App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Threat Intelligence Software

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

157 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

OnSolve Platform logo

Detect threats fast & coordinate communications with ease.

visit website
The OnSolve Platform provides AI-powered risk intelligence that is designed, supported, and vetted by human analysts to ensure accuracy. Our control center allows easy detection and coordination of next steps through targeted mass alerts to protect your places, people and property.

Read more about OnSolve Platform

Users also considered
ConnectWise SIEM logo

Threat detection and response management software

visit website
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.

Read more about ConnectWise SIEM

Users also considered
Heimdal Threat-hunting & Action Center logo

SIEM and threat intelligence solution

visit website
The Heimdal Threat-Hunting and Action Center is a comprehensive platform that offers advanced features to detect, analyze, and mitigate cyber threats in real-time. With a unified interface and a single pane of glass view, security teams can visualize and monitor their entire digital landscape.

Read more about Heimdal Threat-hunting & Action Center

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

visit website
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
Zoho Vault logo

Online Password Manager for Teams

visit website
Secure cloud-based password management, organization, and sharing in the cloud with 256-bit encryption, user access control, and activity tracking

Read more about Zoho Vault

Users also considered
Netwrix StealthINTERCEPT logo

Prevent threats from becoming breaches

visit website
Spot threats early and block critical IT risks with Netwrix StealthINTERCEPT.

Read more about Netwrix StealthINTERCEPT

Users also considered
Regroup Mass Notification logo

Cloud-based mass notification software

visit website
A push notification solution for organizations with features for multiple department communication, multi device integration, and more.

Read more about Regroup Mass Notification

Users also considered
AlertMedia logo

Identify threats and respond faster during critical events.

visit website
AlertMedia’s award-winning threat intelligence, emergency communication, and travel risk management solutions help companies of all sizes identify, respond to, and recover from critical events faster and with greater confidence—all from a single, unified interface.

Read more about AlertMedia

Users also considered
MixMode logo

Self-learning Platform to Defend Against Cyber Attacks

visit website
MixMode delivers a patented, self-learning platform that acts as the Cybersecurity Intelligence Layer℠ to detect both known and unknown attacks, including novel attacks designed to bypass legacy cyber defenses.

Read more about MixMode

Users also considered
ESET PROTECT MDR logo

Future ready protection for enterprise

visit website
Airtight protection of your IT environment,
with complete cyber risk management and
world-class ESET expertise on call.

Read more about ESET PROTECT MDR

Users also considered
Malwarebytes for Business logo

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
NordVPN logo

#1 VPN

learn more
NordVPN is a VPN cloud security service which encrypts all internet traffic to ensure confidential business data is protected from third parties

Read more about NordVPN

Users also considered
ESET Endpoint Security logo

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
Trellix Endpoint Security logo

Computer security and endpoint protection platform

learn more
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.

Read more about Trellix Endpoint Security

Users also considered
Avast Ultimate Business Security logo

Comprehensive cybersecurity and patch automation for SMB

learn more
Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.

Read more about Avast Ultimate Business Security

Users also considered
Keeper Security logo

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
TunnelBear logo

Virtual Private Network Service Solution

learn more
TunnelBear is a virtual private network (VPN) system that helps businesses generate encrypted tunnels for routing corporate data and maintaining confidentiality. The software protects organizations by converting browsing history into an unreadable format so hackers cannot access it.

Read more about TunnelBear

Users also considered
Datadog logo

Cloud-Scale Monitoring Platform For Dev, Sec, and Ops teams.

learn more
Datadog is a monitoring and security platform for Dev, Sec, and Ops teams that unifies metrics, traces, and logs in one place so teams can get full visibility into their IT environment.

Read more about Datadog

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides advanced web content control.

Read more about WebTitan

Users also considered
Bitdefender GravityZone logo

Security & risk analytics platform with threat intelligence

learn more
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.

Read more about Bitdefender GravityZone

Users also considered
Webroot Business Endpoint Protection logo

Smarter Cybersecurity Services & Solutions

learn more
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about Webroot Business Endpoint Protection

Users also considered
Domotz logo

Network Monitoring & Management in an IoT World.

learn more
Discover why MSPs, IT Professionals, and System Integrators trust our Network Monitoring and Management Solution to monitor thousands of networks worldwide.

Read more about Domotz

Users also considered
GoodAccess logo

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess creates an encrypted network that hides your assets from the internet, controls authorized access. In 10 minutes you create a resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Symantec Email Security.cloud logo

Anti-spam and email security software

learn more
Symantec Email Security.cloud is an anti-spam software designed to help businesses filter unwanted messages and protect the system from email-borne viruses. The platform offers data loss prevention functionality, which enables managers to encrypt and control sensitive data.

Read more about Symantec Email Security.cloud

Users also considered
Netwrix Auditor logo

Ease the burden of IT auditing

learn more
Automate many of the security, compliance and IT operations tasks that previously required hours to complete, so you can keep your organization secure and compliant without constantly being overburdened.

Read more about Netwrix Auditor

Users also considered