---
description: Page 5 - Discover the best Threat Intelligence Platforms for your organisation. Compare top Threat Intelligence Platforms tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 5 - Best Threat Intelligence Platforms - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Threat Intelligence Platforms](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software) > [Page 5](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=5)

# Threat Intelligence Platforms

Canonical: https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software

Page: 5 / 7\
Prev: [Previous page](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=4)\
Next: [Next page](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=6)

-----

## Products

1. [Citrix Web Firewall](https://www.softwareadvice.com.au/software/395565/citrix-web-firewall) — 4.5/5 (2 reviews) — Citrix Web Application Firewall (WAF) is a cloud-based threat defense solution that can be deployed quickly and easil...
2. [Secureworks](https://www.softwareadvice.com.au/software/149167/secureworks) — 5.0/5 (2 reviews) — Secure Works is tech-enabled managed detection and response service provider that utilizes their in-house solution, R...
3. [Defense In Depth](https://www.softwareadvice.com.au/software/446369/cyber-security-risk-assessment) — 5.0/5 (2 reviews) — Defense In Depth is a cybersecurity solution designed to assist organizations in protecting their digital assets. It ...
4. [Feedly for Threat Intelligence](https://www.softwareadvice.com.au/software/449808/Feedly-for-Threat-Intelligence) — 5.0/5 (2 reviews) — Feedly for Threat Intelligence is a solution that helps security teams and threat intelligence analysts collect, anal...
5. [ThreatBolt](https://www.softwareadvice.com.au/software/522836/ThreatBolt) — 5.0/5 (2 reviews) — ThreatBolt is an intelligence-sharing platform designed for security operations centers (SOCs) and managed security s...
6. [Verimatrix XTD](https://www.softwareadvice.com.au/software/505980/Verimatrix-App-Shield) — 5.0/5 (2 reviews) — Verimatrix XTD is a mobile app security solution that provides multi-layered protection for Android and iOS applicati...
7. [MetricStream CyberGRC](https://www.softwareadvice.com.au/software/479967/MetricStream-IT-GRC-Solution) — 3.5/5 (2 reviews) — MetricStream's IT and cyber risk management solution equips organizations with the tools necessary to adopt a focused...
8. [Lacework](https://www.softwareadvice.com.au/software/78321/lacework) — 5.0/5 (1 reviews) — Lacework is a cloud-based platform that provides intrusion detection, compliance and automated threat defense for mul...
9. [Critical Insight](https://www.softwareadvice.com.au/software/98069/critical-insight-mdr) — 5.0/5 (1 reviews) — Critical Insight MDR provides managed detection and response (MDR) services to businesses, allowing them to identify ...
10. [CloudJacket MXDR](https://www.softwareadvice.com.au/software/183664/cloudjacketx) — 5.0/5 (1 reviews) — CloudJacket MDR delivers a fully unified security platform that combines SIEM, XDR, and NDR into one streamlined solu...
11. [CipherBox](https://www.softwareadvice.com.au/software/187537/cipher) — 5.0/5 (1 reviews) — CipherBox is a Managed Detection \&amp; Response solution that provides your company with protection from cyber threat...
12. [NetWitness](https://www.softwareadvice.com.au/software/141850/netwitness) — 5.0/5 (1 reviews) — RSA offers managed detection and response (MDR) services to organizations of all sizes, which helps them identify, mi...
13. [VMware Carbon Black Cloud](https://www.softwareadvice.com.au/software/432168/vmware-carbon-black-cloud) — 5.0/5 (1 reviews) — With VMware Carbon Black Cloud, users can efficiently secure the highest-performance applications running in the most...
14. [Network Detection and Response](https://www.softwareadvice.com.au/software/328455/network-detection-and-response) — 4.0/5 (1 reviews) — Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious acti...
15. [Flowmon ADS](https://www.softwareadvice.com.au/software/258509/flowmon-anomaly-detection-system) — 5.0/5 (1 reviews) — Flowmon Anomaly Detection System is a cyber security and network monitoring solution that provides real-time threat d...
16. [Cisco Secure Firewall](https://www.softwareadvice.com.au/software/415546/cisco-secure-firewall) — 4.0/5 (1 reviews) — Cisco Secure Firewall is a cloud-based firewall system that provides security across hybrid and multi-cloud environme...
17. [Emsisoft Business Security](https://www.softwareadvice.com.au/software/184009/emsisoft-business-security) — 4.0/5 (1 reviews) — Emsisoft Business Security is an endpoint security solution that helps businesses of all sizes prevent malware such a...
18. [Predictive](https://www.softwareadvice.com.au/software/439504/predictive) — 5.0/5 (1 reviews) — Predictive is a cloud-based application designed to fortify organizations against cyber threats, empowering them with...
19. [Netacea Bot Management](https://www.softwareadvice.com.au/software/354582/netacea) — 5.0/5 (1 reviews) — Netacea Bot Management is a bot attack protection solution for businesses. It uses machine learning to detect malicio...
20. [Wiz](https://www.softwareadvice.com.au/software/415533/wiz) — 5.0/5 (1 reviews) — Wiz enables organizations globally to rapidly identify and remove critical risks in cloud environments. Wiz secures e...
21. [Fidelis Elevate](https://www.softwareadvice.com.au/software/307619/fidelis-elevate) — 5.0/5 (1 reviews) — Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense...
22. [IBM Security MDR](https://www.softwareadvice.com.au/software/400905/ibm-security-mdr) (0 reviews) — IBM Security MDR is a managed detection and response service solution that helps IT professionals identify and mitiga...
23. [IntSights](https://www.softwareadvice.com.au/software/172744/intsights) (0 reviews) — IntSights is a cloud-based endpoint security suite designed to help businesses detect, manage and remediate threats a...
24. [Crowdsec](https://www.softwareadvice.com.au/software/267630/crowdsec) (0 reviews) — CrowdSec aims to provide a crowd-sourced approach to common infrastructure defense problems. It does so by distributi...
25. [NexVision Engine](https://www.softwareadvice.com.au/software/341957/nexvision-engine) (0 reviews) — NexVision is an AI-powered OSINT tool that automates data collection and processing to drive decision-making.  NexVis...

-----

Page: 5 / 7\
Prev: [Previous page](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=4)\
Next: [Next page](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=6)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.com.au/directory/4329/cloud-security/software)
- [Endpoint Protection Software](https://www.softwareadvice.com.au/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.com.au/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.com.au/directory/4170/network-security/software)
- [Risk Management Software](https://www.softwareadvice.com.au/directory/4423/risk-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software)
- [All Categories](https://www.softwareadvice.com.au/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Software Advice helps businesses in Australia find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.com.au","url":"https://www.softwareadvice.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.com.au/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Australia","url":"https://www.softwareadvice.com.au/","@id":"https://www.softwareadvice.com.au/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Threat Intelligence Platforms","description":"Page 5 - Discover the best Threat Intelligence Platforms for your organisation. Compare top Threat Intelligence Platforms tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=5","about":{"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=5#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=5#breadcrumblist"},"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=5#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.com.au/#website"},"inLanguage":"en-AU","mainEntity":{"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=5#itemlist"},"publisher":{"@id":"https://www.softwareadvice.com.au/#organization"}},{"@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=5#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Threat Intelligence Platforms","position":2,"item":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software","@type":"ListItem"},{"name":"Page 5","position":3,"item":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=5","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 5 - Best Threat Intelligence Platforms - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software?page=5#itemlist","@type":"ItemList","itemListElement":[{"name":"Citrix Web Firewall","position":1,"description":"Citrix Web Application Firewall (WAF) is a cloud-based threat defense solution that can be deployed quickly and easily at any scale, from a single website to thousands of applications. Web Application Firewall defends against OWASP vulnerabilities including Cross-Site Scripting (XSS), SQL Injection, and more by analyzing traffic in real time for malicious behavior. The on-demand delivery model allows users to deploy Citrix Application Firewall images quickly and easily while ensuring full compliance with HTTP RFCs\n\nBy applying only those security measures that are essential to specific apps and not bogging down application performance with extraneous security measures, Citrix Web Application Firewall enables rapid detection of threats while minimizing false positives.