getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Threat Intelligence Software with Api - Page 4

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


116 software options

OpenText Core DNS Protection logo

Network security and DNS protection software

learn more
OpenText™ Core DNS is a network security software that helps businesses enforce web access policies, reduce cyberattacks, prevent cache poisoning, and more from within a centralized platform.

Read more about OpenText Core DNS Protection

Users also considered
ManageEngine ADAudit Plus logo

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits.

Read more about ManageEngine ADAudit Plus

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides advanced web content control.

Read more about WebTitan

Users also considered
Brandefense logo

Cloud-based threat intelligence tool for data security.

learn more
Brandefense is a cloud-based digital risk protection suite that helps organizations track and manage cyber threats. The platform helps protect systems from potential risks via threat identification, real-time threat alerts, and continuous monitoring.

Read more about Brandefense

Users also considered
ManageEngine PAM360 logo

Privileged access management software

learn more
ManageEngine PAM360 is a privileged access management solution that secures and controls access to critical systems. It offers features like account discovery, credential storage, session management, and user behavior analytics. PAM360 ensures compliance with standards such as NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, while providing flexible deployment options to meet organizational needs.

Read more about ManageEngine PAM360

Users also considered
Securaa logo

SOAR stands for Security Orchestration, Automation, and Resp

learn more
SOAR tools are mostly used for incident response, orchestration of workflows, and automation. Threat intelligence management is a vital SOAR Tool functionality.

Read more about Securaa

Users also considered
ManageEngine Log360 Cloud logo

Cloud SIEM solution for a secure IT infrastructure

learn more
ManageEngine Log360 Cloud is a unified cloud SIEM solution with integrated CASB capabilities that helps enterprises secure their network from cyberattacks. With its security analytics, threat intelligence, and incident management capabilities, Log360 Cloud helps security analysts spot, prioritize, and resolve issues.

Read more about ManageEngine Log360 Cloud

Users also considered
OpenText Core Endpoint Protection​ logo

Smarter Cybersecurity Services & Solutions

learn more
OpenText™ Core Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about OpenText Core Endpoint Protection​

Users also considered
Resolver logo

Risk platform for enterprise resilience

learn more
Resolver’s Threat Protection application is a fully integrated case management solution that ensures potential threats are evaluated comprehensively to help determine the right course of action.

Read more about Resolver

Users also considered
ConnectWise SIEM logo

Threat detection and response management software

learn more
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.

Read more about ConnectWise SIEM

Users also considered
OpenText Core Behavioral Signals logo

Vulnerability scanning and threat intelligence software

learn more
ArcSight is a vulnerability scanning software that helps businesses utilize machine learning technology to detect threats, handle investigations, create prioritized event lists, and more on a centralized platform. It enables staff members to extract entities from log files and observe events and behavior across users, IP addresses, servers, and machines.

Read more about OpenText Core Behavioral Signals

Users also considered
Acunetix logo

Cloud-based and automated web application security solution

learn more
Acunetix is a cybersecurity solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
Proofpoint Email Protection logo

Secure email gateway management and threat intelligence tool

learn more
Proofpoint Email Protection is a computer security management software designed to help businesses identify and block threats using AI-enabled tools. It offers an advanced business email compromise (BEC) defense feature, which enables administrators to analyze various attributes including message header and senders’ IP address.

Read more about Proofpoint Email Protection

Users also considered
Xcitium Endpoint Detection & Resonse logo

Gain full context of a ransomware attack

learn more
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat Response (EDTR), represents an advanced endpoint solution designed for the continuous monitoring of endpoint devices. This solution aims to detect and respond effectively to a wide array of major threats, including but not limited to malware and ransomware.

Read more about Xcitium Endpoint Detection & Resonse

Users also considered
Dark Web ID logo

Threat detection and monitoring for businesses and MSPs

learn more
Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats. The platform can be used by MSPs or enterprises to prevent data breaches and ensure sensitive employee or company data is not available on the dark web.

Read more about Dark Web ID

Users also considered
SiteLock logo

Threat intelligence software for eCommerce businesses

learn more
SiteLock is a static application security testing (SAST) software designed to help businesses protect websites against malware and distributed denial-of-service (DDoS) attacks. Key features of the platform include threat detection, database scanning, bad bot blocking, automated plugin patching, security vulnerability repair, and website acceleration.

Read more about SiteLock

Users also considered
Trellix Endpoint Security logo

Computer security and endpoint protection platform

learn more
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.

Read more about Trellix Endpoint Security

Users also considered
IPLocate logo

IP address data and geolocation API for developers

learn more
IPLocate API is a fast and reliable geolocation API that provides accurate IP address data and intelligence for developers. It offers comprehensive information such as geolocation, threat and privacy detection, hosting provider data, and ASN details, all accessible through a simple API integration.

Read more about IPLocate

Users also considered
Alice logo

Safety, security, and governance for GenAI systems

learn more
Alice is a trust, safety, and security platform built for the AI era. It helps organizations govern and protect GenAI systems, agents, and communicative platforms across their lifecycle, using adversarial intelligence to prevent harm, detect drift, and operate AI responsibly at scale.

Read more about Alice

Users also considered
NexVision Engine logo

AI-Powered OSINT Open Source Intelligence Platform

learn more
NexVision is an advanced A.I.-powered OSINT solution that provides real-time intelligence from the Whole Web (Clear Web, Dark Web and Social Media). It provides unprecedented access to dark web searches through regular browsers like Chrome and Safari, without the use of anonymising browser Tor.

Read more about NexVision Engine

Users also considered
blacklens.io logo

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
The Anomali Platform logo

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered
Vulseek logo

Attack surface and vulnerability management

learn more
Vulseek is a modern attack surface management and vulnerability detection platform designed for small and medium-sized organizations. It combines external scanning, internal network visibility, and cross-platform endpoint agents to give teams complete insights

Read more about Vulseek

Users also considered
Vortex logo

Cybersecurity and threat intelligence software

learn more
Vortex is a cloud-based cybersecurity platform that helps in threat prevention and detection. It offers threat prevention capabilities with its groundbreaking Simulation Intelligence and Signature-less detection technology. It supports several file types, such as Microsoft Office documents, PDFs, image files, audio, video files, and more. This approach helps in the thorough protection of user data.

Read more about Vortex

Users also considered
OpenText Core EDR logo

OpenText Core EDR built for MSPs and SMB organizations.

learn more
Built for MSPs, the cloud-based tool unifies endpoint protection, SIEM, SOAR, and alert triage to streamline multi-client security.

Read more about OpenText Core EDR

Users also considered