getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Threat Intelligence Software with Real-Time Analytics (2026) - Page 2

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


54 software options

Quadrant XDR logo

Around-the-clock threat detection and response

learn more
Quadrant XDR is a cloud-based security analytics platform developed by Quadrant Managed Detection and Response. It is designed to provide businesses with around-the-clock threat detection and response, curated by the highest quality Security Analysts in the industry.

Read more about Quadrant XDR

Users also considered
ManageEngine Log360 Cloud logo

Cloud SIEM solution for a secure IT infrastructure

learn more
ManageEngine Log360 Cloud is a unified cloud SIEM solution with integrated CASB capabilities that helps enterprises secure their network from cyberattacks. With its security analytics, threat intelligence, and incident management capabilities, Log360 Cloud helps security analysts spot, prioritize, and resolve issues.

Read more about ManageEngine Log360 Cloud

Users also considered
MixMode logo

Self-learning Platform to Defend Against Cyber Attacks

learn more
MixMode is a dynamic attack detection solution purpose-built on patented AI to detect known and novel attacks in real-time, at scale. The MixMode Platform autonomously ingests and analyzes data at scale to cut through the noise, surface critical threats, and improve overall defense.

Read more about MixMode

Users also considered
Cyabra logo

Restoring trust and authenticity online.

learn more
Cyabra restores trust and authenticity for global enterprises and governments by analyzing actors, behaviors, and content, and translating evidence into clear mitigation steps at scale.

Read more about Cyabra

Users also considered
Techowlshield logo

"Defending Your Digital Domain Against the UNSEEN ENEMY"

learn more
TechOwl Shield offers a real-time, AI-powered view of your cybersecurity threats, helping you identify and prioritize vulnerabilities for around-the-clock data protection.

Read more about Techowlshield

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Verimatrix XTD logo

Prevent, detect, respond and predict threats on mobile apps.

learn more
Verimatrix XTD employs advanced obfuscation, anti-tamper and environmental checks to shield Android and iOS mobile apps from attack. Its extensive suite of cybersecurity capabilities spans mobile, embedded, desktop, and web platforms, including browsers, JavaScript, various frameworks and libraries.

Read more about Verimatrix XTD

Users also considered
Resecurity Risk logo

Supply chain monitoring platform

learn more
Resecurity Risk is a supply chain monitoring platform that tracks risks, provides alerts, and manages threats. The platform integrates data from multiple sources and offers an interface for deep-dive investigation.

Read more about Resecurity Risk

Users also considered
ThreatBolt logo

Threat intelligence-sharing platform for SOCs and MSSPs

learn more
CyberXTron's ThreatBolt is a platform that provides SOCMSSP organizations with high-fidelity threat intelligence feeds in real-time. Leveraging advanced AIML-powered engines, the platform delivers precise risk scores and threat enrichment to empower security teams and minimize false positives.

Read more about ThreatBolt

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.

Read more about TEHTRIS XDR Platform

Users also considered
Netacea Bot Management logo

Netacea protects websites, mobile apps and APIs from bots.

learn more
Netacea Bot Management is a cloud-based solution which protects mobile applications, websites & application programming interfaces (APIs) from various online threats such as scraping, credential stuffing, & more. An Intent Analytics engine uses machine learning to distinguish bots from humans.

Read more about Netacea Bot Management

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that monitors, tracks, and manages threats across multiple cloud applications & environments.

Read more about Wiz

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
Network Detection and Response logo

Network visibility, threat detection and forensic analysis

learn more
Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. It accelerates the ability for organizations to respond to and identify future attacks before they become serious events.

Read more about Network Detection and Response

Users also considered
Cisco Secure Firewall logo

Firewall solution with threat intelligence

learn more
Cisco Secure Firewall is a cloud-based Firewall system that provides security for public, containerized, virtual, physical, and private firealls. Additionally, the software provides threat intelligence to maintain control of enterprise level encrypted traffic and application environments. Secure Firewall can be used across hybrid and multicloud environments along with integration with other Cisco security products to provide visibility across an entire system.

Read more about Cisco Secure Firewall

Users also considered
HTTPCS Cyber Vigilance logo

Data leaks monitoring and cyber threats detection solution

learn more
Cybervigilance is a semi-automated, cloud-based OSINT and Cyber Threat Intelligence (CTI) solution that monitors the web, deep web and darknet for information leaks and indications of cyber threats, and alerts you 24/7 before the incident occurs.

Read more about HTTPCS Cyber Vigilance

Users also considered
Agari Secure Email Cloud logo

Email security and cybersecurity software

learn more
Agari Secure Email Cloud is an email security and cybersecurity software that helps businesses in finance, healthcare, retail, legal, and IT industry segments identify and prevent spear phishing, account takeovers, and email compromise-based attacks. With the incident response functionality, staff members can prioritize tasks and conduct attachments, URLs, and sender forensics-based investigations.

Read more about Agari Secure Email Cloud

Users also considered
Arkose Labs logo

Stop online account attacks in hours, permanently

learn more
Arkose Labs is a global online account security and bot detection and prevention company that works with the largest enterprises in the world to stop SMS toll fraud, credential stuffing, account takeovers, fake account registration, inventory hoarding, malicious scraping, genAI abuse, and more.

Read more about Arkose Labs

Users also considered
NexVision Engine logo

AI-Powered OSINT Open Source Intelligence Platform

learn more
NexVision is an advanced A.I.-powered OSINT solution that provides real-time intelligence from the Whole Web (Clear Web, Dark Web and Social Media). It provides unprecedented access to dark web searches through regular browsers like Chrome and Safari, without the use of anonymising browser Tor.

Read more about NexVision Engine

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
Vortex logo

Cybersecurity and threat intelligence software

learn more
Vortex is a cloud-based cybersecurity platform that helps in threat prevention and detection. It offers threat prevention capabilities with its groundbreaking Simulation Intelligence and Signature-less detection technology. It supports several file types, such as Microsoft Office documents, PDFs, image files, audio, video files, and more. This approach helps in the thorough protection of user data.

Read more about Vortex

Users also considered
NordStellar logo

Boost security with proactive threat management.

learn more
NordStellar is a threat exposure management platform that helps businesses detect and respond to cyber threats before they escalate. The platform provides complete visibility into digital risks, enabling security teams to monitor the deep and dark web for compromised data, detect account takeovers, and prevent session hijacking. NordStellar's innovative solution helps organizations safeguard their data, protect customer accounts, and mitigate the risk of cyberattacks.

Read more about NordStellar

Users also considered
SiON logo

Employee threat management platform

learn more
Threat intelligence is the collection and analysis of data about current and emerging cyber threats. It’s essential for anticipating attacks, strengthening defenses, and enabling faster, more informed security responses.

Read more about SiON

Users also considered
Fidelis Endpoint logo

Comprehensive EDR protection on-premises and in the cloud

learn more
Fidelis Endpoint is an advanced endpoint detection and response (EDR) solution offering comprehensive security. It provides real-time monitoring and analysis of endpoint activities, incident response for swift threat containment, and forensic tools for post-incident analysis. Fidelis Endpoint helps detect and stop sophisticated threats throughout the attack lifecycle, while offering deep visibility into both managed and unmanaged endpoint activity on the network.

Read more about Fidelis Endpoint

Users also considered