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/79032851-e20c-4443-bb59-70c3374c6bf2.png","url":"https://www.softwareadvice.com.au/software/395565/citrix-web-firewall","@type":"ListItem"},{"name":"Secureworks","position":2,"description":"Secure Works is tech-enabled managed detection and response service provider that utilizes their in-house solution, Red Cloak Threat Detection and Response (TDR), to help businesses detect adversaries across endpoints, networks and cloud environments. SecureWorks security analysts work 24/7 to provide threat intelligence to investigate, validate and contain threats.\n\n\nSecureWorks analysts to hunt for persistence mechanisms, threat actor tactics and anomalous user activities, network communications or application usage. SecureWORKS uses behavioral analytics to detect unknown threats including file-less malware, reducing futile responses. Additionally, the threat engagement manager provides periodic reviews and reports, improving security measures across the organization.\n\n\nSecureWorks lets businesses detect and respond to malicious activities across Amazon Web Services (AWS), Office 365 and Azure environments. Pricing is available on request and support is extended via phone, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/63541483-52a1-44b9-b461-3380e112465c.jpeg","url":"https://www.softwareadvice.com.au/software/149167/secureworks","@type":"ListItem"},{"name":"Defense In Depth","position":3,"description":"Defense In Depth is a cybersecurity solution designed to assist organizations in protecting their digital assets. It is particularly suitable for businesses handling sensitive data, such as healthcare providers, insurance companies, financial services, and IT service providers managing security for multiple clients. The primary goal is to help organizations safeguard their systems and data from online threats.\n\nThe platform offers resources for conducting cybersecurity risk assessments, either independently or with expert assistance. Key features encompass cybersecurity audits for evaluating system vulnerabilities, development of security policies and procedures, maintenance of a risk register for documenting threats, and comprehensive managed security services. Risk assessments focus on identifying potential weaknesses in hardware, software, networks, and employee practices. Audits ensure optimal performance of IT components, while policies set data protection standards. The risk register keeps track of identified risks and controls, and managed services offer continuous monitoring, threat detection, and response.\n\nDefense In Depth aims to provide accessible security for organizations of various sizes. The user-friendly interface simplifies the management of protection measures without requiring extensive training. The solution equips companies with the necessary tools and support to secure critical systems and sensitive data effectively.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6819b1e3-5b77-45a1-b554-48da81634a1d.jpeg","url":"https://www.softwareadvice.com.au/software/446369/cyber-security-risk-assessment","@type":"ListItem"},{"name":"Feedly for Threat Intelligence","position":4,"description":"Feedly for Threat Intelligence is a solution that helps security teams and threat intelligence analysts collect, analyze, and share cyber threat information. It features a toolkit of over 1,000 AI models that automatically process and enrich millions of articles and reports from trusted open web sources.\n\nUsers can leverage AI-powered Feeds to track critical vulnerabilities, threat actor behavior, and cyber attacks in real-time. The Insights feature extracts and structures data into STIX format to accelerate analysis. The Actions module synthesizes multiple articles into custom reports. Feedly also integrates with the MITRE ATT&CK framework to provide visibility into threat actor tactics, techniques, and procedures.\n\nThe product offers CVE Insights Cards that consolidate key vulnerability details. It has an Automated Newsletters function to generate and distribute daily cyber threat briefings. Users can share insights across their security ecosystem through integrations and the API.