Alternatives to ShadowDragon

Compare ShadowDragon alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ShadowDragon in 2026. Compare features, ratings, user reviews, pricing, and more from ShadowDragon competitors and alternatives in order to make an informed decision for your business.

  • 1
    Guardz

    Guardz

    Guardz

    Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native framework designed for operational efficiency. Our identity-centric approach connects the dots across vectors, reducing the gaps that siloed tools leave behind so MSPs can see, understand, and act on user risk in real time. Backed by an elite research and threat hunting team, Guardz strengthens detection across environments, turning signals into actionable insights. With 24/7 AI + human-led MDR, Guardz utilizes agentic AI to triage at machine speed while expert analysts validate, mitigate, and guide response, giving MSPs scalable protection without adding headcount. Our mission is simple: give MSPs the scale, confidence, and clarity they need to stay ahead of attackers and deliver protection to every SMB they serve.
    Partner badge
    Compare vs. ShadowDragon View Software
    Visit Website
  • 2
    SOCRadar Extended Threat Intelligence
    SOCRadar provides a unified, cloud-hosted platform designed to enrich your cyber threat intelligence by contextualizing it with data from your attack surface, digital footprint, dark web exposure, and supply chain. We help security teams see what attackers see by combining External Attack Surface Management, Cyber Threat Intelligence, and Digital Risk Protection into a single, easy-to-use solution. This enables your organization to discover hidden vulnerabilities, detect data leaks, and shut down threats like phishing and brand impersonation before they can harm your business. By combining these critical security functions, SOCRadar replaces the need for separate, disconnected tools. Our holistic approach offers a streamlined, modular experience, providing a complete, real-time view of your threat landscape to help you stay ahead of attackers.
    Compare vs. ShadowDragon View Software
    Visit Website
  • 3
    ConnectWise Cybersecurity Management
    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 4
    Recorded Future

    Recorded Future

    Recorded Future

    Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so business can be conducted with confidence. Recorded Future is trusted by more than 1,000 businesses and government organizations around the world. The Recorded Future Security Intelligence Platform produces superior security intelligence that disrupts adversaries at scale. It combines analytics with human expertise to unite an unrivaled variety of open source, dark web, technical sources, and original research.
  • 5
    Constella Intelligence

    Constella Intelligence

    Constella Intelligence

    Continuously monitor thousands of data sources across the public, deep & dark web to gain the insights you need to detect and act on emerging cyber-physical threats before damage occurs. And accelerate your investigations by delving deeper into risks threatening your organization. Analyze monikers, enrich information with other datasets, and quickly unmask malicious actors to solve cybercrimes faster. Defending your digital assets against targeted attacks, Constella is powered by a unique combination of unparalleled breadth of data, technology and human expertise from world-class data scientists. Data to link real identity information to obfuscated identities & malicious activity to inform your products and safeguard your customers. Profile threat actors faster with advanced monitoring analysis, automated early warning and intelligence alerts.
  • 6
    Cobwebs Web Intelligence

    Cobwebs Web Intelligence

    Cobwebs Technologies

    Our powerful web intelligence solution monitors online activity, collecting and analyzing data of endless digital channels – from the open, deep and dark web, to mobile and social. Our exclusive deep and dark web monitoring technology extracts targeted intelligence from the web’s big data using the latest machine learning algorithms, automatically generating critical insights. The increasing use of social media, mobile apps, and dark web has led to significant growth of illegal activities on the internet. These platforms are used by criminals, terrorists, and hackers and to conduct operations with minimal visibility. Enterprises as well as government agencies deal with manual web investigations on a day to day basis facing the various challenges to do with exposing their digital footprint. Web Intelligence has become a crucial part of Intelligence methodologies and security management.
  • 7
    Rapid7 Threat Command
    Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business. Quickly turn intelligence into action with faster detection and automated alert responses across your environment. This is made possible through plug-and-play integrations with your existing technologies for SIEM, SOAR, EDR, firewall, and more. Simplify your SecOps workflows through advanced investigation and mapping capabilities that provide highly contextualized alerts with low signal-to-noise ratio. Unlimited 24/7/365 access to our expert analysts shortens investigation times as well as accelerates alert triage and response.
  • 8
    Social Links

