Threat IntelligenceSophos UTM1https://dudodiprj2sv7.cloudfront.net/vendor-logos/aW/xM/0AFACIEHNKRT-180x180.JPEGAnomali Threat Platform2https://dudodiprj2sv7.cloudfront.net/vendor-logos/J6/za/PO53OTDG59Q6-180x180.JPEGSolarWinds MSP Threat Monitor3https://dudodiprj2sv7.cloudfront.net/vendor-logos/to/Kd/DXB2TUQPIR3A-180x180.PNGVectra Cognito Platform4https://dudodiprj2sv7.cloudfront.net/vendor-logos/MJ/0i/7FEIG3P6ANFK-180x180.JPEGCentrify Zero Trust Privilege Services5https://dudodiprj2sv7.cloudfront.net/vendor-logos/e9/VT/ZK0AX2SCS5T5-180x180.JPEGLookingGlass Cyber Solutions6https://dudodiprj2sv7.cloudfront.net/vendor-logos/vV/Bv/W7ESFB5029BF-180x180.JPEGAT&T Threat Intellect7https://dudodiprj2sv7.cloudfront.net/vendor-logos/10/5S/3XFHATD0DGJ5-180x180.PNGProofpoint Emerging Threat Intelligence8https://dudodiprj2sv7.cloudfront.net/vendor-logos/8m/3w/841F4UFBJE69-180x180.JPEGProofpoint Domain Discover for Email9https://dudodiprj2sv7.cloudfront.net/vendor-logos/8m/3w/841F4UFBJE69-180x180.JPEGProofpoint Nexus10https://dudodiprj2sv7.cloudfront.net/vendor-logos/8m/3w/841F4UFBJE69-180x180.JPEGFireEye iSIGHT Threat Intelligence11https://dudodiprj2sv7.cloudfront.net/vendor-logos/NG/Ce/Z0M72RNSMBG5-180x180.JPEGSymantec DeepSight Intelligence12https://dudodiprj2sv7.cloudfront.net/vendor-logos/4q/QY/K9TTG2FGRKUZ-180x180.PNGAdvanced Threat Defense13https://dudodiprj2sv7.cloudfront.net/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGCenturyLink Analytics and Threat Management14https://dudodiprj2sv7.cloudfront.net/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGSentinel IPS15https://dudodiprj2sv7.cloudfront.net/product-logos/uE/Tb/HV9TADX1G4S2.JPEGSnare16https://dudodiprj2sv7.cloudfront.net/product-logos/Gs/nZ/GJ87B1TFSTD5.JPEGIBM X-Force Incident Response and Intelligence Services (IRIS)17https://dudodiprj2sv7.cloudfront.net/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGIBM X-Force18https://dudodiprj2sv7.cloudfront.net/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEG

Threat Intelligence Platforms

Threat Intelligence Platform Overview

What is a Threat Intelligence Platform?

A threat Intelligence Platform helps organizations aggregate, correlate, and analyze threat data from multiple sources in real time to support defensive actions. A Threat Intelligence Platform can be a cloud or on-premise system to facilitate management of threat data from a range of existing security tools such as a SIEM, firewall, API, endpoint management software or Intrusion Prevention System. The primary purpose is to help organizations understand the risks and protect against a variety of threat types most likely to affect their environments.

Threat Intelligence Platforms Features & Capabilities

  • Data feeds from a variety of different sources including industry groups
  • Data triage
  • Alerts and reports about specific types of threats and threat actors
  • Analysis and sharing of threat intelligence
  • Normalization and scoring of risk data

Pricing Information

Threat intelligence pricing is often a subscription to multiple data feeds, with tiered pricing based on number of users. Data fees vary in cost from about $1,500 and $10,000 depending on the number of feeds.

Threat Intelligence Products

Listings (1-18 of 18)

We don't have enough ratings and reviews to provide an overall score.

San Jose-based Vectra offers their intruder and cyberthreat detection software, the Cognito Platform, which is designed to detect and remediate intrusion, as well as supply context with incident investigation.

We don't have enough ratings and reviews to provide an overall score.

Centrify aims to redefine Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure the modern enterprise. Centrify Zero Trust Privilege promises to help customers grant least privilege access based on verifying who is requesting access, the context of the request, and...

We don't have enough ratings and reviews to provide an overall score.

LookingGlass Cyber Solutions is a threat protection solution protecting against cyber attacks to global enterprises and government agencies The product is augmented by a team of security analysts who enrich the data feeds and provide timely insights to customers of potential risks.

We don't have enough ratings and reviews to provide an overall score.

Proofpoint Nexus is the security company's threat intelligence platform, now available to customers, which provides real-time data that spans email, social media, mobile devices and SaaS applications, supporting correlative study of attack behaviors and preemptive or forensic exploration and anal...

We don't have enough ratings and reviews to provide an overall score.

Sentinel IPS promises advanced threat protection at the network’s edge with Network Cloaking™, blocking malware, exploitation attempts, and other threats before they reach the firewall. Sentinel Internal Intelligence aims to give visibility inside the network, and the ability to monitor the entir...

We don't have enough ratings and reviews to provide an overall score.

Snare is an IT security analytics suite of applications from Prophecy International headquartered in Adelaide, providing a complete log monitoring and management solution, as well as network threat intelligence.

We don't have enough ratings and reviews to provide an overall score.

IBM experts provide the X-Force threat intelligence suite of services, including X-Force Research and X-Force Research Publications, and the X-Force Exchange platform for sharing threat intelligence knowledge and best practice with industry experts.