Apps with 'threat intelligence' feature Page 2 of 2

All apps in Apps with 'threat intelligence' feature category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. SureLog icon
     Like

    ANET SureLog SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Windows
    SureLog screenshot 1
    SureLog screenshot 1
    SureLog screenshot 2
    +5
    SureLog screenshot 3
    17 alternatives
  2. MonitorLive icon
     1 like

    Measure your Website Performance for free. Track your metrics and get instant alerts with tips to increase your Online Reputation score. Your Online Reputation matters

    Cost / License

    • Free Personal
    • Proprietary

    Platforms

    • Online
  3. msX Guard icon
     Like

    msX Guard is a global, publicly accessible database of dangerous and unsafe domains, developed by Ixavence Bagart. It helps developers, browsers, and search engines detect and block phishing, malware, and scam websites before users interact with them.

    Cost / License

    • Free
    • Proprietary

    Platforms

    • Online
    msX Guard Website
    msX Guard Report
    JSON API
    +2
    JSON File
    1 alternatives
  4. Timesketch is an open-source tool for collaborative forensic timeline analysis. Using sketches you and your collaborators can easily organize your timelines and analyze them all at the same time. Add meaning to your raw data with rich annotations, comments, tags and stars.

    Cost / License

    Platforms

    • Docker
    • Self-Hosted
    Timesketch screenshot 1
    Timesketch screenshot 1
    Timesketch screenshot 2
    +1
    Timesketch screenshot 3
    38 alternatives
  5. Free threat intelligence platform that aggregates 4000+ cybersecurity sources, clusters related articles, and delivers daily digests on APTs, ransomware, CVEs, and emerging threats.

    Cost / License

    • Free
    • Proprietary

    Platforms

    • Online
    ThreatCluster news feed - showing trending cyber security news from 4000+ sources. Duplicate articles are merged together into one unified ThreatCluster.
    An example Threat Cluster - showing multiple sources talking about the same topic, grouped together into one unified page. You are able to view what each source is saying directly from this page. On the right hand side you will see extracted 'entities' - keywords that appear in the articles, such as malware, CVEs, ransomware groups, APT groups (and 17 other types) intelligently extracted.
    The entities page - highlighting the different types of entities and IOCs that are automatically extracted from articles. This system used a mix of techniques to be able to identify and extract known, as well as new mentions of keywords such as new and emerging malware, ransomware, APT groups, and many more.
    +5
    An example entity page, which generates an AI summary based on the articles mentioning this entity, a mentions over time to see how the entity is trending, and associated clusters and articles.
  6. At CheckMyCreds, we provide a platform that helps users quickly identify if their email credentials have been exposed in data breaches.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    Check My Creds screenshot 1
  7. The industry's leading privacy-oriented threat intelligence and file reputation solution. Available via AWS cloud, or locally hosted in your environment. Full support available for private network deployments.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Self-Hosted
    15 alternatives
  8. Lupovis provides precise, high-fidelity threat identification with a drastically reduced alert to noise ratio through a SaaS Decepetion as a Service platform.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Self-Hosted
    • Software as a Service (SaaS)
    SaaS platform
    6 alternatives
  9. Sysmon View: an off-line Sysmon log visualization tool. Sysmon View helps in tracking and visualizing Sysmon logs by logically grouping and correlating the various Sysmon events together, using existing events data, such as executables names, session GUIDs, event creation time...

    Cost / License

    • Free
    • Open Source

    Platforms

    • Windows
    Sysmon Tools screenshot 1
    Sysmon Tools screenshot 1
    Sysmon Tools screenshot 2
    +3
    Sysmon Tools screenshot 3
    2 alternatives
  10. CLEARPHISH INC, is a provider of Hyper-Realistic Phishing Simulations and Highly Impactful Cinematic Mode Cyber Awareness Training.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    ClearPhish | Precision Simulations
    ClearPhish Elevates Cyber Resiliency
    ClearPhish | Phishing Platform
    2 alternatives
  11. UTMStack icon
     Like

    Threat Detection and Response, SIEM and Compliance Solution powered by Threat Intelligence, AI, and Real-time correlation.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Mac
    • Windows
    • Linux
    • Self-Hosted
    • Software as a Service (SaaS)
    UTMStack screenshot 1
    UTMStack screenshot 1
    UTMStack screenshot 2
    4 alternatives
  12. FraudGuard.io provides cutting-edge APIs for IP reputation and threat intelligence, leveraging vast networks of honeypots and advanced analytics to deliver real-time, actionable insights. Our scalable platform helps businesses combat fraud, mitigate cyber risks, and stay ahead...

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    • Online
    Home Page
    API Docs
  13. OpenText™ Threat Intelligence (BrightCloud) is a powerful cybersecurity solution that harnesses the power of machine learning and massive data sets from millions of real-world endpoints, leveraging a global sensor network to detect emerging threats and vulnerabilities.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    • Online
    2 alternatives
  14. threatYeti is a search engine for domain and IP threat intelligence, provided by alphaMountain. threatYeti expedites threat investigations and incident response for cybersecurity analysts and threat researchers.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    10 alternatives
  15. Continuously identify vulnerabilities and simulate attack scenarios across your digital assets so you're always a step ahead.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    Asterisk.so screenshot 1
    8 alternatives
  16. With SmartIP you can enrich any IP address with geolocation data, ASN and hostname information, enforce GDPR compliance, assess potential risks and much more.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    18 alternatives
  17. Dark Web Monitoring for MSSP. Budget-friendly and technically advanced darknet threat intelligence solution. Real time alerts and automated reports.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
  18. Defused icon
     Like

    Defused provides plug-and-play capacities for internal detection of security incidents using decoys.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    Defused screenshot 1
    Defused screenshot 1
    Defused screenshot 2
    11 alternatives
  19. Cybersecurity company, offering interception of any content-based attack across collaboration channels including email, cloud storage, CRM apps, and messaging platforms. We prevent phishing, BEC, spam, malware, Zero-days, before it reaches users.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    Incident response scan details
    Incident response Analyzer
    Insights dashboard incident response
    +1
    Incident response scan list
  20. Traclea icon
     Like

    Traclea provides comprehensive real-time credential monitoring for both data breaches and infostealer malware. Unlike traditional breach checkers that only track corporate leaks, Traclea monitors 2,000+ breaches and 50+ active infostealer malware families (RedLine, Raccoon...

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    Traclea screenshot 1
    Traclea screenshot 1
    Traclea screenshot 2
    +7
    Traclea screenshot 3
    30 alternatives