Software Alternatives, Accelerators & Startups

Threat Stack

Cloud Sights helps you protect your cloud infrastructure. Harden your servers against attacks, know what users are logged in and what they are doing, and be alerted of suspicious activity.

Some of the top features or benefits of Threat Stack are: Comprehensive Monitoring, Ease of Integration, Real-time Alerts, Scalability, and Compliance Support. You can visit the info page to learn more.

Threat Stack Alternatives & Competitors

The best Threat Stack alternatives based on verified products, community votes, reviews and other factors.
Filter: 7 Open-Source Alternatives. Latest update:

  1. 60

    Qualys helps your business automate the full spectrum of auditing, compliance and protection of your IT systems and web applications.

    Key Qualys features:

    Comprehensive Security Cloud-based Platform Automated Scanning Detailed Reporting

    /qualys-alternatives
  2. 38

    Tenable.io Cyber Exposure platform helps to protect any asset on any computing platform and eliminate blind spots.

    Key Tenable.io features:

    Comprehensive Vulnerability Coverage User-Friendly Interface Advanced Reporting and Analytics Scalability

    /tenable-io-alternatives
  3. Verify your customers in under 15 seconds anywhere in the world with a cutting-edge SaaS & API platform for Identity Verification and AML/KYC compliance.

    Key ComplyCube features:

    AML & Sanctions Screening PEP Checks Negative Media Screening Watchlist Screening

    Try for free freemium $0.1 (per credit)

    Try for free
  4. 37

    Protect your online data & learn more about DDI, the security industry’s award-winning & most effective vulnerability & risk management network solution.

    Key Digital Defense features:

    Comprehensive Cybersecurity Solutions Innovative Technology User-Friendly Interface Customer Support

    /digital-defense-alternatives
  5. 36

    BreachLock is a versatile platform that provides scalable and smooth penetration testing services for vulnerabilities.

    Key BreachLock features:

    Comprehensive Service Automated and Manual Testing User-Friendly Platform Regulatory Compliance

    /breachlock-alternatives
  6. 39

    Alert Logic seamlessly connects an award-winning security platform, cutting-edge threat intelligence, and expert defenders – to provide the best security and peace of mind for businesses 24/7, regardless of their size or technology environment.

    Key Alert Logic features:

    Comprehensive Threat Management Managed Services Scalability Cloud and On-Premises Coverage

    /alert-logic-alternatives
  7. 34

    Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the world's best penetration testing software now. DownloadPen testing software to act like an attacker.

    Key Rapid7 features:

    Comprehensive Security Solutions User-Friendly Interface Extensive Reporting and Analytics Strong Community and Support

    Open Source

    /rapid7-alternatives
  8. 36

    Open Source Tripwire software is a security and data integrity tool useful for monitoring and...

    Key Tripwire features:

    Open Source File Integrity Monitoring Comprehensive Logging Configurable Policies

    /tripwire-alternatives
  9. 37

    WhiteHat Security is a provider of website risk management solutions, protecting data, ensuring compliance, and narrowing the risks.

    Key WhiteHat Security features:

    Comprehensive Security Testing Managed Services Experienced Team Scalability

    /whitehat-security-alternatives
  10. 21

    Excellent hybrid cloud security doesn't require your business to sacrifice operational performance. Trend Micro lets you keep business moving securely.

    Key Trend Micro Deep Security features:

    Comprehensive Protection Cloud and Virtualization Support Automated Security Scalability

    /trend-micro-deep-security-alternatives
  11. 18

    The revolutionary architecture that gives you a continuous, always-on assessment of your global security and compliance posture, with 2-second visibility across all your IT assets, wherever they reside.

    Key Qualys Cloud Platform features:

    Comprehensive Security Scalability Real-Time Reporting Ease of Deployment

    /qualys-cloud-platform-alternatives
  12. 18

    Go beyond basic network security and network monitoring tools with RSA NetWitness Network and get real-time visibility to detect advanced threats ANYWHERE. .

    Key RSA Security Analytics features:

    Comprehensive Threat Detection Integration Capabilities Real-time Analysis and Reporting Scalability

    /rsa-security-analytics-alternatives
  13. 36

    CipherCloud provides cloud information protection solutions for enterprises to encrypt sensitive information and store them in the cloud.

    Key CipherCloud features:

    Data Protection Compliance Support Ease of Integration Visibility and Control

    /ciphercloud-alternatives
  14. 21

    Symantec Cloud Workload Protection enables business agility and cost savings by automating security for public cloud workloads. Visit Symantec to learn more.

    Key Symantec Cloud Workload Protection features:

    Comprehensive Security Scalability Centralized Management Automated Processes

    /symantec-cloud-workload-protection-alternatives
Suggest an alternative
If you think we've missed something, please suggest an alternative to Threat Stack.

Threat Stack discussion

Log in or Post with