Home / Threat Intelligence and Detection / Threat Intelligence Platforms (TIP)

Threat Intelligence Platforms (TIP)

Unified threat intelligence platforms for proactive defense and faster detection.

Try these 193 AI Threat Intelligence Platforms (TIP) Tools

TeamT5
Free

TeamT5 View TeamT5

TeamT5 Inc. is a world-renowned cybersecurity firm specializing in advanced cyber threat research and innovative defense solutions. Leveraging a top-tier research team, TeamT5 excels in deep threat intelligence, APT and malware detection, and ransomware prevention, offering groundbreaking solutions like ThreatSonar Anti-Ransomware and ThreatVision. Trusted by government agencies and enterprises across the USA, Japan, and Taiwan, TeamT5 actively combats sophisticated cyber threats and provides comprehensive cybersecurity services.

Advanced Malware Research and Analysis
APT and Zero-Day Threat Detection
Ransomware Prevention and Response
Tego Cyber
Free

Tego Cyber View Tego Cyber

Tego Cyber provides a state-of-the-art threat intelligence platform powered by proprietary, automated software. It delivers actionable intelligence with comprehensive context, enabling enterprises to proactively resolve threats before compromise. By integrating curated, real-time threat data, Tego empowers security teams with the 'who, what, why, and how' behind threats, streamlining defense and minimizing risk in a constantly evolving threat landscape.

Proprietary automated threat intelligence platform
Real-time, curated threat data integration
Comprehensive threat context (who, what, why, how)
Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)
Free

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan) View Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan) is a leading non-profit organization dedicated to bolstering the security and reliability of Japan's telecommunications and Internet Service Provider (ISP) networks. Established in 2002 by major domestic ISPs, T-ISAC Japan fosters collaborative efforts among its members to proactively share and analyze critical threat intelligence, enabling more effective and timely responses to cyber threats and ensuring the continuity of vital communications services.

Coordination of information sharing for ISP/telecommunications network security in Japan
Analysis of cyber threats to ensure safe and reliable communications services
Timely measures and response to cyber threats
Teradata
Free

Teradata View Teradata

Teradata empowers organizations with enterprise big data analytics and services to proactively defend against cyber threats. By integrating and analyzing diverse data sources, including security, network operations, and cyber intelligence, Teradata provides predictive insights that accelerate threat detection and remediation. This comprehensive approach enables security teams to reduce response times, automate manual tasks through platforms like Tines, and strengthen their defenses against sophisticated cyber intrusions.

Enterprise Big Data Analytics
Cyber Security Analytics
Predictive Threat Intelligence
Threat Status
Free

Threat Status

Threat Status is a leading Threat Intelligence provider, specializing in data breach monitoring and leaked data hunting through our proprietary SaaS platform, Trillion. We proactively identify and analyze compromised third-party applications and exposed sensitive information, delivering actionable intelligence to protect your organization. Our commitment to affordability ensures that businesses of all sizes can leverage advanced threat defense capabilities.

Real-time third-party breach monitoring
Extensive leaked data hunting capabilities
Advanced data artifact extraction and analysis
ThreatAdvice
Free

ThreatAdvice View ThreatAdvice

ThreatAdvice empowers organizations with a comprehensive cybersecurity education, awareness, and threat intelligence platform. Our best-in-class solution demystifies complex cyber risks and vulnerabilities, equipping your team with the essential knowledge and practical tools for robust protection. We act as your dedicated cybersecurity partner, offering continuous employee training, 24/7 expert support via a cyber hotline, emergency data breach response, proactive risk awareness through simulated phishing, and access to a vast library of cyber policies and procedures.

Comprehensive Cybersecurity Education & Awareness Platform
24/7 Cyber Expert Support & Hotline
Integrated Threat Intelligence
ThreatBook
Free

ThreatBook View ThreatBook

ThreatBook delivers unparalleled real-time threat intelligence, empowering organizations to proactively detect, block, and prevent cyberattacks. Leveraging deep expertise in China’s unique cybersecurity landscape and a global perspective, our SaaS solutions enhance existing defenses across the entire attack lifecycle, enabling rapid, accurate, and cost-effective threat response for diverse industry needs.

Real-time threat intelligence feeds
Proactive attack detection and prevention
In-depth understanding of China's cyber landscape
ThreatConnect
Free

ThreatConnect View ThreatConnect

ThreatConnect by Dataminr is a robust enterprise threat intelligence platform engineered to empower cybersecurity, incident response, and DFIR teams. It streamlines adversary understanding, automates critical workflows, and accelerates threat mitigation through actionable intelligence. Designed for adaptability, ThreatConnect offers a scalable suite of products that grow with your organization, ensuring comprehensive defense capabilities regardless of team size or maturity.

