---
description: Page 5 - Compare the best Threat Intelligence Tools in the UK. Capterra offers the most comprehensive reviews from verified users, prices, and a complete description of all relevant features. Use our filters to find the best rated software for your business needs.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 5 - Threat Intelligence Tools - Price Comparison & Reviews - Capterra UK 2026
---

Breadcrumb: [Home](/) > [Threat Intelligence Tools](https://www.capterra.co.uk/directory/32474/threat-intelligence/software) > [Page 5](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=5)

# Threat Intelligence Tools

Canonical: https://www.capterra.co.uk/directory/32474/threat-intelligence/software

Page: 5 / 8\
Prev: [Previous page](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=4)\
Next: [Next page](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=6)

> Threat intelligence software allows organizations to keep their security standards up-to-date with a near real-time view of the threat landscape by identifying and combatting new forms of malware as they emerge.

-----

## Products

1. [Bugcrowd](https://www.capterra.co.uk/software/218813/bugcrowd) — 5.0/5 (3 reviews) — Bugcrowd is a crowdsourced cybersecurity platform that helps organizations proactively identify and remediate security vulnerabilities.
2. [TEHTRIS XDR Platform](https://www.capterra.co.uk/software/1052644/tehtris-xdr) — 4.3/5 (3 reviews) — Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction.
3. [Dark Atlas](https://www.capterra.co.uk/software/1052757/dark-atlas) — 4.7/5 (3 reviews) — Cloud-based dark web monitoring platform that helps businesses prevent data breaches, identify threats, and more.
4. [MetricStream CyberGRC](https://www.capterra.co.uk/software/166091/metricstream-it-grc-solution) — 3.5/5 (2 reviews) — Actively manage cyber risk by automating \&amp; enhancing your cyber \&amp; IT governance, risk \&amp; compliance processes with MetricStream CyberGRC
5. [Pentera](https://www.capterra.co.uk/software/178964/pcysys) — 5.0/5 (2 reviews) — Know your true, current, exploitable attack surface by emulating real-life attacks on all cybersecurity layers at all times.
6. [Secureworks](https://www.capterra.co.uk/software/187138/secureworks) — 5.0/5 (2 reviews) — Secureworks combines machine learning with human intelligence to predict and prevent more threats.
7. [Strobes RBVM](https://www.capterra.co.uk/software/200791/strobes) — 5.0/5 (2 reviews) — Strobes RBVM offers advanced reporting capabilities that empower organizations to gain deeper insights into their security posture.
8. [SafeGuard Cyber](https://www.capterra.co.uk/software/207237/safeguard-cyber) — 5.0/5 (2 reviews) — SafeGuard Cyber is the most comprehensive integrated cloud communications platform to address security threats and compliance risks.
9. [Prophaze WAF](https://www.capterra.co.uk/software/208862/prophazes-waf) — 5.0/5 (2 reviews) — Zero-Configuration Web Application, API Protection, and Bot Mitigation for Kubernetes.
10. [Resecurity Risk](https://www.capterra.co.uk/software/218786/risk) — 5.0/5 (2 reviews) — Risk Artificial Intelligence driven Supply Chain monitoring platform that you can use to identify upstream and downstream providers
11. [ThreatSTOP DNS Defense](https://www.capterra.co.uk/software/1013818/dns-defense) — 5.0/5 (2 reviews) — ThreatSTOP DNS Defense turns your existing DNS into true Protective DNS (PDNS) with continuous updates from 900+ feeds.
12. [Citrix Web Firewall](https://www.capterra.co.uk/software/1031787/citrix-web-firewall) — 4.5/5 (2 reviews) — Web firewall tool designed for IT admins and assists in preventing security breaches, data loss, and unauthorized website changes.
13. [Verimatrix XTD](https://www.capterra.co.uk/software/1033047/verimatrix-app-shield) — 5.0/5 (2 reviews) — Protect your code, data, and brand with the world’s \#1 enterprise-grade mobile app protection, threat detection, and response platform
14. [Defense In Depth](https://www.capterra.co.uk/software/1065381/defense-in-depth) — 5.0/5 (2 reviews) — Defense In Depth software identifies system vulnerabilities and suggests security enhancements.
15. [Feedly for Threat Intelligence](https://www.capterra.co.uk/software/1065372/feedly-for-threat-intelligence) — 5.0/5 (2 reviews) — Feedly for Threat Intelligence collects, analyzes, and shares actionable open-source threat intelligence
16. [ThreatBolt](https://www.capterra.co.uk/software/1070659/ThreatBolt) — 5.0/5 (2 reviews) — Threat intelligence software that offers real-time visibility to adversaries and enriched data to improve detection and response.
17. [Fidelis Elevate](https://www.capterra.co.uk/software/168954/fidelis-elevate) — 5.0/5 (1 reviews) — With advanced threat intelligence and threat defense solutions, Fidelis Elevate goes beyond detection and automates response.
18. [NetWitness](https://www.capterra.co.uk/software/172921/rsa-netwitness-logs-and-packets) — 5.0/5 (1 reviews) — NetWitness Platform is cybersecurity software for threat detection, investigation, and response.
19. [Lacework](https://www.capterra.co.uk/software/182796/lacework) — 5.0/5 (1 reviews) — Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks.
20. [Netacea Bot Management](https://www.capterra.co.uk/software/188458/https-www-netacea-com) — 5.0/5 (1 reviews) — Netacea provides a revolutionary agentless bot management solution that protects websites, mobile apps and APIs from malicious bots.
21. [CipherBox](https://www.capterra.co.uk/software/211686/cipherbox) — 5.0/5 (1 reviews) — 24/7 SOC-as-a-Service capabilities in a turnkey approach.
22. [CloudJacket MXDR](https://www.capterra.co.uk/software/212808/cloudjacketx) — 5.0/5 (1 reviews) — High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.
23. [Critical Insight](https://www.capterra.co.uk/software/213151/critical-insight) — 5.0/5 (1 reviews) — We help organizations PREPARE for attacks with risk assessments and vulnerability scans, DETECT with a 24x7 SOC and RESPOND with RQ.
24. [Emsisoft Business Security](https://www.capterra.co.uk/software/213154/emsisoft-business-security) — 4.0/5 (1 reviews) — Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.
25. [Extended Threat Intelligence](https://www.capterra.co.uk/software/214273/socradar) — 5.0/5 (1 reviews) — Extended Threat Intelligence delivers extended threat intelligence, digital risk protection \&amp; external attack surface management.

-----

Page: 5 / 8\
Prev: [Previous page](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=4)\
Next: [Next page](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=6)

## Related Categories

- [Cloud Security Software](https://www.capterra.co.uk/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.co.uk/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.co.uk/directory/30907/endpoint-protection/software)
- [Vulnerability Management Software](https://www.capterra.co.uk/directory/31062/vulnerability-management/software)
- [Network Security Software](https://www.capterra.co.uk/directory/30003/network-security/software)

## Links

- [View on Capterra](https://www.capterra.co.uk/directory/32474/threat-intelligence/software)
- [All Categories](https://www.capterra.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Capterra UK helps millions of people find the best business software. With software reviews, ratings, infographics, and the most comprehensive list of business software.","email":"info@capterra.co.uk","url":"https://www.capterra.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.co.uk/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra/","https://www.youtube.com/channel/UCEt7vQSPiPlPAblHdhJAqnA"]},{"name":"Capterra UK","url":"https://www.capterra.co.uk/","@id":"https://www.capterra.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Threat Intelligence Tools","description":"Page 5 - Compare the best Threat Intelligence Tools in the UK. Capterra offers the most comprehensive reviews from verified users, prices, and a complete description of all relevant features. Use our filters to find the best rated software for your business needs.","url":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=5","about":{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=5#itemlist"},"breadcrumb":{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=5#breadcrumblist"},"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=5#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.capterra.co.uk/#website"},"inLanguage":"en-GB","mainEntity":{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=5#itemlist"},"publisher":{"@id":"https://www.capterra.co.uk/#organization"}},{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=5#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Threat Intelligence Tools","position":2,"item":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software","@type":"ListItem"},{"name":"Page 5","position":3,"item":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=5","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 5 - Threat Intelligence Tools - Price Comparison &amp; Reviews - Capterra UK 2026","@context":"https://schema.org","@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=5#itemlist","@type":"ItemList","itemListElement":[{"name":"Bugcrowd","position":1,"description":"Bugcrowd is a crowdsourced cybersecurity platform that offers continuous security testing to help organizations identify and remediate vulnerabilities. The Bugcrowd platform provides multiple security solutions including penetration testing, bug bounty programs, vulnerability disclosure, and attack surface management powered by a community of trusted security researchers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4364b39f-deed-4f72-9915-ae551eb3b6fc.jpeg","url":"https://www.capterra.co.uk/software/218813/bugcrowd","@type":"ListItem"},{"name":"TEHTRIS XDR Platform","position":2,"description":"Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security. Orchestrate all your cybersecurity tools simultaneously, including your existing solutions such as Zscaler and Proofpoint, with our SOAR and its Playbooks. Our platform is available in our secured cloud or on-prem.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1c85258-a895-43fc-afdc-c06e52be60fb.jpeg","url":"https://www.capterra.co.uk/software/1052644/tehtris-xdr","@type":"ListItem"},{"name":"Dark Atlas","position":3,"description":"Dark Atlas is a proactive dark web monitoring platform that helps businesses prevent data breaches. With real-time monitoring and tracing, it eliminates breaches before they happen. Dark Atlas provides comprehensive coverage & protection across the dark web.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/514ccb7b-5539-4477-bab5-92764f43ee24.png","url":"https://www.capterra.co.uk/software/1052757/dark-atlas","@type":"ListItem"},{"name":"MetricStream CyberGRC","position":4,"description":"MetricStream CyberGRC helps organizations actively manage cyber risk through an IT and Cyber Risk and Compliance Framework that aligns with established security standards so you can pass IT audits more efficiently and get buy-in from top management. Gain comprehensive visibility into the overall IT risk posture and cybersecurity investment priorities. Get your IT and Cyber Compliance program up and running quickly with pre-packaged content and industry frameworks such as ISO 27001, NIST CSF, and NIST SP800-53, and map policies to IT controls and policy exceptions. Leverage best practices, insightful reporting, and risk quantification.