Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Safetica Reviews & Ratings
    358 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    159 Ratings
    Company Website
  • Resolver Reviews & Ratings
    254 Ratings
    Company Website
  • ConnectWise SIEM Reviews & Ratings
    186 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    468 Ratings
    Company Website
  • A10 Defend Threat Control Reviews & Ratings
    32 Ratings
    Company Website
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • Criminal IP Reviews & Ratings
    11 Ratings
    Company Website
  • PathSolutions TotalView Reviews & Ratings
    42 Ratings
    Company Website
  • c/side Reviews & Ratings
    3 Ratings
    Company Website

What is Proofpoint Emerging Threat (ET) Intelligence?

Proofpoint's ET Intelligence stands out as the quickest and most accurate threat intelligence solution available today. Our rigorously validated intelligence not only offers deeper insights but also integrates seamlessly with your existing security frameworks, thus enhancing your decision-making capabilities. Merely recognizing the existing types of threats is not enough to protect your workforce, sensitive data, and corporate image. By leveraging Emerging Threat (ET) intelligence, you can take proactive measures to thwart attacks and reduce vulnerabilities through a thorough comprehension of the historical context of these threats, including their sources, the individuals behind them, the timing of previous incidents, the tactics employed, and their targeted goals. You can instantly access both real-time and historical metadata concerning IP addresses, domains, and other significant threat intelligence, facilitating in-depth threat investigations and incident analysis. Our service goes beyond simple reputation intelligence, offering substantiating evidence, rich context, historical insights, and detection strategies. This extensive data is easily navigable through a user-friendly threat intelligence portal, which displays trends and timestamps of when specific threats were detected, along with their respective categories. With this abundant information available, you can significantly bolster your defenses against potential threats and refine your overall security strategy, ensuring that you are always a step ahead of emerging risks. This proactive approach empowers organizations to remain vigilant in an ever-evolving threat landscape.

What is Google Security Operations (SecOps)?

Google Security Operations is a cutting-edge platform that offers a fully integrated solution for security monitoring, investigation, and response. By combining SIEM and SOAR capabilities, it enables security teams to collect and analyze security telemetry, detect anomalies, and automate incident response with ease. The platform utilizes Google’s AI and advanced threat intelligence to continuously identify and prioritize emerging threats, helping businesses stay protected. With features like custom detection creation, real-time context for investigations, and automated workflows, Google SecOps streamlines the security operations process and improves response times. It also enables teams to track effectiveness and communicate progress through detailed reporting and performance metrics.

Media

Media

Integrations Supported

Chronicle SOAR
Corelight
CrowdStrike Falcon
DataBahn
Google Cloud Platform
Google Digital Risk Protection
Mindflow
NXLog
Okta
Palo Alto Networks NGFW
Tenzir
ThreatBlockr
ThreatConnect Risk Quantifier (RQ)
ThreatMapper
ThreatStryker

Integrations Supported

Chronicle SOAR
Corelight
CrowdStrike Falcon
DataBahn
Google Cloud Platform
Google Digital Risk Protection
Mindflow
NXLog
Okta
Palo Alto Networks NGFW
Tenzir
ThreatBlockr
ThreatConnect Risk Quantifier (RQ)
ThreatMapper
ThreatStryker

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Proofpoint

Date Founded

2002

Company Location

United States

Company Website

www.proofpoint.com/us/products/advanced-threat-protection/et-intelligence

Company Facts

Organization Name

Google

Date Founded

1998

Company Location

United States

Company Website

chronicle.security/suite/

Categories and Features

Categories and Features

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

Splunk SOAR Reviews & Ratings

Splunk SOAR

Splunk
Palo Alto Networks AutoFocus Reviews & Ratings

Palo Alto Networks AutoFocus

Palo Alto Networks
Cortex XSIAM Reviews & Ratings

Cortex XSIAM

Palo Alto Networks