    Social Links

    Social Links

    We bring together data from 500+ open sources covering social media, messengers, blockchains, and the dark web, to visualize and analyze a holistic picture for streamlining investigations. Conduct investigations across 500+ open sources with the help of 1700+ search methods. Extract user profiles, numbers,
messages, groups, and more. View transactions, addresses, senders, recipients, and more. Access an expansive set of original search methods. Gain full access to darknet marketplaces, forums, and more. Delve into an extensive set
of corporate sources. A suite of data extraction and analysis methods across social media, blockchains, messengers, and the dark web is connected directly to your in-house platform via our API. An enterprise-grade on-premise OSINT platform with customization options, private data storage, and our widest range of search methods. Companies from S&P500 and law enforcement agencies from 80+ countries rely on Social Links' solutions.
  • 9
    LifeRaft Navigator
    Consolidate, assess, and investigate intelligence in a single platform. Collect and alert on data relevant to your security operations from social media, deep web, and darknet sources 24/7. Our unified intelligence platform automates collection and filtering, and provides a suite of investigative tools to explore and validate threats. Uncover critical information that impacts the security of your assets and operations. Navigator monitors the internet 24/7 with custom search criteria to detect high-risk threats to your people, assets, and operations from diversified sources. Finding the needle in the haystack is a growing challenge for security operations teams. Navigator provides advanced filtering tools to capture the breadth of the online threat landscape. Uncover, explore, and use a variety of sources to validate intelligence related to threat actors, events, and special interest projects or security issues.
  • 10
    DarkOwl

    DarkOwl

    DarkOwl

    We are the industry’s leading provider of darknet data, offering the largest commercially available database of darknet content in the world. DarkOwl offers a suite of data products designed to meet the needs of business looking to quantify risk and understand their threat attack surface by leveraging darknet intelligence. DarkOwl Vision UI and API products make our data easy to access in your browser, native environment or customer-facing platform. Darknet data is a proven driver of business success for use cases spanning beyond threat intelligence and investigations. DarkOwl API products allow cyber insurance underwriters and third party risk assessors to utilize discrete data points from the darknet and incorporate them into scalable business models that accelerate revenue growth.
  • 11
    Media Sonar

    Media Sonar

    Media Sonar Technologies

    Harness the unique insights only available from Web Intelligence & Investigation to better protect your corporate brand and assets. Our unique investigative module, Pathfinder, empowers both novice and experienced security teams with a streamlined path of next step related entities and a visible recording of your selected investigative trail. Media Sonar integrates the top OSINT tools and data sources into a seamless, single platform making it 30X faster than conducting OSINT with traditional methods. Your team will no longer be required to spend hours going in and out of multiple, incompatible OSINT tools and manually compiling results. Our Web Intelligence & Investigations platform will broaden your lens on your digital attack surface, helping you to secure your brand and assets and strengthen your security operations posture. Equip your security team with visibility into indicators of threat emerging outside of your organization, with intelligence from the Open and Dark Web.
    Starting Price: $1,500 per 3 users per month
  • 12
    DarkIQ

    DarkIQ

    Searchlight Cyber

    Spot cyberattacks. Earlier. Monitor, pre-empt, and prevent costly security incidents–against your brand, suppliers, and people with actionable dark web alerts. Think of us like your automated analyst. DarkIQ is your secret weapon, continuously monitoring the dark web for cybercriminal activity. It detects, categorizes, and alerts you to imminent threats so that you can take action against cybercriminals before they strike. See what threat actors are planning. Spot the early warning signs of attack including insider threat, executive threat, and supply chain compromise before they impact your business.
  • 13
    Cerberus

    Cerberus

    Searchlight Cyber

    Adversaries using the dark web think you can’t see them, with Cerberus you can. Identify and preserve dark web evidence on drugs, arms, CSEA, and ransomware. Trusted globally by law enforcement and government agencies, Cerberus uses proprietary techniques developed by world-leading researchers to deliver the most comprehensive dark web dataset on the market, providing access to intelligence that was previously unobtainable.
  • 14
    ThreatMon

    ThreatMon

    ThreatMon

    ThreatMon is an AI-powered cybersecurity platform that combines comprehensive threat intelligence with cutting-edge technology to proactively identify, analyze, and mitigate cyber risks. It provides real-time insights across a wide range of threat landscapes, including attack surface intelligence, fraud detection, and dark web monitoring. The platform offers deep visibility into external IT assets, helping organizations uncover vulnerabilities and defend against emerging threats such as ransomware and APTs. With tailored security strategies and continuous updates, ThreatMon enables businesses to stay ahead of evolving cyber risks, enhancing their overall cybersecurity posture and resilience.
  • 15
    TellFinder

    TellFinder

    Uncharted Software

    Use TellFinder to search vast areas of the deep web or other media troves for connections to known subjects. Discover network personas in a fraction of the time. Better understand your partners, customers and relationships. Score for risk, uncover personas and segment across new dimensions. Find connections between complex concepts. Identify precedents and find areas of novelty. Gather intelligence, detect networks and uncover actors on the deep and dark web. Score for risk factors and link ads across time and space using common contact information, writing style and images. Quickly search through archived web data by searching names, addresses, other attributes, and even images using a Google-like interface. Web results with common attributes are grouped into "personas" to help identify key people and organizations. Quickly investigate relationships between personas that shared extracted attributes such as phone numbers, emails, addresses, or even similar images.
  • 16
    Kaduu

    Kaduu

    Kaduu

    Kaduu helps you understand when, where and how stolen or accidentally leaked information in dark web markets, forums, botnet logs, IRC, social media and other sources is exposed. Kaduu’s alerting service can also detect threats before they turn into incidents. Kaduu offers AI-driven dark web analysis, real-time threat alerts and pre-Attack threat indicators. Setup in minutes you will receive instant access to real-time reporting. Employees who are heavily exposed to the Internet are at greater risk of social engineering attacks such as phishing. Kaduu offers the option of monitoring any mention of credit card information (name, part of number, etc.) on the Dark Web.
    Starting Price: $50 per company per month
  • 17
    Vigilante Operative
    Cyber threats are proliferating at an alarming rate and often result in data exfiltration, network infiltration, data loss, account activity takeover, compromised customer data and reputational damage to an organization. As threat actors become more aggressive and malicious, the burden on IT security professionals becomes greater, especially with tight budgets and limited resources. As these threats become overwhelming, it is more challenging for organizations to gain the upper hand. Operative is our advanced threat intelligence hunting service for enterprise organizations. Vigilante lives within the dark web community to remain ahead of emerging threats, enabling deeper visibility and providing a continuous feedback loop of insight into exposures such as: Third-party risk and exposure, leaked or stolen data, malicious campaigns, attack vectors.
  • 18
    VoyagerAnalytics

    VoyagerAnalytics

    Voyager Labs

    Every day, an immense amount of publicly available, unstructured data is produced on the open, deep, and dark web. The ability to gain immediate and actionable insights from this vast amount of data is critical for any investigation. VoyagerAnalytics is an AI-based analysis platform, designed to analyze massive amounts of unstructured open, deep, and dark web data, as well as internal data, in order to reveal actionable insights. The platform enables investigators to uncover social whereabouts and hidden connections between entities and focus on the most relevant leads and critical pieces of information from an ocean of unstructured data. Simplify data gathering, analysis and smart visualization that would take months to handle. It presents the most relevant and important information in near real-time, saving resources normally spent retrieving, processing, and analyzing vast amounts of unstructured data.
  • 19
    PhishLabs
    The PhishLabs Platform is the foundation of Fortra's Digital Risk Protection solution. Developed over a decade in partnership with the world’s most targeted brands, PhishLabs delivers comprehensive collection, expert-driven curation, and complete and unlimited mitigation of digital risks. Brand impersonation, data leakage, and other external threats can happen anywhere online. Without extensive visibility across digital channels into domain activity, social media posts and ads, and the dark web and open web, these threats can easily go undetected and cause substantial harm. PhishLabs' Digital Risk Protection solution delivers comprehensive visibility by collecting massive amounts of data across the surface, deep, and dark web. We also monitor hundreds of social media sources and ingest data from hundreds of public and private data feeds. We also integrate data from client-specific sources such as referrer logs and 3rd party feeds.
  • 20
    Darkfeed

    Darkfeed

    Cybersixgill

    Unleash cyber security performance, supercharge your security stack and maximize analysts’ performance with the ultimate underground threat intelligence collection available. Darkfeed is a feed of malicious indicators of compromise, including domains, URLs, hashes, and IP addresses. It relies on Cybersixgill’s vast collection of deep and dark web sources and provides unique and advanced warnings about new cyberthreats. It is automated, meaning that IOCs are extracted and delivered in real-time, and it is actionable, meaning that its consumers will be able to receive and block items that threaten their organizations. Darkfeed also offers the most comprehensive IOC enrichment solution on the market. By enriching IOCs from SIEM, SOAR, TIP or VM platforms, users gain unparalleled context and essential explanations in order to accelerate their incident prevention and response and stay ahead of the threat curve.
  • 21
    MSPDarkIntel

    MSPDarkIntel

    MSPDarkIntel

    MSP Dark Intel is a specialized dark web monitoring platform built by MSPs for MSPs, designed to help managed service providers protect their clients and generate recurring revenue. It monitors over 500 billion breached assets in real time, providing immediate alerts for compromised credentials and detailed breach reports. The platform supports multi-client management through an intuitive dashboard and integrates seamlessly with popular tools like ConnectWise, Autotask, Microsoft 365, Slack, and Teams. MSP Dark Intel offers unlimited prospecting scans and reports, helping MSPs identify and convert new clients easily. With no long-term contracts and month-to-month billing, it provides flexibility and minimal overhead. Thousands of MSPs use this platform to boost client retention, grow predictable monthly revenue, and deliver critical cybersecurity services.
  • 22
    CTM360

    CTM360

    CTM360

    CTM360 is a unified external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surface, Deep & Dark Web Monitoring, Security Ratings, Third Party Risk Management and Unlimited Takedowns. Seamless and turn-key, CTM360 requires no configurations, installations or inputs from the end-user, with all data pre-populated and specific to your organization. All aspects are managed by CTM360. Register today to take advantage of our Community Edition option and explore a range of features and functionalities at NO cost.
    Starting Price: Register today to take advanta
  • 23
    NexVision

    NexVision

    NexVision Lab

    NexVision is an AI-powered platform that provides multi-layered, real-time information gathering and cyber protection. It offers deep, contextual intelligence encompassing targets, motivations, and threat analytics. The platform's advanced search algorithm discovers over 120,000 hidden Tor sites daily, enabling users to access the deep and dark web without the need for anonymizing browsers like Tor. NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. The user-friendly dashboard allows for setting keyword alerts, conducting investigations, and analyzing results while maintaining user anonymity. NexVision enables organizations to proactively safeguard their assets and maintain a secure online environment.
  • 24
    Cyble

    Cyble

    Cyble

    Cyble is a leading AI-native cybersecurity platform that delivers intelligence-driven defense to help organizations stay ahead of evolving cyber threats. Powered by its Gen 3 Agentic AI, Cyble offers autonomous threat detection, real-time incident response, and proactive defense mechanisms. The platform provides comprehensive capabilities including attack surface management, vulnerability management, brand protection, and dark web monitoring. Trusted by governments and enterprises worldwide, Cyble combines unmatched visibility with scalable technology to keep security teams ahead of adversaries. With advanced AI that can predict threats months in advance, Cyble helps reduce response times and minimize risks. The company also offers extensive research, threat intelligence reports, and personalized demos to support customer success.
  • 25
    Webz.io

    Webz.io

    Webz.io

    Webz.io finally delivers web data to machines the way they need it, so companies easily turn web data into customer value. Webz.io plugs right into your platform and feeds it a steady stream of machine-readable data. All the data, all on demand. With data already stored in repositories, machines start consuming straight away and easily access live and historical data. Webz.io translates the unstructured web into structured, digestible JSON or XML formats machines can actually make sense of. Never miss a story, trend or mention with real-time monitoring of millions of news sites, reviews and online discussions from across the web. Keep tabs on cyber threats with constant tracking of suspicious activity across the open, deep and dark web. Fully protect your digital and physical assets from every angle with a constant, real-time feed of all potential risks they face. Never miss a story, trend or mention with real-time monitoring of millions of news sites, reviews and online discussions.
  • 26
    DigitalStakeout Scout

    DigitalStakeout Scout

    DigitalStakeout

    DigitalStakeout Scout enables your cybersecurity and corporate security team to stand up an open-source intelligence capability on-demand. Solve brand threat intelligence, protective intelligence & executive protection, vulnerability and cyber threat intelligence, and digital risk protection challenges with a cloud-delivered security intelligence platform hosted and fully managed by DigitalStakeout. DigitalStakeout Scout provides the data collection capabilities and analytics technology required to spot and disrupt your organization’s threats, vulnerabilities, and exposures. Using a simple web-based UI, you’ll have an on-demand security intelligence tool that enables your analysts to filter out noise, reduce alert fatigue, accelerate investigations, and make smarter intelligence-led security decisions. DigitalStakeout Scout platform, analysts are 80% more productive, and customers, on average, cut the total cost of ownership of a security intelligence capability by 40%.
  • 27
    Echosec

    Echosec

    Flashpoint

    Anchored by Echosec, Flashpoint’s geospatial Open-Source Intelligence (OSINT) product, the Physical Security Intelligence (PSI) solution offers an extensive range of global open-source data fused with geospatial enrichments, integrated AI, and expert finished intelligence, so practitioners can understand critical events, protect executives, and safeguard physical assets. Accelerate investigations and enhance situational awareness with open-source data, intelligence expertise, analytical tools, and AI enrichments. Effortlessly filter out social media noise to extract meaningful information quickly, monitor the topics and locations that matter to your organization, and alert the right team members when relevant posts are detected.
  • 28
    Lunar

    Lunar

    Webz.io

    Make detecting threats easy by tracking compromised assets, stolen credentials, and hidden dangers across the dark web. Stop reacting and proactively uncover hidden breaches, stolen data, and emerging threats before they wreak havoc. Track attacker tactics, techniques, and procedures (TTPs) to stay one step ahead of the next attack. Take action to protect your domain, digital assets, and employee data from cybercriminal activity. Stay ahead of threats to your domain, illicit mentions, and cyber incidents with relevant real-time alerts. Easily detect leaked credentials and risk incidents using smart filters and dynamic charts. Search faster so you can get to every threat with AI-powered searches on the deep and dark web. Detect stolen credentials and cyber threats from millions of malicious mentions on the dark web. Monitor stolen privileged credentials, PII, and threats on the deep & dark web with a few clicks.
  • 29
    InsecureWeb

    InsecureWeb

    InsecureWeb

    ​InsecureWeb is a digital attack surface analysis platform designed to protect organizations from malicious external actors by delivering dark web monitoring services. It proactively monitors the dark web to detect compromised and stolen data, enabling businesses to safeguard their most vulnerable assets. InsecureWeb offers real-time monitoring and live scans, allowing organizations to identify and mitigate potential threats promptly. InsecureWeb's comprehensive collection includes over 18 billion records, providing extensive coverage of data breaches. Additionally, InsecureWeb supports Managed Services Providers (MSPs) by offering volume pricing and features such as API access and white-label solutions, facilitating the integration of dark web monitoring into their service offerings.
    Starting Price: $0.4 per month
  • 30
    Darkscope

    Darkscope

    Darkscope

    In contrast to many other so-called dark web intelligence providers that use OSINT and only aggregate data, Darkscope has developed a human-like search technology that works in the deep web, on social media and in the dark web. Darkscope will run a one-off full Threat Scan of the internet, social media and the dark web on your business, your internet presence and your key people. This will show if you are at risk from a cyber attack and how you can improve your cyber security. Most other threat intelligence providers aggregate threat information using OSINT. Commonly, you will receive a threat intelligence stream that is only between 1% and 5% relevant to you. When you consider that those preparing a cyber attack on your business will have researched you: your staff, partners, and customer base, a stream of generic threat intelligence has only little value if any.
  • 31
    Breachsense

    Breachsense

    Breachsense

    Protect your organization & staff from data breaches. Breachsense monitors the dark web, private hacker forums, and criminal marketplaces to detect data breaches in real-time enabling you to prevent cyber threats before they happen. Uncover your company’s breached data and malware-infected devices. Track open, deep, and dark web sources such as Tor websites, private ransomware IRC and Telegram channels, criminal forums, and cybercrime marketplaces. Continuous monitoring enables your team to uncover data breaches related to your VIPs, executive team members, employees as well as clients. Find exposed user & employee credentials, ransomware leaks as well as exposed company data being sold or traded on criminal marketplaces and private ransomware forums. Breachsense continuously monitors the internet for sensitive company information such as account credentials, employee details, leaked company data, session tokens, 3rd party data leaks, and more.
  • 32
    Flare

    Flare

    Flare

    The Flare platform identifies your company’s digital assets made publicly available due to human error and malicious attacks. It continuously monitors your digital footprint and provides prioritized alerts to protect your company’s sensitive data and financial resources. Onboarding and setup are easy, with one-on-one support and unlimited users. And Flare’s interface and alert system saves your team precious time. Flare provides real-time alerts and intelligence from an ever-expanding array of dark, deep and clear web sources — including the illicit platforms malicious actors use. Cut down on the manual effort of tracking and accessing complex sources, and always keep an eye on what’s most important to you by prioritizing the search and monitoring of your preferred sources.
  • 33
    Resecurity

    Resecurity

    Resecurity

    Resecurity Risk is dedicated threat monitoring platform for brands, their subsidiaries, assets, and executives. Launch in 24 hours just import your unique digital identifiers and get close to real-time updates of over 1 Petabyte of actionable intelligence impacting you now. Security information and event management (SIEM) tools can help identify and highlight many critical events at a glance if all active threat vectors are available to be ingested within the platform and are from verified sources with accurate risk scoring. Resecurity Risk an omni-directional threat product which would usually require multiple vendors to resolve. Integrate available security solutions to actualize the risk score of your enterprise footprint. Driven by your data, powered by Context™. Holistic approach to piracy and counterfeit monitoring for various industry verticals. Prevent illicit distribution and use of your products, using actionable intelligence.
  • 34
    Nisos

    Nisos

    Nisos

    Safeguard what matters most and inform critical decisions with deep digital investigations and open source threat intelligence services. Stay ahead of threats to protect your people, assets, and reputation with Nisos’ expert insights. Best practices from Nisos investigators to safeguard your organization against employment fraud schemes. We are a digital and human risk investigations partner who operates as an extension of your security, trust, safety, legal, and intelligence teams. Uncover risks you can’t see, and proactively protect your organization by informing your legal, M&A, employment, and partner decisions. Protect your organization from insider threats with insights to reduce your risk and mitigate your losses. Our human risk insights protect your data and ensure workplace integrity. Protect your people and reduce their vulnerabilities and exposure. Pinpoint and avert the digital threats with the potential to evolve into physical harm.
  • 35
    DarkSentry

    DarkSentry

    SentryBay

    SentryBay can provide you with a range of services designed to provide real time threat intelligence and alerts to keep you ahead of cybersecurity risks. ‍ DarkSentry aggregates public, deep and dark web data across specific geographical locations to deliver localised, sector-targeted or individual enterprise-targeted information enabling vital cybersecurity decisions to be made. ‍ This includes the ability to point scanners to specific relevant data sources and filter results and combine credential and data scanning with SentryBay endpoint software to reinforce the use of remote access, corporate and SaaS applications. The DarkSentry service helps you to meet multiple compliance requirements including NIST, GDPR and PCI.
  • 36
    Silobreaker

    Silobreaker

    Silobreaker

    Silobreaker helps security, business and intelligence professionals make sense of the overwhelming amount of data on the web. Taking a proactive approach to intelligence means understanding the threats and opportunities faced by your organization on a daily basis. Our online platform extracts actionable insights from over a million sources on the web and puts it in your hands, wherever you are and whenever you need it. One system – offers a single application for an entire workflow. From collecting, aggregating and processing data to the analysis, report-generation and dissemination of intel. Return on investment – presents the significant value and cost-efficiency in comparison to multi-product investments, product segmentation by the same vendor, or ‘pay-as-you-request’ services offerings.
  • 37
    Falcon X Recon

    Falcon X Recon

    CrowdStrike

    Falcon X Recon exposes digital risk by monitoring the hidden recesses of the internet where criminal actors congregate and underground economies thrive. Falcon X Recon provides real-time visibility to potential threats, reducing investigation time and improving efficiency and response. Take immediate action against digital risk on Day One — Falcon X Recon is built on the cloud-native CrowdStrike Falcon® Platform so there’s nothing to install, administer or deploy. Identify business, reputational and third-party risks emanating from leaked credentials, PII and financial data. View current and historical posts and chatter to track adversary activities and behavior that could pose a cyber or physical risk to your organization and personnel. Customize dashboards to enable users to see, at a glance, current notifications and quickly drill into critical alerts and activity for further research.
  • 38
    Brandefense

    Brandefense

    Brandefense

    Brandefense is a proactive digital risk protection solution for organizations. Our AI-driven technology constantly scans the online world, including the dark, deep, and surface web, to discover unknown events, automatically prioritize risks, and deliver actionable intelligence you can use instantly to improve security. Get an accurate overview of how your company looks from an external perspective. Identify the digital risks from our cybercrime database with AI-driven detection engines. Investigate and enrich the indicators that you found and optimize the response time. Eliminate false positive incidents and focus on using your time more. Integrate the incidents that we discovered with your security products. Cyber threat intelligence teams are standing by to help you to keep safe. We need just the main brands and domains and monitor them with effective cost. Embrace the power of automation for streamlined processes and unparalleled business growth.
  • 39
    Google Digital Risk Protection
    Learn what a digital risk protection solution is and how it can help you be better prepared by understanding who is targeting you, what they’re after, and how they plan to compromise you. Google Digital Risk Protection delivers a broad digital risk protection solution either via stand-alone self-managed SaaS products or a comprehensive service. Both options give security professionals visibility outside their organization, the ability to identify high-risk attack vectors, malicious orchestration from the deep and dark web, and attack campaigns on the open web.  The Google Digital Risk Protection solution also provides contextual information on threat actors and their tactics, techniques, and procedures to provide a more secure cyber threat profile. Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.
  • 40
    Proofpoint Digital Risk Protection
    Proofpoint Digital Risk Protection secures your brand and customers against digital security risks across web domains, social media, and the deep and dark web. It’s the only solution that gives you a holistic defense for all your digital engagement channels. Digital Risk Protection secures your company and customers from digital risks for your entire social media infrastructure. Our solution protects your social media presence from account takeovers, social media phishing scams, and malicious content. When you request a demo, you can map your social, mobile, and domain footprint to discover your brand-owned and fraudulent or unauthorized accounts. Protect your brand and customers from social media, web domain and dark web threats. Protect your domain investments from domain squatters, typo phishing campaigns and other infringing domains. Our digital protection solution applies artificial intelligence to uncover fraudulent domains that pose a risk to your brand and customers.
  • 41
    Cyjax

    Cyjax

    Cyjax

    Our proprietary technologies are complemented by world-class analysts to process and contextualize thousands of sources. This analysis can be visualized via our platform, dashboards, and metrics. Our unique widget and dashboard tooling enable users to visualize and query data from thousands of threat feeds in one place. We cover all forms of mainstream social media, as well as instant messaging platforms and forums. Our operations team provides up-to-date intelligence on activity that could impact your organization. The SOCMINT team can be tasked with tracking and collating activity related to a specific topic of interest. The Cyjax Platform can work with almost any API endpoint architecture. Our platform supports JSON, STIX/TAXII and CEF formats out-the-box as well as a host of native integrations. A complete developer guide and control framework enables ad hoc integrations between platforms.
  • 42
    DomainTools

    DomainTools

    DomainTools

    Connect indicators from your network with nearly every active domain and IP address on the Internet. Learn how this data can inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Gain insight that is necessary to make the right decision about the risk level of threats to your organization. DomainTools Iris is a proprietary threat intelligence and investigation platform that combines enterprise-grade domain and DNS-based intelligence with an intuitive web interface.
  • 43
    Google Security Operations (SecOps)
    Google Security Operations (SecOps) is an intelligence-driven, AI-powered security operations platform designed to help organizations detect, investigate, and respond to cyber threats at scale. Built as a cloud-native solution, Google SecOps unifies SIEM, SOAR, and threat intelligence into a single operational experience. The platform ingests and analyzes massive volumes of security telemetry with Google-level speed and scalability. Google SecOps applies Google’s curated and applied threat intelligence to uncover high-priority threats faster and with greater accuracy. Generative AI powered by Gemini enhances analyst productivity through natural language search, automated investigations, and contextual insights. Integrated automation and orchestration capabilities enable rapid response using playbooks and collaboration tools. Google Security Operations empowers security teams to reduce risk, improve response times, and modernize their SOC operations.
  • 44
    F-Secure ID PROTECTION
    Avoid online identity theft with 24/7 data breach monitoring and a password vault that makes signing into your accounts easier and safer. With a combination of human intelligence and dark web monitoring, we are the first to know if your personal information has been exposed in a data breach. If a data breach occurs and your information is exposed, we will give you unique expert advice for each individual type of personal information. Identity theft and account takeover often start with a weak password. Create strong passwords, store them securely, and access them anywhere. By using the easiest password manager and monitoring for data breaches, you can prevent data breaches from becoming identity theft. The email address monitor informs you instantly if your personal information such as name, address, or password associated with the entered address has been exposed in data breaches.
    Starting Price: €3.99 per month
  • 45
    Trellix Enterprise Security Manager
    Real-time monitoring and analysis allowing you to quickly prioritize, investigate, and respond to hidden threats. A central view of potential threats with built-in workflows removes the complexity of threat protection. Be ready anytime for the audit with automated compliance. Get greater transparency monitoring users, applications, networks and devices. Data correlated and enriched to deliver purposeful intelligence on the threat and how to mitigate. Real-time threat identification and response powered by advanced threat intelligence reduces lead time to protect against threats such as phishing, insider threats, data exfiltration and Distributed Denial of Service (DDOS) attacks.
  • 46
    ImmuniWeb Discovery
    Attack Surface Management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-intrusive and production-safe discovery is a perfect fit both for continuous self-assessment and vendor risk scoring to prevent supply chain attacks. Attack Surface Management Detect, map and classify your on-prem and cloud IT assets Continuous Security Monitoring Detect misconfigured or vulnerable IT assets Vendor Risk Scoring Discover insecure third parties that process your data Dark Web Monitoring Detect stolen data and credentials, and compromised systems Brand Protection Detect online misuse of your brand and take down phishing websites
    Starting Price: $499/month
  • 47
    Cybersixgill

    Cybersixgill

    Cybersixgill

    Empower your teams to detect more phishing, data leaks and fraud – better. Level-up vulnerability assessment, enhance incident response, and provide stronger brand protection with exclusive access to the most comprehensive, fully automated collection available from the deep and dark web that includes closed access forums, instant messaging apps, paste sites, and more. Unique threat intelligence that results in unique products: powered by extraordinary data collection and innovative methodologies. Designed to deliver business and technological value for business leaders and their security teams. Unleash cyber security performance with the ultimate underground threat intelligence feed of IOCs (indicators of compromise) data stream. Supercharge your security stack by enriching your IOCs with Darkfeed intelligence and maximize analysts’ performance with a feedstream of malicious hashes, URLs, domains, and IP addresses – before they are deployed in the wild.
  • 48
    SpyCloud

    SpyCloud

    SpyCloud

    After a data breach, criminals quickly monetize the data, often by using stolen credentials to gain easy access to consumer accounts and corporate systems. If your employees, consumers, or third-parties have credentials or PII exposed in a data breach, they are at high risk of account takeover fraud. SpyCloud can help you prevent account takeover and combat online fraud with proactive solutions that leverage the largest repository of recovered breach assets in the world. Reset stolen passwords before criminals can use them to defraud your users or access sensitive corporate data. Draw on decades-worth of digital breadcrumbs to unmask criminals attempting to defraud your business and your customers. Monitor your critical third party relationships for supply chain breach exposures that could endanger your enterprise. Leverage breach data to protect employees, citizens and your supply chain from credential-based cyber attacks.
  • 49
    Google Threat Intelligence
    Get comprehensive visibility and context on the threats that matter most to your organization. Google Threat Intelligence provides unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. By defending billions of users, seeing millions of phishing attacks, and spending hundreds of thousands of hours investigating incidents we have the visibility to see across the threat landscape to keep the most important organizations protected, yours. Focus on the most relevant threats to your organization by understanding the threat actors and their ever changing tactics, techniques, and procedures (TTPs). Leverage these insights to proactively set your defenses, hunt efficiently, and respond to new and novel threats in minutes.
  • 50
    ACID Cyber Intelligence

    ACID Cyber Intelligence

    ACID Technologies

    ACID’s Cyber Intelligence solution is based on proprietary multiple designated robots that perform comprehensive, optimized, round-the-clock website monitoring of a large number of targeted sources, including: • Social networks • Criminal sites • IRC chats • Deep Web • Dark Net and more… The searches are conducted based on a virtually unlimited number of client-defined keywords, which are automatically translated into multiple languages. These searches cover multiple identifier that potentially places the organization at risk: • Leaked user names & passwords • E-mails • Domain names • Credit card data • Cyber operations • Intellectual property • Key personnel and more… Alerts are displayed in real-time on the smart, user-friendly ACID dashboard, and are also automatically sent to the client via e-mail, without delay. Any further information is shared immediately, as it becomes available.