Threat Intelligence Vendors – Full list

Threat Intelligence Vendors – Full list

CyberDB provides scouting services for companies who are looking for technology partnership or M&A opportunities in the Cyber Industry.

The following is the full list of Cyber Threat Intelligence Vendors. Vendors in this domain cover one or more of the following Cyber Security capabilities: Threat Intelligence Portals, Platforms (TIPS), Threat Intelligence Feeds and Services, OSINT, Deep Web and Dark Web.

This Threat Intelligence vendors list is managed and maintained by CyberDB, including additional information on their Cyber Security and Cyber Threat Intelligence products.
Please contact CyberDB for any further clarifications.

Vendors 

Website

Country 

Arbor Networks: NETSCOUT Security Divisionhttps://www.netscout.com/arbor-ddos
Attivo Networkshttp://www.attivonetworks.com
BAE Systemshttp://www.baesystems.com/businessdefence
Bluelivhttp://www.blueliv.com
BluVectorhttps://www.bluvector.io/
Centripetal Networks, Inc.https://www.centripetal.ai/#sthash.sih9RPqu.dpuf
Check Point Softwarehttps://www.checkpoint.com/
Clearswift (Acquired by RUAG)http://www.clearswift.com/
Cradlepointhttps://cradlepoint.com/
CrowdStrikehttps://www.crowdstrike.com/
CyberArk Software, Inc.http://www.cyberark.com/
Cybereasonhttp://www.cybereason.com/
CyberInthttp://cyberint.com/
Digital Shadowshttp://www.digitalshadows.com/
DomainToolshttp://www.domaintools.com/
EdgeWavehttp://www.edgewave.com
Encode UK Limitedhttp://www.encodegroup.com/
eSentire, Inc.https://www.esentire.com/
Exabeamhttp://www.exabeam.com/
F5 Networkshttps://f5.com/
Fidelis Cybersecurityhttps://www.fidelissecurity.com/
FireEyehttps://www.fireeye.com/
Flowmon Networkshttps://www.flowmon.com/en
Forcepoint, Powered by Raytheonhttps://www.forcepoint.com/
Fortinet, Inc.https://www.fortinet.com/
Fox-IT (Acquired by NCC)https://www.fox-it.com/en/
Guardicorehttp://www.guardicore.com
GuruCulhttp://www.guruculsolutions.com/
Hewlett Packard Enterprisehttps://www.hpe.com/us/en/home.html
HID Globalhttp://www.hidglobal.com
iboss cybersecurityhttp://www.iboss.com
McAfeehttps://www.mcafee.com/en-us/index.html
iSIGHT (Acquired by FireEye)https://www.fireeye.com/products/isight-cyber-threat-intelligence-subscriptions.html
Keysighthttps://www.keysight.com/
Janus Technologies, Inc.http://www.janustech.com/
Juniper Networkshttps://www.juniper.net/us/en/
Kaspersky Labhttps://www.kaspersky.co.in/?domain=kaspersky.com
Lastlinehttps://www.lastline.com/
Lockheed Martinhttp://www.lockheedmartin.com/cyber
LogRhythmhttps://logrhythm.com/index.html
Lookingglasshttps://www.lookingglasscyber.com
Mimecasthttps://www.mimecast.com/
NRI SecureTechnologieshttp://www.nri-secure.com
NSFOCUShttps://nsfocusglobal.com/
Palerra (Acquired by Oracle)https://www.oracle.com/cloud/paas/casb-cloud-service.html
Palo Alto Networkshttps://www.paloaltonetworks.com/
PhishLabshttps://www.phishlabs.com/
Cofense (PhishMe)https://cofense.com/
Pindrophttps://www.pindrop.com/
Proofpointhttps://www.proofpoint.com/us
Raytheon Foreground Securityhttps://www.raytheon.com/cyber/news/feature/foreground-security_OLD?utm_source=foregroundsecurity
Recorded Futurehttps://www.recordedfuture.com/
Reservoir Labshttps://www.reservoir.com/
RiskIQhttps://www.riskiq.com/
RiskSensehttps://www.risksense.com/
Securonixhttp://www.securonix.com/
SentinelOnehttps://sentinelone.com/
SurfWatch Labshttp://www.surfwatchlabs.com
Broadcom – Symantechttps://www.broadcom.com/
The Media Trusthttp://www.themediatrust.com
ThreatBookhttp://www.threatbook.cn
ThreatConnecthttps://threatconnect.com/
ThreatQuotienthttps://www.threatq.com/
ThreatSTOPhttp://www.threatstop.com/
Trend Micro, Inc.http://www.trendmicro.com
Trustwavehttps://www.trustwave.com
Cognytehttps://www.cognyte.com/
Verisign (Acquired by Symantec)http://www.verisign.com/
VMray GmbHhttps://www.vmray.com/
WebRAY(BeiJing)Tech Co.,Ltd.http://www.webray.com.cn
ZeroFOXhttp://www.ZeroFOX.com
Anti Hacker Alliancehttp://anti-hacker-alliance.com/
AnubisNetworks (BitSight Company)https://www.anubisnetworks.com/
Appriverhttps://www.appriver.com/
STORMSHIELD (ARKOON NETASQ)https://www.stormshield.eu/
Bandurahttps://banduracyber.com/
Bluedonhttp://www.bluedon.com/
CloudMark (Acquired by Proofpoint)https://www.cloudmark.com/en
ContentKeeperhttps://www.contentkeeper.com/
Controlscanhttps://www.controlscan.com
Counter Threat Unit – CTUhttps://www.secureworks.com
CyberTraphttp://www.cybertrap.com/
CyberXhttp://cyberx-labs.com/en/home/
Cyfir (acquired by eSentire)https://www.cyfir.com/
Cymbelhttps://www.cymbel.com/
Cynethttp://www.cynet.com/
Darktracehttps://darktrace.com/
EclecticIQhttps://www.eclecticiq.com/
EMC (RSA)https://www.rsa.com/en-us
EventTrackerhttps://www.netsurion.com/managed-threat-protection
Fishnet Securityhttps://www.optiv.com/
F-Securehttps://www.f-secure.com/en/welcome
Anomalihttps://www.anomali.com/
ANRC (Merged into Focal-Point)https://focal-point.com/
Cleafyhttps://cleafy.com/
Datashield (Acquired by ADT)http://datashieldprotect.com/
Deep Securehttp://www.deep-secure.com/
DG Technologyhttp://www.dgtechllc.com/
Fluencyhttps://fluencysecurity.com/
Fortycloud (acquired by Firemon)http://40cloud.com/
General Dynamicshttps://gdit.com/cyber-security/
Group IBhttp://www.group-ib.com/
huntsmanhttps://www.huntsmansecurity.com/
infoArmorhttps://www.infoarmor.com/
InfoCytehttp://www.infocyte.com/
intsightshttps://intsights.com/
