Best Threat Intelligence Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies utilize the tools to keep their security standards up to date and fit to combat new threats as they emerge. These tools can improve security performance by providing information on threats to their specific networks, infrastructure, and endpoint devices. These products provide information about hazards and how they function, their capabilities, and remediation techniques. IT administrators and security professionals use the data delivered to better protect their systems from emerging threats and plan for possible vulnerabilities. The tools alert users as new threats emerge and provide information detailing best practices for resolution.

Many products like security information and event management (SIEM) and vulnerability management software can integrate with or provide similar information as threat intelligence products. Those products, though, tend to provide live updates and actionable intelligence, and focus on other components of a security ecosystem.

To qualify for inclusion in the Threat Intelligence category, a product must:

Provide information on emerging threats and vulnerabilities
Detail remediation practices for common and emerging threats
Analyze global threats on different types of networks and devices
Cater threat information to specific IT solutions

Best Threat Intelligence Software At A Glance

Highest Performer:
Best Contender:
Most Niche:
Most Trending:
Show LessShow More
Best Contender:
Most Niche:
Most Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
243 Listings in Threat Intelligence Available
(127)4.6 out of 5
5th Easiest To Use in Threat Intelligence software
View top Consulting Services for Recorded Future
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

    Users
    • Threat Intelligence Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 17% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Recorded Future is a threat intelligence platform that provides indicators of compromise for proactive threat hunting and cybersecurity improvement.
    • Users like the platform's user-friendly interface, real-time data, actionable insights, and its ability to identify and mitigate potential threats proactively, saving significant time for threat hunting and vulnerability management.
    • Users reported that the platform can be intimidating for new users due to an overload of information, the cost is high with expensive APIs and modules, and the alert system generates a lot of false positives.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Recorded Future Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    61
    Features
    61
    Threat Intelligence
    44
    Threat Detection
    39
    Insights
    36
    Cons
    Expensive
    25
    Complexity
    22
    Learning Curve
    17
    Pricing Issues
    16
    Difficult Learning
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Recorded Future features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.7
    Intelligence Reports
    Average: 8.9
    7.8
    Endpoint Intelligence
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Somerville, US
    Twitter
    @RecordedFuture
    109,622 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,071 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

Users
  • Threat Intelligence Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 17% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Recorded Future is a threat intelligence platform that provides indicators of compromise for proactive threat hunting and cybersecurity improvement.
  • Users like the platform's user-friendly interface, real-time data, actionable insights, and its ability to identify and mitigate potential threats proactively, saving significant time for threat hunting and vulnerability management.
  • Users reported that the platform can be intimidating for new users due to an overload of information, the cost is high with expensive APIs and modules, and the alert system generates a lot of false positives.
Recorded Future Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
61
Features
61
Threat Intelligence
44
Threat Detection
39
Insights
36
Cons
Expensive
25
Complexity
22
Learning Curve
17
Pricing Issues
16
Difficult Learning
15
Recorded Future features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.7
Intelligence Reports
Average: 8.9
7.8
Endpoint Intelligence
Average: 8.5
8.5
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2009
HQ Location
Somerville, US
Twitter
@RecordedFuture
109,622 Twitter followers
LinkedIn® Page
www.linkedin.com
1,071 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

    Users
    • Saas Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    179
    Comprehensive Security
    119
    Cloud Security
    107
    Ease of Use
    85
    Cloud Services
    72
    Cons
    Complexity
    41
    Expensive
    38
    Improvement Needed
    28
    Missing Features
    27
    Delayed Detection
    26
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,060,258 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

Users
  • Saas Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Microsoft Defender for Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
179
Comprehensive Security
119
Cloud Security
107
Ease of Use
85
Cloud Services
72
Cons
Complexity
41
Expensive
38
Improvement Needed
28
Missing Features
27
Delayed Detection
26
Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.7
Ease of Use
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,060,258 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(118)4.6 out of 5
1st Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patente

    Users
    • Security Threat Analyst
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 69% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberint, a Check Point Company Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    56
    Threat Intelligence
    52
    Threat Detection
    39
    Insights
    37
    Customer Support
    36
    Cons
    Inefficient Alerts
    18
    Inefficient Alert System
    13
    False Positives
    11
    Integration Issues
    11
    Missing Features
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    8.9
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.5
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberInt
    Year Founded
    2009
    HQ Location
    Petah Tikva, Israel
    Twitter
    @cyber_int
    1,853 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    170 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patente

Users
  • Security Threat Analyst
Industries
  • Banking
  • Financial Services
Market Segment
  • 69% Enterprise
  • 20% Mid-Market
Cyberint, a Check Point Company Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
56
Threat Intelligence
52
Threat Detection
39
Insights
37
Customer Support
36
Cons
Inefficient Alerts
18
Inefficient Alert System
13
False Positives
11
Integration Issues
11
Missing Features
11
Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
8.9
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.5
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
CyberInt
Year Founded
2009
HQ Location
Petah Tikva, Israel
Twitter
@cyber_int
1,853 Twitter followers
LinkedIn® Page
www.linkedin.com
170 employees on LinkedIn®
(290)4.7 out of 5
6th Easiest To Use in Threat Intelligence software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 54% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    51
    Ease of Use
    43
    Security
    43
    Threat Detection
    37
    Detection
    36
    Cons
    Missing Features
    13
    Expensive
    12
    Complexity
    10
    Limited Features
    10
    Difficult Navigation
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.3
    Security Validation
    Average: 8.9
    9.3
    Intelligence Reports
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 8.5
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,733 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,641 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 54% Enterprise
  • 38% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
51
Ease of Use
43
Security
43
Threat Detection
37
Detection
36
Cons
Missing Features
13
Expensive
12
Complexity
10
Limited Features
10
Difficult Navigation
9
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.3
Security Validation
Average: 8.9
9.3
Intelligence Reports
Average: 8.9
9.4
Endpoint Intelligence
Average: 8.5
9.1
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,733 Twitter followers
LinkedIn® Page
www.linkedin.com
9,641 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(297)4.4 out of 5
Optimized for quick response
11th Easiest To Use in Threat Intelligence software
View top Consulting Services for Mimecast Advanced Email Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Legal Services
    • Information Technology and Services
    Market Segment
    • 68% Mid-Market
    • 16% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mimecast Advanced Email Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    76
    Ease of Use
    64
    Security
    50
    Features
    45
    Spam Blocking
    37
    Cons
    Complexity
    23
    Poor User Interface
    23
    Configuration Difficulties
    20
    Email Issues
    16
    False Positives
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    7.1
    Endpoint Intelligence
    Average: 8.5
    8.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mimecast
    Company Website
    Year Founded
    2003
    HQ Location
    London
    Twitter
    @Mimecast
    18,415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,607 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advan

Users
  • IT Manager
  • Systems Administrator
Industries
  • Legal Services
  • Information Technology and Services
Market Segment
  • 68% Mid-Market
  • 16% Enterprise
Mimecast Advanced Email Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
76
Ease of Use
64
Security
50
Features
45
Spam Blocking
37
Cons
Complexity
23
Poor User Interface
23
Configuration Difficulties
20
Email Issues
16
False Positives
16
Mimecast Advanced Email Security features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
7.1
Endpoint Intelligence
Average: 8.5
8.0
Ease of Use
Average: 8.8
Seller Details
Seller
Mimecast
Company Website
Year Founded
2003
HQ Location
London
Twitter
@Mimecast
18,415 Twitter followers
LinkedIn® Page
www.linkedin.com
2,607 employees on LinkedIn®
(276)4.8 out of 5
3rd Easiest To Use in Threat Intelligence software
View top Consulting Services for ThreatLocker
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

    Users
    • CEO
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 61% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatLocker Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    95
    Threat Detection
    83
    Ease of Use
    82
    Security
    74
    Features
    70
    Cons
    Learning Curve
    43
    Difficult Learning Curve
    27
    Difficult Configuration
    17
    Complexity
    16
    Difficult Navigation
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker features and usability ratings that predict user satisfaction
    9.1
    Security Validation
    Average: 8.9
    9.5
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.5
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    528 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

