Loading...
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis.
Browse 450 threat management tools
Central hub for accessing Filigran products, resources, and community content
CTI platform providing structured threat intelligence and analysis
Cyber threat intelligence sharing platform with TAXII/STIX support
Enterprise file analysis platform for high-volume malware detection
Threat intelligence platform for cyber, physical, vulnerability & national sec
Detects compromised assets via outbound traffic to GreyNoise sensors & malicious IPs
AI-powered threat intelligence service with expert analysis and geopolitics
Risk intelligence service for supply chain, geopolitical & compliance risks
Free contextual federated search tool for threat intelligence enrichment
Overlay tool providing real-time threat intel & context across security tools
Enterprise threat intelligence platform with APAC focus and adversary tracking
AI-driven threat intelligence platform for threat detection and response
Centralized threat intelligence platform for aggregating and operationalizing IOCs
Threat intelligence platform with AI-powered monitoring and analysis
AI-powered cyber threat intelligence platform for threat monitoring & analysis
Human-led breach and attack simulation service for security control validation
Professional threat modeling service for identifying app security flaws
Open-source threat intelligence platform for organizing and operationalizing CTI
Open-source threat-informed exposure validation platform for attack simulation
Threat intelligence platform for collecting, analyzing, and sharing CTI data
P2P threat intel sharing platform for collaborative defense communities
Tests email security gateways by simulating real-world email threats
OT/IoT threat intelligence feed for vulnerability and malware detection
Virtual asset intelligence solution tracking cryptocurrency transactions
450 tools across 4 specializations · 174 free, 276 commercial
Advanced Persistent Threat Detection
APT detection tools that identify sophisticated, long-term cyber attacks and advanced persistent threat campaigns.
Threat Intelligence Platforms
TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.
Threat Modeling
Threat modeling tools for identifying security risks, attack vectors, and potential threats in system architectures.
Common questions about Threat Management tools, selection guides, pricing, and comparisons.
A TIP aggregates threat data from multiple sources (commercial feeds, open-source, ISACs, internal telemetry), normalizes it into structured formats (STIX/TAXII), and distributes indicators of compromise (IOCs) to your security tools. You need a TIP if you consume multiple threat feeds, want to correlate external intelligence with internal incidents, or need to share intelligence with peers and ISACs.
Penetration testing is a point-in-time assessment where human testers attempt to find and exploit vulnerabilities. Threat simulation (breach and attack simulation) continuously and automatically tests your security controls against known attack techniques mapped to MITRE ATT&CK. Pen testing finds novel vulnerabilities; threat simulation validates that your defenses work against known attacks on an ongoing basis.
Threat modeling identifies potential security threats during the design phase, before any code is written. By systematically analyzing data flows, trust boundaries, and attack surfaces, teams can prioritize which threats to mitigate architecturally rather than patching vulnerabilities after deployment. Common frameworks include STRIDE, PASTA, and attack trees.
Yes. Out of 24 threat management tools listed on CybersecTools, 2 are free and 22 are commercial. Free tools work well for small teams, testing, and budget-conscious organizations. Commercial tools typically add enterprise features, dedicated support, and SLA guarantees.
Threat Simulation
Threat simulation platforms for testing security controls, validating defenses, and simulating real-world cyber attacks.