---
description: Page 4 - Discover the best Threat Intelligence Tools for your organisation. Compare top Threat Intelligence Tools tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 4 - Best Threat Intelligence Tools - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Threat Intelligence Tools](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software) > [Page 4](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4)

# Threat Intelligence Tools

Canonical: https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software

Page: 4 / 7\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=5)

-----

## Products

1. [ServicePilot](https://www.softwareadvice.co.uk/software/241720/servicepilot-ism) — 4.4/5 (7 reviews) — ServicePilot is a high-performance IT monitoring system supporting highly detailed observability of critical applicat...
2. [Securaa](https://www.softwareadvice.co.uk/software/340787/soar-tools) — 4.1/5 (7 reviews) — As organizations around the world face a constant and dynamic barrage of cybersecurity threats, the development of Se...
3. [Appgate SDP](https://www.softwareadvice.co.uk/software/188797/appgate) — 5.0/5 (7 reviews) — Powered by Zero Trust Architecture, Appgate secure access and cybersecurity solutions enable businesses to reduce ris...
4. [Vade](https://www.softwareadvice.co.uk/software/396957/vade-secure) — 4.4/5 (7 reviews) — Vade is an email security solution powered by AI and enhanced by people. Its proprietary neural network automatically...
5. [Protegent Antivirus](https://www.softwareadvice.co.uk/software/468975/Unistal-Anti-Virus) — 5.0/5 (7 reviews) — Protegent Antivirus is a security platform that provides protection for computer systems. It safeguards against a ran...
6. [OnSolve Platform](https://www.softwareadvice.co.uk/software/442406/onsolve-platform) — 4.7/5 (6 reviews) — OnSolve is a leading critical event management software provider that proactively mitigates physical threats, allowin...
7. [Uptycs](https://www.softwareadvice.co.uk/software/417883/uptycs) — 4.7/5 (6 reviews) — The Uptycs CNAPP + XDR Platform is a comprehensive security solution designed for modern attack surfaces. Uptycs enab...
8. [Enginsight](https://www.softwareadvice.co.uk/software/288516/enginsight) — 5.0/5 (6 reviews) — Enginsight helps protect businesses from the ever-evolving landscape of cyber threats and ensures the security and st...
9. [ManageEngine EventLog Analyzer](https://www.softwareadvice.co.uk/software/69829/manageengine-eventlog-analyzer) — 4.8/5 (5 reviews) — ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across v...
10. [Holm Security VMP](https://www.softwareadvice.co.uk/software/360656/holm-security-vmp) — 4.4/5 (5 reviews) — The Holm Security helps customers both identify and remediate vulnerabilities as well as weaknesses in their cyber se...
11. [VenariX](https://www.softwareadvice.co.uk/software/522078/VenariX) — 5.0/5 (5 reviews) — The essence of VenariX lies in its comprehensive treatment of cyber incidents, threat actors, and their ramifications...
12. [Threat Detection Marketplace](https://www.softwareadvice.co.uk/software/106326/threat-detection-marketplace) — 5.0/5 (4 reviews) — Threat Detection Marketplace (TDM) is a SaaS content analysis platform, which provides businesses with security infor...
13. [365 Total Protection](https://www.softwareadvice.co.uk/software/402258/365-total-protection) — 4.8/5 (4 reviews) — 365 Total Protection is an email security management platform for Microsoft Office 365. This platform provides a comp...
14. [MixMode](https://www.softwareadvice.co.uk/software/266675/mixmode) — 4.8/5 (4 reviews) — MixMode is a no-rules Cybersecurity platform, serving large enterprises with big data environments across a variety o...
15. [Quadrant XDR](https://www.softwareadvice.co.uk/software/417889/sagan) — 5.0/5 (4 reviews) — Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a s...
16. [Cyabra](https://www.softwareadvice.co.uk/software/416454/cyabra) — 4.8/5 (4 reviews) — Cyabra enables global enterprises and governments to understand and respond to online manipulation that distorts publ...
17. [Techowlshield](https://www.softwareadvice.co.uk/software/520252/Techowlshield) — 4.5/5 (4 reviews) — TechOwl Shield throws up an iron curtain against cyber threats. We ditch one-size-fits-all solutions and instead depl...
18. [Dark Atlas](https://www.softwareadvice.co.uk/software/420999/dark-atlas) — 4.7/5 (3 reviews) — Dark Atlas is a state-of-the-art dark web monitoring platform that has been designed to safeguard users against poten...
19. [TEHTRIS XDR Platform](https://www.softwareadvice.co.uk/software/421726/tehtris-xdr) — 4.3/5 (3 reviews) — Create your playbooks and interconnect your cyber solutions: Orchestrate all your cyber tools from a single console a...
20. [InsightIDR](https://www.softwareadvice.co.uk/software/98135/insightidr) — 4.3/5 (3 reviews) — insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to stre...
21. [Prophaze WAF](https://www.softwareadvice.co.uk/software/185797/prophaze-waf) — 5.0/5 (2 reviews) — Prophaze WAF is a cloud security software designed to help businesses in various sectors such as education, healthcar...
22. [SafeGuard Cyber](https://www.softwareadvice.co.uk/software/112509/safeguard-cyber) — 5.0/5 (2 reviews) — SafeGuard Cyber is a comprehensive SaaS platform that allows enterprise-level visibility and control over the informa...
23. [ThreatSTOP DNS Defense](https://www.softwareadvice.co.uk/software/242908/dns-defense) — 5.0/5 (2 reviews) — ThreatSTOP connects the best Threat Intelligence (TI) to your existing DNS systems, and blocks threats before damage ...
24. [Resecurity Risk](https://www.softwareadvice.co.uk/software/259770/risk) — 5.0/5 (2 reviews) — Resecurity Risk allows carriers, drivers and logistics corporations to monitor and tracks the movement of goods, serv...
25. [Strobes RBVM](https://www.softwareadvice.co.uk/software/96482/strobes) — 5.0/5 (2 reviews) — Enable a robust offensive security program with the help of Strobes. With the combination of ASM, PTaaS and VM we hel...

-----

Page: 4 / 7\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=3)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=5)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.uk/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.uk/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [Risk Management Software](https://www.softwareadvice.co.uk/directory/4423/risk-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@type":"WebSite","@id":"https://www.softwareadvice.co.uk/#website","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Threat Intelligence Tools","description":"Page 4 - Discover the best Threat Intelligence Tools for your organisation. Compare top Threat Intelligence Tools tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4","about":{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Threat Intelligence Tools","position":2,"item":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software","@type":"ListItem"},{"name":"Page 4","position":3,"item":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 4 - Best Threat Intelligence Tools - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"ServicePilot","position":1,"description":"ServicePilot is a high-performance IT monitoring system supporting highly detailed observability of critical applications, surveillance of thousands of devices, and analysis of millions of events. Combining real-time and historical metrics, traces, and logs for each technological stack (ITIM, NPM, APM, DEM, SIEM), ServicePilot helps troubleshoot IT issues before they impact your business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d097ccf3-8ebf-4b37-b34e-97f00f6a1603.webp","url":"https://www.softwareadvice.co.uk/software/241720/servicepilot-ism","@type":"ListItem"},{"name":"Securaa","position":2,"description":"As organizations around the world face a constant and dynamic barrage of cybersecurity threats, the development of Security Orchestration tools to accelerate security operations, automation and response have rapidly increased.\n\nThe Security Orchestration tools provide more visibility that allows organizations to respond to security events faster, efficiently, and consistently.\n\nSecurity orchestration connects and coordinates toolsets and defines incident analysis parameters and processes. Automation automatically triggers specific workflows and tasks based on those parameters, including automated steps for lower-risk incidents. Response accelerates general and targeted responses by enabling a single view for analysts to access, query and share threat intelligence.\n\n\nSOAR Tools allows users to ingest and analyze information and alerts from various security systems, orchestrate and integrate with a broad range of tools to improve operations, and define, build and automate workflows that the teams require to identify, prioritize, investigate and respond to the security alerts.\n\nIt has forensic capabilities to perform post-incident analysis and enable teams to improve their processes and prevent similar issues and automate most of the security operations hence eliminating repetitive tasks and allowing teams to save time and concentrate on more complex tasks that require human input.\n\nAdditionally, most of the SOAR solutions have playbooks that provide instructions based on proven practices and procedures.\n\nSOAR stands for Security Orchestration, Automation and Response. SOAR platforms are a collection of security software outcomes and tools for examining and collecting data from a range of sources.\n\nSOAR Tools is designed to help security teams manage and respond to endless alarms at machine speeds.\n\nThe platform helps users combine comprehensive data gathering, and manage cases, standardization, workflows, and analytics to provide organizations with the ability to implement in-depth capabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/64be494a-652b-433d-be58-7104facdc59f.jpeg","url":"https://www.softwareadvice.co.uk/software/340787/soar-tools","@type":"ListItem"},{"name":"Appgate SDP","position":3,"description":"Powered by Zero Trust Architecture, Appgate secure access and cybersecurity solutions enable businesses to reduce risk and ensure network security within a digital environment. Serving more than 1,000 organizations across 40 countries, Appgate provides enterprises with cloud/hybrid access security products and services that can remedy network security issues. These solutions include Appgate SDP (software-defined perimeter), Appgate RBA (risk-based authentication), Appgate DTP (digital threat protection), and adversary simulation services. \n\nAppgate SDP simplifies access controls and strengthens network security for all in-office or remote users. By unifying access in one solution, IT administrators can streamline access management and configuration for all users, devices, networks, and infrastructure.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1fa2bf14-befc-42fe-969e-d95499f99853.png","url":"https://www.softwareadvice.co.uk/software/188797/appgate","@type":"ListItem"},{"name":"Vade","position":4,"description":"Vade is an email security solution powered by AI and enhanced by people. Its proprietary neural network automatically classifies emails into more than 10,000 different categories (Blockers, Phishing, Spam), then assigns a risk score to each message based on organizational preferences.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/934c873f-f260-4a03-a94c-2f4a284c4dc4.png","url":"https://www.softwareadvice.co.uk/software/396957/vade-secure","@type":"ListItem"},{"name":"Protegent Antivirus","position":5,"description":"Protegent Antivirus is a security platform that provides protection for computer systems. It safeguards against a range of malware threats and includes a data recovery solution to prevent data loss from system crashes or other issues. \n\nIt offers cloud protection technology that provides instant defense against emerging threats and updates virus definitions hourly to address the latest malicious attacks. \n\nProtegent Antivirus enables users to check external drives and media for potential threats. Additionally, the tool is equipped with a crash-proof data loss prevention system, enabling recovery of deleted, lost or formatted files and partitions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ccc79f46-a897-4ee9-aefa-80103e6e408a.jpeg","url":"https://www.softwareadvice.co.uk/software/468975/Unistal-Anti-Virus","@type":"ListItem"},{"name":"OnSolve Platform","position":6,"description":"OnSolve is a leading critical event management software provider that proactively mitigates physical threats, allowing organizations to remain agile when a crisis strikes. Using the most trusted expertise and reliable AI-powered risk intelligence, mass notification and incident management technology, the OnSolve Platform enables enterprises, SMB organizations and all levels of government to detect, anticipate and mitigate physical threats that impact their people, places and property. \n\nWith billions of alerts sent annually and proven support for both the public and private sectors, OnSolve makes it easy to communicate wherever you may be and through various channels such as call, text, email mobile app notification, social media and more. \n\nNamed a Leader in The Forrester Wave: Critical Event Management Platforms, Q4 2023, OnSolve is used by thousands of entities to save lives, protect communities, safeguard critical infrastructure and enable agility for the organizations that power our economy.\n\nOnSolve maintains strict security compliance to ensure the safety of your data through various certifications such as (but not limited to) ISO, SOC, HIPPA, FedRAMP and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/08fabfcb-8434-4299-8ac1-5fff16f70620.jpeg","url":"https://www.softwareadvice.co.uk/software/442406/onsolve-platform","@type":"ListItem"},{"name":"Uptycs","position":7,"description":"The Uptycs CNAPP + XDR Platform is a comprehensive security solution designed for modern attack surfaces. Uptycs enables organizations to reduce risk and respond to threats with a single, unified platform that covers the entire modern attack surface, including on-premises and cloud environments.\n\nWith a single UI and data model Uptycs streamlines your response to vulnerabilities, sensitive data exposure, and compliance mandates. Uptycs ties together threat activity as it traverses on-prem and cloud boundaries, delivering a more cohesive enterprise-wide security posture. The unique differentiator of Uptycs is that it combines multiple security measures into one platform, so you can eliminate disparate tools. \n\nShift up with Uptycs.\n\nKEY BENEFITS:\n\n1. Unified Platform: Uptycs consolidates security functions across data centers, laptops, build pipelines, containers, and cloud environments, reducing complexity and tool sprawl.\n\n2. Improved Risk Decisions: Uptycs helps make better risk decisions by providing extensive security and IT data, without relying on black boxes.\n\n3. Broad Attack Surface Coverage: The platform supports hybrid cloud, containers, laptops, and servers, using standardized telemetry and open standards for extensibility.\n\n4. Streamlined Detection and Response: Uptycs consolidates identity and policy management, and security intelligence, enabling faster Mean Time to Detection (MTTD) and Mean Time to Resolution (MTTR).\n\n5. Comprehensive Cloud Security: Get best-in-class cloud security coverage with agent-based and agentless solutions including: Cloud Workload Protection (CWPP), Kubernetes Security Posture Management (KSPM), Cloud Security Posture Management (CSPM), Cloud Infrastructure Entitlements Management (CIEM), and Cloud Detection and Response (CDR).\n\n6. eXtended Detection and Response (XDR): Uptycs offers industry-leading XDR for endpoint protection, detection, and investigation across macOS, Windows, and Linux endpoints.\n\n7. Advanced Threat Detection and Response: The platform includes real-time threat detection, investigation and forensics, remediation and blocking, and additional security controls, providing a comprehensive security solution.\n\nDevOps teams love Uptycs!\n\nUptycs offers significant benefits to DevOps teams by providing a comprehensive and unified solution for securing container and Kubernetes environments. With its enhanced capabilities in Kubernetes security posture management (KSPM), container governance, threat detection, and vulnerability scanning, Uptycs simplifies the process of securing container-based workloads at scale. It improves visibility and control over container assets and Kubernetes control planes, allowing teams to monitor and manage their container fleets effectively. Additionally, Uptycs streamlines policy enforcement, compliance management, and threat detection, while supporting both fully-managed and self-managed Kubernetes environments and various container runtimes. By integrating with the CI/CD pipeline, Uptycs ensures continuous security throughout the development lifecycle, enabling DevOps teams to build and deploy secure applications more efficiently.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/233d3187-84ec-4451-a902-6d711accffa8.png","url":"https://www.softwareadvice.co.uk/software/417883/uptycs","@type":"ListItem"},{"name":"Enginsight","position":8,"description":"Enginsight helps protect businesses from the ever-evolving landscape of cyber threats and ensures the security and stability of their IT infrastructure. From vulnerability management to intrusion detection and prevention, the platform covers all aspects of cybersecurity.\n\nOne of the standout features of Enginsight is its automated penetration testing capability, which allows organizations to conduct thorough assessments of their network and infrastructure for potential vulnerabilities. By proactively identifying and remediating these vulnerabilities, organizations can enhance their security posture. The platform also provides detailed audit reports and actionable recommendations to improve cybersecurity. Its IT monitoring feature equips businesses with comprehensive control over their systems, enabling them to identify performance issues and anomalies. \n\nEnginsight offers robust web security capabilities, allowing organizations to monitor and secure their websites. By identifying vulnerabilities, monitoring performance, and detecting and mitigating threats like malware and DDoS attacks, Enginsight provides real-time insights into website availability, encryption, and security levels.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8f4c9feb-2874-42ea-8d73-f275223c7f0c.png","url":"https://www.softwareadvice.co.uk/software/288516/enginsight","@type":"ListItem"},{"name":"ManageEngine EventLog Analyzer","position":9,"description":"ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology,  health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. \n\nWith network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports.  \n\nEventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats. And with an automated incident response system, SOCs can mitigate potential threats. \n\nThe solution also helps users to comply with various IT compliance standards such as PCI DSS, ISO 27001, GLBA, SOX, HIPAA, CCPA, GDPR and more. Subscription based services are offered depending upon the number of log sources for monitoring. Support is made available to the users via phone, product videos and an online knowledge base.\n\nManageEngine also offers Onboarding for EventLog Analyzer which is our holistic solution implementation service by experts for your unique business requirements. Get onboarding services here \nhttps://www.manageengine.com/onboarding/iam-and-siem-onboarding.html?utm_source=Softwareadvice&utm_medium=onboardingl&utm_campaign=product_listing_default","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/624c8988-321b-4e2a-9bf0-f3eff8aa872e.png","url":"https://www.softwareadvice.co.uk/software/69829/manageengine-eventlog-analyzer","@type":"ListItem"},{"name":"Holm Security VMP","position":10,"description":"The Holm Security helps customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one integrated view.\n\nNext-Gen Vulnerability Management Platform includes the following:-\n\nTechnical Assets:-\n1) System & Network Scanning\nTakes control of the security of systems and networks with System & Network Scanning. It covers all parts of the user's infrastructure – public and local systems, computers, cloud infrastructure, IoT, and OT/SCADA.\n\n2) Web Application Scanning\nIdentifies a wide range of vulnerabilities, including OWASP top 10 and exposed APIs, with Web Application Scanning helping users to reduce their attack surface.\n\nHuman Assets:-\n3) Phishing & Awareness Training\nBuilds human firewalls with the help of simulated email attacks, i.e., phishing, spear phishing, and ransomware. Increase employee resiliency with tailored and automated awareness training.