Best Software for 2025 is now live!
Product Avatar Image

CyberInt

Mostrar detalhamento de classificação
118 avaliações
  • Perfis 1
  • Categorias 5
Classificação média por estrelas
4.6
#1 em categorias 1
Líder do Grid®
Atendendo clientes desde
2009

Profile Name

Star Rating

95
22
1
0
0

CyberInt Reviews

Review Filters
Profile Name
Star Rating
95
22
1
0
0
MG
Marlon G.
12/27/2024
Avaliador validado
Usuário atual verificado
Fonte da Revisão: Orgânico

Very good support, fast and effective when requested.

The division of alerts with each respective type and the information it gives us, this helps us to make a correct, clear and effective mitigation.
Jesus G.
JG
Jesus G.
Ejecutivo procesos de Ciberseguridad y control de accesos
12/27/2024
Avaliador validado
Usuário atual verificado
Fonte da Revisão: Orgânico

Excellent threat Intelligence tool, Very Friendly

The platform is very intuitive and easy to use. I really like that the graphical interface is constantly updated for a better user experience. It has everything you need to have a complete overview of an alert.
Veeresh R.
VR
Veeresh R.
Cyber Security Manager at FICO
12/17/2024
Avaliador validado
Usuário atual verificado
Fonte da Revisão: Orgânico

About

Contact

HQ Location:
Petah Tikva, Israel

Social

@cyber_int

What is CyberInt?

Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patented technology provides superior visibility through continuous discovery of the evolving attack surface, combined with the automated collection and analysis of vast quantities of intelligence from across the open, deep and dark web. A team of global military-grade cybersecurity experts work alongside customers to rapidly detect, investigate, and disrupt relevant threats – before they have the chance to develop into major incidents. Global customers, including Fortune 500 leaders across all major market verticals, rely on Cyberint to protect themselves from an array of external risks, including vulnerabilities, misconfigurations, phishing, impersonation attacks, malware infections, exposed credentials, data leaks, fraud, and 3rd party risks.

Details

Ano de Fundação
2009