getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Threat Intelligence Software with Event Analysis (2026) - Page 2

Last updated: March 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


39 software options

CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Critical Insight logo

Threat detection & response software.

learn more
Critical Insight is a cloud-based software specifically designed for businesses that provides managed detection and response services.

Read more about Critical Insight

Users also considered
NetWitness logo

Threat Detection & Response platform for cybersecurity teams

learn more
Netwitness is a suite of products (including Netwitness Platform, Network, Logs, Orchestrator, Endpoint and Detect AI) designed for cybersecurity teams to tackle threat, network, endpoint detection and response, as well as security orchestration and automation.

Read more about NetWitness

Users also considered
HTTPCS Cyber Vigilance logo

Data leaks monitoring and cyber threats detection solution

learn more
Cybervigilance is a semi-automated, cloud-based OSINT and Cyber Threat Intelligence (CTI) solution that monitors the web, deep web and darknet for information leaks and indications of cyber threats, and alerts you 24/7 before the incident occurs.

Read more about HTTPCS Cyber Vigilance

Users also considered
Netwrix Threat Prevention logo

Prevent threats from becoming breaches

learn more
Spot threats early and block critical IT risks with Netwrix StealthINTERCEPT.

Read more about Netwrix Threat Prevention

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
JOUO logo

Cloud-based and AI-enabled cybersecurity application

learn more
JOUO is a cloud-based and AI-enabled cybersecurity application designed to assist small and midsize businesses with threat intelligence and vulnerability detection in the web infrastructure.

Read more about JOUO

Users also considered
Vortex logo

Cybersecurity and threat intelligence software

learn more
Vortex is a cloud-based cybersecurity platform that helps in threat prevention and detection. It offers threat prevention capabilities with its groundbreaking Simulation Intelligence and Signature-less detection technology. It supports several file types, such as Microsoft Office documents, PDFs, image files, audio, video files, and more. This approach helps in the thorough protection of user data.

Read more about Vortex

Users also considered
Heimdal Threat-hunting & Action Center logo

SIEM and threat intelligence solution

learn more
The Heimdal Threat-Hunting and Action Center is a comprehensive platform that offers advanced features to detect, analyze, and mitigate cyber threats in real-time. With a unified interface and a single pane of glass view, security teams can visualize and monitor their entire digital landscape.

Read more about Heimdal Threat-hunting & Action Center

Users also considered
NordStellar logo

Boost security with proactive threat management.

learn more
NordStellar is a threat exposure management platform that helps businesses detect and respond to cyber threats before they escalate. The platform provides complete visibility into digital risks, enabling security teams to monitor the deep and dark web for compromised data, detect account takeovers, and prevent session hijacking. NordStellar's innovative solution helps organizations safeguard their data, protect customer accounts, and mitigate the risk of cyberattacks.

Read more about NordStellar

Users also considered
Fidelis Endpoint logo

Comprehensive EDR protection on-premises and in the cloud

learn more
Fidelis Endpoint is an advanced endpoint detection and response (EDR) solution offering comprehensive security. It provides real-time monitoring and analysis of endpoint activities, incident response for swift threat containment, and forensic tools for post-incident analysis. Fidelis Endpoint helps detect and stop sophisticated threats throughout the attack lifecycle, while offering deep visibility into both managed and unmanaged endpoint activity on the network.

Read more about Fidelis Endpoint

Users also considered
SiON logo

Employee threat management platform

learn more
Threat intelligence is the collection and analysis of data about current and emerging cyber threats. It’s essential for anticipating attacks, strengthening defenses, and enabling faster, more informed security responses.

Read more about SiON

Users also considered
OpenText Core EDR logo

OpenText Core EDR built for MSPs and SMB organizations.

learn more
Built for MSPs, the cloud-based tool unifies endpoint protection, SIEM, SOAR, and alert triage to streamline multi-client security.

Read more about OpenText Core EDR

Users also considered