Want to see who topped the 2019 Best Software Awards?

Best Threat Intelligence Software

Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies utilize the tools to keep their security standards up to date and fit to combat new threats as they emerge. These tools can improve security performance by providing information on threats to their specific networks, infrastructure, and endpoint devices. These products provide information about hazards and how they function, their capabilities, and remediation techniques. IT administrators and security professionals use the data delivered to better protect their systems from emerging threats and plan for possible vulnerabilities. The tools alert users as new threats emerge and provide information detailing best practices for resolution.

Many products like security information and event management (SIEM) and vulnerability management software can integrate with or provide similar information as threat intelligence products. Those products, though, tend to provide live updates and actionable intelligence, and focus on other components of a security ecosystem.

To qualify for inclusion in the Threat Intelligence category, a product must:

  • Provide information on emerging threats and vulnerabilities
  • Detail remediation practices for common and emerging threats
  • Analyze global threats on different types of networks and devices
  • Cater threat information to specific IT solutions
G2 Crowd Grid® for Threat Intelligence
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction
Filters
Features
Star Rating

Threat Intelligence reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Threat Intelligence Software
Results: 113
    G2 Crowd takes pride in showing unbiased ratings on user satisfaction. G2 Crowd does not allow for paid placement in any of our ratings.
    Sort By:

    Spotlight Secure Threat Intelligence Platform links security intelligence to policy enforcement for rapid protection against advanced threats.


    Anomali offers a comprehensive suite of Threat Intelligence solutions for organizations of any size.


    strixus is a deep web monitoring engine for cyber and brand threats.


    SurfWatch Threat Analyst is an easy-to-use SaaS product that delivers strategic and operational threat intelligence to help organizations identify adversarial opportunities for attack and proactively mitigate cyber risks.


    Prevent, not just detect, advanced threats using scalable inline malware protection and real-time threat intelligence


    TDAC (Telesoft Data Analytics Capability) is a cost effective, field-proven ultra-high-rate monitoring, analytics and forensics platform. TDAC ingests and analyses millions of events per second, including network flow data, IDS alerts and system logs, enhancing data with known threat intelligence (including IP reputation, threat classification, geo-location), partitioning and pre-anaysing data for rapid sub-second query by Incident Response and Forensics teams.


    ThreatQuotient is a threat intelligence platform designed to enable threat operations and management and arm your analysts with the intelligence, controls and automation required to protect your business, employees and customers.


    TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.


    Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Our platform centralizes and contextualizes security data to provide the insights required for an efficient, powerful response.


    Veriato Log Manager is a software provides reporting and consolidation tools for Windows server event log, Syslog, or even text log files.


    Veriato Recon is a software to insider threat detection. It combines machine learning and advanced statistical analysis to uncover indicators of compromise traditional preventative security measures miss.


    Wapack Labs is a cyber intelligence operation designed to monitor and report on threats to IT, key personnel and investments in dozens of venues, and make that data available in both human and machine readable formats.


    Provides the registration details, also known as the Whois Record, of a domain name or an IP address.