---
description: Page 7 - Discover the best Threat Intelligence Tools for your organisation. Compare top Threat Intelligence Tools tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 7 - Best Threat Intelligence Tools - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Threat Intelligence Tools](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software) > [Page 7](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=7)

# Threat Intelligence Tools

Canonical: https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software

Page: 7 / 7\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=6)

-----

## Products

1. [Cyware](https://www.softwareadvice.co.uk/software/416558/cyware) (0 reviews) — Cyware enables security teams at leading global organizations to operationalize threat intelligence data and execute ...
2. [Pendulum](https://www.softwareadvice.co.uk/software/451599/Pendulum) (0 reviews) — Pendulum is a risk and intelligence platform designed to streamline the collection and analysis of online narratives ...
3. [Edgewatch](https://www.softwareadvice.co.uk/software/523996/Edgewatch) (0 reviews) — Edgewatch is an attack surface management platform that helps organizations discover, monitor and analyze devices tha...
4. [NordStellar](https://www.softwareadvice.co.uk/software/524045/NordStellar) (0 reviews) — NordStellar is a threat exposure management platform. It helps businesses detect and respond to cyber threats targeti...
5. [Fidelis Endpoint](https://www.softwareadvice.co.uk/software/526965/Fidelis-Endpoint) (0 reviews) — Fidelis Endpoint is an endpoint detection and response (EDR) solution that provides security for organizations. It is...
6. [SiON](https://www.softwareadvice.co.uk/software/505139/SiON) (0 reviews) — SiON by DefendEdge is a cloud-based employee threat management platform designed to give organizations a powerful and...
7. [Silo for Research](https://www.softwareadvice.co.uk/software/488817/Silo) (0 reviews) — Silo is a secure web gateway designed to help businesses in the finance, government, healthcare, IT, legal and other ...
8. [IPLocate](https://www.softwareadvice.co.uk/software/508951/IPLocate) (0 reviews) — IPLocate.io is an IP address geolocation API, threat intelligence and IP data API - designed by developers, for devel...
9. [Cyble Vision](https://www.softwareadvice.co.uk/software/519452/Cyble-Vision) (0 reviews) — Cyble Vision is an AI-powered threat intelligence platform that delivers actionable insights to safeguard organizatio...
10. [Vulseek](https://www.softwareadvice.co.uk/software/533823/Vulseek) (0 reviews) — Vulseek is a vulnerability management software that provides continuous scanning and monitoring of IT environments to...
11. [OpenText Core MDR​](https://www.softwareadvice.co.uk/software/534139/OpenText-Core-MDR) (0 reviews) — OpenText Core MDR is a managed detection and response solution designed to provide continuous threat monitoring, inci...
12. [OpenText Core EDR](https://www.softwareadvice.co.uk/software/534138/OpenText-Core-EDR) (0 reviews) — OpenText Core EDR, advanced endpoint detection and response for faster, simpler protection\*\* Secure endpoints with a ...

