Pricing

Add Musubu network intelligence to your threat detection, threat intelligence, and other cybersecurity processes simply and affordably. All our pricing plans come with email support from our expert staff to help you get the most out of our network data.

Pay annually and receive one month free!

FAQs

What is ransomware?
Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key.
What is TOR?
TOR, also known as The Onion Router, conceals its users’ identities and their online activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe.
What is malware?
Malware, short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.
What is Musubu®?
Musubu the word, is Japanese and is defined as “the point at which all things come together”. Musubu® the R2i product is an automated threat intelligence triage and reputation service utility for IP addresses at the point of collection (the edge) which provides context to analysts. It “pulls together” all of network threat intelligence R2i has collected for over 3 years.
What is the difference between raw data and threat intelligence?
Raw Threat Data:
Raw Threat Data is any data that is directly gathered, without enrichment, and acted on as a preventive measure or a response to an action. This data alone is commonly mislabeled as “intelligence”.

Threat Intelligence:
Threat intelligence is information that has been enriched (analyzed) using context, relevance, accuracy, or known associations with other information and applied specifically to the organization and its use cases. Threat intelligence enables you to identify and contextualize your adversaries. Once you understand your adversary, you can take decisive action to better protect your organization.