Users
  • CEO
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 61% Small-Business
  • 32% Mid-Market
ThreatLocker Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
95
Threat Detection
83
Ease of Use
82
Security
74
Features
70
Cons
Learning Curve
43
Difficult Learning Curve
27
Difficult Configuration
17
Complexity
16
Difficult Navigation
14
ThreatLocker features and usability ratings that predict user satisfaction
9.1
Security Validation
Average: 8.9
9.5
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.5
8.4
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,121 Twitter followers
LinkedIn® Page
www.linkedin.com
528 employees on LinkedIn®
(48)4.8 out of 5
2nd Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

    Users
    • Security Analyst
    Industries
    • Financial Services
    • Airlines/Aviation
    Market Segment
    • 42% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudSEK Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    24
    Features
    23
    Customer Support
    20
    Monitoring
    16
    Implementation Ease
    15
    Cons
    False Positives
    8
    Dashboard Issues
    3
    Integration Issues
    3
    Poor User Interface
    3
    Poor Detection Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK features and usability ratings that predict user satisfaction
    9.7
    Security Validation
    Average: 8.9
    9.6
    Intelligence Reports
    Average: 8.9
    9.5
    Endpoint Intelligence
    Average: 8.5
    9.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,200 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    212 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

Users
  • Security Analyst
Industries
  • Financial Services
  • Airlines/Aviation
Market Segment
  • 42% Enterprise
  • 31% Mid-Market
CloudSEK Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
24
Features
23
Customer Support
20
Monitoring
16
Implementation Ease
15
Cons
False Positives
8
Dashboard Issues
3
Integration Issues
3
Poor User Interface
3
Poor Detection Performance
2
CloudSEK features and usability ratings that predict user satisfaction
9.7
Security Validation
Average: 8.9
9.6
Intelligence Reports
Average: 8.9
9.5
Endpoint Intelligence
Average: 8.5
9.5
Ease of Use
Average: 8.8
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,200 Twitter followers
LinkedIn® Page
www.linkedin.com
212 employees on LinkedIn®
(176)4.7 out of 5
9th Easiest To Use in Threat Intelligence software
View top Consulting Services for FortiGate NGFW
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

    Users
    • Network Engineer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGate NGFW Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Features
    10
    Security
    10
    Customer Support
    7
    User Interface
    6
    Cons
    Update Issues
    5
    Slow Performance
    4
    Upgrade Issues
    4
    Pricing Issues
    3
    Security Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate NGFW features and usability ratings that predict user satisfaction
    9.1
    Security Validation
    Average: 8.9
    9.1
    Intelligence Reports
    Average: 8.9
    8.8
    Endpoint Intelligence
    Average: 8.5
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,964 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Users
  • Network Engineer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Mid-Market
  • 20% Enterprise
FortiGate NGFW Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Features
10
Security
10
Customer Support
7
User Interface
6
Cons
Update Issues
5
Slow Performance
4
Upgrade Issues
4
Pricing Issues
3
Security Issues
3
FortiGate NGFW features and usability ratings that predict user satisfaction
9.1
Security Validation
Average: 8.9
9.1
Intelligence Reports
Average: 8.9
8.8
Endpoint Intelligence
Average: 8.5
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,964 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Enterprise
    • 44% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Falcon Security and IT operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Easy Integrations
    7
    Security Protection
    7
    Customer Support
    5
    Easy Setup
    5
    Cons
    Expensive
    3
    Bugs
    2
    Poor Documentation
    2
    Slow Loading
    2
    Slow Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falcon Security and IT operations features and usability ratings that predict user satisfaction
    8.6
    Security Validation
    Average: 8.9
    9.4
    Intelligence Reports
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,733 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,641 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Enterprise
  • 44% Mid-Market
Falcon Security and IT operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Easy Integrations
7
Security Protection
7
Customer Support
5
Easy Setup
5
Cons
Expensive
3
Bugs
2
Poor Documentation
2
Slow Loading
2
Slow Performance
2
Falcon Security and IT operations features and usability ratings that predict user satisfaction
8.6
Security Validation
Average: 8.9
9.4
Intelligence Reports
Average: 8.9
9.2
Endpoint Intelligence
Average: 8.5
9.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,733 Twitter followers
LinkedIn® Page
www.linkedin.com
9,641 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(29)4.7 out of 5
Optimized for quick response
7th Easiest To Use in Threat Intelligence software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 83% Enterprise
    • 14% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyble Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    12
    Insights
    10
    Threat Detection
    10
    Dark Web Monitoring
    9
    Threat Intelligence
    9
    Cons
    Inefficient Alerts
    7
    False Positives
    5
    Inefficient Alert System
    4
    Limited Customization
    4
    Data Inaccuracy
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    8.8
    Security Validation
    Average: 8.9
    9.2
    Intelligence Reports
    Average: 8.9
    8.8
    Endpoint Intelligence
    Average: 8.5
    9.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    19,783 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    233 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 83% Enterprise
  • 14% Mid-Market
Cyble Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
12
Insights
10
Threat Detection
10
Dark Web Monitoring
9
Threat Intelligence
9
Cons
Inefficient Alerts
7
False Positives
5
Inefficient Alert System
4
Limited Customization
4
Data Inaccuracy
3
Cyble features and usability ratings that predict user satisfaction
8.8
Security Validation
Average: 8.9
9.2
Intelligence Reports
Average: 8.9
8.8
Endpoint Intelligence
Average: 8.5
9.7
Ease of Use
Average: 8.8
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
19,783 Twitter followers
LinkedIn® Page
www.linkedin.com
233 employees on LinkedIn®
(34)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 47% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ZeroFox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    18
    Ease of Use
    15
    Service Quality
    10
    Alerts
    9
    Monitoring
    9
    Cons
    Inefficiency
    6
    Inefficient Alerts
    6
    False Alarms
    5
    False Positives
    5
    Information Overload
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZeroFox features and usability ratings that predict user satisfaction
    8.6
    Security Validation
    Average: 8.9
    8.5
    Intelligence Reports
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZeroFox
    Company Website
    Year Founded
    2013
    HQ Location
    Baltimore, MD
    Twitter
    @ZeroFOX
    5,286 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    790 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented

Users
No information available
Industries
  • Financial Services
Market Segment
  • 47% Mid-Market
  • 35% Enterprise
ZeroFox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
18
Ease of Use
15
Service Quality
10
Alerts
9
Monitoring
9
Cons
Inefficiency
6
Inefficient Alerts
6
False Alarms
5
False Positives
5
Information Overload
4
ZeroFox features and usability ratings that predict user satisfaction
8.6
Security Validation
Average: 8.9
8.5
Intelligence Reports
Average: 8.9
7.5
Endpoint Intelligence
Average: 8.5
9.0
Ease of Use
Average: 8.8
Seller Details
Seller
ZeroFox
Company Website
Year Founded
2013
HQ Location
Baltimore, MD
Twitter
@ZeroFOX
5,286 Twitter followers
LinkedIn® Page
www.linkedin.com
790 employees on LinkedIn®
(532)4.5 out of 5
Optimized for quick response
15th Easiest To Use in Threat Intelligence software
View top Consulting Services for Cloudflare Application Security and Performance
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare is the cloud for the “everywhere world”. At Cloudflare, we have our eyes set on an ambitious goal -- to help build a better Internet. Today, everything needs to be connected to everything

    Users
    • Web Developer
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 64% Small-Business
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare Application Security and Performance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    63
    Security
    62
    Speed
    45
    Speed Performance
    40
    Performance Speed
    39
    Cons
    Technical Issues
    20
    Expensive
    15
    Complex User Interface
    14
    Performance Issues
    14
    Pricing Issues
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare Application Security and Performance features and usability ratings that predict user satisfaction
    10.0
    Security Validation
    Average: 8.9
    8.3
    Intelligence Reports
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    217,029 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,964 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare is the cloud for the “everywhere world”. At Cloudflare, we have our eyes set on an ambitious goal -- to help build a better Internet. Today, everything needs to be connected to everything

