---
description: Page 3 - Discover the best Threat Intelligence Tools for your organisation. Compare top Threat Intelligence Tools tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 3 - Best Threat Intelligence Tools - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Threat Intelligence Tools](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software) > [Page 3](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3)

# Threat Intelligence Tools

Canonical: https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software

Page: 3 / 7\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=2)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4)

-----

## Products

1. [Netsurion](https://www.softwareadvice.co.uk/software/134470/eventtracker) — 3.6/5 (23 reviews) — Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly d...
2. [Shield Antivirus](https://www.softwareadvice.co.uk/software/48557/shield-antivirus) — 4.4/5 (21 reviews) — Shield Antivirus Business Edition provides endpoint protection to systems from viruses, malware and ransomware. It is...
3. [Darktrace](https://www.softwareadvice.co.uk/software/307875/darktrace) — 4.6/5 (21 reviews) — Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape ...
4. [IPQS](https://www.softwareadvice.co.uk/software/414587/ipqualityscore) — 4.9/5 (19 reviews) — IPQS is a leading fraud prevention solution tailored for businesses like yours. Powered by the most up-to-date and co...
5. [ZoneAlarm Pro](https://www.softwareadvice.co.uk/software/78876/zonealarm-pro) — 4.7/5 (18 reviews) — ZoneAlarm Pro is a PC and internet security solution that helps users detect and remove spyware, viruses, Trojan hors...
6. [DataDome](https://www.softwareadvice.co.uk/software/223561/datadome-bot-mitigation) — 4.5/5 (18 reviews) — DataDome is setting the new standard in online fraud and bot management. With a mission to free the web from fraudule...
7. [Cortex XDR](https://www.softwareadvice.co.uk/software/82155/traps) — 4.4/5 (18 reviews) — Cortex XDR (formerly Traps) is cloud-based and on-premise endpoint security solution, which assists security teams wi...
8. [Cisco Umbrella](https://www.softwareadvice.co.uk/software/432062/cisco-umbrella) — 4.4/5 (17 reviews) — Cisco Umbrella is a cloud-delivered network security solution designed to provide DNS-layer protection and threat def...
9. [EcoTrust](https://www.softwareadvice.co.uk/software/421252/ecotrust) — 4.9/5 (16 reviews) — EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical bu...
10. [USM Anywhere](https://www.softwareadvice.co.uk/software/124618/alienvalut-usm) — 4.4/5 (14 reviews) — USM Anywhere is a cloud-based security platform which helps midsize to large enterprises with risk detection, vulnera...
11. [INLYSE Malware.AI](https://www.softwareadvice.co.uk/software/387215/inlyse-malware-ai) — 5.0/5 (14 reviews) — INLYSE Malware.AI is a visual AI-based malware detection solution that uses cutting-edge technology to detect malware...
12. [HackerOne](https://www.softwareadvice.co.uk/software/363397/hackerone) — 4.6/5 (12 reviews) — HackerOne is a hacker-powered cybersecurity platform that enables organizations within the government and financial s...
13. [OpenText Core Behavioral Signals](https://www.softwareadvice.co.uk/software/395295/arcsight) — 4.1/5 (12 reviews) — ArcSight is a behavioral analytics and vulnerability management solution that helps businesses detect, investigate an...
14. [Brandefense](https://www.softwareadvice.co.uk/software/423031/brandefense) — 4.3/5 (12 reviews) — Brandefense is a cloud-based digital risk protection suite designed to assist organizations in tracking and managing ...
15. [Forcepoint Web Security](https://www.softwareadvice.co.uk/software/159421/forcepoint-web-security) — 4.4/5 (10 reviews) — Forcepoint Web Security is a network protection solution that provides businesses in healthcare, retail, finance and ...
16. [ManageEngine PAM360](https://www.softwareadvice.co.uk/software/361414/pam360) — 4.3/5 (10 reviews) — ManageEngine PAM360 is a privileged access management solution designed to help IT teams control and secure access to...
17. [Sensitive Content Manager](https://www.softwareadvice.co.uk/software/125872/araloc) — 4.6/5 (10 reviews) — ARALOC is a cloud-based security platform for desktop and mobile devices. It offers mobile security and data loss pre...
