Home / Threat Intelligence and Detection / Threat Intelligence Platforms (TIP)

Threat Intelligence Platforms (TIP)

Unified threat intelligence platforms for proactive defense and faster detection.

Try these 193 AI Threat Intelligence Platforms (TIP) Tools

AdaptiveMobile Security
Free

AdaptiveMobile Security View AdaptiveMobile Security

AdaptiveMobile Security, now part of Enea, is a global leader in mobile network security, safeguarding over 2.2 billion subscribers. Their advanced Threat Intelligence Unit and Network Protection Platform deliver comprehensive mobile threat defense and intelligence, powered by continuous machine learning and specialized expertise. Trusted by major service providers, they offer constant protection and rapid threat response against existing and emerging cyber threats, securing critical communications infrastructure for networks, nations, and individuals.

Comprehensive Mobile Threat Defense
World-leading Threat Intelligence
Network Protection Platform
AdvIntel
Free

AdvIntel

AdvIntel, founded by seasoned certified investigators, reverse engineers, and security experts, provided cutting-edge threat and loss prevention solutions. They specialized in combating sophisticated threats like fraud, ransomware, and botnets through advanced early-warning alerting, actionable threat intelligence, and strategic long-term services for both private sector and government clients. Their unique blend of governmental, legal, forensics, and corporate finance experience ensured the delivery of highly tailored intelligence.

Next-generation threat prevention
Next-generation loss prevention
Advanced fraud detection and prevention
AI Spera
Free

AI Spera View AI Spera

AI Spera delivers advanced AI-driven cyber threat intelligence, empowering comprehensive security across your entire business. Leveraging cutting-edge anomaly-behavior detection and machine learning, our solutions provide real-time insights to proactively identify and neutralize emerging threats. We ensure continuous visibility and effective asset management across the expanding attack surface, continuously evolving our strategies to counter increasingly sophisticated cyber adversaries.

Real-time AI-driven threat intelligence
Anomaly-behavior detection
Machine learning for threat analysis
Alpha Mountain AI (alphaMountain)
Free

Alpha Mountain AI (alphaMountain) View Alpha Mountain AI (alphaMountain)

Alpha Mountain AI delivers comprehensive and real-time domain and IP intelligence, empowering cybersecurity operations with critical data for investigation and defense. Our advanced AI platform, leveraging cutting-edge machine learning, identifies malicious actors and provides essential threat intelligence, web reputation data, and content categorization to fortify your network and protect users. Integrate seamlessy via REST API or data feeds for unparalleled internet security insights.

Real-time domain and IP intelligence
Advanced AI and machine learning capabilities
Comprehensive threat intelligence
AnChain.AI
Free

AnChain.AI View AnChain.AI

AnChain.AI is a leading blockchain analytics platform leveraging proprietary AI, knowledge graphs, and threat intelligence to proactively safeguard crypto assets. Our advanced platform automatically analyzes all blockchain transaction data, performs smart contract audits, and delivers actionable business intelligence for enhanced security, operations, and compliance. Empower your teams to identify threats, investigate incidents, and generate intelligence for strategic growth and robust risk management.

Proprietary AI and Knowledge Graphs for Transaction Analysis
Real-time Threat Intelligence on Blockchain Activities
Automated Smart Contract Audits and Vulnerability Detection
AnubisNetworks
Free

AnubisNetworks View AnubisNetworks

AnubisNetworks is a premier European provider of advanced threat intelligence and robust email security solutions. Our flagship Mail Protection Service (MPS) delivers comprehensive defense against emergent cyber threats including ransomware, sophisticated spam, Business Email Compromise (BEC), spoofing, and phishing attacks. By leveraging the AnubisNetworks Threat Intelligence ecosystem, MPS ensures real-time detection and proactive avoidance of the latest cyber adversaries, seamlessly integrating with all major email platforms like Microsoft Office 365 and G Suite.

Real-time detection and avoidance of advanced threats
Comprehensive protection against ransomware, spam, BEC, spoofing, and phishing
Integration with Microsoft Office 365 and G Suite
APCERT
Free

APCERT View APCERT

APCERT is a leading cybersecurity initiative dedicated to fostering internet security across the Asia Pacific region through robust cooperation among CERTs and CSIRTs. By cultivating a trusted network of cybersecurity experts, APCERT enhances regional awareness of malicious cyber activities and strengthens collective capabilities in detection, prevention, and mitigation.

Regional CERT/CSIRT Cooperation
Information Sharing Platform
Cybersecurity Expert Network
AT&T Cybersecurity
Free

AT&T Cybersecurity View AT&T Cybersecurity

AT&T Cybersecurity, now operating as LevelBlue, delivers comprehensive, edge-to-edge security solutions powered by advanced threat intelligence and collaborative defense. Leveraging unparalleled network visibility and insights from AT&T Alien Labs, our integrated approach proactively identifies and neutralizes threats, ensuring robust protection for your global business operations.

Edge-to-Edge Threat Intelligence
Collaborative Defense Framework
Seamless Security Integration
Atlas Cloud
Free

Atlas Cloud View Atlas Cloud

Atlas Cloud is a leading UK-wide managed services provider, headquartered in Newcastle. We empower business leaders with a unique, research-led approach to IT strategy, transforming complex data into actionable insights for enhanced decision-making. Our comprehensive suite of services, from proactive cyber threat intelligence to our innovative XLA service for long-term IT effectiveness, ensures unparalleled clarity and a decisive advantage in managing your digital landscape. Don't let cyber security be an afterthought; our structured approach guarantees you stay ahead of threats.

Research-led IT strategy and decision support
Proactive cyber threat intelligence and reporting
Flagship XLA service for long-term IT effectiveness
Automotive Information Sharing & Analysis Center (Auto-ISAC)
Free

Automotive Information Sharing & Analysis Center (Auto-ISAC) View Automotive Information Sharing & Analysis Center (Auto-ISAC)

The Automotive Information Sharing and Analysis Center (Auto-ISAC) is a vital, industry-led community dedicated to bolstering global vehicular cybersecurity. It fosters collaboration among light- and heavy-duty vehicle OEMs, suppliers, and the commercial sector to proactively share and analyze intelligence on emerging cyber threats. Through its comprehensive resources, including best practices and regular community engagements, Auto-ISAC empowers cyber professionals to collectively identify risks, develop effective solutions, and elevate cybersecurity standards across the entire automotive ecosystem.

Industry-driven cybersecurity intelligence sharing
Proactive identification of vehicle cyber threats
Collaborative development of cybersecurity solutions
Bfore.ai
Free

Bfore.ai View Bfore.ai

Bfore.ai delivers proactive cyber defense by transforming your security infrastructure with predictive threat intelligence. Leveraging patented AI and a hyperscale observation network, our platform anticipates and neutralizes future attacks before they materialize. With an industry-leading low false positive rate and the ability to process over 30,000 new malicious indicators daily, Bfore.ai empowers organizations to shift from a reactive to a truly preventive security posture.

Predictive Threat Intelligence Feed
Patented AI-driven Analysis
Hyperscale Observation Infrastructure
Black Kite
Free

Black Kite View Black Kite

Black Kite elevates your security posture with unified Security-as-a-Service solutions, integrating advanced cyber threat intelligence, proactive vulnerability management, and continuous perimeter monitoring. By aggregating threat data from diverse global sources, Black Kite delivers actionable intelligence, empowering organizations to preemptively mitigate risks and adapt to the ever-evolving threat landscape. Our intuitive cloud or on-premise platforms simplify the complex task of cybersecurity, enabling early detection and prevention of potential cyber threats.

Comprehensive Cyber Threat Intelligence
Proactive Vulnerability Management
Continuous Perimeter Monitoring
Blackwired
Free

Blackwired View Blackwired

Blackwired redefines cybersecurity with an intelligence-led approach, inspired by the USMC’s Combat Hunter ‘Left of Bang’ methodology. We provide advanced cyber defense by fusing proprietary technology and deep human expertise, honed over three decades of operational experience. Our Zero Day Live platform delivers over 70% proprietary threat intelligence, enabling proactive defense that operates at adversary speed, reducing breach risk and enhancing enterprise security architecture.

Intelligence-led Cybersecurity Model
USMC Combat Hunter 'Left of Bang' Approach
Advanced Cyber Capabilities (Technology & Human Expertise)
Blueliv
Free

Blueliv View Blueliv

Blueliv, now part of Outpost24, is Europe's premier cyber threat intelligence provider, extending visibility beyond your network perimeter. It meticulously analyzes the open, deep, and dark web to deliver timely, automated, and actionable intelligence, empowering organizations to effectively defend against threats and manage their digital risk.

Open, Deep, and Dark Web Monitoring
Automated Threat Intelligence Delivery
Actionable Threat Data
BlueVoyant
Free

BlueVoyant View BlueVoyant

BlueVoyant delivers advanced cyber defense capabilities to protect enterprises and government entities from complex threats. Their integrated Cyber Defense Platform combines AI-driven threat monitoring across networks, endpoints, and supply chains with expert human analysis, extending visibility to the clear, deep, and dark web for comprehensive security and rapid mitigation.

Real-time multidimensional threat monitoring (networks, endpoints, supply chains)
Clear, deep, and dark web threat intelligence
AI-powered threat detection and analysis
BruCERT
Free

BruCERT View BruCERT

BruCERT, established in 2004, is Brunei Darussalam's premier national computer emergency response team. Collaborating with AITI and the Ministry of Communication, BruCERT serves as the central referral agency for all computer and internet security incidents. We proactively coordinate with local and international entities to detect, analyze, and prevent cyber threats, ensuring a safer digital landscape for the nation through initiatives like Secure Verify Connect.

National Computer Emergency Response Team (CERT)
Cybersecurity Incident Detection and Analysis
Incident Prevention and Mitigation
Canadian Cyber Threat Exchange (CCTX)
Free

Canadian Cyber Threat Exchange (CCTX) View Canadian Cyber Threat Exchange (CCTX)

The Canadian Cyber Threat Exchange (CCTX) is Canada's leading not-for-profit, private-sector hub dedicated to fostering secure collaboration against cyber threats. By facilitating the secure exchange of enriched cyber threat intelligence and providing a dedicated forum for cyber professionals, CCTX empowers organizations across all sectors to proactively mitigate risks and share best practices for a more resilient Canadian digital landscape.

Secure Cyber Threat Information Exchange & Analysis
Actionable Threat Intelligence with a Canadian Focus
Collaborative Platform for Cyber Professionals
Cassini
Free

Cassini View Cassini

Cassini, now part of Bastion Security Group, is a premier Information Security consultancy and software development firm based in New Zealand. We are recognized leaders in STIX2/TAXII2 threat intelligence feeds, offering expertise in both producing and consuming these critical APIs. Our Cassini Cyber Threat Intelligence (CTI) solution empowers organizations to proactively defend against cyber attacks by integrating trusted threat intelligence from New Zealand agencies directly into your network with minimal operational overhead.

Specialized Information Security Consultancy
Expert STIX2/TAXII2 Threat Intelligence
Production and Consumption of STIX2/TAXII2 APIs
CAT Labs
Free

CAT Labs View CAT Labs

CAT Labs is at the forefront of protecting the Web3 and DeFi ecosystem from escalating cyber threats. We develop advanced cybersecurity protocols, including world-class crypto endpoint security, threat intelligence, and incident response, specifically designed for crypto projects, retail investors, and institutional entities. Our solutions are crafted by industry-leading cryptographers and white hats to proactively prevent hacks and mitigate vulnerabilities, safeguarding the integrity of digital assets and the decentralized revolution.

Advanced Crypto Cybersecurity Protocols
World-Class Crypto Endpoint Security
Proactive Threat Intelligence
Celerium
Free

Celerium View Celerium

Celerium empowers organizations and entire industry sectors to achieve advanced cyber defense capabilities through the strategic application of actionable cyber threat intelligence. As a recognized leader, we provide a comprehensive suite of solutions designed to proactively identify, analyze, and neutralize cyber threats and attacks, ensuring robust protection for critical assets and operations. Our integrated platform helps you achieve peak cyber defense potential, streamlining security, risk management, and compliance efforts.

Actionable Cyber Threat Intelligence
Proactive Threat Detection and Analysis
Comprehensive Cyber Defense Solutions
Centre for Cyber Security (CFCS) - Denmark
Free

Centre for Cyber Security (CFCS) - Denmark View Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security (CFCS) serves as Denmark's leading national authority in IT security, acting as the Network Security Service and a National Centre of Excellence. Its core mission involves providing expert guidance to Danish public authorities and vital private sector organizations on preventing, countering, and protecting against cyber threats. As an integral part of the Danish Defence Intelligence Service (DDIS), CFCS leverages unique intelligence-based insights to enhance national cyber resilience and foster synergistic advancements in the field.

National IT Security Authority
Network Security Service
National Centre of Excellence in Cyber Security
Centripetal Networks
Free

Centripetal Networks View Centripetal Networks

Centripetal Networks pioneers advanced network security by simplifying intelligence-driven defense against sophisticated cyber threats. Leveraging proprietary core-networking technologies and the industry's largest threat intelligence partner ecosystem, Centripetal delivers community-based solutions for unparalleled protection. Their flagship product, QuickThreat®, automates cyber intelligence collection, management, and action, empowering organizations across diverse sectors like finance, retail, healthcare, technology, and ISPs to effectively identify and neutralize malicious network traffic.

Advanced threat protection
Intelligence-driven security
Proprietary core-networking technologies
CERT-AM
Free

CERT-AM View CERT-AM

CERT-AM serves as Armenia's national Computer Emergency Response Team, functioning as the central authority for information security. The organization plays a crucial role in responding to cyber incidents, disseminating threat intelligence, and promoting cybersecurity best practices within the nation. As the operational entity for Internet Society HK-in, CERT-AM contributes to a secure and resilient internet infrastructure for Armenia.

National Information Security Center
Computer Emergency Response Team (CERT)
Cyber Incident Response
CERT-IS
Free

CERT-IS View CERT-IS

CERT-IS is Iceland's national Computer Emergency Response Team, established in 2013 and operating under the Electronic Communications Office of Iceland (ECOI). Mandated by law, CERT-IS serves as the primary national contact point for cybersecurity incidents, proactively analyzing threats, advising on vulnerabilities, and providing critical incident response assistance to protect Iceland's digital infrastructure. Through proactive analysis, public education via netöryggi.is, and robust international collaboration including the Nordic CERT Cooperation (NCC), CERT-IS significantly enhances national cybersecurity posture.

National Cybersecurity Incident Response
Proactive Threat and Vulnerability Analysis
Cybersecurity Incident Assistance