Related Products
|
||||||
About
The world's largest open threat intelligence community that enables collaborative defense with actionable, community-powered threat data. Threat sharing in the security industry remains mainly ad-hoc and informal, filled with blind spots, frustration, and pitfalls. Our vision is for companies and government agencies to gather and share relevant, timely, and accurate information about new or ongoing cyberattacks and threats as quickly as possible to avoid major breaches (or minimize the damage from an attack). The Alien Labs Open Threat Exchange (OTX™) delivers the first truly open threat intelligence community that makes this vision a reality. OTX provides open access to a global community of threat researchers and security professionals. It now has more than 100,000 participants in 140 countries, who contribute over 19 million threat indicators daily. It delivers community-generated threat data, enables collaborative research, and automates the update of your security infrastructure.
|
About
Real-time threat intelligence derived from hundreds of millions of sensors worldwide, enriched with AI-based engines and exclusive research data from the Check Point Research Team. Detects 2,000 attacks daily by unknown threats previously undiscovered. Advanced predictive intelligence engines, data from hundreds of millions of sensors, and cutting-edge research from Check Point Research and external intelligence feed. Up-to-minute information on the newest attack vectors and hacking techniques. ThreatCloud is Check Point’s rich cyber defense database. Its threat intelligence powers Check Point zero-day protection solutions. Mitigate threats 24×7 with award-winning technology, expert analysis and global threat intelligence. In addition, the service provides recommendations for tuning the customer’s threat prevention policies to enhance the customer’s protection against threats. Customers have access to a Managed Security Services Web Portal.
|
About
Global Threat Intelligence (GTI) is a comprehensive, real-time, cloud-based reputation service, fully integrated into Trellix products. Protects organizations and their users from both known and emerging cyber threats, regardless of the source of those threats or where they propagate. Arms your security infrastructure with shared threat intelligence, enabling security products to act in concert, based on the same robust, real-time information. Closes the threat window with instantaneous, and often predictive, reputation-based threat intelligence, reducing the probability of attack and cost of remediation and lost downtime. Threat data is collected from billions of Trellix product sensor queries around the globe and correlated to produce our threat intelligence. Trellix products query GTI in the cloud, and GTI renders the latest reputation or categorization intelligence to the products so that they can take action.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Security professionals and companies in search of an open threat intelligence community that enables collaborative defense with actionable, community-powered threat data
|
Audience
Organizations that need a collaborative network and cloud-driven knowledgebase to delivers real-time dynamic threat intelligence
|
Audience
Companies wanting a tool to protect their systems from emerging cyberthreats
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationAT&T Cybersecurity
Founded: 1983
United States
cybersecurity.att.com/open-threat-exchange
|
Company InformationCheck Point Software Technologies
Founded: 1993
United States
www.checkpoint.com/solutions/threat-intelligence-research/
|
Company InformationTrellix
Founded: 2022
United States
www.trellix.com/products/global-threat-intelligence/
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|||||
|
|
|
|
||||
|
|
|
|
||||
|
|
||||||
Categories |
Categories |
Categories |
||||
Integrations
Brinqa
Carbon Black EDR
Check Point Harmony SASE
Cisco ACI
Cisco Umbrella
Cisco Vulnerability Management
Cloudflare
Frontline.Cloud
Google Cloud Platform
Imperva Advanced Bot Protection
|
Integrations
Brinqa
Carbon Black EDR
Check Point Harmony SASE
Cisco ACI
Cisco Umbrella
Cisco Vulnerability Management
Cloudflare
Frontline.Cloud
Google Cloud Platform
Imperva Advanced Bot Protection
|
Integrations
Brinqa
Carbon Black EDR
Check Point Harmony SASE
Cisco ACI
Cisco Umbrella
Cisco Vulnerability Management
Cloudflare
Frontline.Cloud
Google Cloud Platform
Imperva Advanced Bot Protection
|
||||
|
|
|
|