Listing Thumbnail

    Flashpoint Intelligence Platform

     Info
    Globally Trusted Leader in Actionable Risk & Cyber Threat Intelligence

    Overview

    The Flashpoint Intelligence Platform provides intelligence across all risk intelligence classes (Dark Web, Malware, Vulnerability, OSINT, Financial, Domain, Identity, etc.) and enables a variety of intelligence outcomes to include threat visualization, analytics, intelligence collection, finished intelligence, and integrations / orchestrations.

    Features FLASHPOINT DATA RISK INTELLIGENCE CAPABILITIES Cyber Threat Intelligence (CTI) Search through thousands of sources, monitor the communication between illicit actors, and consume finished intel reports written by Flashpoint analysts to better understand risk and make informed decisions on where, when, and how to act.

    • Cyber Threat Actor Tracking
    • Threat Actor Profiles
    • Ransomware tracking
    • Malware Profiles
    • Finished Intelligence Reporting
    • IOCs

    Deep / Dark & Open Web

    • Dark Web Forums & Criminal Marketplaces
    • Encrypted Chat Channels
    • Images & Video Searching
    • Open Web Searching
    • Paste Sites & Social Media

    Identity-Based Threats

    • Largest Dataset in the World
    • Stolen Creds of your Company
    • Stolen Creds of your Customers
    • Account Takeover Mitigation
    • Proactive Buybacks

    Financial Fraud

    • Card Shop Overview
    • Credit Card / Bin Scraping
    • Check Fraud Mitigation
    • Cryptocurrency Analysis
    • Financial Fraud Reporting

    Brand Threats

    • Social Media Monitoring
    • Fake Mobile App Monitoring
    • Typosquatting (Domain Threats)
    • Brand / Copyright Monitoring
    • Takedowns

    Vulnerability Intelligence (VulnDB) Prioritize and remediate the vulnerabilities that matter most to your organization using complete and enriched data (EPSS, ransomware likelihood score, social risk score, exploit availability, and temporal analysis).

    • Zero-Day Vuln Tracking
    • Vuln Database (328k+ Records)
    • Affected Products & Versions
    • Vuln/Ransomware Correlation
    • Vuln Prioritization Metrics

    Physical Security Intelligence Monitor key locations and assets, get real-time alerts about relevant critical events, investigate incidents to understand and inform future strategies, and equip your teams with the information needed to build a proactive, intel-led physical security program.

    • Threat Geolocation Across the Globe
    • Social Media Aggregation
    • Open Source Aggregation
    • Physical Threat Monitoring
    • Time-based Analysis

    Below pricing applies to organizations with 0-5k employees; if your org has more, please contact Flashpoint for pricing.

    CONTACT FLASHPOINT TO LEARN MORE AND/OR START A FREE TRIAL

    Highlights

    • Breadth: All in one pane of glass threat intelligence provider with every single threat intel discipline (dark web, technical, vuln, identity, financial, etc,) in a single place.
    • Depth: The ability to leverage personas and technical collection to gain unparalleled access into marketplaces, forums, encrypted chat channels, and highly austere foreign nation-state and criminal underground operational locations.
    • Actionability: Leverage Flashpoint's intelligence to amplify CTI findings, improve SOC alerting, increase time to value for vuln management teams, rapidly reset stolen creds for identity teams, and prevent credit card theft for financial fraud teams.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Flashpoint Intelligence Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (4)

     Info
    Dimension
    Description
    Cost/12 months
    Ignite Cyber Threat Intelligence 0 to 5k Employees
    Deep/Dark Web Search, intel reports, IOCs, alerting
    $100,000.00
    Ignite Vulnerability Intel 0 to 5k Employees
    Vuln Research, CVEs, ransomware correlation, CVSS/EPSS
    $80,000.00
    Ignite Physical Security Intel 0 to 5k Employees
    Geolocated social media & threat monitoring + pattern analysis
    $80,000.00
    Managed Attribution
    Near anonymous web browsing
    $10,000.00

    Vendor refund policy

    Refunds are not provided

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Access to Flashpoint Intelligence Platform is enabled immediately upon completion of a no-cost order/subscription agreement, with access for 90 days from activation. If your team would like to discuss these solutions further, Flashpoint will partner with you to understand your priorities and recommend an appropriate solution. Customer Support is provided via the support@flashpoint-intel.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Analytics

    Overview

     Info
    AI generated from product descriptions
    Threat Intelligence Collection
    Comprehensive search and monitoring across thousands of sources including dark web forums, criminal marketplaces, and encrypted chat channels
    Vulnerability Intelligence
    Prioritization of vulnerabilities using enriched data including EPSS, ransomware likelihood score, social risk score, and exploit availability
    Identity Threat Monitoring
    Tracking and mitigation of identity-based threats with largest dataset for stolen credentials and account takeover prevention
    Web Intelligence Scanning
    Multi-domain intelligence gathering across deep/dark web, open web, social media, paste sites, and encrypted communication channels
    Physical Security Intelligence
    Real-time monitoring of critical events with geolocation tracking, social media aggregation, and time-based threat analysis across global locations
    Threat Intelligence Collection
    Automated technology that infiltrates hidden underground forums, marketplaces, and messaging groups to monitor and hunt for emerging cyber threats
    Threat Actor Profiling
    Centralized comprehensive information system that aggregates and links threat actor details from diverse web sources with deep investigative insights
    Compromised Account Detection
    Proactive monitoring system that detects compromised accounts across organizational domains, subdomains, and SaaS platforms using data from millions of infected machines
    Technical Threat Monitoring
    API-based automated detection and monitoring service for identifying potentially compromised IPs and domains involved in cybercrime activities
    Supply Chain Risk Management
    Proactive monitoring and evaluation mechanism for assessing and mitigating risks associated with third-party vendors and external threat surfaces
    Web Monitoring Scope
    Advanced monitoring across surface, deep, and dark web sources, covering over 500 digital platforms
    Threat Intelligence Mechanism
    AI/ML-powered engine for contextual digital risk analysis and prediction of Initial Access Vectors
    Cyber Threat Detection
    Comprehensive monitoring for cyber threats including forums, data leak sites, and encrypted chat platforms
    Brand Protection Module
    Advanced monitoring and protection against phishing attacks, fake apps, and rogue social media profiles
    Data Leak Prevention
    Machine learning-based detection and mitigation of leaked credentials and sensitive information across digital channels

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.