Loading...
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis.
Browse 450 threat management tools
Automated platform for testing cybersecurity controls against real threats
AI-powered reputation engine for blocking spam, bots, and malicious IPs via API.
Threat intelligence service providing threat profiles and analytics for MDR
SaaS platform for threat-informed defense using adversary tradecraft analysis
Automates security tool stack optimization based on threat profiles
Automotive-focused threat intelligence platform with dark web monitoring
Threat intel service focused on adversary attribution and monitoring
Threat intel platform for discovering cybercrime on encrypted chat networks
Automated AI red teaming platform for testing GenAI apps, models & agents
Scans development plans to identify design flaws before implementation.
AI-driven platform that operationalizes threat intel into risk-prioritized actions
Managed threat intelligence service with dark web monitoring and analysis
AI-driven threat intel platform for preemptive security & attack prevention
Cloud-native DNS filtering solution that blocks malicious domains and threats
AI-driven threat intel feeds for automated blocking on 20+ firewall vendors
Threat intel enrichment platform that correlates events with IOCs and actors
Predictive cybersecurity platform providing threat intelligence services
Real-time fraud intelligence sharing platform with GDPR-compliant tokenization
Enterprise threat intelligence platform for proactive threat detection
Curated phishing threat intelligence feed with predictive detection
Behavior-based threat intel feed delivering malware IOCs with context
eBook on PASTA risk-based threat modeling methodology
Weekly threat intelligence briefings published by VerSprite
Cyber threat intelligence feeds for SOC and threat intelligence teams
450 tools across 4 specializations · 174 free, 276 commercial
Advanced Persistent Threat Detection
APT detection tools that identify sophisticated, long-term cyber attacks and advanced persistent threat campaigns.
Threat Intelligence Platforms
TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.
Threat Modeling
Threat modeling tools for identifying security risks, attack vectors, and potential threats in system architectures.
Common questions about Threat Management tools, selection guides, pricing, and comparisons.
A TIP aggregates threat data from multiple sources (commercial feeds, open-source, ISACs, internal telemetry), normalizes it into structured formats (STIX/TAXII), and distributes indicators of compromise (IOCs) to your security tools. You need a TIP if you consume multiple threat feeds, want to correlate external intelligence with internal incidents, or need to share intelligence with peers and ISACs.
Penetration testing is a point-in-time assessment where human testers attempt to find and exploit vulnerabilities. Threat simulation (breach and attack simulation) continuously and automatically tests your security controls against known attack techniques mapped to MITRE ATT&CK. Pen testing finds novel vulnerabilities; threat simulation validates that your defenses work against known attacks on an ongoing basis.
Threat modeling identifies potential security threats during the design phase, before any code is written. By systematically analyzing data flows, trust boundaries, and attack surfaces, teams can prioritize which threats to mitigate architecturally rather than patching vulnerabilities after deployment. Common frameworks include STRIDE, PASTA, and attack trees.
Threat Simulation
Threat simulation platforms for testing security controls, validating defenses, and simulating real-world cyber attacks.