Browse Software
List Your Product
Loading...
Showing 1 - 20 of 30 Products

Top 10 McAfee Threat Intelligence Exchange Alternatives

Revbits Cyber Intelligence Platform logo
A Cyber Intelligence Platform Write a Review
Visit Website

RevBits Cyber Intelligence Platform used to measure the threat intelligence for business. The software offers security tools and intelligence sharing across solutions results for proactive defense from threats. Access all modules through a single sign-on portal and collect threat intelligence which becomes immediately actionable. Display all active alerts in the XDR environment and monitor Critical Security Statistics via dashboard.

Read more Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
ContraForce logo
Autonomous Cybersecurity Operations Write a Review
Visit Website

ContraForce supplement existing security tools and provides comprehensive visibility and control across the entire organization. It reduces the customer burden and the risk factor as well. It integrates with famous tools like Azure, Cisco, Forcepoint and much more.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
ThreatConnect Threat Intelligence Platform (TIP) logo
Analyze Threat in Minutes Write a Review
Visit Website

ThreatConnect Threat Intelligence Platform is a software used to centralize the aggregation and management of threat data. The intel-driven automation, orchestration, and response used to automate processes for dynamic decision-making. Export Threat Intelligence Reports and share the information with teams to manage organizations stay up to date on relevant threats.

Read more Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
Radar By Onsecurity logo
Thread Intelligence and Attack Monitoring Software Write a Review
Visit Website

Radar is the perfect addition to the customer for security and threat assessment system, giving businesses the critical threat intelligence they need to stay secure. With data sourced from across the web and the dark web, Radar provides users with an all-encompassing approach to data gathering and intelligence gathering. As the web changes and threats evolve, Radar is able to keep up, equipping businesses with knowledge that will help them identify possible areas of exposure or risk earlier than ever before. With timely, accurate, and up-to-date intelligence on potential threats, Radar gives the ability to quickly assess the risk that may be posed by a given attack, and act accordingly. Radar provides an unparalleled level of security and protection against potential threats, giving the peace of mind to focus on the other tasks and objectives that need to be attended to. Keep organization secure with Radar.

Read more Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
SolarWinds MSP Risk Intelligence logo
MSP Risk Intelligence Software | SolarWinds MSP Write a Review
Visit Website

Risk intelligence software designed to help you build a strong business case for data protection, and prioritize work on the most pressing security problems.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website

Products Similar to McAfee Threat Intelligence Exchange

Digital Vaccine Labs logo
Threat Intelligence | Digital Vaccine® | ThreatLinQ Write a Review
Visit Website

Learn about Threat Intelligence by Trend Micro, which offers virtual patching, threat prevention, customized security, and real-time analysis.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
SOCRadar ThreatFusion logo
ThreatFusion: Cyber Threat Intelligence | SOCRadar® Cyber Intelligence Inc. Write a Review
Visit Website

SOCRadar® Cyber Intelligence Inc. | ThreatFusion: Cyber Threat Intelligence

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
RiskIQ PassiveTotal logo
Thread Detection and Investigation Software Write a Review
Visit Website

Assess incidents and indicators of compromise within your networks by viewing multiple critical data sets in an easy to use visual interface with PassiveTotal by RiskIQ.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
Bitdefender Advanced Threat Intelligence logo
Advanced Threat Intelligence | Bitdefender Enterprise Write a Review
Visit Website

Advanced Threat Intelligence delivers top-rated cybersecurity real-time data and insights from one of the largest cyber threats knowledge base - Bitdefende's Global Protective Network.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
Cisco Talos logo
Cisco Talos - Threat Intelligence Research Team Write a Review
Visit Website

What is Cisco Talos? This threat intelligence team makes the Internet safer. Learn how Talos researchers develop new threat intelligence and discover emerging threats.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
IBM X-Force Exchange logo
IBM X-Force Exchange - Overview Write a Review
Visit Website

IBM X-Force Exchange is a cloud-based threat intelligence sharing platform that enables users to research threats, collaborate with peers and take action.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
Pulsedive logo
Platform - Pulsedive Write a Review
Visit Website

Pulsedive is currently consuming over 40 OSINT feeds, equating to over one million IPs, domains, and URLs. A dedicated solution is available for enterprise customers.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
Sensity logo
Identity verification and anti-fraud software powered by AI Write a Review
Visit Website

Sensity's online ID Authentication makes your company's customer onboarding process more safe and efficient. Sensity AI technologies detect fraudsters and onboard legitimate clients in a matter of seconds. When spoofing signals are discovered, our systems can guarantee automatic rejections. There is no need for human interaction. The process is completely automated. We can reliably execute document authentication and electronic age verification using machine learning and computer vision. Customer due diligence in many businesses still involves JPG and PDF documents that human operators struggle to manually verify. You can automate the entire process and boost your fraud detection performance with Sensity. Validate legitimate documents in seconds and only identify dubious materials. For visual verification, human operators are relieved of more than 98 percent of their existing effort. With our automated review process, you may increase your onboarding capacity without increasing your operational expenditures. Get access to our API or have it installed on your own server. The market-leading solution to combat identity fraud is Sensity's unique AI-based technology. All of your KYC activities can be managed through a single web interface, and all user activity can be tracked effortlessly. Analyze spoofing tendencies and maintain track of all fraud attempts that are discovered.

Read more Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
Proofpoint Emerging Threats Intelligence logo
Emerging Threats Intelligence | Proofpoint US Write a Review
Visit Website

Rich Threat Intelligence andContext Portal Knowing what types of threats exist is no longer enough to protect your people, data, and brand. Emerging Threat (ET)…

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
Palo Alto Networks AutoFocus logo
AutoFocus - World’s highest-fidelity Contextual Threat Intelligence Write a Review
Visit Website

AutoFocus is the one-stop-shop for the world’s highest-fidelity threat intelligence. Teams can achieve instant understanding of every event with unrivaled intel sources and hand-curated context from Unit 42 threat experts. Analysts can significantly speed all aspects of prevention, investigation and response with rich context embedded in all their existing tools.

Read more Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
IntSights Threat Intelligence Platform (TIP) logo
Learn about IntSights Threat Intelligence Platform (TIP) Write a Review
Visit Website

IntSights is the leading external threat intelligence and protection platform, designed to neutralize threats outside the wire. The founders are veterans of elite Israeli military intelligence units, where they acquired a deep understanding of the hacker mindset.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
DigitalStakeout Scout logo
Curate security and risk intelligence | DigitalStakeout Scout™ Write a Review
Visit Website

Security and risk professionals choose DigitalStakeout Scout™ to aggregate & curate intelligence from the Web and their data over any tool.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
ThreatCloud IntelliStore logo
Threat Intelligence & Research | Check Point Software Write a Review
Visit Website

Threat Intelligence from Check Point provides the best data to identify and prevent all cyber threats that currently or will soon target your organization.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
ESET Threat Intelligence logo
ESET Threat Intelligence Write a Review
Visit Website

Discover the service portfolio of ESET, one of the leading IT security companies to protect your IT infrastructure.

Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
NVADR logo
Asset Discovery Beyond Subdomains Write a Review
Visit Website

Comprehensively discover your Internet Facing Assets using the Asset Discover Platform, NVADR. Identify verified and correlated shadow IT hosts along with their detailed profile. Easily track your assets in a Centrally Managed Inventory complimented with auto-tagging and assets classification. Get notification of newly discovered assets as well as attack vectors affecting your assets. Find and monitor your sensitive data leaked on code aggregators, paste(s) site, etc., which poses a risk to your organization's security.

Read more Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed