Listing Thumbnail

    Intel 471

     Info
    Sold by: Intel 471 
    Intel 471 empowers security teams to be proactive with our relevant and timely insights into the cyber underground.

    Overview

    Intel 471 provides adversary and malware intelligence for leading intelligence, security, and fraud teams.

    Our adversary intelligence is focused on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate, and plan cyber attacks.

    Our malware intelligence leverages our adversary intelligence and underground capabilities to provide timely data and context on malware and adversary infrastructure.

    Our team is comprised of intelligence operators and native speakers located where cybercriminals formerly operated with impunity and without consequence.

    Our pedigree is unmatched, and we count upon a team with experience operating in the intelligence services, military, law enforcement and private threat intelligence companies in nearly every continent on earth.

    The mission of Intel 471 is to protect your organization, your products, your assets, and your people.

    Highlights

    • Adversary Intelligence- Understand what threat actors are planning, attacking and how
    • Malware Intelligence- Patented Malware Emulation and Tracking System
    • HUMINT Reporting- Unparalleled Finished Intelligence

    Details

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Cyber Threat Intel
    Cyber Threat Intelligence Base Package
    $150,000.00

    Additional usage costs (1)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Description
    Cost/unit
    additional
    Additional Usage
    $1.00

    Vendor refund policy

    All fees are non-refundable and non-cancellable except as required by law.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Support available though both email and our platform.
    support@intel471.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Analytics
    Top
    100
    In Log Analysis

    Overview

     Info
    AI generated from product descriptions
    Adversary Intelligence Collection
    Access to closed-source cyber underground where threat actors collaborate, communicate, and plan cyber attacks with infiltration and monitoring capabilities
    Malware Intelligence Platform
    Patented Malware Emulation and Tracking System that provides timely data and context on malware and adversary infrastructure
    Human Intelligence Reporting
    Finished intelligence reporting derived from intelligence operators and native speakers with experience in intelligence services, military, and law enforcement
    Threat Actor Behavior Analysis
    Intelligence focused on understanding threat actor planning, attack methodologies, and operational tactics
    Underground Source Access
    Maintained access to closed sources and cyber underground networks for real-time threat actor activity monitoring and intelligence gathering
    Cyber Threat Intelligence Collection
    Monitoring of thousands of sources including dark web forums, criminal marketplaces, encrypted chat channels, and open web to track cyber threat actors, ransomware, and malware with finished intelligence reports and indicators of compromise.
    Vulnerability Intelligence and Prioritization
    Vulnerability database with 328,000+ records enriched with EPSS scores, ransomware likelihood scores, social risk scores, exploit availability data, and temporal analysis for vulnerability prioritization and remediation.
    Identity Threat Detection
    Monitoring and detection of stolen credentials across company and customer accounts with account takeover mitigation capabilities and proactive credential buyback functionality.
    Financial Fraud Intelligence
    Analysis and monitoring of financial fraud threats including credit card scraping, cryptocurrency analysis, check fraud mitigation, and card shop intelligence.
    Physical Security Threat Monitoring
    Real-time geolocation-based threat monitoring across global locations with social media and open source aggregation for physical security intelligence and time-based threat analysis.
    Multi-Source Threat Intelligence Integration
    Integrates threat intelligence from multiple sources to provide comprehensive coverage and context for threat detection.
    Generative AI-Powered Analysis
    Utilizes fine-tuned generative AI models to deliver actionable security insights backed by global threat intelligence repositories.
    Threat Intelligence API Services
    Provides API-based threat intelligence services for programmatic access to threat data and security intelligence.
    High-Fidelity Threat Detection
    Delivers high-fidelity threat intelligence with rich contextual information to improve detection accuracy and reduce false positives.
    Alert Fatigue Reduction
    Streamlines threat detection workflows through intelligent filtering and prioritization to minimize alert volume and operational noise.

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.