Best Trellix ATLAS Alternatives in 2025
Find the top alternatives to Trellix ATLAS currently available. Compare ratings, reviews, pricing, and features of Trellix ATLAS alternatives in 2025. Slashdot lists the best Trellix ATLAS alternatives on the market that offer competing products that are similar to Trellix ATLAS. Sort through Trellix ATLAS alternatives below to make the best choice for your needs
-
1
ManageEngine EventLog Analyzer
ManageEngine
153 RatingsEventLog Analyzer from Manage Engine is the industry's most affordable security information and event management software (SIEM). This cloud-based, secure solution provides all essential SIEM capabilities, including log analysis, log consolidation, user activity monitoring and file integrity monitoring. It also supports event correlation, log log forensics and log retention. Real-time alerting is possible with this powerful and secure solution. Manage Engine's EventLog Analyzer allows users to prevent data breaches, detect the root cause of security issues, and mitigate sophisticated cyber-attacks. -
2
Global Threat Intelligence is a cloud-based, real-time reputation service that is fully integrated with Trellix's products. Protects organizations and users from known and emerging cyber-threats, regardless of their source or location. Shared threat intelligence allows security products to work together based on real-time, robust information. Closes the threat windows with instantaneous and often predictive reputation-based threat information, reducing the likelihood of an attack, the cost of remediation, and lost downtime. Our threat intelligence is produced by correlating billions of Trellix sensor queries from around the world. GTI is accessed by Trellix products in the cloud. GTI then provides the latest reputation and categorization intelligence so that the products can take action.
-
3
SOC Prime Platform
SOC Prime
SOC Prime equips security teams with the largest and most robust platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. Backed by a zero-trust approach and cutting-edge technology powered by Sigma and MITRE ATT&CK®️, SOC Prime enables smart data orchestration, cost-efficient threat hunting, and dynamic attack surface visibility to maximize the ROI of SIEM, EDR, XDR & Data Lake solutions while boosting detection engineering efficiency. SOC Prime’s innovation is recognized by independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture. -
4
NESCOUT Cyber Threat Horizon
NESCOUT
NETSCOUT Cyber Threat Horizon, a real-time platform for threat intelligence, provides visibility into the global cyber landscape including DDoS attacks. Using data from NETSCOUT’s ATLAS (Active threat level analysis system), it provides insights into traffic anomalies and attack trends across the internet. The platform enables organizations to detect potential attacks early through interactive visualizations, historical analysis, and geolocation based attack mapping. NETSCOUT Cyber Threat Horizon, with its ability to track DDoS events and emerging threats as they unfold is an invaluable tool to network administrators and security professionals who want to enhance situational understanding and address risks. -
5
Transform your security infrastructure into a collaborative platform. Operationalize threat intelligence data real-time, providing protection to all points of your enterprise in the event of new threats. Use Data Exchange Layer (DXL), to instantly share threat information to all connected security systems, even third-party solutions. Unknown files can be detected for faster protection and lower costs. Broader threat intelligence allows for more accurate file execution decisions. Policies can be customized based on risk tolerance. You can make better decisions to handle potentially malicious and never-before-seen files. You can combine threat information from Trellix Global Threat Intelligence, third-parties, and locally collected data from security solutions and share it. DXL, an open communication framework, connects disparate security products. Real-time security intelligence shared among endpoint, gateway and network security solutions.
-
6
Constella Intelligence
Constella Intelligence
To detect and respond to emerging cyber-physical threats, monitor thousands of data sources on the dark, deep, and public webs. You can also accelerate your investigations by focusing on the risks that are threatening your company. To solve cybercrimes faster, analyze monikers and combine information with other data sets. Constella's unique combination of technology, data and human expertise from top data scientists is able to protect your digital assets from targeted attacks. Data to link real identity information with obfuscated identities and malicious activity to inform your products, safeguard your customers, and to protect your customers. Advanced monitoring analysis, automated early warning, and intelligence alerts make it easier to identify threat actors. -
7
Trellix Helix Connect
Trellix
To protect themselves against advanced threats, organisations need to integrate security and apply the correct expertise and processes. Trellix Helix Connect, a cloud-hosted platform for security operations, allows organizations to control any incident from alert through to fix. By collecting, correlating, and analyzing vital data to create meaningful threat awareness across your entire organization, you can gain comprehensive visibility and control. Integrate security functions easily without expensive and lengthy cycles. Contextual threat intelligence helps you make informed and efficient decisions. Machine learning, AI, and real-time cyber intelligence can detect advanced threats. Get critical context on who is targeting your company and why. With a smart, adaptive platform, you are able to predict and prevent emerging threats. You can also identify root causes, and respond in real-time. -
8
Vigilante Operative
Vigilante
Cyber threats are increasing at an alarming pace. They can lead to data exfiltration, network intrusion, data loss, account activity hijack, compromised customer data, and reputational damage to an organisation. IT security professionals are under increasing pressure due to the increased threat from malicious actors. This is especially true for organizations with limited resources and tight budgets. Organizations will find it more difficult to win the battle against these overwhelming threats. Operative is our advanced threat intelligence hunt service for enterprise organizations. Vigilante is a member of the dark web community, where he helps to stay ahead of emerging threats. This allows for deeper visibility and a continuous feedback loop on exposures such as: Third party risk and exposure, leaked data, stolen data, malicious campaigns and attack vectors. -
9
ATLAS Intelligence Feed (AIF)
NETSCOUT
Arbor has unparalleled visibility with ATLAS, ASERT, and the ATLAS Intelligence feed. This gives Arbor unprecedented insight into the backbone networks that make up the Internet's core, down to the local networks within an enterprise. Service providers can use ATLAS intelligence to make timely, informed decisions about network security, market analysis, capacity planning and application trends. They can also leverage ATLAS intelligence for transit and peering relationships, potential content partner relationships, and market analysis. Enterprise security teams can use the ATLAS global threat intelligence to stay ahead and save time by avoiding the need to manually update attack detection signatures. This unique feed contains geo-location data that automates the detection of attacks on infrastructure and services from known botnets or malware. It also ensures that new threats are automatically updated without the need for software upgrades. -
10
Digital Element
Digital Element
Improve your decision-making by leveraging context-rich IP intelligence data including geolocation, proxy and vpn insights. Geolocate IP addresses accurately down to the ZIP/postal code level. The accuracy is greater than 97% for cities and 99.99% for countries. Our data covers 99.99% of all IP addresses seen, and supports both IPv4 addresses and IPv6. We are the global leader in IP geolocation technology and the experts at harnessing IP intelligence for diverse applications. Digital Element provides the most comprehensive IP intelligence datasets. Our NetAcuity and Nodify products provide a wealth information and insights beyond geolocation, supporting advanced applications such as geo-targeted marketing, content localization and compliance, fraud detection and prevention, cybersecurity and digital rights management. Detect proxy & virtual private network connections, including residential proxies. -
11
Radware Threat Intelligence
Radware
Radware's Threat intelligence Subscriptions enhance application and network security by providing constant updates on possible vulnerabilities and risks. Radware's Threat Intelligence Subscriptions protect your Attack Mitigation Systems by crowdsourcing, correlating, and validating real-life attacks data from multiple sources. It provides real-time protection against unknown actors and vectors, as well as emergency and ongoing protection. Radware's Live Threat Map provides near real-time information about cyberattacks, based on cloud system event information and our global threat deception network. These systems transmit a variety anonymized and sampled network attacks and application attacks to our Threat research center. They are also shared with the community via the threat map. -
12
Cisco Talos
Cisco
Cisco Talos is the industry-leading threat intelligence organization fighting the good fight. Cisco Talos is a large commercial threat intelligence team made up of top-notch researchers, analysts, engineers, and other professionals. Cisco customers benefit from industry-leading visibility, actionable information, vulnerability research, and rapid detection of known and emerging threats. They also protect against threats that are not yet known or under development. This allows them to stop threats from the wild and protect the Internet. Cisco Talos is a trusted provider of cutting-edge security research worldwide. We provide the data Cisco Security products use to take action. Our process is what makes Talos different. We see the threat landscape from a wide range of angles, then act quickly and meaningfully on it to drive protection. Talos' unique capabilities and scale in intelligence, as well as greater visibility than any other security vendor worldwide, is integral to this process. -
13
Sequretek Percept XDR
Sequretek
Cloud-based enterprise platform that offers automated threat detection and responses using AI and Big Data across cloud and on premise enterprise environments. Percept XDR provides end-to-end protection, threat detection and reaction while allowing businesses to focus on core business growth. Percept XDR protects against phishing attacks, ransomware, malicious software, vulnerability exploits and insider threats. It also helps to protect from web attacks, adware, and other advanced attacks. Percept XDR can ingest data and uses AI to detect threats. The AI detection engine can identify new use cases, anomalies and threats by ingesting sensor telemetry and logs. Percept XDR is a SOAR-based automated reaction in line with MITRE ATT&CK® framework. -
14
Cavalier
Hudson Rock
Cavalier is built on forensic technologies, operational know-how and the IDF 8200 Unit's counter-national adversaries and professional threats actors. It is a unique source of cybercrime intelligence data based on millions of compromised machines in global malware-spreading campaign. Our high-fidelity data comes directly from threat actors, and is updated monthly with hundreds of thousand of new compromised computers. Cavalier’s high-fidelity data provides unprecedented detail on threats, including ransomware and business espionage. It also protects employees, customers, partners, and digital assets. Hackers can use the sessions of existing victims by importing cookies and bypassing security measures. Hackers use the URLs accessed by victims, their login credentials and plaintext passwords to hack into employee or user accounts. -
15
ThreatCloud
Check Point Software Technologies
Real-time threat intelligence, derived from hundreds millions of sensors around the world, enhanced with AI-based engines. Exclusive research data from Check Point Research Team. Unknown threats are detected daily, resulting in 2,000 attacks per day. Advanced predictive intelligence engines, data gathered from hundreds of millions sensors and cutting-edge research by Check Point Research and an external intelligence feed. The most current information about the latest attack vectors and hacking methods. ThreatCloud is Check Point's rich cyber defense database. Its threat intelligence powers Check Point's zero-day protection solutions. Protect yourself 24x7 using award-winning technology, expert analysis, and global threat intelligence. The service also offers recommendations to help customers improve their protection against threats. Customers can access a Managed Security Services Web Portal. -
16
NETSCOUT Omnis Security
Netscout
Digital economy requires agility. Corporate digital structures have been transformed to enable this agility. As companies move to the cloud and expand their activities in a global digital ecosystem, they need to reinvent cybersecurity to protect against new threats. NETSCOUT Omnis Security, an advanced attack analysis platform and response platform, provides the scale, scope and consistency required to protect today's digital infrastructure. High-scalable network instrumentation that provides a complete view of all digital infrastructures. Threat detection using selected intelligence, behavioral analysis, open source data, advanced statistics, and open source data. Contextual threat detection and investigation using a strong source of metadata and packaged. Automated edge blocking using the best stateless packet processing technology or third-party blocking devices. -
17
BforeAI PreCrime
BforeAI
BforeAI, a cybersecurity firm, specializes in preemptive cyber-defense and predictive threat intelligence. PreCrime is their flagship platform that predicts, blocks and preempts malicious campaign before they have an impact on businesses. PreCrime uses advanced behavioral analytics to detect unusual behavior patterns and spoofed sites, enabling businesses to stay ahead of the cybercriminals. The platform's algorithm for predictive security scans suspicious domains 24 hours a day, automating threat remediation. BforeAI offers solutions for a variety of industries, such as financial services, manufacturing and retail, entertainment, and retail. These solutions provide tailored cybersecurity measures to address the unique challenges faced by each sector. The days of managing blocklists are over. Our behavioral AI predicts the dangerous infrastructure before attacks are launched. The 400 billion behaviors that we map enable us to predict attacks, no matter how disguised the spoofed site may appear to an end user. -
18
ESET Threat Intelligence
ESET
$132Expand your security intelligence beyond your local network and into global cyberspace. Access global, in-depth and up-to-date information about specific threats or attack sources. This can be difficult if you only have access within your network. ESET Threat Intelligence data streams use widely supported STIX/TAXII formats which makes it easy for SIEM tools to integrate with them. Integration allows you to get the most current information about the threat landscape in order to prevent and predict future attacks. ESET Threat Intelligence offers a full API for automating reports, YARA rules, and other functionalities that allow integration with other systems within an organization. These rules allow organizations to create custom rules to access company-specific information that security professionals are interested in. These details include the number of instances that specific threats have been detected worldwide. -
19
VIPRE ThreatIQ
VIPRE Security Group
$12,000/y for 1000q/ month VIPRE ThreatIQ delivers real-time, actionable threat intelligence sourced from our global network of sensors that detect millions of malicious files, URLs, and domains every day. Whether you need interactive APIs or bulk data downloads, ThreatIQ offers flexible options to fit your needs. It seamlessly integrates with a wide range of security solutions to enhance your existing defenses. While many threat intelligence feeds are available, VIPRE’s ThreatIQ stands out by offering unique, high-quality data that is not available from other vendors. This data is verified through independent testing, curated to reduce false positives, and constantly updated to ensure it reflects the latest threats. VIPRE ThreatIQ is designed for security professionals who are tired of unreliable feeds that miss emerging threats or create excessive noise. By providing precise, actionable insights, ThreatIQ helps you stay ahead of cybercriminals and strengthens your security posture with confidence. -
20
Logically Intelligence
Logically
Logically Intelligence uses artificial intelligent to identify and tackle harmful or manipulative content quickly and at scale. Our platform ingests data and content from social media platforms, online sources and websites. Logically Intelligence gives analysts the insights they need to detect, assess and act on emerging threats. Create a Situation Room to monitor and analyze a particular information environment using a simple keyword interface or advanced Boolean queries. Identify and analyze narratives that are emerging in a Situation Room. This includes keywords driving the narrative, related posts, and data from the original poster. You can also compare two narratives in time and measure the impact on counter-narratives. The platform will display data in all languages and allow you to add Boolean questions or keywords. -
21
Proofpoint Emerging Threat (ET) Intelligence
Proofpoint
Proofpoint ET Intelligence provides the most accurate and timely threat intelligence. Our fully verified intelligence provides more context and seamlessly integrates with your security tools to improve your decision-making. It is not enough to know what threats exist to protect your people, data, or brand. Emerging Threat Intelligence (ETI) helps you to prevent attacks and reduce risk. It allows you to understand the historical context of these threats, who they are behind, when they attacked, what their methods were, and what they are after. Access on-demand historical and current metadata on IPs, domains and other threat intelligence to assist in investigating incidents and researching threats. You also get reputation intel, condemnation evidence, deep context and history, as well as detection information. All this information is searchable in an easy to use threat intelligence portal. It includes: Trends and timestamps for when a threat was identified and the associated category. -
22
Bitdefender Advanced Threat Intelligence
Bitdefender
Bitdefender Advanced Threat Intelligence is powered by the Bitdefender Global Protective Network. (GPN). Our Cyber-Threat Intelligence Labs combine hundreds of thousands of indicators of compromise and turn data into actionable, immediate insights. Advanced Threat Intelligence delivers the best security data and expertise directly into businesses and Security Operations Centers. This enables security operations to succeed with one of industry's most extensive and deepest real-time knowledge bases. Enhance threat-hunting capabilities and forensic capabilities by providing contextual, actionable threat indicators for IPs, URLs and domains that are known to harbor malware, spam, fraud, and other threats. Integrate our platform-agnostic Advanced Threat Intelligence services seamlessly into your security architecture, including SIEM TIP and SOAR. -
23
Threat Intelligence Platform
Threat Intelligence Platform
$12.5 per monthThreat Intelligence Platform combines multiple threat intelligence sources to provide deep insights on attack infrastructure and threat hosts. The platform combines threat information from different feeds with our extensive in-house databases. This is a result of over 10 years of data crawling. It then performs real-time host configuration analysis to provide actionable threat intelligence, which is crucial in detection, mitigation and remediation. The Threat Intelligence Portal web interface allows you to quickly find detailed information about a host as well as its underlying infrastructure. To enrich your results with threat intelligence insights, integrate our rich data sources into existing systems. Integrate our capabilities into your existing cybersecurity products, such as cyber threat intelligence (CTI), security information and events management (SIEM), and digital risk protection (DRP). -
24
LifeRaft Navigator
Navigator
All intelligence can be consolidated, assessed, and investigated in one platform. Alert on and collect data from social media, the deep web, and darknet that is relevant to your security operations 24/7. Our unified intelligence platform automates data collection and filtering and offers a range of investigative tools to validate and verify threats. Find critical information that could affect the security of your assets or operations. Navigator monitors the internet 24 hours a day with custom search criteria to identify high-risk threats for your people, assets and operations from diverse sources. Security operations teams face a growing challenge in finding the right needle in the haystack. Navigator offers advanced filtering tools that allow you to see the full extent of the online threat landscape. Explore, uncover, and use a variety sources to validate intelligence regarding threat actors, events, or security issues. -
25
Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Threat Intelligence dataset available. Defenders can focus on stopping threats before they cause a problem and significantly improve their security operations across the entire attack chain whilst simultaneously reducing operational complexity. The Silent Push platform exposes Indicators of Future Attack (IOFA) by applying unique behavioral fingerprints to attacker activity and searching our dataset. Security teams can identify new impending attacks, rather than relying upon out-of-date IOCs delivered by legacy threat intelligence. Organizations are better protected by understanding emerging developing threats before launch, proactively solving problems within infrastructure, and gaining timely and tailored threat intelligence with IoFA, that allows organizations to stay one step ahead of advanced attackers.
-
26
Media Sonar
Media Sonar Technologies
$1,500 per 3 users per monthWeb Intelligence & Investigation offers unique insights that will help you protect your company brand and assets. Pathfinder, our unique investigative module, empowers both novice security teams and experienced ones with a clear path to next steps and a visible record of your chosen investigative trail. Media Sonar integrates top OSINT tools and data sources to create a single platform that is 30x faster than traditional methods. Your team won't have to spend hours manually compiling results and going through multiple incompatible OSINT tools. Our Web Intelligence & Investigations platform will expand your view of your digital attack surface. This will help you to protect your brand and assets, and improve your security operations. With intelligence from the Open or Dark Web, equip your security team to see indicators of threat outside your organization. -
27
Lumen Adaptive Threat Intelligence
Lumen Technologies
Security specialists can quickly eliminate threats with Adaptive Threat Intelligence. Our global network visibility allows us to provide high-fidelity intelligence that is correlated to your IP addresses. This is combined with Rapid Threat Defense to prevent threats and simplify security. Black Lotus Labs has developed and deployed automated validation technology that validates threat data and tests new threats. This reduces false positives. Automated threat defense detection and response capabilities can block threats based upon your risk tolerance. A comprehensive virtual offering eliminates the need for data and devices to be deployed or integrated and provides one point of contact for all escalations. It includes a mobile app, a security portal, and an API feed. You can manage threat visualization and response using context-rich reports as well as historical views. -
28
TruKno
TruKno
Keep track of how adversaries bypass enterprise security controls using the latest cyber attacks sequences. Understanding cyber attack sequences that are associated with malicious IPs, file hashes and domains, malware or actors. Keep up with the latest cyber threats attacking your networks, your industry/peers/vendors, etc. Understand MITRE TTPs (at a 'procedure' level) used by adversaries in the latest cyber attack campaigns so you can enhance your threat detection capabilities. A real-time snapshot of how top malware campaigns are evolving in terms of attack sequences (MITRE TTPs), vulnerability exploitation (CVEs), IOCs, etc. -
29
Trend Vision One
Trend Micro
3 RatingsOne platform is all you need to stop adversaries faster and take control of your cyber risk. Manage security holistically using comprehensive prevention, detection and response capabilities powered AI, leading threat intelligence and research. Trend Vision One provides expert cybersecurity services and supports hybrid IT environments. The increasing attack surface is a challenge. Trend Vision One provides comprehensive security for your environment, including monitoring, securing, and supporting. Siloed software creates security gaps. Trend Vision One provides teams with robust capabilities for prevention detection and response. Understanding risk exposure should be a priority. Utilizing internal and external data across the Trend Vision One eco-system allows you to better control your attack surface risks. With deeper insight into key risk factors, you can minimize breaches or attacks. -
30
Deepwatch
Deepwatch
Advanced managed detection and response to protect distributed enterprises Expert-led security operations are designed to detect and respond quickly to any potential threats. Prevent malicious activity before it is too late and respond to active threats. Effectively identify and fix critical vulnerabilities and threats across the enterprise. Our team has a lot of experience and has come to the important realization that every organization has its own requirements for cyber solutions. Your threats and no team are the same. The Squad Delivery Model was created to foster collaboration, high touch, tailored services that meet all your needs and requirements. -
31
Chronicle Threat Intelligence
Chronicle
Google Cloud Threat Intelligence researchers have created and maintained high-quality, actionable, out of-the-box threat detection content that will help you get better detections. Native detection sets cover a range of threats, including Windows-based attacks such as ransomware, remote access tools (RAT), infostealers and data exfiltration. New analytics from Google Cloud Threat Intelligence researchers reveal new and latent threats, unlocking new detection coverage. You can use GCTI detections for response actions and rules that are specific to your environment. The VirusTotal Augment widget can be used to increase efficiency in SOC processes and allow faster search for artifacts such as domains, URLs, IPs, URLs, or hashes. You can gain context beyond your network perimeter and expand your telemetry to explore related VirusTotal IIoCs in a graphical way. -
32
Secure Malware Analytics (formerly Threat Grid), combines advanced threat intelligence with sandboxing to provide a single solution to protect organizations against malware. You will be able to understand what malware is doing or trying to do, how big a threat it poses and how you can defend yourself against it. Secure Malware Analytics quickly analyzes files and suspicious behavior in your environment. Your security teams receive context-rich malware analytics, threat intelligence, and a quick response to threats. Secure Malware Analytics analyzes a file's behavior against millions of samples and billions upon billions of malware artifacts. Secure Malware Analytics identifies the key behavioral indicators and associated campaigns of malware. Secure Malware Analytics offers robust search capabilities, correlations, detailed static and dynamic analysis.
-
33
Blue Hexagon
Blue Hexagon
Our real-time deep learning platform is designed to provide cyber defense professionals with a new standard in speed, effectiveness, and coverage. Our neural networks are trained with global threat data, which we have carefully curated via threat repositories (dark web), our deployments, and partners. Our proprietary architecture of neural network can identify threats in both payloads as well as headers, just like layers of neural network can recognize your photo in photos. Blue Hexagon Labs continuously validates the accuracy and identifies new threats in the wild every day. Our neural networks are capable of identifying a wide variety of threats, including exploits, file and fileless malware, C2 communications, malicious domains across Windows and Linux platforms, as well as exploits. Deep learning is a subset in machine learning that uses multi-layered artificial neuro networks to learn data representation. -
34
IronNet Collective Defense Platform uses advanced AI-driven Network Detection & Response (NDR), to detect and prioritise anomalous activity within individual enterprise network environments. The platform analyzes threat data across the community in order to identify broad attack patterns. It then provides anonymized intelligence to all community members, giving them early insight into possible incoming attacks. Companies and organizations from different sectors can work together to defend their industries by collaborating in real time. A collective defense community is formed when organizations work together to detect, share intelligence and stop threats in real time. Discover how IronNet’s Collective Defense platform built on our IronDome & IronDefense products enables organizations realize the full benefits from this approach.
-
35
Group-IB Unified Risk Platform
Group-IB
The Unified Risk Platform increases security by identifying risks that your organization is exposed to. The platform automatically configures your Group IB defenses with the exact insights needed to stop attacks from threat actors. This makes it less likely that an attacker will succeed. The platform monitors threat actors 24/7 to detect advanced techniques and attacks. The Unified Risk Platform detects early warning signs of attacks before fraud occurs, or damage is done to your brand. This reduces the risk of unfavorable consequences. The Unified Risk Platform provides insight into the tactics of threat actors. The platform offers a range of solutions and techniques to stop attacks on your infrastructure, brand, and customers. This reduces the risk that an attack will cause disruptions or recur. -
36
Blackbird.AI
Blackbird.AI
Our AI-driven platform for narrative intelligence allows organizations to understand digital threats in real-time and make strategic decisions when it counts. Risk landscapes have radically changed for all industries. Our suite of solutions delivers actionable risk intelligence to our customers and partners. New actors and techniques are influencing online audiences in ways never seen before. Listening tools alone are not sufficient. Daily risk intelligence summaries help you quickly capture narratives, enabling real-time insights to be made and empowering strategic decision making. You can fine-tune AI-generated narrative intelligence with the help of human context to improve the relevance, accuracy and strategic value of insights. Data-driven recommendations can be tailored to a variety of problem sets and personas. Save time and effort by accelerating the reporting process for intelligence professionals. -
37
Filigran
Filigran
Adopt a proactive approach to cyber threat management from anticipation to response. Designed to enhance cybersecurity through comprehensive threat information, advanced adversary simulators, and strategic cyber risk-management solutions. Improved decision-making and a holistic view of the threat environment will help you respond faster to incidents. Organize and share your cyber threat intelligence to improve and disseminate insights. Access threat data from different sources in a consolidated view. Transform raw data to actionable insights. Share and disseminate actionable insights across teams and tools. Streamline incident responses with powerful case-management capabilities. Create dynamic attack scenarios to ensure accurate, timely and effective response in real-world incidents. Create simple and complex scenarios that are tailored to the needs of different industries. Instant feedback on responses improves team dynamics. -
38
CloudSEK
CloudSEK
The most advanced AI-powered Digital Risk Monitoring Platform that instantly detects third party data leaks. XVigil gathers millions from online sources to begin gathering data units. This raw data is then filtered using an AI engine to remove noise, false positives and anomalies. It is then indexed, parsed and checked against the historical data lakes. Finally, it is mapped to clients assets. Duplicates and known threats are removed. The remaining threats are rated according to severity and sent to customers as alerts. Monitors your internet-exposed infrastructure and curates a list. Then periodically monitors for misconfigurations and potential data leakages. XVigil uses the internet to detect and classify external threats, provide real-time alerts, and classify them based upon their severity. CloudSEK's "XVigil" is a SaaS-based platform that's easy to use and backed by five years of research and development. -
39
Malware Patrol
Malware Patrol
Malware Patrol has been solely focused on threat intelligence since 2005. We monitor the latest malware campaigns to collect a variety indicators. These include malware, ransomware, phishing, command-and-control systems, and DoH servers. Each indicator is checked daily and any relevant context, such as ATT&CK TTPs is included. Our feeds are available in a variety formats that can be integrated seamlessly into your environment. This will allow your organization to diversify data sources and provide maximum threat coverage. You can protect as many assets you need with our simple pricing/licensing. This makes us a preferred choice among cybersecurity companies and MSSPs. To learn how your company can benefit, request an evaluation and test our data. Our automated systems verify every IoC every single day to reduce the noise and false positive overload that information security teams and tools face. -
40
DeCYFIR
CYFIRMA
We go into the hackers' trenches to discover, analyze, correlate and find the most profound insights from noisy data. You will receive comprehensive cyber intelligence that goes beyond the tactical approach. Our insights include management and strategic insight that is applicable across your organization. We combine data with your industry, geography, and technology to provide you with remediation recommendations that are prioritized for quick actions. High-quality cyber intelligence requires deep technology to interpret signals from many sources. The Threat Visibility and Intelligence module converts discovery into useful insights. It is essential cybersecurity ammunition for any organization to maintain a strong security posture. Threat visibility and Intelligence is a powerful platform that allows data to be collected, analyzed, and correlated against key attributes. This information is presented in a format that both security professionals and business leaders can use to take decisive action. -
41
Resecurity
Resecurity
Resecurity Risk is a dedicated threat monitoring platform for brands and their subsidiaries, assets, executives, and employees. In less than 24 hours, you can import your unique digital identifiers to get instant updates of more than 1 Petabytes of actionable intelligence that is directly impacting you. If all active threat vectors can be ingested within our platform, and are from verified sources with accurate risk scores, security information and event management tools (SIEM), can help you identify and highlight critical events. Resecurity Risk is an omni-directional threat product that would normally require multiple vendors to resolve. To maximize the risk score of an enterprise footprint, integrate security solutions. Context™ powered by your data. A holistic approach to counterfeit monitoring and piracy for different industry verticals. Use actionable intelligence to prevent illicit distribution and misuse of your products. -
42
Trend Micro Digital Vaccine
Trend Micro
Continuous threat prevention and analysis will keep you informed about the latest threats and protect your data. Digital Vaccine™, Toolkit (DVToolkit), is an application that allows you to create custom DV filter to increase your threat coverage. Using the analysis and development techniques in DV filters, it is possible to quickly create and implement custom DV filter to block events specific to your network environment. DVToolkit supports regular expressions that are commonly used in the industry. This allows customers to speed up time to market for a particular filter if they're under constant attack. Protects your applications with custom filters that can be used for proprietary or user-developed purposes. Supports import of open-source rules (e.g. Snort signatures; with extended support for Snort options, Snort primitives and modifiers. Customers can define filter triggers and support tigers without filters. Allows the creation of custom filters for IPv4 or IPv6 environments. -
43
Darkfeed
Cybersixgill
The ultimate underground threat intelligence collection will help you unleash your cyber security performance and optimize analysts' performance. Darkfeed is a feed that contains malicious indicators of compromise. It includes URLs, hashes and IP addresses. It uses Cybersixgill's extensive collection of dark and deep web sources to provide advanced warnings about cyberthreats. It is automated, which means that IOCs can be extracted and delivered in real time. It is also actionable, so that consumers will have the ability to block or receive items that could threaten their organizations. Darkfeed offers the best IOC enrichment solution available. Users can enrich IOCs from SIEM or SOAR, TIP, VM platforms to gain unprecedented context and essential explanations that will help them accelerate their incident response and prevention, and stay ahead of the threat curve. -
44
Chronicle SOC
Google
Although we live in a digital age, the current economics of storing enterprise security data make it almost impossible to combat cybercrime. What if the economics and scale of storing and analysing your organization's security information were no longer an issue? Chronicle was built on the largest data platform in the world to provide unmatched resources and capabilities to help you gain the edge. Google Cloud threat signals, which were sourced by Chronicle's security team, are embedded in the Chronicle platform. Uppercase signals are based upon a mixture of proprietary data sources and public intelligence feeds. Even the most skilled analysts have difficulty processing the volume of security telemetry modern enterprises generate. Chronicle can automatically handle petabytes worth of data. Automated analysis allows your analysts to understand suspicious activity in seconds and not hours. -
45
Tenable Lumin
Tenable
Tenable Lumin allows you to quickly and accurately assess your risk. Compare your health and remediation to other Tenable users in your Salesforce industry or the wider population. Tenable Lumin correlates raw data on vulnerabilities with asset business-criticality and threat context data to support faster and more targeted analysis workflows compared to traditional vulnerability management tools. Cyber risk scoring and advanced risk-based analysis are based on a combination of asset criticality, threat data and vulnerability. It provides clear guidance on how to prioritize remediation efforts. Get insights from a single, comprehensive overview of your entire attack surface, including traditional IT, public clouds, web apps and containers, IoT and OT. Watch the evolution of your organization's cyber-risk over time. Manage risk using quantifiable metrics that are aligned with the business. -
46
ReversingLabs Titanium Platform
ReversingLabs
Advanced malware analysis platform that detects malicious files faster through automated static analysis. It can be used in any cloud and any environment. More than 360 file formats were processed and 3600 file types were identified from various platforms, applications and malware families. Real-time, deep inspection and analysis of files. This can be scaled to 150 million files per hour without dynamic execution. Connectors that are tightly coupled integrate industry-leading email, SIEM and SOAR platforms, as well as EDR, SIEM and SIEM. Unique Automated Static Analysis completely dissects the internal contents of files in just 5 ms, without execution, which eliminates the need for dynamic analysis in most instances. -
47
Strobes RBVM
Strobes Security
$999Strobes is a one stop shop for security stakeholders to ensure their enterprise is protected against cyber attacks and security issues. From viewing all security threats for each asset in the dashboard, to supporting integrations using leading scanners and bug bounty tool tools, Strobes is your one-stop shop solution. -
48
Real-time monitoring, analysis, and investigation allows you to quickly investigate and respond to hidden threats. A central view of threats and workflows built in reduces the complexity involved in threat protection. Automated compliance allows you to be ready for audits at any time. Monitor users, applications, devices and networks with greater transparency. Data is correlated and enhanced to provide intelligence on the threat, and how to mitigate it. Real-time threat detection and response powered by advanced intelligence reduces the lead time for threats such as phishing attacks, insider threats and data exfiltration.
-
49
Seerist
Seerist
Seerist cuts through the noise and forecasts potential threats. It provides insights that enable rapid, reliable decisions when they matter most. Seerist provides value to hundreds intelligence and security users. It allows them to forecast and discover threats and event trends. They can also monitor events as they unfold, confirm their validity, and then gain expert insight into what these events mean for your organization. Seerist helps you and your team keep track of the locations that are most important to you. Seerist offers a variety of features, including dashboards for monitoring cities or countries, customized alerts and the ability to manage your assets on a single map. Seerist gives you confidence in the data that you need to make important decisions for your business. Our users can instantly access relevant, precise and up-to date data with our curated sources and verified event data. -
50
Recorded Future
Recorded Future
Recorded Future is the largest provider of enterprise security intelligence in the world. Recorded Future provides timely, accurate, and practical intelligence by combining pervasive and persistent automated data collection and analysis with human analysis. Recorded Future gives organizations the visibility they need in a world of increasing chaos and uncertainty. It helps them identify and detect threats faster, take proactive action to disrupt adversaries, and protect their people and systems so that business can continue with confidence. Recorded Future has been trusted by over 1,000 businesses and government agencies around the globe. Recorded Future Security Intelligence Platform provides superior security intelligence that disrupts adversaries on a large scale. It combines analytics and human expertise to combine a wide range of open source, dark net, technical, and original research.