18. [Flowmon](https://www.softwareadvice.co.uk/software/257589/flowmon) — 4.4/5 (9 reviews) — Flowmon is a cloud-based monitoring and analytics solution that collects, analyzes, and stores network flow data from...
19. [Security Event Manager](https://www.softwareadvice.co.uk/software/183301/security-event-manager) — 4.7/5 (9 reviews) — Security \&amp; Event Manager by SolarWinds is a log management solution that caters to businesses across various indu...
20. [Jscrambler](https://www.softwareadvice.co.uk/software/138457/jscrambler) — 4.4/5 (9 reviews) — Jscrambler is the leader in Client-Side Protection and Compliance. We were the first to merge advanced polymorphic Ja...
21. [ManageEngine Log360 Cloud](https://www.softwareadvice.co.uk/software/435346/manageengine-log360-cloud) — 4.1/5 (8 reviews) — Secure your network from cyber threats with ManageEngine's Log360 Cloud, a comprehensive cloud SIEM tool integrated w...
22. [Fortra's Cloud Email Protection](https://www.softwareadvice.co.uk/software/345198/agari-phishing-defense) — 4.5/5 (8 reviews) — Agari Phishing Defense is a cloud-based software that helps protect businesses from online attacks — whether that be ...
23. [PowerDMARC](https://www.softwareadvice.co.uk/software/245912/powerdmarc) — 4.7/5 (7 reviews) — PowerDMARC is an email security solution that helps businesses of all sizes protect emails from phishing, spam, spoof...
24. [Flare](https://www.softwareadvice.co.uk/software/352090/firework) — 4.4/5 (7 reviews) — Flare is a digital footprint monitoring platform that scans the internet to identify exposed or leaked enterprise ass...
25. [ServicePilot](https://www.softwareadvice.co.uk/software/241720/servicepilot-ism) — 4.4/5 (7 reviews) — ServicePilot is a high-performance IT monitoring system supporting highly detailed observability of critical applicat...

-----

Page: 3 / 7\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=2)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.uk/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.uk/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [Risk Management Software](https://www.softwareadvice.co.uk/directory/4423/risk-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.uk/#organization","@type":"Organization","parentOrganization":"G2.com, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@id":"https://www.softwareadvice.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Threat Intelligence Tools","description":"Page 3 - Discover the best Threat Intelligence Tools for your organisation. Compare top Threat Intelligence Tools tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3","about":{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3#breadcrumblist"},"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3#webpage","@type":["WebPage","CollectionPage"],"mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"inLanguage":"en-GB"},{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Threat Intelligence Tools","position":2,"item":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software","@type":"ListItem"},{"name":"Page 3","position":3,"item":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 3 - Best Threat Intelligence Tools - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3#itemlist","@type":"ItemList","itemListElement":[{"name":"Netsurion","position":1,"description":"Netsurion Managed Threat Protection provides the necessary synergy between people, process, and \ntechnology to truly deliver world-class cybersecurity today. What does this mean to you and your business? \nTo be covered today, you have to prevent, detect, and respond to active threats and even predict future \nattacks before they happen. Yet even more than ever, your business relies on digital and remote capabilities. You \nneed to run fast and lean but cannot afford to risk gaps in cybersecurity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7425e21c-45d3-4792-a80a-eaf5f6229329.png","url":"https://www.softwareadvice.co.uk/software/134470/eventtracker","@type":"ListItem"},{"name":"Shield Antivirus","position":2,"description":"Shield Antivirus Business Edition provides endpoint protection to systems from viruses, malware and ransomware. It is an on-premise solution with features such as threat scanning, scheduled scans, automatic updates and more. The software is compatible with Windows 7, 8, 8.1 and 10 and also offers an Android-based mobile app.\n\n\nShield Antivirus is a computer protection solution that helps users identify and remove viruses, spyware, rootkits, bots, trojans and other types of internet security issues. It performs real-time system monitoring and alerts users if viruses, malware or ransomware are detected.\n\n\nThe solution also offers tools that clear browsing history to help maintain user privacy. Shield Antivirus’ secure file transfer feature helps to delete unwanted files from the system without.\n\n\nShield Antivirus is available on a yearly subscription basis and offers customer support via email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/07435446-ae40-48f1-ba89-a260f21b5d90.png","url":"https://www.softwareadvice.co.uk/software/48557/shield-antivirus","@type":"ListItem"},{"name":"Darktrace","position":3,"description":"Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c32604d5-57d2-45db-b8ce-a4592ee5ffdb.png","url":"https://www.softwareadvice.co.uk/software/307875/darktrace","@type":"ListItem"},{"name":"IPQS","position":4,"description":"IPQS is a leading fraud prevention solution tailored for businesses like yours. Powered by the most up-to-date and comprehensive data, our advanced APIs and datasets specialize in real-time fraud prevention with unparalleled accuracy. Through the cutting-edge cyber threat honeypot network, it protects your landing pages and blocks risky clicks while scoring mobile and app traffic and identifying high-risk users. With customizable settings and a straightforward fraud score, the suite of tools enables effortless detection. Verify user data, including email addresses and phone numbers, to ensure the quality of your leads. \n\nWhether you operate in iGaming, online lending or other industries, the integration-friendly solution, extensive documentation and proven track record make IPQS the top choice for proactive fraud prevention and an exceptional user experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1dce6f3-2dde-4b10-988c-8f4dadd3baf7.png","url":"https://www.softwareadvice.co.uk/software/414587/ipqualityscore","@type":"ListItem"},{"name":"ZoneAlarm Pro","position":5,"description":"ZoneAlarm Pro is a PC and internet security solution that helps users detect and remove spyware, viruses, Trojan horses and more. Key features of this platform include antivirus signatures, web resources, two-way firewall, full stealth mode and zero-hour protection.\n\n\nDesigned for small to midsize businesses, ZoneAlarm Pro provides protection against phishing, worms, bots and rootkits. It also enables users to prevent identity theft by guarding personal data and browser protection. Additionally, its advanced-access protection module enables security from supply-chain management (SCM) and raw data access attacks.\n\n\nZoneAlarm Pro’s scan mode allows users to perform custom anti-virus scans and ensure up-to-date protection. It can either be deployed on-premise or hosted in the cloud. Pricing is available on yearly subscription and support is extended via documentation, email and online help desk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1e3e8929-c06c-4c8c-84a0-47f98e078588.png","url":"https://www.softwareadvice.co.uk/software/78876/zonealarm-pro","@type":"ListItem"},{"name":"DataDome","position":6,"description":"DataDome is setting the new standard in online fraud and bot management. With a mission to free the web from fraudulent traffic so that sensitive data remains safe and online platforms can perform at optimum speed, we protect mobile apps, websites and APIs from online fraud, including scraping, scalping, credential stuffing and account takeover, Layer 7 DDoS attacks and carding fraud. \n\nOur AI-powered bot detection engine processes more than a TRILLION pieces of data every day, from 25 worldwide points of presence, to protect the largest global e-commerce businesses in real time.\n\nEasily deployed and ultra-scalable, DataDome is the core component of your application security at the edge. It is compatible with 100% of web infrastructure technologies, thanks to strong technical and business partnerships with all the market leaders. It runs anywhere, in any cloud, and is compatible with multi-cloud and multi-CDN setups.\n\nDataDome detects, on average, a new bad bot every millisecond. Our customers rely on our AI-powered bot detection engine to detect, classify and block all automated threats across their mobile applications, websites and APIs in real time, without them having to think about it.\nHowever, behind the scenes, our threat intelligence and bot SOC teams are always at work. 24/7, they actively monitor the billions of requests processed by our AI to detect any situation requiring human intervention.\n\nDataDome’s cybersecurity technology protects 130+ customers worldwide, including TripAdvisor, Rakuten, The New York Times, Kurt Geiger, Footlocker, BlaBlaCar and Adevinta.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2f0b2a8a-6e89-40cb-8b01-a1dff45c1e11.jpeg","url":"https://www.softwareadvice.co.uk/software/223561/datadome-bot-mitigation","@type":"ListItem"},{"name":"Cortex XDR","position":7,"description":"Cortex XDR (formerly Traps) is cloud-based and on-premise endpoint security solution, which assists security teams with threat detection and response management. Key features include malware protection, incident tracking, root cause analysis and records management. \n\n\nThe platform uses artificial intelligence and machine learning technology to collect data on endpoints, network and cloud, providing visibility to teams within the organization. It analyzes attack techniques and behaviours, prevents the launch of malicious executable files and blocks malware, exploits and ransomware. Additionally, it helps network administrators determine root cause of various threats to optimize triage and incident response, adapting defenses in real-time.