---
description: Page 7 - Compare the best Threat Intelligence Tools in the UK. Capterra offers the most comprehensive reviews from verified users, prices, and a complete description of all relevant features. Use our filters to find the best rated software for your business needs.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 7 - Threat Intelligence Tools - Price Comparison & Reviews - Capterra UK 2026
---

Breadcrumb: [Home](/) > [Threat Intelligence Tools](https://www.capterra.co.uk/directory/32474/threat-intelligence/software) > [Page 7](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7)

# Threat Intelligence Tools

Canonical: https://www.capterra.co.uk/directory/32474/threat-intelligence/software

Page: 7 / 8\
Prev: [Previous page](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=6)\
Next: [Next page](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8)

> Threat intelligence software allows organizations to keep their security standards up-to-date with a near real-time view of the threat landscape by identifying and combatting new forms of malware as they emerge.

-----

## Products

1. [Cisco Secure Network Analytics](https://www.capterra.co.uk/software/1023862/cisco-secure-network-analytics) (0 reviews) — Network visibility solution that allows businesses to detect advanced threats and quickly respond to them.
2. [NexVision Engine](https://www.capterra.co.uk/software/1025062/nexvision-engine) (0 reviews) — NexVision Engine is an AI-enabled open-source intelligence (OSINT) solution that provides real-time intelligence of the web.
3. [Appdome](https://www.capterra.co.uk/software/1028023/appdome) (0 reviews) — Appdome is used to build runtime application self-protection (RASP), and mobile fraud prevention into Android and iOS mobile apps.
4. [IBM Cloud Pak for Security](https://www.capterra.co.uk/software/1028936/ibm-cloud-pak-for-security) (0 reviews) — Open security platform that provides threat intelligence insights to mitigate risks and accelerate incident response.
5. [ThreatKey](https://www.capterra.co.uk/software/1031614/threatkey) (0 reviews) — A security solution that helps manage cloud and SaaS security posture.
6. [SiON](https://www.capterra.co.uk/software/1032700/sion) (0 reviews) — Threat intelligence gathers and analyzes data on cyber threats, enabling organizations to anticipate attacks and strengthen defenses.
7. [Netwrix Threat Manager](https://www.capterra.co.uk/software/1033363/netwrix-stealthdefend) (0 reviews) — Spot and thwart attacks to Active Directory and data before they turn into full-fledged breaches.
8. [Microsoft Defender Threat Intelligence](https://www.capterra.co.uk/software/1035282/microsoft-defender-threat-intelligence) (0 reviews) — Dynamic threat intelligence solution that allows organizations to detect and identify attackers and potential threat exposures.
9. [Lens](https://www.capterra.co.uk/software/1036342/lens) (0 reviews) — A powerful Natural Language Processing engine that transforms raw data from digital content into actionable threat intelligence.
10. [Cyber Risk Monitoring](https://www.capterra.co.uk/software/1036623/cyber-risk-monitoring) (0 reviews) — Cyber Risk Monitoring is a cloud-based risk assessment and management solution that offers daily updates, security scoring and more.
11. [IPLocate](https://www.capterra.co.uk/software/1041052/iplocate) (0 reviews) — Fast, reliable IP address geolocation \&amp; threat data API and database
12. [Cerberus](https://www.capterra.co.uk/software/1043665/cerberus) (0 reviews) — A powerful investigation platform for uncovering criminal activity on the deep and dark web. Criminals using the dark web think you can
13. [SAS Fraud, AML & Security Intelligence](https://www.capterra.co.uk/software/1044455/fraud-aml-security-intelligence) (0 reviews) — Suite of software solutions designed to protect organizations from financial fraud, money laundering, and other security threats.
14. [Mitiga](https://www.capterra.co.uk/software/1044415/mitiga) (0 reviews) — Mitiga helps companies prepare for cloud and SaaS application breaches before they happen, and get back to business in record time.
15. [Logically Intelligence](https://www.capterra.co.uk/software/1048547/logically-intelligence) (0 reviews) — Detect emerging narrative threats and coordinated behaviour shaping geopolitical, organisational, or reputational outcomes.
16. [Seerist](https://www.capterra.co.uk/software/1051870/seerist) (0 reviews) — Businesses monitor risk indicators and identify emerging issues using our AI-powered threat intelligence tool with unified interface.
17. [neosec](https://www.capterra.co.uk/software/1051886/neosec) (0 reviews) — Neosec offers comprehensive visibility, behavioral analytics, and threat prevention capabilities to safeguard API estates.
18. [Visiativ Cyber](https://www.capterra.co.uk/software/1055101/visiativ-cyber-waf) (0 reviews) — Visiativ Cyber protects and secures all your web applications Block 100% of cyber threats immediately with AI, without any intervention
19. [JOUO](https://www.capterra.co.uk/software/1055403/jouo) (0 reviews) — Cybersecurity monitoring AI tool that enables businesses to identify and respond to vulnerabilities in their web infrastructure.
20. [Insights](https://www.capterra.co.uk/software/1056288/inquest-insights) (0 reviews) — Threat Intelligence and incident response security services that protect you from attacks before public disclosure reveals the risk.
21. [Digital Armor](https://www.capterra.co.uk/software/1060192/digital-armor) (0 reviews) — SaferCore's Digital Armor provides mobile applications with a security shield without any code, SDK, or servers
22. [Vortex](https://www.capterra.co.uk/software/1061624/vortex) (0 reviews) — Cybersecurity platform with file simulation, AI-powered threat prevention, and file sanitization capabilities.
23. [Cyble Vision](https://www.capterra.co.uk/software/1061748/cyble-vision) (0 reviews) — Cyble Vision is an AI-powered threat intelligence platform designed to proactively monitor, analyze, and mitigate cyber risks.
24. [blacklens.io](https://www.capterra.co.uk/software/1062564/blacklens-io) (0 reviews) — blacklens.io is a cybersecurity solution that helps users monitor attack surfaces, scan vulnerabilities, respond to threats, and more.
25. [Pendulum](https://www.capterra.co.uk/software/1066918/pendulum) (0 reviews) — Pendulum is an threat intelligence platform that provides insights into video, audio, image, and text content.

-----

Page: 7 / 8\
Prev: [Previous page](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=6)\
Next: [Next page](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8)

## Related Categories

- [Cloud Security Software](https://www.capterra.co.uk/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.co.uk/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.co.uk/directory/30907/endpoint-protection/software)
- [Vulnerability Management Software](https://www.capterra.co.uk/directory/31062/vulnerability-management/software)
- [Network Security Software](https://www.capterra.co.uk/directory/30003/network-security/software)

## Links

- [View on Capterra](https://www.capterra.co.uk/directory/32474/threat-intelligence/software)
- [All Categories](https://www.capterra.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Capterra UK helps millions of people find the best business software. With software reviews, ratings, infographics, and the most comprehensive list of business software.","email":"info@capterra.co.uk","url":"https://www.capterra.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.co.uk/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra/","https://www.youtube.com/channel/UCEt7vQSPiPlPAblHdhJAqnA"]},{"name":"Capterra UK","url":"https://www.capterra.co.uk/","@id":"https://www.capterra.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Threat Intelligence Tools","description":"Page 7 - Compare the best Threat Intelligence Tools in the UK. Capterra offers the most comprehensive reviews from verified users, prices, and a complete description of all relevant features. Use our filters to find the best rated software for your business needs.","url":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7","about":{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7#itemlist"},"breadcrumb":{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7#breadcrumblist"},"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.capterra.co.uk/#website"},"inLanguage":"en-GB","mainEntity":{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7#itemlist"},"publisher":{"@id":"https://www.capterra.co.uk/#organization"}},{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Threat Intelligence Tools","position":2,"item":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software","@type":"ListItem"},{"name":"Page 7","position":3,"item":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 7 - Threat Intelligence Tools - Price Comparison &amp; Reviews - Capterra UK 2026","@context":"https://schema.org","@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7#itemlist","@type":"ItemList","itemListElement":[{"name":"Cisco Secure Network Analytics","position":1,"description":"Network visibility solution that allows businesses to detect advanced threats and quickly respond to them.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/91b23207-b6bf-4208-b71e-ff70d6e76b75.jpeg","url":"https://www.capterra.co.uk/software/1023862/cisco-secure-network-analytics","@type":"ListItem"},{"name":"NexVision Engine","position":2,"description":"NexVision Engine is an AI-enabled open-source intelligence (OSINT) solution that provides real-time intelligence of the whole web (Clear Web, Dark Web and Social Media). Used for background checks, due-diligence, customer on-boarding compliance (KYC/AML/CFT), gathering organization intelligence, third party intelligence, cyber threat intelligence, or even to research cryptocurrency addresses.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1d951175-1f07-4853-ba23-ba73dedff4c8.png","url":"https://www.capterra.co.uk/software/1025062/nexvision-engine","@type":"ListItem"},{"name":"Appdome","position":3,"description":"Appdome is used to build runtime application self-protection (RASP), and mobile fraud prevention into Android and iOS mobile apps","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3b6b2ae6-5223-4826-ab7c-6b89c73798ad.jpeg","url":"https://www.capterra.co.uk/software/1028023/appdome","@type":"ListItem"},{"name":"IBM Cloud Pak for Security","position":4,"description":"IBM Cloud Pak for Security is an open security platform that provides threat intelligence insights to mitigate risks and accelerate incident response. With an AI-enabled unified dashboard, this platform is designed to protect data, manage users, and contain threats. To assist in prioritization, this solution can provide customized scoring, automatically create cases, and search across data sources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/616b6bf5-d6c1-4765-9c5d-4525cbf774b4.jpeg","url":"https://www.capterra.co.uk/software/1028936/ibm-cloud-pak-for-security","@type":"ListItem"},{"name":"ThreatKey","position":5,"description":"ThreatKey is a cloud security solution that helps you manage your cloud and SaaS security posture. By collecting data from your cloud environment and your various SaaS