---
description: Discover the best Threat Intelligence Platforms for your organisation. Compare top Threat Intelligence Platforms tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Best Threat Intelligence Platforms - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Threat Intelligence Platforms](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software)

# Threat Intelligence Platforms

Canonical: https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software

Page: 1 / 7\
Next: [Next page](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=2)

-----

## Products

1. [AlertMedia](https://www.softwareadvice.com.au/software/357409/alert-media) — 4.8/5 (151 reviews) — All-in-One Platform to Detect, Understand, and Respond to Risk AlertMedia is purpose-built to enable fast, confident ...
2. [Heimdal Threat-hunting & Action Center](https://www.softwareadvice.com.au/software/399929/heimdal-threat-hunting-and-action-center) (0 reviews) — The Heimdal Threat-Hunting and Action Center is threat intelligence solution that is designed to manage and respond t...
3. [ManageEngine Log360](https://www.softwareadvice.com.au/software/435342/manageengine-log360) — 4.7/5 (26 reviews) — Log360 is a SIEM or security analytics solution that helps you combat threats on premises, in the cloud, or in a hybr...
4. [Versa SASE](https://www.softwareadvice.com.au/software/421450/versa-sase) — 5.0/5 (1 reviews) — At Versa, our focus is to help simplify how you protect users, devices, sites and connect them to workloads \&amp; app...
5. [Malwarebytes for Business](https://www.softwareadvice.com.au/software/354549/malwarebytes-for-business) — 4.7/5 (2512 reviews) — Malwarebytes for Business is a cloud-based cybersecurity suite comprising Malwarebytes Endpoint Protection and Malwar...
6. [Trellix Endpoint Security](https://www.softwareadvice.com.au/software/166867/mcafee-endpoint-security) — 4.2/5 (1804 reviews) — McAfee Endpoint Protection Essential is a multi-featured security suite, designed for small and midsize businesses (S...
7. [NordVPN](https://www.softwareadvice.com.au/software/39151/nordvpn) — 4.6/5 (1391 reviews) — NordVPN is a computer security software designed to help businesses encrypt internet connectivity to securely access ...
8. [ESET Endpoint Security](https://www.softwareadvice.com.au/software/134149/eset-endpoint-security) — 4.7/5 (1169 reviews) — ESET Endpoint Security software offers robust cybersecurity solutions for organizations with 250+ employees. This ver...
9. [Avast Ultimate Business Security](https://www.softwareadvice.com.au/software/126514/avast-endpoint-protection-suite) — 4.4/5 (932 reviews) — Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows server...
10. [Keeper Security](https://www.softwareadvice.com.au/software/372934/keeper-password-manager) — 4.7/5 (505 reviews) — Keeper is a cloud-based business security solution that offers multi-tenant password management and secure file stora...
11. [TunnelBear](https://www.softwareadvice.com.au/software/157423/tunnelbear) — 4.5/5 (470 reviews) — TunnelBear is a virtual private network (VPN) software that allows companies to protect corporate data by providing a...
12. [Datadog](https://www.softwareadvice.com.au/software/101405/datadog) — 4.6/5 (357 reviews) — Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers an...
13. [WebTitan](https://www.softwareadvice.com.au/software/159217/webtitan) — 4.5/5 (276 reviews) — WebTitan is a cloud-based internet security solution that monitors for viruses, ransomware, malware and more. It also...
14. [Bitdefender GravityZone](https://www.softwareadvice.com.au/software/121681/bitdefender) — 4.6/5 (222 reviews) — Bitdefender GravityZone is a cloud-based solution that helps businesses protect physical workstations against various...
15. [OpenText Core Endpoint Protection​](https://www.softwareadvice.com.au/software/414862/webroot-business-endpoint-protection) — 4.5/5 (216 reviews) — OpenText™ Core Endpoint Protection is a cloud-based endpoint security solution that helps small to large enterprises ...
16. [Netwrix Auditor](https://www.softwareadvice.com.au/software/142030/netwrix-auditor) — 4.5/5 (212 reviews) — Netwrix Auditor is a security solution that helps organizations overcome compliance and operational challenges. Netwr...
17. [ACMP Suite](https://www.softwareadvice.com.au/software/449775/ACMP-Inventory) — 4.5/5 (173 reviews) — ACMP Suite is a modular client management solution. It takes a comprehensive approach to address the daily challenges...