Comprehensive Threat Intelligence Platform
Automated Workflow Execution
Adversary Understanding and Analysis
ThreatMon
Free

ThreatMon View ThreatMon

ThreatMon is a comprehensive threat intelligence platform designed to provide organizations with real-time insights into emerging cyber threats. Leveraging advanced AI-driven analysis and human expertise, ThreatMon empowers you to proactively detect, analyze, and neutralize risks before they impact your operations. Founded by cybersecurity veterans, our mission is to fortify the digital landscape for businesses of all sizes against an ever-evolving threat ecosystem.

Real-time Threat Intelligence Feeds
AI-Powered Anomaly Detection
Predictive Threat Analysis
ThreatQuotient
Free

ThreatQuotient View ThreatQuotient

ThreatQuotient, now part of Securonix, is a leading open and extensible Threat Intelligence Platform (TIP) designed to equip defenders with the essential context, customization, and collaboration capabilities required for robust security operations. By transforming raw threat data into actionable intelligence, ThreatQ™ empowers security teams to gain unmatched control and ensure their intelligence is accurate, relevant, and business-aligned.

Open and Extensible Threat Intelligence Platform (TIP)
Threat Library™ for centralized intelligence management
Adaptive Workbench™ for contextual analysis and prioritization
ThreatSTOP
Free

ThreatSTOP View ThreatSTOP

ThreatSTOP is a cloud-based threat intelligence platform that automates the delivery of curated threat data to your security infrastructure. By translating the latest threat intelligence into actionable enforcement policies, ThreatSTOP proactively blocks malicious inbound and outbound connections, preventing attacks from evolving into costly breaches. This comprehensive approach effectively neutralizes a wide spectrum of threats, including ransomware, DDoS attacks, phishing campaigns, and botnets, ensuring robust protection for your organization.

Cloud-based threat intelligence platform
Automated policy enforcement
Real-time threat data integration
Tidal Cyber
Free

Tidal Cyber View Tidal Cyber

Tidal Cyber empowers defenders with vendor-agnostic tools and services designed to make threat-informed defense practical and sustainable within any enterprise security program. Our platform enables security teams to precisely identify relevant adversary behaviors, map their existing security stack against these threats, and proactively uncover critical security gaps. By facilitating actionable intelligence and automation, Tidal Cyber ensures organizations can effectively tailor their defenses and achieve greater operational efficiency.

Vendor-Agnostic Threat Intelligence
Adversary Behavior Mapping
Security Stack Effectiveness Analysis
TR-CERT (USOM)
Free

TR-CERT (USOM) View TR-CERT (USOM)

TR-CERT, Turkey's National Computer Emergency Response Team, is dedicated to safeguarding national cyber infrastructure by proactively identifying and mitigating cyber threats. Through timely alerts, warnings, and the dissemination of critical information, TR-CERT minimizes the impact of cyber incidents on critical sectors and institutions. Additionally, TR-CERT fosters a robust national cybersecurity ecosystem by conducting specialized training for sectoral CERTs, universities, and the broader cybersecurity community, while actively participating in national and international exercises and forums to enhance collective defense capabilities.

National Cyber Threat Intelligence and Analysis
Incident Response and Mitigation
Cybersecurity Awareness and Training Programs
TruSTAR Technology
Free

TruSTAR Technology View TruSTAR Technology

TruSTAR, now part of Splunk, is a leading threat intelligence exchange platform designed to foster secure, incentivized information sharing among security teams. By breaking down operational silos, it delivers real-time enterprise threat awareness, enabling faster investigations and proactive threat anticipation. Its seamless integration with SIEM, case management, ticketing, and orchestration tools allows for secure storage and correlation of threat data with your most critical resources and trusted sharing communities.

Threat Intelligence Exchange Platform
Real-time Enterprise Threat Awareness
Automated Investigation and Takedown
TWCERT
Free

TWCERT View TWCERT

TWCERT/CC is Taiwan's National Computer Emergency Response Team, dedicated to fostering a secure and resilient digital environment. The organization spearheads the advancement of cyber security incident reporting, disseminates vital educational resources, and drives proactive cyber security outreach initiatives. Through strategic government sponsorship and extensive collaboration with global cyber security entities and diverse stakeholders, TWCERT/CC is instrumental in developing Taiwan's national cyber security collaborative defense system, enhancing industry self-protection capabilities, cultivating expert talent, and strengthening public-private partnerships for an elevated Internet society.

National Cyber Security Incident Reporting
Cyber Security Educational Resource Provision
Cyber Security Outreach Programs
UncommonX
Free

UncommonX View UncommonX

UncommonX delivers enterprise-grade cybersecurity tailored for mid-size organizations, merging advanced adaptive threat intelligence software with round-the-clock expert human oversight. Our proprietary, ground-up threat and intelligence platform is engineered for seamless integration, empowering you to efficiently identify, prioritize, and manage complex security risks without the overhead of a large internal team. Experience scalable, cost-effective, and highly effective security solutions designed for your unique needs, ensuring robust protection is accessible to all businesses.

Adaptive Threat Intelligence Platform
24/7 Expert Security Monitoring
Seamless Integration with Existing Systems
Unit 42
Free

Unit 42 View Unit 42

Unit 42 is Palo Alto Networks' premier threat intelligence and incident response organization, delivering proactive cyber risk management through an intelligence-driven, response-ready methodology. Our globally recognized researchers, incident responders, and security consultants provide expert guidance and support throughout the entire cybersecurity lifecycle – before, during, and after an incident. We empower organizations to adapt their security strategies to the evolving threat landscape and expanding attack surfaces, ensuring robust protection.

World-renowned threat research
Expert incident response
Proactive cyber risk management
Uppsala Security
Free

Uppsala Security View Uppsala Security

Uppsala Security is a pioneering force in cybersecurity, established in 2018, and recognized for developing the Sentinel Protocol, the world's first blockchain-powered, crowdsourced threat intelligence platform. This innovative solution, backed by expert security analysts and researchers, provides organizations with a robust framework to prevent and mitigate criminal activities through the rapid dissemination of authentic threat information. Uppsala Security is committed to delivering affordable, effective, and compliant security solutions that ensure a safely interconnected digital experience.

Sentinel Protocol: Blockchain-powered crowdsourced threat intelligence
Real-time threat data dissemination for proactive defense
Expert security analyst and researcher team
Validin
Free

Validin View Validin

Validin provides unparalleled DNS intelligence, offering security teams the definitive global view of the internet for advanced cyber threat intelligence. Our continuously evolving platform empowers you to uncover hidden infrastructure, track sophisticated threat actors, and make decisive security actions with confidence by leveraging context-rich historical DNS data. We aggregate insights from diverse public blocklists, reputation sources, and popularity datasets, enabling rapid investigation and a clear understanding of domains and IPs to proactively defend against cybercriminals and APTs.

Global Public Internet Visibility
Context-Rich Historical DNS Data
Hidden Infrastructure Discovery
Velum Labs
Free

Velum Labs View Velum Labs

Velum Labs delivers sophisticated yet accessible cloud and cyber intelligence solutions, empowering organizations to navigate the complex and evolving threat landscape with confidence. Our offerings are meticulously designed, leveraging a deep understanding of cyber-attack methodologies to provide actionable insights for the insurance, regulatory, and legal sectors. We simplify complex risks, enabling clients to enhance their adaptability and response capabilities against sophisticated threats.

Comprehensive 360° view of primary configuration errors leading to data breaches via V-CLOUD.
Next-generation Cyber Intelligence Platform (V-DARK) for combating high-end threats.
Specialized intelligence against APT groups and organized financial crime syndicates.
Vigilant Technology Solutions
Free

Vigilant Technology Solutions View Vigilant Technology Solutions

Vigilant Technology Solutions empowers organizations with comprehensive cybersecurity lifecycle management through its advanced CyberDNA platform. This global leader provides real-time threat intelligence, enabling proactive defense against evolving cyber threats by offering immediate correlation of logging data against a vast intelligence network. CyberDNA delivers critical insights into attacker origins and methodologies, allowing businesses to maintain policy adherence and effectively manage risk while ensuring financial responsibility.

Real-time cyber threat alerts
End-to-end IT & cyber security lifecycle management
Malware analysis and threat detection
Virus Bulletin
Free

Virus Bulletin View Virus Bulletin

Virus Bulletin is a premier online security information portal and respected certification body dedicated to providing independent, actionable intelligence on the global threat landscape. We offer rigorous certifications for anti-malware and anti-spam solutions, fostering trust and efficacy in cybersecurity products. Our platform also features an annual international IT security conference and a comprehensive Supplier Directory connecting organizations with over 8,000 specialized cybersecurity service providers across 128 countries.

Independent global threat landscape intelligence
Certification for anti-malware and anti-spam products
Annual international IT security conference
Volexity
Free

Volexity View Volexity

Volexity provides advanced threat intelligence and incident suppression, specializing in disruptive memory analysis to uncover hidden threats. Our solutions empower organizations to move beyond traditional security limitations, offering deep insights into device states and associated risks. Trusted by global leaders and government institutions, Volexity protects critical data assets through customized intelligence and robust incident response.

Advanced Memory Analysis
Customized Threat Intelligence
Incident Suppression Services
West Midlands Cyber Resilience Centre (WMCRC)
Free

West Midlands Cyber Resilience Centre (WMCRC) View West Midlands Cyber Resilience Centre (WMCRC)

The West Midlands Cyber Resilience Centre (WMCRC) is a dedicated resource empowering SMEs, supply chain partners, and third sector organizations across the region to combat cyber threats. By collaborating with local universities and police forces, WMCRC delivers cutting-edge intelligence on emerging cyber risks, criminal tactics, and robust resilience strategies, enabling businesses to proactively safeguard their operations, staff, and clientele from increasingly sophisticated cyber-attacks. We offer accessible, cost-effective testing and tailored training solutions, equipping organizations with the knowledge to identify vulnerabilities and effectively procure private sector cyber security services when required.

Region-specific cyber threat intelligence
Expert guidance against emerging cyber risks
Collaboration with local Police and Universities