Best Threat Intelligence Software

Products Buyer's Guide
9.2
Authentic8 Silo
★★★★★

Authentic8 Silo

Authentic8 Silo is a secure virtual browser in the cloud designed to insulate and isolate web data. Silo is built fresh on launch and executes all web code in a secure sandbox. Users connect via a secure RDP connection, giving full interactivity of web sites while creating a perfect insulation layer between the device and the web.

A better experience when sailing with elevator. - Kimberly P.

Ease of use
8.8
Support
9.3
Ease of Setup
0.0

Languages supported: English

9.8
Echosec Systems
★★★★★

Echosec Systems

Echosec is location based meta-data in digital publications allows you to search physical regions for messages, images, videos and more.

Beyond My Expectations! Must Have for LE & Investigators!! - Samantha G.

Ease of use
9.4
Support
9.9
Ease of Setup
9.4

Languages supported: Afrikaans, Arabic, Azerbaijani, Belarusian, Bengali, Bosnian, Bulgarian, Catalan, Cebuano, Czech, Welsh, Danish, German, Greek, English, Esperanto, Estonian, Basque, Persian, Finnish, French, Irish, Galician, Gujarati, Haitian, Hebrew, Hindi, Croatian, Hungarian, Armenian, Indonesian, Icelandic, Italian, Javanese, Japanese, Kannada, Georgian, Kazakh, Central Khmer, Korean, Latin, Latvian, Lithuanian, Malayalam, Marathi, Macedonian, Malagasy, Mongolian, Malay, Nepali, Norwegian, Punjabi, Polish, Portuguese, Romanian, Russian, Sinhala, Slovak, Slovenian, Somali, Spanish, Albanian, Serbian, Sundanese, Swahili, Swedish, Tamil, Telugu, Tajik, Thai, Turkish, Ukrainian, Urdu, Uzbek, Vietnamese, Yiddish, Yoruba, Chinese (Simplified), Chinese (Traditional), Maltese, Maori

9.4
FortiGate NGFW
★★★★★

FortiGate NGFW

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Best security from the Fortigate NGFW - Janith R.

Ease of use
9.1
Support
9.4
Ease of Setup
9.1
9.4
CrowdStrike Falcon: Endpoint Protection
★★★★★

CrowdStrike Falcon: Endpoint Protection

CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.

The next gen cloud based AV that works - Julio L.

Ease of use
9.0
Support
9.5
Ease of Setup
0.0

Languages supported: English

7.8
McAfee Threat Intelligence Exchange
★★★★★

McAfee Threat Intelligence Exchange

McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.

MCAFEE the best protection system for your data and computer devices - Laurence B.

Ease of use
8.4
Support
7.4
Ease of Setup
8.5
9.2
Threatwatch
★★★★★

Threatwatch

Threatwatch is a next-gen vulnerability management platform that allows DevOps teams to assess code repositories, containers and infrastructure without scanner appliances or bulky agents

Best in class, great team, great product!!! - Om S.

Ease of use
Support
Ease of Setup

Languages supported: English

8.2
Lookout
★★★★★

Lookout

Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.

A continuous protection system !!! - Ana M.

Ease of use
8.7
Support
8.1
Ease of Setup
8.7
5.6
Check Point SandBlast Network
★★★★★

Check Point SandBlast Network

Check Point's multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Zero-day treats protection - Oleg P.

Ease of use
Support
Ease of Setup
10.0
LMNTRIX
★★★★★

LMNTRIX

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we created new methods for confounding even the most advanced attackers. We believe that in a time of continuous compromise you need continuous response – not incident response. Our approach turns inward and assumes that you're already breached and that ...

LMNTRIX will always win in my playbook! They keep out the Threats, so YOU don't have to sweat! - Henry D.

Ease of use
Support
Ease of Setup

Languages supported: English

10.0
Threat Intelligence API Platform
★★★★★

Threat Intelligence API Platform

We provide threat intelligence APIs with comprehensive information on hosts and the infrastructure behind them. By combining data obtained from various providers, our own exhaustive internal databases, and by analyzing host configuration in real-time, we provide threat intelligence APIs that offer an in-depth perspective on the target host and crucial threat detection for any system.

Vetting Prospective Clients with Threat Intel Data - Lohan A.

Ease of use
Support
Ease of Setup
9.0
Cisco Talos
★★★★★

Cisco Talos

Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.

Reliable and Transparent - Excellent Security Tool - Esteban G.

Ease of use
8.9
Support
9.1
Ease of Setup
9.0
9.6
Exabeam Security Management Platform
★★★★★

Exabeam Security Management Platform

The Exabeam Security Management Platform provides organizations of all sizes with comprehensive, end-to-end detection, analytics, and response capabilities from a single security management and operations platform.

