getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Threat Intelligence Software with Data Visualization (2026) - Page 2

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


59 software options

MixMode logo

Self-learning Platform to Defend Against Cyber Attacks

learn more
MixMode is a dynamic attack detection solution purpose-built on patented AI to detect known and novel attacks in real-time, at scale. The MixMode Platform autonomously ingests and analyzes data at scale to cut through the noise, surface critical threats, and improve overall defense.

Read more about MixMode

Users also considered
Cyabra logo

Restoring trust and authenticity online.

learn more
Cyabra restores trust and authenticity for global enterprises and governments by analyzing actors, behaviors, and content, and translating evidence into clear mitigation steps at scale.

Read more about Cyabra

Users also considered
365 Total Protection logo

Email security management for Microsoft Office 365

learn more
365 Total Protection is an email security & compliance solution for Microsoft Office 365 with features for tracking emails in real time, handling infomail, blocking spam, filtering for compliance, defending against threats, black & whitelisting, archiving emails, analyzing communications, & more

Read more about 365 Total Protection

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
ThreatSTOP DNS Defense logo

SaaS automated protective DNS security (PDNS)

learn more
ThreatSTOP DNS Defense enables true protective DNS (PDNS) with continuous updates from 900+ threat intelligence sources. DNS Defense turns existing DDI/IPAM or DNS Servers into security enforcement points that stop dangerous and unwanted traffic before damage is done.

Read more about ThreatSTOP DNS Defense

Users also considered
Pentera logo

Emulating real-life attacks on all cybersecurity layers

learn more
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Verimatrix XTD logo

Prevent, detect, respond and predict threats on mobile apps.

learn more
Verimatrix XTD employs advanced obfuscation, anti-tamper and environmental checks to shield Android and iOS mobile apps from attack. Its extensive suite of cybersecurity capabilities spans mobile, embedded, desktop, and web platforms, including browsers, JavaScript, various frameworks and libraries.

Read more about Verimatrix XTD

Users also considered
ThreatBolt logo

Threat intelligence-sharing platform for SOCs and MSSPs

learn more
CyberXTron's ThreatBolt is a platform that provides SOCMSSP organizations with high-fidelity threat intelligence feeds in real-time. Leveraging advanced AIML-powered engines, the platform delivers precise risk scores and threat enrichment to empower security teams and minimize false positives.

Read more about ThreatBolt

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.

Read more about TEHTRIS XDR Platform

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
Flowmon ADS logo

Intelligent Detection Engine for Network Anomalies

learn more
Flowmon Anomaly Detection System is an advanced solution capable of analyzing network traffic to identify anomalies and detect malicious behavior.

Read more about Flowmon ADS

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
MetricStream CyberGRC logo

IT Risk identification and assessment management software

learn more
MetricStream Cyber GRC integrates threat intelligence with risk and compliance management. AI-driven dashboards, automated workflows, and incident tracking help organizations detect vulnerabilities, assess threats, prioritize responses, and strengthen enterprise-wide cybersecurity.

Read more about MetricStream CyberGRC

Users also considered
Network Detection and Response logo

Network visibility, threat detection and forensic analysis

learn more
Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. It accelerates the ability for organizations to respond to and identify future attacks before they become serious events.

Read more about Network Detection and Response

Users also considered
HTTPCS Cyber Vigilance logo

Data leaks monitoring and cyber threats detection solution

learn more
Cybervigilance is a semi-automated, cloud-based OSINT and Cyber Threat Intelligence (CTI) solution that monitors the web, deep web and darknet for information leaks and indications of cyber threats, and alerts you 24/7 before the incident occurs.

Read more about HTTPCS Cyber Vigilance

Users also considered
IntSights logo

Endpoint threat intelligence and protection suite

learn more
IntSights is an external threat intelligence and protection suite designed to help businesses in financial services, manufacturing, retail, food & beverage, insurance, automotive, and other sectors monitor, detect and mitigate risks that impact digital footprints for brands.

Read more about IntSights

Users also considered
Crowdsec logo

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
IBM Cloud Pak for Security logo

Open security platform for hybrid, multi-cloud environments

learn more
IBM Cloud Pak for Security provides threat intelligence insights for hybrid, multi-cloud environments. By integrating tools and automating workflows, this platform is designed to help data security teams mitigate risk and streamline incident response. It provides an AI-enabled unified dashboard with customized threat scoring, federated search for all data sources, automated case creation, and more.

Read more about IBM Cloud Pak for Security

Users also considered
NexVision Engine logo

AI-Powered OSINT Open Source Intelligence Platform

learn more
NexVision is an advanced A.I.-powered OSINT solution that provides real-time intelligence from the Whole Web (Clear Web, Dark Web and Social Media). It provides unprecedented access to dark web searches through regular browsers like Chrome and Safari, without the use of anonymising browser Tor.

Read more about NexVision Engine

Users also considered
The Anomali Platform logo

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered
Netwrix Threat Manager logo

Detect advanced attacks and shut them down in a flash

learn more
Netwrix StealthDEFEND helps businesses detect and respond to ransomware, golden ticket, DCShadow, kerberoasting, and other attacks on Active Directory and data with high accuracy and speed.

Read more about Netwrix Threat Manager

Users also considered
CTM360 logo

Global Digital Risk Protection Platform

learn more
CTM360 is a global digital risk protection platform that provides detection and response to vulnerabilities and threats in cyberspace.

Read more about CTM360

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered