getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Threat Intelligence Software with Prioritization (2026) - Page 2

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


53 software options

Dark Atlas logo

Dark-web monitoring & exposure discovery platform

learn more
Dark Atlas is a dark-web monitoring platform that specializes in fighting against information stealer malware.

Read more about Dark Atlas

Users also considered
Secureworks logo

Threat intelligence and cybersecurity software

learn more
Secureworks is a cybersecurity software designed to help businesses detect, investigate, and remediate threats and vulnerabilities. Key features of the platform include endpoint visibility, AI-based detections, context-based vulnerability prioritization, machine vulnerability scanning, and web application security testing.

Read more about Secureworks

Users also considered
SafeGuard Cyber logo

Online communication channel cybersecurity software.

learn more
SafeGuard is a cybersecurity software for business communication channels.

Read more about SafeGuard Cyber

Users also considered
Pentera logo

Emulating real-life attacks on all cybersecurity layers

learn more
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Defense In Depth logo

Empowering cyber defense for businesses.

learn more
Defense In Depth offers comprehensive cyber security solutions including cyber security risk assessments, system auditing, IT security policies, and risk registers. These services aim to identify potential vulnerabilities and assess overall security posture by reviewing hardware, software, network architecture, access controls, policies, procedures, and employee awareness.

Read more about Defense In Depth

Users also considered
ThreatBolt logo

Threat intelligence-sharing platform for SOCs and MSSPs

learn more
CyberXTron's ThreatBolt is a platform that provides SOCMSSP organizations with high-fidelity threat intelligence feeds in real-time. Leveraging advanced AIML-powered engines, the platform delivers precise risk scores and threat enrichment to empower security teams and minimize false positives.

Read more about ThreatBolt

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.

Read more about TEHTRIS XDR Platform

Users also considered
Lacework logo

Cloud security & compliance platform

learn more
Lacework is a cloud security and compliance software which provides automated intrusion detection, threat defence, one-click investigation, and compliance across AWS, Azure, GCP, and private clouds, giving users a comprehensive view of risks across their cloud workloads and containers.

Read more about Lacework

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Critical Insight logo

Threat detection & response software.

learn more
Critical Insight is a cloud-based software specifically designed for businesses that provides managed detection and response services.

Read more about Critical Insight

Users also considered
Flowmon ADS logo

Intelligent Detection Engine for Network Anomalies

learn more
Flowmon Anomaly Detection System is an advanced solution capable of analyzing network traffic to identify anomalies and detect malicious behavior.

Read more about Flowmon ADS

Users also considered
Flowmon ADS logo

Intelligent Detection Engine for Network Anomalies

learn more
Flowmon Anomaly Detection System is an advanced solution capable of analyzing network traffic to identify anomalies and detect malicious behavior.

Read more about Flowmon ADS

Users also considered
Fidelis Elevate logo

Extended Detection and Response (XDR) Cybersecurity Platform

learn more
Fidelis Elevate is a cloud-based XDR Solution that delivers endpoint security, network security, deception, and Active Directory protection in a single platform.

Read more about Fidelis Elevate

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that monitors, tracks, and manages threats across multiple cloud applications & environments.

Read more about Wiz

Users also considered
MetricStream CyberGRC logo

IT Risk identification and assessment management software

learn more
MetricStream Cyber GRC integrates threat intelligence with risk and compliance management. AI-driven dashboards, automated workflows, and incident tracking help organizations detect vulnerabilities, assess threats, prioritize responses, and strengthen enterprise-wide cybersecurity.

Read more about MetricStream CyberGRC

Users also considered
IntSights logo

Endpoint threat intelligence and protection suite

learn more
IntSights is an external threat intelligence and protection suite designed to help businesses in financial services, manufacturing, retail, food & beverage, insurance, automotive, and other sectors monitor, detect and mitigate risks that impact digital footprints for brands.

Read more about IntSights

Users also considered
Cyware logo

Agentic AI-Powered Threat Intelligence Management

learn more
Cyware enables security teams at leading global organizations to operationalize threat intelligence data and execute real-time actions by integrating intelligence management, automating workflows, and promoting secure collaboration for a stronger, unified defense.

Read more about Cyware

Users also considered
IBM Cloud Pak for Security logo

Open security platform for hybrid, multi-cloud environments

learn more
IBM Cloud Pak for Security provides threat intelligence insights for hybrid, multi-cloud environments. By integrating tools and automating workflows, this platform is designed to help data security teams mitigate risk and streamline incident response. It provides an AI-enabled unified dashboard with customized threat scoring, federated search for all data sources, automated case creation, and more.

Read more about IBM Cloud Pak for Security

Users also considered
NexVision Engine logo

AI-Powered OSINT Open Source Intelligence Platform

learn more
NexVision is an advanced A.I.-powered OSINT solution that provides real-time intelligence from the Whole Web (Clear Web, Dark Web and Social Media). It provides unprecedented access to dark web searches through regular browsers like Chrome and Safari, without the use of anonymising browser Tor.

Read more about NexVision Engine

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
JOUO logo

Cloud-based and AI-enabled cybersecurity application

learn more
JOUO is a cloud-based and AI-enabled cybersecurity application designed to assist small and midsize businesses with threat intelligence and vulnerability detection in the web infrastructure.

Read more about JOUO

Users also considered
Heimdal Threat-hunting & Action Center logo

SIEM and threat intelligence solution

learn more
The Heimdal Threat-Hunting and Action Center is a comprehensive platform that offers advanced features to detect, analyze, and mitigate cyber threats in real-time. With a unified interface and a single pane of glass view, security teams can visualize and monitor their entire digital landscape.

Read more about Heimdal Threat-hunting & Action Center

Users also considered
Edgewatch logo

External attack surface management platform

learn more
Edgewatch attack surface management platform assists companies with discovering, monitoring, and analyzing devices accessible from the Internet.

Read more about Edgewatch

Users also considered