What Integrates with OpenCTI?

Find out what OpenCTI integrations exist in 2026. Learn what software and services currently integrate with OpenCTI, and sort them by reviews, cost, features, and more. Below is a list of products that OpenCTI currently integrates with:

  • 1
    Threat Landscape Reviews

    Threat Landscape

    Ecliptica Labs AB

    $499/month
    3 Ratings
    The Threat Landscape is an automated platform designed for security analysts and SOC teams, providing them with reliable and actionable intelligence while eliminating the need for manual triage. This system continuously gathers and analyzes global open-source intelligence (OSINT) and darknet data, efficiently extracting relevant structured information and minimizing irrelevant data before it reaches the analysts. All gathered intelligence is formatted into STIX 2.1, mapped to the MITRE ATT&CK framework, and cross-referenced with various elements such as threat actors, malware families, CVEs, TTPs, and IOCs, enabling teams to focus their efforts on utilizing intelligence rather than generating it. Among its notable features are interactive dashboards, visual representations of STIX threat graphs, sophisticated search and filtering options, monitoring of the darknet for claims related to leak sites and criminal discussions, automated daily and weekly reports, as well as a RESTful API that allows seamless integration with SIEM, SOAR, and TIP platforms. This platform ultimately empowers security teams to respond swiftly and effectively to emerging threats, improving their overall cybersecurity posture.
  • 2
    OpenBAS Reviews
    OpenBAS, an open-source breach and attack simulation platform created by Filigran, is designed to assist organizations in planning, scheduling, and executing campaigns and tests that simulate cyber adversaries. This platform allows users to generate dynamic attack scenarios, which helps in providing accurate, timely, and effective responses to real-world cyber incidents. With its popularity reflected in over 800 stars on GitHub and the inclusion of more than 10 injectors, OpenBAS supports highly customizable simulations that cater to the specific needs of various industries, addressing both technical and human elements of security posture. Additionally, it incorporates threat intelligence from OpenCTI, facilitating dynamic adjustments based on the most current cyber threat data, employed techniques, and relevant adversary behaviors. OpenBAS also enhances team evaluations and technology assessments related to genuine cyber threats while promoting collaborative feedback on scenarios, all of which contribute to detailed analyses for an in-depth review process. Overall, this platform stands out for its ability to adapt to an ever-evolving threat landscape, making it an essential tool for organizations committed to strengthening their cybersecurity measures.
  • 3
    Filigran Reviews
    Adopt a proactive approach to cyber threat management from anticipation to response. Designed to enhance cybersecurity through comprehensive threat information, advanced adversary simulators, and strategic cyber risk-management solutions. Improved decision-making and a holistic view of the threat environment will help you respond faster to incidents. Organize and share your cyber threat intelligence to improve and disseminate insights. Access threat data from different sources in a consolidated view. Transform raw data to actionable insights. Share and disseminate actionable insights across teams and tools. Streamline incident responses with powerful case-management capabilities. Create dynamic attack scenarios to ensure accurate, timely and effective response in real-world incidents. Create simple and complex scenarios that are tailored to the needs of different industries. Instant feedback on responses improves team dynamics.
  • 4
    Fork Reviews

    Fork

    VerSprite Cybersecurity

    Fork is a SaaS platform designed for threat modeling that enables both security and product teams to conduct ongoing, risk-oriented assessments of applications by utilizing the established PASTA (Process for Attack Simulation and Threat Analysis) framework. This allows teams to swiftly identify the most probable and significant risks in less than two hours while ensuring that security measures are aligned with business objectives. By merging specialized threat libraries with current vulnerability information and threat intelligence, Fork accurately quantifies residual risks and aids in conducting business impact analyses. The platform also implements quality controls throughout the threat modeling process to enhance overall effectiveness. Additionally, Fork features a consolidated security insights dashboard that links threats directly to the attack surface of your application, while incorporating recognized frameworks and taxonomies like MITRE, OWASP, CWE, CVE (with EPSS), CAPEC, ATT&CK, D3FEND, and ASVS, which facilitates focused mitigation strategies and practical outcomes. This comprehensive approach not only enhances security posture but also fosters collaboration between technical and business teams.
  • Previous
  • You're on page 1
  • Next