Threat Management Tools

Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis.

Browse 513 threat management tools

Cybersecurity market intelligence platform for tracking competitors & funding.

Cybercrime intelligence tools for searching compromised credentials from infostealers

IP reputation & threat intel API backed by honeypot sensors and community reports.

Threat intel firm identifying human actors behind cyber threats.

Community-driven phishing URL archive operated by Cisco Talos.

Managed threat intel service using feeds, OSINT & sandboxing via 24/7 SOC.

Digital threat intel platform with 300TB+ of malware data, AI analytics & forecasting.

Visual attack surface mapping and threat modeling for security teams

AI-driven threat modeling for identifying security risks in design phase

Network threat detection platform (product page unavailable)

AI-powered continuous threat modeling for cloud applications in runtime

API providing access to compromised identity data and threat signals

Cyber intelligence platform for threat detection and security posture mgmt

3D cyber threat visualization platform for external threat monitoring

A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.

A list of most queried domains based on passive DNS usage across the Umbrella global network.

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.

Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.

A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.

Freely available network IOCs for monitoring and incident response

A project focusing on understanding and combating threats to the Internet economy and net citizens.

Free cyber threat intelligence feeds for proactive threat detection

NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.

Threat Management Specializations

513 tools across 4 specializations

Threat Management Tools FAQ

Common questions about Threat Management tools, selection guides, pricing, and comparisons.

A TIP aggregates threat data from multiple sources (commercial feeds, open-source, ISACs, internal telemetry), normalizes it into structured formats (STIX/TAXII), and distributes indicators of compromise (IOCs) to your security tools. You need a TIP if you consume multiple threat feeds, want to correlate external intelligence with internal incidents, or need to share intelligence with peers and ISACs.

Have more questions? Browse our categories or search for specific tools.