Threat IntelligenceSophos UTM1https://media.trustradius.com/vendor-logos/aW/xM/0AFACIEHNKRT-180x180.JPEGAnomali Threat Platform2https://media.trustradius.com/vendor-logos/J6/za/PO53OTDG59Q6-180x180.JPEGSolarWinds MSP Threat Monitor3https://media.trustradius.com/vendor-logos/to/Kd/DXB2TUQPIR3A-180x180.PNGVectra Cognito Platform4https://media.trustradius.com/vendor-logos/MJ/0i/7FEIG3P6ANFK-180x180.JPEGCentrify Zero Trust Privilege Services5https://media.trustradius.com/vendor-logos/e9/VT/ZK0AX2SCS5T5-180x180.JPEGPalo Alto Networks AutoFocus6https://media.trustradius.com/vendor-logos/MK/NG/UKHCVB1FA0XT-180x180.PNGLookingGlass Cyber Solutions7https://media.trustradius.com/vendor-logos/vV/Bv/W7ESFB5029BF-180x180.JPEGAT&T Threat Intellect8https://media.trustradius.com/vendor-logos/10/5S/3XFHATD0DGJ5-180x180.PNGProofpoint Emerging Threat Intelligence9https://media.trustradius.com/vendor-logos/8m/3w/841F4UFBJE69-180x180.JPEGProofpoint Domain Discover for Email10https://media.trustradius.com/vendor-logos/8m/3w/841F4UFBJE69-180x180.JPEGProofpoint Nexus11https://media.trustradius.com/vendor-logos/8m/3w/841F4UFBJE69-180x180.JPEGFireEye iSIGHT Threat Intelligence12https://media.trustradius.com/vendor-logos/NG/Ce/Z0M72RNSMBG5-180x180.JPEGSymantec DeepSight Intelligence13https://media.trustradius.com/vendor-logos/4q/QY/K9TTG2FGRKUZ-180x180.PNGMcAfee Advanced Threat Defense14https://media.trustradius.com/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGCenturyLink Analytics and Threat Management15https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGSentinel IPS16https://media.trustradius.com/product-logos/uE/Tb/HV9TADX1G4S2.JPEGSnare17https://media.trustradius.com/product-logos/Gs/nZ/GJ87B1TFSTD5.JPEGIBM X-Force Incident Response and Intelligence Services (IRIS)18https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGIBM X-Force19https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGMarlabs Rapid 36020https://media.trustradius.com/vendor-logos/BI/jP/I87OODHZQTVJ-180x180.JPEGCheck Point ThreatCloud21https://media.trustradius.com/vendor-logos/N5/Pq/9GTB1XOCNWCX.pngImperva Attack Analytics (formerly ThreatRadar)22https://media.trustradius.com/vendor-logos/Ju/3f/ZODO0FS3XXK4-180x180.JPEGVirusTotal23https://media.trustradius.com/vendor-logos/2z/KI/04QVE8WFGWCS-180x180.JPEGWebroot BrightCloud24https://media.trustradius.com/vendor-logos/Zp/BI/TZTASWT8R27Q-180x180.JPEGKaspersky Private Security Network25https://media.trustradius.com/vendor-logos/RZ/RK/QTA0JQCKJP1L-180x180.JPEG

Threat Intelligence Platforms

Threat Intelligence Platform Overview

What is a Threat Intelligence Platform?

A threat Intelligence Platform helps organizations aggregate, correlate, and analyze threat data from multiple sources in real time to support defensive actions. A Threat Intelligence Platform can be a cloud or on-premise system to facilitate management of threat data from a range of existing security tools such as a SIEM, firewall, API, endpoint management software or Intrusion Prevention System. The primary purpose is to help organizations understand the risks and protect against a variety of threat types most likely to affect their environments.

Threat Intelligence Platforms Features & Capabilities

  • Data feeds from a variety of different sources including industry groups
  • Data triage
  • Alerts and reports about specific types of threats and threat actors
  • Analysis and sharing of threat intelligence
  • Normalization and scoring of risk data

Pricing Information

Threat intelligence pricing is often a subscription to multiple data feeds, with tiered pricing based on number of users. Data fees vary in cost from about $1,500 and $10,000 depending on the number of feeds.

Threat Intelligence Products

Listings (1-25 of 28)

We don't have enough ratings and reviews to provide an overall score.

San Jose-based Vectra offers their intruder and cyberthreat detection software, the Cognito Platform, which is designed to detect and remediate intrusion, as well as supply context with incident investigation.

We don't have enough ratings and reviews to provide an overall score.

Centrify aims to redefine Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure the modern enterprise. Centrify Zero Trust Privilege promises to help customers grant least privilege access based on verifying who is requesting access, the context of the request, and...

We don't have enough ratings and reviews to provide an overall score.

AutoFocus™ contextual threat intelligence service, from Palo Alto Networks, accelerates analysis, correlation and prevention workflows. Targeted attacks are automatically prioritized with full context, allowing security teams to respond to critical attacks faster, without additional IT security r...

We don't have enough ratings and reviews to provide an overall score.

LookingGlass Cyber Solutions is a threat protection solution protecting against cyber attacks to global enterprises and government agencies The product is augmented by a team of security analysts who enrich the data feeds and provide timely insights to customers of potential risks.

We don't have enough ratings and reviews to provide an overall score.

Proofpoint Nexus is the security company's threat intelligence platform, now available to customers, which provides real-time data that spans email, social media, mobile devices and SaaS applications, supporting correlative study of attack behaviors and preemptive or forensic exploration and anal...

We don't have enough ratings and reviews to provide an overall score.

Sentinel IPS promises advanced threat protection at the network’s edge with Network Cloaking™, blocking malware, exploitation attempts, and other threats before they reach the firewall. Sentinel Internal Intelligence aims to give visibility inside the network, and the ability to monitor the entir...

We don't have enough ratings and reviews to provide an overall score.

Snare is an IT security analytics suite of applications from Prophecy International headquartered in Adelaide, providing a complete log monitoring and management solution, as well as network threat intelligence.

We don't have enough ratings and reviews to provide an overall score.

IBM experts provide the X-Force threat intelligence suite of services, including X-Force Research and X-Force Research Publications, and the X-Force Exchange platform for sharing threat intelligence knowledge and best practice with industry experts.

We don't have enough ratings and reviews to provide an overall score.

Chronicle, a security company supported by Alphabet (Google), offers VirusTotal, a malware scanning and threat intelligence service.

We don't have enough ratings and reviews to provide an overall score.

Webroot offers the BrightCloud platform, providing a suite of threat intelligence services such as the Webroot BrightCloud Web Classification and Reputation Services, Webroot BrightCloud IP Reputation Service, the Webroot BrightCloud Real-Time Anti-Phishing Service, Webroot BrightCloud Streaming ...

We don't have enough ratings and reviews to provide an overall score.

Kaspersky Labs offers threat intelligence as a service, but for those who prefer a secure on-premise technology-based solution, the company also provides Kaspersky Private Security Network, a threat intelligence platform supporting network security apps, appliances, and other Kaspersky security s...