1. leader badge
    As long as the machine is connected to the Internet, and CrowdStrike is running, then it will be on and we will have visibility; no VPNing in or making some type of network connection. CrowdStrike always there and running in the background; for us, that is big. We wanted something that could give us data as long as the machines connected to the Internet and be almost invisible to the employees.
  2. The automated static analysis of malware is the most valuable feature. Its detection abilities are very good. It hits all of the different platforms out there, platforms that see the items in the wild.
  3. Find out what your peers are saying about CrowdStrike, ReversingLabs, ThreatConnect and others in Threat Intelligence Platforms. Updated: April 2021.
    476,483 professionals have used our research since 2012.
  4. ThreatConnect has a highly user-friendly interface. The most valuable features are ease of use and the ability to customize it.
  5. The most valuable feature is alerting.The feature that I like best is the dashboard.
  6. The reporting services are great. With reporting services, if you have customers that just visit a URL you can see the result - including why it's blocked and how and how the URL was first recognized as malicious.
  7. As a threat intelligence tool, it's very helpful.
  8. report
    Use our free recommendation engine to learn which Threat Intelligence Platforms solutions are best for your needs.
    476,483 professionals have used our research since 2012.
  9. It's great at alerting users to attempts at phishing and suspicious domains.

Advice From The Community

Read answers to top Threat Intelligence Platforms questions. 476,483 professionals have gotten help from our community of experts.
Ludwing Caviedes
I'm a VP Innovation and Development at a small Tech Services company. Is it possible that a single vulnerability analysis software does not detect the entire spectrum of threats?
author avatarVladimir Jirasek
Real User

Short answer: No. Long one: start with vulnerability assessment for your key systems. These are: a) anything accessible to the Internet, b) your end-user devices (PC, laptops, mobile). To cover these two (and more), I can recommend Qualys which we have been using, designing and managing for 20 years now. Additionally, to really get your external perimeter clean (that includes DNS and email), I strongly recommend Hardenize. 

Happy to discuss in more detail as needed. 

author avatarRam Balaji
Real User

No. I think products work on vulnerability analysis have 2 streams, web application and endpoints/appliances. They don't concentrate on both at the same level. For application you can look into fortify and for endpoints/appliances you can try qualys, tenable and rapid7.

author avatarMilton Rodriguez

It depends on the capabilities and reliability of the vulnerability analysis tool. In case of the tool has a high reliability and a low percentage of false positives and false negatives, it may be appropriate to have a single tool.

author avatarGeorge Fyffe

You wont find a single tool that will report on all the vulnerabilities that can crop up in your infrastructure. Such a tool would need to cover too many areas (On-Prem or Cloud, Network, Database(s)....). A better approach is to start by assessing what you absolutely must protect to protect your business. Work out what is critical and how it can be compromised. Then select tools to help you mitigate the risks. I would also recommend using tools that give you a Risk Assessment in an easily understood format. Some tools give pages and pages of data and leave you to figure out what it all means. If your are Public Cloud based, I would suggest you use a specialist tool such as SecureCloudDB to keep track of assets as they can spin up and down very quickly in the Cloud... so they can be part of your infrastructure without your knowledge. Equally, if you're not careful, they can come and go before you have had a chance to spot them.

author avatarKimeangSuon

If such as vulnerability analysis on software or application as static code analysis or purpose of SDLC review, I think currently Checkmarx , Micro Focus or Veracode should consider to this. if this is your requirement.

author avatarStuart Berman
Real User

What kind of 'vulnerability analysis' tool are you referring to? Static code analysis for code? If so there are a couple tools that cover most languages pretty well, Checkmark and Veracode. Or are you looking for vulnerability management tools like Qualys, Tenable or Rapid7?

See more Threat Intelligence Platforms questions »
Find out what your peers are saying about CrowdStrike, ReversingLabs, ThreatConnect and others in Threat Intelligence Platforms. Updated: April 2021.
476,483 professionals have used our research since 2012.