Try our new research platform with insights from 80,000+ expert users

IntSights vs Threat Hunting Framework comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IntSights
Ranking in Threat Intelligence Platforms
37th
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
1
Ranking in other categories
Digital Risk Protection (13th)
Threat Hunting Framework
Ranking in Threat Intelligence Platforms
39th
Average Rating
9.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of September 2025, in the Threat Intelligence Platforms category, the mindshare of IntSights is 0.6%, down from 1.3% compared to the previous year. The mindshare of Threat Hunting Framework is 0.9%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms Market Share Distribution
ProductMarket Share (%)
IntSights0.6%
Threat Hunting Framework0.9%
Other98.5%
Threat Intelligence Platforms
 

Featured Reviews

Roy - PeerSpot reviewer
Great at showcasing vulnerabilities, excellent at providing alerts, and offers very good technical support
You need to know how to work with your assets and put the right items in place. The solution still has false positives, The solution is pretty expensive :O) We did have a few bugs in the beginning, when we first used the solution. However, those have since been resolved. I would like it if there was more visibility and insights about what's going on with ransomware all over the internet. IntSights is not 100% following the critical ransomware and the critical items over the internet. However, everyone is afraid to get hit by ransomware. They are not there yet in terms of really covering that style of attack. I'd like to see more from them.
JR
High fidelity cyber incident detection is near in real-time, enabling proactive & timely mitigation efforts
The nature of the system means it has to be implemented throughout the organizations. You need to implement it on the network layer, the email layer, the web proxy layer, and also the endpoints. Nevertheless, endpoint monitoring is very challenging due to the lack of automated method to install the endpoint agents. In one of our customer case, we have about 40,000 endpoints and we need to have a simplified method of deployment if we're going to implement the endpoint monitoring effectively. Product features also need some improvement in creating custom signatures for detection because that is not open to customers.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's great at alerting users to attempts at phishing and suspicious domains."
"Great automatic correlation of all internal activities."
 

Cons

"The solution still has a lot of false positives."
"Monitoring the endpoint could be improved, it requires a huge effort."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms solutions are best for your needs.
867,370 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Educational Organization
13%
Manufacturing Company
8%
Retailer
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Overview

 

Sample Customers

Blackstone, Caesars
Information Not Available
Find out what your peers are saying about CrowdStrike, Recorded Future, VirusTotal and others in Threat Intelligence Platforms. Updated: August 2025.
867,370 professionals have used our research since 2012.