Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Threat Command by Rapid7 Alternatives

Threat Command by Rapid7 Reviews & Product Details

Threat Command by Rapid7 Overview

What is Threat Command by Rapid7?

IntSights is the leading external threat intelligence and protection platform, designed to neutralize threats outside the wire. The IntSights solution suite equips cybersecurity teams worldwide to more effectively detect and prevent threats at their source before they even reach the perimeter. The founders are veterans of elite Israeli military intelligence units, where they acquired a deep understanding of the hacker mindset, as well as the most effective techniques to defend against it. IntSights is backed by Blackstone Group, Clearsky, Wipro Ventures, Tola Capital, Blumberg Capital, and others.

Threat Command by Rapid7 Details
Languages Supported
English, French, Hebrew, Italian, Japanese, Russian, Spanish, Chinese (Simplified)
Show LessShow More
Product Description

IntSights is revolutionizing cyber security with a first of its kind Enterprise Threat Intelligence & Mitigation platform that delivers proactive defense by transforming threat intelligence into automated security action. It monitors your external risk profile, aggregates and analyzes tens of thousands of threats, and automates the risk mitigation lifecycle.


Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,723 Twitter followers
LinkedIn® Page
www.linkedin.com
3,075 employees on LinkedIn®
Ownership
NASDAQ:RPD
Total Revenue (USD mm)
$411

SB
Overview Provided by:

Recent Threat Command by Rapid7 Reviews

Verified User
U
Verified UserMid-Market (51-1000 emp.)
4.5 out of 5
"Threat Command is the software to use for Cybersecurity Solutions"
Everything can be found in just place yet easily identifiable. It is very easy to add a new system and run the scans. It shows deep insights into t...
AG
Arnaud G.Enterprise (> 1000 emp.)
3.5 out of 5
"Was better before"
The platform is fairly easy to use. The newly revamped assets page is much better than before.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Threat Command by Rapid7 Media

Threat Command by Rapid7 Demo - IntSights - Threat Command
Main dashboard of IntSights Threat Command.
Threat Command by Rapid7 Demo - IntSights - Threat Alerts - Analyst View
View of automated threat alerts, tailored to the organization's digital footprint and digital assets.
Threat Command by Rapid7 Demo - IntSights - Threat Investigation - TIP
The module within IntSights Threat Intelligence Platform to conduct in-depth investigations and external threat hunting.
Threat Command by Rapid7 Demo - IntSights - Technology Alliance Partners - TAP Integrations
Current list of IntSights' Technology Alliance Partners (TAPs) with technical integrations to and from IntSights External Threat Protection Suite.
Answer a few questions to help the Threat Command by Rapid7 community
Have you used Threat Command by Rapid7 before?
Yes

2 Threat Command by Rapid7 Reviews

4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Threat Command by Rapid7 Reviews
4.0 out of 5
2 Threat Command by Rapid7 Reviews
4.0 out of 5

Threat Command by Rapid7 Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Verified User in Environmental Services
UE
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Threat Command by Rapid7?

Everything can be found in just place yet easily identifiable. It is very easy to add a new system and run the scans. It shows deep insights into the vulnerabilities found in the network and how to remediate them. Review collected by and hosted on G2.com.

What do you dislike about Threat Command by Rapid7?

Sometimes it also shows an extra vulnerability that might not exactly relate to your application, and you end up researching about it and then after all that time, you come to know that it is not for you. Review collected by and hosted on G2.com.

What problems is Threat Command by Rapid7 solving and how is that benefiting you?

Providing quick and easy security solutions to all the need for securely running an organisation to using application without the fear of security attacks. Review collected by and hosted on G2.com.

AG
Investigator
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Threat Command by Rapid7?

The platform is fairly easy to use. The newly revamped assets page is much better than before. Review collected by and hosted on G2.com.

What do you dislike about Threat Command by Rapid7?

Policies and alert profiler are complicated to set up. Review collected by and hosted on G2.com.

What problems is Threat Command by Rapid7 solving and how is that benefiting you?

Clear, dark and deep web monitoring

Leaked credentials monitoring

Suspicious domains monitoring

Copyright infrigement

Threat Intelligence Review collected by and hosted on G2.com.

There are not enough reviews of Threat Command by Rapid7 for G2 to provide buying insight. Below are some alternatives with more reviews:

1
LastPass Logo
LastPass
4.5
(1,750)
LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).
2
1Password Logo
1Password
4.7
(1,362)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.
3
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,052)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
4
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(530)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
5
Progress WhatsUp Gold Logo
Progress WhatsUp Gold
4.4
(344)
WhatsUp Gold is unified infrastructure and application monitoring software that gives modern IT teams the ability to monitor their increasingly complex IT environment with a single product.
6
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
7
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(296)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
8
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
9
usecure Logo
usecure
4.6
(274)
usecure enables businesses to measure their employee security posture against evolving cyber threats, reduce security incidents caused by human error and demonstrate compliance with core security standards To manage human cyber risk, usecure combines user-tailored security awareness training programs, custom phishing simulations, ongoing dark web monitoring, simplified policy management processes and ongoing human risk scoring.
10
ThreatLocker Logo
ThreatLocker
4.8
(265)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
Show More