or partial information Review collected by and hosted on G2.com.
It is straight forward and easy to use platform Review collected by and hosted on G2.com.
some times the service desk doesn't respond on the spot Review collected by and hosted on G2.com.
proactive approach for threats and we get all the lates threat actors vulnerbilites etc. Review collected by and hosted on G2.com.
unable to takedown URL in quick bases it takes time to update Review collected by and hosted on G2.com.