App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Threat Intelligence Software - Page 4

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

151 software options

Sponsored

Filter results



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

Holm Security VMP logo
4.4
(5)

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
SiteLock logo
3.1
(24)

Threat intelligence software for eCommerce businesses

learn more
SiteLock is a static application security testing (SAST) software designed to help businesses protect websites against malware and distributed denial-of-service (DDoS) attacks. Key features of the platform include threat detection, database scanning, bad bot blocking, automated plugin patching, security vulnerability repair, and website acceleration.

Read more about SiteLock

Users also considered
ThisData logo
5.0
(3)

Advanced Security for data stored in the cloud

learn more
Get login anomaly detection and continuous authentication for your app. Automate security workflows, reduce incident response times and support load.

Read more about ThisData

Users also considered
Threat Detection Marketplace logo
5.0
(3)

SaaS content and threat detection platform

learn more
Threat Detection Marketplace (TDM) is a SaaS content platform that helps businesses identify cybersecurity threats using endpoint detection and response (EDR), security information event management (SIEM), and security orchestration, automation, and response (SOAR) tools.

Read more about Threat Detection Marketplace

Users also considered
MixMode logo
4.7
(3)

Self-learning Platform to Defend Against Cyber Attacks

learn more
MixMode delivers a patented, self-learning platform that acts as the Cybersecurity Intelligence Layer℠ to detect both known and unknown attacks, including novel attacks designed to bypass legacy cyber defenses.

Read more about MixMode

Users also considered
Dark Atlas logo
4.7
(3)

Dark-web monitoring & exposure discovery platform

learn more
Dark Atlas is a dark-web monitoring platform that specializes in fighting against information stealer malware.

Read more about Dark Atlas

Users also considered
Strobes RBVM logo
5.0
(2)

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Secureworks logo
5.0
(2)

Threat intelligence and cybersecurity software

learn more
Secureworks is a cybersecurity software designed to help businesses detect, investigate, and remediate threats and vulnerabilities. Key features of the platform include endpoint visibility, AI-based detections, context-based vulnerability prioritization, machine vulnerability scanning, and web application security testing.

Read more about Secureworks

Users also considered
Prophaze WAF logo
5.0
(2)

WAF-as-a-Service for protecting APIs and web applications

learn more
Prophaze WAF is a cybersecurity software designed to help DevOps teams in manufacturing, healthcare, and educational industries, manage Kubernetes deployments to protect web assets from cyber threats, misconfiguration, attacks, bots, and patch vulnerabilities.

Read more about Prophaze WAF

Users also considered
ThreatSTOP DNS Defense logo
5.0
(2)

SaaS automated protective DNS security (PDNS)

learn more
ThreatSTOP DNS Defense enables true protective DNS (PDNS) with continuous updates from 900+ threat intelligence sources. DNS Defense turns existing DDI/IPAM or DNS Servers into security enforcement points that stop dangerous and unwanted traffic before damage is done.

Read more about ThreatSTOP DNS Defense

Users also considered
SafeGuard Cyber logo
5.0
(2)

Online communication channel cybersecurity software.

learn more
SafeGuard is a cybersecurity software for business communication channels.

Read more about SafeGuard Cyber

Users also considered
Resecurity Risk logo
5.0
(2)

Supply chain monitoring platform

learn more
Resecurity Risk is a supply chain monitoring platform that tracks risks, provides alerts, and manages threats. The platform integrates data from multiple sources and offers an interface for deep-dive investigation.

Read more about Resecurity Risk

Users also considered
TEHTRIS XDR Platform logo
4.3
(3)

Consolidate all your cyber solutions in a single console

learn more
Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.

Read more about TEHTRIS XDR Platform

Users also considered
Citrix Web Firewall logo
4.5
(2)

Cloud-based firewall for web applications.

learn more
Citrix Web Application Firewall helps organizations block malicious threats that target web applications, including threats that target open protocols such as HTTP, HTTPS and FTP. In addition to filtering by URL and headers, scripting languages can be protected by detecting script signatures.

Read more about Citrix Web Firewall

Users also considered
InsightIDR logo
4.5
(2)

Cloud-based cybersecurity tool for developers.

learn more
InsightIDR is a cloud-based cybersecurity solution, which helps businesses in food and beverage, cosmetics, media, and other sectors manage extended detection and response (XDR) across networks. The platform provides several functions such as endpoint detection and response (EDR), threat intelligence, traffic analysis, behavioral analytics, security information and event management (SIEM), log search, and data collection.

Read more about InsightIDR

Users also considered
ManageEngine PAM360 logo
5.0
(1)

Complete privileged access security for enterprises

learn more
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Users also considered
CipherBox logo
5.0
(1)

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Lacework logo
5.0
(1)

Cloud security & compliance platform

learn more
Lacework is a cloud security and compliance software which provides automated intrusion detection, threat defence, one-click investigation, and compliance across AWS, Azure, GCP, and private clouds, giving users a comprehensive view of risks across their cloud workloads and containers.

Read more about Lacework

Users also considered
CloudJacketXi logo
5.0
(1)

Managed Cybersecurity Platform with 24/7 SOC Monitoring

learn more
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.

Read more about CloudJacketXi

Users also considered
SOAR Tools logo
5.0
(1)

SOAR stands for Security Orchestration, Automation, and Resp

learn more
SOAR tools are mostly used for incident response, orchestration of workflows, and automation. Threat intelligence management is a vital SOAR Tool functionality.

Read more about SOAR Tools

Users also considered
NetWitness logo
5.0
(1)

Threat Detection & Response platform for cybersecurity teams

learn more
Netwitness is a suite of products (including Netwitness Platform, Network, Logs, Orchestrator, Endpoint and Detect AI) designed for cybersecurity teams to tackle threat, network, endpoint detection and response, as well as security orchestration and automation.

Read more about NetWitness

Users also considered
blacklens.io logo
(0)

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
Netacea Bot Management logo
5.0
(1)

Netacea protects websites, mobile apps and APIs from bots.

learn more
Netacea Bot Management is a cloud-based solution which protects mobile applications, websites & application programming interfaces (APIs) from various online threats such as scraping, credential stuffing, & more. An Intent Analytics engine uses machine learning to distinguish bots from humans.

Read more about Netacea Bot Management

Users also considered
Fyde logo
5.0
(1)

Network security & access management solution

learn more
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management.

Read more about Fyde

Users also considered
Skurio logo
5.0
(1)

Digital risk protection solution

learn more
Skurio Digital Risk Protection is a secure SaaS solution that automatically monitors the surface, deep and Dark Web to identify external threats and breaches that are specific to your organisation. It has three main solutions: Cyber Threat Intelligence, Dark Web Monitoring, and Data Breach Detection.

Read more about Skurio

Users also considered