applications, ThreatKey provides actionable alerts that help you investigate and respond to potential misconfigurations. In less than 10 minutes, ThreatKey can begin scanning your infrastructure and checking for misconfigurations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f50e63d2-a03f-45f4-95ca-0ab133cb8889.jpeg","url":"https://www.capterra.co.uk/software/1031614/threatkey","@type":"ListItem"},{"name":"SiON","position":6,"description":"Threat intelligence is the process of collecting, analyzing, and interpreting information about current and emerging cyber threats to help organizations anticipate, prepare for, and defend against potential attacks. It draws from diverse sources such as dark web monitoring, malware analysis, threat actor tracking, and global intelligence feeds to provide actionable insights. By understanding who the attackers are, what methods they use, and which assets they target, organizations can prioritize defenses, patch vulnerabilities, and deploy security measures more effectively. Threat intelligence not only strengthens an organization’s ability to detect and prevent attacks but also enhances incident response by enabling faster, more targeted actions when threats occur. In a constantly evolving digital landscape, where cybercriminals adapt quickly and exploit new vulnerabilities, high-quality threat intelligence is essential for staying one step ahead.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/06c03526-71fe-42ad-8be5-a099c6740a91.jpeg","url":"https://www.capterra.co.uk/software/1032700/sion","@type":"ListItem"},{"name":"Netwrix Threat Manager","position":7,"description":"Netwrix Threat Manager (formerly StealthDEFEND) protects your critical Active Directory and file system data by catching even highly sophisticated attacks in their early stages, responding automatically, and quickly getting the full insight required to recover and strengthen your defenses.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e7c0d412-6957-4507-8b77-d31a2c54924c.png","url":"https://www.capterra.co.uk/software/1033363/netwrix-stealthdefend","@type":"ListItem"},{"name":"Microsoft Defender Threat Intelligence","position":8,"description":"Microsoft Defender Threat Intelligence is a cyberthreat intelligence platform from Microsoft that helps security professionals analyze and act on signals collected across the global internet. The solution provides visibility into the infrastructure and connections of cyberthreat actors to uncover an organization's external attack surface and enable investigation of tools and systems used in security incidents.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4a3b0288-133c-4956-a8d9-90a5f54d1c3e.png","url":"https://www.capterra.co.uk/software/1035282/microsoft-defender-threat-intelligence","@type":"ListItem"},{"name":"Lens","position":9,"description":"Anomali Lens is an advanced plugin that uses Natural Language Processing (NLP) to automatically scan and identify threat data in any web-based content (Chrome, Firefox, Edge, Office 365 (Outlook, Word, Excel), and PDFs.\n \nLens automates threat research activities to identify threat intelligence within unstructured data in seconds. – and operationalizes it into actionable intelligence for containing and resolving threats as they arise.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bd0e705c-6be9-47fa-b81b-5583d32414bf.jpeg","url":"https://www.capterra.co.uk/software/1036342/lens","@type":"ListItem"},{"name":"Cyber Risk Monitoring","position":10,"description":"Cyber Risk Monitoring is a cloud-based risk assessment and management solution that offers daily updates, security scoring, risk dashboards, customized views and more. The solution also offers a portfolio management that allows users to view and manage the executive summary of their affiliates and subsidiaries.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6a8d8ca9-91bc-4bcf-8a23-c7cc1fd62f17.png","url":"https://www.capterra.co.uk/software/1036623/cyber-risk-monitoring","@type":"ListItem"},{"name":"IPLocate","position":11,"description":"IPLocate provides comprehensive IP address geolocation and threat intelligence data. Thousands of business - from startups to enterprise -  for thousands of businesses from startups to enterprise.\n\nIPLocate's advanced infrastructure processes terabytes of data each month, and our geolocation API serves billions of monthly requests.  \n\nDiscover the power of IP address data at IPLocate.io","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/39258d6e-b375-40a5-929e-a98dae532cb9.png","url":"https://www.capterra.co.uk/software/1041052/iplocate","@type":"ListItem"},{"name":"Cerberus","position":12,"description":"Adversaries using the dark web think you can’t see them, with Cerberus you can. Identify and preserve dark web evidence on drugs, arms, CSEA, and ransomware.