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/73ea4bc2-61b0-4f20-a205-5f2d819734c7.png","url":"https://www.softwareadvice.com.au/software/449808/Feedly-for-Threat-Intelligence","@type":"ListItem"},{"name":"ThreatBolt","position":5,"description":"ThreatBolt is an intelligence-sharing platform designed for security operations centers (SOCs) and managed security service providers (MSSPs). It uses advanced artificial intelligence and machine learning to help users analyze threats, providing real-time threat intelligence feeds with risk scores and enrichment. \n\nThe platform monitors multiple threat actors and malware activities globally, keeping current with the latest cyberthreat insights. It integrates with security platforms, allowing teams to leverage its capabilities. ThreatBolt's threat map visualizes real-time advanced persistent threats and ransomware campaigns targeting users' networks, providing early-warning advisories.\n\nAt the core of ThreatBolt is its AI and machine learning framework for threat assessment and scoring. This delivers precise risk scores and detailed threat enrichment, empowering security teams to focus on critical threats and automate response workflows.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/69b7e343-e37a-4480-aec5-23ce2d31bdda.png","url":"https://www.softwareadvice.com.au/software/522836/ThreatBolt","@type":"ListItem"},{"name":"Verimatrix XTD","position":6,"description":"Verimatrix XTD is a mobile app security solution that provides multi-layered protection for Android and iOS applications. The solution caters to various industries where securing mobile apps is critical, such as banking, financial services, e-commerce, healthcare, and gaming.\n\nThe solution employs advanced security techniques, including code obfuscation, anti-tamper technology, jailbreak and root detection, environmental checks, and anti-reverse engineering. The solution has a unique agentless deployment model that allows for easy integration, without requiring end users to install a separate security agent. It also seamlessly integrates into the app development process through automated CICD integration. This ensures powerful security is implemented without disrupting the development workflow. Additionally, the SIEM integration feature enables security teams to quickly identify and respond to high-risk threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/866b8058-89fd-4627-8e5e-c879946f3740.png","url":"https://www.softwareadvice.com.au/software/505980/Verimatrix-App-Shield","@type":"ListItem"},{"name":"MetricStream CyberGRC","position":7,"description":"MetricStream's IT and cyber risk management solution equips organizations with the tools necessary to adopt a focused approach to managing IT and cyber risks. Utilizing the M7 integrated risk platform, users can conduct thorough risk assessments, enforce controls, and execute mitigation strategies efficiently. The platform's advanced capabilities in cyber risk quantification allow users to assess risks in monetary terms, providing a clear perspective on potential financial impacts and supporting proactive risk management initiatives.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b73f2754-a57f-40af-9d87-02bae7ea4990.png","url":"https://www.softwareadvice.com.au/software/479967/MetricStream-IT-GRC-Solution","@type":"ListItem"},{"name":"Lacework","position":8,"description":"Lacework is a cloud-based platform that provides intrusion detection, compliance and automated threat defense for multi-cloud containers and workloads. The platform includes password requirements, multi-factor authentication and usage of root accounts.\n\n\nThe primary features of Lacework include anomaly detection, file integrity monitoring, host intrusion detection, account security, Kubernetes security and more. The solution checks controls for a series of GCP resources including access logs, storage buckets, ACLs and others. Additionally, Lacework provides configuration and security support for programs running in Microsoft Azure.\n\n\nThe product support platforms such as Google Cloud, AWS, Rackspace, Linux, Core OS, Docker and Ubuntu. Pricing is available on request and support is extended via live chat, an online help desk, email and documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2fe3cd8e-532c-4197-a6c6-a5f87c8393fc.png","url":"https://www.softwareadvice.com.au/software/78321/lacework","@type":"ListItem"},{"name":"Critical Insight","position":9,"description":"Critical Insight MDR provides managed detection and response (MDR) services  to businesses, allowing them to identify and mitigate potential cyber threats. By integrating machines with human intelligence, the application automatically collects data from on-premise, cloud or hybrid environments.\n\n\nCritical Insights security analysts are able to monitor endpoint threats and send prioritized alerts across security operations centers (SOCs). Businesses can provide security analysts with a detailed network diagram to view connected ports/devices and grant access approval to specific individuals during cybersecurity incidents. Additionally, it lets users create incident action plans and perform assessments to test PCI-DSS compliance.\n\n\nCritical Insight MDR facilitates integration with Microsoft Office 365, Amazon Web Services (AWS) and Microsoft Azure, helping service providers retrieve and access audit logs. Pricing is available on request and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7dca94cf-6beb-40ea-bbb6-2f02b95ac14c.png","url":"https://www.softwareadvice.com.au/software/98069/critical-insight-mdr","@type":"ListItem"},{"name":"CloudJacket MXDR","position":10,"description":"CloudJacket MDR delivers a fully unified security platform that combines SIEM, XDR, and NDR into one streamlined solution—empowering you with complete threat detection and rapid response across your entire environment. Our U.S.-based Security Operations Center (SOC) operates around the clock, processing billions of alerts daily and escalating less than 0.01%. The result? Your team stays focused on real threats—not noise. CloudJacket integrates seamlessly with your existing infrastructure, whether on-prem, in the cloud, or hybrid—including AWS, Azure, and Google Cloud, and aids in meeting regulatory requirements such as HIPAA, PCI DSS, TSC, and NIST.\nLess alert fatigue. Faster response. Stronger security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3cf5efe1-be3b-4c48-96cf-3f3e2b05e99e.jpeg","url":"https://www.softwareadvice.com.au/software/183664/cloudjacketx","@type":"ListItem"},{"name":"CipherBox","position":11,"description":"CipherBox is a Managed Detection & Response solution that provides your company with protection from cyber threats. Get alerts when threats to your digital environment arise and let Cipher act to notify you and mitigate them. Respond to and fix vulnerabilities quickly with proactive vulnerability alerting. Keep your brand reputation intact with typo squatting domain protection to stop phishing using your brand.\n\n\nThreat Intelligence is integrated into CipherBox. The intelligence is a combination of proprietary, third party and publicly available sources. Bringing this intelligence into your organization keeps your company protected against the latest tactics by adversaries. The intelligence and protection extend to common Cloud applications like AWS, Azure and other technologies.\n\n\nThe solution is managed by Cipher and ideal for medium-sized companies looking to safeguard their company. Cipher has a 24x7 Security Operations Center (SOC) ready to support customers. CipherBox, in conjunction with other activities, can help companies maintain compliance and stop common threats like data breaches and ransomware.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3ac5a950-92cf-4446-a3e2-67cc9efe2e12.png","url":"https://www.softwareadvice.com.au/software/187537/cipher","@type":"ListItem"},{"name":"NetWitness","position":12,"description":"RSA offers managed detection and response (MDR) services to organizations of all sizes, which helps them identify, mitigate and prevent cyber threats using various risk management programs. Professionals can monitor current capabilities/gaps across processes and develop remediation strategies on a digital roadmap.\n\n\nRSA allows businesses to create tailored action plans in accordance with NIST Cybersecurity Framework's (CSF) guidelines and recommendations. Managers can perform intentional cyberattacks to monitor the performance of technical/operational controls and flag high-risk areas using multiple scoring methodologies. Additionally, users can create incident response (IR) plans and conduct walkthrough exercises for teams across security operations centers (SOC).\n\n\nRSA enables enterprises to detect endpoint threats and create IR retainer portfolios for customers. Pricing is available on request and support is extended via live chat, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bbb5b6a6-b738-4611-9921-dee346cfa04b.png","url":"https://www.softwareadvice.com.au/software/141850/netwitness","@type":"ListItem"},{"name":"VMware Carbon Black Cloud","position":13,"description":"With VMware Carbon Black Cloud, users can efficiently secure the highest-performance applications running in the most demanding conditions. Powered by the latest threat intelligence and machine learning, Carbon Black Cloud provides instant visibility and control of environments with built-in analytics and automation to quickly identify threats, protect sensitive data from breaches and control application usage within organizations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f53dfa14-7871-4f62-916e-ca6e116412cb.png","url":"https://www.softwareadvice.com.au/software/432168/vmware-carbon-black-cloud","@type":"ListItem"},{"name":"Network Detection and Response","position":14,"description":"Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. This service accelerates the ability of organizations to respond to and identify future attacks before they become serious events. This threat detection and response service captures, optimizes and stores network traffic from multiple infrastructures in a single cloud haystack. Massive amounts of data are presented in an intuitive, immersive interface so one can analyze, proactively hunt and take action on security events and observations. Give security teams an intuitive system to more quickly act on threat intelligence.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c54d2777-7ce5-4210-af71-669308b5a22c.jpeg","url":"https://www.softwareadvice.com.au/software/328455/network-detection-and-response","@type":"ListItem"},{"name":"Flowmon ADS","position":15,"description":"Flowmon Anomaly Detection System is a cyber security and network monitoring solution that provides real-time threat detection and prevention across the network infrastructure. Flowmon Anomaly Detection System performs deep analysis on all aspects of network traffic to detect irregular, malicious, or unexpected behavior in your network. The solution provides a comprehensive overview of all network traffic, allowing users to utilize inspection and alerting, remediation suggestions, and reporting capabilities to ensure network and endpoint security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5e381f41-1897-4a36-ad3f-967629bc6025.png","url":"https://www.softwareadvice.com.au/software/258509/flowmon-anomaly-detection-system","@type":"ListItem"},{"name":"Cisco Secure Firewall","position":16,"description":"Cisco Secure Firewall is a cloud-based firewall system that provides security across hybrid and multi-cloud environments.  Cisco provides multiple types of firewall security depending on business size with solutions for small to mid-size businesses, campuses, data center environments, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/eeb8dbb2-277f-4e16-87bf-7849f8330f52.png","url":"https://www.softwareadvice.com.au/software/415546/cisco-secure-firewall","@type":"ListItem"},{"name":"Emsisoft Business Security","position":17,"description":"Emsisoft Business Security is an endpoint security solution that helps businesses of all sizes prevent malware such as ransomware, phishing and more. Administrators can set up user permissions, restricting access to malicious websites. \n\n\nEmsisoft Business Security allows organizations to monitor, detect and notify suspicious behavior or activities across all active processes. It utilizes machine learning-enabled malware detection technology to examine downloaded and modified files. The command-line interface lets users automatically scan for viruses across emails, chats, ticket systems and project management tools, among other platforms. Additionally, the anti-ransomware functionality lets users detect and block known ransomware behaviors such as attempted encryption or file deletion and backups.\n\n\nEmsisoft business protection facilitates integration with several third-party solutions. It is available on annual subscriptions and support is extended via live chat, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/097f5115-6b06-439a-87ee-4a2823d5d80a.png","url":"https://www.softwareadvice.com.au/software/184009/emsisoft-business-security","@type":"ListItem"},{"name":"Predictive","position":18,"description":"Predictive is a cloud-based application designed to fortify organizations against cyber threats, empowering them with informed insights for decisive action.\n\nKey features of Predictive' s robust offering include:\n\n1. Security Audit: Leverage automated vulnerability scanning to assess your digital defenses comprehensively. \n2. Security Alerts: Benefit from advanced Events and Anomaly Monitoring, utilizing Predictive Analytics to stay one step ahead of potential threats.\n3. Cyber Awareness: Elevate your organization's security posture through staff cybersecurity training and proactive awareness-building initiatives.\n4. Cyber Hygiene: Assess, Benchmark with CIS (Centre of Internet Security) and provide insights that help companies to improve enterprise security readiness levels.