Free Threat Intelligence Solution

One free centralized SaaS solution to aggregate all of your threat intelligence

Why Collect?

Gain a better understanding of the risks facing your organization

Unique cloud attackers list

Access to best-in-class cyber intelligence feeds and threat lists

Access to open source data

Compile and utilize up-to-the-minute intelligence for all your tools and technologies

Export Lists to your Firewall

Feed your firewall the intelligence it needs

Additional Features

Ability to bring your own tools and subscribed data sources
Ability to export lists
Create your own lists
Create plugins
Access to proactive threat detection (with upgraded Enforce subscription)
Ability to bring your own tools and subscribed data sources

One central place to manage your cyber intelligence, including your own lists, feeds, and intelligence sources.

Ability to export lists

Leverage all your managed cyber intelligence by integrating your lists into other security tools and technologies.

Create your own lists

Easily create lists within the Collect platform to manage your organization’s cyber intelligence.

Create plugins

Integrate your tools and technologies into the Collect platform to give them an unparalleled, up-to-the-minute view of the threat landscape.

Access to proactive threat detection (with upgraded Enforce subscription)

Leverage best-in-class cyber intelligence to automatically block known threats at line speed when you upgrade to Enforce.

Don’t rely on one vendor’s view of the threat landscape for your cyber intelligence

  1. Source on near-unlimited cyber intelligence data by focusing on known threat actors
  2. Aggregate cyber intelligence from the entire community, including government agencies, open source organizations,
    and private companies dedicated to gathering, analyzing,
    and disseminating information about cyber threats, vulnerabilities, and activities.

Upgrade to ENFORCE

Block all known threats

Free Data Sources with Enforce Subscription

Webroot logo

Millions of well-vetted malicious indicators of compromise (IOCs)

Transparent DomainTools logo

Millions of malicious domains and associated IP addresses

GreyNoise logo

Known-good data (including Akamai, Amazon Cloudfront, Cisco Webex, Cloudflare, and more)

Utilize the Threater Marketplace

With one click, you can add cyber intelligence feeds and Enforce them in your network

Learn how Threater can help manage and resolve threats in your network.

Add more cyber intelligence feeds and lists to your intelligence platform, including industry-specific subscriptions.

Looking for more?

Think of something that should be added to our Collect subscription?
Let us know here!