getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Threat Intelligence Software with Application Security (2026) - Page 3

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


64 software options

Citrix Web Firewall logo

Cloud-based firewall for web applications.

learn more
Citrix Web Application Firewall helps organizations block malicious threats that target web applications, including threats that target open protocols such as HTTP, HTTPS and FTP. In addition to filtering by URL and headers, scripting languages can be protected by detecting script signatures.

Read more about Citrix Web Firewall

Users also considered
Lacework logo

Cloud security & compliance platform

learn more
Lacework is a cloud security and compliance software which provides automated intrusion detection, threat defence, one-click investigation, and compliance across AWS, Azure, GCP, and private clouds, giving users a comprehensive view of risks across their cloud workloads and containers.

Read more about Lacework

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that monitors, tracks, and manages threats across multiple cloud applications & environments.

Read more about Wiz

Users also considered
Cisco Secure Firewall logo

Firewall solution with threat intelligence

learn more
Cisco Secure Firewall is a cloud-based Firewall system that provides security for public, containerized, virtual, physical, and private firealls. Additionally, the software provides threat intelligence to maintain control of enterprise level encrypted traffic and application environments. Secure Firewall can be used across hybrid and multicloud environments along with integration with other Cisco security products to provide visibility across an entire system.

Read more about Cisco Secure Firewall

Users also considered
Netwrix Threat Manager logo

Detect advanced attacks and shut them down in a flash

learn more
Netwrix StealthDEFEND helps businesses detect and respond to ransomware, golden ticket, DCShadow, kerberoasting, and other attacks on Active Directory and data with high accuracy and speed.

Read more about Netwrix Threat Manager

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
Digital Armor logo

Cybersecurity solution for securing mobile applications

learn more
Digital Armor is a cybersecurity solution that helps businesses secure and harden mobile applications at runtime.

Read more about Digital Armor

Users also considered
Heimdal Threat-hunting & Action Center logo

SIEM and threat intelligence solution

learn more
The Heimdal Threat-Hunting and Action Center is a comprehensive platform that offers advanced features to detect, analyze, and mitigate cyber threats in real-time. With a unified interface and a single pane of glass view, security teams can visualize and monitor their entire digital landscape.

Read more about Heimdal Threat-hunting & Action Center

Users also considered
Fidelis Endpoint logo

Comprehensive EDR protection on-premises and in the cloud

learn more
Fidelis Endpoint is an advanced endpoint detection and response (EDR) solution offering comprehensive security. It provides real-time monitoring and analysis of endpoint activities, incident response for swift threat containment, and forensic tools for post-incident analysis. Fidelis Endpoint helps detect and stop sophisticated threats throughout the attack lifecycle, while offering deep visibility into both managed and unmanaged endpoint activity on the network.

Read more about Fidelis Endpoint

Users also considered
Vulseek logo

Attack surface and vulnerability detection management

learn more
Vulseek is a modern attack surface management and vulnerability detection platform designed for small and medium-sized organizations. It combines external scanning, internal network visibility, and cross-platform endpoint agents to give teams complete insights

Read more about Vulseek

Users also considered
SiON logo

Employee threat management platform

learn more
Threat intelligence is the collection and analysis of data about current and emerging cyber threats. It’s essential for anticipating attacks, strengthening defenses, and enabling faster, more informed security responses.

Read more about SiON

Users also considered
blacklens.io logo

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
OpenText Core MDR​ logo

Managed Detection and Response solution

learn more
OpenText™ Core MDR Managed Detection and Response offers a powerful solution designed to enhance your organization's security posture.

Read more about OpenText Core MDR​

Users also considered