getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Online Threat Intelligence Software - Page 2

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


152 software options

Keepnet Labs logo

Extended Human Risk Management Platform, Empowered by AI

learn more
Handle phishing attacks 168x faster in analysis and 48x quicker in response. Exchange threats in trusted communities with 1M+ active threat hunters protecting you! Check whether your company’s data has been compromised by data breaches and take immediate action!

Read more about Keepnet Labs

Users also considered
Avanan logo

Email Security — Reinvented

learn more
Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365, G-Suite, and Slack. The platform deploys in one click via API.

Read more about Avanan

Users also considered
CylanceENDPOINT logo

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about CylanceENDPOINT

Users also considered
Resolver logo

Risk platform for enterprise resilience

learn more
Resolver’s Threat Protection application is a fully integrated case management solution that ensures potential threats are evaluated comprehensively to help determine the right course of action.

Read more about Resolver

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
Regroup Mass Notification logo

Cloud-based mass notification software

learn more
A push notification solution for organizations with features for multiple department communication, multi device integration, and more.

Read more about Regroup Mass Notification

Users also considered
ConnectWise SIEM logo

Threat detection and response management software

learn more
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.

Read more about ConnectWise SIEM

Users also considered
OpenText Core DNS Protection logo

Network security and DNS protection software

learn more
OpenText™ Core DNS is a network security software that helps businesses enforce web access policies, reduce cyberattacks, prevent cache poisoning, and more from within a centralized platform.

Read more about OpenText Core DNS Protection

Users also considered
Blackpoint MDR logo
Category Leaders

Fully managed integrated defense system.

learn more
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline security. Blackpoint MDR technology is purpose-built to provide an agile response to attacks, offering continuous visibility and protection across an ever-changing attack surface.

Read more about Blackpoint MDR

Users also considered
Deep Freeze logo

Endpoint protection and remote machine management software

learn more
Deep Freeze offers developers a set of enterprise solutions to protect, manage and optimize IT assets on a cloud-based platform. Key features include device management, activity tracking, application security, maintenance and scheduling, asset administration, data protection, and power management.

Read more about Deep Freeze

Users also considered
Zoho Vault logo

Online Password Manager for Teams

learn more
Secure cloud-based password management, organization, and sharing in the cloud with 256-bit encryption, user access control, and activity tracking

Read more about Zoho Vault

Users also considered
Trend Micro Smart Protection Complete Suite logo

Security and threat management solution

learn more
Trend Micro Smart Protection Complete Suite, powered by Trend Micro's groundbreaking Enterprise Security Suite (ESS) and fortified with Managed XDR is a cutting-edge managed detection and response solution.

Read more about Trend Micro Smart Protection Complete Suite

Users also considered
Zscaler logo

Secure your users, apps and data with Zero Trust + AI.

learn more
Zscaler is a cloud-native security platform offering Zero Trust access, advanced threat protection, and DLP for secure digital transformation. It protects users, apps & data by enabling secure web access, securing cloud apps & preventing cyber threats, all while simplifying IT operations at scale.

Read more about Zscaler

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
Acunetix logo

Cloud-based and automated web application security solution

learn more
Acunetix is a cybersecurity solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
IPQS logo

Fraud prevention solution for proactively detecting fraud

learn more
IPQS, an unparalleled fraud prevention solution powered by fresh data. Detect fraud in real-time, score mobile traffic, identify high-risk users, and block abusive behavior. Ensure lead quality with data verification. Choose IPQS for proactive fraud prevention and a frictionless user experience.

Read more about IPQS

Users also considered
Proofpoint Email Protection logo

Secure email gateway management and threat intelligence tool

learn more
Proofpoint Email Protection is a computer security management software designed to help businesses identify and block threats using AI-enabled tools. It offers an advanced business email compromise (BEC) defense feature, which enables administrators to analyze various attributes including message header and senders’ IP address.

Read more about Proofpoint Email Protection

Users also considered
Mail Assure logo

Email, Secured.

learn more
Cloud-based email security designed to help your customers stay in control while safeguarding their inbound and outbound email.

Read more about Mail Assure

Users also considered
Xcitium Endpoint Detection & Resonse logo

Gain full context of a ransomware attack

learn more
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat Response (EDTR), represents an advanced endpoint solution designed for the continuous monitoring of endpoint devices. This solution aims to detect and respond effectively to a wide array of major threats, including but not limited to malware and ransomware.

Read more about Xcitium Endpoint Detection & Resonse

Users also considered
AppTrana logo

Application Security Management Solution

learn more
AppTrana helps businesses monitor, detect, block & protect applications and websites against hack attempts, security threats & DDoS attacks. The vulnerability detection functionality lets users conduct automated security scans to ensure safety against unknown vulnerabilities.

Read more about AppTrana

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
INLYSE Malware.AI logo

VISUAL AI BASED MALWARE DETECTION

learn more
INLYSE Malware.AI is a revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for any signs of malware.

Read more about INLYSE Malware.AI

Users also considered
Apex One logo

Endpoint protection and threat intelligence software

learn more
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities.

Read more about Apex One

Users also considered
Darktrace logo

AI-enabled network and cybersecurity solution

learn more
Darktrace, founded in 2013 in Cambridge, UK, is a leader in AI cybersecurity, protecting 10,000+ global customers from evolving threats

Read more about Darktrace

Users also considered
DataDome logo

Anti-bot protection software to block unwanted traffic

learn more
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Users also considered