\n\n\nCortex XDR integrates with various security applications such as WildFire, AlienVault USM, Cortex XDR and more. Its management service console enables administrators to review security events and analyze associated logs.\n\n\nSupport is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/46b39c97-1a52-4800-8fa4-29be93f0f355.png","url":"https://www.softwareadvice.co.uk/software/82155/traps","@type":"ListItem"},{"name":"Cisco Umbrella","position":8,"description":"Cisco Umbrella is a cloud-delivered network security solution designed to provide DNS-layer protection and threat defense against cybersecurity risks. It is used by organizations in sectors such as government, financial services, manufacturing, healthcare, retail, education and hospitality. The platform helps secure remote workers, guest Wi-Fi networks and distributed networks from evolving threats.\n\nThe solution integrates DNS-layer security with secure web gateway capabilities, cloud access security broker functionality and cloud-delivered firewall protection. It includes data loss prevention features to safeguard sensitive information and malware protection to detect and remove threats from cloud file storage applications. Remote browser isolation and zero trust network access enable secure connections to private applications and SaaS platforms. Threat intelligence powered by Cisco Talos provides AI-driven detection of known and emerging threats. Unified policy management with rule-based controls simplifies deployment and administration.\n\nThe platform is FedRAMP authorized for government use and operates on a global cloud architecture with distributed DNS resolvers. Features include web content filtering, shadow IT discovery and app blocking to maintain visibility and control over network activity. It supports securing SD-WAN deployments, protecting mobile users and defending off-network endpoints.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1a0beb4d-3425-4cd1-87ae-b148c191bbcc.png","url":"https://www.softwareadvice.co.uk/software/432062/cisco-umbrella","@type":"ListItem"},{"name":"EcoTrust","position":9,"description":"EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling security teams to do more with less. It integrates data from over 50 technologies, providing a comprehensive view of cyber risks, enhancing operational efficiency, and improving security decision accuracy.\n\nOur platform not only identifies and holistically visualizes risks and vulnerabilities through 6 native scanners but also prioritizes the greatest risks based on technical and business contexts. This optimizes resource allocation, reducing the time needed for critical fixes and improving threat response capabilities. EcoTrust also delivers treatment recommendations generated by AI, speeding up the response to critical vulnerabilities and improving key cyber risk indicators.\n\nWe offer strategic, tactical, and operational dashboards and reports that provide valuable insights for decision-making, along with alert automation and a history of vulnerabilities accessible via consumption APIs. EcoTrust is the ultimate solution for businesses seeking a strong, efficient, and proactive security posture, perfectly adapting to local needs and global challenges in the cybersecurity landscape.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/85ed12fb-fba1-42f4-a63c-265bea647008.png","url":"https://www.softwareadvice.co.uk/software/421252/ecotrust","@type":"ListItem"},{"name":"USM Anywhere","position":10,"description":"USM Anywhere is a cloud-based security platform which helps midsize to large enterprises with risk detection, vulnerability assessment, security monitoring and threat response.\n\n\nThe security platform enables users to collect and detect information such as software services, number of users logged in and the operating system of assets. It comes with an active scanner, which lets users scan for known vulnerabilities, and an intrusion-detection system to conduct file integrity monitoring, gather operating system logs and perform rootkit checking. Further, its behavioral monitoring capability includes netflow information, bandwidth and traffic capture.\n\n\nAdditionally, USM users can participate in the open threat exchange (OTX) threat-sharing network and identify known malicious attackers. The solution integrates with third-party applications such as Jira, Office 365, Amazon Web Services, Palo Alto Networks and more.\n\n\nUSM Anywhere is available on a monthly subscription basis and comes with online and phone support.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/adf53927-f31f-47c4-be11-26cf1c8cdde6.png","url":"https://www.softwareadvice.co.uk/software/124618/alienvalut-usm","@type":"ListItem"},{"name":"INLYSE Malware.AI","position":11,"description":"INLYSE Malware.AI is a visual AI-based malware detection solution that uses cutting-edge technology to detect malware. It offers plugins for specific needs and provides an added layer of security beyond traditional anti-virus solutions.