Users
  • Web Developer
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 64% Small-Business
  • 26% Mid-Market
Cloudflare Application Security and Performance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
63
Security
62
Speed
45
Speed Performance
40
Performance Speed
39
Cons
Technical Issues
20
Expensive
15
Complex User Interface
14
Performance Issues
14
Pricing Issues
14
Cloudflare Application Security and Performance features and usability ratings that predict user satisfaction
10.0
Security Validation
Average: 8.9
8.3
Intelligence Reports
Average: 8.9
8.3
Endpoint Intelligence
Average: 8.5
9.0
Ease of Use
Average: 8.8
Seller Details
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
217,029 Twitter followers
LinkedIn® Page
www.linkedin.com
4,964 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM X-Force Exchange features and usability ratings that predict user satisfaction
    8.3
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 8.9
    8.1
    Endpoint Intelligence
    Average: 8.5
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,653 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 29% Mid-Market
IBM X-Force Exchange features and usability ratings that predict user satisfaction
8.3
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 8.9
8.1
Endpoint Intelligence
Average: 8.5
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,653 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
Ownership
SWX:IBM
(12)4.3 out of 5
View top Consulting Services for Microsoft Security Copilot
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Enterprise
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Security Copilot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Security
    5
    Security Protection
    5
    Threat Detection
    5
    Automation
    4
    Cons
    Complexity
    3
    Expensive
    3
    Difficult Learning Curve
    2
    False Positives
    2
    Access Control
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Security Copilot features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.9
    8.8
    Intelligence Reports
    Average: 8.9
    8.5
    Endpoint Intelligence
    Average: 8.5
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,060,258 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Enterprise
  • 17% Mid-Market
Microsoft Security Copilot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Security
5
Security Protection
5
Threat Detection
5
Automation
4
Cons
Complexity
3
Expensive
3
Difficult Learning Curve
2
False Positives
2
Access Control
1
Microsoft Security Copilot features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.9
8.8
Intelligence Reports
Average: 8.9
8.5
Endpoint Intelligence
Average: 8.5
8.9
Ease of Use
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,060,258 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Censys, founded in 2017 in Ann Arbor, Michigan, provides organizations with the world's most comprehensive real-time view of global networks and devices. Established by the creators of ZMap and truste

    Users
    No information available
    Industries
    • Computer & Network Security
    • Pharmaceuticals
    Market Segment
    • 50% Small-Business
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Censys Search Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Accuracy of Information
    9
    Detailed Analysis
    5
    Features
    4
    Customer Support
    3
    Cons
    Complexity
    4
    Search Functionality Issues
    4
    Incomplete Information
    3
    Limited Functionality
    2
    Poor User Interface
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Censys Search features and usability ratings that predict user satisfaction
    7.6
    Security Validation
    Average: 8.9
    7.0
    Intelligence Reports
    Average: 8.9
    8.0
    Endpoint Intelligence
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Censys
    Year Founded
    2017
    HQ Location
    Ann Arbor, MI
    Twitter
    @censysio
    9,809 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    168 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Censys, founded in 2017 in Ann Arbor, Michigan, provides organizations with the world's most comprehensive real-time view of global networks and devices. Established by the creators of ZMap and truste

Users
No information available
Industries
  • Computer & Network Security
  • Pharmaceuticals
Market Segment
  • 50% Small-Business
  • 34% Enterprise
Censys Search Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Accuracy of Information
9
Detailed Analysis
5
Features
4
Customer Support
3
Cons
Complexity
4
Search Functionality Issues
4
Incomplete Information
3
Limited Functionality
2
Poor User Interface
2
Censys Search features and usability ratings that predict user satisfaction
7.6
Security Validation
Average: 8.9
7.0
Intelligence Reports
Average: 8.9
8.0
Endpoint Intelligence
Average: 8.5
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Censys
Year Founded
2017
HQ Location
Ann Arbor, MI
Twitter
@censysio
9,809 Twitter followers
LinkedIn® Page
www.linkedin.com
168 employees on LinkedIn®