Best Threat Intelligence Platforms for CrowdStrike Falcon

Find and compare the best Threat Intelligence platforms for CrowdStrike Falcon in 2025

Use the comparison tool below to compare the top Threat Intelligence platforms for CrowdStrike Falcon on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Kroll Cyber Risk Reviews
    See Platform
    Learn More
    Kroll's threat intelligence services combine frontline incident response intel and elite analysts to effectively hunt and respond to threats. Our team aligns Kroll’s proprietary intelligence, analytical research and investigative expertise to improve your visibility and provide expert triage, investigation and remediation services.
  • 2
    Silent Push Reviews
    Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Threat Intelligence dataset available. Defenders can focus on stopping threats before they cause a problem and significantly improve their security operations across the entire attack chain whilst simultaneously reducing operational complexity. The Silent Push platform exposes Indicators of Future Attack (IOFA) by applying unique behavioral fingerprints to attacker activity and searching our dataset. Security teams can identify new impending attacks, rather than relying upon out-of-date IOCs delivered by legacy threat intelligence. Organizations are better protected by understanding emerging developing threats before launch, proactively solving problems within infrastructure, and gaining timely and tailored threat intelligence with IoFA, that allows organizations to stay one step ahead of advanced attackers.
  • 3
    SIRP Reviews
    SIRP is a SOAR platform that is risk-based and non-code. It connects all security teams to achieve consistent strong outcomes through a single platform. SIRP empowers Security Operations Centers, Incident Response (IR), Threat Intelligence (VM) and Security Operations Centers (SOCs). It integrates security tools, powerful automation, and orchestration tools to enable these teams. SIRP is a NO-code SOAR platform that includes a security scoring engine. The engine calculates risk scores specific to your organization based on every alert, vulnerability, and incident. Security teams can map risks to individual assets and prioritize their response at scale with this granular approach. SIRP saves security teams thousands of hours every year by making all security functions and tools available at a push of a button. SIRP's intuitive drag and drop playbook building module makes it easy to design and enforce best practices security processes.
  • 4
    Stellar Cyber Reviews
    On premises, in public cloud, with hybrid environments, and from SaaS infrastructure. Stellar Cyber is the only security platform that provides high-speed, high-fidelity threat detection with automated response across the entire attack area. Stellar Cyber's industry-leading security platform improves security operations productivity, allowing security analysts to eliminate threats in minutes instead if days or weeks. Stellar Cyber's platform accepts data inputs from both existing cybersecurity solutions and its own capabilities and correlating them to present actionable results under a single intuitive interface. This helps security analysts reduce tool fatigue and data overload. It also helps cut operational costs.
  • 5
    SOC Prime Platform Reviews
    SOC Prime equips security teams with the largest and most robust platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. Backed by a zero-trust approach and cutting-edge technology powered by Sigma and MITRE ATT&CK®️, SOC Prime enables smart data orchestration, cost-efficient threat hunting, and dynamic attack surface visibility to maximize the ROI of SIEM, EDR, XDR & Data Lake solutions while boosting detection engineering efficiency. SOC Prime’s innovation is recognized by independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture.
  • 6
    Vulcan Cyber Reviews

