App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Threat Intelligence Software

114 software options

Sponsored

Filter results

Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

GoodAccess logo

GoodAccess

4.9
(60)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess creates an encrypted network that hides your assets from the internet, controls authorized access. In 10 minutes you create a resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
ConnectWise SIEM logo

ConnectWise SIEM

4.6
(44)

Threat detection and response management software

visit website
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.

Read more about ConnectWise SIEM

Users also considered
Resecurity Risk logo

Resecurity Risk

5.0
(2)

Supply chain monitoring platform

visit website
Resecurity Risk is a supply chain monitoring platform that tracks risks, provides alerts, and manages threats. The platform integrates data from multiple sources and offers an interface for deep-dive investigation.

Read more about Resecurity Risk

Users also considered
Fortra's Agari DMARC Protection logo

Fortra's Agari DMARC Protection

(0)

Software for protection from spoofing and phishing attacks

visit website
Agari Brand Protection is a simple anti-phishing solution that helps enterprises prevent and recover from email spoofing attacks. Businesses can block phishing attacks with DMARC, SPF, DKIM, and other email authentication services.

Read more about Fortra's Agari DMARC Protection

Users also considered
Agari Phishing Defense logo

Agari Phishing Defense

4.5
(8)

Phishing defense software

visit website
With Agari Phishing Defense, users can prevent breach activity at the cloud gateway and proactively protect users from impersonation attacks.

Read more about Agari Phishing Defense

Users also considered
Flare logo

Flare

4.4
(7)

Digital monitoring platform that protects company data

visit website
Flare is a digital footprint monitoring platform designed to help protect sensitive data and financial resources for companies. This AI-enabled platform provides continuous monitoring to identify potential issues and malicious actors that are a threat to digital assets. Flare delivers prioritized alerts and ranks threats for immediate action using a built-in scoring system. It also offers remediation capabilities that can execute takedowns against critical threats or proactively notify teams.

Read more about Flare

Users also considered
ManageEngine PAM360 logo

ManageEngine PAM360

5.0
(2)

Complete privileged access security for enterprises

visit website
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Users also considered
CTM360 logo

CTM360

(0)

Global Digital Risk Protection Platform

visit website
CTM360 is a global digital risk protection platform that provides detection and response to vulnerabilities and threats in cyberspace.

Read more about CTM360

Users also considered
Regroup Mass Notification logo

Regroup Mass Notification

4.4
(57)

Cloud-based mass notification software

visit website
A push notification solution for organizations with features for multiple department communication, multi device integration, and more.

Read more about Regroup Mass Notification

Users also considered
HTTPCS Cyber Vigilance logo

HTTPCS Cyber Vigilance

(0)

Data leaks monitoring and cyber threats detection solution

visit website
Cybervigilance is a semi-automated, cloud-based OSINT and Cyber Threat Intelligence (CTI) solution that monitors the web, deep web and darknet for information leaks and indications of cyber threats, and alerts you 24/7 before the incident occurs.

Read more about HTTPCS Cyber Vigilance

Users also considered
ManageEngine Log360 logo

ManageEngine Log360

4.6
(10)

Comprehensive SIEM solution

visit website
ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage network security, audit Active Directory changes, log devices, and gain visibility into cloud infrastructures.

Read more about ManageEngine Log360

Users also considered
CipherBox logo

CipherBox

5.0
(1)

Endpoint detection and response and cybersecurity software

visit website
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Resolver logo

Resolver

4.3
(44)

See Risk. Discover Value.

visit website
Resolver’s Threat Protection application is a fully integrated case management solution that ensures potential threats are evaluated comprehensively to help determine the right course of action.

Read more about Resolver

Users also considered
Malwarebytes for Business logo

Malwarebytes for Business

4.7
(2.3K)

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
NordVPN logo

NordVPN

4.6
(1.2K)

VPN cloud security service

learn more
NordVPN is a VPN cloud security service which encrypts all internet traffic to ensure confidential business data is protected from third parties

Read more about NordVPN

Users also considered
ESET Endpoint Security logo

ESET Endpoint Security

4.7
(1K)

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
Trellix Endpoint Security logo

Trellix Endpoint Security

4.2
(1.7K)

Computer security and endpoint protection platform

learn more
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.

Read more about Trellix Endpoint Security

Users also considered
Avast Ultimate Business Security logo

Avast Ultimate Business Security

4.4
(909)

Comprehensive cybersecurity and patch automation for SMB

learn more
Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.

Read more about Avast Ultimate Business Security

Users also considered
Keeper Security logo

Keeper Security

4.7
(459)

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
ActivTrak logo

ActivTrak

4.6
(543)

Work Wiser by Activating Intelligent Insights

learn more
ActivTrak helps companies unlock productivity potential. Our award-winning workforce analytics and productivity management software provides expert insights that empower people, optimize processes, and maximize technology.

Read more about ActivTrak

Users also considered
TunnelBear logo

TunnelBear

4.5
(451)

Virtual Private Network Service Solution

learn more
TunnelBear is a virtual private network (VPN) system that helps businesses generate encrypted tunnels for routing corporate data and maintaining confidentiality. The software protects organizations by converting browsing history into an unreadable format so hackers cannot access it.

Read more about TunnelBear

Users also considered
WebTitan logo

WebTitan

4.5
(258)

DNS-based web filter, malware/phishing protection & security

learn more
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides advanced web content control.

Read more about WebTitan

Users also considered
Datadog logo

Datadog

4.6
(218)

Cloud-Scale Monitoring Platform For Dev, Sec, and Ops teams.

learn more
Datadog is a monitoring and security platform for Dev, Sec, and Ops teams that unifies metrics, traces, and logs in one place so teams can get full visibility into their IT environment.

Read more about Datadog

Users also considered
Bitdefender GravityZone logo

Bitdefender GravityZone

4.6
(203)

Security & risk analytics platform with threat intelligence

learn more
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.

Read more about Bitdefender GravityZone

Users also considered
Webroot Business Endpoint Protection logo

Webroot Business Endpoint Protection

4.5
(210)

Smarter Cybersecurity Services & Solutions

learn more
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about Webroot Business Endpoint Protection

Users also considered