Try our new research platform with insights from 80,000+ expert users

GitGuardian Public Monitoring vs Group-IB Threat Intelligence comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

GitGuardian Public Monitoring
Ranking in Threat Intelligence Platforms
17th
Average Rating
9.0
Reviews Sentiment
7.0
Number of Reviews
2
Ranking in other categories
Application Security Tools (23rd), Static Application Security Testing (SAST) (18th), Data Loss Prevention (DLP) (23rd)
Group-IB Threat Intelligence
Ranking in Threat Intelligence Platforms
10th
Average Rating
8.8
Reviews Sentiment
6.8
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Threat Intelligence Platforms category, the mindshare of GitGuardian Public Monitoring is 0.4%, up from 0.2% compared to the previous year. The mindshare of Group-IB Threat Intelligence is 3.1%, up from 2.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms
 

Featured Reviews

Theo Cusnir - PeerSpot reviewer
Detects and alerts us about leaks quickly, and enables us to filter and prioritize occurrences
One thing I really like about it is the fact that we can add search words or specific payloads inside the tool, and GitGuardian will look into GitHub and alert us if any of these words is found in a repository. For example, if I put "Payfit" in the tool, I will be alerted every time someone is committing with that word in the code. It's really useful for internal domain names, to detect if someone is leaking internal code. With this capability in the tool, we have good surveillance over our potential blind spots. It can detect a leak in 10 minutes. We had an experience with one of our engineers who had leaked a secret, and 10 minutes afterward we had a warning from GitGuardian about the leak. It's very effective. We looked at the commit date and the current date with hours and minutes and we could see that the commit had been made 10 minutes ago. As a result, we are sure it is pretty fast. Another feature, one that helps prioritize remediation, is that you can filter the findings by criticality. That definitely helps us to prioritize which secrets we should rotate and delete.
ALEX LOGINOV - PeerSpot reviewer
Completely satisfied with the way the report is prepared and easy to setup
We did use it for threat detection, but not directly. I analyze multiple reports, including this one, and assess my client's infrastructure. I identify threats outlined in the reports that may be relevant to the client's infrastructure, and then I help them build detection use cases. There's no automation. We don't do anything automatically at this point. It's all manual and based on analysis. I can't integrate it into automatic feeds because the report outlines threats that may not be relevant to the client's infrastructure. So, I do the analysis and integrate it manually. I'm completely satisfied with the way the report is prepared. It's a good report.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The Explore function is valuable for finding specific things I'm looking for."
"One thing I really like about it is the fact that we can add search words or specific payloads inside the tool, and GitGuardian will look into GitHub and alert us if any of these words is found in a repository... With this capability in the tool, we have good surveillance over our potential blind spots."
"Threat Intelligence's best feature is threat activation."
"We have found the site intelligence features to be the most valuable."
"The totality of the recordings is quite important. The networks, the new threat actors, the new methods, tactics, techniques, and procedures."
"The tool's most valuable feature is the sandbox."
"The most valuable Group-IB Threat Intelligence features are their detections, especially in terms of account and card information leakage. This data sets Group-IB apart from some of the competition."
 

Cons

"I would like to see improvement in some of the user interface features... When one secret is leaked in multiple files or multiple repositories, it will appear on the dashboard. But when you click on that secret, all the occurrences will appear on the page. It would be better to have one secret per occurrence, directly, so that we don't have to click to get to the list of all the occurrences."
"I'm excited about the possibility of Public Postman scanning being integrated with GitGuardian in the future. Additionally, I'm interested in exploring the potential use of honeytokens, which seems like a compelling approach to lure and identify attackers."
"The lack of appliance-based or on-premise options for this solution is its biggest downfall. Clients request them often."
"Threat Intelligence's OT security could be improved."
"As the landscape evolves, they could provide a little more detail or specificity to map it to the MITRE ATT&CK framework."
"The web intelligence could be improved. It is not as good as the intelligence from other solutions."
"Group-IB Threat Intelligence should improve integration for SIEM and SOAR solutions."
 

Pricing and Cost Advice

"It's a bit expensive, but it works well. You get what you pay for."
"Group-IB Threat Intelligence's pricing is reasonable."
"Threat Intelligence is costly, but it gives value for money."
"The pricing is alright. It's right on the mark."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms solutions are best for your needs.
848,207 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Government
20%
Computer Software Company
16%
Energy/Utilities Company
15%
Comms Service Provider
11%
Financial Services Firm
21%
Computer Software Company
18%
Energy/Utilities Company
6%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What do you like most about GitGuardian Public Monitoring?
The Explore function is valuable for finding specific things I'm looking for.
What needs improvement with GitGuardian Public Monitoring?
I'm excited about the possibility of Public Postman scanning being integrated with GitGuardian in the future. Additionally, I'm interested in exploring the potential use of honeytokens, which seems...
What is your primary use case for GitGuardian Public Monitoring?
We use GitGuardian Public Monitoring for code that is exposed in public.
What do you like most about Group-IB Threat Intelligence?
We have found the site intelligence features to be the most valuable.
What is your experience regarding pricing and costs for Group-IB Threat Intelligence?
The pricing is alright. It's right on the mark. It costs money, but it's not too high. It's reasonable. For me, it's a reasonable price for the quality of the product.
What needs improvement with Group-IB Threat Intelligence?
As the landscape evolves, they could provide a little more detail or specificity to map it to the MITRE ATT&CK framework. Even though it is done in the report, it could be done better.
 

Overview

 

Sample Customers

Align Technology, Automox, Fred Hutch, Instacart, Maven Wave, Mirantis, SafetyCulture, Snowflake, Talend
Information Not Available
Find out what your peers are saying about GitGuardian Public Monitoring vs. Group-IB Threat Intelligence and other solutions. Updated: March 2025.
848,207 professionals have used our research since 2012.