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b73f2754-a57f-40af-9d87-02bae7ea4990.png","url":"https://www.capterra.co.uk/software/166091/metricstream-it-grc-solution","@type":"ListItem"},{"name":"Pentera","position":5,"description":"Pentera is the category leader for Automated Security Validation, allowing organizations to test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in Security Operations","url":"https://www.capterra.co.uk/software/178964/pcysys","@type":"ListItem"},{"name":"Secureworks","position":6,"description":"Secureworks combines machine learning with human intelligence to predict and prevent more threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/63541483-52a1-44b9-b461-3380e112465c.jpeg","url":"https://www.capterra.co.uk/software/187138/secureworks","@type":"ListItem"},{"name":"Strobes RBVM","position":7,"description":"Strobes RBVM simplifies vulnerability management with its all-in-one platform, streamlining the process of identifying, prioritizing, and mitigating vulnerability risks across various attack vectors. Through seamless automation, integration, and comprehensive reporting, organizations can proactively enhance their cybersecurity posture.\n\nStrobes Vulnerability Management software goes beyond the capabilities of a standalone vulnerability scanner.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/07331f99-2c76-4084-9b8c-7f28a3427920.png","url":"https://www.capterra.co.uk/software/200791/strobes","@type":"ListItem"},{"name":"SafeGuard Cyber","position":8,"description":"SafeGuard Cyber is the most comprehensive integrated cloud communications security platform to address cybersecurity threats and compliance risks across today’s modern cloud workplace. Through a combination of unified visibility, contextual analysis, and multi-channel investigations and detections, SafeGuard Cyber mitigates risks in email, mobile and web messaging apps, collaboration apps, and social media.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2ddedc93-ca17-46d5-bf6f-f363650741aa.png","url":"https://www.capterra.co.uk/software/207237/safeguard-cyber","@type":"ListItem"},{"name":"Prophaze WAF","position":9,"description":"Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls,  Prophaze WAF  exclusively protects web and mobile APIs from security breach using its Adaptive Profiling and Behavioral-based machine learning algorithms.  The product is built natively on Kubernetes Platform and secures customers Kubernetes clusters and cloud infrastructure from various attack vectors.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e689cbe6-8218-48e6-836c-5b4edeff0ef4.png","url":"https://www.capterra.co.uk/software/208862/prophazes-waf","@type":"ListItem"},{"name":"Resecurity Risk","position":10,"description":"Resecurity Risk is Artificial Intelligence driven Supply Chain monitoring platform that you can use to identify upstream and downstream providers for real time analysis for all business and technical users.\n\nTracking security posture changes depending on the identified security events, Dark/Web/Surface Web, and other malicious activity.\n\nIdentifying and eliminating potential blind spots and security gaps throughout your network infrastructure and exposed digital footprint.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc72e088-9fae-4e8d-9255-b90236b8cc10.png","url":"https://www.capterra.co.uk/software/218786/risk","@type":"ListItem"},{"name":"ThreatSTOP DNS Defense","position":11,"description":"DNS Defense Outbound Threat Protection\n\nThreatSTOP DNS Defense enables true Protective DNS (PDNS) with continuous updates from 900+ Threat Intelligence sources. DNS Defense turns your existing DDI/IPAM or DNS Servers into security enforcement points that stop dangerous and unwanted traffic before damage is done.\n\nDNS Defense turns your existing DNS into true Protective DNS (PDNS). DNS Defense provides granular, proactive DNS threat protection, and includes everything you need in a simple service","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b986ffba-3b94-4849-acc2-723d4d18f379.jpeg","url":"https://www.capterra.co.uk/software/1013818/dns-defense","@type":"ListItem"},{"name":"Citrix Web Firewall","position":12,"description":"Citrix Web Firewall is a cyber security tool with a global user base, primarily corporate professionals. It aims to protect IT assets against known and unknown cyber-attacks, including zero-day, malicious XML requests, DoS, SQL injection, and cross-site scripting attacks. This firewall tool can monitor traffic and user configuration settings, collect log data to produce statistics, monitor performance, and suggest improvements. It tracks application cookies, grouping temporary cookies for hashing, signing, and generating a single cookie for each category. Users can configure their security with profiles, policies, and signature objects. This firewall can be installed as a Layer 2 network bridge or a Layer 3 network device.