-----

Page: 7 / 7\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=6)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.uk/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.uk/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [Risk Management Software](https://www.softwareadvice.co.uk/directory/4423/risk-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.uk/#organization","@type":"Organization","parentOrganization":"G2.com, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@id":"https://www.softwareadvice.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Threat Intelligence Tools","description":"Page 7 - Discover the best Threat Intelligence Tools for your organisation. Compare top Threat Intelligence Tools tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=7","about":{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=7#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=7#breadcrumblist"},"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=7#webpage","@type":["WebPage","CollectionPage"],"mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=7#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"inLanguage":"en-GB"},{"@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=7#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Threat Intelligence Tools","position":2,"item":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software","@type":"ListItem"},{"name":"Page 7","position":3,"item":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=7","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 7 - Best Threat Intelligence Tools - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software?page=7#itemlist","@type":"ItemList","itemListElement":[{"name":"Cyware","position":1,"description":"Cyware enables security teams at leading global organizations to operationalize threat intelligence data and execute real-time actions by integrating intelligence management, automating workflows, and promoting secure collaboration for a stronger, unified defense.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/265edd7a-8e32-4c60-86e7-1020ec6932ef.png","url":"https://www.softwareadvice.co.uk/software/416558/cyware","@type":"ListItem"},{"name":"Pendulum","position":2,"description":"Pendulum is a risk and intelligence platform designed to streamline the collection and analysis of online narratives and topics of interest sourced from publicly available video and audio content. Leveraging proprietary machine learning (ML) technology, Pendulum enables analysts to uncover harmful content contained within a diverse range of platforms, including popular video sources like YouTube, Bitchute, and TikTok, as well as audio-only platforms like podcasts, and text-based mediums such as Twitter and news sources. The unique capabilities of Pendulum’s tool is the ability to provide in-depth summaries based on the overall context of the content, instead of the limitations of just the title, metadata, or tagged keywords/hashtags. By doing so, analysts save significant time and resources, allowing them to uncover critical insights that may be buried within lengthy videos.\n\nPendulum accurately identifies relevant content across its extensive corpus of data using user-defined models crafted from Boolean keyword search expressions and natural language processing (NLP). To refine results, utilizes zero-shot learning and pre-trained language model readers to ensure relevance beyond simple keyword matching. Additional large language models (LLM) and ML are implemented within the tool to conduct a range of analytics including summarization and statistics; identification of language risks (e.g. threats, obscenity, identity hate) and determining referenced countries, companies, and individuals; and categorizing \ncontent creator accounts into communities.\n\nPendulum covers 19 platforms and sources including YouTube, TikTok, BitChute, Rumble, Instagram, Twitter, Snapchat, Reddit, TruthSocial, 4chan, Gab, Patriots.win, Threads, Consilium, Brighteon, Telegram, C-SPAN, VK, news, and podcasts. On a daily basis, the tool scrapes nearly 35 million posts from over 2.4 million channels. The corpus of data extends back three years and also includes content that has been removed from the various platforms. \n\nAdditionally, Pendulum is capable of working across 75 major languages for both search and translation of results, ensuring coverage and accessibility for users worldwide.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bf3c1511-0d3f-420c-8717-4e69827444fe.png","url":"https://www.softwareadvice.co.uk/software/451599/Pendulum","@type":"ListItem"},{"name":"Edgewatch","position":3,"description":"Edgewatch is an attack surface management platform that helps organizations discover, monitor and analyze devices that are accessible from the internet. The platform offers users comprehensive visibility into their digital presence, allowing them to manage potential vulnerabilities.\n\nEdgewatch helps continuously scan public IP addresses to reveal a business' digital footprint. The platform integrates automated threat intelligence that helps uncover and alert organizations about compromised credentials and data breaches. Additionally, it enables security infrastructure mapping, offering a comprehensive view of an organization's digital presence and identifying vulnerabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b753da50-7ac3-4659-b4d6-707bd362d4ca.png","url":"https://www.softwareadvice.co.uk/software/523996/Edgewatch","@type":"ListItem"},{"name":"NordStellar","position":4,"description":"NordStellar is a threat exposure management platform. It helps businesses detect and respond to cyber threats targeting their company. The platform serves organizations across various industries that want to enhance their data security and mitigate risks before they escalate.\n\nNordStellar offers several key features. The data breach monitoring functionality identifies and mitigates risks related to compromised company data, minimizing the threat of ransomware. The account takeover prevention feature detects compromised employee or consumer credentials that could lead to data breaches. The session hijacking prevention tracks down malware-infected users and invalidates stolen session cookies, preventing unauthorized access to company data. The platform also monitors the dark web for enterprise-related keywords, proactively detecting potential threats and vulnerabilities.\n\nNordStellar is created by Nord Security, the company behind one of the world's most popular digital privacy tools, NordVPN. As part of Nord Security's advanced cybersecurity solutions, NordStellar provides businesses with complete visibility over their digital risks and the ability to respond with confidence, safeguarding their operations from evolving cyber threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f426de7-6b87-4e11-8b66-533a2c0fd8a5.jpeg","url":"https://www.softwareadvice.co.uk/software/524045/NordStellar","@type":"ListItem"},{"name":"Fidelis Endpoint","position":5,"description":"Fidelis Endpoint is an endpoint detection and response (EDR) solution that provides security for organizations. It is designed to identify and address threats targeting individual devices within a network. Fidelis Endpoint serves a wide range of industries, including defense, government, healthcare, finance, information technology, education, retail, and tribal gaming.\n\nThe solution offers real-time endpoint monitoring and analysis, allowing it to detect sophisticated threats at any point along the attack lifecycle. It also provides incident response capabilities for swift threat containment and remediation. Fidelis Endpoint integrates with threat intelligence feeds, enabling it to stay up-to-date with the latest security threats. Additionally, the solution offers forensic investigation tools for post-incident analysis, helping organizations understand the extent and risk of present vulnerabilities.\n\nFidelis Endpoint delivers EDR protection both on-premises and in the cloud. It can scale to support hundreds of thousands of endpoints in rapidly growing cloud environments. The solution's deep visibility into endpoint activity allows for efficient investigations and hands-on control, enabling organizations to pinpoint and eradicate threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f5a6c0f8-4928-49cb-b3e7-f74dc41d0f97.jpeg","url":"https://www.softwareadvice.co.uk/software/526965/Fidelis-Endpoint","@type":"ListItem"},{"name":"SiON","position":6,"description":"SiON by DefendEdge is a cloud-based employee threat management platform designed to give organizations a powerful and proactive approach to insider threat detection, investigation, and response. Built to meet the evolving needs of modern security operations centers, SiON integrates advanced artificial intelligence and machine learning to continuously monitor and analyze user activity across an organization, detecting anomalies that could indicate malicious intent, policy violations, or compromised accounts. The platform consolidates diverse data sources, ranging from HR systems and endpoint security tools to network logs, global intelligence feeds, and ticketing platforms into a single, intuitive dashboard, delivering real-time visibility and actionable intelligence to security teams. By unifying these inputs, SiON removes data silos, reduces investigative complexity, and enables faster, more accurate decision-making.\n\nDeeply integrated with Fortinet’s Security Fabric, SiON enhances detection and response capabilities by leveraging multi-layered telemetry from FortiGate NGFWs, FortiClient EMS, FortiSandbox, and other Fortinet tools. This integration enables not only better visibility but also automated enforcement actions, such as isolating devices, blocking network access, geofencing logins, and revoking credentials when suspicious behavior is detected. SiON monitors employees throughout their entire lifecycle, from onboarding through offboarding, ensuring that risk is managed proactively at every stage of access. Whether identifying attempts at data exfiltration, detecting suspicious logins from unusual locations, or spotting deviations from baseline user behavior, the platform is designed to surface high-priority alerts while minimizing false positives.\n\nThe flexibility of SiON’s architecture allows it to be deployed in the cloud or on-premises, making it adaptable to a wide range of IT environments. Its role-based dashboards can be customized for executives, analysts, and compliance officers, ensuring that each stakeholder has access to the most relevant insights for their role. Built with operational efficiency in mind, SiON integrates seamlessly with ticketing and workflow systems, automating investigative processes and providing a clear audit trail for incident management and compliance reporting.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/06c03526-71fe-42ad-8be5-a099c6740a91.jpeg","url":"https://www.softwareadvice.co.uk/software/505139/SiON","@type":"ListItem"},{"name":"Silo for Research","position":7,"description":"Silo is a secure web gateway designed to help businesses in the finance, government, healthcare, IT, legal and other sectors isolate web points to protect end-users against cyber threats. The platform enables administrators to anonymously conduct online investigations and analyze malicious content.\n\nManagers can block specific domains according to URLs and filter content based on keywords or categories on a unified interface. Silo allows operators to define and enforce cybersecurity policies across browsers and configure internet access among staff members to regulate compliance. Additionally, teams can audit data transfer processes and track online activities via browser fingerprint spoofing functionality.\n\nSilo lets businesses integrate the system with several third-party applications including Azure Active Directory, Okta and Ping Identity. Pricing is available on request and support is extended via phone, email, knowledge base and FAQs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bc134bad-3393-4108-a3f7-3f3f251b374f.png","url":"https://www.softwareadvice.co.uk/software/488817/Silo","@type":"ListItem"},{"name":"IPLocate","position":8,"description":"IPLocate.io is an IP address geolocation API, threat intelligence and IP data API - designed by developers, for developers.\n\nIPLocate.io provides accurate and reliable information about IP addresses, including geolocation data, threat and privacy detection, company and ASN details, and hosting provider information.\n\nIPLocate's comprehensive data and features enable developers to build revolutionary products, personalize website content, prevent fraud and free trial abuse, enforce compliance, and apply geographic restrictions with ease.\n\nDevelopers can easily integrate the API into their applications, with comprehensive documentation and quick start guides available for various programming languages. Make 1,000 requests per day for free, or sign up for a paid plan with a monthly quota. The API supports both IPv4 and IPv6 addresses and covers billions of IP addresses across millions of networks.\n\nThe IPLocate.io geolocation API runs on fast and scalable infrastructure, backed by AWS, and serves billions of requests each month. Thousands of developers use IPLocate.io's suite of threat intelligence products to improve their applications.\n\nIn addition to the API, IPLocate also provides downloadable IP address databases in CSV, and MMDB formats, which are updated daily. This includes our free IP to Country and IP to ASN databases, which can be easily integrated into existing tools and apps. Our free databases beat the competition: they have a permissive license, they are more accurate, and more regularly updated than others like Maxmind or IP2Location's databases. We also offer premium paid databases, so you can self-host the exact same accurate data as our API:\n- Full IP Geolocation database \n- IP to Company database \n- IP to Hosting/Datacenter database \n- Threat and Privacy Detection database \n- Full WHOIS & Abuse Contact database \n- Reverse DNS (RDNS) database\n\nIPLocate.io also provides a range of IP address tools, including free IP to Hostname lookup, CIDR to IP Range Converter, IP to Number Converter, and IPv6 Expander/Collapser.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/39258d6e-b375-40a5-929e-a98dae532cb9.png","url":"https://www.softwareadvice.co.uk/software/508951/IPLocate","@type":"ListItem"},{"name":"Cyble Vision","position":9,"description":"Cyble Vision is an AI-powered threat intelligence platform that delivers actionable insights to safeguard organizations from evolving cyber threats. Tailored for businesses of all sizes, Cyble Vision utilizes Gen 3 AI capabilities to proactively monitor, analyze, and mitigate risks stemming from digital threats. Its key features include comprehensive threat intelligence, third-party risk management, executive and brand monitoring, advanced incident response, deepfake detection and takedown, physical threats monitoring, cloud security posture management, dark web monitoring, DFIR, and more. Ideal for CISOs, CTOs, Directors of IT, SOC Analysts, as well as cybersecurity professionals seeking a comprehensive and proactive threat intelligence solution.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8892ce00-0f24-484f-b813-ca8bb048f1f8.jpeg","url":"https://www.softwareadvice.co.uk/software/519452/Cyble-Vision","@type":"ListItem"},{"name":"Vulseek","position":10,"description":"Vulseek is a vulnerability management software that provides continuous scanning and monitoring of IT environments to identify security flaws. The system detects vulnerabilities across multiple asset types including IP addresses, domains, web applications, and networks, organizing findings by priority to streamline remediation. \n\nVulseek incorporates international security standards such as CVE, CWE, CPE, CVSS, EPSS, and OWASP to categorize vulnerabilities. The platform includes features for team collaboration, allowing administrators to assign vulnerabilities to specific team members for correction while generating dynamic reports. The software scans systems continuously, delivers initial results, identifies exposed services, detects active hostnames, catalogs technologies used in applications, and manages findings to eliminate false positives, from a consolidated tool.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c935b22b-570b-42a5-90c7-6cd862dab391.png","url":"https://www.softwareadvice.co.uk/software/533823/Vulseek","@type":"ListItem"},{"name":"OpenText Core MDR​","position":11,"description":"OpenText Core MDR is a managed detection and response solution designed to provide continuous threat monitoring, incident response, and comprehensive security coverage. It addresses the challenge of limited skilled security professionals by offering access to experienced security experts who deliver ongoing protection.\n\nThe platform continuously monitors networks and systems, using advanced technologies to detect threats in real time. Security professionals perform proactive threat hunting and detailed analysis to identify and investigate potential risks. It includes unified management of security tools, streamlined ticketing for vulnerability management, and configurable automated workflows to support incident response. The solution also provides access to current threat intelligence to help organizations address emerging cyber threats.\n\nThis co-managed security model allows organizations to enhance their security operations without expanding internal teams. IT staff maintain visibility into security activities while receiving support and guidance from security professionals. The solution ensures efficient threat identification and mitigation, with experts available to analyze threats, manage alerts, and assist with investigations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/72398914-f764-4846-bbae-f7aa8b20ee5f.png","url":"https://www.softwareadvice.co.uk/software/534139/OpenText-Core-MDR","@type":"ListItem"},{"name":"OpenText Core EDR","position":12,"description":"OpenText Core EDR, advanced endpoint detection and response for faster, simpler protection**\n\nSecure endpoints with a single platform that combines endpoint protection, SIEM, and SOAR capabilities, strengthened by global threat intelligence.\n\nOpenText Core EDR brings endpoint protection, SIEM, and SOAR functions together in one platform to simplify threat detection and response. It correlates activity across endpoints, networks, and identity systems to deliver clear visibility into potential threats, while automated playbooks handle containment and remediation. Built-in vulnerability assessment identifies risks from unpatched software based on CVE standards, and real-time monitoring is driven by continuously updated threat intelligence. The platform also supports broad integrations with IT operations, security tools, network infrastructure, cloud services, and PSA platforms through syslog and API connections.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2755ebf8-676e-41a8-a01d-03070a723fb1.jpeg","url":"https://www.softwareadvice.co.uk/software/534138/OpenText-Core-EDR","@type":"ListItem"}],"numberOfItems":12}
</script>
