Best Threat Intelligence Platforms for Chronicle SOAR

Find and compare the best Threat Intelligence platforms for Chronicle SOAR in 2025

Use the comparison tool below to compare the top Threat Intelligence platforms for Chronicle SOAR on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    CrowdStrike Falcon Reviews
    Top Pick
    CrowdStrike Falcon, a cloud-native security platform, provides advanced protection from a wide range cyber threats including malware, ransomware and sophisticated attacks. It uses artificial intelligence (AI), machine learning, and incident response to detect and respond in real-time to threats. The platform uses a lightweight, agent-based solution that continuously monitors the endpoints to detect malicious activity. This provides visibility and protection with minimal impact on system performance. Falcon's cloud architecture ensures rapid updates, scalability and rapid threat response in large, distributed environments. Its comprehensive security capabilities help organizations detect, prevent, and mitigate cyber risks. This makes it a powerful tool in modern enterprise cybersecurity.
  • 2
    Pulsedive Reviews
    Pulsedive provides threat intelligence platform and data products that can be used to aid security teams in their threat intelligence research, processing and management. Start by searching any domain, URL, or IP at pulsedive.com. Our community platform allows you to enrich and investigate indicators for compromise (IOCs), analyze threats and query across the Pulsedive database. You can also submit IOCs in bulk. What we do differently - On-demand, perform passive or active scanning of every ingested IOC - Sharing of risk evaluations and factors with our users based upon first-hand observations - Pivot any data property or value Analyze threat infrastructure and properties shared by different threats Our API and Feed products allow for automation and integration of data within security environments. For more information, visit our website.
  • 3
    Blueliv Threat Compass Reviews
    Blueliv helps you counter cyberthreat faster using our adaptive, modular technology, Threat Compass. Exfiltrated information and unique external threats. Real-time threat collection capabilities that are the most comprehensive on the market. Machine learning powers targeted, accurate and actionable Threat Intelligence. All your threats, only your threats - no false positives Blueliv playbooks are a great way to stay ahead of the curve and remove illegal websites, social media mentions, and mobile apps. Your security teams can effectively hunt down threats using limited resources by combining human expertise and machine learning. Subscription-based, modular, multi-tenant solution. In minutes, you can configure, deploy, then get results. You can easily integrate your results with existing solutions and share intelligence among trusted parties and peers.
  • 4
    ReversingLabs Titanium Platform Reviews
    Advanced malware analysis platform that detects malicious files faster through automated static analysis. It can be used in any cloud and any environment. More than 360 file formats were processed and 3600 file types were identified from various platforms, applications and malware families. Real-time, deep inspection and analysis of files. This can be scaled to 150 million files per hour without dynamic execution. Connectors that are tightly coupled integrate industry-leading email, SIEM and SOAR platforms, as well as EDR, SIEM and SIEM. Unique Automated Static Analysis completely dissects the internal contents of files in just 5 ms, without execution, which eliminates the need for dynamic analysis in most instances.
  • 5
    Anomali Reviews
    Anomali provides security teams with machine-learning optimized threat intelligence and identifies hidden threats that target their environments. Anomali platforms allow organizations to harness threat data, intelligence, and information to make cybersecurity decisions that reduce risk and strengthen their defenses. We believe everyone should have access to the cyber threat intelligence that Anomali provides. We offer tools and research to the community, all free.
  • 6
    Nozomi Networks Reviews
    Nozomi Networks Guardian™ provides visibility, security, and monitoring for your OT, IT, IoT and edge assets. Vantage can consolidate security management from anywhere and anytime using data sent by Guardian sensors. They can also send data directly to the Central Management Console, for aggregated data analyses at the edge or on the public cloud. Guardian is used by the top companies in the world to protect their critical infrastructures, manufacturing, mining and transportation sites, as well as building automation, energy, and other sites. Nozomi Networks Vantage™ leverages both the power and simplicity that comes with software as a services (SaaS), to deliver unmatched visibility and security across your OT/IoT/IT networks. Vantage accelerates the digital transformation of even the largest and most complicated distributed networks. You can protect as many OT, IoT and IT assets, edge devices, cloud assets, or edge computing anywhere. SaaS platform allows you to consolidate your security management in a single application.
  • 7
    SpyCloud Reviews
    Criminals can quickly monetize data after a data breach by using stolen credentials to gain access to corporate systems and consumer accounts. Account takeover fraud is a high risk for your employees, consumers, and third-parties if credentials or PII are exposed in a data breaches. SpyCloud offers proactive solutions that take advantage of the largest collection of breach assets recovered worldwide to help you prevent account theft and combat online fraud. Before criminals can access your corporate data or defraud you users, reset stolen passwords. To identify criminals trying to defraud you and your customers, use decades-worth digital breadcrumbs. You should monitor your key third party relationships to identify supply chain breaches that could pose a threat to your business. To protect your supply chain, employees, and citizens from credential-based cyberattacks, leverage breach data.
  • 8
    ThreatQ Reviews

