ensun logo
Locations
Company type
Result types
Industries
Employees
Founding year
background

Top Threat Intelligence Companies

The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers

Close

Filter

Continents


Locations


Result types


Company type


Industries


Company status

Number of employees

to

Founding year

to

Clear filters

41 companies for Threat Intelligence

Certego's Logo

Certego

Modena, Italy

B

11-50 Employees

2013

Key takeaway

Certego is a specialized provider of Cyber Threat Intelligence and Incident Response Operations, offering real-time information on potential threats and a comprehensive understanding of the threat landscape. Their dedicated Threat Intelligence Team focuses on identifying criminal motives and tactics, enhancing their managed detection and response services.

Reference

Service

Cyber Threat Intelligence

Rootfloe's Logo

Rootfloe

London, United Kingdom

A

1-10 Employees

2017

Key takeaway

Rootfloe offers comprehensive threat intelligence services as part of its cybersecurity solutions. With a focus on safeguarding organizational infrastructure from attacks, Rootfloe provides detailed analysis and expertise to enhance security measures.

Reference

Service

Threat Intelligence Services - Rootfloe

WorldStack's Logo

WorldStack

Biñan, Philippines

D

1-10 Employees

2014

Key takeaway

WorldStack offers comprehensive cyber threat intelligence solutions that provide actionable insights into threats targeting your organization. Their expertise in online research and investigation, combined with a deep understanding of human behavior, equips your security team with critical context to navigate and respond to threats effectively.

Reference

Product

Cyber Threat Intelligence — WorldStack

Looking for more accurate results?

Find the right companies for free by entering your custom query!

25M+ companies

250M+ products

Free to use

CTM360's Logo

CTM360

Manama, Bahrain

D

51-100 Employees

2014

Key takeaway

CTM360® is a leading threat intelligence partner that specializes in identifying vulnerabilities and managing threats across the Surface, Deep, and Dark Web. Their platform is aligned with MITRE ATT&CK and STIX, providing comprehensive insights into adversary behavior and enabling organizations to detect and respond effectively to relevant threats.

Reference

Product

Cyber Threat Intelligence | MITRE ATT&CK | STIX 2.1 | ThreatCover | CTM360

Threat Intelligence Platform aligned to MITRE ATT&CK and STIX with a focus on attack patterns & TTPs. Detect & respond to the most relevant threats with ThreatCover. Learn more.

ADMINUSLABS LLP's Logo

ADMINUSLABS LLP

India

D

1-10 Employees

2009

Key takeaway

ADMINUSLabs offers DEEPINSIGHT™, a Cyber Threat Intelligence service that provides decision-makers with accurate and actionable insights on malicious code, vulnerabilities, and global threats. Their threat intelligence feed equips security teams with real-time data to effectively address emerging threats, enhancing organizational cyber defense and security awareness.

Reference

Service

Services | ADMINUSLabs

ADMINUSLabs Threat Intelligence services allow you to overcome the pace of malware creation. Find out why cyber-security threats can't hide from us.

Farsight Security's Logo

Farsight Security

United States

B

11-50 Employees

2013

Key takeaway

Farsight's DNS observation data and DomainTools Internet intelligence data offer a comprehensive view of emerging threats, enabling threat intelligence teams to detect and mitigate risks before they affect operations. Their product suite is designed to provide actionable real-time data to block malicious actors and their networks effectively.

Reference

Product

Threat Intelligence

Threat intelligence teams must detect and stop threats before they impact business operations. They need actionable real-time data from across the Internet.

Intelligence Fusion's Logo

Intelligence Fusion

Newton Aycliffe, United Kingdom

A

11-50 Employees

2014

Key takeaway

The company emphasizes its commitment to advanced threat intelligence by providing fast, accurate, and in-depth data analysis. With a focus on developing intuitive intelligence tools and real-time incident reporting, they ensure clients receive reliable and actionable insights to enhance their security posture.

Reference

Product

Threat Intelligence Platform - Intelligence Fusion

Intelligence Fusion can build your ideal solution to threat intelligence to suit your needs and goals. Find out more.

Vulidity GmbH's Logo

Vulidity GmbH

Burghausen, Germany

A

1-10 Employees

2018

Key takeaway

The company's Threat Intelligence solutions, recognized with the "Security Made in Germany" seal, are developed by certified experts and receive continuous updates, providing optimal preventive protection against cyber threats for all industries and business sizes. Their tools automate comprehensive risk analyses, enhancing cybersecurity measures effectively.

Reference

Core business

Vulidity - Cyber-Sicherheit durch unsere Threat Intelligence Tools

Unsere Threat Intelligence Tools liefern Ihnen automatisiert ganzheitliche Risikoanalysen zur Cyber-Sicherheit in Ihrem Unternehmen.

Center for Threat Intelligence's Logo

Center for Threat Intelligence

Kirkland, United States

B

1-10 Employees

2017

Key takeaway

The Center for Threat Intelligence, led by CEO Janet Lawless, specializes in developing comprehensive threat intelligence programs through customized training, consulting, and certifications for both corporations and government organizations. This focus on tailored education and resources highlights their commitment to enhancing organizational preparedness against cyber threats.

Reference

Core business

About - Center for Threat Intelligence

About - Center for Threat Intelligence

Exeleryx's Logo

Exeleryx

Paris, France

A

11-50 Employees

2015

Key takeaway

The company is dedicated to combating CyberCrime and addressing customer concerns through advanced services and solutions, including a focus on Threat Intelligence. Their approach involves leveraging Subject Matter Experts and a tailored response to enhance cybersecurity and cyber intelligence efforts.

Reference

Product

Threat Intelligence - EXELERYS


Related searches for Threat Intelligence

Technologies which have been searched by others and may be interesting for you:

Products and services for Threat Intelligence

A selection of suitable products and services provided by verified companies according to your search.

Product: Source Recommendation Assessment

Service

Source Recommendation Assessment

Go to product


Use cases around Threat Intelligence

A selection of suitable use cases for products or services provided by verified companies according to your search.

UseCase: FInding the optimal Threat Intelligence

Use case

FInding the optimal Threat Intelligence

MSSP, Security

Ticura enriches existing threat intelligence programs with data from over 870 sources of network, public cloud, SaaS, endpoint and identity telemetry. Then, leveraging its proprietary detection engine, data science and machine learning, Ticura analyzes and surfaces the anomalies, incidents and threats to deliver optimal protection for your organization.

UseCase: FInding the optimal Threat Intelligence

Use case

FInding the optimal Threat Intelligence

MSSP, Security

Ticura enriches existing threat intelligence programs with data from over 870 sources of network, public cloud, SaaS, endpoint and identity telemetry. Then, leveraging its proprietary detection engine, data science and machine learning, Ticura analyzes and surfaces the anomalies, incidents and threats to deliver optimal protection for your organization.

Things to know about Threat Intelligence

What is Threat Intelligence?

Threat intelligence refers to the collection and analysis of information regarding potential or current threats to an organization's security. This data can include information about cyberattacks, malware, vulnerabilities, and threat actors. By utilizing threat intelligence, organizations can proactively identify and mitigate risks, enhance their security posture, and improve incident response capabilities. Effective threat intelligence integrates data from various sources, including open-source information, industry reports, and proprietary data feeds. This comprehensive approach allows organizations to gain insights into emerging threats, enabling them to make informed decisions about security strategies and investments.


How does Threat Intelligence improve cybersecurity?

Threat Intelligence enhances cybersecurity by providing organizations with actionable insights into potential threats and vulnerabilities. By analyzing data from various sources such as malware reports, attack patterns, and threat actor behavior, it helps in identifying emerging threats before they can cause harm. Additionally, this information allows security teams to prioritize their defenses, focusing on the most significant risks. Continuous monitoring and real-time alerts enable quicker incident response, reducing the impact of security breaches. Overall, leveraging Threat Intelligence leads to a proactive security posture, empowering organizations to stay one step ahead of cyber adversaries.


What are the benefits of using Threat Intelligence?

1. Enhanced Security Posture
Utilizing threat intelligence allows organizations to proactively identify and mitigate potential threats. By analyzing data about current and emerging threats, companies can strengthen their security measures and reduce vulnerabilities.

2. Improved Incident Response
Threat intelligence aids in accelerating incident response times. With access to real-time data on threats, security teams can quickly assess and address issues, minimizing the impact of security breaches and ensuring a more effective response strategy.


How can companies implement Threat Intelligence effectively?

1. Define Clear Objectives
Companies should start by identifying specific goals for their threat intelligence initiatives. This includes understanding the types of threats they face and prioritizing the most relevant intelligence sources.

2. Integrate with Existing Security Systems
Effective implementation involves integrating threat intelligence with current security infrastructure. This ensures that insights can be utilized in real-time, enhancing the organization's ability to respond to threats promptly.

3. Foster Collaboration
Encouraging collaboration between IT, security teams, and other departments can enhance the effectiveness of threat intelligence. Sharing insights and experiences helps to create a comprehensive defense strategy.

4. Regular Training and Awareness
Ongoing training for staff on threat intelligence tools and strategies is essential. By keeping the team informed about the latest threats and mitigation techniques, companies can better safeguard their assets.

5. Evaluate and Adapt
Companies should continuously evaluate the effectiveness of their threat intelligence efforts. Adapting strategies based on evolving threat landscapes ensures that the organization remains resilient against new vulnerabilities.


What tools are commonly used for Threat Intelligence?

1. Security Information and Event Management (SIEM)
These tools aggregate and analyze security data from across an organization’s infrastructure, assisting in the identification of potential security threats.

2. Threat Intelligence Platforms (TIP)
These platforms are designed to collect, analyze, and share threat data, providing organizations with actionable intelligence to enhance their security posture.

3. Endpoint Detection and Response (EDR)
EDR solutions monitor endpoints for suspicious activities and provide real-time analysis and response capabilities, essential for detecting and mitigating threats.

4. Vulnerability Management Tools
These tools identify and prioritize vulnerabilities within systems and applications, helping organizations address weaknesses that attackers could exploit.

5. Open Source Intelligence (OSINT) Tools
OSINT tools gather publicly available information from various sources to provide insights into potential threats, enhancing overall situational awareness.

6. Incident Response Tools
These tools are vital for managing and responding to security incidents, allowing organizations to contain and remediate threats effectively.


Insights about the Threat Intelligence results above

Some interesting numbers and facts about your company results for Threat Intelligence

Country with most fitting companiesUnited States
Amount of fitting manufacturers8148
Amount of suitable service providers8878
Average amount of employees11-50
Oldest suiting company2009
Youngest suiting company2018

Geographic distribution of results





20%

40%

60%

80%

Frequently asked questions (FAQ) about Threat Intelligence Companies

Some interesting questions that has been asked about the results you have just received for Threat Intelligence

Based on our calculations related technologies to Threat Intelligence are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce

The most represented industries which are working in Threat Intelligence are IT, Software and Services, Defense, Other, Consulting, Telecommunications

ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.

Threat Intelligence results by various countries

Related categories of Threat Intelligence