ThreatCloud

ThreatCloud

Check Point Software Technologies
+
+

Related Products

  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • A10 Defend Threat Control
    41 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website

About

Real-time threat intelligence derived from hundreds of millions of sensors worldwide, enriched with AI-based engines and exclusive research data from the Check Point Research Team. Detects 2,000 attacks daily by unknown threats previously undiscovered. Advanced predictive intelligence engines, data from hundreds of millions of sensors, and cutting-edge research from Check Point Research and external intelligence feed. Up-to-minute information on the newest attack vectors and hacking techniques. ThreatCloud is Check Point’s rich cyber defense database. Its threat intelligence powers Check Point zero-day protection solutions. Mitigate threats 24×7 with award-winning technology, expert analysis and global threat intelligence. In addition, the service provides recommendations for tuning the customer’s threat prevention policies to enhance the customer’s protection against threats. Customers have access to a Managed Security Services Web Portal.

About

Transform security infrastructure into a collaborative system. Operationalize threat intelligence data in real time, delivering protection to all points in your enterprise as new threats emerge. Leverage Data Exchange Layer (DXL) to instantly share threat data to all connected security systems, including third-party solutions. Detect unknown files for faster time to protection and lower costs. Broader threat intelligence helps make accurate file execution decisions and customize policies based on risk tolerance. Enable better decision-making to handle never-before-seen and potentially malicious files. Combine and share threat information from Trellix Global Threat Intelligence, third parties, and locally collected data from your security solutions. DXL, an open communications framework, connects disparate security solutions. Share real-time security intelligence among endpoint, gateway, network, and data center security solutions.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations that need a collaborative network and cloud-driven knowledgebase to delivers real-time dynamic threat intelligence

Audience

Enterprises in need of shared threat intelligence across security solutions to enable adaptive threat detection and response

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Check Point Software Technologies
Founded: 1993
United States
www.checkpoint.com/solutions/threat-intelligence-research/

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/products/threat-intelligence-exchange/

Alternatives

SandBlast Network

SandBlast Network

Check Point Software Technologies

Alternatives

SandBlast Threat Emulation

SandBlast Threat Emulation

Check Point Software Technologies
ZeroHack TRACE

ZeroHack TRACE

WhizHack
SecIntel

SecIntel

Juniper Networks
Palo Alto Networks AutoFocus

Palo Alto Networks AutoFocus

Palo Alto Networks

Categories

Categories

Integrations

Check Point Harmony SASE
ThreatConnect Risk Quantifier (RQ)
Trellix XDR

Integrations

Check Point Harmony SASE
ThreatConnect Risk Quantifier (RQ)
Trellix XDR
Claim ThreatCloud and update features and information
Claim ThreatCloud and update features and information
Claim Trellix Threat Intelligence Exchange and update features and information
Claim Trellix Threat Intelligence Exchange and update features and information