ThreatBook
ThreatBook
ThreatBook aggregates threat intelligence from multiple sources to identify and prioritize potential risks in enterprise environments. It integrates with existing security tools to provide contextual analysis for remediation workflows.
ThreatBook aggregates threat intelligence from multiple sources to identify and prioritize potential risks in enterprise environments. It integrates with existing security tools to provide contextual analysis for remediation workflows.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Why these ratings?
Cyberse perspective
Solution details
Product features
Services support
Subcategory
Integrations
Market segment
Scanning coverage
Cloud ecosystem partners
Key features
Target industry
Deployment
We use the following criteria to evaluate this product:
Cost considerations
ThreatBook’s upper-tier packages list at US $95-180 K per year and charge extra for larger API call blocks and specialised feeds. The six-figure spend places ThreatBook above average vulnerability-management pricing and raises the cost per protected asset. Separate modules inflate the total bill, so finance teams may question the overall value.
Cost considerations
ThreatBook’s upper-tier packages list at US $95-180 K per year and charge extra for larger API call blocks and specialised feeds. The six-figure spend places ThreatBook above average vulnerability-management pricing and raises the cost per protected asset. Separate modules inflate the total bill, so finance teams may question the overall value.
Functionality
ThreatBook’s NGTIP links vulnerability intelligence to enterprise asset data, applies its VPT model to rank issues, and offers PoC-based fix verification. The offering depends on outside asset platforms for discovery and shows no native authenticated scanning or broad cloud-container coverage. This mix of prioritization and validation without full-spectrum scanning or automated ticketing sets its functionality at a mid-tier level.
Functionality
ThreatBook’s NGTIP links vulnerability intelligence to enterprise asset data, applies its VPT model to rank issues, and offers PoC-based fix verification. The offering depends on outside asset platforms for discovery and shows no native authenticated scanning or broad cloud-container coverage. This mix of prioritization and validation without full-spectrum scanning or automated ticketing sets its functionality at a mid-tier level.
Compatibility
ThreatBook provides REST APIs and out-of-the-box add-ons for Splunk and FortiSOAR, letting teams feed intelligence into popular SIEM and SOAR tools without extensive coding. It lacks endpoint agents and native cloud or container connectors, so coverage across diverse asset types relies on other tools. APIs support manual or scripted CMDB updates, giving ThreatBook mid-tier compatibility versus broader full-stack platforms.
Compatibility
ThreatBook provides REST APIs and out-of-the-box add-ons for Splunk and FortiSOAR, letting teams feed intelligence into popular SIEM and SOAR tools without extensive coding. It lacks endpoint agents and native cloud or container connectors, so coverage across diverse asset types relies on other tools. APIs support manual or scripted CMDB updates, giving ThreatBook mid-tier compatibility versus broader full-stack platforms.
User experience
Dashboards show timeline and attacker-centric views that let teams drill from alerts into asset and path details without hunting through menus. A 4.8/5 user score on Gartner Peer Insights signals most analysts can get productive quickly and need little formal training. The searchable, step-by-step online guide further lowers the learning curve by giving context at the point of use.
User experience
Dashboards show timeline and attacker-centric views that let teams drill from alerts into asset and path details without hunting through menus. A 4.8/5 user score on Gartner Peer Insights signals most analysts can get productive quickly and need little formal training. The searchable, step-by-step online guide further lowers the learning curve by giving context at the point of use.
Customer support
ThreatBook provides round-the-clock expert help and advertises a customer-success function, which puts response coverage ahead of most peers. Public material does not confirm sub-24-hour rule updates after new CVEs or named success managers, so support falls slightly short of the top tier.
Customer support
ThreatBook provides round-the-clock expert help and advertises a customer-success function, which puts response coverage ahead of most peers. Public material does not confirm sub-24-hour rule updates after new CVEs or named success managers, so support falls slightly short of the top tier.