getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Threat Intelligence Software with Threat Protection (2026)

Last updated: March 2026

Key features of Threat Intelligence Software

Based on GetApp's analysis of verified user reviews collected between July 2021 and August 2024.

  • Monitoring: Reviewers highlight its ability to detect threats accurately, provide real-time alerts, and offer comprehensive oversight of system behavior. 91% of reviewers rated this feature as important or highly important.
  • Threat Response: Users value quick and effective threat isolation, real-time alerts, and robust data recovery capabilities. 89% of reviewers rated this feature as important or highly important.
  • Anomaly/Malware Detection: Reviewers appreciate its fast and accurate detection of malware and anomalies, with minimal false positives. 88% of reviewers rated this feature as important or highly important.
  • Vulnerability Scanning: Users emphasize its thoroughness in identifying system vulnerabilities and providing actionable remediation steps. 83% of reviewers rated this feature as important or highly important.
  • Alerts/Notifications: Reviewers note the importance of real-time, customizable alerts that keep users informed of potential threats. 82% of reviewers rated this feature as important or highly important.
  • Reporting/Analytics: Users find detailed, filterable reports and analytics useful for monitoring system activity and identifying trends. 76% of reviewers rated this feature as important or highly important.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


26 software options

ESET Endpoint Security logo
Category Leaders

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
Trellix Endpoint Security logo
Category Leaders

Computer security and endpoint protection platform

learn more
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.

Read more about Trellix Endpoint Security

Users also considered
Symantec Email Security.cloud logo

Anti-spam and email security software

learn more
Symantec Email Security.cloud is an anti-spam software designed to help businesses filter unwanted messages and protect the system from email-borne viruses. The platform offers data loss prevention functionality, which enables managers to encrypt and control sensitive data.

Read more about Symantec Email Security.cloud

Users also considered
DNSFilter logo

Cloud-based cybersecurity and network monitoring platform

learn more
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
Keepnet Labs logo

Extended Human Risk Management Platform, Empowered by AI

learn more
Handle phishing attacks 168x faster in analysis and 48x quicker in response. Exchange threats in trusted communities with 1M+ active threat hunters protecting you! Check whether your company’s data has been compromised by data breaches and take immediate action!

Read more about Keepnet Labs

Users also considered
Avanan logo

Email Security — Reinvented

learn more
Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365, G-Suite, and Slack. The platform deploys in one click via API.

Read more about Avanan

Users also considered
Deep Freeze logo

Endpoint protection and remote machine management software

learn more
Deep Freeze offers developers a set of enterprise solutions to protect, manage and optimize IT assets on a cloud-based platform. Key features include device management, activity tracking, application security, maintenance and scheduling, asset administration, data protection, and power management.

Read more about Deep Freeze

Users also considered
Zscaler logo

Secure your users, apps and data with Zero Trust + AI.

learn more
Zscaler is a cloud-native security platform offering Zero Trust access, advanced threat protection, and DLP for secure digital transformation. It protects users, apps & data by enabling secure web access, securing cloud apps & preventing cyber threats, all while simplifying IT operations at scale.

Read more about Zscaler

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
Acunetix logo

Cloud-based and automated web application security solution

learn more
Acunetix is a cybersecurity solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
Proofpoint Email Protection logo

Secure email gateway management and threat intelligence tool

learn more
Proofpoint Email Protection is a computer security management software designed to help businesses identify and block threats using AI-enabled tools. It offers an advanced business email compromise (BEC) defense feature, which enables administrators to analyze various attributes including message header and senders’ IP address.

Read more about Proofpoint Email Protection

Users also considered
Mail Assure logo

Email, Secured.

learn more
Cloud-based email security designed to help your customers stay in control while safeguarding their inbound and outbound email.

Read more about Mail Assure

Users also considered
AppTrana logo

Application Security Management Solution

learn more
AppTrana helps businesses monitor, detect, block & protect applications and websites against hack attempts, security threats & DDoS attacks. The vulnerability detection functionality lets users conduct automated security scans to ensure safety against unknown vulnerabilities.

Read more about AppTrana

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
INLYSE Malware.AI logo

VISUAL AI BASED MALWARE DETECTION

learn more
INLYSE Malware.AI is a revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for any signs of malware.

Read more about INLYSE Malware.AI

Users also considered
Darktrace logo

AI-enabled network and cybersecurity solution

learn more
Darktrace, founded in 2013 in Cambridge, UK, is a leader in AI cybersecurity, protecting 10,000+ global customers from evolving threats

Read more about Darktrace

Users also considered
Cisco Umbrella logo

Cloud-based enterprise network security solution

learn more
Cisco Umbrella is an enterprise network security solution that provides DNS-layer security to block threats before connections are established. The platform includes features such as secure web gateway, cloud access security broker, data loss prevention, cloud-delivered firewall, and malware protection. It leverages threat intelligence from Cisco Talos and operates on a global cloud infrastructure to protect users and devices across multiple locations.

Read more about Cisco Umbrella

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
Appgate SDP logo

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
Protegent Antivirus logo

Cloud-based security solution for businesses and individuals

learn more
Protegent Antivirus is a cloud-based security solution that helps businesses safeguard their computers from various malware threats. The tool offers real-time protection, data recovery, automatic updates, and more that help maintain system security.

Read more about Protegent Antivirus

Users also considered
Fortra's Cloud Email Protection logo

Defend against advanced phishing attacks.

learn more
With Agari Phishing Defense, users can prevent breach activity at the cloud gateway and proactively protect users from impersonation attacks.

Read more about Fortra's Cloud Email Protection

Users also considered
Vade logo

Collaborative cybersecurity based on IA, enhanced by people.

learn more
Vade is a global cybersecurity company specializing in the development of collaborative email security solutions. Combining human and machine intelligence, Vade's solutions form a cybersecurity alliance that is powered by AI and enhanced by people.

Read more about Vade

Users also considered
365 Total Protection logo

Email security management for Microsoft Office 365

learn more
365 Total Protection is an email security & compliance solution for Microsoft Office 365 with features for tracking emails in real time, handling infomail, blocking spam, filtering for compliance, defending against threats, black & whitelisting, archiving emails, analyzing communications, & more

Read more about 365 Total Protection

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered