Best Threat Intelligence Software

Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies utilize the tools to keep their security standards up to date and fit to combat new threats as they emerge. These tools can improve security performance by providing information on threats to their specific networks, infrastructure, and endpoint devices. These products provide information about hazards and how they function, their capabilities, and remediation techniques. IT administrators and security professionals use the data delivered to better protect their systems from emerging threats and plan for possible vulnerabilities. The tools alert users as new threats emerge and provide information detailing best practices for resolution.

Many products like security information and event management (SIEM) and vulnerability management software can integrate with or provide similar information as threat intelligence products. Those products, though, tend to provide live updates and actionable intelligence, and focus on other components of a security ecosystem.

To qualify for inclusion in the Threat Intelligence category, a product must:

  • Provide information on emerging threats and vulnerabilities
  • Detail remediation practices for common and emerging threats
  • Analyze global threats on different types of networks and devices
  • Cater threat information to specific IT solutions
G2 Grid® for Threat Intelligence
Leaders
High Performers
Contenders
Niche
Market Presence
Satisfaction
Star Rating

Threat Intelligence reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Threat Intelligence Software

G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 138
Filter Results
Filter by:
Sort by
Star Rating
Sort By:
Results: 138

    Acalvio provide an Advanced Defense solutions using a combination of Distributed Deception and Data Science technologies that allows security practitioners in detecting, engaging and responding to malicious activity with high precision in a timely and cost-effective fashion.

    ActivTrak is a cloud-based employee monitoring software that allows organizations to understand how their employees get work done. ActivTrak provides aggregated data that quantifies employee productivity. This gives employers and managers the insight they need to improve employee performance as well as keep track of sensitive internal information and improve operational efficiency. The software is easy to install and the data is available within minutes with preset reports ready for review.

    Anomali offers a comprehensive suite of Threat Intelligence solutions for organizations of any size.

    Arbor has built a world-class team of security researchers that are dedicated to discovering and analyzing emerging Internet threats and developing targeted defenses.

    BlueVoyant Threat Intelligence monitors your company’s external attack surface, assesses emerging risks, and delivers near real-time, actionable intelligence that is specific to your organization.

    BluSapphire is a network security software that provides visibility into advanced persistent threats (APT) and malicious activity on a client's infrastructure.

    Brinqa is a leading provider of unified risk management – enabling stakeholders, governance organizations, and infrastructure security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organization’s existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. With Brinqa, organizations reduce response time to emerging threats, impact to business, and technology risk and compl

    The CenturyLink Adaptive Threat Intelligence service lifts the burden of appliance maintenance and risk analysis from your shoulders, allowing you to act on threats rather than digging for them.

    The Telesoft CERNE combines a high rate 40Gbps IDS engine with automated record of relevant network traffic for real-time and historical threat investigation. CERNE continuously scans and collects all network packets and only stores traffic associated with an IDS alert, discarding all other traffic, giving an analyst rapid access to critical packets up to 2.4 seconds before an event.

    Cloud Conformity is a cloud infrastructure governance system designed to help you prevent, detect, and correct critical threats to your AWS environments. The Real Time Monitoring product in the Cloud Conformity suite gives organizations visibility of infrastructure changes at the event and user level, combined with alert triggers for threat and remediation notifications for instant awareness and resolution. Leveraging both the CloudWatch and CloudTrail AWS services, the dashboard collects actio

    Cloudsek is an Infosec Risk assessment company which provides intelligence needed to tackle online threats.

    Corvil transforms network data into streaming machine-time intelligence to run business with full transparency, assured performance, and continuous cyber surveillance of users, infrastructure, applications, and services.

    CounterCraft is a Cyber Deception Platform that fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection using controlled, highly credible synthetic environments. CounterCraft accelerates threat detection earlier in the attack lifecycle, provides evidence of malicious activity and modus operandis and already protects leading organizations.

    CounterMeasures is a web-based risk analysis software from Alion Science & Technology that automates physical/information security assessments and analysis.

    CTX/Soltra Edge leverages the open industry standards of STIX (Structured Threat Information eXpression) and TAXII (Trusted Automated eXchange of Indicator Information) to collect threat intelligence from various sources and convert it into the industry-standard language, revealing information that helps firms make decisions on what actions they need to take to help users better protect their organizations against cyber threats.

    NC4's Cyber Defense Network (CDN) is designed to help our nation's critical infrastructure communities and private sector companies defend themselves against cyber threats with greater efficiency, effectiveness and speed.

    DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.

    DeceptionGrid automates the deployment of a network of camouflaged malware traps that are intermingled with your real information technology resources.

    Inspired by the brain's natural ability to learn, Deep Instinct is the first successful application of deep learning to cybersecurity. Deep Instinct's neural network's powerful deep learning algorithms, instinctively identify and block zero-day and advanced persistent threats in real time on any device, platform and operating system.

    Improve the effectiveness of your security infrastructure and teams with real-time visibility and automated access to relevant vulnerability, security risk, and network & file reputation intelligence. Make your security infrastructure smarter, your teams more impactful, and reduce the risk posed by cyber threats to your business.

    Detect, learn and predict fraudulent activity using behavioral analysis and machine learning. DetectTA analyzes user behavior and sends alerts on any deviations from established regular behavioral patterns. This cutting-edge machine intelligence can be combined with user-defined analytics, rules, policies, and workflows for comprehensive coverage and flexibility.

    Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation.The Digital Shadows SearchLight™ service combines scalable data analytics with human data analysts to manage and mitigate risks to your business.

    DigitalStakeout discovers threats & vulnerabilities to people, places & things through mining social media, deep web & dark web.

    Dispel keeps your IP and communications safe through the world's first and only Privacy as a Service Platform.

    DNIF utilises threat intelligence in the best way possible. It provides that ‘extra’ information that every analyst craves for. You can not just segregate the blacklisted IPs but also get additional context about your incoming logs through the ‘Enrichment’ feature. DNIF Threat Intelligence tool also scans applications against dedicated threat intels and distinguishes whether they are malicious or not. This in-depth analysis helps you identify security threats and make informed decisions and main

    Latest Threat Intelligence Articles