As long as the machine is connected to the Internet, and CrowdStrike is running, then it will be on and we will have visibility; no VPNing in or making some type of network connection. CrowdStrike always there and running in the background; for us, that is big. We wanted something that could give us data as long as the machines connected to the Internet and be almost invisible to the employees.
The automated static analysis of malware is the most valuable feature. Its detection abilities are very good. It hits all of the different platforms out there, platforms that see the items in the wild.
ThreatConnect has a highly user-friendly interface.
The most valuable features are ease of use and the ability to customize it.
The most valuable feature is alerting.
The feature that I like best is the dashboard.
The reporting services are great. With reporting services, if you have customers that just visit a URL you can see the result - including why it's blocked and how and how the URL was first recognized as malicious.
As a threat intelligence tool, it's very helpful.
It's great at alerting users to attempts at phishing and suspicious domains.
Advice From The CommunityRead answers to top Threat Intelligence Platforms questions. 476,483 professionals have gotten help from our community of experts.
See more Threat Intelligence Platforms questions »
Ludwing CaviedesVP Innovation and Development at Coinsa SAS
I'm a VP Innovation and Development at a small Tech Services company. Is it possible that a single vulnerability analysis software does not detect the entire spectrum of threats?