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/79032851-e20c-4443-bb59-70c3374c6bf2.png","url":"https://www.capterra.co.uk/software/1031787/citrix-web-firewall","@type":"ListItem"},{"name":"Verimatrix XTD","position":13,"description":"Verimatrix XTD stands at the forefront of application security, offering unmatched protection for mobile, web desktop and embedded applications in critical industries while streamlining implementation to empower innovation.\n\nVerimatrix delivers an amazing cybersecurity experience with XTD; allowing customers to prevent, detect, respond and predict threats to their mobile applications and the devices that connect to their critical infrastructure.\n\nWe have expanded our detection capabilities to the network, beyond application and device level detections. We can access risk per application to protect the connection to the company critical infra.\n\nVerimatrix XTD’s Application Protection Suite includes:\n- XTD Enterprise Suite\n- XTD Protect for Android and iOS\n- XTD Detection & Response\n- XTD for Desktop/Embedded \n- XTD for Web \n- XTD Whitebox Cryptography\n- XTD Managed Services","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/866b8058-89fd-4627-8e5e-c879946f3740.png","url":"https://www.capterra.co.uk/software/1033047/verimatrix-app-shield","@type":"ListItem"},{"name":"Defense In Depth","position":14,"description":"Defense In Depth is a cybersecurity software solution that provides organizations with the ability to perform their own cybersecurity risk assessments and manage identified cyber risks.\n\nIt enables conducting cybersecurity audits aligned with various frameworks like NIST, CIS 8, CMMC, HICP, and others to meet specific organizational security requirements and objectives. The software generates detailed technical reports with recommended remediations to help organizations strengthen security and mitigate potential threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6819b1e3-5b77-45a1-b554-48da81634a1d.jpeg","url":"https://www.capterra.co.uk/software/1065381/defense-in-depth","@type":"ListItem"},{"name":"Feedly for Threat Intelligence","position":15,"description":"Feedly for Threat Intelligence is a cybersecurity software product enabling users to collect, analyze, and share actionable, open-source cyber threat intelligence faster. It monitors thousands of open web sources to increase threat coverage and minimize blind spots. The software leverages AI and machine learning to extract insights, enrich data, and synthesize reports to accelerate threat analysis.\n\nBenefits include:\nUp to 9X more relevant open source AI Feeds when compared to keyword search.  \n\nUp to 3 days earlier notification of emerging threats or vulnerabilities than on government sites or from vendor advisories. \n\nOver 100X more coverage of open cybersecurity sources reducing blindspots.\n\nSave up to 2 hours per day on open-source intelligence collection and entity extraction.\n\nSynthesize content across multiple articles and turn data into actionable reports in minutes with AI Actions. \n\nSend daily cyber newsletters customized to each stakeholder group. \n\nGet quick insights into t","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/73ea4bc2-61b0-4f20-a205-5f2d819734c7.png","url":"https://www.capterra.co.uk/software/1065372/feedly-for-threat-intelligence","@type":"ListItem"},{"name":"ThreatBolt","position":16,"description":"ThreatBolt is a threat intelligence software provider offering threat detection, analysis, and response solutions. The platform aggregates and analyzes threat intelligence to identify malicious actors, compromised networks, and cyber campaigns. \n\nThreatBolt enriches data with risk scoring and context to power automated detection and response through integrations with SIEM, SOAR, and XDR solutions. The platform monitors various threats and malware globally, delivering continuously updated threat insights to security teams.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/69b7e343-e37a-4480-aec5-23ce2d31bdda.png","url":"https://www.capterra.co.uk/software/1070659/ThreatBolt","@type":"ListItem"},{"name":"Fidelis Elevate","position":17,"description":"Fidelis Elevate is the only XDR Solution that delivers endpoint security, Network Security, Deception & active Directory protection in a single platform, making it the powerhouse of a cyber-resilient environment.  \n\nFidelis Elevate provides valuable threat intelligence through contextual visibility and integrated deception capabilities, enabling organizations to stay ahead of emerging threats. By analyzing security events and correlating them with external threat intelligence feeds, Fidelis Elevate identifies potential threats and provides actionable insights to security teams. With access to real-time threat intelligence, organizations can prioritize their response efforts, enhance threat detection capabilities, and mitigate the impact of cyber-attacks effectively.