\n\nDon't let malware ruin your peace of mind, choose INLYSE Malware.AI for advanced and secure malware detection. With INLYSE Malware.AI, you can enjoy the following advantages:\n\n- Advanced malware detection using cutting-edge technology\n- Additional layer of security\n- Plugins for specific needs such as Web App Protection, Mail Client Security, Cloud Applications, Secure Browsing, Mail Server Security, and Microsoft 365\n- Self-learning algorithms and deep neural networks can recognize even the most advanced malware, cyber-attacks, zero-day exploits, and APT attacks within seconds of detection.\n- Upgrade your security with INLYSE Malware.AI and keep your files safe from malicious attacks. Try now and experience the power of visual AI-based malware detection.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f0d19a5a-f097-452c-9d11-838a57727fb7.jpeg","url":"https://www.softwareadvice.co.uk/software/387215/inlyse-malware-ai","@type":"ListItem"},{"name":"HackerOne","position":12,"description":"HackerOne is a hacker-powered cybersecurity platform that enables organizations within the government and financial service industries to identify, capture, and resolve security vulnerabilities that were discovered by hackers. HackerOne is designed to help users receive and monitor vulnerabilities through secure channels, conduct continuous vulnerability testing for specific features or in-house apps, and implement security assessments to ensure products meet security compliance requirements for secure product launches. HackerOne also provides advisory and triage services that help teams launch and scale security programs, validate vulnerabilities, and develop remediation plans.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/048fef9b-484d-42b7-9d56-60f5d0a5e097.png","url":"https://www.softwareadvice.co.uk/software/363397/hackerone","@type":"ListItem"},{"name":"OpenText Core Behavioral Signals","position":13,"description":"ArcSight is a behavioral analytics and vulnerability management solution that helps businesses detect, investigate and respond to threats and anomalies from within a unified platform. It lets team members utilize machine learning algorithms to identify threats, such as account misuse, data exfiltration, infected hosts, internal recon, and snooping.\n\nArcSight's timeline view enables IT professionals to view entities in chronological order with associated risk scores. With the built-in dashboard, staff members can access raw events that triggered an alert and enter additional queries on a centralized platform. Additionally, it allows team members to extract and observe behavior across entities, such as machines, users, servers, printers and IP addresses.\n\nArcSight comes with an application programming interface (API), which lets businesses integrate the platform with several third-party solutions. Pricing is available on request and support is extended via documentation, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f9134b0f-ff86-4ba3-9f8c-fbdbca3a6fe8.jpeg","url":"https://www.softwareadvice.co.uk/software/395295/arcsight","@type":"ListItem"},{"name":"Brandefense","position":14,"description":"Brandefense is a cloud-based digital risk protection suite designed to assist organizations in tracking and managing cyber threats via a unified portal. This platform provides protection for systems by identifying threats, delivering real-time alerts, and offering continuous monitoring. \n\nBrandefense ensures the security of various touchpoints, including websites, social media platforms, and mobile applications. With key features such as exposure management, artificial intelligence (AI), brand protection, supply chain security, and attack surface management, the platform allows users to safeguard their digital assets. Businesses can proactively mitigate risks and maintain a strong cybersecurity posture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/089767d4-7271-44ce-82e4-8f1170bdd2a8.webp","url":"https://www.softwareadvice.co.uk/software/423031/brandefense","@type":"ListItem"},{"name":"Forcepoint Web Security","position":15,"description":"Forcepoint Web Security is a network protection solution that provides businesses in healthcare, retail, finance and other sectors with protection against web threats including viruses, malware, data loss and phishing attacks. The CASB functionality enables administrators to gain visibility and control of cloud applications across the organization.\n\n\nFeatures of Forcepoint Web Security include reputation analysis, predictive analytics, behavioral sandboxing, content classification, reporting and more. It comes with an integrated data theft defense module, which enables IT teams to automatically detect and intercept data theft attempts for file passwords, data leaks and optical character recognition of text within images. Additionally, stakeholders can utilize the content engine to analyze web page content, contextual profiles, active scripts and website links.