Threat Management Tools
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis.
Browse 513 threat management tools
FEATURED
- Home
- Categories
- Threat Management
USE CASES
Cybersecurity market intelligence platform for tracking competitors & funding.
Cybercrime intelligence tools for searching compromised credentials from infostealers
IP reputation & threat intel API backed by honeypot sensors and community reports.
Threat intel firm identifying human actors behind cyber threats.
Community-driven phishing URL archive operated by Cisco Talos.
Managed threat intel service using feeds, OSINT & sandboxing via 24/7 SOC.
Digital threat intel platform with 300TB+ of malware data, AI analytics & forecasting.
Visual attack surface mapping and threat modeling for security teams
AI-driven threat modeling for identifying security risks in design phase
Network threat detection platform (product page unavailable)
AI-powered continuous threat modeling for cloud applications in runtime
API providing access to compromised identity data and threat signals
Cyber intelligence platform for threat detection and security posture mgmt
3D cyber threat visualization platform for external threat monitoring
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.
A list of most queried domains based on passive DNS usage across the Umbrella global network.
Facilitating exchange of information and knowledge to collectively protect against cyberattacks.
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.
A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.
Freely available network IOCs for monitoring and incident response
A project focusing on understanding and combating threats to the Internet economy and net citizens.
Free cyber threat intelligence feeds for proactive threat detection
NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.
Threat Management Specializations
513 tools across 4 specializations · 173 free, 340 commercial
Advanced Persistent Threat Detection
APT detection tools that identify sophisticated, long-term cyber attacks and advanced persistent threat campaigns.
Threat Intelligence Platforms
TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.
Threat Modeling
Threat modeling tools for identifying security risks, attack vectors, and potential threats in system architectures.
Threat Simulation
Threat simulation platforms for testing security controls, validating defenses, and simulating real-world cyber attacks.
Threat Management Tools FAQ
Common questions about Threat Management tools, selection guides, pricing, and comparisons.
A TIP aggregates threat data from multiple sources (commercial feeds, open-source, ISACs, internal telemetry), normalizes it into structured formats (STIX/TAXII), and distributes indicators of compromise (IOCs) to your security tools. You need a TIP if you consume multiple threat feeds, want to correlate external intelligence with internal incidents, or need to share intelligence with peers and ISACs.