    Vulcan Cyber

    Vulcan Cyber

    $999 / month
    Vulcan Cyber is changing the way businesses reduce cyber risks through vulnerability remediation orchestration. We help IT security teams to go beyond remedial vulnerability management and help them drive vulnerability mitigation outcomes. Vulcan combines vulnerability and asset data with threat intelligence and customizable risk parameters, to provide risk-based vulnerability prioritization insight. We don't stop there. Vulcan remediation intelligence identifies the vulnerabilities that are important to your business and attaches the necessary fixes and remedies to mitigate them. Vulcan then orchestrates and measures the rest. This includes inputs into DevSecOps and patch management, configuration management and cloud security tools, teams, and functions. Vulcan Cyber has the unique ability to manage the entire vulnerability remediation process, from scan to fix.
  • 7
    SafeGuard Cyber Reviews
    SafeGuard Cyber is a SaaS security platform providing cloud-native defense for critical cloud communication applications that organizations are increasingly reliant upon, such as Microsoft Teams, Slack, Zoom, Salesforce, and social media.  A blind-spot is growing for security operations as adoption of these tools increases, creating more risk and vulnerability to ransomware, business compromise, and confidential information leakage. Email security lacks the ability to both create visibility outside of email, and primarily defend against malicious files and links. CASB/SASE solutions are difficult to deploy and manage, and the control function is typically left “open” to prevent false positives from affecting business productivity Our platform’s agentless architecture creates a portable security layer wherever your workforce communicates, no matter the device or network. Manage day-to-day business communication risk extending beyond email and into enterprise collaboration applications. Secure your business by protecting the human attack vector from advanced social engineering and targeted threats.
  • 8
    SecurityHQ Reviews
    SecurityHQ is a Global Managed Security Service Provider (MSSP) that detects & responds to threats 24/7. Gain access to an army of analysts, 24/7, 365 days a year. Receive tailored advice and full visibility to ensure peace of mind, with our Global Security Operation Centres. Utilize our award-winning security solutions, knowledge, people, and process capabilities, to accelerate business and reduce risk and overall security costs.
  • 9
    Cyware Reviews
    Cyware is the only company that builds Virtual Cyber Fusion Centers, enabling organizations to respond to threats in unprecedented ways. Cyware provides a complete range of cyber fusion solutions that can be used to automate threat response and sharing tactical, tactical, operational, and strategic threat intelligence. Cyware Enterprise Solutions are designed for secure collaboration, inculcate cybersecurity, enhance threat visibility, and deliver necessary control. They provide organizations with context-rich analysis of threats to enable proactive response without losing the element human judgment. Cyware solutions push the boundaries of security paradigms. They use advances in Machine Learning and Artificial Intelligence, Security Automation & Orchestration technologies, to empower enterprises to adapt to the changing threat landscape.
  • 10
    The Respond Analyst Reviews
    XDR Cybersecurity Solutions can accelerate investigations and increase analyst productivity. The Respond Analyst™, an XDR Engine automates the detection of security incidents. It transforms resource-intensive monitoring into consistent investigations. The Respond Analyst connects disparate evidence with probabilistic mathematics and integrated reasoning, determining whether events are malicious and possible actionable. The Respond Analyst enhances security operations teams by significantly reducing false positives, allowing for more time for threat hunting. The Respond Analyst lets you choose the best-of-breed controls for modernizing your sensor grid. The Respond Analyst integrates seamlessly with leading security vendors across key categories, including EDR, IPS Web Filtering and EPP, Vulnerability Scanning, Authentication and more.
  • 11
    ThreatQ Reviews