\n\n\nThe Forcepoint Web Security’s data loss prevention (DLP) platform provides added outbound protection against data theft, maintaining regulatory compliance. Pricing is available on request and support is extended via online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/42979554-8c31-44b8-a8b4-5255af86f9fc.png","url":"https://www.softwareadvice.co.uk/software/159421/forcepoint-web-security","@type":"ListItem"},{"name":"ManageEngine PAM360","position":16,"description":"ManageEngine PAM360 is a privileged access management solution designed to help IT teams control and secure access to critical enterprise systems. It offers a unified approach to managing privileged accounts, sessions, and access workflows within an organization's IT infrastructure. This platform is suitable for digital-first enterprises, government agencies, and various industries aiming to enhance security and meet compliance requirements.\n\nThe solution includes features such as privileged account and session management, privilege elevation and delegation management, and cloud infrastructure entitlements management. PAM360 allows organizations to discover and manage privileged accounts automatically, implement just-in-time privilege elevation, monitor cloud entitlements, and apply detailed controls for endpoint privilege management. It also provides privileged user behavior analytics with AI and ML-driven anomaly detection to identify suspicious activities and potential security threats.\n\nManageEngine PAM360 includes secrets management to secure credentials for non-human entities such as applications, services, and DevOps pipelines. It offers encryption key and certificate lifecycle management to prevent service downtime and impersonation attacks. PAM360 is designed to meet compliance standards including NIST, PCI-DSS, FISMA, HIPAA, SOX, and ISO-IEC 27001, with flexible deployment options and an intuitive user interface for streamlined implementation and operation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/221979f6-48e9-4b78-ac1d-9d414890f83c.png","url":"https://www.softwareadvice.co.uk/software/361414/pam360","@type":"ListItem"},{"name":"Sensitive Content Manager","position":17,"description":"ARALOC is a cloud-based security platform for desktop and mobile devices. It offers mobile security and data loss prevention. The solution is hosted in the Microsoft Azure cloud but can also support the storage of content on private or public servers controlled by the user.\n\n\nThe system can be accessed through a custom branded and configured native application, which is available on iOS android and PC. The content library is available both on and offline and can be configured based on the organization’s requirements. The content saved in the course library has rights access controls, so only the correct users can view what is stored.\n\n\nARALOC syncs users devices, which ensures that the information is up-to-date and can be available anywhere. The sync function also automatically updates the users' documents when they are edited. The system’s reporting function tracks user activity and can monitor high-level usage, on and offline.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d8da69f9-729c-43b2-a802-116690164eb3.png","url":"https://www.softwareadvice.co.uk/software/125872/araloc","@type":"ListItem"},{"name":"Flowmon","position":18,"description":"Flowmon is a cloud-based monitoring and analytics solution that collects, analyzes, and stores network flow data from physical, virtual, or cloud infrastructure. Unique capabilities include the ability to monitor application performance by end-user country, server response time, variance in delay for flows between multiple packets, TCP retransmissions and out-of-order packets. Response automation and anomaly detection are key features that enable administrators to quickly troubleshoot problems. The centralized dashboard helps teams analyze traffic and metadata collected from physical infrastructure.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/54f886d3-c9ce-4def-a6c6-6a53f82b1f2d.png","url":"https://www.softwareadvice.co.uk/software/257589/flowmon","@type":"ListItem"},{"name":"Security Event Manager","position":19,"description":"Security & Event Manager by SolarWinds is a log management solution that caters to businesses across various industries. Key features include compliance reporting, real-time event correlation, file-integrity monitoring, USB device monitoring and log forwarding.\n\nSecurity & Event Manager helps businesses detect suspicious activities in real-time, conduct security event investigations and forensics for threat mitigation and demonstrate compliance via audit reporting for HIPAA, PCI DCC and SOX. The solution also allows users to monitor and set alerts on registries, files and folder activities that help them to recognize malicious behavior.\n\nAdditionally, Security & Event Manager enables users to forward correlated and normalized logs or specific log data to external sources. The solution can either be deployed on-premise or hosted in the cloud.\n\nServices are offered for a one-time fee that includes support via phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/17acd0d7-a07b-4143-a93c-10dde4f6693c.png","url":"https://www.softwareadvice.co.uk/software/183301/security-event-manager","@type":"ListItem"},{"name":"Jscrambler","position":20,"description":"Jscrambler is the leader in Client-Side Protection and Compliance. We were the first to merge advanced polymorphic JavaScript obfuscation with fine-grained third-party tag protection in a unified Client-Side Protection and Compliance Platform. Our integrated solution ensures a robust defense against current and emerging client-side cyber threats, data leaks, misconfigurations, and IP theft. The Jscrambler Code Integrity product safeguards first-party JavaScript through state-of-the art obfuscation and exclusive runtime protection. The Jscrambler Webpage Integrity product mitigates threats and risks posed by third-party tags all while ensuring compliance with the new PCI DSS v4.0 standard.\n\nWith Jscrambler, businesses adopt a unified, future-proof client-side security policy all while achieving compliance with emerging security standards. Trusted by digital leaders including Netflix, SAP, Electronic Arts, Canal+, Gap, and Swisscom, Jscrambler gives businesses the freedom to innovate securely. Join us in shaping the future of web security and enabling fearless digital innovation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7b693439-cc52-4dac-adeb-5da1dea3a3d9.png","url":"https://www.softwareadvice.co.uk/software/138457/jscrambler","@type":"ListItem"},{"name":"ManageEngine Log360 Cloud","position":21,"description":"Secure your network from cyber threats with ManageEngine's Log360 Cloud, a comprehensive cloud SIEM tool integrated with advanced CASB functionalities. It offers security analytics, threat intelligence, and incident management, empowering analysts to identify, prioritize, and neutralize threats across both on-site and cloud settings. Apart from being highly scalable, Log360 Cloud aids in minimizing infrastructure and storage expenses, making it a cost-efficient choice for enterprise security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d6f0cb6d-ad04-4686-b220-e2ce64dfd1c4.png","url":"https://www.softwareadvice.co.uk/software/435346/manageengine-log360-cloud","@type":"ListItem"},{"name":"Fortra's Cloud Email Protection","position":22,"description":"Agari Phishing Defense is a cloud-based software that helps protect businesses from online attacks — whether that be social engineering, spearphishing and other forms of identity theft. The solution combines behavioral analysis with machine learning to help guard against the evolving threats posed by phishers and cybercriminals.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0c2e9b5c-7b0b-4cb3-9413-089a35d73263.webp","url":"https://www.softwareadvice.co.uk/software/345198/agari-phishing-defense","@type":"ListItem"},{"name":"PowerDMARC","position":23,"description":"PowerDMARC is an email security solution that helps businesses of all sizes protect emails from phishing, spam, spoofing, and other hack attempts. The platform allows organizations to define custom policies and configure domain names to implement domain-based message authentication, reporting, and conformance (DMARC) protocols using an integrated setup wizard.\n\nPowerDMARC automatically generates and sends encrypted forensic reports via email, enabling administrators to gain insights into emails sent from specified domains, failed authentications, and delivery issues to detect and block spoofing attempts. It offers various features such as two-factor authentication, subdomain detection, real-time alerts and more.\n\nPowerDMARC allows managers to create custom reports and share them with external and internal stakeholders for reference. It is available for free and on monthly subscriptions. Support includes email, FAQs and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8b877214-61e8-4457-a375-c1c326b29c01.png","url":"https://www.softwareadvice.co.uk/software/245912/powerdmarc","@type":"ListItem"},{"name":"Flare","position":24,"description":"Flare is a digital footprint monitoring platform that scans the internet to identify exposed or leaked enterprise assets. It is designed to help companies protect their sensitive data and financial resources. Using AI technology, the Flare platform can identify risks, contextualize or group information, deliver prioritized alerts, and remediate threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1b8bc91f-6649-4da0-ae5a-b55cb77a2681.png","url":"https://www.softwareadvice.co.uk/software/352090/firework","@type":"ListItem"},{"name":"ServicePilot","position":25,"description":"ServicePilot is a high-performance IT monitoring system supporting highly detailed observability of critical applications, surveillance of thousands of devices, and analysis of millions of events. Combining real-time and historical metrics, traces, and logs for each technological stack (ITIM, NPM, APM, DEM, SIEM), ServicePilot helps troubleshoot IT issues before they impact your business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d097ccf3-8ebf-4b37-b34e-97f00f6a1603.webp","url":"https://www.softwareadvice.co.uk/software/241720/servicepilot-ism","@type":"ListItem"}],"numberOfItems":25}
</script>
