getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Threat Intelligence Software with Collaboration Tools (2026)

Last updated: March 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


19 software options

Datadog logo

Cloud-Scale Monitoring Platform For Dev, Sec, and Ops teams.

learn more
Datadog is a monitoring and security platform for Dev, Sec, and Ops teams that unifies metrics, traces, and logs in one place so teams can get full visibility into their IT environment.

Read more about Datadog

Users also considered
AlertMedia logo

Identify threats and respond faster during critical events.

learn more
AlertMedia’s award-winning, human-verified threat intelligence, emergency communication, and travel risk management solutions help companies of all sizes identify, respond to, and recover from critical events faster and with greater confidence—all from a single, unified interface.

Read more about AlertMedia

Users also considered
Resolver logo

Risk platform for enterprise resilience

learn more
Resolver’s Threat Protection application is a fully integrated case management solution that ensures potential threats are evaluated comprehensively to help determine the right course of action.

Read more about Resolver

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
Darktrace logo

AI-enabled network and cybersecurity solution

learn more
Darktrace, founded in 2013 in Cambridge, UK, is a leader in AI cybersecurity, protecting 10,000+ global customers from evolving threats

Read more about Darktrace

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
Sensitive Content Manager logo

Multi-purpose content distribution and management platform

learn more
Sensitive Content Manager is a scalable cloud-based platform providing secure content distribution features across board or sales content management, e-learning publishing & more

Read more about Sensitive Content Manager

Users also considered
OpenText Core Behavioral Signals logo

Vulnerability scanning and threat intelligence software

learn more
ArcSight is a vulnerability scanning software that helps businesses utilize machine learning technology to detect threats, handle investigations, create prioritized event lists, and more on a centralized platform. It enables staff members to extract entities from log files and observe events and behavior across users, IP addresses, servers, and machines.

Read more about OpenText Core Behavioral Signals

Users also considered
Vade logo

Collaborative cybersecurity based on IA, enhanced by people.

learn more
Vade is a global cybersecurity company specializing in the development of collaborative email security solutions. Combining human and machine intelligence, Vade's solutions form a cybersecurity alliance that is powered by AI and enhanced by people.

Read more about Vade

Users also considered
ServicePilot logo

Continuous measurement of IT performance and security

learn more
ServicePilot is a high-performance monitoring software solution providing full-stack observability via metrics, traces, and logs. Businesses can collect data from IT infrastructure, networks, applications, and security services to streamline issue resolution.

Read more about ServicePilot

Users also considered
Secureworks logo

Threat intelligence and cybersecurity software

learn more
Secureworks is a cybersecurity software designed to help businesses detect, investigate, and remediate threats and vulnerabilities. Key features of the platform include endpoint visibility, AI-based detections, context-based vulnerability prioritization, machine vulnerability scanning, and web application security testing.

Read more about Secureworks

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Defense In Depth logo

Empowering cyber defense for businesses.

learn more
Defense In Depth offers comprehensive cyber security solutions including cyber security risk assessments, system auditing, IT security policies, and risk registers. These services aim to identify potential vulnerabilities and assess overall security posture by reviewing hardware, software, network architecture, access controls, policies, procedures, and employee awareness.

Read more about Defense In Depth

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.

Read more about TEHTRIS XDR Platform

Users also considered
Cyware logo

Agentic AI-Powered Threat Intelligence Management

learn more
Cyware enables security teams at leading global organizations to operationalize threat intelligence data and execute real-time actions by integrating intelligence management, automating workflows, and promoting secure collaboration for a stronger, unified defense.

Read more about Cyware

Users also considered
blacklens.io logo

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
Cerberus logo

Threat intelligence software

learn more
Cerberus is a powerful platform for uncovering and investigating criminal activity on the deep and dark web. Cerberus collates unstructured data from the dark web into meaningful intelligence to help investigators and intelligence officers combat threats safely and easily.

Read more about Cerberus

Users also considered
The Anomali Platform logo

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered