---
description: Page 8 - Compare the best Threat Intelligence Tools in the UK. Capterra offers the most comprehensive reviews from verified users, prices, and a complete description of all relevant features. Use our filters to find the best rated software for your business needs.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 8 - Threat Intelligence Tools - Price Comparison & Reviews - Capterra UK 2026
---

Breadcrumb: [Home](/) > [Threat Intelligence Tools](https://www.capterra.co.uk/directory/32474/threat-intelligence/software) > [Page 8](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8)

# Threat Intelligence Tools

Canonical: https://www.capterra.co.uk/directory/32474/threat-intelligence/software

Page: 8 / 8\
Prev: [Previous page](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7)

> Threat intelligence software allows organizations to keep their security standards up-to-date with a near real-time view of the threat landscape by identifying and combatting new forms of malware as they emerge.

-----

## Products

1. [Edgewatch](https://www.capterra.co.uk/software/1071819/Edgewatch) (0 reviews) — Edgewatch is a platform for managing external attack surfaces, discovering, monitoring, analyzing, and securing internet assets.
2. [NordStellar](https://www.capterra.co.uk/software/1071868/NordStellar) (0 reviews) — NordStellar is a threat exposure management software that helps businesses identify and mitigate cyber threats.
3. [Tuskira](https://www.capterra.co.uk/software/1073664/Tuskira) (0 reviews) — A preemptive cyber defense and response platform that unifies and optimizes 150+ security tools into an AI-driven Security Mesh.
4. [Fidelis Endpoint](https://www.capterra.co.uk/software/1074788/Fidelis-Endpoint) (0 reviews) — Fidelis Endpoint is an endpoint detection and response solution that evaluates endpoint events to detect and stop cyberattacks.
5. [Defused](https://www.capterra.co.uk/software/1076863/Defused) (0 reviews) — Defused is a deception-based security software that detects and responds to cyber attacks while providing clear, actionable alerts.
6. [CYBERSPAN](https://www.capterra.co.uk/software/1077898/CYBERSPAN) (0 reviews) — CYBERSPAN is AI-enabled cybersecurity software that detects network anomalies to protect small-to-medium businesses from threats.
7. [ShadowPlex Advanced Threat Defense](https://www.capterra.co.uk/software/1078119/ShadowPlex-Advanced-Threat-Defense) (0 reviews) — ShadowPlex Advanced Threat Defense uses AI-driven deception technology to detect threats in their early stages.
8. [Unisys Cybersecurity](https://www.capterra.co.uk/software/1078530/Unisys-Cybersecurity) (0 reviews) — Cybersecurity solution that helps businesses protect digital assets, address threats, build trust, and ensure compliance.
9. [MINE2](https://www.capterra.co.uk/software/1078675/MINE2) (0 reviews) — We anticipate an intruder patiently. With threat intel collected on regular basis, mines are strategically placed in your environment.
10. [iDNA](https://www.capterra.co.uk/software/1078848/iDNA) (0 reviews) — iDNA is a threat intelligence platform delivering insights to help organizations prevent cyberattacks \&amp; protect their online reputation
11. [Vulseek](https://www.capterra.co.uk/software/1081646/Vulseek) (0 reviews) — Vulseek is a cybersecurity platform that scans, prioritizes, and manages potential threats to protect organizations from cyberattacks.
12. [OpenText Core EDR](https://www.capterra.co.uk/software/1081961/OpenText-Core-EDR) (0 reviews) — Built for MSPs, the cloud-based tool unifies endpoint protection, SIEM, SOAR, and alert triage to streamline multi-client security.
13. [OpenText Core MDR​](https://www.capterra.co.uk/software/1081962/OpenText-Core-MDR) (0 reviews) — Managed detection and response solution designed to enhance the organization's security posture with continuous threat monitoring.
14. [Menos AI](https://www.capterra.co.uk/software/1085439/Menos-AI) (0 reviews) — AI-native intelligence platform for asset managers that preserves institutional judgment so insight compounds across future decisions.
15. [Threat Landscape](https://www.capterra.co.uk/software/1089004/Threat-Landscape) (0 reviews) — Threat Landscape Platform automates research, linking OSINT and darknet signals to deliver threat intelligence insights.