18. [Symantec Email Security.cloud](https://www.softwareadvice.com.au/software/92308/symantec-email-security-cloud) — 4.5/5 (159 reviews) — Email Security.cloud is a cloud-based solution designed to help businesses prevent email and malware threats across b...
19. [Automox](https://www.softwareadvice.com.au/software/144031/automox) — 4.7/5 (152 reviews) — Automox is the Autonomous Endpoint Management platform built for autonomous from day one. Policy-driven, human-contro...
20. [SentinelOne](https://www.softwareadvice.com.au/software/363019/sentinelone) — 4.8/5 (109 reviews) — Designed with Fortune 500 and Global 2000 companies in mind, SentinelOne is a leading autonomous cybersecurity platfo...
21. [GoodAccess](https://www.softwareadvice.com.au/software/186523/goodaccess) — 4.9/5 (103 reviews) — GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Tru...
22. [Teramind](https://www.softwareadvice.com.au/software/156340/teramind) — 4.7/5 (92 reviews) — Teramind offers employee monitoring, insider threat detection, and data loss prevention (DLP) solutions. Teramind UAM...
23. [DNSFilter](https://www.softwareadvice.com.au/software/241689/dnsfilter) — 4.7/5 (86 reviews) — DNSFilter is a cloud-based cybersecurity software that helps businesses leverage AI technology and DNS protection to ...
24. [Perimeter 81](https://www.softwareadvice.com.au/software/230245/perimeter-81) — 4.8/5 (80 reviews) — Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use...
25. [Resolver](https://www.softwareadvice.com.au/software/136393/vendor-risk-management) — 4.4/5 (79 reviews) — Resolver’s risk management software is a cloud-based solution for midsize to larger enterprises that serves customers...

-----

Page: 1 / 7\
Next: [Next page](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=2)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.com.au/directory/4329/cloud-security/software)
- [Endpoint Protection Software](https://www.softwareadvice.com.au/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.com.au/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.com.au/directory/4170/network-security/software)
- [Risk Management Software](https://www.softwareadvice.com.au/directory/4423/risk-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software)
- [All Categories](https://www.softwareadvice.com.au/directory)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/directory/3995/threat-intelligence/software> |
| en | <https://www.softwareadvice.com/security/threat-intelligence-comparison/> |
| en-AU | <https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software> |
| en-GB | <https://www.softwareadvice.co.uk/directory/3995/threat-intelligence/software> |
| en-IE | <https://www.softwareadvice.ie/directory/3995/threat-intelligence/software> |
| en-NZ | <https://www.softwareadvice.co.nz/directory/3995/threat-intelligence/software> |
| fr | <https://www.softwareadvice.fr/directory/3995/threat-intelligence/software> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Software Advice helps businesses in Australia find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.com.au","url":"https://www.softwareadvice.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.com.au/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Australia","url":"https://www.softwareadvice.com.au/","@type":"WebSite","@id":"https://www.softwareadvice.com.au/#website","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Threat Intelligence Platforms","description":"Discover the best Threat Intelligence Platforms for your organisation. Compare top Threat Intelligence Platforms tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software","about":{"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software#webpage","mainEntity":{"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.com.au/#website"},"inLanguage":"en-AU","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Threat Intelligence Platforms","position":2,"item":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software","@type":"ListItem"}],"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Best Threat Intelligence Platforms - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"AlertMedia","position":1,"description":"All-in-One Platform to Detect, Understand, and Respond to Risk  \n\nAlertMedia is purpose-built to enable fast, confident decision-making when people, operations, and brand are on the line. The leading Risk Intelligence and Response platform, AlertMedia combines real-time threat intelligence with emergency communication and response workflows—so teams quickly understand what’s happening, who’s impacted, and what to do next.  \n\nOrganizations in more than 150 countries—from small businesses to the Fortune 500, including DHL, JetBlue, Coca-Cola Bottling, and Walmart—rely on AlertMedia for enterprise-grade reliability and flexibility without the complexity that slows teams down during real incidents. \n\nThe AlertMedia Difference:\n\nDeeper, Actionable Risk Intelligence\n\n> Early signals from online activity and OSINT, combined with analyst-verified intelligence, help teams detect emerging threats early, cut through noise, and act with confidence.  \n\nFast, Globally Reliable Emergency Communication\n\n> High-throughput, multichannel delivery with two-way messaging and simple workflows—so messages go out in seconds at any scale. \n\nConnected Workflows From Detection to Resolution\n\n> Intelligence, people data, and response actions come together in one system—reducing clicks, improving alignment, and accelerating response. \n\nBuilt for Rapid Adoption and Execution\n\n> Intuitive workflows and minimal training drive broader admin adoption—eliminating bottlenecks and enabling teams to scale processes with confidence. \n\nScales with Program Maturity\n\n> Expand risk monitoring and response capabilities as needs grow—without adding tools, headcount, or operational complexity. \n\nImplementation & Support\n\n> Streamline onboarding and change management with dedicated support and get answers fast with 24/7 responsiveness from a live team.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ad0bf633-7a07-4365-a9c9-e55b11eaa6d4.png","url":"https://www.softwareadvice.com.au/software/357409/alert-media","@type":"ListItem"},{"name":"Heimdal Threat-hunting & Action Center","position":2,"description":"The Heimdal Threat-Hunting and Action Center is threat intelligence solution that is designed to manage and respond to cyber threats. It offers real-time visibility across the entire digital landscape, helping security teams stay vigilant and eliminate the possibility of threats slipping past undetected. With pre-computed risk scores, indicators, and detailed attack analysis, security teams can swiftly zone in on threats using built-in knowledge base and forensics analytics.\n\nThe platform brings a re-imagined SecOps toolkit under one roof, providing security teams with a comprehensive view of their IT landscape and enabling them to make quick decisions on the fly. The action center allows for one-click remediation, empowering security professionals to respond to threats with confidence. It also offers detailed information to further investigate incidents and threats.\n\nFor SecOps and IT professionals, it provides a single pane of glass for intelligence, hunting, and response, eliminating alert fatigue and manual investigations. Security leaders can bring security health to the boardroom with one dashboard, pre-compute risks, address security and skills gaps, and minimize organizational risk and maintain compliance. Managed security providers can manage multiple customers globally without efficiency or resource drainage, protect at-risk customers without delay, and resolve issues using actionable controls.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fdee4377-1380-43e0-9b9b-2fda8d5855e3.png","url":"https://www.softwareadvice.com.au/software/399929/heimdal-threat-hunting-and-action-center","@type":"ListItem"},{"name":"ManageEngine Log360","position":3,"description":"Log360 is a SIEM or security analytics solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. It also helps organizations adhere to compliance mandates such as PCI DSS, HIPAA, GDPR and more. You can customize the solution to cater to your unique use cases and protect your sensitive data.\n\nWith Log360, you can monitor and audit activities that occur in your Active Directory, network devices, employee workstations, file servers, databases, Microsoft 365 environment, cloud services and more. Log360 correlates log data from different devices to detect complex attack patterns and advanced persistent threats. The solution also comes with a machine learning based behavioral analytics that detects user and entity behavior anomalies, and couples them with a risk score. The security analytics are presented in the form of more than 1000 pre-defined, actionable reports. Log forensics can be performed to get to the root cause of a security challenge.\n\nThe built-in incident management system allows you to automate the remediation response with intelligent workflows and integrations with popular ticketing tools.\n\nThe solution can be installed on-premises and is also available on the cloud as Log360 Cloud.  Support is offered via phone, email and other online resources.\n\nFeatures include:\n- Identify malicious communications with blacklisted IPs, URLs, and domains by corroborating data from threat intelligence services.\n- Monitor widely-used public cloud platforms, including Amazon Web Services (AWS), Microsoft Azure, and Salesforce.\n-  Monitor file and folder creation, deletion, modification, and permission changes in Windows file servers, NetApp file servers, EMC file servers, Linux and more.\n- Monitor and audit critical Active Directory changes in real time.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/da71bee5-cb9b-4189-af5f-2d22ba015486.png","url":"https://www.softwareadvice.com.au/software/435342/manageengine-log360","@type":"ListItem"},{"name":"Versa SASE","position":4,"description":"At Versa, our focus is to help simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.\n\nProtect – Every asset (device, user, site, workload) in the organization.\n\nConnect – Effortlessly and provide the best user/device-to-app experience.\n\nSimplify – With one unified platform, unified policy, unified data lake and unified console.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b306a716-d3f6-4c53-a85e-1eb65bfb3b4d.png","url":"https://www.softwareadvice.com.au/software/421450/versa-sase","@type":"ListItem"},{"name":"Malwarebytes for Business","position":5,"description":"Malwarebytes for Business is a cloud-based cybersecurity suite comprising Malwarebytes Endpoint Protection and Malwarebytes Endpoint Detection and Response. The platform provides  enterprise-class threat detection, isolation, and remediation - driven from the cloud and easy to use for organizations of all sizes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/94bacb01-a894-4d16-ab69-b244f690eb63.png","url":"https://www.softwareadvice.com.au/software/354549/malwarebytes-for-business","@type":"ListItem"},{"name":"Trellix Endpoint Security","position":6,"description":"McAfee Endpoint Protection Essential is a multi-featured security suite, designed for small and midsize businesses (SMBs).\n\n\nThe solution offers businesses with a wide array of functionality. A firewall helps keep hackers out of company networks, while anti-malware protection, device control and Web security all defend against multiple security threats.\n\n\nMcAfee Endpoint Protection Essential also features an access protection tool that, in the event of a cyber attack, restricts access to folders designated as \"confidential.\"\n\n\nIt comes with a central control panel, available on-premise or in the cloud, which enables a single administrator to manage and monitor the company network, making sure company security is up-to-date.\n\n\nMcAfee, a subsidiary of Intel, has clients ranging from government agencies to at-home users. Support is available via phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2b255f73-d8ec-43d5-990e-26c7334a1455.jpeg","url":"https://www.softwareadvice.com.au/software/166867/mcafee-endpoint-security","@type":"ListItem"},{"name":"NordVPN","position":7,"description":"NordVPN is a computer security software designed to help businesses encrypt internet connectivity to securely access personal information using a virtual private network. It offers a kill switch module, which allows administrators to protect online data in real time.\n\nManagers can hide IP addresses to secure online identity, browsing history, and other online activities while using public Wi-Fi. NordVPN enables teams to protect systems against phishing scams, malware content, and distributed denial-of-service (DDoS) attacks. Additionally, operators can utilize the onion over VPN feature to secure devices against untrustworthy internet service providers (ISPs) and third-party breaches in accordance with the no-logs policy.\n\nNordVPN provides split tunneling functionality, letting businesses protect specific applications and programs while sharing files. Pricing is based on monthly and annual subscriptions and support is extended via email, FAQs, chatbot, and video tutorials.\n\nUpgrade your security level with NordVPN's add-ons:\n- use NordPass to protect your passwords, credit cards, and other sensitive data\n- get NordLocker to keep your data in encrypted cloud storage\n- enable Incogni to remove your personal information from third-parties databases.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/89142a33-e9c6-47a8-ab7a-dabf56005343.png","url":"https://www.softwareadvice.com.au/software/39151/nordvpn","@type":"ListItem"},{"name":"ESET Endpoint Security","position":8,"description":"ESET Endpoint Security software offers robust cybersecurity solutions for organizations with 250+ employees. This versatile application, available both as a cloud-based and on-premises solution, provides comprehensive internet security and malware protection. Trusted by businesses worldwide, ESET leverages advanced cloud sandbox technology to safeguard mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. Key features include file, bot, and mail protection, remote device management, virtualization security, firewall configuration, and web control.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1b5a4629-d4eb-49f6-966e-66b8bfe234da.jpeg","url":"https://www.softwareadvice.com.au/software/134149/eset-endpoint-security","@type":"ListItem"},{"name":"Avast Ultimate Business Security","position":9,"description":"Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Our robust, easy-to-use security for devices, data, and applications is designed to keep small organizations and their employees safer online. Avast antivirus with multiple layers of security, online privacy, and remote-control features provides powerful cybersecurity controlled via a cloud-based management console. \n\nAvast Ultimate Business Security is a comprehensive cybersecurity and patch automation for growing businesses  .\n\nAvast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure. \n\n\n[Remote Management]  \nAs your business grows, so will your security needs. With our online management platform, you can control your devices, Avast security services, and their subscriptions from one place - anytime, anywhere.   \n\n[Device Protection] \nComputers and servers are key entry points to business data. Fortify the security of your devices against online and offline threats such as malware infections, resulting slowdowns, and misuse. Get more peace of mind with Avast next-gen antivirus, backed by six protection shields, an AI-powered threat detection network, and USB protection. \n\n[Data Protection]  \nKeep your business and customer data safer from breaches, encryption, and downtime with a firewall and multiple protective shields. Plus, our layered security extends to USB devices to help prevent sensitive data theft and leakage. \n\n[Online Security and Privacy]  \nYou never know which Wi-Fi networks and websites your field employees might jump on. Help keep their online activities safer and private within secure web browsing boundaries, so they can stay productive and worry less when working from anywhere. \n\n[Patch Management]  \nCybercriminals exploit unpatched vulnerabilities in operating systems and commonly used applications (Java, Adobe, Google Chrome, Zoom, etc.) through targeted attacks. With Patch Management, you can automatically address vulnerabilities on your Windows systems and third-party applications to help keep your business safer online.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/733c16e6-6e48-4137-9fbd-a3b1042fbc7a.jpeg","url":"https://www.softwareadvice.com.au/software/126514/avast-endpoint-protection-suite","@type":"ListItem"},{"name":"Keeper Security","position":10,"description":"Keeper is a cloud-based business security solution that offers multi-tenant password management and secure file storage. It offers a \"zero-knowledge\" security feature, which allows users only with access to the information being stored on the device and in the Keeper cloud security vault. The solution synchronizes with multiple devices and can be used by multiple users. It allows users to create high-strength random passwords. Users can make password policies and monitor password compliance with Keeper's dashboards, reporting, auditing and notifications.\n\n\nKeeper provides mobile security and data loss prevention and is compatible with desktop computers and mobile devices. Key features include an IT admin console with password security enforcement, user provisioning, delegated administration and active directory integration.\n\n\nThe solution uses 256-bit AES encryption, PBKDF2 key generation, perfect forward secrecy and two-factor authentication. The platform works with businesses of all sizes to integrate security, privacy and internal controls. Pricing is both per month and per year.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f21ce009-05eb-4779-840b-aab7d2d73c79.jpeg","url":"https://www.softwareadvice.com.au/software/372934/keeper-password-manager","@type":"ListItem"},{"name":"TunnelBear","position":11,"description":"TunnelBear is a virtual private network (VPN) software that allows companies to protect corporate data by providing an extra layer of security to online browsing. The solution enables users to access censored or blocked websites by opting to access it using other browsing locations from across the globe.\n\n\nThe cloud-based software permits administrators to utilize the TunnelBear’s administration console to access information including user details, billing, and invoicing history. With TunnelBear, developers can receive security alerts for insecure public networks and automatically connect to closest servers via the fastest tunnel functionality. Additionally, it is available as an application for all Windows, Mac, iOS, and Android devices and authorizes businesses to secure multiple devices at the same time.\n\n\nThe pricing of the product is available on a monthly basis and support is extended via FAQs and online documentation. It also offers announcements and suggestions regarding updates in newly launched applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7717b66c-ab15-44a6-b7fc-f84992c67feb.png","url":"https://www.softwareadvice.com.au/software/157423/tunnelbear","@type":"ListItem"},{"name":"Datadog","position":12,"description":"Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. \n\nDatadog's SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack.\n\nDatadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/680c6e55-5ae3-4b54-8408-36deb18d3660.png","url":"https://www.softwareadvice.com.au/software/101405/datadog","@type":"ListItem"},{"name":"WebTitan","position":13,"description":"WebTitan is a cloud-based internet security solution that monitors for viruses, ransomware, malware and more. It also provides web and DNS filtering control and is suitable for large and midsize businesses across all industries.\n\n\nKey features include content filtering, which includes bring your own device (BYOD) web filtering for employees’ personal mobile devices. The solution supports the implementation of different policies for different environments, which allows users to enable customized filter outcomes. Reporting, website whitelists and blacklists, configurable content filtering and support for multiple locations are also available.\n\n\nWebTitan offers various deployment options, including deployments for wifi providers, a cloud-based content filter for hotspot network guests, and industry-based content filters that can be deployed in the cloud or on-premise.\n\n\nTitan offers services on an annual subscription basis that includes support via phone, email and an online help desk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ec785bf4-940f-4c19-a58c-b7cfaaa1ae95.png","url":"https://www.softwareadvice.com.au/software/159217/webtitan","@type":"ListItem"},{"name":"Bitdefender GravityZone","position":14,"description":"Bitdefender GravityZone is a cloud-based solution that helps businesses protect physical workstations against various cyber threats including data breaches, ransomware, phishing and more. Key features include patch management, mobile support, antivirus protection, and native device encryption.\n\n\nUsing anti-malware and anti-spam capabilities, teams can manage the security of Microsoft Exchange mail servers through Control Center console. Bitdefender GravityZone allows users to ensure regulatory compliance by providing safety of mobile devices across multiple locations, reducing IT intervention for resolving security threats. Additionally, integration with Splunk Enterprise and Splunk Cloud enables enterprises to monitor logs and events for generating reports using graphical layout.\n\n\nBitdefender GravityZone provides data protection of the entire endpoint hard drive on the basis of suitable encryption mechanisms. Pricing is available on request and support is extended via documentation, phone, chat and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/68ced21d-44c9-4c09-a05a-93730b2e9335.png","url":"https://www.softwareadvice.com.au/software/121681/bitdefender","@type":"ListItem"},{"name":"OpenText Core Endpoint Protection​","position":15,"description":"OpenText™ Core Endpoint Protection is a cloud-based endpoint security solution that helps small to large enterprises perform antivirus scans and prevent cyber threats across networks. It comes with an admin console, which enables users to configure system settings, grant access permissions, view data charts and generate reports on potential malware threats.\n\n\nOpenText™ Core Endpoint Protection allows businesses to sort data in tabular formats and change the order of data points in columns as ascending/descending. It provides users with a centralized dashboard to gain insights into device status using charts, improving business operations. Additionally, managers can create user profiles with credentials, view scan history and restore quarantined files.\n\nOpenText™ Core Endpoint Protection enables enterprises to reassign endpoints and apply security policies to multiple groups on the platform. Pricing is available on annual subscriptions and support is extended via email, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a89b4977-1d9c-41f0-801a-1754d22567c0.png","url":"https://www.softwareadvice.com.au/software/414862/webroot-business-endpoint-protection","@type":"ListItem"},{"name":"Netwrix Auditor","position":16,"description":"Netwrix Auditor is a security solution that helps organizations overcome compliance and operational challenges. Netwrix solutions empower you with total control over what's going on in your hybrid IT environment by delivering actionable intelligence about changes, access, and configurations. Netwrix solutions empower you to minimize risk and detect threats in a timely manner to prevent data breaches, as well as demonstrate compliance with GDPR, PCI DSS, HIPAA, SOX, GLBA, FISMA, NIST, FERPA, CJIS, NERC CIP, ISO/IEC 27001, and other security standards.\n\n\nThe solution can be deployed either in the cloud or on-premise. Support is provided via a knowledge base, customer portal, email, and phone. Netwrix has a subscription licensing model. Most applications are licensed per user.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/aa9469ea-1d2c-4fc5-a0da-56d5cf1273d3.png","url":"https://www.softwareadvice.com.au/software/142030/netwrix-auditor","@type":"ListItem"},{"name":"ACMP Suite","position":17,"description":"ACMP Suite is a modular client management solution. It takes a comprehensive approach to address the daily challenges faced by IT departments. The platform is designed for organizations of all sizes. ACMP Suite integrates various modules to provide a unified endpoint management solution. It caters to a wide range of industries, helping IT teams streamline their operations and improve efficiency.\n\nThe core of ACMP Suite is its modular design. This allows businesses to customize the solution to their specific needs. Key features include comprehensive inventory management, flexible asset tracking, and advanced software license management. ACMP Suite also automates routine tasks such as software distribution, patch management, and operating system deployment. This frees up IT staff to focus on strategic initiatives.\n\nThe platform places a strong emphasis on security and compliance. It includes integrated modules for Defender management, BitLocker encryption, and vulnerability assessment. ACMP Suite's reporting and analytics capabilities provide valuable insights into the IT infrastructure. This enables data-driven decision-making. The solution can manage a diverse range of devices, from PCs and laptops to mobile devices and servers. As a result, ACMP Suite is a versatile solution for organizations looking to optimize their client management processes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d13e7fe4-47c8-4daa-a812-161e4a934636.jpeg","url":"https://www.softwareadvice.com.au/software/449775/ACMP-Inventory","@type":"ListItem"},{"name":"Symantec Email Security.cloud","position":18,"description":"Email Security.cloud is a cloud-based solution designed to help businesses prevent email and malware threats across built-in on-premise and cloud systems. Key features include spam defense, link protection, impersonation control, behavior analysis and sandboxing.\n\n\nTeams using Email Security.cloud can gain visibility into targeted attack campaigns and malicious emails, determine an attack's severity, and orchestrate remedial responses by blacklisting as well containing attacks across the organization's security environment. The solution provides enterprises with security awareness and protection from numerous vulnerabilities for reducing business risks by recognizing phishing attacks. \n\n\nEmail Security.cloud uses built-in data loss protection (DLP) and policy-based encryption control tools for preventing data leakage and ensuring compliance with government regulations. The platform facilitates integration with various collaboration applications such as Box, Salesforce and Slack.\n\n\nPricing is available on monthly subscriptions and support is extended via documentation, phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1717d9f6-7c48-4180-972a-da5e5f422d73.png","url":"https://www.softwareadvice.com.au/software/92308/symantec-email-security-cloud","@type":"ListItem"},{"name":"Automox","position":19,"description":"Automox is the Autonomous Endpoint Management platform built for autonomous from day one.\n\nPolicy-driven, human-controlled automation gives IT and security teams the speed, clarity, and control to reduce risk and move faster with confidence.\n\nAutomox unifies automation, visibility, protection, adaptability, and speed in a single, cloud-native platform – enabling teams to automate up to 96% more patches, shorten remediation time, and operate securely at scale across Windows, macOS, and Linux devices.\n\nThousands of organizations trust Automox to operationalize IT autonomy and secure millions of endpoints globally.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9e062bbe-8254-4db6-8749-0c06a1bc9b19.png","url":"https://www.softwareadvice.com.au/software/144031/automox","@type":"ListItem"},{"name":"SentinelOne","position":20,"description":"Designed with Fortune 500 and Global 2000 companies in mind, SentinelOne is a leading autonomous cybersecurity platform specializing in AI-powered endpoint protection. \n\nThe autonomous agent platform allows users to detect threats across multiple vectors and resolve system attacks. SentinelOne's endpoint detection and response (EDR) module automates mitigation of bugs/issues and ensure immunity against newly discovered threats. Additionally, the artificial intelligence (AI)-based solution performs recurring scans to detect various threats including malware, trojans, worms and more, preserving end-user productivity within the organization.\n\n\nSentinelOne allows integration with various third-party applications such as Tanium, Splunk, Okta, Fortinet and BigFix. The application can also be deployed in an on-premise environment. Pricing is available on annual subscription and support is extended via documentation, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dbe48f25-9e50-4c70-bc05-1f84a811f2df.png","url":"https://www.softwareadvice.com.au/software/363019/sentinelone","@type":"ListItem"},{"name":"GoodAccess","position":21,"description":"GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. \n\nBy leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment solution within hours or days, allowing companies to enhance their security without the need for in-house IT experts. \n\nOur platform ensures seamless integration with modern SaaS/cloud applications as well as legacy systems, protecting critical assets for remote and hybrid workforces. \n\nGoodAccess serves businesses with 50-5000 employees across diverse industries, particularly those adopting multi-cloud and SaaS environments.\n\nStart your 14-day full-featured free trial.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3f55a07d-b749-4b55-9def-de441bfbb8b2.png","url":"https://www.softwareadvice.com.au/software/186523/goodaccess","@type":"ListItem"},{"name":"Teramind","position":22,"description":"Teramind offers employee monitoring, insider threat detection, and data loss prevention (DLP) solutions. Teramind UAM monitors user activities on applications, websites, file systems, network, email, social media and more. Behavioral rules can be created to automatically warn, block, notify, lockout or take other actions when an anomaly is detected. Its session recording feature allows investigation of incidents with video and optional audio recordings of users' desktop.\n\n\nTeramind DLP comes with all the features available in Teramind UAM plus: automated data discovery and classification with built-in support for many sensitive data types for personal information, health and financial information (PII/PHI/PFI). Its optical character recognition (OCR) module can detect content in real-time even inside images and videos. With support for activities, scheduling, and content-based rules, the system is effective in preventing data leaks in a wide range of scenarios including conforming with regulations like GDPR, HIPAA, PCI DSS and more.     \n\n\nThe solution can either be hosted in the cloud, on-premise or private cloud such as Amazon Web Services (AWS) and Microsoft Azure.