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a83f49aa-46d4-42b8-88ee-e5cb317604a6.png","url":"https://www.softwareadvice.co.uk/software/360656/holm-security-vmp","@type":"ListItem"},{"name":"VenariX","position":11,"description":"The essence of VenariX lies in its comprehensive treatment of cyber incidents, threat actors, and their ramifications across global sectors. Each incident report on VenariX is a product of rigorous analysis, presented with clarity to ensure users grasp the full context and implications. Profiles of threat actors come detailed with their targets, behaviors, and impacts, offering a preemptive lens through which users can foresee and counter potential breaches. VenariX's customizable notification system serves as a proactive tool, alerting users to threats tailored to their specific criteria. This blend of in-depth analysis, tailored insights, and timely alerts positions VenariX as a pivotal resource in enhancing cyber resilience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/451f6719-09ac-4da4-b64e-a19dada6cca2.jpeg","url":"https://www.softwareadvice.co.uk/software/522078/VenariX","@type":"ListItem"},{"name":"Threat Detection Marketplace","position":12,"description":"Threat Detection Marketplace (TDM) is a SaaS content analysis platform, which provides businesses with security information event management (SIEM) and endpoint detection and response (EDR) tools to identify cybersecurity threats. Professionals can conduct automated audits and generate technical reports related to data quality issues, detection rules coverage and more.\n\n\nIT technicians can access MITRE ATT&CK, a global repository of resources and techniques, to create use cases for cloud security monitoring, data integration with Amazon Elastic Container Service (ECS) and other processes. Threat Detection Marketplace provides a dashboard, which can be utilized by enterprises to gain an overview of impacted devices and audit results.\n\n\nThreat Detection Marketplace facilitates integration with several third-party cybersecurity applications including Elastic Stack, Qradar, Splunk and ArcSight. Pricing is available on request and support is extended via live chat and an inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f8bcf7c9-a8c4-44ce-b54b-ba2cfa5200fd.png","url":"https://www.softwareadvice.co.uk/software/106326/threat-detection-marketplace","@type":"ListItem"},{"name":"365 Total Protection","position":13,"description":"365 Total Protection is an email security management platform for Microsoft Office 365.\n\nThis platform provides a comprehensive security solution with a wide range of features that ensure email and data security such as real-time mail flow analysis, spam and malware protection, and filter options to find data on specific emails.\n \nThe Enterprise plan covers legally compliant email archiving with advanced features and offers intelligent protection against advanced persistent threats by using AI-based analysis mechanisms.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3afbcf5a-3289-4cd1-9c4b-5bdceb64ba50.png","url":"https://www.softwareadvice.co.uk/software/402258/365-total-protection","@type":"ListItem"},{"name":"MixMode","position":14,"description":"MixMode is a no-rules Cybersecurity platform, serving large enterprises with big data environments across a variety of industries. We deliver a patented, self-learning platform that acts as the Cybersecurity Intelligence Layer℠ to detect both known and unknown attacks, including novel attacks designed to bypass legacy cyber defenses. Trusted by global entities in banking, public utilities and government sectors, industry cyber leaders rely on MixMode to protect their most critical assets. The platform dramatically improves the efficiency of SOC teams previously burdened with writing and tuning rules and manually searching for attacks.\n\nMixMode’s Third Wave AI is uniquely effective at addressing blindspots in enterprise security\n- Detect Novel Attacks\n- Monitor voluminous data streams\n- Reduce disparate tools\n\nKnown and Novel Attack Detection:  80% of successful attacks are novel attacks (per Ponemon Institute) designed to bypass legacy rules-based systems, rendering tools that rely on rules, labeling, human operators, and training data useless in detecting such attacks before the damage is done. MixMode uses a breakthrough, real-time approach based in dynamical systems with no reliance on rules to detect and defend against known and novel cyber-attacks, enabling your security team to stop the attack before damage or destabilization. \n\nGain Visibility via Efficient Alert Triage:  With the increase in the volume of data across multiple environments, one of the most common concerns we hear from SOC teams is they have no way to triage alerts from the multiple cybersecurity tools and data sources they are currently managing.  MixMode solves this problem by applying our technology at the raw signal level.  This allows our customers to automate identification, notification, and context for high risk threats across all data types through their entire organization (cloud, flow, API, network, log, IoT, etc.).\n\nAutomation → Real-Time Detection:  MixMode’s AI platform is a self-learning system that builds an understanding of complex environments to create an evolving forecast of what’s expected in a given context like time of day, day of week and how entities and users communicate. As a result, we can detect anomalies that are breadcrumbs, or precursors to a breach in real-time.  This evolving forecast of what’s expected and real-time identification of deviations is essential to detecting and combating novel attacks that rules-based systems consistently miss.  And the majority of attack detection claims in the marketplace that mention ML or AI are reliant on rules-based detection versus MixMode’s patented, Third Wave AI technology.  \n\nNo Assembly Required:  By removing the inefficiencies that rules-based alerts and constant tuning can place on your security team, MixMode’s self-learning AI’s understanding of normal and expected behavior positions you to effectively detect novel and known attacks in real-time. You can quickly augment your overwhelmed SOC team by deploying MixMode alongside your existing security stack, or you may decide to consider tool consolidation with MixMode as the primary interface for your team.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/514d9156-e063-45f0-992e-bf522df3106b.png","url":"https://www.softwareadvice.co.uk/software/266675/mixmode","@type":"ListItem"},{"name":"Quadrant XDR","position":15,"description":"Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. \n\nWith intelligent action and rapid response, XDR's proprietary technology is operated by seasoned security analysts around the clock and combines the best security technology and talent in a single XDR solution. Combining a roster of expert analysts and a powerful stack of security solutions into one complete ecosystem the platform allows for users to monitor and protect our networks, eliminating time wasted through escalation, and providing a full suite of security solutions, no matter the vertical or size and much.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/281ab9ae-b252-48d3-9818-a91024919b38.jpeg","url":"https://www.softwareadvice.co.uk/software/417889/sagan","@type":"ListItem"},{"name":"Cyabra","position":16,"description":"Cyabra enables global enterprises and governments to understand and respond to online manipulation that distorts public perception and decision-making. As manipulated content, coordinated behaviors, and inauthentic actors increasingly shape what people see and believe online, organizations need clarity about what is real, what is coordinated, and what actually matters.\nCyabra analyzes three foundational elements of information integrity: actors, behaviors, and content. By examining who is operating, how activity is coordinated and amplified, and how narratives are leveraged, Cyabra helps organizations distinguish isolated noise from coordinated influence.\nOperating at scale, Cyabra enables teams to focus on the small number of actors and behaviors responsible for disproportionate impact. Evidence is translated into clear mitigation steps that fit directly into existing workflows, allowing organizations to act proportionately, avoid unnecessary escalation, and reduce misdirected response.\nCyabra supports continuous analysis across evolving situations, allowing organizations to move fluidly between broad patterns and specific cases without losing context. This combination of scale, precision, and usability turns overwhelming information into practical clarity.\nToday, Cyabra is used by leading global enterprises, communications firms, and public-sector organizations. The solution maintains a neutral, evidence-led posture and is designed for situations where judgment, credibility, and clarity are essential.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/08b586ba-3d7d-49ec-aaf2-8d5675b8b7ac.png","url":"https://www.softwareadvice.co.uk/software/416454/cyabra","@type":"ListItem"},{"name":"Techowlshield","position":17,"description":"TechOwl Shield throws up an iron curtain against cyber threats. We ditch one-size-fits-all solutions and instead deploy a personalized arsenal. Our toolbox is brimming with cutting-edge threat detection, meticulous brand monitoring, in-depth vulnerability analysis, constant infrastructure vigilance, and deep dives into supplier risks. This multi-pronged approach fortifies your overall cybersecurity, making your digital defenses unshakable.\n\nFrom healthcare to finance to retail, no industry is left exposed. We tailor our services to your specific needs. Our custom toolbox includes anti-phishing shields, rogue software defense, dark web monitoring for data breaches, brand reputation guardians, attack surface analysis to expose weaknesses, and even email security checks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7d081281-d4ac-4479-90e6-d57d991b51da.png","url":"https://www.softwareadvice.co.uk/software/520252/Techowlshield","@type":"ListItem"},{"name":"Dark Atlas","position":18,"description":"Dark Atlas is a state-of-the-art dark web monitoring platform that has been designed to safeguard users against potential data leakage on the dark web. With its cutting-edge technology and advanced algorithms, Dark Atlas constantly scans and monitors the hidden corners of the dark web in real time, ensuring that any traces of sensitive information are promptly identified and addressed.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/514ccb7b-5539-4477-bab5-92764f43ee24.png","url":"https://www.softwareadvice.co.uk/software/420999/dark-atlas","@type":"ListItem"},{"name":"TEHTRIS XDR Platform","position":19,"description":"Create your playbooks and interconnect your cyber solutions: \n\nOrchestrate all your cyber tools from a single console and get quicker responses to attacks. Automate your processes, create on-call scenarios, and group your alerts into single incidents.\n\nUnmatched detection of known and unknown threats: \n\nDetect all types of threats, even threats from weak signals or spotted by different solutions with the TEHTRIS XDR Platform and prevent security breaches.\n\nReal-time remediation: \n\nThe TEHTRIS XDR Platform hyperautomates your response to attacks and coordinates all your solutions, in addition to ingesting your security events.\n\nAll your cybersecurity in a single console: \n\nUnify your cybersecurity by bringing together all your solutions in a single console for hyperautomated detections and responses. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.\nOrchestrate all your cybersecurity tools simultaneously, including your existing solutions such as Zscaler and Proofpoint, with the TEHTRIS XDR Platform. Our platform is available in our secured cloud or on-prem. Easily deploy it in your ecosystem with in & out APIs. With its customizable playbooks and its hyperautomation capabilities you will get immediate responses to cyberattacks.\n\nAll of TEHTRIS’ augmented technology included:\n\nGet all of TEHTRIS’ augmented technology directly with our XDR Platform. In addition to unifying all your cyber solutions to accelerate your detections and responses to attacks, the TEHTRIS XDR Platform offers you all its analytic intelligence. Each module of the TEHTRIS XDR Platform uses the TEHTRIS augmented technology to achieve quicker detections, investigations and remediations. You will get: \n\n- Our CTI (Cyber Threat Intelligence): a continuously updated Cyber Warehouse. With it, you will have the right tools for instant analysis, sandboxing and hunting.\n- XDR / SOAR: to orchestrate all your cyber solutions, including partners of the TEHTRIS XDR Platform. It lets you create your own playbooks to get hyperautomated detections and responses. \n- Our artificial intelligence Cyberia: developed and edited directly by TEHTRIS, it works with all the modules of the platform to get you the most effective detection and response, thanks to its neural network (Deep Learning). \n- Our UEBA: a behavioral analysis engine based on Machine Learning, integrated in XDR / SIEM. It automatically detects irregular behaviors. \n- Our Soc in the box: prioritizes EDR alerts, detects anomalies and automatically groups events to facilitate the work of your analysts. \n\nStrengthened collaboration within your teams:\n\nYour team responsiveness is the key to a successful protection. At TEHTRIS, we believe that this needed reactivity comes from a close-knit team, which has been given the best technical tools to collaborate easily, quickly, and effectively in the event of an alert. To support your teams, address the current shortage of analysts and reduce MTTD and MTTR, the TEHTRIS XDR Platform offers several features: \n- Hyperautomated response to attacks \n- Contextualization of events directly on the platform \n- Alerts for your analysts during an attack \n- Possibility to create investigative groups within the XDR Platform \n- Enhanced filter management and co-publishing capabilities\n\nStay in control of your data:\n\nMore and more customers are alerting us: competing cyber solutions are retrieving and backing up all their data. To protect your company against industrial espionage, wherever you are, we have designed the TEHTRIS XDR Platform and its modules in a way that ensures that your files cannot be accessed. Choosing a cybersecurity solution that protects your data has become a strategic decision for business leaders in today's cyber and geopolitical context.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1c85258-a895-43fc-afdc-c06e52be60fb.jpeg","url":"https://www.softwareadvice.co.uk/software/421726/tehtris-xdr","@type":"ListItem"},{"name":"InsightIDR","position":20,"description":"insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to streamline processes related to endpoint detection, behavior analytics, incident response and more. Professionals can utilize log entry query language (LEQL), visual charts/graphs to find and view anomalies.\n\n\nKey features of insightIDR include file integrity or network monitoring, auditing, threat intelligence and compliance management. It allows businesses to analyze data, manage logs and detect risks or threats using attacker behavior analytics. Additionally, it helps users secure credentials or detect insider threats using machine learning technologies and user behavior analytics (UBA).\n\n\ninsightIDR facilitates integration with various third-party systems such as Microsoft Azure, Microsoft Office 365, Amazon Web Services (AWS), FireEye, Salesforce and more. The solution is available on monthly subscriptions and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e882035b-e2b2-4909-94fa-0ec411f53ff7.png","url":"https://www.softwareadvice.co.uk/software/98135/insightidr","@type":"ListItem"},{"name":"Prophaze WAF","position":21,"description":"Prophaze WAF is a cloud security software designed to help businesses in various sectors such as education, healthcare, manufacturing, fintech and more protect Kubernetes clusters on-premise and on the cloud. Key features include AI firewall, DDoS protection, compliance management, virtual patching, incident management and API security. \n\n\nDevOps teams using Prophaze WAF can receive holistic protection from application vulnerabilities such as data leaks, rate anomaly, malware attacks, exploit bots, zero-day attacks, misconfigured servers, fileless attacks, and scraping bots among others. The system detects anomalies and protocol IPs in traffic flows via machine language behavior analysis and block DDoS traffic whilst letting valid requests flow through. Additionally, it automatically deploys virtual patching to API, web applications and microservices. \n\n\nProphaze WAF offers multi-tenancy capabilities, which allow organizations to secure data of multiple users on a database and shared application. The system can be deployed in private clouds or on-premise on AWS, Microsoft Azure and Google Cloud. Support is extended via an online inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e689cbe6-8218-48e6-836c-5b4edeff0ef4.png","url":"https://www.softwareadvice.co.uk/software/185797/prophaze-waf","@type":"ListItem"},{"name":"SafeGuard Cyber","position":22,"description":"SafeGuard Cyber is a comprehensive SaaS platform that allows enterprise-level visibility and control over the information shared over digital channels. Whether digital messaging occurs on a collaboration channel like Slack, a chat channel like WhatsApp, or social media channel like Twitter, you and your enterprise are secure and compliant with SafeGuard Cyber.\n\n\nSafeGuard Cyber provides unmatched visibility into third-party cloud applications and dark corners of the web where vulnerable data resides. SafeGuard Cyber enables organizations to take immediate action at scale allowing real-time protection and mitigation via our machine learning policy engine. Safeguard Cyber's account-based approach fits into natural human workflows without compromising security.\n\n\nToday's innovative CISOs also acknowledge that a great deal of business communication is now conducted outside the network perimeter. Marketing, sales, and intra-organizational communications do still take place over email. But they have moved partially, if not wholly, over to the third-party cloud channels that are now crucial for both growth and internal operations. The increased use of these external and internal cloud channels means that the organizational threat surface has expanded.\n\n\nMalware, spear-phishing, ransomware, and social engineering are just a few threat vectors that originate outside of the network perimeter, and with SafeGuard Cyber your enterprise gains visibility and reduces risk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2ddedc93-ca17-46d5-bf6f-f363650741aa.png","url":"https://www.softwareadvice.co.uk/software/112509/safeguard-cyber","@type":"ListItem"},{"name":"ThreatSTOP DNS Defense","position":23,"description":"ThreatSTOP connects the best Threat Intelligence (TI) to your existing DNS systems, and blocks threats before damage is done. The SaaS platform aggregates and curates more than 900 Threat Intelligence (TI) feeds, removing the complexity and costs of working with TI, and uses the result to power automated PDNS updates sent directly to your existing DNS systems. \n\nThreatSTOP DNS Defense supports broad integrations including Microsoft Active Directory, BIND, Infoblox, F5, PowerDNS, and many more. Connecting the best, ultra-low false positive TI to your network is plug-and-play simple with ThreatSTOP.\n\n* Proactively identifies and blocks malicious network communications by tracking attacker infrastructure.\n* Tracks over 25 Million active IOCs across 900+ curated feeds, with an average (12mo) FP rate of 0.002%.\n* Compatible with popular DNS systems. Includes a Free DNS server if you don't have one already. \n* Customers see immediate results and quickly pinpoint infected machines.\n* Solves privacy issues, and saves time and money.\n* Exceeds Protective DNS guidance from NSA, CISA, DoD.\n* Meets the needs of any size organization and covers all network types.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b986ffba-3b94-4849-acc2-723d4d18f379.jpeg","url":"https://www.softwareadvice.co.uk/software/242908/dns-defense","@type":"ListItem"},{"name":"Resecurity Risk","position":24,"description":"Resecurity Risk allows carriers, drivers and logistics corporations to monitor and tracks the movement of goods, services and information across global supply chains. It helps companies in managing risks, with modules that include sales analysis, net worth analysis and debt management.\n\nThe platform integrates with existing transportation software to provide real-time vehicle tracking, location accuracy and reporting in commercial fleets and improves service levels through trend analysis. It provides a full picture of the supply chain, including information on all threats, vulnerabilities and risks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc72e088-9fae-4e8d-9255-b90236b8cc10.png","url":"https://www.softwareadvice.co.uk/software/259770/risk","@type":"ListItem"},{"name":"Strobes RBVM","position":25,"description":"Enable a robust offensive security program with the help of Strobes. With the combination of ASM, PTaaS and VM we help you achieve great progress toward building a robust CTEM program. Our best-in-class security experts along with an automated platform help you in this journey.\n\nStrobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management. This ensures that organizations are equipped with cutting-edge tools and methodologies to address evolving cyber threats.​","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/07331f99-2c76-4084-9b8c-7f28a3427920.png","url":"https://www.softwareadvice.co.uk/software/96482/strobes","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=4#itemlist","numberOfItems":25}
</script>
