17 years helping Australian businesses choose better software
Threat Intelligence Platforms
Threat intelligence software allows organizations to keep their security standards up-to-date with a near real-time view of the threat landscape by identifying and combatting new forms of malware as they emerge.
Read more
Read less
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Australia, Brazil, British Virgin Islands, Canada, China, Denmark, Finland, Germany, India, Ireland
, Japan, Mexico, Netherlands, New Zealand, Norway, South Africa, Sweden, United Kingdom, United States
and 9 others
ThreatKey integrates with companies that use AWS, Azure, or GCP for their cloud presence, and/or Zoom, Slack, Teams, Office 365, or Google Workspace...
Albania, American Samoa, Andorra, Anguilla, Antigua & Barbuda, Argentina, Aruba, Australia, Austria, Bahamas
, Bahrain, Barbados, Belarus, Belgium, Belize, Bermuda, Bolivia, Bosnia & Herzegovina, Brazil, British Virgin Islands, Bulgaria, Canada, Cayman Islands, Chile, China, Colombia, Cook Islands, Costa Rica, Croatia, Cuba, Curaçao, Cyprus, Czechia, Denmark, Dominica, Dominican Republic, Ecuador, El Salvador, Estonia, Falkland Islands, Faroe Islands, Fiji, Finland, France, French Guiana, French Polynesia, Germany, Gibraltar, Greece, Greenland, Grenada, Guadeloupe, Guam, Guatemala, Guernsey, Guyana, Haiti, Honduras, Hong Kong SAR China, Hungary, Iceland, India, Indonesia, Ireland, Isle of Man, Italy, Jamaica, Japan, Jersey, Kiribati, Latvia, Liechtenstein, Lithuania, Luxembourg, Malaysia, Maldives, Malta, Marshall Islands, Martinique, Mexico, Micronesia, Moldova, Monaco, Montenegro, Montserrat, Nauru, Netherlands, New Caledonia, New Zealand, Nicaragua, Norfolk Island, North Macedonia, Northern Mariana Islands, Norway, Oman, Palau, Panama, Papua New Guinea, Paraguay, Peru, Philippines, Poland, Portugal, Puerto Rico, Qatar, Romania, Russia, Samoa, San Marino, Saudi Arabia, Serbia, Singapore, Slovakia, Slovenia, Solomon Islands, South Africa, South Korea, Spain, Sri Lanka, St Pierre & Miquelon, St. Kitts & Nevis, St. Lucia, St. Martin, St. Vincent & Grenadines, Suriname, Sweden, Switzerland, Thailand, Tonga, Trinidad & Tobago, Turks & Caicos Islands, Tuvalu, Türkiye, US Virgin Islands, Ukraine, United Arab Emirates, United Kingdom, United States, Uruguay, Vanuatu, Vatican City, Vietnam, Wallis & Futuna, Yemen, Åland Islands
and 135 others
Languages
Chinese, Danish, Dutch, English, French, German, Hebrew, Italian, Japanese, Korean
, Polish, Portuguese, Spanish, Swedish, Traditional Chinese, Turkish
and 6 others
"I am overall very satisfied with Trellix Endpoint Security. As end user I feel safe about my data..."
Read the full review
Przemek
Lead, Infrastructure Specialist in Poland
This information was sourced from Trellix Endpoint Security
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of Trellix Endpoint Security
Pros:
Customer Support is pleasant and quick to reply. The program is constantly being updated.
Read more
Cons:
The expense incurred in the protection against cyber security attack is a trade-off of having an unused personal computer. It is a burden for low income level people.
Read more
This information was sourced from Trellix Endpoint Security
Who Uses Trellix Endpoint Security?
Endpoint protection solution that helps businesses of all sizes with threat prevention, application containment, machine learning analysis. and...
"It is safe and reliable to use, anyone can use it and it does not require long training processes"
Read the full review
Maria
Marketing student in US
This information was sourced from NordVPN
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of NordVPN
Pros:
The user interface is very easy to use and connects rapidly.
Read more
Cons:
Plan renewal dates seemed to change over the 3 months I used it so I missed this first cancellation date so needed to pay for an extra month.
Read more
This information was sourced from NordVPN
Who Uses NordVPN?
VPN is a service that gives you safe and private access to the internet. By encrypting your connection, a VPN hides your IP and online activity from...
Australia, Austria, Canada, Denmark, Germany, Ireland, Liechtenstein, Netherlands, New Zealand, Sweden
, Switzerland, United Kingdom, United States
and 3 others
"Stops a lot of malware sites. Blocks malware popups and does not slow down the computer"
Read the full review
Natan
Coder in Spain
This information was sourced from ESET Endpoint Security
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of ESET Endpoint Security
Pros:
Ease of use, quick installation, frequent database update, integrate seamlessly.
Read more
Cons:
The disadvantages it has are: it analyzes a few files (zip, ace, rar), the options it has been limited. Sometimes has problems detecting compressed programs; some files do not disinfect them.
Read more
This information was sourced from ESET Endpoint Security
Who Uses ESET Endpoint Security?
ESET Endpoint Security offers a cloud-based and on-premises application for any size company that requires comprehensive protection for their devices.
Argentina, Austria, Belgium, Bosnia & Herzegovina, Brazil, Canada, China, Croatia, Czechia, Denmark
, Estonia, Finland, France, Germany, Ghana, Greece, Hong Kong SAR China, Hungary, Iceland, Indonesia, Ireland, Israel, Italy, Japan, Latvia, Liechtenstein, Lithuania, Luxembourg, Malaysia, Monaco, Montenegro, Norway, Poland, Portugal, Qatar, Romania, Saudi Arabia, Slovakia, Slovenia, South Africa, Spain, Sweden, Switzerland, Türkiye, Ukraine, United Kingdom, United States
and 37 others
"A huge security benefit, which we didn't see at the competitor we used before - upon login the 2FA..."
Read the full review
Wojciech
Owner in Poland
This information was sourced from Keeper Security
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from Keeper Security
Who Uses Keeper Security?
We have clients from SMB to enterprise. We serve to protect a company's digital assets by enforcing strong password security, whether that is the IT...
"It is simple and gets the work done. It is intiutive and user-friendly. Easy to use and fast enough..."
Read the full review
Sugam
Project Manager in Nepal
This information was sourced from TunnelBear
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of TunnelBear
Pros:
Tunnel bear's ease of use and integration allows us to do this easily without slowing down the team.
Read more
Cons:
Though you can access offers from different countries but you may not access it fully as sometimes there is problem loading images or text which you may not understand at all.
Read more
This information was sourced from TunnelBear
Who Uses TunnelBear?
TunnelBear for Teams is the perfect fit for small to medium sized businesses that rely on cloud-based tools for everyday communication and work.
"For several years, WebTitan has supported us with a reliable web filtering tool that has served us..."
Read the full review
Nabila
Human Resources Manager in Malaysia
This information was sourced from WebTitan
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of WebTitan
Pros:
The platform is very easy to use, simple interface easy to navigate.
Read more
Cons:
I cannot seem to get it to show the same list of blocked attempts in the email. I can only get a block count by category along with a unique domain count.
Read more
This information was sourced from WebTitan
Who Uses WebTitan?
This is a business solution for any business that wants a vital security layer at the HTTP and HTTPS layer and wants to control web content.
Australia, Austria, Belgium, Brazil, Canada, Czechia, Denmark, Finland, France, Germany
, Greece, Hong Kong SAR China, Hungary, Iceland, Indonesia, Ireland, Israel, Italy, Japan, Liechtenstein, Luxembourg, Mexico, Monaco, Netherlands, New Zealand, Norway, Poland, Portugal, Romania, Singapore, South Africa, South Korea, Spain, Sweden, Switzerland, United Arab Emirates, United Kingdom, United States
and 28 others
"We are using it to protect our network and users PCs from internal and external threats. We have..."
Read the full review
Abdihamid
Innovation & Development Officer in Kenya
This information was sourced from Bitdefender GravityZone
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of Bitdefender GravityZone
Pros:
Multi-tenancy options, APIs advanced integration with several SIEM platforms (we tested the integration with Sumo Logic). The attractive price point (if compared to other EDR vendors).
Read more
Cons:
Customer service at Bitdefender was frustrating to deal with and less than accommodating.
Read more
This information was sourced from Bitdefender GravityZone
Who Uses Bitdefender GravityZone?
Network security system that helps businesses of all sizes protect data from cyber threats with a unified prevention, detection, response, and...
"It was a steep learning curve to configure and initially use. There was good help from customer..."
Read the full review
Robert
Haed of IT in Australia
This information was sourced from Netwrix Auditor
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of Netwrix Auditor
Pros:
Allows you to setup email notifications to help keep your network and infrastructure secure.
Read more
Cons:
I also wish it was installed without a web component that I need to worry about patching.
Read more
This information was sourced from Netwrix Auditor
Who Uses Netwrix Auditor?
IT operations and IT security teams and their leaders at financial institutions, healthcare organizations, government agencies, educational institutio...
"I continue to use the software at home and recommend to anyone out there to include Webroot in..."
Read the full review
Steven
Operations Support Specialist in US
This information was sourced from Webroot Business Endpoint Protection
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of Webroot Business Endpoint Protection
Pros:
I haven't had any virus infections since installing the software. It's easy to navigate through the different functions and set up specific parameters.
Read more
Cons:
Mac integration has been difficult since Catalina. Sometimes endpoint updates have adverse effects on performance.
Read more
This information was sourced from Webroot Business Endpoint Protection
Who Uses Webroot Business Endpoint Protection?
Webroot® Business Endpoint Protection is for any size of organization but because of its high effectiveness and low management overheads is particular...
"Ease of use and nothing to continually maintain myself - it all worked in the background for the..."
Read the full review
Tracey
Digital Media Consultant in New Zealand
This information was sourced from Symantec Email Security.cloud
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of Symantec Email Security.cloud
Pros:
It was really easy to use it really helped me from receiving spams and viruses it always warns me. I always feels safe using this software no third part can access my things.
Read more
Cons:
Not much to say, everything worked great for me, sometimes it blocked things that they were not harmful but i had no other problems.
Read more
This information was sourced from Symantec Email Security.cloud
Who Uses Symantec Email Security.cloud?
IT professionals, IT security teams, CIOs, CTOs, IT managers
"As an MSP managing multiple unique networks, we sought a robust solution for network and systems..."
Read the full review
Darcy
VP of Operations in Canada
This information was sourced from Domotz
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of Domotz
Pros:
The software does a lot of intuitive things that make sense. For instance, having the ability to reboot a device over POE.
Read more
Cons:
So far there is really no things that I dislike. It really works OK in my opinion.
Read more
This information was sourced from Domotz
Who Uses Domotz?
This product is targeted to those that provide remote and digital tech support including:
- MSPs and TSPs
- IT Professionals
- AV & System Integrator...
Australia, Belgium, Brazil, Canada, China, France, Germany, India, Ireland, Italy
, Japan, Mexico, Netherlands, New Zealand, Singapore, South Africa, Spain, United Arab Emirates, United Kingdom, United States
and 10 others
"We use S1 in tandem with Huntress and the response we get via monitor is second to none. Sometimes..."
Read the full review
Lucas
Director in Australia
This information was sourced from SentinelOne
Threat Response
Activity Dashboard
Data Visualization
Monitoring
Prioritization
Vulnerability Scanning
This information was sourced from verified user reviews of SentinelOne
Pros:
The support service, which responds rapidly and sorts out the issues within few mail correspondences.
Read more
Cons:
They have multiple consoles and knowing which one hosts which computers can be a bit hard. But they are going down to one console soon.
Read more
This information was sourced from SentinelOne
Who Uses SentinelOne?
Organizations around the world looking for the best cybersecurity solution on the market. Including private and public sectors, scalable to any size...
Sponsored
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest.
Vendors who bid for placement can be identified by the orange “Visit Website” button on their listing.
Highest Rated
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.
Capterra is free for users because vendors pay us when they receive web traffic and sales opportunities. Capterra directories list all vendors—not just those that pay us—so that you can make the best-informed purchase decision possible.