Loading...
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis.
Browse 450 threat management tools
Secure MFT with CDR malware protection for file transfers and storage
Cloud-based DNS filtering solution for blocking malicious sites and content
Security validation platform that simulates attacks to test security controls
Threat intelligence library with 30,000+ threats mapped to MITRE ATT&CK
Cyber threat intelligence platform with AI-driven analysis and threat hunting
Physical security threat intel platform combining OSINT, location data & analysis
AI-powered threat intelligence feed for automated DDoS protection
Aviation security threat intelligence & risk mgmt platform for AVSEC pros
Database for detecting VPNs, proxies, Tor exits, and anonymization services
Screens blockchain addresses for risk and provides allow/deny recommendations.
Detects and blocks bot traffic to prevent data contamination and analytics skew
AI-powered threat intelligence platform collecting data from web sources
CTI services combining human expertise and AI for threat analysis
File threat intelligence integration combining hash lookups & malware detection
Anonymous ICS threat intel sharing platform for collective defense
Domain intelligence platform for threat research and investigation
OSINT platform for monitoring surface web, dark web, and social media sources
Breach and attack simulation platform for security validation
Global threat intelligence platform aggregating CTI sources with AI analysis
Cyber threat intelligence sharing platform for Australian organizations
Threat intelligence platform providing strategic & tactical threat analysis
Threat intelligence platform providing messaging threat data via API
Proactive threat intelligence platform providing early warning alerts
AI-powered threat management platform for detection, analysis, and response
450 tools across 4 specializations · 174 free, 276 commercial
Advanced Persistent Threat Detection
APT detection tools that identify sophisticated, long-term cyber attacks and advanced persistent threat campaigns.
Threat Intelligence Platforms
TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.
Threat Modeling
Threat modeling tools for identifying security risks, attack vectors, and potential threats in system architectures.
Common questions about Threat Management tools, selection guides, pricing, and comparisons.
A TIP aggregates threat data from multiple sources (commercial feeds, open-source, ISACs, internal telemetry), normalizes it into structured formats (STIX/TAXII), and distributes indicators of compromise (IOCs) to your security tools. You need a TIP if you consume multiple threat feeds, want to correlate external intelligence with internal incidents, or need to share intelligence with peers and ISACs.
Penetration testing is a point-in-time assessment where human testers attempt to find and exploit vulnerabilities. Threat simulation (breach and attack simulation) continuously and automatically tests your security controls against known attack techniques mapped to MITRE ATT&CK. Pen testing finds novel vulnerabilities; threat simulation validates that your defenses work against known attacks on an ongoing basis.
Threat modeling identifies potential security threats during the design phase, before any code is written. By systematically analyzing data flows, trust boundaries, and attack surfaces, teams can prioritize which threats to mitigate architecturally rather than patching vulnerabilities after deployment. Common frameworks include STRIDE, PASTA, and attack trees.
Threat Simulation
Threat simulation platforms for testing security controls, validating defenses, and simulating real-world cyber attacks.