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b0e1a500-4d02-40b7-922e-f3737efc7148.png","url":"https://www.softwareadvice.com.au/software/439504/predictive","@type":"ListItem"},{"name":"Netacea Bot Management","position":19,"description":"Netacea Bot Management is a bot attack protection solution for businesses. It uses machine learning to detect malicious bots, respond to attacks, and adapt to evolving threats. Netacea provides real-time threat data and can build on existing security stacks. Businesses can use this scalable solution to protect websites, mobile apps, and APIs. It integrates with third-party solutions such as Akamai, Magento, CloudFlare, and others. No hardware is required to use this solution. \n\nNetacea Bot Management includes an Intent Analytics engine that identifies the reasons behind bot activity and sophisticated attacks. It can protect against credential stuffing, account takeover, data scraping, and other types of threats. Netacea mitigates unwanted bot traffic without affecting human traffic. The platform includes dashboards, risk scoring, and reputation analysis to help businesses make informed decisions.\n\nPricing information is provided on request by Netacea. Support is provided by phone, email, and other online resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7fbf81c6-5592-420b-b7a4-1c1069353078.png","url":"https://www.softwareadvice.com.au/software/354582/netacea","@type":"ListItem"},{"name":"Wiz","position":20,"description":"Wiz enables organizations globally to rapidly identify and remove critical risks in cloud environments.\n\nWiz secures everything organizations build and run in the cloud. Founded in 2020, Wiz is the fastest-growing software company in the world, scaling from $1M to $200M ARR in 2 years. \n\nWiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c8e9e142-5db8-4181-9e0c-61cfa621362c.png","url":"https://www.softwareadvice.com.au/software/415533/wiz","@type":"ListItem"},{"name":"Fidelis Elevate","position":21,"description":"Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense operations across various network architectures. It extends security controls to the cloud and endpoints and uses threat intelligence, analytics, machine learning, threat hunting, and deception technologies to gain insights into threats impacting environment. This process enables security teams to continually handle defenses and neutralize threats before they cause any damage to business operations. The solution centralizes cybersecurity intelligence for IT, IoT (Internet of Things), data centers, and cloud systems into a unified view, with full visibility and control, ensuring that end users detect post-breach attacks. \n\nFidelis Elevate is the XDR platform that offers Active Directory defense, field contextual traffic analysis, integrated deception technology, active threat detection with MITRE ATT&CK mapping, AI-based sandbox analysis, in-band traffic decryption network DLP and risk-aware terrain mapping. With integrated network, endpoint, and cloud visibility and analysis, it automatically maps cyber terrain and evaluates the risk of every asset and network path.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7cb9365f-59d8-485d-8469-660915078e60.png","url":"https://www.softwareadvice.com.au/software/307619/fidelis-elevate","@type":"ListItem"},{"name":"IBM Security MDR","position":22,"description":"IBM Security MDR is a managed detection and response service solution that helps IT professionals identify and mitigate endpoint threats across networks. IBM's threat analysts can monitor the root cause of issues, configure security policies and develop remediation strategies using a digital roadmap.\n\n\nIBM Security MDR allows businesses to gain visibility across threat landscapes by integrating security and non-security data sources. Users can manage the organizational structure of security operation centers (SOCs) and perform regular tests across applications via artificial intelligence (AI) technology. Additionally, it lets managers grant access to specific individuals and generate performance reports in compliance with industry regulations.\n\n\nIBM Security MDR analysts are able to create incident response (IR) plans and implement security controls across the system. Pricing is available on request and support is extended via live chat, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/89fb80cf-f977-470e-8c29-4588f003727c.png","url":"https://www.softwareadvice.com.au/software/400905/ibm-security-mdr","@type":"ListItem"},{"name":"IntSights","position":23,"description":"IntSights is a cloud-based endpoint security suite designed to help businesses detect, manage and remediate threats across the dark web. It includes several solutions for proactively monitoring and identifying data or credential leakages and compliance breaches in enterprise infrastructure, and generate risk-prioritized alerts based on historical threat patterns.\n\n\nFeatures of IntSights include dark web monitoring, threat hunting, vulnerability enrichment, brand protection, blacklisting, risk management and more. Businesses can integrate the platform with Active Directory to automatically track compromised accounts and trigger reset notifications after leakage validation. Additionally, the application provides a threat intelligence platform for users to centralize data on threats including malware, frauds, phishing attempts and other scams and operationalize one-click remediation. \n\n\nIntSights facilitates integration with several third-party application providers such as Microsoft, Check Point, Cisco, Forcepoint, McAfee, Fortinet, IBM, Micro Focus and more. Pricing is available on request and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8e136412-92cf-41ea-a765-06c225669904.png","url":"https://www.softwareadvice.com.au/software/172744/intsights","@type":"ListItem"},{"name":"Crowdsec","position":24,"description":"CrowdSec aims to provide a crowd-sourced approach to common infrastructure defense problems. It does so by distributing free & open-source software allowing users to protect themselves and share information about malevolent actors within its user network.\n\nThis platform uses a decoupled approach (detect here, remedy there) and an inference engine that leverages leaky buckets, YAML & Grok patterns to identify aggressive behaviors. It acquires signals from various data sources like logs or cloud trails, Kafka, etc., normalizes them, enriches them to apply heuristics and triggers a bouncer to deal with the threat, if need be. Since it’s written in Go, it’s compatible with almost any environment, fast in execution, and resource conservative.\n\nCrowdSec captures all aggression signals (timestamp, IP, behavior) and sends them for curation. That way, it establishes a reliable IP blacklist that is constantly redistributed to the network members in order to achieve a form of digital herd Immunity. An IP caught aggressing WordPress sites will quickly be banned by all members using CrowdSec that subscribed to the WordPress defense collection.\n\nWhile CrowdSec is in charge of the detection, the reaction is performed by “bouncers” that aim to be deployable at any level of the applicative / infrastructure stack:\n- via Nftables/Iptables/Pf based on an IP set \n- via Nginx LUA scripting\n- via WordPress plugin\nOr GCP/AWS/Azure firewall, slack or scripting, notifications, etc.\n\nBouncers can enforce several types of remediation such as blocking, sending a captcha, notifying, lower rights, speed, send a 2FA request, etc. Chained leaky buckets can help sort opportunistic attacks from targeted ones. \n\nThis approach, combined with a declarative configuration and a stateless behavior, makes it an efficient tool to enhance the security of modern stacks (containers, k8s, serverless and more generally automatically deployed infrastructures).\n\nWhenever an attack is locally blocked/detected by Crowd watch, the “meta” information of the attack is shared amongst participants (source IP, date, and triggered scenario) for redistribution to network members.\n\nSome other notable features include:\n- a public hub to find, share and amend parsers, scenarios, and blockers\n- permissive open-source license (MIT) to stay business-friendly\n- Communication channels to interact with each other","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5360345c-9716-4719-bc5b-e72bada903c2.png","url":"https://www.softwareadvice.com.au/software/267630/crowdsec","@type":"ListItem"},{"name":"NexVision Engine","position":25,"description":"NexVision is an AI-powered OSINT tool that automates data collection and processing to drive decision-making. \n\nNexVision collects more than 120,000 new Tor sites (on the dark web) daily. \n\nMain features include:\n- AI/ML-powered engine with continuous collection, analysis and sorting of big data (from publicly available databases and the deep web) \n- Greatly increasing data available whilst removing false positives \n- Multilingual data support \n- Equipped with natural language processing and steganography-decoding capabilities. Able to detect jargon and capture hidden information advanced threat actors employ to avoid detection.\n- Dashboard that allows users to set keyword alerts, conduct investigations and analyse results whilst staying anonymous.\n- Easy-to-use interface that is accessible to analysts without prior data science or computer science background.\n- Provide alerts in real-time and send text/email alerts to the user\n- Automatic archiving of intelligence for ongoing investigations  \n- Anonymous research \n- Cloud-deployment solution with the ability to integrate with existing IoC stacks via API for easy adoption","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1d951175-1f07-4853-ba23-ba73dedff4c8.png","url":"https://www.softwareadvice.com.au/software/341957/nexvision-engine","@type":"ListItem"}],"numberOfItems":25}
</script>
