Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ManageEngine EventLog Analyzer Reviews & Ratings
    210 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    168 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    104 Ratings
    Company Website
  • Criminal IP Reviews & Ratings
    17 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    684 Ratings
    Company Website
  • Safetica Reviews & Ratings
    414 Ratings
    Company Website
  • Criminal IP ASM Reviews & Ratings
    18 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,936 Ratings
    Company Website
  • Guardz Reviews & Ratings
    118 Ratings
    Company Website
  • Omnilert Reviews & Ratings
    26 Ratings
    Company Website

What is ThreatBook?

ThreatBook CTI provides accurate intelligence derived from alerts linked to real customer incidents. This intelligence serves as a crucial metric for our research and development team to evaluate the effectiveness of our processes in intelligence extraction and quality assurance. We also regularly assess this information against relevant alerts from recent cybersecurity incidents. By compiling data and insights, ThreatBook CTI delivers clear conclusions, behavioral analyses, and profiles of attackers. Consequently, the Security Operations Center (SOC) team can reduce the time spent on trivial or harmless tasks, leading to improved operational efficiency. The primary goal of threat intelligence is to enhance detection and response capabilities, enabling organizations to identify potential compromises using high-quality intelligence, determine whether a device is under threat or if a server has been breached, and undertake investigative actions to counter threats, isolate problems, or mitigate risks swiftly, thereby lowering the likelihood of severe consequences. Additionally, this forward-thinking approach not only protects organizational assets but also cultivates a resilient culture within the organization, ultimately preparing it better for future challenges.

What is Proofpoint Emerging Threat (ET) Intelligence?

Proofpoint's ET Intelligence stands out as the quickest and most accurate threat intelligence solution available today. Our rigorously validated intelligence not only offers deeper insights but also integrates seamlessly with your existing security frameworks, thus enhancing your decision-making capabilities. Merely recognizing the existing types of threats is not enough to protect your workforce, sensitive data, and corporate image. By leveraging Emerging Threat (ET) intelligence, you can take proactive measures to thwart attacks and reduce vulnerabilities through a thorough comprehension of the historical context of these threats, including their sources, the individuals behind them, the timing of previous incidents, the tactics employed, and their targeted goals. You can instantly access both real-time and historical metadata concerning IP addresses, domains, and other significant threat intelligence, facilitating in-depth threat investigations and incident analysis. Our service goes beyond simple reputation intelligence, offering substantiating evidence, rich context, historical insights, and detection strategies. This extensive data is easily navigable through a user-friendly threat intelligence portal, which displays trends and timestamps of when specific threats were detected, along with their respective categories. With this abundant information available, you can significantly bolster your defenses against potential threats and refine your overall security strategy, ensuring that you are always a step ahead of emerging risks. This proactive approach empowers organizations to remain vigilant in an ever-evolving threat landscape.

Media

Media

Integrations Supported

Corelight
CrowdStrike Falcon
Okta
Palo Alto Networks Next-Generation Firewalls
Right-Hand Cybersecurity
ThreatBlockr
ThreatConnect Risk Quantifier (RQ)

Integrations Supported

Corelight
CrowdStrike Falcon
Okta
Palo Alto Networks Next-Generation Firewalls
Right-Hand Cybersecurity
ThreatBlockr
ThreatConnect Risk Quantifier (RQ)

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

ThreatBook

Date Founded

2015

Company Location

China

Company Website

threatbook.io

Company Facts

Organization Name

Proofpoint

Date Founded

2002

Company Location

United States

Company Website

www.proofpoint.com/us/products/advanced-threat-protection/et-intelligence

Categories and Features

Categories and Features

Popular Alternatives

Popular Alternatives

Palo Alto Networks AutoFocus Reviews & Ratings

Palo Alto Networks AutoFocus

Palo Alto Networks
Cavalier Reviews & Ratings

Cavalier

Hudson Rock