Threat Intelligence Software
We have recommendations for a wide range of software to increase productivity!
Download Threat Intelligence Software List
Popular Threat Intelligence Software
Filters
Industry
Provider Size
Price
Sort by:
Google Cloud
Google Cloud provides a dependable solution that addresses challenges faced by multiple industries. It facilitates secure storage, analytical data integration, and robust digital options. Google Cloud Platform (GCP) is slightly complex, but once you acquire expertise, it transforms into a highly user-friendly resource.
Cloudflare
Cloudflare software provides comprehensive protection against threats, including DDoS attacks, data breaches, and malicious bots. It ensures your website stays online, secure, and fast. While some may find the setup complex, its robust security features make it a valuable choice for safeguarding online assets.
Onehub
Onehub facilitates secure document sharing and collaboration with strong encryption and controlled access. While users value its ease of use, some find the advanced features limited. Nonetheless, its straightforward security features make it an excellent choice for businesses focused on reliable and simple data protection.
Hoxhunt
Hoxhunt software delivers tailored phishing simulations and cyber security training to strengthen your organization's defense against online threats. While its targeted approach enhances user engagement, some might need more time to finish the initial setup. Nevertheless, its focus on real-world scenarios makes it a valuable tool for improving cybersecurity awareness
SafeDNS
SafeDNS cyber security software protects data from online threats with AI-powered DNS filtering, enhancing network security. While occasionally blocking safe sites, its content filtering ensures a seamless user experience by keeping malicious content at bay despite the challenge of distinguishing safe sites.
Symantec Enterprise Cloud
Symantec Enterprise Cloud is a powerful cybersecurity software that is designed to protect your enterprise information. While it offers strong defenses against evolving threats, it requires training to fully utilize all features. Nevertheless, it ensures the safety of critical data while maintaining compliance.
Beagle Security
Beagle Security offers an in-depth solution for thoroughly securing web applications and APIs while guaranteeing compliance. Although tests may require significant running time, ranging from a few hours to several days, this approach grants visibility to efficiently manage security risks across enterprise applications and APIs.
ConnectWise SIEM
ConnectWise SIEM software offers robust security monitoring, enabling IT teams to detect and respond to threats in real-time. Although its advanced features can make setup complex for smaller businesses, its comprehensive capabilities provide strong security management, making it a solid choice for organizations in need of thorough protection.
Orca Security
The Orca Cloud Security platform integrates seamlessly with your cloud setup, providing full protection against various risks, such as misconfigurations, vulnerabilities, identity threats, data security issues, API exposures, and advanced cyber threats. Although the user interface can be challenging, Orca offers quick insights into your cloud infrastructure.
Webroot Business Endpoint Protection
Webroot Business Endpoint Protection is a powerful tool for endpoint protection. It provides defense against cyber threats through the threat intelligence feature and programmed software updates. While some users perceive the system as slightly inflexible in blocking desired websites, its strength lies in its commitment to defending against cyber traps.
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud simplifies protection with automated machine detection and remote agent setup. It eases administrative duties through centralized, group, and multi-tenant management tools and secures built-in remote connections for support. Although periodic updates may occasionally require reconfiguration, users laud these updates as they consistently lead to optimized functionalities.
Perimeter 81
Perimeter 81 offers seamless network security, which is ideal for remote workforces. While larger organizations might need advanced configuration, its setup is user-friendly. Moreover, its robust security features help safeguard distributed teams. Several integrations, compliances, and frameworks in Perimeter 81 are another considerable edge for its users.
GeeTest CAPTCHA
GeeTest CAPTCHA offers verification technology to detect the presence of an authorized user accessing content on both web and mobile applications, preventing spam and bot intrusions. While documentation can be challenging to grasp at times, it serves as a valuable tool for filtering traffic and enhancing application security.
Usecure
Usecure software is a comprehensive solution that aids businesses in evaluating and reducing human cyber risk without compromising security for productivity. While users handling multiple brands desire to manage various systems simultaneously, the solution remains adaptable, meeting the unique requirements of its users.
IPinfo
IPinfo provides real-time IP address data to enhance cyber security measures, offering insights into location, ownership, and potential threats. While its depth of information is invaluable, some users may find the interface complex. However, its accuracy and reliability make it a powerful tool for securing networks.
WP Cerber Security
WP Cerber Security software effectively protects WordPress sites from hacking attempts, malware, and spam with features like detailed logging, IP blocking, and bot detection. Although the initial setup can be somewhat complex, its extensive capabilities and robust security controls make it a dependable choice for securing your website.
Ncontracts
Ncontracts is an integrated risk management and compliance software. It serves over 4,000 financial institutions, mortgage firms, and fintech companies. While users indicate a need for its mobile app, the unrestricted portal capabilities and seamless features enhance overall functionality. Moreover, Ncontracts enable higher efficiency rates across departments with improved cost-saving.
AVG Antivirus Business Edition
AVG Antivirus Business Edition offers immediate protection against cyber threats, empowering users to browse, shop online, bank, download files, chat, and email freely and securely. Despite the scanning process taking time to detect viruses, the system excels at warding off viruses and unnecessary potential threats.
Avast Small Office Protection
Avast Small Office Protection offers a comprehensive online security package to safeguard small offices from threats like phishing and ransomware. While it sometimes flags safe files, its dependable protection benefits users across multiple devices.
Malwarebytes for Business
Malwarebytes for Business utilizes advanced technology to promptly detect and prevent emerging threats, providing robust security that surpasses the capabilities of other software. While some users perceive it as slightly expensive, they generally believe its features adequately justify the cost.
Mailock
Mailock automates secure email delivery for diverse customer communications, eliminating email interception and fraud risks while reducing human errors. While clients seek long-term message storage for future reference, Mailock is a secure email solution that ensures compliance with data protection laws.
Access Server
Access Server software provides secure remote access to internal networks, making it easier for teams to connect from anywhere. While its setup might require technical knowledge, it excels in reliability and security. Moreover, many users find its robust features worth the initial learning effort for enhanced remote connectivity.
Web.com Software
Web.com software is a prominent web development solutions provider, offering extensive features to build and manage a site. From design services to SEO and store management, it is a one-stop solution. Despite an initial learning curve, Web.com software helps small businesses digitally launch, market, and grow their stores.
Blackpoint MDR
Blackpoint Cyber is a real-time Managed Detection and Response (MDR) technology that terminates breaches by recognizing threats early. Blackpoint users desire to receive alerts when their reports are ready, but overall, they find it to be an effective solution for handling their cyber security issues.
BrowseControl
BrowseControl allows organizations to manage and restrict internet access across networks, offering precise control over what users can access. While effective for enforcing security and productivity, it may require initial setup time. Overall, it's a solid tool for companies needing strict internet usage policies.
Popular Threat Intelligence Software
Filters
Sort by: