LinkedIn respects your privacy

LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.

Select Accept to consent or Reject to decline non-essential cookies for this use. You can update your choices at any time in your settings.

Skip to main content
LinkedIn
      Join now Sign in
        • Used by
        • See all products

        Find top products in Threat Intelligence Platforms category

        Software used to gather real-time threat information from multiple sources to defend against existing or emerging security attacks. - Respond to zero-day threats and other serious security risks to global endpoints, networks, and infrastructure - Gather data to detect unknown vulnerabilities, cyberattacks, and the newest forms of system threats - Collect and correlate data from different sources, share intelligence with other teams and stakeholders, and develop specific remediation techniques

        333 results

        Person working in front of a computer
        • Cisco Secure Malware Analytics’ product picture

          Cisco Secure Malware Analytics

          Threat Intelligence Platforms by Cisco

          With Cisco Secure Malware Analytics (formerly Threat Grid) you gain dynamic malware analysis, sandboxing, and threat intelligence feeds for threat visibility and network security.

          View product
        • Unit 42’s product picture

          Unit 42

          Threat Intelligence Platforms by Palo Alto Networks

          Unit 42™ brings together world-renowned threat researchers, incident ­ responders, and security consultants to create an intelligence-­ driven, response-ready organization that's passionate about helping you ­proactively manage cyber risk.

          View product
        • Microsoft Security Copilot’s product picture

          Microsoft Security Copilot

          Threat Intelligence Platforms by Microsoft Security

          Microsoft Security Copilot is a generative AI-powered assistant for daily operations in security and IT. Copilot empowers teams to protect at the speed and scale of AI by turning global threat intelligence, industry best practices, and organizations’ security data into tailored insights to outsmart and outpace adversaries.

          View product
        • ICS™’s product picture

          ICS™

          Threat Intelligence Platforms by Parsons Corporation

          ICS™ passively collects communications signals, characterize cellular and Wi-Fi networks, and detect rogue cellular base stations.

          View product
        •  Microsoft Defender’s product picture

          Microsoft Defender

          Threat Intelligence Platforms by Microsoft Security

          Anticipate and stop attacks with AI-driven defense. Microsoft Defender is the industry’s most comprehensive native security operations solution—uniting threat prevention, detection, investigation, and response into a single, AI-powered platform. Built on the proven foundation of Microsoft Defender XDR, Microsoft Sentinel’s SIEM capabilities, and powered by Security Copilot, it delivers a unified analyst experience that empowers security teams to act faster and smarter. With native integration of Microsoft’s security data lake, exposure management, and threat intelligence, Defender enables proactive, data-driven security operations. Analysts can hunt threats, manage incidents, and collaborate across teams—all within a unified portal designed to power the SOC of the future.

          View product
        • Find products trusted by professionals in your network

          See which products are used by connections in your network and those that share similar job titles Sign in to view full insights

        • ABIS In A Box’s product picture

          ABIS In A Box

          Threat Intelligence Platforms by Parsons Corporation

          ABIS in a Box is a portable, rugged, deployable Biometrics Gateway Server. The box includes built-in network switch, RAID storage, keyboard/video/mouse (KVMO), and UPS power supply. ABIS in a box provides local match, identity management and transaction submission and responses to local and national biometric repositories.

          View product
        • Spotlight Secure Threat Intelligence Platform’s product picture

          Spotlight Secure Threat Intelligence Platform

          Threat Intelligence Platforms by Juniper Networks

          Spotlight Secure is a cloud-based threat intelligence platform and intrusion detection & prevention system that tracks, collects & shares attack data.

          View product
        • Kaspersky Threat Intelligence’s product picture

          Kaspersky Threat Intelligence

          Threat Intelligence Platforms by Kaspersky

          A complex of products and services for in-depth visibility into cyberthreats targeting your organization.

          View product
        • XVigil’s product picture

          XVigil

          Threat Intelligence Platforms by CloudSEK

          XVigil, the Digital Risk Protection platform enables you with a single unified dashboard to view all your digital threats (Web, Mobile, Brand, Infrastructure). The platform constantly maps your organization’s digital assets, identifies threats and enriches them with cyber intelligence, and then provides workflows to manage and remediate the identified threats.

          View product
        • PhishER™’s product picture

          PhishER™

          Threat Intelligence Platforms by KnowBe4

          KnowBe4 created the PhishER platform to help your InfoSec and Security Operations teams cut through the inbox noise and respond to the most dangerous threats more quickly. Additionally, with PhishER you are able to automate the workstream of the 90% of reported emails that are not threats. PhishER is a simple and easy-to-use web-based platform with critical workstream functionality that serves as your phishing emergency room to identify and respond to user-reported messages. With PhishER, your team can prioritize, analyze, and manage a large volume of email messages—fast! The goal is to help you and your team prioritize as many messages as possible automatically, with an opportunity to review PhishER’s recommended focus points and take the actions you desire.

          View product

        How it works

        • Explore

          Discover the best product for your need from a growing catalog of 25,000 products and categories trusted by LinkedIn professionals

        • Learn

          Evaluate new tools, explore trending products in your industry and see who in your network is skilled in the product

        • Grow

          Join communities of product users to learn best practices, celebrate your progress and accelerate your career

        • LinkedIn © 2025
        • About
        • Accessibility
        • User Agreement
        • Privacy Policy
        • Cookie Policy
        • Copyright Policy
        • Brand Policy
        • Guest Controls
        • Community Guidelines