KeyFocushttp://www.keyfocus.net/kfsensor/
Malware Patrolhttps://www.malwarepatrol.net/
Masergy Communications, Inc.https://www.masergy.com/
Mnemonichttps://www.mnemonic.no/
NCC Grouphttps://www.nccgroup.com/us/
DNIFhttps://dnif.it/
Netscopehttps://netscope.io/?gclid=CMi_1ubTpc4CFeUp0wodfiQMbg
Phalanx secure solutionshttps://www.phalanxsecure.com/
Shearwater PhriendlyPhishinghttps://www.shearwater.com.au/phriendlyphishing/
QinetiQhttps://www.qinetiq.com
Raytheonhttps://www.raytheonintelligenceandspace.com/capabilities/cybersecurity
Red Canaryhttps://www.redcanary.com/
RedJackhttp://www.redjack.com/
Redsockshttp://www.redsocks.nl/
ReversingLabshttps://www.reversinglabs.com/
SenseCy by Cognytehttps://www.cognyte.com/cyber-intelligence/cyber-threat-intelligence/
Shape Securityhttps://www.shapesecurity.com/
SlashNexthttps://www.slashnext.com/
SmokeScreenhttps://www.smokescreen.io/
solitonhttps://solitonsystems.com/
Celeriumhttps://www.celerium.com/Automate
Subgraphhttps://subgraph.com/
Syhunthttp://www.syhunt.com/en/
Teramindhttps://www.teramind.co/
Threat Intelligencehttps://www.threatintelligence.com/
TruStarhttps://www.trustar.co/
TrustedSechttps://www.trustedsec.com/
Trustporthttp://www.trustport.com/en
Unisys Stealthhttps://stealthsecurity.unisys.com/
Vectra Networkshttps://www.vectra.ai/
vkeyhttps://www.v-key.com/
ACID Technologies Ltd.http://www.acid-tech.co/
BISEC Ltd.http://www.bi-sec.com
Kela Targeted Cyber Intelligencehttps://ke-la.com/
Cobwebs Technologies Ltd.https://cobwebs.com/
TrulyProtecthttp://www.trulyprotect.com
Inteller Ltd.https://intelfinder.io/
Vital Intelligence Groupvital-int.com/
BrandShield Ltd.https://www.brandshield.com/
Sixgill Ltd.http://www.cybersixgill.com
Terrogence Ltd.www.terrogence.com
AccessData Grouphttp://accessdata.com/
Caretowerhttps://www.caretower.com/
CyberPoint Internationalhttps://www.cyberpointllc.com
Cybraicshttps://cybraics.com/
Dark Web IDhttp://www.idagent.com/
Data Resolve Technologieshttps://dataresolve.com
DefenseStormhttps://www.defensestorm.com/
Digital Immunityhttp://www.digitalimmunity.com/
Dragos Securityhttps://www.dragos.com/
GreatHorn, Inc.https://www.greathorn.com/
Uplevel Securityhttps://www.uplevelsecurity.com/
threat stackhttps://www.threatstack.com/
4iQhttps://www.4iq.com/home
PatternExhttps://www.patternex.com/
Hermetric Software Serviceshttp://www.hermetric.com/
Massive Alliancehttp://www.massivealliance.com/
Labris Networkshttp://labrisnetworks.com/
Leidoshttps://www.leidos.com/
LifeLock (Acquired by Symantec)https://www.lifelock.com/
OmniNethttps://omninet.io/
CyberClanhttps://cyberclan.com/
Black Kitehttps://blackkitetech.com/
Novatech Process Solutionshttps://www.novatechautomation.com/
Picviz Labs (Acquired by ESI)http://picviz.com/
Polyversehttps://polyverse.com/
Promiahttp://www.promia.com/
Provenance Cyber Security Solutionshttp://www.provencyber.com/
Skuriohttps://skurio.com/
SECEON Networkshttp://www.seceon.com/seceon/
Seclyticshttps://www.seclytics.com/
SecureBrainhttp://www.securebrain.co.jp/eng/web/index.php
Solana Networkshttp://www.solananetworks.com/
SQNetworkshttps://sqnetworks.com/
Thinkst Applied Researchhttps://thinkst.com/
Threat Xhttps://threat-x.com/
ThreatMarkhttps://www.threatmark.com/
ValiMailhttps://www.valimail.com
Nucleonhttp://www.nucleon.sh/
Assured Enterprisesassured.enterprises
AttackIQattackiq.com
Awareness Technologiesawarenesstechnologies.com
Software Diversified Services (SDS)sdsusa.com
SecureMySocialsecuremysocial.com
Airbus CyberSecurityhttps://airbus-cyber-security.com/
Delta Riskdeltarisk.com
HanSighthttp://www.hansight.com/
Lumen – CenturyLinkhttps://www.lumen.com/en-us/home.html
NNTnewnettechnologies.com
nProtectnprotect.com
Safetica Technologiessafetica.com
SecureWaresecureware.com.au
SonicWallsonicwall.com
SysCloudsyscloud.com
Veracityhttps://veracity.io/
Wet Stonewetstonetech.com
AVL Mobile Securitywww.avlsec.com
Dedronewww.dedrone.com
Farsight Securitywww.farsightsecurity.com
genuahttps://www.genua.de/
itWatchwww.itwatch.de
CybelAngelhttps://www.cybelangel.com
Perch Securityhttps://www.perchsecurity.com
SafeGuard Cyberhttps://www.safeguardcyber.com/
Cyabrahttps://www.cyabra.com
Terbium Labshttp://terbiumlabs.com/
Ripjarhttps://ripjar.com
KYNDhttps://www.kynd.io/
Cypawhttps://www.cypaw.com
Patchstackhttps://patchstack.com/
Wardenhttps://warden.co/
Elemendarhttps://www.elemendar.com/
Expansehttps://www.expanse.co
Federacyhttps://www.federacy.com/#top
Acuris Risk Intelligence – C6https://www.acurisriskintelligence.com/
S2T Unlocking Cyberspacehttp://www.s2t.ai/
CYFIRMAhttp://cyfirma.com/
Uppsala Securityhttps://www.uppsalasecurity.com/index.html
Sweepatichttps://www.sweepatic.com/
Cybersprinthttps://www.cybersprint.com/
CyGlasshttps://www.cyglass.com/
BlueVoyanthttps://www.bluevoyant.com/
ID Agenthttp://www.idagent.com/
Prevailionhttp://prevailion.com/
Maltegohttps://www.maltego.com/
EfficientIPhttp://www.efficientip.com/
Corexalyshttps://www.corexalys.com
Intel 471https://intel471.com/
Alephhttp://www.aleph-networks.com
Cyblehttps://cyble.io/
BLACKCLOAKhttps://www.blackcloak.io/
CYR3CONhttps://cyr3con.ai
Apheris AIhttps://www.apheris.com/
PiiQ Media & Riskhttps://www.piiqmedia.com
LMNTRIXhttps://lmntrix.com/
CTM360http://www.ctm360.com
Cythereal Inc.http://www.cythereal.com
Netographyhttps://netography.com/
Smart Protectionhttp://smartprotection.com/
Booz Allen Hamiltonhttps://www.boozallen.com/

Glossary
For your convenience, here are some definitions to Key elements in this list-

Threat Intelligence Feeds- A Threat Intelligence Feed (TI feed) is an ongoing stream of data related to potential or current threats to an organization’s security. Threat Intelligence Feeds provide users with constantly updated information about potential sources of attack.
Threat Intelligence Services- A threat Intelligence Service (TI service) is a provider of information about current or emerging threats that could negatively impact the security of a customer’s organization.
OSINT- Open-Source INTelligence (OSINT) is a multi-factor methodology for collecting, analyzing and making decisions about data accessible publicly to be used by Threat Intelligence Vendors.
Deep Web- Deep Web refers to all web pages that that are unidentifiable by search engines. Deep Web sites may be concealed behind passwords or other security walls, while others simply tell search engines to not “crawl” them. Without visible links, these pages are more hidden for various reasons.
TIPS- Threat Intelligence Platforms (TIPS) are an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real time.
Dark Web- The Dark Web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access.
Threat Analysis- Threat Analysis is a process used to determine which components of the system need to be protected and the types of security risks (threats) they should be protected from.

 

Our Newsletter



Main Office — Israel

56 Hahagana Street Herzlya 46325 Israel

Tel: +972-52-3670513
Email: info@cyberDB.co

Contast US

Follow US