App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Threat Intelligence Software - Page 2

136 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Domotz logo

Domotz

5.0
(87)

Network Monitoring & Management in an IoT World.

learn more
Discover why MSPs, IT Professionals, and System Integrators trust our Network Monitoring and Management Solution to monitor thousands of networks worldwide.

Read more about Domotz

Users also considered
GoodAccess logo

GoodAccess

4.9
(90)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess creates an encrypted network that hides your assets from the internet, controls authorized access. In 10 minutes you create a resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Symantec Email Security.cloud logo

Symantec Email Security.cloud

4.5
(159)

Anti-spam and email security software

learn more
Symantec Email Security.cloud is an anti-spam software designed to help businesses filter unwanted messages and protect the system from email-borne viruses. The platform offers data loss prevention functionality, which enables managers to encrypt and control sensitive data.

Read more about Symantec Email Security.cloud

Users also considered
Netwrix Auditor logo

Netwrix Auditor

4.5
(143)

Ease the burden of IT auditing

learn more
Automate many of the security, compliance and IT operations tasks that previously required hours to complete, so you can keep your organization secure and compliant without constantly being overburdened.

Read more about Netwrix Auditor

Users also considered
SentinelOne logo

SentinelOne

4.8
(78)

Autonomous endpoint protection platform

learn more
DataSet is a next-generation, autonomous endpoint/server protection platform that protects organizations against attacks utilizing key features such as machine learning, behavioral attack detection, automated responses, and real-time forensics, with complete visibility into all activity

Read more about SentinelOne

Users also considered
Delivery Trust logo

Delivery Trust

4.8
(67)

Email Encryption Platform

learn more
Delivery Trust is a user-friendly secure email solution to protect critical information.

Read more about Delivery Trust

Users also considered
Teramind logo

Teramind

4.6
(86)

Employee Monitoring, Insider Threat & Data Loss Prevention

learn more
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks. Monitor your employees from your phone and tablet with Teramind Android App.

Read more about Teramind

Users also considered
Automox logo

Automox

4.8
(71)

Cloud-based platform for patch management

learn more
Automox is a cloud-based cyber hygiene and patch management solution that helps enterprises streamline endpoint protection and minimize cyber threats across all devices. The centralized platform provides users with an overview of devices requiring patch approvals, system updates, or troubleshooting.

Read more about Automox

Users also considered
Perimeter 81 logo

Perimeter 81

4.8
(65)

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading network cybersecurity solution offering secure remote access and network capabilities managed over a multi-tenant cloud and highly scalable for organizations worldwide.

Read more about Perimeter 81

Users also considered
Orca Security logo

Orca Security

4.8
(56)

Thrive Securely in the Cloud

learn more
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Read more about Orca Security

Users also considered
Avanan logo

Avanan

4.8
(49)

Email Security — Reinvented

learn more
Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365, G-Suite, and Slack. The platform deploys in one click via API.

Read more about Avanan

Users also considered
BlackBerry CylancePROTECT logo

BlackBerry CylancePROTECT

4.6
(64)

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about BlackBerry CylancePROTECT

Users also considered
Blackpoint MDR logo

Blackpoint MDR

4.8
(33)

Fully managed integrated defense system.

learn more
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline security. Blackpoint MDR technology is purpose-built to provide an agile response to attacks, offering continuous visibility and protection across an ever-changing attack surface.

Read more about Blackpoint MDR

Users also considered
Zoho Vault logo

Zoho Vault

4.6
(43)

Online Password Manager for Teams

learn more
Secure cloud-based password management, organization, and sharing in the cloud with 256-bit encryption, user access control, and activity tracking

Read more about Zoho Vault

Users also considered
Trend Micro Smart Protection Complete Suite logo

Trend Micro Smart Protection Complete Suite

4.1
(74)

Security and threat management solution

learn more
Trend Micro Smart Protection Complete Suite, powered by Trend Micro's groundbreaking Enterprise Security Suite (ESS) and fortified with Managed XDR is a cutting-edge managed detection and response solution.

Read more about Trend Micro Smart Protection Complete Suite

Users also considered
Falcon logo

Falcon

4.7
(29)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
ManageEngine ADAudit Plus logo

ManageEngine ADAudit Plus

4.3
(42)

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits

Read more about ManageEngine ADAudit Plus

Users also considered
Acunetix logo

Acunetix

4.4
(34)

All-in-one automated web application security solution

learn more
Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
Mail Assure logo

Mail Assure

4.5
(29)

Email, Secured.

learn more
Cloud-based email security designed to help your customers stay in control while safeguarding their inbound and outbound email.

Read more about Mail Assure

Users also considered
IPQS logo

IPQS

4.9
(17)

Fraud prevention solution for proactively detecting fraud

learn more
IPQS, an unparalleled fraud prevention solution powered by fresh data. Detect fraud in real-time, score mobile traffic, identify high-risk users, and block abusive behavior. Ensure lead quality with data verification. Choose IPQS for proactive fraud prevention and a frictionless user experience.

Read more about IPQS

Users also considered
Zscaler logo

Zscaler

4.3
(38)

Cloud-based secure internet and web gateway

learn more
Zscaler is a cloud-based secure internet and web gateway designed to help businesses manage IT security across multiple devices, users, corporate infrastructure, and locations. Its ByteScan engine inspects each inbound and outbound byte, Secure Sockets Layer (SSL) traffic, and other inline content from within a unified platform.

Read more about Zscaler

Users also considered
SanerNow logo

SanerNow

4.5
(27)

Integrated platform for endpoint protection across devices

learn more
SecPod SanerNow is an integrated platform that helps businesses secure system devices and monitor potential threats across digital assets via patch management, endpoint detection & response (EDR), and more. Key features include regulatory compliance, asset management, audit trails, and reporting.

Read more about SanerNow

Users also considered
AppTrana logo

AppTrana

4.6
(24)

Application Security Management Solution

learn more
AppTrana helps businesses monitor, detect, block & protect applications and websites against hack attempts, security threats & DDoS attacks. The vulnerability detection functionality lets users conduct automated security scans to ensure safety against unknown vulnerabilities.

Read more about AppTrana

Users also considered
INLYSE Malware.AI logo

INLYSE Malware.AI

5.0
(14)

VISUAL AI BASED MALWARE DETECTION

learn more
INLYSE Malware.AI is a revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for any signs of malware.

Read more about INLYSE Malware.AI

Users also considered
Invicti logo

Invicti

4.7
(18)

Security scanning & vulnerability management

learn more
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.

Read more about Invicti

Users also considered