Best IT Security Software for SpiderFoot

Find and compare the best IT Security software for SpiderFoot in 2025

Use the comparison tool below to compare the top IT Security software for SpiderFoot on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    OpenDNS Reviews

    OpenDNS

    Cisco Umbrella

    $19.95 per year
    1 Rating
    Cisco Umbrella protects against internet threats such as malware, ransomware, phishing and adware. OpenDNS is a collection of consumer products that make the internet more reliable, faster, and safer. Our global data centers and peering relationships reduce the distance between any network and our data centres, making internet access even more speedy. You can protect your family from adult content with filtering or pre-configured protection. It's the easiest way for you to add parental and content filtering control to all devices in your home. OpenDNS can be installed in your home quickly. No need for a PhD in Computer Science. Setup is easy thanks to our knowledge base and helpful guides. High performance and blocking of more than 7,000,000 malicious IPs and domains. More than 60 000 new malicious destinations (domains and IPs) are identified each day. Our global network sustains over 620 billion DNS queries daily.
  • 2
    Pulsedive Reviews
    Pulsedive provides threat intelligence platform and data products that can be used to aid security teams in their threat intelligence research, processing and management. Start by searching any domain, URL, or IP at pulsedive.com. Our community platform allows you to enrich and investigate indicators for compromise (IOCs), analyze threats and query across the Pulsedive database. You can also submit IOCs in bulk. What we do differently - On-demand, perform passive or active scanning of every ingested IOC - Sharing of risk evaluations and factors with our users based upon first-hand observations - Pivot any data property or value Analyze threat infrastructure and properties shared by different threats Our API and Feed products allow for automation and integration of data within security environments. For more information, visit our website.
  • 3
    SecurityTrails Reviews
    Data for security companies, researchers, and teams. Access to historical and current data via a fast, always-up API. The API is available at a simple price structure that allows you embed our data in your applications. All the data is available, fully-indexed, historical and current, and can be accessed immediately. Search over 3 billion historical and modern WHOIS data, and WHOIS changes. Our daily-updating database is over 203,000,000 deep and growing. Find out what tech sites are currently online and search for over a thousand technologies. Monthly access to more than 1 billion passive DNS data sets. You will have access to the most up-to-date information about IPs, domains and hostnames in real time. With tagged and index intel, searching is quick and easy. Access a treasure trove of cyber security information and find the information you need. Our API is able to provide security analysts and developers with the most up-to-date DNS and domain information.
  • 4
    Censys Reviews
    Censys Attack Surface Management is a continuous discovery tool that uncovers unknown assets, from Internet services to cloud storage buckets. It also comprehensively checks all public-facing assets for security or compliance issues regardless of their location. Cloud services allow companies to be agile and innovative, but they also expose them to security risks from hundreds of cloud accounts and projects that span dozens more providers. Non-IT employees frequently create unmanaged cloud accounts, resulting in blind spots for security teams. Censys ASM provides comprehensive security coverage for all your Internet assets, regardless of where they are located or what account they are. Censys continuously uncovers unknown assets, ranging from Internet service to storage buckets. It provides you with an inventory and security problem analysis of all public-facing assets.
  • 5
    RiskIQ Reviews
    RiskIQ is the market leader in attack surface management. It provides the most comprehensive intelligence, discovery, and mitigation of threats related to an organization's digital presence. RiskIQ gives enterprises unified insight and control of mobile, social, and web exposures. More than 75% of attacks originate outside the firewall. RiskIQ's platform is trusted by thousands of security analysts. It combines advanced internet data reconnaissance with analytics to accelerate investigations, understand digital attack surface, assess risk, and take action to protect customers, brands, and businesses. RiskIQ is the world's only platform with patented Internet Intelligence Graph technology, security intelligence--unified. RiskIQ's 10-year-old history of mapping the internet is used to fuel applied intelligence that detects cyberattacks and responds. The most comprehensive security intelligence to protect your attack surfaces.
  • 6
    VirusTotal Reviews
    VirusTotal inspects items using over 70 antivirus scanners, URL/domain blocking services, and a multitude of tools to extract signals. Any user can use their browser to select a file and send it directly to VirusTotal. VirusTotal offers a variety of file submission options, including the primary web interface, desktop uploaders and browser extensions, as well as a programmatic API. The web interface is the most popular submission method. Submissions can be scripted using any programming language that uses the HTTP-based public API. VirusTotal is useful for detecting malicious content, as well as identifying false positives and normal items that have been detected as malicious by one or several scanners. URLs can be submitted in the same way as files. You can submit URLs via the VirusTotal webpage or browser extensions.
  • 7
    IPQS Device Fingerprinting Reviews
    Access to over 25 data points of device fingerprinting information for analysis and device information. Device Fingerprinting from IPQS is an unmatched fraud detection solution that can detect even the most sophisticated fraudsters, bad actor, and cyber criminals. Over 300 data points are scanned (such as operating system, screen resolution and fonts) in order to identify high-risk behaviors, fake devices, and location spoofing. Identify bots and automated behavior. Identify device spoofing & other signals that indicate a high likelihood of fraud. Use our SDKs to fingerprint mobile devices running iOS or Android or JavaScript for web devices. Robust risk scores will accurately identify fake account, chargebacks and other abuse. IPQS Device fingerprinting can reveal advanced fraud methods including the latest emulators.
  • Previous
  • You're on page 1
  • Next