Loading...
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis.
Browse 450 threat management tools
AI-powered CTI platform integrating ASM, DRP, and TI capabilities
Threat intelligence platform providing actionable insights from global sources
AI-powered threat intelligence platform with search, risk assessment & alerts
Threat intelligence platform monitoring dark web, breaches & attack surface
AI-driven threat intel platform monitoring clear, deep, and dark web sources
Threat intel platform for prioritizing vulnerabilities based on attacker TTPs
Investigative intelligence service for law enforcement agencies
Real-time threat intelligence platform with analyst-enriched insights
Validates detective security controls through attack simulations and testing
CTI platform for threat analysis, dark web monitoring, and data breach detection
Human-led adversary emulation service testing detection & response capabilities
Threat intelligence platform with 500M+ entries for real-time threat analysis
CDR API for file sanitization via Content Disarm & Reconstruction
Mobile threat intelligence service providing threat data, research, and DFIR
Breach and attack simulation platform for testing security controls
Ransomware attack simulation service to test security defenses and response
Real-time zero-day vulnerability detection and alerting platform
Framework for modeling access control and attack graphs in networked systems
Dark web monitoring platform for detecting exposed credentials and threats
Swiss-made darknet monitoring platform providing real-time threat intel via API
Dark web monitoring platform for detecting data breaches and leaked data
External threat landscape mgmt platform with predictive intelligence
AI-powered pre-development risk detection for secure-by-design software
Visual interface for exploring threat intelligence data sources and datasets
450 tools across 4 specializations · 174 free, 276 commercial
Advanced Persistent Threat Detection
APT detection tools that identify sophisticated, long-term cyber attacks and advanced persistent threat campaigns.
Threat Intelligence Platforms
TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.
Threat Modeling
Threat modeling tools for identifying security risks, attack vectors, and potential threats in system architectures.
Common questions about Threat Management tools, selection guides, pricing, and comparisons.
A TIP aggregates threat data from multiple sources (commercial feeds, open-source, ISACs, internal telemetry), normalizes it into structured formats (STIX/TAXII), and distributes indicators of compromise (IOCs) to your security tools. You need a TIP if you consume multiple threat feeds, want to correlate external intelligence with internal incidents, or need to share intelligence with peers and ISACs.
Penetration testing is a point-in-time assessment where human testers attempt to find and exploit vulnerabilities. Threat simulation (breach and attack simulation) continuously and automatically tests your security controls against known attack techniques mapped to MITRE ATT&CK. Pen testing finds novel vulnerabilities; threat simulation validates that your defenses work against known attacks on an ongoing basis.
Threat modeling identifies potential security threats during the design phase, before any code is written. By systematically analyzing data flows, trust boundaries, and attack surfaces, teams can prioritize which threats to mitigate architecturally rather than patching vulnerabilities after deployment. Common frameworks include STRIDE, PASTA, and attack trees.
Threat Simulation
Threat simulation platforms for testing security controls, validating defenses, and simulating real-world cyber attacks.