This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

Threat Intelligence Software

72 software options

Sponsored

Personalize your search

Any industry

Any business size

Perch Security logo

Perch Security

4.6
(43)

Threat detection and response management software

visit website
Perch Security is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks and connected devices via a unified portal.

Read more about Perch Security

Show me more like this
WebTitan logo

WebTitan

4.5
(246)

DNS-based web filter, malware/phishing protection & security

visit website
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides advanced web content control.

Read more about WebTitan

Show me more like this
SOAR Tools logo

SOAR Tools

(0)

SOAR stands for Security Orchestration, Automation, and Resp

visit website
SOAR tools are mostly used for incident response, orchestration of workflows, and automation. Threat intelligence management is a vital SOAR Tool functionality.

Read more about SOAR Tools

Show me more like this
ManageEngine PAM360 logo

ManageEngine PAM360

(0)

Complete privileged access security for enterprises

visit website
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Show me more like this
Agari Secure Email Cloud logo

Agari Secure Email Cloud

(0)

Email security and cybersecurity software

visit website
Agari Secure Email Cloud is an email security and cybersecurity software that helps businesses in finance, healthcare, retail, legal, and IT industry segments identify and prevent spear phishing, account takeovers, and email compromise-based attacks. With the incident response functionality, staff members can prioritize tasks and conduct attachments, URLs, and sender forensics-based investigations.

Read more about Agari Secure Email Cloud

Show me more like this
GoodAccess logo

GoodAccess

4.9
(44)

Cloud VPN with identity-based access control in 10 minutes.

visit website
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Show me more like this
Managed Detection and Response (MDR) logo

Managed Detection and Response (MDR)

(0)

Cloud-based threat detection, response, and mitigation tool

visit website
Managed Detection and Response (MDR) is a cloud-based software designed to help businesses detect, investigate, and resolve cyber security threats. Supervisors can use the dashboard to gain 360-degree visibility across all endpoints, networks or cloud environments and configure role-based view access across teams.

Read more about Managed Detection and Response (MDR)

Show me more like this
DataDome logo

DataDome

4.6
(16)

Anti-bot protection software to block unwanted traffic

visit website
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Show me more like this
CTM360 logo

CTM360

(0)

Global Digital Risk Protection Platform

visit website
CTM360 is a global digital risk protection platform that provides detection and response to vulnerabilities and threats in cyberspace.

Read more about CTM360

Show me more like this
CipherBox logo

CipherBox

5.0
(1)

Endpoint detection and response and cybersecurity software

visit website
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Show me more like this
ESET Endpoint Security logo

ESET Endpoint Security

4.7
(844)

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Show me more like this
Avast Business Pro Plus logo

Avast Business Pro Plus

4.4
(834)

Cloud-based security software solution

learn more
Avast Business is a cloud-based security software for commercial organizations that helps to protect endpoint devices as well as file and email servers

Read more about Avast Business Pro Plus

Show me more like this
ActivTrak logo

ActivTrak

4.6
(532)

Work Wiser by Activating Intelligent Insights

learn more
ActivTrak helps companies unlock productivity potential. Our award-winning workforce analytics and productivity management software provides expert insights that empower people, optimize processes, and maximize technology.

Read more about ActivTrak

Show me more like this
Keeper Business logo

Keeper Business

4.7
(427)

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Business

Show me more like this
Webroot Business Endpoint Protection logo

Webroot Business Endpoint Protection

4.5
(198)

Smarter Cybersecurity Services & Solutions

learn more
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about Webroot Business Endpoint Protection

Show me more like this
Netwrix Auditor logo

Netwrix Auditor

4.5
(141)

Ease the burden of IT auditing

learn more
Gain complete visibility and control over IT infrastructure changes and configurations

Read more about Netwrix Auditor

Show me more like this
Datadog logo

Datadog

4.6
(113)

Cloud-Scale Monitoring Platform For Dev, Sec, and Ops teams.

learn more
Datadog is a monitoring and security platform for Dev, Sec, and Ops teams that unifies metrics, traces, and logs in one place so teams can get full visibility into their IT environment.

Read more about Datadog

Show me more like this
Automox logo

Automox

4.8
(55)

Cloud-based platform for patch management

learn more
Automox is a cloud-based cyber hygiene and patch management solution that helps enterprises streamline endpoint protection and minimize cyber threats across all devices. The centralized platform provides users with an overview of devices requiring patch approvals, system updates, or troubleshooting.

Read more about Automox

Show me more like this
Mail Assure logo

Mail Assure

4.5
(26)

Email, Secured.

learn more
Cloud-based email security designed to help your customers stay in control while safeguarding their inbound and outbound email.

Read more about Mail Assure

Show me more like this
Perimeter 81 logo

Perimeter 81

4.6
(9)

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading network cybersecurity solution offering secure remote access and network capabilities managed over a multi-tenant cloud and highly scalable for organizations worldwide.

Read more about Perimeter 81

Show me more like this
ServicePilot logo

ServicePilot

4.5
(6)

Continuous measurement of IT performance and security

learn more
ServicePilot is a high-performance monitoring software solution providing full-stack observability via metrics, traces, and logs. Businesses can collect data from IT infrastructure, networks, applications, and security services to streamline issue resolution.

Read more about ServicePilot

Show me more like this
Prophaze WAF logo

Prophaze WAF

5.0
(2)

WAF-as-a-Service for protecting APIs and web applications

learn more
Prophaze WAF is a cybersecurity software designed to help DevOps teams in manufacturing, healthcare, and educational industries, manage Kubernetes deployments to protect web assets from cyber threats, misconfiguration, attacks, bots, and patch vulnerabilities.

Read more about Prophaze WAF

Show me more like this
Critical Insight logo

Critical Insight

5.0
(1)

Threat detection & response software.

learn more
Critical Insight is a cloud-based software specifically designed for businesses that provides managed detection and response services.

Read more about Critical Insight

Show me more like this
Next Generation Firewall logo

Next Generation Firewall

4.0
(1)

Threat intelligence and network security software

learn more
Next Generation Firewall is a threat intelligence software designed to help businesses configure security gateways and prevent zero-day attacks. The platform allows administrators to intercept SSL encrypted communication between servers and clients and protect data centers against Gen V attacks.

Read more about Next Generation Firewall

Show me more like this
Defense.com logo

Defense.com

(0)

Cloud-based cybersecurity platform

learn more
Defense.com is a cloud-based cybersecurity software designed to help organizations manage detection and protection from online threats and manage training and compliance with security guidelines via a unified portal. The platform’s penetration testing functionality allows enterprises to replicate hack attacks to identify security weaknesses and ensure protection against opportunistic attacks.

Read more about Defense.com

Show me more like this