No more typing reviews! Try our Samantha, our new voice AI agent.

Cybersixgill vs Threat Hunting Framework comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cybersixgill
Ranking in Threat Intelligence Platforms (TIP)
23rd
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
4
Ranking in other categories
Vulnerability Management (60th), Digital Risk Protection (13th), Attack Surface Management (ASM) (32nd)
Threat Hunting Framework
Ranking in Threat Intelligence Platforms (TIP)
36th
Average Rating
9.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2026, in the Threat Intelligence Platforms (TIP) category, the mindshare of Cybersixgill is 1.9%, down from 2.2% compared to the previous year. The mindshare of Threat Hunting Framework is 1.1%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms (TIP) Mindshare Distribution
ProductMindshare (%)
Cybersixgill1.9%
Threat Hunting Framework1.1%
Other97.0%
Threat Intelligence Platforms (TIP)
 

Featured Reviews

it_user1538721 - PeerSpot reviewer
General Manager - Cyber Security at a consultancy with 11-50 employees
We can easily conduct searches on leaked credentials
We can easily conduct searches on leaked credentials. It gives us the ability to look at a timeline and build profiles against companies that we are trying to protect, then track changes to credentials or leaking bucket/cloud services associated with those companies. That is the benefit for us. A lot of it is stuff that we can do manually, but it is more about the time it takes as well as the number of analysts you need to do it compared to getting it provided as a quick service. It is scalable in that we don't need a dozen people to do the work. With this tool, one person can do it.
JR
CTO at systema
High fidelity cyber incident detection is near in real-time, enabling proactive & timely mitigation efforts
The nature of the system means it has to be implemented throughout the organizations. You need to implement it on the network layer, the email layer, the web proxy layer, and also the endpoints. Nevertheless, endpoint monitoring is very challenging due to the lack of automated method to install the endpoint agents. In one of our customer case, we have about 40,000 endpoints and we need to have a simplified method of deployment if we're going to implement the endpoint monitoring effectively. Product features also need some improvement in creating custom signatures for detection because that is not open to customers.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"To be diligent for the customer, we usually go into Cybersixgill Investigative Portal to analyze and search things. The solution tells us the reputation of cyber threat actors. So, if someone has a reputation of one, it is a really bad idea to care about what that person is saying. However, if you find someone with a reputation of nine, then there is a high probability that we need to address the problem. You can get information about these type of actors in Cybersixgill Investigative Portal. They have a huge collection, which is like having the rules/goals of the dark web and deep web without having to go there. Our analysts avoid going dark web because they have Cybersixgill Investigative Portal and can get the news from their browser, searching wherever they want."
"The size and scope of the solution’s collection is amazing, and when we compare what other solutions can and cannot do, we see how Cybersixgill Investigative Portal is superior in many ways."
"If I conducted research manually it would take one week, but by using Sixgill it takes two hours or three hours."
"Rather than hiring more analysts, we have been able to do more with less and automate some of our investigation functions."
"I have been very vocal about how much this tool has helped."
"The advanced analysis has made our security operations more efficient. It has also potentially given us quicker access to data that we might not have otherwise located."
"The solution’s approach of using limited open source intelligence and focusing, instead, on the Deep Web and Dark Web is what seals the deal. That is why I like them. I have other tools that I can aggregate all the open source intelligence from. I value Cybersixgill because it provides access to things that no one else does."
"They also provide some of the greatest notification capabilities. I put in a customer's company name and domain names, or sometimes I put in their IP addresses as a keyword. Once Sixgill collects information that includes those keywords, they then provide us email notifications. That means we can catch information related to our customers as soon as possible."
"Great automatic correlation of all internal activities."
"The product has significantly reduced the mean time to detect (MTTD) and allows us to see cyber attacks in near real time so that response time is much quicker and prioritized, closing the gap and saving the bank a lot of money because cyber incidents can be proactively prevented and mitigation can be carried out much earlier."
 

Cons

"The breadth of access to data is good, but there are gaps. More data would be my suggestion because the platform is good and I have no complaints about the system. I think it is just a case of always trying to get more data sources."
"We need real-time updated information. If we could have this, it would be amazing."
"We need real-time updated information. If we could have this, it would be amazing. For example, if someone was posting something, then ten second later, it was on the platform. Sometimes, it takes a minute or hours right now, depending on the forum."
"Sixgill has strong capabilities based on search queries, but there is some difficulty in using Sixgill."
"The breadth of access to data is good, but there are gaps."
"Regarding their scraping abilities, things could be solidified. There are definitely improvements that could be made on the specificity for setting certain queries."
"Sixgill has strong capabilities based on search queries, but there is some difficulty in using Sixgill. Their querying is very powerful but it can be difficult. It's not hugely complex but you need some skill to use Sixgill querying."
"Regarding their scraping abilities, things could be solidified. There are definitely improvements that could be made on the specificity for setting certain queries."
"Because the system requires an appliance, reliability and stability can become an issue because we are looking at network point of failure and at the OS point of failure as well."
"Monitoring the endpoint could be improved, it requires a huge effort."
 

Pricing and Cost Advice

"The pricing and licensing are good. It is expensive for us because the US dollar is quite strong compared to our dollar. Otherwise, it is quite reasonable for what it is. All the tools in the market are around the same price from my experience."
"Sometimes, Cybersixgill Investigative Portal is cheaper than its competitors."
"The pricing is cheap compared with Recorded Future. Sixgill's cost-effectiveness is very good."
Information not available
report
Use our free recommendation engine to learn which Threat Intelligence Platforms (TIP) solutions are best for your needs.
885,667 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
9%
Manufacturing Company
9%
Financial Services Firm
8%
Construction Company
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Overview

 

Sample Customers

Current customers include large enterprises, financial services, manufacturing, GSIs, MSSPs, government and law enforcement entities.
Information Not Available
Find out what your peers are saying about CrowdStrike, Recorded Future, Check Point Software Technologies and others in Threat Intelligence Platforms (TIP). Updated: March 2026.
885,667 professionals have used our research since 2012.