G2 Crowd Acquires Siftery to Create a New Way to Buy and Manage Software Spend šŸš€

Cofense Intelligence

4.0
(1)

Cofense Intelligence uses proprietary techniques to analyze millions of messages daily from a wide variety of sources.

Work for Cofense Intelligence?

Learning about Cofense Intelligence?

We can help you find the solution that fits you best.

Cofense Intelligence Reviews

Ask Cofense Intelligence a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 Cofense Intelligence review
LinkedIn Connections
Cofense Intelligence review by Megan J.
Megan J.
Validated Reviewer
Verified Current User
Review Source

"PhishMe Experience"

What do you like best?

I like the ability to customize a scenario and tailor it to the person or group I am phishing.

What do you dislike?

I dislike the limited options there are for a file attachment option in English. I wish there could be more options to choose from that are more work related or technology related as to become more believable.

Recommendations to others considering the product

It is a good software to go with as the on-boarding is very easy and thorough process. Everyone is very helpful and it is easy to start creating your own scenarios and then implementing them throughout your business or workplace.

What business problems are you solving with the product? What benefits have you realized?

We are discovering how many people are susceptible to phishing scams or viruses in a professional environment. We are also determining how many people would need extra training or advice on how to stop email scams.

Sign in to G2 Crowd to see what your connections have to say about Cofense Intelligence

What Threat Intelligence solution do you use?

Thanks for letting us know!

There are not enough reviews of Cofense Intelligence for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
F-Secure Logo
F-Secure
4.1
(23)
Going beyond malware protection, F-Secure provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.
2
Alert Logic Threat Manager Logo
Alert Logic Threat Manager
4.3
(10)
Alert Logic Threat Manager with ActiveWatch is a cloud-based managed intrusion detection and vulnerability assessment solution.
3
FireEye Network Security Logo
FireEye Network Security
3.9
(10)
FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection.
4
McAfee Threat Intelligence Exchange Logo
McAfee Threat Intelligence Exchange
4.2
(8)
McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.
5
Cisco Talos Logo
Cisco Talos
4.6
(7)
Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.
6
Distil Networks Logo
Distil Networks
4.2
(7)
Distil Networks is the first easy and accurate way to defend websites against malicious bots.
7
Vectra Networks Logo
Vectra Networks
3.8
(6)
Vectra Networks provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.
8
Achilles Threat Intelligence Software Logo
Achilles Threat Intelligence Software
3.8
(3)
ATI software provides enhancements for intrusion protection systems and intrusion detection systems.
9
SolarWinds MSP Threat Monitor Logo
SolarWinds MSP Threat Monitor
4.2
(3)
SolarWinds Threat Monitor empowers MSSPs of all sizes by reducing the complexity and cost of threat detection, response, and reporting. You get an all-in-one security operations center (SOC) that is unified, scalable, and affordable.
Show more
Kate from G2 Crowd

Learning about Cofense Intelligence?

I can help.
* We monitor all Cofense Intelligence reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.