    ThreatQ

    ThreatQuotient

    Threat intelligence platform - threatQ, to understand and prevent threats more effectively and efficiently, your security infrastructure and people must work smarter, and not harder. ThreatQ is an extensible and open threat intelligence platform that can accelerate security operations through simplified threat operations and management. The integrated, self-tuning, adaptive threat library, open exchange, and workbench allow you to quickly understand threats and make better decisions, thereby accelerating detection and response. Based on your parameters, automatically score and prioritize internal or external threat intelligence. Automate the aggregation and operationalization of threat intelligence across all systems. Integrating your tools, teams, and workflows will increase the effectiveness of your existing infrastructure. All teams have access to a single platform that enables threat intelligence sharing, analysis, and investigation.
  • 9
    ThreatStream Reviews
    Anomali ThreatStream is an Intelligence Platform that aggregates threat information from multiple sources. It provides an integrated set to tools for quick, efficient investigations and delivers operationalized threat intelligence directly to your security controls at machine speed. ThreatStream automates and accelerates the collection of all relevant global threat information. This gives you greater visibility due to specialized intelligence sources. It also reduces administrative burden. Automates the collection of threat data from hundreds of sources into one, high-fidelity set of threat intelligence. Diversifying intelligence sources without creating administrative overhead can improve your security posture. You can easily access the integrated marketplace to purchase new sources of threat information. Anomali is used by organizations to harness the power and intelligence of threat intelligence to make cybersecurity decisions that reduce risk, strengthen defenses, and increase security.
  • 10
    PassiveTotal Reviews
    RiskIQ PassiveTotal aggregates data across the internet, absorbing intelligence in order to identify threats and attacker infrastructure. It also leverages machine learning to scale threat hunting, response, and mitigation. PassiveTotal gives you context about who is attacking you, their tools, systems, and indicators that compromise outside of the firewall--enterprise or third party. Investigating can be fast and very fast. Over 4,000 OSINT articles, artifacts and documents will help you quickly find answers. RiskIQ's 10+ years of internet mapping gives it the most comprehensive and complete security intelligence. Passive DNS, WHOIS SSL, SSL, hosts and host pair, cookies, exposed service, ports, components, code, and more are all absorbed by RiskIQ. You can see the entire digital attack surface with curated OSINT and your own security intelligence. Take control of your digital presence to combat threats to your company.
  • 11
    TruSTAR Reviews
    TruSTAR's cloud-native Intelligence Management Platform transforms intelligence from third parties and historical events for seamless integration. It also accelerates automation across core detection and orchestration tools. TruSTAR transforms intelligence to enable seamless integration and actionable automation across your entire ecosystem of tools and teams. TruSTAR is platform-independent. You can get investigation context and enrichment within your mission-critical security tools. Our Open API allows you to connect to any app, anywhere. Automate detection, triage and investigation from one endpoint. Enterprise security management is about managing data to enable automation. TruSTAR normalizes intelligence and prepares it for orchestration, greatly reducing the complexity of playbooks. Spend less time wrangling data and more time catching bad guys. TruSTAR was designed to offer maximum flexibility.
  • 12
    Darkfeed Reviews
    The ultimate underground threat intelligence collection will help you unleash your cyber security performance and optimize analysts' performance. Darkfeed is a feed that contains malicious indicators of compromise. It includes URLs, hashes and IP addresses. It uses Cybersixgill's extensive collection of dark and deep web sources to provide advanced warnings about cyberthreats. It is automated, which means that IOCs can be extracted and delivered in real time. It is also actionable, so that consumers will have the ability to block or receive items that could threaten their organizations. Darkfeed offers the best IOC enrichment solution available. Users can enrich IOCs from SIEM or SOAR, TIP, VM platforms to gain unprecedented context and essential explanations that will help them accelerate their incident response and prevention, and stay ahead of the threat curve.
  • 13
    SandBlast Network Reviews

    SandBlast Network

    Check Point Software Technologies

    Cyber attacks are becoming more complex and difficult to detect. This makes security more difficult and tedious, affecting user workflows. SandBlast Network offers the best zero-day protection, while reducing security overheads and ensuring business productivity. SandBlast Network offers the best zero-day protection available in the industry. It also reduces administration overhead and ensures that businesses are productive. Unknown cyber threats are prevented by AI and threat intelligence. One click setup with out-of the-box profiles optimized to business needs. It is a prevention-first strategy that has no impact on the user experience. Humans are the weakest link of the security chain. Pre-emptive user protections prevent threats from reaching users, regardless of user activity (browsing or email). Real-time threat intelligence, derived from hundreds and millions of sensors around the globe.
  • 14
    Palo Alto Networks AutoFocus Reviews
    Unrivaled threat intelligence is essential for tomorrow's operations. AutoFocus can help you speed up investigation, prevention, and response. Palo Alto Networks, the provider of the industry-leading next generation firewall, has created the highest-fidelity repository for threat intelligence in the world. It is sourced from the largest network sensors and is available for any team or tool. AutoFocus™, a contextual threat intelligence service, is your one-stop source for threat intelligence. Your teams will have instant access to every event, with unrivaled context provided by Unit 42 threat researchers. You can also embed rich threat intelligence into analyst's existing tools to speed up investigation, prevention, response. You will have unprecedented visibility into crowdsourced attacks from the industry's largest network, endpoint and cloud intel sources. Every threat is enhanced with the most detailed context from Unit 42 threat researchers.
  • 15
    Chronicle SOC Reviews
    Although we live in a digital age, the current economics of storing enterprise security data make it almost impossible to combat cybercrime. What if the economics and scale of storing and analysing your organization's security information were no longer an issue? Chronicle was built on the largest data platform in the world to provide unmatched resources and capabilities to help you gain the edge. Google Cloud threat signals, which were sourced by Chronicle's security team, are embedded in the Chronicle platform. Uppercase signals are based upon a mixture of proprietary data sources and public intelligence feeds. Even the most skilled analysts have difficulty processing the volume of security telemetry modern enterprises generate. Chronicle can automatically handle petabytes worth of data. Automated analysis allows your analysts to understand suspicious activity in seconds and not hours.
  • 16
    Chronicle Threat Intelligence Reviews
    Google Cloud Threat Intelligence researchers have created and maintained high-quality, actionable, out of-the-box threat detection content that will help you get better detections. Native detection sets cover a range of threats, including Windows-based attacks such as ransomware, remote access tools (RAT), infostealers and data exfiltration. New analytics from Google Cloud Threat Intelligence researchers reveal new and latent threats, unlocking new detection coverage. You can use GCTI detections for response actions and rules that are specific to your environment. The VirusTotal Augment widget can be used to increase efficiency in SOC processes and allow faster search for artifacts such as domains, URLs, IPs, URLs, or hashes. You can gain context beyond your network perimeter and expand your telemetry to explore related VirusTotal IIoCs in a graphical way.
  • Previous
  • You're on page 1
  • Next