---
description: Page 6 - Discover the best Threat Intelligence Software in Ireland. Compare top Threat Intelligence Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 6 - Best Threat Intelligence Software in Ireland - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Threat Intelligence Software](https://www.softwareadvice.ie/directory/3995/threat-intelligence/software) > [Page 6](https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=6)

# Threat Intelligence Software

Canonical: https://www.softwareadvice.ie/directory/3995/threat-intelligence/software

Page: 6 / 7\
Prev: [Previous page](https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=5)\
Next: [Next page](https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=7)

-----

## Products

1. [NexVision Engine](https://www.softwareadvice.ie/software/341957/nexvision-engine) (0 reviews) — NexVision is an AI-powered OSINT tool that automates data collection and processing to drive decision-making.  NexVis...
2. [CTM360](https://www.softwareadvice.ie/software/353055/ctm360) (0 reviews) — CTM360 is a digital risk protection platform that detects, manages, and responds to threats and vulnerabilities acros...
3. [Cisco Secure Network Analytics](https://www.softwareadvice.ie/software/429228/cisco-secure-network-analytics-stealthwatch) (0 reviews) — Cisco Secure Network Analytics is a cloud-based and on-premise solution, designed to help small to large enterprises ...
4. [ThreatKey](https://www.softwareadvice.ie/software/359274/threatkey) (0 reviews) — ThreatKey is a security solution that helps businesses manage their cloud and SaaS security posture. When setting up ...
5. [Netwrix Threat Manager](https://www.softwareadvice.ie/software/362254/netwrix-stealthdefend) (0 reviews) — Netwrix StealthDEFEND protects critical Active Directory and file system data. Detect even highly sophisticated threa...
6. [Integrite](https://www.softwareadvice.ie/software/248110/integrite) (0 reviews) — Integrite is a SaaS Digital Risk Monitoring Platform that works in hand with our proprietary technology backed by AI ...
7. [HTTPCS Cyber Vigilance](https://www.softwareadvice.ie/software/285714/httpc-cyber-vigilance) (0 reviews) — Data leaks monitoring and cyber threats detection solution. Your real-time malicious network monitoring solution (web...
8. [Alice](https://www.softwareadvice.ie/software/366970/activefence) (0 reviews) — Alice is a trust, safety, and security company built for the AI era. Alice helps organizations deploy, operate, and s...
9. [Cerberus](https://www.softwareadvice.ie/software/430726/cerberus) (0 reviews) — Cerberus is a threat intelligence software that helps businesses identify and preserve dark web evidence on drugs, ar...
10. [Agari Secure Email Cloud](https://www.softwareadvice.ie/software/312335/agari-secure-email-cloud) (0 reviews) — Secure Email Cloud is an on-premises email security solution that is built on next-generation architecture. It integr...
11. [Carbon Black EDR](https://www.softwareadvice.ie/software/337055/carbon-black-edr) (0 reviews) — Carbon Black ER is a continuous, real-time EDR solution that delivers continuous visibility into offline, air-gapped ...
12. [Lens](https://www.softwareadvice.ie/software/369690/lens) (0 reviews) — Correlate threat intelligence with digital content quickly. Anomali Lens uses Natural Language Processing (NLP) to au...
13. [IBM Cloud Pak for Security](https://www.softwareadvice.ie/software/401181/ibm-cloud-pak-for-security) (0 reviews) — IBM Cloud Pak for Security is an AI-powered platform designed specifically for data security professionals and incide...
14. [Mitiga](https://www.softwareadvice.ie/software/414352/mitiga) (0 reviews) — Mitiga was created by a team of cloud and SaaS incident response experts to accelerate and simplify breach investigat...
15. [The Anomali Platform](https://www.softwareadvice.ie/software/420314/anomali) (0 reviews) — The Anomali Platform is fueled by big data management, machine learning, and the world’s largest intelligence reposit...
16. [Arkose Labs](https://www.softwareadvice.ie/software/356599/arkose-labs) (0 reviews) — Large enterprises and medium-sized businesses enhance the security and user experience of their online platforms with...
17. [Seerist](https://www.softwareadvice.ie/software/428716/seerist) (0 reviews) — Seerist is an integrated risk management solution that offers real-time stability calculations and in-depth analysis....
18. [Insights](https://www.softwareadvice.ie/software/428026/inquest-insights) (0 reviews) — With InQuest Insights, you gain access to the most complete dataset anywhere, aggregated and curated from an array of...
19. [Visiativ Cyber](https://www.softwareadvice.ie/software/427094/visiativ-cyber-waf) (0 reviews) — Visiativ Cyber is a threat intelligence software that helps businesses ensure the security of a company's web applica...
20. [SAS Fraud, AML & Security Intelligence](https://www.softwareadvice.ie/software/415869/fraud-aml-and-security-intelligence) (0 reviews) — SAS Fraud, Anti-Money Laundering \&amp; Security Intelligence is a comprehensive solution designed to proactively prot...
21. [Vortex](https://www.softwareadvice.ie/software/437043/vortex) (0 reviews) — Engineered to elevate existing frameworks, tools, and techniques, Vortex integrates simulation intelligence and signa...
22. [Digital Armor](https://www.softwareadvice.ie/software/433546/safercore) (0 reviews) — Digital Armor is a cybersecurity platform that allows businesses to secure mobile applications. The shielding process...
23. [blacklens.io](https://www.softwareadvice.ie/software/438985/blacklens-io) (0 reviews) — Blacklens serves as a cybersecurity platform and an extended attack surface monitor. Its purpose is to assist busines...
24. [JOUO](https://www.softwareadvice.ie/software/426425/jouo) (0 reviews) — JOUO is a threat intelligence tool developed in Germany. The platform has been developed with decades of knowledge in...
25. [Cyware](https://www.softwareadvice.ie/software/416558/cyware) (0 reviews) — Cyware enables security teams at leading global organizations to operationalize threat intelligence data and execute ...

-----

Page: 6 / 7\
Prev: [Previous page](https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=5)\
Next: [Next page](https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=7)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.ie/directory/4329/cloud-security/software)
- [Endpoint Protection Software](https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.ie/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.ie/directory/4170/network-security/software)
- [Risk Management Software](https://www.softwareadvice.ie/directory/4423/risk-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/directory/3995/threat-intelligence/software)
- [All Categories](https://www.softwareadvice.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.ie/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Ireland","url":"https://www.softwareadvice.ie/","@id":"https://www.softwareadvice.ie/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Threat Intelligence Software","description":"Page 6 - Discover the best Threat Intelligence Software in Ireland. Compare top Threat Intelligence Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=6","about":{"@id":"https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=6#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=6#breadcrumblist"},"@id":"https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=6#webpage","@type":["WebPage","CollectionPage"],"mainEntity":{"@id":"https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=6#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"inLanguage":"en-IE","publisher":{"@id":"https://www.softwareadvice.ie/#organization"}},{"@id":"https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=6#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Threat Intelligence Software","position":2,"item":"https://www.softwareadvice.ie/directory/3995/threat-intelligence/software","@type":"ListItem"},{"name":"Page 6","position":3,"item":"https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=6","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 6 - Best Threat Intelligence Software in Ireland - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.ie/directory/3995/threat-intelligence/software?page=6#itemlist","@type":"ItemList","itemListElement":[{"name":"NexVision Engine","position":1,"description":"NexVision is an AI-powered OSINT tool that automates data collection and processing to drive decision-making. \n\nNexVision collects more than 120,000 new Tor sites (on the dark web) daily. \n\nMain features include:\n- AI/ML-powered engine with continuous collection, analysis and sorting of big data (from publicly available databases and the deep web) \n- Greatly increasing data available whilst removing false positives \n- Multilingual data support \n- Equipped with natural language processing and steganography-decoding capabilities. Able to detect jargon and capture hidden information advanced threat actors employ to avoid detection.\n- Dashboard that allows users to set keyword alerts, conduct investigations and analyse results whilst staying anonymous.\n- Easy-to-use interface that is accessible to analysts without prior data science or computer science background.\n- Provide alerts in real-time and send text/email alerts to the user\n- Automatic archiving of intelligence for ongoing investigations  \n- Anonymous research \n- Cloud-deployment solution with the ability to integrate with existing IoC stacks via API for easy adoption","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1d951175-1f07-4853-ba23-ba73dedff4c8.png","url":"https://www.softwareadvice.ie/software/341957/nexvision-engine","@type":"ListItem"},{"name":"CTM360","position":2,"description":"CTM360 is a digital risk protection platform that detects, manages, and responds to threats and vulnerabilities across the Surface, Deep & Dark web. Subscribers of the CTM360 platform get access to external attack surface management, cyber threat intelligence, cybersecurity risk scorecards, third-party vendor assessments, brand protection / anti-phishing, data leakage protection, social media monitoring, and takedowns on an unlimited basis.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3754c96a-09da-4a96-97cc-b5d5398aa57f.png","url":"https://www.softwareadvice.ie/software/353055/ctm360","@type":"ListItem"},{"name":"Cisco Secure Network Analytics","position":3,"description":"Cisco Secure Network Analytics is a cloud-based and on-premise solution, designed to help small to large enterprises determine, manage, and respond to threats. IT teams can conduct network traffic analysis and protect critical information through telemetry data. \n\nThe solution allows professionals to identify unknown malware, data exfiltration, or policy violations and identify them through context-rich alerts providing details about user, device type, location or timestamp. Supervisors can examine encrypted traffic for potential threats and track compliance violations. Cisco Secure Network Analytics lets professionals build custom alerts to detect any unauthorized access to the network and define segmentation policies. With its behavioral analytics module, users can determine users and their activity across the network. Cisco Secure Network Analytics also helps IT professionals investigate when servers, workstations, and other network hosts exhibit anomalies. \n\nPricing is available on request and support is extended via email, phone and documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/91b23207-b6bf-4208-b71e-ff70d6e76b75.jpeg","url":"https://www.softwareadvice.ie/software/429228/cisco-secure-network-analytics-stealthwatch","@type":"ListItem"},{"name":"ThreatKey","position":4,"description":"ThreatKey is a security solution that helps businesses manage their cloud and SaaS security posture. When setting up cloud or SaaS environments, the smallest misconfiguration can be a potential loophole for business data leaks. Our platform integrates with AWS, Azure, GCP, and SaaS apps like Zoom, Slack, Teams, Box, GitHub, Office 365, Google Workspace, and Okta. Once integrated, ThreatKey continually scans them and if a misconfiguration is detected, it provides an actionable alert to quickly remediate the issue.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f50e63d2-a03f-45f4-95ca-0ab133cb8889.jpeg","url":"https://www.softwareadvice.ie/software/359274/threatkey","@type":"ListItem"},{"name":"Netwrix Threat Manager","position":5,"description":"Netwrix StealthDEFEND protects critical Active Directory and file system data. Detect even highly sophisticated threats in real-time. Respond automatically to attacks and abnormal behavior. Send threat data to ServiceNow, Slack, Microsoft Teams or any SIEM.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e7c0d412-6957-4507-8b77-d31a2c54924c.png","url":"https://www.softwareadvice.ie/software/362254/netwrix-stealthdefend","@type":"ListItem"},{"name":"Integrite","position":6,"description":"Integrite is a SaaS Digital Risk Monitoring Platform that works in hand with our proprietary technology backed by AI and ML. The data gathered is used to derive actionable intelligence, and is presented on an insightful dashboard and through APIs.\nIntegrite is equipped with a robust dashboard that offers a simple and user-friendly interface. We specialize in presenting data in the simplest format, that is derived from complex big data. This actionable intel is the ultimate deliverable of Integrite.\n\nIntegrite combines Threat Intelligence along with Asset Discovery and Risk Monitoring to prove 360 degree visibility of digital risks faced by organisations who are connected to internet.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/05a4baae-b169-4edf-9c80-e7a0033508f3.png","url":"https://www.softwareadvice.ie/software/248110/integrite","@type":"ListItem"},{"name":"HTTPCS Cyber Vigilance","position":7,"description":"Data leaks monitoring and cyber threats detection solution. \nYour real-time malicious network monitoring solution (web, deepweb and darknet) to protect your company from cyberattacks. \n\nBased on the development of virtual agents capable of scanning hundreds of thousands of sources daily and OSINT teams that integrate the most restricted sources, CyberVigilance infiltrates the clear and the dark web to alert you in case of cyber threats on your organization (attack notification, phishing threat, domain squatting, ransomware...) or information leaks (Data Leak, file leak, compromised email from an employee).\n\nThe platform gives you visibility into threats that might otherwise go unnoticed. \n\nIn addition to monitoring external web servers for potential threats, it also tracks company and employee information. \n\nHTTPCS Cyber Vigilance also monitors social networks (SOCMINT) and instant messaging services to let you know what is being said about your organization.\n\nIdentify threats that could affect your business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c4c56178-9e61-4b35-b9ed-58dfb97572bc.webp","url":"https://www.softwareadvice.ie/software/285714/httpc-cyber-vigilance","@type":"ListItem"},{"name":"Alice","position":8,"description":"Alice is a trust, safety, and security company built for the AI era.\n\nAlice helps organizations deploy, operate, and scale GenAI and Agentic systems responsibly by providing lifecycle-wide evaluation, protection, and governance. Trusted by leading technology platforms and foundation model providers, Alice delivers visibility into how AI systems behave — before launch, in production, and as they evolve over time.\n\nPowered by Rabbit Hole, Alice’s adversarial intelligence engine built on billions of real-world data samples and expert analysis, Alice surfaces emerging risks, detects drift and regressions, and applies policy-aligned protections in real time.\n\nWith multimodal and multilingual coverage, ultra-low-latency enforcement, and deeply customizable governance controls, Alice enables teams to strengthen robustness, maintain compliance, and advance AI innovation with confidence.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/81e2e164-ec49-4cfb-9add-295e4241827e.jpeg","url":"https://www.softwareadvice.ie/software/366970/activefence","@type":"ListItem"},{"name":"Cerberus","position":9,"description":"Cerberus is a threat intelligence software that helps businesses identify and preserve dark web evidence on drugs, arms, ransomware, and CSEA.\n\nTrusted globally by law enforcement and government agencies, Cerberus uses proprietary techniques developed by world-leading researchers to deliver the most comprehensive dark web dataset on the market, providing access to intelligence that was previously unobtainable. Teams can explore live and historic dark web data without putting employees or infrastructure at risk. It enables managers to identify, gather, and preserve evidence on ransomware, criminal, and threat group activity\n\nAdministrators get alerted whenever a malicious actor or ransomware group is active on the dark web. Operators can share intelligence with case management, deconfliction, and case note annotations. Additionally, it lets supervisors seamlessly conduct investigations between the online and physical world to unmask cybercriminals","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2c1d66f3-f532-455c-ba43-74e0432c8b6e.jpeg","url":"https://www.softwareadvice.ie/software/430726/cerberus","@type":"ListItem"},{"name":"Agari Secure Email Cloud","position":10,"description":"Secure Email Cloud is an on-premises email security solution that is built on next-generation architecture. It integrates seamlessly with cloud-only on-premises and hybrid email configurations without risk of disruption to email operations. The solution is dynamic in nature, enabling rapid innovation to combat emerging attack types.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c9261ed2-09b4-4cb5-bf56-0f87e5b688b5.png","url":"https://www.softwareadvice.ie/software/312335/agari-secure-email-cloud","@type":"ListItem"},{"name":"Carbon Black EDR","position":11,"description":"Carbon Black ER is a continuous, real-time EDR solution that delivers continuous visibility into offline, air-gapped and disconnected environments. Carbon Black ER integrates directly with the Carbon Black User Interface to create custom alerts and threat intelligence, incorporating critical indicators such as trusted user lists and time since last communication for users to provide context around flagged activity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5e8d6734-7dec-4e78-987a-8ef5e5d4776f.png","url":"https://www.softwareadvice.ie/software/337055/carbon-black-edr","@type":"ListItem"},{"name":"Lens","position":12,"description":"Correlate threat intelligence with digital content quickly.\n\nAnomali Lens uses Natural Language Processing (NLP) to automatically scan and identify threat data in any web-based content, Office 365 (Outlook, Word, Excel) and PDFs – and operationalizes it into actionable intelligence for containing and resolving threats as they arise.\n\nLens automatically matches identified threat intelligence against network events and logs to tell at a glance if your organization has been impacted.\n\n- Import scanned threat data into Anomali Threatstream or Anomali Match with one click\n- Pivot, investigate, and visualize imported threat intelligence in MITRE ATT&CK heatmaps\n- Import MITRE ATT&CK data into a ThreatStream investigation automatically\n- Export your investigation for reporting and collaboration","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bd0e705c-6be9-47fa-b81b-5583d32414bf.jpeg","url":"https://www.softwareadvice.ie/software/369690/lens","@type":"ListItem"},{"name":"IBM Cloud Pak for Security","position":13,"description":"IBM Cloud Pak for Security is an AI-powered platform designed specifically for data security professionals and incident response teams. To streamline threat detection and response time, the platform can automate workflows and break down silos across security teams. A unified dashboard provides customized scoring for top threats, a federated search tool, automated case creation, and more. IBM Cloud Pak for Security supports hybrid, multi-cloud and on-premise environments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/616b6bf5-d6c1-4765-9c5d-4525cbf774b4.jpeg","url":"https://www.softwareadvice.ie/software/401181/ibm-cloud-pak-for-security","@type":"ListItem"},{"name":"Mitiga","position":14,"description":"Mitiga was created by a team of cloud and SaaS incident response experts to accelerate and simplify breach investigations and modernize incident response for organizations. \n\nOur IR2 platform is a next-gen approach to cloud incident response. It proactively gathers, organizes, and analyzes the specific, forensic-level data you need from across all of your cloud and SaaS environments in order to answer burning breach-related questions. Everything you need is delivered in a simple, user-friendly interface and it's supported by our specialized teams of cloud and SaaS responders. This expert-enabled, subscription-based solution delivers the fastest cloud and SaaS incident response times in the industry with a predictable investment.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a4bd582a-c879-4bce-93e1-d3317de97d08.jpeg","url":"https://www.softwareadvice.ie/software/414352/mitiga","@type":"ListItem"},{"name":"The Anomali Platform","position":15,"description":"The Anomali Platform is fueled by big data management, machine learning, and the world’s largest intelligence repository, to automatically correlate all installed security telemetry against active threat intelligence to stop breaches and attackers in real-time. By cutting through the noise and surfacing relevant threats, the Anomali Platform provides security teams with the tools and insights needed to detect threats, make informed decisions and defend against today’s sophisticated attacks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/909bda2c-371b-4406-9b3a-2da070688f77.png","url":"https://www.softwareadvice.ie/software/420314/anomali","@type":"ListItem"},{"name":"Arkose Labs","position":16,"description":"Large enterprises and medium-sized businesses enhance the security and user experience of their online platforms with Arkose Labs' innovative cybersecurity solutions. The Arkose Bot Manager comprehensive bot detection and mitigation platform, coupled with unparalleled managed services, proactively outwits attackers during account registration and login processes, ultimately increasing the long-term value of each customer and protecting revenue streams.\n\nWith Arkose Labs as your partner, you can effectively thwart various types of attacks, including SMS toll fraud, credential stuffing, account takeovers, fake account registration, scraping, inventory hoarding, and more.\n\nArkose Labs has earned the trust of some of the world's largest corporations, and 20% of our customers are in the Fortune 500. We excel at safeguarding enterprises against malicious bot attacks, human fraud schemes, and hybrid threats, making us the ideal choice for your cybersecurity needs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fdfe8106-fe60-4a45-88ef-0e17787a8833.jpeg","url":"https://www.softwareadvice.ie/software/356599/arkose-labs","@type":"ListItem"},{"name":"Seerist","position":17,"description":"Seerist is an integrated risk management solution that offers real-time stability calculations and in-depth analysis. Seerist ensures businesses can confidently navigate a wide range of global challenges, from strategic complexities to tactical obstacles. From corporate supply chains to NGOs offering aid to government security details, Seerist delivers a robust risk and threat intelligence solution that helps users forecast what comes next.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3e72e9e5-0289-41cb-8989-f66b5ffa0d9a.jpeg","url":"https://www.softwareadvice.ie/software/428716/seerist","@type":"ListItem"},{"name":"Insights","position":18,"description":"With InQuest Insights, you gain access to the most complete dataset anywhere, aggregated and curated from an array of public, private, and internal sources. With our platform, you'll receive the earliest possible threat indicators with our continuous monitoring and analysis. Leverage InQuest Insights' proprietary Indicators of Compromise lead times to gain a head start on implementing necessary security measures. Additionally, Threat Actor Tracking lets you identify and track threat actor groups, their tactics, and techniques so you can proactively identify new threats specific to your organization or industry.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/46882a36-b2aa-48ec-9f46-06dc82305f92.jpeg","url":"https://www.softwareadvice.ie/software/428026/inquest-insights","@type":"ListItem"},{"name":"Visiativ Cyber","position":19,"description":"Visiativ Cyber is a threat intelligence software that helps businesses ensure the security of a company's web applications. The platform enables administrators to audit multiple security checkpoints to analyze vulnerabilities based on ISO 27001 and ANSSI recommendations. \n\nAdditionally, Visiativ Cyber lets stakeholders perform employee awareness campaigns and block cyber threats using a unified interface.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ee64af46-846f-4590-9d66-06298bcf50e2.jpeg","url":"https://www.softwareadvice.ie/software/427094/visiativ-cyber-waf","@type":"ListItem"},{"name":"SAS Fraud, AML & Security Intelligence","position":20,"description":"SAS Fraud, Anti-Money Laundering & Security Intelligence is a comprehensive solution designed to proactively protect businesses from fraud, compliance breaches, and security threats. SAS combines advanced analytics, AI, and machine learning to deliver a unified approach to fraud detection, regulatory compliance, and security intelligence.\n\nComplying with ever-changing regulations is made easier with SAS Anti-Money Laundering, which takes a risk-based approach to increase transparency and reduce compliance risk. This solution has empowered banks like Landsbankinn to identify patterns in data and provide data visualization capabilities to analysts across the organization through SAS Visual Analytics.\n\nSAS also addresses the critical issue of identity and digital fraud by evaluating interactions throughout the customer lifecycle. Through the use of advanced analytics, businesses can reduce the risk of identity and digital fraud. Axcess Financial, for example, leverages SAS to authenticate each customer, ensuring the right data is obtained upfront.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/09b0b674-158d-4b33-8688-4ea92b20f185.jpeg","url":"https://www.softwareadvice.ie/software/415869/fraud-aml-and-security-intelligence","@type":"ListItem"},{"name":"Vortex","position":21,"description":"Engineered to elevate existing frameworks, tools, and techniques, Vortex integrates simulation intelligence and signature-less detection capabilities to bridge gaps and surpass limitations present in contemporary solutions.\n\nAt its core, Cyberstanc Vortex introduces a report, remove, and sanitize feature, ensuring a holistic approach to data protection during transfer across secure networks. The exceptional detection accuracy of Vortex sets it apart, outperforming traditional anti-virus solutions. By strategically reducing the number of artifacts requiring sandboxing, the platform not only saves valuable time and resources but also minimizes the risk of false positives, a common challenge faced by many cybersecurity solutions.\n\nThe efficacy of Vortex lies in its meticulous examination of metadata, file structure, and relationships between files. Leveraging simulation intelligence, the platform identifies threats with precision, offering security teams detailed insights into the nature and behavior of detected malware. This actionable intelligence transcends conventional methods, going beyond mere file flagging, as witnessed in traditional solutions like VirusTotal. Transparency and accountability are fundamental capabilities of Cyberstanc Vortex. The detection mechanisms are purposefully designed with a strong emphasis on transparency, establishing a foundation of trust for organizations relying on the accuracy of results. Vortex introduces a pioneering prototype framework for data sanitization, delivering comprehensive protection across endpoints, networks, emails, and storage systems. Addressing grey areas often exploited by attackers, the framework encompasses highly obfuscated and real-world malware techniques such as macro malware, VBA, VBS, PowerShell, DOCx, Calendar files, and more.\n\nCyberstanc Vortex offers advanced malware simulation capabilities for files up to 1GB. This feature provides evidence-based detection, unraveling the true nature of files and empowering organizations with critical insights to bolster their defenses. Notably, this robust protection against malware threats is coupled with a strict no-data acquisition policy.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/03c937a0-4d54-49f3-81fe-d1c2614b6bb3.jpeg","url":"https://www.softwareadvice.ie/software/437043/vortex","@type":"ListItem"},{"name":"Digital Armor","position":22,"description":"Digital Armor is a cybersecurity platform that allows businesses to secure mobile applications. The shielding process starts by uploading a mobile application package such as APK, AAB, or IPA to the platform, selecting the security features needed for the mobile application, and then waiting for the process to finish. At the end of the process, the user can download the newly shielded and protected mobile application.\n\nSome features of Digital Armor include VPN detection, screenshot prevention, anti-debugging, screen recording prevention, emulators and simulators detection, and Man-in-the-middle (MiTM) protection,","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/458f5b7b-29c3-4ba8-8981-557d8e168978.webp","url":"https://www.softwareadvice.ie/software/433546/safercore","@type":"ListItem"},{"name":"blacklens.io","position":23,"description":"Blacklens serves as a cybersecurity platform and an extended attack surface monitor. Its purpose is to assist businesses in minimizing security vulnerabilities and actively monitoring potential threats. \n\nThis platform employs advanced techniques such as penetration testing, darknet monitoring, and vulnerability scanning. These techniques aim to reduce the external attack surface of a system effectively. Blacklens offers visibility into threats stemming from exposed assets, applications, infrastructures, and data. It enables users to identify crucial security aspects with minimal effort.\n\nNotable features of Blacklens encompass extended attack surface monitoring, penetration testing services, and darknet monitoring. These features help to minimize external threats, proactively discover vulnerabilities, and detect threats and leaked data from underground sources. Blacklens provides users with insights into hidden risks, allowing them to react before attackers can exploit these risks.\n\nDeveloped in Austria, Blacklens merges continuous assessments with real-time alerts. This combination aids organizations in enhancing their cyber defense. It also works in harmony with existing security tools to provide comprehensive protection. Automated scans and clear reports from Blacklens can save security teams a significant amount of time and resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7349a802-dd6f-4ba1-ac80-24f92aa6a7bb.png","url":"https://www.softwareadvice.ie/software/438985/blacklens-io","@type":"ListItem"},{"name":"JOUO","position":24,"description":"JOUO is a threat intelligence tool developed in Germany. The platform has been developed with decades of knowledge in development and implementation of software projects. With the expertise of creating complex algorithms for AI based applications, businesses can expect that JOUOs shows users exactly what hackers can see on their web infrastructure. It can also show users how to protect the infrastructure reliably for the future. \n\nThe proven approach to successfully and efficiently achieve this objective, is to have workshops with businesses. During these workshops business infrastructure is analyzed and assessed with the tool, JOUO, as an integral part of the workshop. Taking insights from the workshop they develop and implement together the best approach and technology to protect the infrastructure.  This includes the implementation of a Zero Trust concept and an \"invisibility cloak\" for all servers. \n\nJOUO works in multiple English and German languages.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ca7b09b1-5c8f-4bfa-873d-c6da32d45641.jpeg","url":"https://www.softwareadvice.ie/software/426425/jouo","@type":"ListItem"},{"name":"Cyware","position":25,"description":"Cyware enables security teams at leading global organizations to operationalize threat intelligence data and execute real-time actions by integrating intelligence management, automating workflows, and promoting secure collaboration for a stronger, unified defense.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/265edd7a-8e32-4c60-86e7-1020ec6932ef.png","url":"https://www.softwareadvice.ie/software/416558/cyware","@type":"ListItem"}],"numberOfItems":25}
</script>
