Logo

ThreatBook

ThreatBook

ThreatBook aggregates threat intelligence from multiple sources to identify and prioritize potential risks in enterprise environments. It integrates with existing security tools to provide contextual analysis for remediation workflows.

ThreatBook aggregates threat intelligence from multiple sources to identify and prioritize potential risks in enterprise environments. It integrates with existing security tools to provide contextual analysis for remediation workflows.

Cost considerations

Functionality

Compatibility

User experience

Customer support

Why these ratings?

Cyberse perspective

Solution details

Product features
Services support
Subcategory
Integrations
Market segment
Scanning coverage
Cloud ecosystem partners
Key features
Target industry
Deployment

We use the following criteria to evaluate this product:

Cost considerations

ThreatBook’s upper-tier packages list at US $95-180 K per year and charge extra for larger API call blocks and specialised feeds. The six-figure spend places ThreatBook above average vulnerability-management pricing and raises the cost per protected asset. Separate modules inflate the total bill, so finance teams may question the overall value.

Cost considerations

ThreatBook’s upper-tier packages list at US $95-180 K per year and charge extra for larger API call blocks and specialised feeds. The six-figure spend places ThreatBook above average vulnerability-management pricing and raises the cost per protected asset. Separate modules inflate the total bill, so finance teams may question the overall value.

Functionality

ThreatBook’s NGTIP links vulnerability intelligence to enterprise asset data, applies its VPT model to rank issues, and offers PoC-based fix verification. The offering depends on outside asset platforms for discovery and shows no native authenticated scanning or broad cloud-container coverage. This mix of prioritization and validation without full-spectrum scanning or automated ticketing sets its functionality at a mid-tier level.

Functionality

ThreatBook’s NGTIP links vulnerability intelligence to enterprise asset data, applies its VPT model to rank issues, and offers PoC-based fix verification. The offering depends on outside asset platforms for discovery and shows no native authenticated scanning or broad cloud-container coverage. This mix of prioritization and validation without full-spectrum scanning or automated ticketing sets its functionality at a mid-tier level.

Compatibility

ThreatBook provides REST APIs and out-of-the-box add-ons for Splunk and FortiSOAR, letting teams feed intelligence into popular SIEM and SOAR tools without extensive coding. It lacks endpoint agents and native cloud or container connectors, so coverage across diverse asset types relies on other tools. APIs support manual or scripted CMDB updates, giving ThreatBook mid-tier compatibility versus broader full-stack platforms.

Compatibility

ThreatBook provides REST APIs and out-of-the-box add-ons for Splunk and FortiSOAR, letting teams feed intelligence into popular SIEM and SOAR tools without extensive coding. It lacks endpoint agents and native cloud or container connectors, so coverage across diverse asset types relies on other tools. APIs support manual or scripted CMDB updates, giving ThreatBook mid-tier compatibility versus broader full-stack platforms.

User experience

Dashboards show timeline and attacker-centric views that let teams drill from alerts into asset and path details without hunting through menus. A 4.8/5 user score on Gartner Peer Insights signals most analysts can get productive quickly and need little formal training. The searchable, step-by-step online guide further lowers the learning curve by giving context at the point of use.

User experience

Dashboards show timeline and attacker-centric views that let teams drill from alerts into asset and path details without hunting through menus. A 4.8/5 user score on Gartner Peer Insights signals most analysts can get productive quickly and need little formal training. The searchable, step-by-step online guide further lowers the learning curve by giving context at the point of use.

Customer support

ThreatBook provides round-the-clock expert help and advertises a customer-success function, which puts response coverage ahead of most peers. Public material does not confirm sub-24-hour rule updates after new CVEs or named success managers, so support falls slightly short of the top tier.

Customer support

ThreatBook provides round-the-clock expert help and advertises a customer-success function, which puts response coverage ahead of most peers. Public material does not confirm sub-24-hour rule updates after new CVEs or named success managers, so support falls slightly short of the top tier.