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/459e44be-5421-4bf0-a654-bdab53451701.png","url":"https://www.softwareadvice.com.au/software/156340/teramind","@type":"ListItem"},{"name":"DNSFilter","position":23,"description":"DNSFilter is a cloud-based cybersecurity software that helps businesses leverage AI technology and DNS protection to streamline threat detection and content filtering processes. Professionals can classify unknown websites into multiple categories and block malicious web content to prevent malware or ransomware activities. \n\nRoaming Client - Prevent access to unwanted and malicious content on all devices, on and off your network. Get credit for switching from Cisco Umbrella Roaming Client.\n\nDNS Filtering - Block threats at the DNS level and make internet browsing safer and faster.\n\nContent Filtering - Customize the content you'd like to block and allow with our machine-learning content filtering capabilities.\n\nFast & Easy Implementation - 53% of DNSFilter customers get up-and-running within 1 day. \n\nOur product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review.\n\nDNSFilter comes with a dashboard, which allows organizations to gain an overview of active sites, top domains, and other metrics on a centralized platform. Managers can block specific categories of content related to chat & instant messaging, social networking, adult content and more. Additionally, it lets users generate activity reports to monitor most active networks, total requests and queries per second.\n\nDNSFilter provides an API, which enables businesses to integrate the platform with various third-party applications. Pricing is available on monthly subscriptions and support is extended via phone, email and other online measures.\n\nWe're a U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6cdcad23-bf7e-4ced-9261-e52302787fcf.png","url":"https://www.softwareadvice.com.au/software/241689/dnsfilter","@type":"ListItem"},{"name":"Perimeter 81","position":24,"description":"Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use and unified network security stack. With a global network of PoPs, Perimeter 81 offers secure network capabilities managed over our multi-tenant cloud and highly scalable for organizations worldwide. \n\nWith Perimeter 81, you can easily move your resources to the cloud, manage team member access from anywhere and gain network visibility in an all-in-one cloud management portal. With features like Firewall as a Service, Device Posture Check, Web Filtering and more, you can secure and manage your network in just a few clicks. \n\nWhy Perimeter 81? \n\n* Features you can rely on: Perimeter 81 offers all the essential cybersecurity tools you need to protect your organization. With Zero Trust Network Access, Firewall as a Service, Device Posture Check, and many more features, Perimeter 81 allows remote and on-site users to access networks safely and securely. \n\n* Lightning-fast deployment: Say goodbye to hours of configuration and manal setup. With Perimeter 81, you can have your entire network deployed in minutes - it’s that simple. \n\n* Network monitoring at your fingertips: Having visibility into your network is key. With Perimeter 81, you can fully monitor and secure your organization’s most valuable resources from a single dashboard.\n \n* World class support: Our award-winning support team is always here for you. From the moment you set up your network, we’re happy to help with anything you need along the way. \n\nNetwork security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/41d17d81-f565-443e-9e31-69b45bab1835.png","url":"https://www.softwareadvice.com.au/software/230245/perimeter-81","@type":"ListItem"},{"name":"Resolver","position":25,"description":"Resolver’s risk management software is a cloud-based solution for midsize to larger enterprises that serves customers across a variety of industries and business needs. These industries include banking and financial services, healthcare and hospitals, insurance, academic institutions, critical infrastructure organizations, airports, oil and gas, utilities, manufacturers, pharmaceuticals, hospitality, high tech, government, retail, real estate and more.\n\nThe software enables users to manage their risk aversion and mitigation plans, budgets and forecasts all from a single solution. It assists in connecting risks to incidents, so that assessments of what could happen are linked to what did happen. With this connection, you can quantify the impact of your risk mitigation plans, identify where your risk register has gaps, and where risk assessments were overly confident. Users can create customized reports and make data-driven decisions with full visibility into their organization.\n\nResolver’s software is cloud-based and is supported on desktop, tablet and mobile devices. Key features include automated risk processes, custom trigger alerts, risk scoring, real-time continuous risk assessments, configurable drag-and-drop dashboards, ISO management, response management, internal controls management, ERM and ORM. It can be integrated with incident management, compliance, IT risk and compliance, vendor risk and internal audit applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/37060b08-f36e-41df-bdd0-beba7fce2b57.png","url":"https://www.softwareadvice.com.au/software/136393/vendor-risk-management","@type":"ListItem"}],"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software#itemlist","numberOfItems":25}
</script>