Exabeam Security Management Platform - User in Financial Services

Ease of use
Support
Ease of Setup

Languages supported: English, Japanese

9.0
ThreatConnect
★★★★★

ThreatConnect

ThreatConnect is a in-platform analytics and automation solution.

Investigate, validate, respond and solve any kind of threat with threat connect. - Salome W.

Ease of use
Support
Ease of Setup
10.0
Whois API Webservice
★★★★★

Whois API Webservice

Provides the registration details, also known as the Whois Record, of a domain name or an IP address.

WHOIS API Making Brand Protection a Breeze - Agency in Media Production

Ease of use
Support
Ease of Setup
10.0
N-able MSP Risk Intelligence
★★★★★

N-able MSP Risk Intelligence

N-able MSP Risk Intelligence makes it concrete by assigning value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tackle.

A needed product - Jose D.

Ease of use
Support
Ease of Setup
9.4
SIRP
★★★★★

SIRP

SIRP Security orchestration and automation platform helps you improve response time, reduce risk exposure, and maintain consistency of your process across your security program.

Data Aggregation, Ease of Access and Quick Reporting - Iqra Z.

Ease of use
9.5
Support
9.4
Ease of Setup
9.3

Languages supported: English

9.2
Dataminr
★★★★★

Dataminr

Real-time Information Discovery

Dataminr for SOC - Shannon L.

Ease of use
8.9
Support
9.2
Ease of Setup
8.3

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

9.6
Cisco Threat Grid
★★★★★

Cisco Threat Grid

Threat Grid combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware. With a robust, context-rich malware knowledge base, you will understand what malware is doing, or attempting to do, how large a threat it poses, and how to defend against it.

Efficient and easy - User in Information Technology and Services

Ease of use
Support
Ease of Setup
9.0
ThreatCloud IntelliStore
★★★★★

ThreatCloud IntelliStore

Check Point offers comprehensive intelligence to proactively stop threats, manage security services to monitor networks and incident response to quickly respond to and resolve attacks.

ThreatCloud Intellistore is Next generation threat detection service - Kirtikumar P.

Ease of use
Support
Ease of Setup
8.6
The Respond Analyst
★★★★★

The Respond Analyst

The Respond Analyst is trained as an expert cyber security analyst that combines human reasoning with machine power to make complex decisions with 100% consistency. The Respond Analyst works with your existing detection solutions and escalates complete, vetted security incidents that need response.

Only way to reduce alert fatigue - Aaron B.

Ease of use
Support
Ease of Setup
8.6
DomainTools
★★★★★

DomainTools

DomainTools' data and products work in harmony to enable security teams to start getting ahead of attacks, gain context and visibility into potential threats, and lower the skills barrier.

Love Their WhoIs Lookup - User in Internet

Ease of use
Support
Ease of Setup
8.6
Palo Alto Networks AutoFocus
★★★★★

Palo Alto Networks AutoFocus

AutoFocus contextual threat intelligence service accelerates analysis, correlation and prevention workflows. Unique, targeted attacks are automatically prioritized with full context, allowing security teams to respond to critical attacks faster, without additional IT security resources.

Great Identification Tool - User in Information Technology and Services

Ease of use
Support
Ease of Setup
7.0
ESET Threat Intelligence
★★★★★

ESET Threat Intelligence

Cloud-based ESET Threat Intelligence closes the gap between the cybersecurity information that security engineers get from their own networks and the cyberspace intelligence that ESET collects worldwide.

Intelligence data that will keep your network safe - Consultant in Mechanical or Industrial Engineering

Ease of use
Support
Ease of Setup
10.0
Media Sonar
★★★★★

Media Sonar

Media Sonar helps the world's largest organizations gather and analyze online alternative data to better protect their people, brands and assets, everyday.

An advanced security platform for corporate businesses - Alvin T.

Ease of use
Support
Ease of Setup
9.0
IBM X-Force Exchange
★★★★★

IBM X-Force Exchange

IBM Security X-Force Threat Intelligence is a security solution that adds dynamic Internet threat data to the analytical capabilities of IBM QRadar Security Intelligence Platform.

Must needed for threat management - Phani Teja V.

Ease of use
9.0
Support
9.0
Ease of Setup
8.6
9.0
ActivTrak
★★★★★

ActivTrak

ActivTrak is a single-agent, cloud-native behavior analysis solution used to increase productivity, streamline operational efficiency, and harden security. Our software is affordable, easy-to-use, and quick to install.

Great tracking software (a little too great?) - Antonio R.

Ease of use
8.9
Support
8.8
Ease of Setup
0.0

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 0

9.2
FortiGuard Security Subscriptions
★★★★★

FortiGuard Security Subscriptions

The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered as a subscription service for Fortinet security products

Reasonably priced protection - Dana P.

Ease of use
9.3
Support
9.2
Ease of Setup
0.0
B2B Software Guide