-----

Page: 8 / 8\
Prev: [Previous page](https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=7)

## Related Categories

- [Cloud Security Software](https://www.capterra.co.uk/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.co.uk/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.co.uk/directory/30907/endpoint-protection/software)
- [Vulnerability Management Software](https://www.capterra.co.uk/directory/31062/vulnerability-management/software)
- [Network Security Software](https://www.capterra.co.uk/directory/30003/network-security/software)

## Links

- [View on Capterra](https://www.capterra.co.uk/directory/32474/threat-intelligence/software)
- [All Categories](https://www.capterra.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Capterra UK helps millions of people find the best business software. With software reviews, ratings, infographics, and the most comprehensive list of business software.","email":"info@capterra.co.uk","url":"https://www.capterra.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.co.uk/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra/","https://www.youtube.com/channel/UCEt7vQSPiPlPAblHdhJAqnA"]},{"name":"Capterra UK","url":"https://www.capterra.co.uk/","@id":"https://www.capterra.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Threat Intelligence Tools","description":"Page 8 - Compare the best Threat Intelligence Tools in the UK. Capterra offers the most comprehensive reviews from verified users, prices, and a complete description of all relevant features. Use our filters to find the best rated software for your business needs.","url":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8","about":{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8#itemlist"},"breadcrumb":{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8#breadcrumblist"},"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.capterra.co.uk/#website"},"inLanguage":"en-GB","mainEntity":{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8#itemlist"},"publisher":{"@id":"https://www.capterra.co.uk/#organization"}},{"@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Threat Intelligence Tools","position":2,"item":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software","@type":"ListItem"},{"name":"Page 8","position":3,"item":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 8 - Threat Intelligence Tools - Price Comparison &amp; Reviews - Capterra UK 2026","@context":"https://schema.org","@id":"https://www.capterra.co.uk/directory/32474/threat-intelligence/software?page=8#itemlist","@type":"ItemList","itemListElement":[{"name":"Edgewatch","position":1,"description":"Edgewatch is an attack surface management platform that helps organizations discover, monitor, and analyze internet-facing assets. The software continuously scans public IP addresses to reveal an organization's digital footprint, providing visibility into potential vulnerabilities before attackers can exploit them. Key capabilities include asset discovery, risk analysis, breach intelligence leveraging dark web data, and false positive filtering to streamline alert triage.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b753da50-7ac3-4659-b4d6-707bd362d4ca.png","url":"https://www.capterra.co.uk/software/1071819/Edgewatch","@type":"ListItem"},{"name":"NordStellar","position":2,"description":"NordStellar is threat exposure management software that helps businesses detect and respond to cyber threats before they escalate. The platform gives security teams visibility into cybercriminal activities so they can identify potential data leaks, reduce detection times, minimize risk, and safeguard corporate data. Key features include monitoring data breaches, preventing account takeovers, preventing session hijacking, and scanning the dark web to monitor enterprise-related threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f426de7-6b87-4e11-8b66-533a2c0fd8a5.jpeg","url":"https://www.capterra.co.uk/software/1071868/NordStellar","@type":"ListItem"},{"name":"Tuskira","position":3,"description":"Tuskira is a preemptive cyber defense and response platform that helps security teams navigate the chaos and technical debt caused by too many tools and too much noise. Rather than drowning in alerts or missing critical threats, Tuskira unifies data from all these tools into an AI-powered security data mesh. Our Agentic AI continuously analyzes this data, assesses the effectiveness of security controls, simulates attack paths, identifies real risks, and autonomously responds to protect against attacks. This means we validate that your controls can mitigate new and emerging threats while proactively fixing gaps in defenses before attackers can exploit them, reducing risk and enhancing your overall security posture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e59b643e-b25e-4092-89eb-85f54afd9aaf.jpeg","url":"https://www.capterra.co.uk/software/1073664/Tuskira","@type":"ListItem"},{"name":"Fidelis Endpoint","position":4,"description":"Fidelis Endpoint is an endpoint detection and response solution that monitors and evaluates endpoint events across Windows, Linux, and Mac systems to detect and stop attacks before they spread across networks. The software provides real-time visibility into on and off-grid endpoint activity to identify malicious behavior and accelerate response. By analyzing comprehensive information on running processes, installed software, known vulnerabilities, and system status, the solution can automate endpoint isolation and threat containment. Key capabilities include advanced threat