What Integrates with Maltego?

Find out what Maltego integrations exist in 2024. Learn what software and services currently integrate with Maltego, and sort them by reviews, cost, features, and more. Below is a list of products that Maltego currently integrates with:

  • 1
    Kasm Workspaces Reviews
    Top Pick

    Kasm Technologies

    $0 Free Community Edition
    121 Ratings
    See Software
    Learn More
    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
  • 2
    Polonious Reviews

    Polonious

    Polonious Systems

    $300 AU per month
    1 Rating
    See Software
    Learn More
    Polonious is an ISO27001 investigation management workflow solution designed around 3 key principles: 1 - Security 2 - Process centric 3 - Configuration and flexibility What this means is that Polonious allows you to build workflows to manage your investigations in a way that manages your data and your evidence in a highly secure, ISO27001 certified way; allows you to comply with any regulatory requirements with minimal headache and effort by building workflows which are inherently compliant, and; does so without the need for expensive and time consuming code changes - it's even possible for users to do it themselves via the GUI. With Polonious, you can run detailed reports on case outcomes, timeframes, and finances, and break that down across case types, investigators, and even down to investigation status. So you can prove your value up the chain, but you can also identify any problem areas and improve your efficiency.
  • 3
     Videoma Intelion Reviews
    Videoma Intelion is a cutting-edge video and audio analysis solution designed for law enforcement and intelligence agencies. It significantly accelerates the investigative process by automating the review and documentation of video and audio content obtained from surveillance, recordings, or social media analysis operations. This versatile tool can be employed for both post-incident forensic video analysis and real-time support during ongoing investigations.
  • 4
    Tisane Reviews

    Tisane

    Tisane Labs

    Tisane API is an NLU API that focuses on law enforcement and abusive content. Tisane detects: • hate speech • Cyberbullying • Criminal activity • Sexual advances • Attempts to establish external contact More. Tisane identifies the issue and pinpoints the text fragment that is infringing. Optionally, an explanation can be provided for audit or sanity checks. Tisane can handle 30 languages, even if it contains slang or obfuscation.
  • 5
    threatYeti by alphaMountain Reviews
    With threatYeti, alphaMountain turns security professionals, as well as hobbyists, into senior IP threat analysts. The platform is browser-based and renders real-time threats verdicts for any URL, domain, or IP address on the internet. With threatYeti the risk posed to a domain can be rated instantly, with a color-coded scale from 1.00 (low) to 10.00. ThreatYeti protects cyber threat analysts, as well as their networks, from risky websites. The no-click categorization of threatYeti places sites into one or more of 83 categories, so analysts don't need to visit the site and risk downloading malware or encountering objectionable content. ThreatYeti displays related hosts, threat-factors, passive DNS certificates, redirect chains, and more to give analysts a complete picture of any host. The result is a faster, safer investigation that allows organizations to take definitive action on domain and IP threat.
  • 6
    Filigran Reviews
    Adopt a proactive approach to cyber threat management from anticipation to response. Designed to enhance cybersecurity through comprehensive threat information, advanced adversary simulators, and strategic cyber risk-management solutions. Improved decision-making and a holistic view of the threat environment will help you respond faster to incidents. Organize and share your cyber threat intelligence to improve and disseminate insights. Access threat data from different sources in a consolidated view. Transform raw data to actionable insights. Share and disseminate actionable insights across teams and tools. Streamline incident responses with powerful case-management capabilities. Create dynamic attack scenarios to ensure accurate, timely and effective response in real-world incidents. Create simple and complex scenarios that are tailored to the needs of different industries. Instant feedback on responses improves team dynamics.
  • 7
    Intel 471 TITAN Reviews
    Cybercriminals don't sleep. To track bad actors' movements and how they might attack your company, you need continuous threat intelligence. TITAN is an intuitive SaaS intelligence platform that was developed by intelligence and security professionals. It is used by our customers. It allows them to access structured data, dashboards and alerts as well as intelligence reporting via the API integration or web portal. TITAN goes beyond that. TITAN's programmable API can be used to power many connectors and integrations. This will allow you to integrate and operationalize customized intelligence into your security operations. TITAN provides structured technical and non-technical intelligence and data that is continuously updated by our global team. Structured data, low noise and high-fidelity results allow you to focus your team on the threats that are most important.
  • 8
    Mandiant Digital Risk Protection Reviews
    Learn what a digital protection solution is, how it can help prepare you by identifying who is targeting you and what they are after. Mandiant offers a comprehensive digital risk protection solution, either as a standalone self-managed SaaS product or as a comprehensive service. Both options provide security professionals with visibility outside their organization and the ability to identify high risk attack vectors, malicious orchestration on the dark and deep web, and attack campaign on the open web. Mandiant’s digital risk solution provides contextual information about threat actors, their tactics, techniques and procedures, to create a more secure cyber-threat profile. Map your attack surface, and monitor deep and dark web activities to gain visibility into the risk factors that impact the extended enterprise and supply chains. Identify unknown or unmanaged internet-facing assets that are vulnerable before threat actors do.
  • Previous
  • You're on page 1
  • Next