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7cb9365f-59d8-485d-8469-660915078e60.png","url":"https://www.capterra.co.uk/software/168954/fidelis-elevate","@type":"ListItem"},{"name":"NetWitness","position":18,"description":"NetWitness Platform is a security information and event management software that provides threat detection, investigation, and response capabilities. The comprehensive platform collects and analyzes data across multiple sources to detect threats, and includes orchestration and automation features to help security teams respond faster.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bbb5b6a6-b738-4611-9921-dee346cfa04b.png","url":"https://www.capterra.co.uk/software/172921/rsa-netwitness-logs-and-packets","@type":"ListItem"},{"name":"Lacework","position":19,"description":"Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud infrastructure, workloads, containers, and kubernetes environments. Lacework unified cloud security platform provides deep visibility, advanced anomaly detection, delivers one-click investigation with rich context, and simplifies cloud compliance through automation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2fe3cd8e-532c-4197-a6c6-a5f87c8393fc.png","url":"https://www.capterra.co.uk/software/182796/lacework","@type":"ListItem"},{"name":"Netacea Bot Management","position":20,"description":"Netacea’s advanced bot management solution provides industry leading real time bot protection & mitigation against the most sophisticated automated attacks. Ranked #1 for Bot Detection, our AI-powered technology analyzes all website, app and API traffic with a single agentless deployment, revealing malicious intent and autonomously preventing impact to your business without impacting the flow of genuine human traffic.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7fbf81c6-5592-420b-b7a4-1c1069353078.png","url":"https://www.capterra.co.uk/software/188458/https-www-netacea-com","@type":"ListItem"},{"name":"CipherBox","position":21,"description":"CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3ac5a950-92cf-4446-a3e2-67cc9efe2e12.png","url":"https://www.capterra.co.uk/software/211686/cipherbox","@type":"ListItem"},{"name":"CloudJacket MXDR","position":22,"description":"CloudJacket MXDR is a fully managed security platform that detects, investigates, and responds to threats across your entire environment. Real protection without the need to stitch together multiple tools, eliminating the burden of building or expanding an internal Security Operation Center. \n\nOur solution unifies EDR, ITDR, SIEM, and Cloud security into a single pane of glass, while our 24/7 U.S. based SOC does the work most “managed” providers leave to you. \n\nHigh-fidelity security where agentic AI handles the volume while human analysts validate every real threat. Our team proactively hunts for what automation misses and takes decisive action when it matters most. This approach enables rapid isolation of compromised systems, termination of malicious processes, and providing guided remediation with full incident context. \n\nWe operate as an extension of your team. One platform. One partner. Faster response times.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3cf5efe1-be3b-4c48-96cf-3f3e2b05e99e.jpeg","url":"https://www.capterra.co.uk/software/212808/cloudjacketx","@type":"ListItem"},{"name":"Critical Insight","position":23,"description":"Cybersecurity solutions that helps businesses detect and investigate threats in real-time to prepare and execute action plans.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7dca94cf-6beb-40ea-bbb6-2f02b95ac14c.png","url":"https://www.capterra.co.uk/software/213151/critical-insight","@type":"ListItem"},{"name":"Emsisoft Business Security","position":24,"description":"Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/097f5115-6b06-439a-87ee-4a2823d5d80a.png","url":"https://www.capterra.co.uk/software/213154/emsisoft-business-security","@type":"ListItem"},{"name":"Extended Threat Intelligence","position":25,"description":"Extended Threat Intelligence is a threat intelligence software that monitors the web to identify cyber threats. It detects leaked data, phishing domains, breaches, and fraud to help organizations mitigate risks. The software provides cyber threat intelligence, digital risk protection, and external attack surface management. It scans the deep and dark web along with thousands of other sources. The software aims to deliver actionable intelligence organizations can use to enhance security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7c993300-b9ba-4ce1-a8bc-ccaaeaa969aa.jpeg","url":"https://www.capterra.co.uk/software/214273/socradar","@type":"ListItem"}],"numberOfItems":25}
</script>