detection, forensic investigation tools, deception technology, and integration with threat intelligence feeds. Fidelis Endpoint aims to stop sophisticated threats such as ransomware, malware, insider threats, and IoT device breaches at the endpoint before they compromise networks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f5a6c0f8-4928-49cb-b3e7-f74dc41d0f97.jpeg","url":"https://www.capterra.co.uk/software/1074788/Fidelis-Endpoint","@type":"ListItem"},{"name":"Defused","position":5,"description":"Defused is a deception-based cybersecurity software that creates decoy attack surfaces to detect threats early in the attack chain. The platform deploys across IT, OT, cloud, and legacy on-premise environments, providing alerts for vulnerability exploits, remote code execution attempts, malicious scans, and credential theft. Defused integrates with existing security tools including email systems, ticketing platforms, SIEM solutions, and EDR products to enable automated security responses. The system helps security operations reduce false positives and alert fatigue while improving threat detection accuracy. The software is packaged as a VM image that supports multiple decoys, with additional deployment options available for Windows and cloud providers. The platform delivers human-readable incident reporting and allows organizations to forward alert data to external tools for security response automation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6360c951-ec0f-4fab-a955-d91847216a1b.png","url":"https://www.capterra.co.uk/software/1076863/Defused","@type":"ListItem"},{"name":"CYBERSPAN","position":6,"description":"CYBERSPAN is a cybersecurity software that provides protection against malicious and anomalous activity across digital infrastructure. The system utilizes AI to help analyze network anomalies, detect unusual patterns, and identify potential risks in network traffic. CYBERSPAN features continuous monitoring capabilities with visibility into network activity, alerts for addressing vulnerabilities, and threat mapping for greater understanding. \n\nThe platform includes a traffic query function that allows security teams to search and analyze network traffic, a customizable dashboard for monitoring security operations, and detailed anomaly heatmaps with visualizations. CYBERSPAN offers deployment flexibility with on-premises, virtual, and cloud-hosted options that can integrate with existing systems without disrupting operations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fd3b9650-03ff-463c-8cd5-9a2a20524342.png","url":"https://www.capterra.co.uk/software/1077898/CYBERSPAN","@type":"ListItem"},{"name":"ShadowPlex Advanced Threat Defense","position":7,"description":"ShadowPlex Advanced Threat Defense is a cybersecurity software that combines deception technology with artificial intelligence to detect advanced persistent threats. The system deploys prebuilt deceptions across IT, OT, and cloud environments to identify credential misuse and lateral movement attempts. ShadowPlex operates without agents, mapping detected activities to MITRE ATT&CK techniques for investigation and defensive improvements. The platform detects early attacker behaviors including reconnaissance, credential harvesting, and lateral movement before security incidents escalate. The software adapts deception coverage during operations, forcing attackers to reveal tactics while breaking their attack chains.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a9efc218-91de-4ca2-80f1-4c1a4bab6062.jpeg","url":"https://www.capterra.co.uk/software/1078119/ShadowPlex-Advanced-Threat-Defense","@type":"ListItem"},{"name":"Unisys Cybersecurity","position":8,"description":"Unisys Cybersecurity is an endpoint detection and response solution that helps businesses protect digital assets by addressing threats and ensuring compliance. It enables teams to secure infrastructure, applications, and data through layered defenses.\n\nSecurity transformation supports teams with audits, assessments, and consulting. Administrators can use the continuous threat exposure management tool to identify vulnerabilities and mitigate risks. Digital identity and access management offers passwordless access, single sign-on, and role-based controls. Operators can utilize secure network access functionality to streamline zero trust architecture and microsegmentation. Its managed detection and response functionality provides monitoring, threat detection, and incident response. Supervisors can restore critical assets after ransomware attacks with advanced storage vaults and automated backup testing.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ab3497e9-7010-4b2b-bf42-3653304b0d39.jpeg","url":"https://www.capterra.co.uk/software/1078530/Unisys-Cybersecurity","@type":"ListItem"},{"name":"MINE2","position":9,"description":"The Digital Landmines for proactive detection. Lightweight, sneaky, agentless and indistinguishable mines which are strategically placed using smart algorithm in your environment on various layers. These trigger on slightest attacker footstep and are dormant until then. It features precision detection, AI analytics, real-time response, and eliminates false positives. Protecting repositories, Active Directory, servers, hosts, Clouds and IoT devices, MINE2 secures beyond endpoints.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/411f266a-b6c8-4491-ab26-af7b58922f3e.jpeg","url":"https://www.capterra.co.uk/software/1078675/MINE2","@type":"ListItem"},{"name":"iDNA","position":10,"description":"iDNA is a threat intelligence platform that aggregates and analyzes data from open-source intelligence, dark web sources, and proprietary telemetry to provide actionable insights for organizations. The platform features multiple specialized modules including Brand Reputation & Identity Protection, Executive Digital Footprint Monitoring, and Attack Surface Management. iDNA offers domain permutation alerts to detect lookalike domains, account takeover monitoring to track compromised credentials, social media impersonation detection to identify fraudulent profiles, threat activity scanning for efficient intelligence research, and indicators of compromise submission capabilities. The system helps organizations prevent account takeovers, protect brand reputation, monitor evolving attack surfaces, and identify threats early through its comprehensive data collection and analysis framework.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/225f5abd-bf2f-4f20-b57a-e1bc45522bf1.png","url":"https://www.capterra.co.uk/software/1078848/iDNA","@type":"ListItem"},{"name":"Vulseek","position":11,"description":"Vulseek is a vulnerability management software that provides continuous scanning and monitoring of IT environments to identify security flaws. The system detects vulnerabilities across multiple asset types including IP addresses, domains, web applications, and networks, organizing findings by priority to streamline remediation efforts. \n\nVulseek incorporates international security standards such as CVE, CWE, CPE, CVSS, EPSS, and OWASP to categorize vulnerabilities. The platform includes features for team collaboration, allowing administrators to assign vulnerabilities to specific team members for correction while generating dynamic reports. The software scans systems continuously, delivers initial results within minutes, identifies exposed services, detects active hostnames, catalogs technologies used in applications, and manages findings to eliminate false positives, all from a single consolidated tool.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c935b22b-570b-42a5-90c7-6cd862dab391.png","url":"https://www.capterra.co.uk/software/1081646/Vulseek","@type":"ListItem"},{"name":"OpenText Core EDR","position":12,"description":"OpenText Core EDR Smarter endpoint detection and response for faster, easier protection\nKeep endpoints secure with a single EDR solution that combines endpoint protection, SIEM, and SOAR with global threat intelligence.\n\nEndpoint detection and response software that unifies endpoint protection, SIEM, and SOAR capabilities in a unified platform. The system correlates endpoint, network, and identity events to provide threat visibility while automating containment and remediation through playbooks. It features vulnerability assessment that detects risks from unpatched software using CVE standards and offers real-time monitoring powered by continuously updated threat intelligence. The software includes extensive integrations with IT, security, network, cloud, and PSA tools through syslog and API connections.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2755ebf8-676e-41a8-a01d-03070a723fb1.jpeg","url":"https://www.capterra.co.uk/software/1081961/OpenText-Core-EDR","@type":"ListItem"},{"name":"OpenText Core MDR​","position":13,"description":"OpenText™ Core MDR Managed Detection and Response (MDR) offers a powerful solution designed to enhance your organization's security posture. Our MDR service leverages your existing endpoint security solutions and over 500 integrations to provide continuous monitoring, alerts, and effective incident response. The solution is co-managed, ensuring your IT team has visibility to everything while leveraging the expert guidance from OpenText MDR's SOC team.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/72398914-f764-4846-bbae-f7aa8b20ee5f.png","url":"https://www.capterra.co.uk/software/1081962/OpenText-Core-MDR","@type":"ListItem"},{"name":"Menos AI","position":14,"description":"Menos AI is an AI native intelligence platform for asset managers and hedge funds that captures research context, decision rationale, and evolving conviction so teams can understand not just what happened, but why it mattered. \n\nMenos AI is SOC 2 compliant and designed to meet the security and governance requirements of institutional investment firms.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e8aeadd5-9baf-490f-a122-9ba16987c144.jpeg","url":"https://www.capterra.co.uk/software/1085439/Menos-AI","@type":"ListItem"},{"name":"Threat Landscape","position":15,"description":"Threat Landscape is an automated threat intelligence platform built for security analysts and SOC teams who need high-confidence, actionable intelligence — without the manual triage.\nThe platform continuously ingests and processes global OSINT and darknet sources, automatically extracting structured facts and filtering out noise before it reaches analysts. All intelligence is normalized into STIX 2.1 format, MITRE ATT&CK mapped, and correlated across threat actors, malware families, CVEs, TTPs, and IOCs — so teams spend time acting on intelligence, not building it.\nKey capabilities include interactive dashboards, visualized STIX threat graphs, advanced search and filtering, darknet monitoring for leak-site claims and criminal chatter, automated daily and weekly digests, and a RESTful API for integration with SIEM, SOAR, and TIP platforms.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/37f40898-a673-48b3-b245-95a5066f238d.png","url":"https://www.capterra.co.uk/software/1089004/Threat-Landscape","@type":"ListItem"}],"numberOfItems":15}
</script>
