| Product |
Mandiant Threat Intelligence |
Microsoft Defender Threat Intelligence |
Amazon GuardDuty |
IBM Security MDR |
ESET Endpoint Security |
Bitdefender GravityZone |
IntSights |
ManageEngine Log360 |
The Anomali Platform |
Crowdsec |
|---|---|---|---|---|---|---|---|---|---|---|
| Review & Ratings |
No reviews available |
No reviews available |
No reviews available |
No reviews available |
No reviews available |
No reviews available |
No reviews available |
No reviews available |
No reviews available |
No reviews available |
| Description |
Mandiant Threat Intelligence is a leading threat intelligence software that... Read more about Mandiant Threat Intelligence |
Microsoft Defender Threat Intelligence is a cutting-edge threat intelligence software... Read more about Microsoft Defender Threat Intelligence |
Amazon GuardDuty is an advanced threat intelligence software that helps... Read more about Amazon GuardDuty |
IBM Security MDR is a sophisticated endpoint detection and response... Read more about IBM Security MDR |
ESET Endpoint Security is a robust solution for businesses seeking... Read more about ESET Endpoint Security |
Bitdefender GravityZone is an advanced cybersecurity software suite developed to... Read more about Bitdefender GravityZone |
IntSights is an advanced cybersecurity software designed to help organizations... Read more about IntSights |
ManageEngine Log360 is a comprehensive network monitoring and security information... Read more about ManageEngine Log360 |
The Anomali Platform is a leading risk management software designed... Read more about The Anomali Platform |
Crowdsec is a collaborative cybersecurity software designed to protect organizations... Read more about Crowdsec |
| Free Trial |
NA |
NA |
NA |
NA |
Available |
NA |
Available |
Available |
NA |
Available |
| Starting Price |
$211 Per Year |
$77.69 Per Year |
$75000 Per User |
|||||||
| Features | ||||||||||
| Network Provisioning | ||||||||||
| Threat Response | ||||||||||
| Prioritization | ||||||||||
| Reporting/Analytics | ||||||||||
| Vulnerability Scanning | ||||||||||
| Network Monitoring | ||||||||||
| Server Monitoring | ||||||||||
| Activity Dashboard | ||||||||||
| Web-Application Security | ||||||||||
| Incident Reporting | ||||||||||
| Alerts/Notifications | ||||||||||
| Application Security | ||||||||||
| Data Visualization | ||||||||||
| Monitoring | ||||||||||
| Real-Time Data | ||||||||||
| Artificial Intelligence | ||||||||||
| Other Info | ||||||||||
| Deployment |
|
|
|
|
|
|
|
|
|
|
| Devices Supported |
|
|
|
|
|
|
|
|
|
|
| Pricing Model |
|
|
|
|
|
|
|
|
|
|
| Support | NA | NA | NA | NA |
|
|
|
|
|
|
| Target Company Size |
|
|
|
|
|
|
|
|
|
|
Absolutely! Depending on the tool, you may discover:
These budget-friendly Threat Intelligence Software solutions can be perfect for startups or small businesses, although they often come with usage caps or feature limitations. Always review each product’s details to ensure it meets your specific needs.