Solution Logo

ThreatBook

ThreatBook

ThreatBook aggregates threat intelligence from multiple sources to identify and prioritize potential risks in enterprise environments. It integrates with existing security tools to provide contextual analysis for remediation workflows.

ThreatBook aggregates threat intelligence from multiple sources to identify and prioritize potential risks in enterprise environments. It integrates with existing security tools to provide contextual analysis for remediation workflows.

Cost considerations

Cost considerations

Functionality

Functionality

Compatibility

Compatibility

User experience

User experience

Customer support

Customer support

Why these ratings?

Cyberse perspective

Cyberse perspective

Solution details

Product features

Risk scoring

Vulnerability scoring

IT Service Management (ITSM) integration

Automated remediation

Services support

In-house services

Managed services

Subcategory

Threat Intelligence Platforms

Integrations

Security automation

Endpoint security

Cloud security

Network security

Data security

Market segment

Small business

Enterprise

Midmarket

Key features

API access

Point solution

Target industry

Technology

Public sector

Industrials

Healthcare

Retail

Manufacturing

Financial services

Pricing

Free trial available

We use the following criteria to evaluate this product:

We use the following criteria to evaluate this product:

Cost considerations

ThreatBook’s upper-tier packages list at US $95-180 K per year and charge extra for larger API call blocks and specialised feeds. The six-figure spend places ThreatBook above average vulnerability-management pricing and raises the cost per protected asset. Separate modules inflate the total bill, so finance teams may question the overall value.

Cost considerations

ThreatBook’s upper-tier packages list at US $95-180 K per year and charge extra for larger API call blocks and specialised feeds. The six-figure spend places ThreatBook above average vulnerability-management pricing and raises the cost per protected asset. Separate modules inflate the total bill, so finance teams may question the overall value.

Functionality

ThreatBook’s NGTIP links vulnerability intelligence to enterprise asset data, applies its VPT model to rank issues, and offers PoC-based fix verification. The offering depends on outside asset platforms for discovery and shows no native authenticated scanning or broad cloud-container coverage. This mix of prioritization and validation without full-spectrum scanning or automated ticketing sets its functionality at a mid-tier level.

Functionality

ThreatBook’s NGTIP links vulnerability intelligence to enterprise asset data, applies its VPT model to rank issues, and offers PoC-based fix verification. The offering depends on outside asset platforms for discovery and shows no native authenticated scanning or broad cloud-container coverage. This mix of prioritization and validation without full-spectrum scanning or automated ticketing sets its functionality at a mid-tier level.

Compatibility

ThreatBook provides REST APIs and out-of-the-box add-ons for Splunk and FortiSOAR, letting teams feed intelligence into popular SIEM and SOAR tools without extensive coding. It lacks endpoint agents and native cloud or container connectors, so coverage across diverse asset types relies on other tools. APIs support manual or scripted CMDB updates, giving ThreatBook mid-tier compatibility versus broader full-stack platforms.

Compatibility

ThreatBook provides REST APIs and out-of-the-box add-ons for Splunk and FortiSOAR, letting teams feed intelligence into popular SIEM and SOAR tools without extensive coding. It lacks endpoint agents and native cloud or container connectors, so coverage across diverse asset types relies on other tools. APIs support manual or scripted CMDB updates, giving ThreatBook mid-tier compatibility versus broader full-stack platforms.

User experience

Dashboards show timeline and attacker-centric views that let teams drill from alerts into asset and path details without hunting through menus. A 4.8/5 user score on Gartner Peer Insights signals most analysts can get productive quickly and need little formal training. The searchable, step-by-step online guide further lowers the learning curve by giving context at the point of use.

User experience

Dashboards show timeline and attacker-centric views that let teams drill from alerts into asset and path details without hunting through menus. A 4.8/5 user score on Gartner Peer Insights signals most analysts can get productive quickly and need little formal training. The searchable, step-by-step online guide further lowers the learning curve by giving context at the point of use.

Customer support

ThreatBook provides round-the-clock expert help and advertises a customer-success function, which puts response coverage ahead of most peers. Public material does not confirm sub-24-hour rule updates after new CVEs or named success managers, so support falls slightly short of the top tier.

Customer support

ThreatBook provides round-the-clock expert help and advertises a customer-success function, which puts response coverage ahead of most peers. Public material does not confirm sub-24-hour rule updates after new CVEs or named success managers, so support falls slightly short of the top tier.