Best threatYeti by alphaMountain Alternatives in 2024
Find the top alternatives to threatYeti by alphaMountain currently available. Compare ratings, reviews, pricing, and features of threatYeti by alphaMountain alternatives in 2024. Slashdot lists the best threatYeti by alphaMountain alternatives on the market that offer competing products that are similar to threatYeti by alphaMountain. Sort through threatYeti by alphaMountain alternatives below to make the best choice for your needs
-
1
ConnectWise SIEM
ConnectWise
181 RatingsYou can deploy anywhere with co-managed threat detection/response. ConnectWise SIEM (formerly Perch) is a co-managed threat detection and response platform that is supported by an in-house Security Operations Center. ConnectWise SIEM was designed to be flexible and adaptable to any business size. It can also be tailored to your specific needs. With cloud-based SIEMs, deployment times are reduced from months to minutes. Our SOC monitors ConnectWise SIEM and gives you access to logs. Threat analysts are available to you from the moment your sensor is installed. -
2
Safetica
342 RatingsSafetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations. ✔️ Know what to protect: Accurately pinpoint personally identifiable information, intellectual property, financial data, and more, wherever it is utilized across the enterprise, cloud, and endpoint devices. ✔️ Prevent threats: Identify and address risky activities through automatic detection of unusual file access, email interactions, and web activity. Receive the alerts necessary to proactively identify risks and prevent data breaches. ✔️ Secure your data: Block unauthorized exposure of sensitive personal data, trade secrets, and intellectual property. ✔️ Work smarter: Assist teams with real-time data handling cues as they access and share sensitive information. -
3
Criminal IP
AI SPERA
1 RatingCriminal IP is a cyber threat intelligence search engine that detects vulnerabilities in personal and corporate cyber assets in real time and allows users to take preemptive actions. Coming from the idea that individuals and businesses would be able to boost their cyber security by obtaining information about accessing IP addresses in advance, Criminal IP's extensive data of over 4.2 billion IP addresses and counting to provide threat-relevant information about malicious IP addresses, malicious links, phishing websites, certificates, industrial control systems, IoTs, servers, CCTVs, etc. Using Criminal IP’s four key features (Asset Search, Domain Search, Exploit Search, and Image Search), you can search for IP risk scores and vulnerabilities related to searched IP addresses and domains, vulnerabilities for each service, and assets that are open to cyber attacks in image forms, in respective order. -
4
ThreatBook
ThreatBook
ThreatBook CTI delivers high-fidelity intelligence based on alerts from actual customer cases. Our R&D team uses this as a key indicator to evaluate the quality of our intelligence extraction work and quality control. We continuously evaluate the data based upon any relevant alerts resulting from timely cyber incidents. No more mass alerts! ThreatBook CTI aggregates information and data with a clear verdict and behavior conclusions. It allows the SOC team spend less time on useless or harmless activities and boosts the efficiency of the operation. The core value of threat Intelligence is detection and reaction. This means that enterprises can carry out compromise detector with high-fidelity information, figuring out whether a device or server has been attacked, and respond based upon the investigation in order to prevent threats, avoid risks, or isolate them in a timely fashion. -
5
SecIntel
Juniper Networks
You can no longer rely solely on a device at the edge of the network to identify and block threats as the threat landscape changes and security risks increase. You need a network that is aware of threats, so your security analysts can focus on identifying unknown threats and reducing risk for your organization. SecIntel provides a continuous feed of aggregated, verified security data collected from Juniper as well as multiple other sources to enable the threat-aware networks. It delivers regularly updated and actionable intelligence for your SRX Series Firewalls, MX Series Routers, Juniper wireless access point, EX Series, and QFX Series Switches. It uses curated threat feeds for malicious IPs and URLs. It also includes certificate hashes and domain usage. Custom threat feeds and infected host information for all known hosts infected on your network. Custom threat feeds allow data from third party sources, such industry-specific threat mitigation input and prevention, to be included. -
6
Pulsedive
Pulsedive
Pulsedive provides threat intelligence platform and data products that can be used to aid security teams in their threat intelligence research, processing and management. Start by searching any domain, URL, or IP at pulsedive.com. Our community platform allows you to enrich and investigate indicators for compromise (IOCs), analyze threats and query across the Pulsedive database. You can also submit IOCs in bulk. What we do differently - On-demand, perform passive or active scanning of every ingested IOC - Sharing of risk evaluations and factors with our users based upon first-hand observations - Pivot any data property or value Analyze threat infrastructure and properties shared by different threats Our API and Feed products allow for automation and integration of data within security environments. For more information, visit our website. -
7
DigitalStakeout Scout
DigitalStakeout
DigitalStakeout Scout allows your corporate security and cybersecurity team to create an open-source intelligence capability whenever they need it. DigitalStakeout provides a cloud-delivered security platform that is fully managed and hosted by DigitalStakeout. This platform can solve brand threat intelligence, executive protection, cyber threat intelligence, vulnerability, and other digital risk protection issues. DigitalStakeout Scout offers the data collection capabilities as well as the analytics technology to detect and disrupt your organization’s vulnerabilities, threats, and exposures. You can access a web-based interface to create an on-demand security intelligence tool for your analysts that allows them to reduce alert fatigue, speed investigations, and make better intelligence-led security decision. DigitalStakeout Scout platform makes analysts 80% more productive and customers can cut the cost of security intelligence capabilities by 40%. -
8
Flashpoint
Flashpoint
Flashpoint Intelligence Platform gives you access to our archive data. This includes data from illegal forums, chat services, chat sites, chat services, blogs and paste sites. It also contains technical data, card shops, and vulnerability data. Our platform increases Flashpoint's internal team, which includes multilingual intelligence analysts who can quickly respond to customers. Flashpoint experts used illicit online communities to access the finished intelligence and primary data for these reports. Expand the scope of intelligence beyond traditional threat identification and get scalable, contextual, rich outcomes that help teams make better business decisions and protect their ability across the enterprise. Our platform provides relevant intelligence that will empower you to make better decisions and reduce risk in any area of your organization, no matter if you are an expert intel or a novice to risk assessment. -
9
PassiveTotal
RiskIQ
RiskIQ PassiveTotal aggregates data across the internet, absorbing intelligence in order to identify threats and attacker infrastructure. It also leverages machine learning to scale threat hunting, response, and mitigation. PassiveTotal gives you context about who is attacking you, their tools, systems, and indicators that compromise outside of the firewall--enterprise or third party. Investigating can be fast and very fast. Over 4,000 OSINT articles, artifacts and documents will help you quickly find answers. RiskIQ's 10+ years of internet mapping gives it the most comprehensive and complete security intelligence. Passive DNS, WHOIS SSL, SSL, hosts and host pair, cookies, exposed service, ports, components, code, and more are all absorbed by RiskIQ. You can see the entire digital attack surface with curated OSINT and your own security intelligence. Take control of your digital presence to combat threats to your company. -
10
Threat Intelligence Platform
Threat Intelligence Platform
$12.5 per monthThreat Intelligence Platform combines multiple threat intelligence sources to provide deep insights on attack infrastructure and threat hosts. The platform combines threat information from different feeds with our extensive in-house databases. This is a result of over 10 years of data crawling. It then performs real-time host configuration analysis to provide actionable threat intelligence, which is crucial in detection, mitigation and remediation. The Threat Intelligence Portal web interface allows you to quickly find detailed information about a host as well as its underlying infrastructure. To enrich your results with threat intelligence insights, integrate our rich data sources into existing systems. Integrate our capabilities into your existing cybersecurity products, such as cyber threat intelligence (CTI), security information and events management (SIEM), and digital risk protection (DRP). -
11
VIPRE ThreatIQ
VIPRE Security Group
$12,000/y for 1000q/ month VIPRE ThreatIQ delivers real-time, actionable threat intelligence sourced from our global network of sensors that detect millions of malicious files, URLs, and domains every day. Whether you need interactive APIs or bulk data downloads, ThreatIQ offers flexible options to fit your needs. It seamlessly integrates with a wide range of security solutions to enhance your existing defenses. While many threat intelligence feeds are available, VIPRE’s ThreatIQ stands out by offering unique, high-quality data that is not available from other vendors. This data is verified through independent testing, curated to reduce false positives, and constantly updated to ensure it reflects the latest threats. VIPRE ThreatIQ is designed for security professionals who are tired of unreliable feeds that miss emerging threats or create excessive noise. By providing precise, actionable insights, ThreatIQ helps you stay ahead of cybercriminals and strengthens your security posture with confidence. -
12
ThreatStryker
Deepfence
Runtime threat assessment, runtime attack analysis, and targeted protection of your infrastructure and applications. Zero-day attacks can be stopped by staying ahead of attackers. Observe attack behavior. ThreatStryker monitors, correlates, learns, and acts to protect your applications. Deepfence ThreatStryker displays a live, interactive, color-coded view on the topology and all processes and containers running. It inspects hosts and containers to find vulnerable components. It also interrogates configuration to identify file system, processes, and network-related misconfigurations. ThreatStryker uses industry and community standards to assess compliance. ThreatStryker conducts a deep inspection of network traffic, system behavior, and application behavior and accumulates suspicious events over time. The events are classified and correlated with known vulnerabilities and suspicious patterns. -
13
DomainTools
DomainTools
2 RatingsConnect indicators from your network to nearly every active domain or IP address on the Internet. This data can be used to inform risk assessments, profile attackers, guide online fraudulent investigations, and map cyber activity to the attacker infrastructure. Get the information you need to make an informed decision about the threat level to your organization. DomainTools Iris, a proprietary threat intelligence platform and investigation platform, combines enterprise-grade domain-based and DNS-based intelligence with a simple web interface. -
14
ZeroHack TRACE
WhizHack
ZeroHack TRACE, a cyber threat intelligence platform, uses decoy technology to generate and analyze threat information. It features customizable, intelligent, dynamic shifting sensors, easy configuration, and self healing. TRACE's DPI engine captures real-time information for analysis by users. Honeynet data is processed to enhance visualization and correlation. This allows analysts to secure networks in a comprehensive manner. The Dynamic Intelligent Shifting Sensors of ZeroHack TRACE enhance security by changing sensor positions periodically to avoid detection by hackers. ZeroHack TRACE uses honeynets that are tailored to specific IT environments. ZeroHack TRACE sensors are self-healing and auto-update to minimize maintenance. Each ZeroHack sensor is equipped with a deep packet-inspection engine that captures data in real-time, allowing detailed network monitoring and rapid threat identification. -
15
Proofpoint Emerging Threat (ET) Intelligence
Proofpoint
Proofpoint ET Intelligence provides the most accurate and timely threat intelligence. Our fully verified intelligence provides more context and seamlessly integrates with your security tools to improve your decision-making. It is not enough to know what threats exist to protect your people, data, or brand. Emerging Threat Intelligence (ETI) helps you to prevent attacks and reduce risk. It allows you to understand the historical context of these threats, who they are behind, when they attacked, what their methods were, and what they are after. Access on-demand historical and current metadata on IPs, domains and other threat intelligence to assist in investigating incidents and researching threats. You also get reputation intel, condemnation evidence, deep context and history, as well as detection information. All this information is searchable in an easy to use threat intelligence portal. It includes: Trends and timestamps for when a threat was identified and the associated category. -
16
Darkfeed
Cybersixgill
The ultimate underground threat intelligence collection will help you unleash your cyber security performance and optimize analysts' performance. Darkfeed is a feed that contains malicious indicators of compromise. It includes URLs, hashes and IP addresses. It uses Cybersixgill's extensive collection of dark and deep web sources to provide advanced warnings about cyberthreats. It is automated, which means that IOCs can be extracted and delivered in real time. It is also actionable, so that consumers will have the ability to block or receive items that could threaten their organizations. Darkfeed offers the best IOC enrichment solution available. Users can enrich IOCs from SIEM or SOAR, TIP, VM platforms to gain unprecedented context and essential explanations that will help them accelerate their incident response and prevention, and stay ahead of the threat curve. -
17
CYR3CON FUS1ON
CYR3CON
FUS1ON takes into account multiple organizations (i.e. FUS1ON considers multiple organizations (i.e. business units, franchises and MSSP clients or cyber insurance customers) in order to identify common threats. FUS1ON detects "root threats" which can impact multiple organizations within an enterprise (or be supported by them). FUS1ON identifies root threats that can affect multiple tenants and helps to understand aggregation risk. Each vulnerability is ranked by assigning a probability and relative likelihood. Hacker community information fuels CYR3CON FUS1ON. This allows for alignment of many popular passive scanner tools. Allows you to align vulnerability scanning results from any scanner that has CYR3CONFUS1ON results. Easy management of aggregation among multiple tenant organizations. A simple summary report highlights systemic threats. -
18
RiskIQ
RiskIQ
RiskIQ is the market leader in attack surface management. It provides the most comprehensive intelligence, discovery, and mitigation of threats related to an organization's digital presence. RiskIQ gives enterprises unified insight and control of mobile, social, and web exposures. More than 75% of attacks originate outside the firewall. RiskIQ's platform is trusted by thousands of security analysts. It combines advanced internet data reconnaissance with analytics to accelerate investigations, understand digital attack surface, assess risk, and take action to protect customers, brands, and businesses. RiskIQ is the world's only platform with patented Internet Intelligence Graph technology, security intelligence--unified. RiskIQ's 10-year-old history of mapping the internet is used to fuel applied intelligence that detects cyberattacks and responds. The most comprehensive security intelligence to protect your attack surfaces. -
19
SecurityHQ
SecurityHQ
SecurityHQ is a Global Managed Security Service Provider (MSSP) that detects & responds to threats 24/7. Gain access to an army of analysts, 24/7, 365 days a year. Receive tailored advice and full visibility to ensure peace of mind, with our Global Security Operation Centres. Utilize our award-winning security solutions, knowledge, people, and process capabilities, to accelerate business and reduce risk and overall security costs. -
20
PhishLabs
Fortra
Our Digital Risk Protection solution is built on the PhishLabs Platform. The PhishLabs Platform was developed over a decade in partnership with the most targeted and recognizable brands around the globe. It provides comprehensive collection, expert curation and complete mitigation of digital risk. Brand impersonation, data theft, and other threats can occur anywhere online. These threats can go unnoticed and cause significant harm if they are not easily detected across digital channels, including domain registration activity, social media posts, profiles, and ads, mobile app stores, and on the open web and dark web. PhishLabs powers our Digital Risk Protection solution. It collects massive amounts of data from the surface, deep and dark web to provide comprehensive visibility. We monitor hundreds of leading social media sites and ingest data via hundreds of private and public data feeds. We also integrate data from client-specific sources, such as referrer logs and 3rd party feeds. -
21
SOCRadar Extended Threat Intelligence is a single platform that has been in existence since its inception. It proactively identifies cyber threats and analyzes them with contextual and actionable information. Organisations must have a better understanding of the external assets and services they use and the vulnerabilities they may pose. It is clear that EASM alone will not be enough to eliminate cyber risk. EASM should be part of a broader enterprise-wide vulnerability management strategy. Digital asset protection is a priority for enterprises, regardless of the location where they may be exposed. As threat actors multiply, the traditional focus on dark web and social media is no longer sufficient. To equip the security team, it is important to consider monitoring capabilities across all environments (cloud buckets and dark web). Services like site takedowns and automated remediation are also important for a comprehensive Digital Risk Protection.
-
22
Cyjax
Cyjax
Our proprietary technologies are supported by world-class analysts who can process and contextualize thousands upon sources. Our platform, dashboards, metrics, and analytics allow you to visualize this analysis. Our unique widget and dashboard tooling allow users to query and visualize data from thousands upon thousands of threat feeds from one place. We cover all major social media platforms, as well as instant messaging and forums. Our operations team provides current intelligence on activity that could have an impact on your company. The SOCMINT team is able to track and collate activity related to a particular topic of interest. The Cyjax Platform is compatible with almost all API endpoint architectures. Our platform supports JSON/STIX/TAXII, CEF formats and a variety of native integrations. Integrations between platforms can be made ad-hoc with our complete developer guide and control framework. -
23
OnSecurity
OnSecurity
$9.30 per monthOnSecurity is a leading penetration testing vendor based in the UK, dedicated to delivering high-impact, high-intelligence penetration testing services to businesses of all sizes. Our mission is to simplify the management and delivery of pentesting for our customers, using our platform to help them improve their security posture through expert testing, actionable insights, and unparalleled customer service. Our platform allows you to manage all of your scheduling, managing and reporting in one place, and you get more than just a test—you get a trusted partner in cybersecurity -
24
Brandefense
Brandefense
Brandefense is an innovative solution that protects organizations from digital risks. Our AI-driven tech constantly scans the internet, including the deep, surface, and dark webs, to discover unknown events. It prioritizes risks automatically and delivers actionable intelligence that you can use immediately to improve security. Get a clear picture of your company from the outside. AI-driven detection algorithms help you identify digital risks in our cybercrime data. Investigate, enrich and optimize the indicators you found. Eliminate false-positive incidents and use your time more effectively. Integrate the incidents we found with your security product. Cyber threat intelligence teams are ready to assist you in keeping safe. We only need to monitor the main domains and brands at a cost-effective rate. Automate your processes for unparalleled growth and streamlined business processes. -
25
Analyst1
Analyst1
Analyst1 provides organizations with a more efficient way to gather and enrich threat intelligence. Analysts are often overwhelmed by security tools and rarely have the time to investigate and remedy all threats. Analyst1 makes it easy to eliminate labor-intensive tasks that are necessary to understand the most important threats. Analyst1 was created by analysts for the enterprise. It allows you to create, test, and deploy effective countermeasures across multiple intrusion prevention and detection systems. -
26
Webshrinker
DNSFilter
$50 per monthOur AI categorizes billions domains every day. We are able to detect 76% more threats than our competitors and catch them 5 days quicker. Our domain intelligence tools have categorized over 380 million websites and re-scan every five days. No other feed categorizes and detects new sites as fast as ours. No other feed uses image scanning technology to detect new malware and scams. Our data powers web filtering and rich ad targeting. We also provide contextual safety for millions of users all over the globe. Webshrinker uses artificial intelligence to scan, aggregate, and categorize billions of domains every single day. Our site categorizations are then validated using human intelligence. Raw data is collected across domains from around the globe. 5 billion events are processed each day and categorized. Machine learning algorithms process large amounts of data. Customers receive new information via API or database updates. - 27
-
28
Palo Alto Networks AutoFocus
Palo Alto Networks
Unrivaled threat intelligence is essential for tomorrow's operations. AutoFocus can help you speed up investigation, prevention, and response. Palo Alto Networks, the provider of the industry-leading next generation firewall, has created the highest-fidelity repository for threat intelligence in the world. It is sourced from the largest network sensors and is available for any team or tool. AutoFocus™, a contextual threat intelligence service, is your one-stop source for threat intelligence. Your teams will have instant access to every event, with unrivaled context provided by Unit 42 threat researchers. You can also embed rich threat intelligence into analyst's existing tools to speed up investigation, prevention, response. You will have unprecedented visibility into crowdsourced attacks from the industry's largest network, endpoint and cloud intel sources. Every threat is enhanced with the most detailed context from Unit 42 threat researchers. -
29
Red Sift Brand Trust
Red Sift
Red Sift Brand Trust, formerly OnDOMAIN, allows Security personnel to quickly shutdown phishing websites, discover and secure forgotten legitimate domains, and defend their brand from abuse and reputational damages. Uncover Red Sift Brand Trust monitors 150 million hostnames per day and has real-time domain registration information, allowing users to remain up-to date and ready to respond. Investigate Red Sift Brand Trust monitors the asset health of all domains and underdomains within your perimeter, including WHOIS data. Logo Management & Detection allows you to upload all variations of your brand assets into its logo management library. Machine vision-based logo detection scans the internet for both legitimate and illegal use of an organisation's brand. -
30
ThreatStream
Anomali
Anomali ThreatStream is an Intelligence Platform that aggregates threat information from multiple sources. It provides an integrated set to tools for quick, efficient investigations and delivers operationalized threat intelligence directly to your security controls at machine speed. ThreatStream automates and accelerates the collection of all relevant global threat information. This gives you greater visibility due to specialized intelligence sources. It also reduces administrative burden. Automates the collection of threat data from hundreds of sources into one, high-fidelity set of threat intelligence. Diversifying intelligence sources without creating administrative overhead can improve your security posture. You can easily access the integrated marketplace to purchase new sources of threat information. Anomali is used by organizations to harness the power and intelligence of threat intelligence to make cybersecurity decisions that reduce risk, strengthen defenses, and increase security. -
31
Webz.io
Webz.io
Webz.io finally delivers web information to machines in the way that they need it. This allows companies to convert web data into customer value. Webz.io connects directly to your platform and provides a steady stream machine-readable data. All the data, on demand. Machines can immediately access historical and live data stored in repositories and start consuming it immediately. Webz.io converts unstructured web data into structured, readable JSON or XML formats that machines can understand. With real-time monitoring of millions upon millions of news sites, reviews, and online discussions, you will never miss a trend, mention, or story. You can keep an eye on cyber threats by monitoring suspicious activity across the web, from the deepest to darkest. You can fully protect your digital assets and physical assets with a continuous, real-time feed that shows all possible risks. -
32
Global Threat Intelligence is a cloud-based, real-time reputation service that is fully integrated with Trellix's products. Protects organizations and users from known and emerging cyber-threats, regardless of their source or location. Shared threat intelligence allows security products to work together based on real-time, robust information. Closes the threat windows with instantaneous and often predictive reputation-based threat information, reducing the likelihood of an attack, the cost of remediation, and lost downtime. Our threat intelligence is produced by correlating billions of Trellix sensor queries from around the world. GTI is accessed by Trellix products in the cloud. GTI then provides the latest reputation and categorization intelligence so that the products can take action.
-
33
Binary Defense
Binary Defense
You need to have complete cybersecurity protection in order to prevent breaches. To detect, monitor, and respond to security threats 24x7, you need a security team. By extending your team's expertise and cost-effectiveness, cybersecurity can be simplified and taken out of the equation. Our Microsoft Sentinel experts will get your team deployed, monitoring and responding faster than ever. Meanwhile, our SOC Analysts, Threat Hunters, and Threat Hunters will always have your back. Protect the weakest parts of your network, including your servers, desktops, and laptops. We offer advanced endpoint protection and system administration. Gain comprehensive, enterprise-level security. Our security analysts monitor, tune and deploy your SIEM. Take control of your cybersecurity. By hunting for threats in their natural environment, we can detect and stop attackers before they strike. Proactive threat hunting helps identify unknown threats and stop attackers from evading security defenses. -
34
EclecticIQ
EclecticIQ
EclecticIQ provides intelligence-powered cybersecurity solutions for government agencies and commercial businesses. We create analyst-centric products, services, and solutions that help our clients align their cybersecurity focus with the threat reality. This results in intelligence-led security, better detection and prevention, as well as cost-efficient security investments. Our solutions are specifically designed for analysts and cover all intelligence-led security practices, such as threat investigation, threat hunting, and incident response. We tightly integrated our solutions into the IT security systems and controls of our customers. EclecticIQ is a global company with offices in Europe, North America, United Kingdom and North-America. It also has certified value-add partners. -
35
Lumen Adaptive Threat Intelligence
Lumen Technologies
Security specialists can quickly eliminate threats with Adaptive Threat Intelligence. Our global network visibility allows us to provide high-fidelity intelligence that is correlated to your IP addresses. This is combined with Rapid Threat Defense to prevent threats and simplify security. Black Lotus Labs has developed and deployed automated validation technology that validates threat data and tests new threats. This reduces false positives. Automated threat defense detection and response capabilities can block threats based upon your risk tolerance. A comprehensive virtual offering eliminates the need for data and devices to be deployed or integrated and provides one point of contact for all escalations. It includes a mobile app, a security portal, and an API feed. You can manage threat visualization and response using context-rich reports as well as historical views. -
36
CleanINTERNET
Centripetal
While traditional cybersecurity solutions respond to threats as they arise, CleanINTERNET® shields your network against threats proactively by preventing them from ever reaching it. The largest collection of commercial threat intelligence with high-fidelity and confidence in the world is operationalized to allow your defenses to adapt and defend in parallel as the threat landscape changes. Protect your network by using over 100 billion indicators from real-time intelligence updates every 15 minutes. No latency is required for the fastest packet filtering technology in the world to be integrated at the edge of your network. This allows you to use billions of threat indicator so that malicious threats can be dynamically blocked. AI-enabled analysts with high levels of expertise monitor your network and provide automated shielding that is validated by human expertise. -
37
DarkIQ
Searchlight Cyber
Monitor, pre-empt, and prevent costly security incidents–against your brand, suppliers, and people with actionable dark web alerts. With DarkIQ, you can identify cybercriminals while they are still in the reconnaissance stage of their attack, so rather than just responding to attacks, you can prevent them from happening. DarkIQ is your secret weapon, continuously monitoring the dark web for cybercriminal activity. It detects, categorizes, and alerts you to imminent threats so that you can take action against cybercriminals before they strike. -
38
Bitdefender Advanced Threat Intelligence
Bitdefender
Bitdefender Advanced Threat Intelligence is powered by the Bitdefender Global Protective Network. (GPN). Our Cyber-Threat Intelligence Labs combine hundreds of thousands of indicators of compromise and turn data into actionable, immediate insights. Advanced Threat Intelligence delivers the best security data and expertise directly into businesses and Security Operations Centers. This enables security operations to succeed with one of industry's most extensive and deepest real-time knowledge bases. Enhance threat-hunting capabilities and forensic capabilities by providing contextual, actionable threat indicators for IPs, URLs and domains that are known to harbor malware, spam, fraud, and other threats. Integrate our platform-agnostic Advanced Threat Intelligence services seamlessly into your security architecture, including SIEM TIP and SOAR. -
39
Defense.com
Defense.com
$30 per node per monthCyber threats can be controlled. Defense.com helps you identify, prioritize, and track all security threats. Cyber threat management made easier. All your cyber threat management needs are covered in one place: detection, protection, remediation and compliance. Automated tracking and prioritized threats help you make intelligent decisions about your security. Follow the steps to improve your security. When you need help, consult with experienced cyber and compliance experts. Easy-to-use tools can help you manage your cyber security and integrate with your existing security investments. Live data from penetration tests and VA scans, threat information, and other sources all feed into a central dashboard that shows you where your risks are and how severe they are. Each threat has its own remediation advice, making it easy for you to make security improvements. You will receive powerful threat intelligence feeds that are tailored to your attack surface. -
40
Cisco Talos
Cisco
Cisco Talos is the industry-leading threat intelligence organization fighting the good fight. Cisco Talos is a large commercial threat intelligence team made up of top-notch researchers, analysts, engineers, and other professionals. Cisco customers benefit from industry-leading visibility, actionable information, vulnerability research, and rapid detection of known and emerging threats. They also protect against threats that are not yet known or under development. This allows them to stop threats from the wild and protect the Internet. Cisco Talos is a trusted provider of cutting-edge security research worldwide. We provide the data Cisco Security products use to take action. Our process is what makes Talos different. We see the threat landscape from a wide range of angles, then act quickly and meaningfully on it to drive protection. Talos' unique capabilities and scale in intelligence, as well as greater visibility than any other security vendor worldwide, is integral to this process. -
41
Trellix ATLAS
Trellix
Customers get a unique view of malicious files, domains and IP detections worldwide. Advanced Threat Landscape Analysis System data is aggregated by Trellix from multiple data sources in order to provide the most recent global emerging threats, along with enriched information such as industry sector or geolocation. ATLAS correlates the threats with campaign data containing Trellix's Advanced Research Center and Threat Intelligence Group, as well as open-source data, in order to provide a dedicated, dedicated view of campaigns, including events, dates and threat actors. Trellix provides customers with a unique global insight on the malicious threats detected worldwide. Geospatially enabled situational intelligence. Trellix Telemetry Data is used to collect data worldwide. Highlights current and emerging threats, highlighting those that are of particular interest based on type, industry sector or geolocation. -
42
Anomali
Anomali
Anomali provides security teams with machine-learning optimized threat intelligence and identifies hidden threats that target their environments. Anomali platforms allow organizations to harness threat data, intelligence, and information to make cybersecurity decisions that reduce risk and strengthen their defenses. We believe everyone should have access to the cyber threat intelligence that Anomali provides. We offer tools and research to the community, all free. -
43
scoutTHREAT
LookingGlass Cyber Solutions
Cybersecurity is constantly evolving, both in terms of threat actor tactics and security practitioner defense. Even the most sophisticated security operations have to adapt to these constantly changing Tactics, Techniques and Procedures (TTPs). Security teams must not only be able to collect high-quality intelligence, but also to contextualize, process and put into practice that intelligence to protect their organization. Your organization will need a scalable cybersecurity threat management system to manage the increasing volume of intelligence. Automation and a higher workflow can reduce the need for expensive analysts and team members without compromising the effectiveness of your cybersecurity program. scoutTHREAT, created by Goldman Sachs, is a Threat Intelligence Platform. (TIP) It enables your cybersecurity program identify threats before they impact. -
44
SIRV
SIRV
$10,000 per installThreat, incident and event reports for security teams. SIRV's award winning artificial intelligence solution visualises threats to your organisation. Monitor situational risk and learn about activism, crime and adjacent threats. Prepare, handle and recover from major incidents. Drive risk based safety and security decisions: Combine open source intelligence with the SIRV field report platform Founded in 2012: Systematic Intelligence Risk Valuation (SIRV) -
45
ThreatSync
WatchGuard
It can be difficult to manage security across an organization, whether you have 10 branch offices or distributed businesses with 10 employees. SMBs and distributed enterprises must have visibility into their network and endpoint data. They also need to be able quickly and efficiently to use actionable insights to eliminate threats. ThreatSync, an essential component of TDR, collects threat data from WatchGuard Firebox, Host Sensor, and enterprise-grade threat intelligence feeds. It then analyzes this data using a proprietary algorithm and assigns a threat score and rank. This powerful correlation engine allows cloud-based threat prioritization, empowering IT teams to respond quickly and confidently to threats. Collects and correlates threat events data from the Firebox or Host Sensor. -
46
The Respond Analyst
Respond
XDR Cybersecurity Solutions can accelerate investigations and increase analyst productivity. The Respond Analyst™, an XDR Engine automates the detection of security incidents. It transforms resource-intensive monitoring into consistent investigations. The Respond Analyst connects disparate evidence with probabilistic mathematics and integrated reasoning, determining whether events are malicious and possible actionable. The Respond Analyst enhances security operations teams by significantly reducing false positives, allowing for more time for threat hunting. The Respond Analyst lets you choose the best-of-breed controls for modernizing your sensor grid. The Respond Analyst integrates seamlessly with leading security vendors across key categories, including EDR, IPS Web Filtering and EPP, Vulnerability Scanning, Authentication and more. -
47
Senseon
Senseon
Senseon's AI Triangulation works like a human analyst to automate threat detection, investigation, and response. This will increase your team's efficiency. You can eliminate the need to use multiple security tools by utilizing one platform that provides complete visibility across all digital assets. IT and security teams can focus on real threats with accurate detection and alerting, helping them achieve 'inbox zero. Senseon's unique AI Triangulation' technology mimics human security analysts' thinking and actions to automate the process for threat detection, investigation, and response. Senseon provides context-rich alerts by looking at users and devices from multiple angles, pause for thought, and learning from past experience. These automated capabilities relieve security personnel from the burden of extensive analysis, alert fatigue, and false positives. -
48
Falcon X
CrowdStrike
Falcon X combines automated intelligence with human intelligence. This allows security teams of any size to stay ahead of the next attack. Automated investigation of incidents, and faster alert triage and response. It is integrated into the Falcon platform and can be used in seconds. Premium adds threat intelligence research and threat intelligence reporting from CrowdStrike experts to help you stay ahead of hacktivist attacks, nation-state, and eCrime. Elite gives you access to an intelligence analyst who can help protect your organization from threats. Endpoint protection can be elevated to the next level with the combination of malware sandbox analysis and malware search. It is easier to reduce the time and skills needed to investigate incidents manually. Identify and investigate related threats to prevent similar attacks in the future. The Indicator graph allows you to visualize the relationships between IOCs, adversaries, and your endpoints. -
49
Rapid7 Threat Command
Rapid7
Rapid7 Threat Command is an advanced tool for external threat intelligence that detects and mitigates threats directly to your company, employees, customers, and customers. Threat Command allows you to quickly respond to threats and make informed decisions by proactively monitoring thousands upon thousands of sources on the dark, deep, and clear web. With automated alert responses and faster detection, you can quickly turn intelligence into action. Plug-and-play integrations are possible with your existing technologies, including SIEM, SOAR and EDR. Advanced investigation and mapping capabilities provide highly contextualized alerts that are low in signal-to-noise ratio to simplify SecOps workflows. Our expert analysts are available 24/7/365 to assist you in your investigation and speed up the response time. -
50
Cyren
Cyren
Cyren Inbox Security, an innovative solution, turns the tables on phishers. It safeguards every Office 365 mailbox in your company against evasive phishing and business email compromise (BEC), and fraud. Continuous monitoring and detection alert you to any suspicious activity. Automated response and remediation will be performed for each mailbox and across all mailboxes within the organization. Our crowd-sourced user detection closes down the feedback loop on alerts, strengthening your security training and providing valuable threat information. An extensive, multi-dimensional presentation that includes critical threat characteristics. This helps analysts understand the changing threat landscape. Improved threat detection for existing security products like SIEM and SOAR.