9 Integrations with Maltego

View a list of Maltego integrations and software that integrates with Maltego below. Compare the best Maltego integrations as well as features, ratings, user reviews, and pricing of software that integrates with Maltego. Here are the current Maltego integrations in 2024:

  • 1
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks or your Homelab), or in a hybrid configuration.
    Leader badge
    Starting Price: $0 Free Community Edition
    View Software
    Visit Website
  • 2
    Polonious

    Polonious

    Polonious Systems

    Polonious is an ISO27001 certified secure, extremely flexible and highly configurable investigation workflow solution. The system includes features such as process centrism, workload management, reporting, dynamic dashboards, case reports, integrations and more. With our process and compliance focus, you can ensure your investigations are fully compliant with applicable regulations, with minimal extra effort or stress. With Polonious, you can run detailed reports on case outcomes, timeframes, and finances, and break that down across case types, investigators, and even down to investigation status. So you can prove your value up the chain, but you can also identify any problem areas and improve your efficiency.
    Starting Price: $75 AU per month
    View Software
    Visit Website
  • 3
     Videoma Intelion
    Videoma Intelion is an Video and Audio analyzer for law enforcement and intelligence agencies that reduces investigation times to a fraction of the usual by automating the tasks of reviewing and documenting video and audio generated in surveillance, recordings or social media analysis operations. It can work either as a forensic video analysis tool, after the fact, or in ongoing investigations. Intelion is a Law Enforcement software that integrates with any VMS and processes video files, live surveillance cameras, live TV and radio broadcasts or content from online platforms massively in an unattended manner. It applies advanced, AI-based analyzers to automatically classify all that information and locate targets in near real-time. Some features: Face Biometry Object recognition Speaker ID Audio Fingerprint Speech to Text Automatic Translation
    Starting Price: $300,000
  • 4
    Tisane

    Tisane

    Tisane Labs

    Tisane is NLU API with a focus on abusive content and law enforcement needs. Tisane detects: * hate speech * cyberbullying * criminal activity * sexual advances * attempts to establish external contact and more. Tisane classifies the actual issue, and pinpoints the offending text fragment; optionally, explanation can be supplied for a sanity check or audit purposes. Tisane supports 30 languages, even if the text contains slang and obfuscation.
  • 5
    threatYeti by alphaMountain
    threatYeti by alphaMountain, turns security professionals and hobbyists alike into a senior IP threat intelligence analysts with a browser-based platform that renders real-time threat verdicts for any domain, URL, or IP on the internet. With threatYeti, the risk posed by a domain is rendered instantly with a color-coded rating from 1.00 (low risk) to 10.00 (high risk). threatYeti also protects cyber threat analysts and their networks from risky sites. threatYeti’s no-click categorization presents sites into at least one out of 83 categories so that analysts don’t have to visit them and risk encountering objectionable material or downloading malware. threatYeti also displays related hosts, threat factors, passive DNS, certificates, redirect chains and more, giving analysts the full picture of any host. The result is faster, safer investigations that enable organizations to take conclusive action on domain and IP threats.
    Starting Price: $0
  • 6
    Filigran

    Filigran

    Filigran

    Embrace a proactive approach with end-to-end cyber threat management, from anticipation to response. Tailored to elevate cybersecurity through comprehensive threat intelligence, advanced adversary simulation, and strategic cyber risk management solutions. Get a holistic view of your threat environment and improved decision-making for faster incident response. Organize your cyber threat intelligence knowledge to enhance and disseminate actionable insights. Access consolidated view of threat data from multiple sources. Transform raw data into actionable insights. Enhance sharing and actionable insights dissemination across teams and tools. Streamline incident response with powerful case management capabilities. Create dynamic attack scenarios, ensuring accurate, timely, and effective response during real-world incidents. Build both simple and intricate scenarios tailored to various industry needs. Improve team dynamics with instant feedback on responses.
  • 7
    Intel 471 TITAN

    Intel 471 TITAN

    Intel 471

    Cybercriminals never sleep. You need round-the-clock threat intelligence to anticipate and track bad actors’ every move, and how they might attack your business. Our customers rely on TITAN, an intuitive intelligence SaaS platform built by intelligence and security professionals for intelligence and security professionals. It enables them to access structured information, dashboards, timely alerts, and intelligence reporting via the web portal or API integration. But TITAN doesn’t stop there. Use TITAN’s programmable RESTful API to power numerous connectors and integrations, integrating and operationalizing customized intelligence into your security operations. TITAN delivers structured technical and non-technical data and intelligence that is continually updated by our global team and automated processes. With structured data, less noise, and high-fidelity results, you can focus your team on the threats that matter most.
  • 8
    Mandiant Digital Risk Protection
    Learn what a digital risk protection solution is and how it can help you be better prepared by understanding who is targeting you, what they’re after, and how they plan to compromise you. Mandiant delivers a broad digital risk protection solution either via stand-alone self-managed SaaS products or a comprehensive service. Both options give security professionals visibility outside their organization, the ability to identify high-risk attack vectors, malicious orchestration from the deep and dark web, and attack campaigns on the open web.  Mandiant’s digital risk protection solution also provides contextual information on threat actors and their tactics, techniques, and procedures to provide a more secure cyber threat profile. Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.  Identify unknown or unmanaged vulnerable internet-facing assets before threat actors do.
  • 9
    IPQS Device Fingerprinting
    Access over 25 data points for device fingerprinting details to analyze risk and device info. Device Fingerprinting by IPQS offers an unparalleled fraud detection solution capable of detecting even the most advanced fraudsters, bad actors, and cyber criminals. Scan over 300 data points (like operating system, screen resolution, fonts) to accurately identify fake devices, location spoofing, and high-risk behavior in a user's online fingerprint. Identify bots, automated behavior, device spoofing, & other high-confidence signals that the user is likely to engage in fraudulent behavior. Deploy JavaScript device fingerprinting for web devices or use our SDKs for mobile devices on iOS or Android. Robust risk scoring will accurately identify fake accounts, chargebacks, credential stuffing, bot behavior, and similar abuse. IPQS Device Fingerprinting can reveal advanced fraud techniques including the latest emulator software.
  • Previous
  • You're on page 1
  • Next