Average Ratings 2 Ratings

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Link indicators from your network to almost all active IP addresses and domains across the Internet. Discover how this information can enhance risk evaluations, assist in identifying attackers, support online fraud probes, and trace cyber activities back to their infrastructure. Acquire crucial insights that empower you to accurately assess the threat levels faced by your organization. DomainTools Iris offers a unique threat intelligence and investigative platform, merging high-quality domain and DNS intelligence with a user-friendly web interface, ensuring ease of use for professionals. This powerful tool is essential for organizations aiming to bolster their cybersecurity measures effectively.

Description

RiskIQ PassiveTotal compiles extensive data from across the internet to gather intelligence that aids in identifying threats and the infrastructure used by attackers, utilizing machine learning to enhance the effectiveness of threat detection and response. This platform provides valuable context about your adversaries, including their tools, systems, and indicators of compromise that may exist beyond your organization's firewall, whether from internal sources or third parties. The speed of investigations is significantly increased, allowing users to rapidly uncover answers through access to over 4,000 OSINT articles and artifacts. With more than a decade of experience in mapping the internet, RiskIQ possesses unparalleled security intelligence that is both extensive and in-depth. It captures a wide array of web data, such as Passive DNS, WHOIS, SSL details, hosts and host pairs, cookies, exposed services, ports, components, and code. By combining curated OSINT with proprietary security insights, users are able to view the digital attack surface comprehensively from multiple perspectives. This empowers organizations to take control of their online presence and effectively counter threats targeting them. Ultimately, RiskIQ PassiveTotal equips businesses with the tools necessary to enhance their cybersecurity posture and proactively mitigate risks.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Anomali
EclecticIQ
Recorded Future
Splunk Cloud Platform
Accenture Cloud Trade Promotion Management
Cortex XSOAR
Desktop.com
Expel
Filigran
Google Cloud Platform
IBM QRadar SIEM
Microsoft 365
Mitrefinch
NTT Application Security
Palo Alto Networks VM-Series
Revelstoke
SIRP
ThreatBlockr
TruSTAR

Integrations

Anomali
EclecticIQ
Recorded Future
Splunk Cloud Platform
Accenture Cloud Trade Promotion Management
Cortex XSOAR
Desktop.com
Expel
Filigran
Google Cloud Platform
IBM QRadar SIEM
Microsoft 365
Mitrefinch
NTT Application Security
Palo Alto Networks VM-Series
Revelstoke
SIRP
ThreatBlockr
TruSTAR

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

DomainTools

Founded

2002

Country

United States

Website

www.domaintools.com

Vendor Details

Company Name

RiskIQ

Founded

2009

Country

United States

Website

www.riskiq.com/products/passivetotal/

Product Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives