Best Threat Intelligence Apps for Android of 2025

Find and compare the best Threat Intelligence apps for Android in 2025

Use the comparison tool below to compare the top Threat Intelligence apps for Android on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Heimdal Endpoint Detection and Response (EDR) Reviews
    Top Pick
    See App
    Learn More
    The Heimdal Threat-hunting and Action Center provides security teams with an advanced threat and risk-centric view of their entire IT landscape, offering granular telemetry across endpoints and networks for swift decision-making.
  • 2
    ManageEngine EventLog Analyzer Reviews
    See App
    Learn More
    EventLog Analyzer from Manage Engine is the industry's most affordable security information and event management software (SIEM). This cloud-based, secure solution provides all essential SIEM capabilities, including log analysis, log consolidation, user activity monitoring and file integrity monitoring. It also supports event correlation, log log forensics and log retention. Real-time alerting is possible with this powerful and secure solution. Manage Engine's EventLog Analyzer allows users to prevent data breaches, detect the root cause of security issues, and mitigate sophisticated cyber-attacks.
  • 3
    Feedly Reviews

    Feedly

    Feedly

    $6 per month
    2 Ratings
    Our mission is to help people find the knowledge they need in order to excel at what they do. We believe reading opens doors. This applies to all aspects of life, including learning new skills, improving performance at work, and mastering a craft. Readers with curious minds need to read. Feedly allows them to connect with other readers and find information about the topics they are passionate about. You can organize and access all of your trusted blogs and publications in one place. Leo, your AI research assistant will learn to read your feeds and filter out noise. Collaboratively research key industry trends and share them. Ask Leo for help in reading your feeds and prioritizing the topics, events and trends that are important to you. Your team can benefit from your insights. As a team, organize, curate, share and discuss key industry insights. Feedly is a secure place where you can organize and research the topics that matter to your heart.
  • 4
    CTM360 Reviews

    CTM360

    CTM360

    Register today to take advanta
    A global Digital Risk Protection Platform, CTM360® identifies vulnerabilities, and detects, manages and responds to threats in the Surface, Deep & Dark web. Offered as a fully managed technology platform in the cloud, CTM360® is outside the perimeter of an organization.
  • 5
    SIRV Reviews

    SIRV

    SIRV

    $10,000 per install
    Threat, incident and event reports for security teams. SIRV's award winning artificial intelligence solution visualises threats to your organisation. Monitor situational risk and learn about activism, crime and adjacent threats. Prepare, handle and recover from major incidents. Drive risk based safety and security decisions: Combine open source intelligence with the SIRV field report platform Founded in 2012: Systematic Intelligence Risk Valuation (SIRV)
  • 6
    C-Prot Threat Intelligence Portal Reviews
    C-Prot Threat Intelligence Portal provides a powerful service that allows users to access information about cyber-threats. C-Prot Threat Intelligence Portal allows users to check for different types of suspicious indicators, such as files, signatures on files, IP addresses or web addresses. Institutions are informed of potential threats, and can take the necessary precautions. C-Prot Threat Intelligence Portal allows you to detect advanced threats by using our advanced detection technology, including dynamic, statical, and behavioral analyses, as well as our global cloud reputation system. Access detailed information about specific malware indicators as well as tools, tactics and attack types used to cyber attackers. Check for indicators of suspicious threats, such as IP addresses and web addresses. Understanding threat trends and anticipating specific attacks is possible with a complete understanding of your threat environment.
  • 7
    Blue Hexagon Reviews
    Our real-time deep learning platform is designed to provide cyber defense professionals with a new standard in speed, effectiveness, and coverage. Our neural networks are trained with global threat data, which we have carefully curated via threat repositories (dark web), our deployments, and partners. Our proprietary architecture of neural network can identify threats in both payloads as well as headers, just like layers of neural network can recognize your photo in photos. Blue Hexagon Labs continuously validates the accuracy and identifies new threats in the wild every day. Our neural networks are capable of identifying a wide variety of threats, including exploits, file and fileless malware, C2 communications, malicious domains across Windows and Linux platforms, as well as exploits. Deep learning is a subset in machine learning that uses multi-layered artificial neuro networks to learn data representation.
  • 8
    Group-IB Unified Risk Platform Reviews
    The Unified Risk Platform increases security by identifying risks that your organization is exposed to. The platform automatically configures your Group IB defenses with the exact insights needed to stop attacks from threat actors. This makes it less likely that an attacker will succeed. The platform monitors threat actors 24/7 to detect advanced techniques and attacks. The Unified Risk Platform detects early warning signs of attacks before fraud occurs, or damage is done to your brand. This reduces the risk of unfavorable consequences. The Unified Risk Platform provides insight into the tactics of threat actors. The platform offers a range of solutions and techniques to stop attacks on your infrastructure, brand, and customers. This reduces the risk that an attack will cause disruptions or recur.
  • 9
    Deep Instinct Reviews
    Deep Instinct is unique in applying end-to-end deeplearning to cybersecurity. Deep Instinct's approach is preemptive, unlike response-based solutions that wait for an attack to occur before reacting. Deep Instinct's preventative approach ensures customers are protected in no time. Files and vectors are automatically analyzed before execution. This is crucial in a dangerous environment where it is impossible to act quickly. Deep Instinct is designed to eradicate cyber threats from an enterprise. It detects and blocks the most evasive known as well as unknown cyberattacks with unmatched accuracy. Third-party tests are performed regularly and have the highest detection rates. The lightweight solution provides protection for endpoints, networks and servers as well as mobile devices. It can be applied to all OSs and protects against file-based and fileless attacks.
  • 10
    Dataminr Reviews
    Dataminr's AI platform detects and sends alerts to global teams as they occur. You can quickly identify critical information, respond with confidence, manage crises better across your enterprise, and then you can know the most important information first.
  • 11
    Cyware Reviews
    Cyware is the only company that builds Virtual Cyber Fusion Centers, enabling organizations to respond to threats in unprecedented ways. Cyware provides a complete range of cyber fusion solutions that can be used to automate threat response and sharing tactical, tactical, operational, and strategic threat intelligence. Cyware Enterprise Solutions are designed for secure collaboration, inculcate cybersecurity, enhance threat visibility, and deliver necessary control. They provide organizations with context-rich analysis of threats to enable proactive response without losing the element human judgment. Cyware solutions push the boundaries of security paradigms. They use advances in Machine Learning and Artificial Intelligence, Security Automation & Orchestration technologies, to empower enterprises to adapt to the changing threat landscape.
  • 12
    Chimpa Reviews
    It takes only a few minutes for Chimpa to be activated. The interface is also very easy to use, making it accessible even for novice users. Chimpa is compatible with iOS, iPadOS, Android, and tvOS operating systems. MDM is a distribution of various applications and configurations on the device, as well as company policies, certificates, and back-end infrastructure. This allows for easier and more efficient IT management of end users. MDM solutions allow for the management of users and devices in a scalable and coherent manner in modern corporate IT environments. MDM's general purpose is to improve the user-friendliness, security, and functionality while still allowing for some flexibility for the user. Remote initialization, security functions, blocking and kiosk mode. Analytical data about the App and network usage.
  • Previous
  • You're on page 1
  • Next