getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Threat Intelligence Software with Activity Dashboard (2026) - Page 4

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


88 software options

IntSights logo

Endpoint threat intelligence and protection suite

learn more
IntSights is an external threat intelligence and protection suite designed to help businesses in financial services, manufacturing, retail, food & beverage, insurance, automotive, and other sectors monitor, detect and mitigate risks that impact digital footprints for brands.

Read more about IntSights

Users also considered
NexVision Engine logo

AI-Powered OSINT Open Source Intelligence Platform

learn more
NexVision is an advanced A.I.-powered OSINT solution that provides real-time intelligence from the Whole Web (Clear Web, Dark Web and Social Media). It provides unprecedented access to dark web searches through regular browsers like Chrome and Safari, without the use of anonymising browser Tor.

Read more about NexVision Engine

Users also considered
Netwrix Threat Manager logo

Detect advanced attacks and shut them down in a flash

learn more
Netwrix StealthDEFEND helps businesses detect and respond to ransomware, golden ticket, DCShadow, kerberoasting, and other attacks on Active Directory and data with high accuracy and speed.

Read more about Netwrix Threat Manager

Users also considered
Vortex logo

Cybersecurity and threat intelligence software

learn more
Vortex is a cloud-based cybersecurity platform that helps in threat prevention and detection. It offers threat prevention capabilities with its groundbreaking Simulation Intelligence and Signature-less detection technology. It supports several file types, such as Microsoft Office documents, PDFs, image files, audio, video files, and more. This approach helps in the thorough protection of user data.

Read more about Vortex

Users also considered
The Anomali Platform logo

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered
Mitiga logo

Cloud & SaaS forensics for incident response and threat hunt

learn more
Mitiga’s modern IR2 platform and teams of cloud and SaaS forensics experts help you prepare for cloud and SaaS application breaches before they happen and recover in record time. We're dedicated to creating a whole new level of resilience for today's cloud and SaaS-driven enterprises.

Read more about Mitiga

Users also considered
Alice logo

Safety, security, and governance for GenAI systems

learn more
Alice is a trust, safety, and security platform built for the AI era. It helps organizations govern and protect GenAI systems, agents, and communicative platforms across their lifecycle, using adversarial intelligence to prevent harm, detect drift, and operate AI responsibly at scale.

Read more about Alice

Users also considered
Lens logo

Browser/MS Office Plugin that uncovers threat intelligence

learn more
Identify key threat intelligence within unstructured data in seconds.

Read more about Lens

Users also considered
NordStellar logo

Boost security with proactive threat management.

learn more
NordStellar is a threat exposure management platform that helps businesses detect and respond to cyber threats before they escalate. The platform provides complete visibility into digital risks, enabling security teams to monitor the deep and dark web for compromised data, detect account takeovers, and prevent session hijacking. NordStellar's innovative solution helps organizations safeguard their data, protect customer accounts, and mitigate the risk of cyberattacks.

Read more about NordStellar

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
blacklens.io logo

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that monitors, tracks, and manages threats across multiple cloud applications & environments.

Read more about Wiz

Users also considered
SiON logo

Employee threat management platform

learn more
Threat intelligence is the collection and analysis of data about current and emerging cyber threats. It’s essential for anticipating attacks, strengthening defenses, and enabling faster, more informed security responses.

Read more about SiON

Users also considered