\n\nTrusted globally by law enforcement and government agencies, Cerberus uses proprietary techniques developed by world-leading researchers to deliver the most comprehensive dark web dataset on the market, providing access to intelligence that was previously unobtainable.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2c1d66f3-f532-455c-ba43-74e0432c8b6e.jpeg","url":"https://www.capterra.co.uk/software/1043665/cerberus","@type":"ListItem"},{"name":"SAS Fraud, AML & Security Intelligence","position":13,"description":"Fraud, AML & Security Intelligence is a suite of software solutions designed to proactively protect organizations from fraud, money laundering, and other security threats. Powered by AI, machine learning, and advanced analytics, these solutions can be used to detect fraudulent payments, reduce CFT compliance risk, prevent identity and digital fraud, plus more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/09b0b674-158d-4b33-8688-4ea92b20f185.jpeg","url":"https://www.capterra.co.uk/software/1044455/fraud-aml-security-intelligence","@type":"ListItem"},{"name":"Mitiga","position":14,"description":"At Mitiga, we're the incident response experts for cloud and SaaS, delivering next-gen solutions to supercharge your investigation and recovery. Our IR2 platform provides a single source for instant, breach-related insights and investigation orchestration, as well as conducting ongoing cloud and SaaS threat hunts based on our Cloud Attack Scenario Library (CASL). Plus, when breaches occur, our customers receive unlimited support from Mitiga's elite cloud incident response teams.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a4bd582a-c879-4bce-93e1-d3317de97d08.jpeg","url":"https://www.capterra.co.uk/software/1044415/mitiga","@type":"ListItem"},{"name":"Logically Intelligence","position":15,"description":"Logically Intelligence brings narrative intelligence to threat workflows, helping organisations understand how online behaviour shapes real-world outcomes. PRISMα maps narrative evolution, distinguishes organic activity from coordinated patterns, and highlights where attention or influence is accelerating. This gives analysts and operational teams clear visibility into emerging threats tied to reputation, policy, regional stability, or organisational integrity. Explorer views, network mapping, and expert agents help users interpret the environment, identify actors, evaluate scenarios, and brief leadership with precision. The platform reduces noise, accelerates assessments, and strengthens preparedness for teams responsible for protecting institutions, communities, and strategic missions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b5fd34fe-4866-4eb6-a2be-8e75205200ad.jpeg","url":"https://www.capterra.co.uk/software/1048547/logically-intelligence","@type":"ListItem"},{"name":"Seerist","position":16,"description":"Leverage a powerful combination of human and artifical intelligence to see clearly in all directions today and peer into tomorrow. Seerist is the only threat intelligence platform that combines adaptive artificial intelligence with localized geopolitical risk expertise so risk and security professionals can sift through global chatter, forecast potential threats and offer strategic insights. Our robust solution supports rapid, reliable decision making that protects operations, assets and people.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3e72e9e5-0289-41cb-8989-f66b5ffa0d9a.jpeg","url":"https://www.capterra.co.uk/software/1051870/seerist","@type":"ListItem"},{"name":"neosec","position":17,"description":"Neosec is an API security platform that is reinventing the way businesses protect their APIs. With its powerful SaaS platform, Neosec offers comprehensive visibility, behavioral analytics, and threat prevention capabilities to safeguard API estates. Experience the future of API security with Neosec.\n\nNeosec's advanced SaaS platform allows security professionals to gain deep insights into the behavior of their APIs. Built for organizations that expose APIs to partners, suppliers, and users, Neosec discovers all your APIs, analyzes their behavior, and proactively identifies and stops lurking threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f4306a67-6425-4188-b1e1-ef4fd22a8cb3.jpeg","url":"https://www.capterra.co.uk/software/1051886/neosec","@type":"ListItem"},{"name":"Visiativ Cyber","position":18,"description":"Visiativ Cyber protects and secures all your web applications\nBlock 100% of cyber threats immediately with AI, without your intervention and before they even reach your servers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ee64af46-846f-4590-9d66-06298bcf50e2.jpeg","url":"https://www.capterra.co.uk/software/1055101/visiativ-cyber-waf","@type":"ListItem"},{"name":"JOUO","position":19,"description":"Your Website Compliance Audit\nJOUO gives you insights into the security of your website and whether it fulfills general legal requirements. \nWant to see what hackers see? -> We use publicly accessible data for the analysis (like hackers do). \nWe not only provide you with this data in a clearly organized format, we also explain it to you. You also receive specific recommendations for action if weaknesses are found. \nJOUO allows you to monitor and improve the compliance of your website - without any IT knowledge.\n\n\nMade in Germany by ourselves. \nYou can try it free of charge by using this link: jouo.de/en/about-jouo\n\nPricing: Basic package: 39.90 euros net/monthly, incl. 10 IP addresses and one monthly scan. Further packages on request, incl. reseller packages.\n\nSeparately available: GDPR requirement: Automated! production of TOM documentation per IP.  Manually creating a TOM can take days. With JOUO: done with a click!","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ca7b09b1-5c8f-4bfa-873d-c6da32d45641.jpeg","url":"https://www.capterra.co.uk/software/1055403/jouo","@type":"ListItem"},{"name":"Insights","position":20,"description":"Leverage InQuest Threat Intelligence services to reduce time spent performing manual threat research. Improve your ability to predict, prevent, detect, prevent, hunt, and respond to emerging threats targeting your organization.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/46882a36-b2aa-48ec-9f46-06dc82305f92.jpeg","url":"https://www.capterra.co.uk/software/1056288/inquest-insights","@type":"ListItem"},{"name":"Digital Armor","position":21,"description":"SaferCore's Digital Armor is a cloud based solution that provides cybersecurity for mobile applications. It offer security and hardening for mobile applications by eliminating threats without code or SDK implementation. \nThere are multiple security features to choose from, such as root and VPN detection, and they are always updated to cater for the latest emerging operating systems and threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/458f5b7b-29c3-4ba8-8981-557d8e168978.webp","url":"https://www.capterra.co.uk/software/1060192/digital-armor","@type":"ListItem"},{"name":"Vortex","position":22,"description":"Cyberstanc Vortex enhances secure data transfer with Simulation Intelligence and Signature-less detection, addressing current solution limitations. Its \"Report, Remove, and Sanitize\" feature ensures comprehensive protection. Notably, it excels in detection accuracy, reducing artifacts for sandboxing, saving time, and minimizing false positives. Using metadata and file relationships, Vortex's simulation intelligence offers detailed malware insights.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/03c937a0-4d54-49f3-81fe-d1c2614b6bb3.jpeg","url":"https://www.capterra.co.uk/software/1061624/vortex","@type":"ListItem"},{"name":"Cyble Vision","position":23,"description":"Cyble Vision is an AI-powered threat intelligence platform that provides actionable insights to protect your organization from emerging cyber threats. Designed for businesses of all sizes, it leverages Gen 3 AI capabilities to proactively monitor, analyze, and mitigate risks from digital threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8892ce00-0f24-484f-b813-ca8bb048f1f8.jpeg","url":"https://www.capterra.co.uk/software/1061748/cyble-vision","@type":"ListItem"},{"name":"blacklens.io","position":24,"description":"blacklens.io combines state-of-the-art penetration testing with proactive techniques such as Darknet monitoring, Attack Surface Management, and Vulnerability Scanning. This comprehensive strategy allows us to identify potential attack points early on. As a result, we can not only detect but also actively prevent costly cyber incidents.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7349a802-dd6f-4ba1-ac80-24f92aa6a7bb.png","url":"https://www.capterra.co.uk/software/1062564/blacklens-io","@type":"ListItem"},{"name":"Pendulum","position":25,"description":"Pendulum is a threat intelligence platform that provides key insights into target audience, communities, and influencers within YouTube, TikTok, Instagram, Snapchat and more. Offering unmatched data coverage, Pendulum ensures that organizations do not have any blind spots across video, audio, images, and text content.\n\nPendulum's horizon scanning capabilities track online communications, allowing organizations to anticipate threats and how to effectively respond to them. Pendulum actively gathers data from over 20 platforms daily, with data archives spanning as much as the past three years for some covered platforms. Designed for use and flexibility, Pendulum operates across 75 different languages, supporting both search and result translation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bf3c1511-0d3f-420c-8717-4e69827444fe.png","url":"https://www.capterra.co.uk/software/1066918/pendulum","@type":"ListItem"}],"numberOfItems":25}
</script>
