Listing Thumbnail

    Flashpoint Intelligence Platform

     Info
    Sold by: Flashpoint 
    Globally Trusted Leader in Actionable Risk & Cyber Threat Intelligence

    Overview

    The Flashpoint Intelligence Platform provides intelligence across all risk intelligence classes (Dark Web, Malware, Vulnerability, OSINT, Financial, Domain, Identity, etc.) and enables a variety of intelligence outcomes to include threat visualization, analytics, intelligence collection, finished intelligence, and integrations / orchestrations.

    Features FLASHPOINT DATA RISK INTELLIGENCE CAPABILITIES Cyber Threat Intelligence (CTI) Search through thousands of sources, monitor the communication between illicit actors, and consume finished intel reports written by Flashpoint analysts to better understand risk and make informed decisions on where, when, and how to act.

    • Cyber Threat Actor Tracking
    • Threat Actor Profiles
    • Ransomware tracking
    • Malware Profiles
    • Finished Intelligence Reporting
    • IOCs

    Deep / Dark & Open Web

    • Dark Web Forums & Criminal Marketplaces
    • Encrypted Chat Channels
    • Images & Video Searching
    • Open Web Searching
    • Paste Sites & Social Media

    Identity-Based Threats

    • Largest Dataset in the World
    • Stolen Creds of your Company
    • Stolen Creds of your Customers
    • Account Takeover Mitigation
    • Proactive Buybacks

    Financial Fraud

    • Card Shop Overview
    • Credit Card / Bin Scraping
    • Check Fraud Mitigation
    • Cryptocurrency Analysis
    • Financial Fraud Reporting

    Brand Threats

    • Social Media Monitoring
    • Fake Mobile App Monitoring
    • Typosquatting (Domain Threats)
    • Brand / Copyright Monitoring
    • Takedowns

    Vulnerability Intelligence (VulnDB) Prioritize and remediate the vulnerabilities that matter most to your organization using complete and enriched data (EPSS, ransomware likelihood score, social risk score, exploit availability, and temporal analysis).

    • Zero-Day Vuln Tracking
    • Vuln Database (328k+ Records)
    • Affected Products & Versions
    • Vuln/Ransomware Correlation
    • Vuln Prioritization Metrics

    Physical Security Intelligence Monitor key locations and assets, get real-time alerts about relevant critical events, investigate incidents to understand and inform future strategies, and equip your teams with the information needed to build a proactive, intel-led physical security program.

    • Threat Geolocation Across the Globe
    • Social Media Aggregation
    • Open Source Aggregation
    • Physical Threat Monitoring
    • Time-based Analysis

    Below pricing applies to organizations with 0-5k employees; if your org has more, please contact Flashpoint for pricing.

    CONTACT FLASHPOINT TO LEARN MORE AND/OR START A FREE TRIAL

    Highlights

    • Breadth: All in one pane of glass threat intelligence provider with every single threat intel discipline (dark web, technical, vuln, identity, financial, etc,) in a single place.
    • Depth: The ability to leverage personas and technical collection to gain unparalleled access into marketplaces, forums, encrypted chat channels, and highly austere foreign nation-state and criminal underground operational locations.
    • Actionability: Leverage Flashpoint's intelligence to amplify CTI findings, improve SOC alerting, increase time to value for vuln management teams, rapidly reset stolen creds for identity teams, and prevent credit card theft for financial fraud teams.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Flashpoint Intelligence Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (4)

     Info
    Dimension
    Description
    Cost/12 months
    Ignite Cyber Threat Intelligence 0 to 5k Employees
    Deep/Dark Web Search, intel reports, IOCs, alerting
    $100,000.00
    Ignite Vulnerability Intel 0 to 5k Employees
    Vuln Research, CVEs, ransomware correlation, CVSS/EPSS
    $80,000.00
    Ignite Physical Security Intel 0 to 5k Employees
    Geolocated social media & threat monitoring + pattern analysis
    $80,000.00
    Managed Attribution
    Near anonymous web browsing
    $10,000.00

    Vendor refund policy

    Refunds are not provided

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Access to Flashpoint Intelligence Platform is enabled immediately upon completion of a no-cost order/subscription agreement, with access for 90 days from activation. If your team would like to discuss these solutions further, Flashpoint will partner with you to understand your priorities and recommend an appropriate solution. Customer Support is provided via the support@flashpoint-intel.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Analytics

    Overview

     Info
    AI generated from product descriptions
    Cyber Threat Intelligence Collection
    Monitoring of thousands of sources including dark web forums, criminal marketplaces, encrypted chat channels, and open web to track cyber threat actors, ransomware, and malware with finished intelligence reports and indicators of compromise.
    Vulnerability Intelligence and Prioritization
    Vulnerability database with 328,000+ records enriched with EPSS scores, ransomware likelihood scores, social risk scores, exploit availability data, and temporal analysis for vulnerability prioritization and remediation.
    Identity Threat Detection
    Monitoring and detection of stolen credentials across company and customer accounts with account takeover mitigation capabilities and proactive credential buyback functionality.
    Financial Fraud Intelligence
    Analysis and monitoring of financial fraud threats including credit card scraping, cryptocurrency analysis, check fraud mitigation, and card shop intelligence.
    Physical Security Threat Monitoring
    Real-time geolocation-based threat monitoring across global locations with social media and open source aggregation for physical security intelligence and time-based threat analysis.
    Underground Threat Monitoring
    Infiltrates hidden underground forums, marketplaces, and messaging groups to monitor and hunt for emerging cybercrime threats and attack indicators.
    Compromised Account Detection
    Monitors and detects compromised accounts across organizational domains, subdomains, and SaaS accounts utilizing data from millions of infected machines.
    Threat Actor Intelligence Hub
    Centralizes comprehensive information on threat actors from diverse web sources with links to related actors, threat actor profiles, identities, and hacking discussions.
    Automated Technical Intelligence API
    Provides SOC teams with automated detection and monitoring of potentially compromised IPs and domains involved in cybercrime activity through API integration.
    Third-Party Vendor Risk Assessment
    Proactively monitors, evaluates, and mitigates risks from third-party vendors to strengthen supply chain security posture.
    Multi-Source Threat Monitoring
    Monitors over 500 sources across surface, deep, and dark web including forums, data leak sites, and encrypted chat platforms to detect security risks and initial access vectors.
    Machine Learning-Based Detection
    Utilizes machine learning engine to detect and mitigate leaked credentials, secrets, and data breaches with prioritization for VIP and executive accounts.
    Modular Architecture
    Comprises three main modules (deep and dark web monitoring, data leak monitoring, and brand threat monitoring) with multiple sub-modules that can be purchased individually or in combinations based on specific use cases.
    SIEM and SOAR Integration
    Integrates with major SIEM and SOAR solution providers, Slack, and ticketing tools for streamlined alert management and incident response workflows.
    Customizable Alert Configuration
    Provides granular tagging and customizable alert rules to deliver specific actionable intelligence with instant reporting capabilities.

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.