    ThreatQ

    ThreatQuotient

    Threat intelligence platform - threatQ, to understand and prevent threats more effectively and efficiently, your security infrastructure and people must work smarter, and not harder. ThreatQ is an extensible and open threat intelligence platform that can accelerate security operations through simplified threat operations and management. The integrated, self-tuning, adaptive threat library, open exchange, and workbench allow you to quickly understand threats and make better decisions, thereby accelerating detection and response. Based on your parameters, automatically score and prioritize internal or external threat intelligence. Automate the aggregation and operationalization of threat intelligence across all systems. Integrating your tools, teams, and workflows will increase the effectiveness of your existing infrastructure. All teams have access to a single platform that enables threat intelligence sharing, analysis, and investigation.
  • 12
    ThreatStream Reviews
    Anomali ThreatStream is an Intelligence Platform that aggregates threat information from multiple sources. It provides an integrated set to tools for quick, efficient investigations and delivers operationalized threat intelligence directly to your security controls at machine speed. ThreatStream automates and accelerates the collection of all relevant global threat information. This gives you greater visibility due to specialized intelligence sources. It also reduces administrative burden. Automates the collection of threat data from hundreds of sources into one, high-fidelity set of threat intelligence. Diversifying intelligence sources without creating administrative overhead can improve your security posture. You can easily access the integrated marketplace to purchase new sources of threat information. Anomali is used by organizations to harness the power and intelligence of threat intelligence to make cybersecurity decisions that reduce risk, strengthen defenses, and increase security.
  • 13
    PassiveTotal Reviews
    RiskIQ PassiveTotal aggregates data across the internet, absorbing intelligence in order to identify threats and attacker infrastructure. It also leverages machine learning to scale threat hunting, response, and mitigation. PassiveTotal gives you context about who is attacking you, their tools, systems, and indicators that compromise outside of the firewall--enterprise or third party. Investigating can be fast and very fast. Over 4,000 OSINT articles, artifacts and documents will help you quickly find answers. RiskIQ's 10+ years of internet mapping gives it the most comprehensive and complete security intelligence. Passive DNS, WHOIS SSL, SSL, hosts and host pair, cookies, exposed service, ports, components, code, and more are all absorbed by RiskIQ. You can see the entire digital attack surface with curated OSINT and your own security intelligence. Take control of your digital presence to combat threats to your company.
  • 14
    TruSTAR Reviews
    TruSTAR's cloud-native Intelligence Management Platform transforms intelligence from third parties and historical events for seamless integration. It also accelerates automation across core detection and orchestration tools. TruSTAR transforms intelligence to enable seamless integration and actionable automation across your entire ecosystem of tools and teams. TruSTAR is platform-independent. You can get investigation context and enrichment within your mission-critical security tools. Our Open API allows you to connect to any app, anywhere. Automate detection, triage and investigation from one endpoint. Enterprise security management is about managing data to enable automation. TruSTAR normalizes intelligence and prepares it for orchestration, greatly reducing the complexity of playbooks. Spend less time wrangling data and more time catching bad guys. TruSTAR was designed to offer maximum flexibility.
  • 15
    Darkfeed Reviews
    The ultimate underground threat intelligence collection will help you unleash your cyber security performance and optimize analysts' performance. Darkfeed is a feed that contains malicious indicators of compromise. It includes URLs, hashes and IP addresses. It uses Cybersixgill's extensive collection of dark and deep web sources to provide advanced warnings about cyberthreats. It is automated, which means that IOCs can be extracted and delivered in real time. It is also actionable, so that consumers will have the ability to block or receive items that could threaten their organizations. Darkfeed offers the best IOC enrichment solution available. Users can enrich IOCs from SIEM or SOAR, TIP, VM platforms to gain unprecedented context and essential explanations that will help them accelerate their incident response and prevention, and stay ahead of the threat curve.
  • 16
    Proofpoint Emerging Threat (ET) Intelligence Reviews
    Proofpoint ET Intelligence provides the most accurate and timely threat intelligence. Our fully verified intelligence provides more context and seamlessly integrates with your security tools to improve your decision-making. It is not enough to know what threats exist to protect your people, data, or brand. Emerging Threat Intelligence (ETI) helps you to prevent attacks and reduce risk. It allows you to understand the historical context of these threats, who they are behind, when they attacked, what their methods were, and what they are after. Access on-demand historical and current metadata on IPs, domains and other threat intelligence to assist in investigating incidents and researching threats. You also get reputation intel, condemnation evidence, deep context and history, as well as detection information. All this information is searchable in an easy to use threat intelligence portal. It includes: Trends and timestamps for when a threat was identified and the associated category.
  • 17
    Proofpoint Identity Threat Defense Reviews
    In a hybrid world that is constantly changing, your organization relies on its employees and their virtual identities as well as the endpoints on which they operate to build and protect assets. By leveraging these identities, threat actors have discovered unique ways to move lateraly across your cloud environments. You need a new, innovative and agentless solution for detecting and responding to identity threats. This is a critical part of the attack chain today. Proofpoint Identity Threat Defense (previously Illusive) provides comprehensive prevention and visibility for all your identities, so you can fix identity vulnerabilities before they become real threats. You can also detect any lateral movement in your environments and activate the deception to ensure that threat actors are stopped before they gain access your corporate assets. You can stop real-time threats and prevent modern identity risks in action all in one place.
  • 18
    RiskIQ Reviews
    RiskIQ is the market leader in attack surface management. It provides the most comprehensive intelligence, discovery, and mitigation of threats related to an organization's digital presence. RiskIQ gives enterprises unified insight and control of mobile, social, and web exposures. More than 75% of attacks originate outside the firewall. RiskIQ's platform is trusted by thousands of security analysts. It combines advanced internet data reconnaissance with analytics to accelerate investigations, understand digital attack surface, assess risk, and take action to protect customers, brands, and businesses. RiskIQ is the world's only platform with patented Internet Intelligence Graph technology, security intelligence--unified. RiskIQ's 10-year-old history of mapping the internet is used to fuel applied intelligence that detects cyberattacks and responds. The most comprehensive security intelligence to protect your attack surfaces.
  • 19
    Google Digital Risk Protection Reviews
    Learn what a solution for digital risk protection is and how you can be better prepared if you know who is targeting you, their goals, and the ways they plan to compromise your security. Google Digital Risk Protection offers a broad solution for digital risk protection, either as a self-managed SaaS product or as a comprehensive service. Both options provide security professionals with visibility outside their organization and the ability to identify high risk attack vectors, malicious orchestration on the dark and deep web, and attack campaign on the open internet. Google Digital Risk Protection also provides contextual information about threat actors, their tactics, techniques and procedures, to provide a secure cyber threat profile. Map your attack surface, and monitor deep and dark web activities to gain visibility into the risk factors that impact the extended enterprise and supply chains.
  • 20
    IronNet Collective Defense Platform Reviews
    IronNet Collective Defense Platform uses advanced AI-driven Network Detection & Response (NDR), to detect and prioritise anomalous activity within individual enterprise network environments. The platform analyzes threat data across the community in order to identify broad attack patterns. It then provides anonymized intelligence to all community members, giving them early insight into possible incoming attacks. Companies and organizations from different sectors can work together to defend their industries by collaborating in real time. A collective defense community is formed when organizations work together to detect, share intelligence and stop threats in real time. Discover how IronNet’s Collective Defense platform built on our IronDome & IronDefense products enables organizations realize the full benefits from this approach.
  • 21
    ThreatConnect Threat Intelligence Platform Reviews
    The ThreatConnect Threat Intelligence platform (TIP), centralizes the aggregation, management and storage of threat data. Users can use one platform to normalize data from multiple sources, add context and automate threat intelligence-related security processes. ThreatConnect TIP offers a platform to organize and prioritize threat information and to drive actions across a security group.
  • Previous
  • You're on page 1
  • Next