Best Threat Intelligence Platforms for Zendesk

Find and compare the best Threat Intelligence platforms for Zendesk in 2025

Use the comparison tool below to compare the top Threat Intelligence platforms for Zendesk on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    ManageEngine EventLog Analyzer Reviews
    See Platform
    Learn More
    EventLog Analyzer from Manage Engine is the industry's most affordable security information and event management software (SIEM). This cloud-based, secure solution provides all essential SIEM capabilities, including log analysis, log consolidation, user activity monitoring and file integrity monitoring. It also supports event correlation, log log forensics and log retention. Real-time alerting is possible with this powerful and secure solution. Manage Engine's EventLog Analyzer allows users to prevent data breaches, detect the root cause of security issues, and mitigate sophisticated cyber-attacks.
  • 2
    Microsoft Sentinel Reviews
    Standing watch, at your side. Intelligent security analytics for your entire organization. With SIEM reinvented for modern times, you can see and stop threats before they cause damage. Microsoft Sentinel gives you a birds-eye view of the entire enterprise. Use the cloud and large-scale intelligence gleaned from decades of Microsoft security expertise to your advantage. Artificial intelligence (AI) will make your threat detection and response faster and more efficient. Reduce the time and cost of security infrastructure setup and maintenance. You can elastically scale your security needs to meet them, while reducing IT costs. Collect data at cloud scale - across all users, devices and applications, on-premises or in multiple clouds. Using Microsoft's unparalleled threat intelligence and analytics, detect previously discovered threats and reduce false positives. Microsoft's decades of cybersecurity experience allows you to investigate threats and track suspicious activities on a large scale.
  • 3
    ActivTrak Reviews

    ActivTrak

    Birch Grove Software

    $10/user/month billed annually
    5 Ratings
    ActivTrak is a cloud-native workforce intelligence platform that transforms work activity data into actionable insights for employee monitoring, productivity and performance management, and workforce planning capabilities that deliver measurable ROI. Deployment is quick and easy — start collecting data in minutes.
  • 4
    CyCognito Reviews

    CyCognito

    CyCognito

    $11/asset/month
    Using nation-state-grade technology, uncover all security holes in your organization. CyCognito's Global Bot Network uses an attacker-like reconnaissance technique to scan, discover, and fingerprint billions digital assets around the globe. No configuration or input required. Discover the unknown. The Discovery Engine uses graph data modelling to map your entire attack surface. The Discovery Engine gives you a clear view on every asset an attacker could reach, their relationship to your business, and what they are. The CyCognito risk-detection algorithms allow the attack simulator to identify risks per asset and find potential attack vectors. It does not affect business operations and doesn't require configuration or whitelisting. CyCognito scores each threat based on its attractiveness to attackers, and the impact on the business. This dramatically reduces the number of attack vectors organizations may be exposed to to just a few.
  • 5
    Resolver Reviews

    Resolver

    Resolver

    $10,000/year
    Over 1,000 organizations worldwide depend on Resolver’s security, risk and compliance software. From healthcare and hospitals to academic institutions, and critical infrastructure organizations including airports, utilities, manufacturers, hospitality, technology, financial services and retail. For security and risk leaders who are looking for a new way to manage incidents and risks, Resolver will help you move from incidents to insights.
  • 6
    HivePro Uni5 Reviews
    Uni5 elevates traditional vulnerability to holistic threat management by identifying and analyzing your enterprise's most likely cyber threats. It then strengthens your weakest controls and eliminates the vulnerabilities that are critical to reducing your enterprise risks. To minimize your threat exposure and outmaneuver cybercriminals, enterprises must know their terrain and the attacker's point of view. HiveUni5 provides wide asset visibility and actionable threat and vulnerability intelligence. It also offers security controls testing, patches management, and cross-functional collaboration within the platform. Close the loop in risk management by using auto-generated tactical, operational and strategic reports. HivePro Uni5 comes with over 27 popular asset management, ITSM and vulnerability scanners.
  • Previous
  • You're on page 1
  • Next