
Threat Hunting
Best Talion Managed Detection & Response (MDR) alternatives & competitors
77 active tools in the same primary category—including Logsign Unified SO Platform, ESET Protect MDR Ultimate, Mandiant Threat Defense, and 74 more. Open any row for the full SecurityListing profile, pricing context, and reviews.
All 77 alternatives
chevron_rightLogsign Unified SO Platform
Logsign Unified SO Platform on SecurityListing: SOAR platform automating threat detection, incident response, and workflows
Threat Hunting4.8★(3 reviews)
chevron_rightESET Protect MDR Ultimate
ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.
Threat Hunting4.7★(2 reviews)
chevron_rightMandiant Threat Defense
Mandiant Threat Defense on SecurityListing: Managed threat detection, hunting, and response service by Mandiant experts
Threat Hunting4.7★(2 reviews)
chevron_rightPulsedive
Pulsedive on SecurityListing: Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.
Threat Hunting4.7★(2 reviews)
chevron_rightCipher xMDR
Cipher xMDR on SecurityListing: AI-driven MDR service providing unified threat detection across IT, OT, cloud
Threat Hunting4.7★(2 reviews)
chevron_rightEclecticIQ Threat Intelligence Platform
EclecticIQ Threat Intelligence Platform on SecurityListing: Threat intelligence platform for aggregating, analyzing, and sharing CTI data
Threat Hunting4.7★(2 reviews)
chevron_rightNetlas
Netlas on SecurityListing: Threat intelligence and digital risk protection platform
Threat Hunting4.5★(3 reviews)
chevron_rightPerformanta Incident Response
Performanta Incident Response on SecurityListing: Incident response consulting services for cyber attack containment and recovery
Threat Hunting4.5★(3 reviews)
chevron_rightEclecticIQ Intelligence Center
EclecticIQ Intelligence Center on SecurityListing: Threat intelligence platform for collecting, analyzing, and sharing CTI data
Threat Hunting4.5★(1 reviews)
chevron_rightHighlighter
Highlighter on SecurityListing: Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.
Threat Hunting4.5★(1 reviews)
chevron_rightGrep App
Grep App on SecurityListing: Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
Threat Hunting4.5★(1 reviews)
chevron_rightJupyter Notebooks for Threat Hunting
Jupyter Notebooks for Threat Hunting on SecurityListing: Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.
Threat Hunting4.5★(1 reviews)
chevron_rightGravwell Security Data Platform
Gravwell Security Data Platform on SecurityListing: Security data platform for log analysis, metrics, and threat hunting
Threat Hunting4.5★(1 reviews)
chevron_rightHunters Pathfinder AI
Hunters Pathfinder AI on SecurityListing: AI-driven SOC platform with autonomous threat detection, investigation & response
Threat Hunting4.5★(1 reviews)
chevron_rightProphet Security Prophet AI Threat Hunter
Prophet Security Prophet AI Threat Hunter on SecurityListing: AI-driven threat hunting platform for SOC alert triage and investigation
Threat Hunting4.5★(1 reviews)
chevron_rightAttic MDR
Attic MDR on SecurityListing: 24/7 managed detection and response service for Microsoft 365 environments
Threat Hunting4.5★(1 reviews)
chevron_rightIncident Response with Threat Intelligence
Incident Response with Threat Intelligence on SecurityListing: A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
Threat Hunting4.5★(1 reviews)
chevron_rightZeronsec Anrita
Zeronsec Anrita on SecurityListing: Real-time threat detection and monitoring platform with SIEM capabilities
Threat Hunting4.5★(1 reviews)
chevron_rightBitLyft True MDR
BitLyft True MDR on SecurityListing: 24/7 managed detection and response service with US-based SOC analysts
Threat Hunting4.5★(1 reviews)
chevron_rightEnterprise Detection & Response: A Simple Hunting Maturity Model
Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response
Threat Hunting4.5★(1 reviews)
chevron_rightHoneyDB
HoneyDB on SecurityListing: HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.
Threat Hunting4.5★(1 reviews)
chevron_rightInQuest Labs
InQuest Labs on SecurityListing: The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.
Threat Hunting4.5★(1 reviews)
chevron_rightHuntbase Platform
Huntbase Platform on SecurityListing: Platform for threat investigation with automation and knowledge management
Threat Hunting4.5★(1 reviews)
chevron_rightGoogle Cloud Incident Response Cheat Sheet
Google Cloud Incident Response Cheat Sheet on SecurityListing: A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.
Threat Hunting4.5★(1 reviews)
chevron_rightHunters Next-Gen SIEM
Hunters Next-Gen SIEM on SecurityListing: Next-gen SIEM with AI-powered triage, automated investigation & detection
Threat Hunting4.5★(1 reviews)
chevron_rightMandiant Managed Defense
Mandiant Managed Defense on SecurityListing: 24/7 managed threat detection, investigation, and response service
Threat Hunting4.5★(1 reviews)
chevron_rightDevo Security Data Platform
Devo Security Data Platform on SecurityListing: Security data platform combining SIEM, SOAR, UEBA, and threat hunting
Threat Hunting4.5★(1 reviews)
chevron_rightDaylight Threat Detection and Response
Daylight Threat Detection and Response on SecurityListing: AI-powered MDR combining agentic AI with human expertise for threat detection
Threat Hunting4.5★(1 reviews)
chevron_rightNSFOCUS Intelligent Security Operations Platform
NSFOCUS Intelligent Security Operations Platform on SecurityListing: XDR platform with SOAR capabilities for security operations centers
Threat Hunting4.5★(1 reviews)
chevron_rightRiskAnalytics Solutions Community Projects
RiskAnalytics Solutions Community Projects on SecurityListing: RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.
Threat Hunting4.5★(1 reviews)
chevron_rightQuorum Cyber Emergency MDR
Quorum Cyber Emergency MDR on SecurityListing: Emergency MDR service for orgs experiencing active cyber incidents or attacks
Threat Hunting4.5★(1 reviews)
chevron_rightThreatConnect Polarity
ThreatConnect Polarity on SecurityListing: Overlay tool providing real-time threat intel & context across security tools
Threat Hunting4.5★(1 reviews)
chevron_rightDetecting the Elusive - Active Directory Threat Hunting
Detecting the Elusive - Active Directory Threat Hunting on SecurityListing: A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
Threat Hunting4.3★(2 reviews)
chevron_rightGolismero
Golismero on SecurityListing: A free and open-source OSINT framework for gathering and analyzing data from various sources
Threat Hunting4.3★(2 reviews)
chevron_rightDNIF HYPERCLOUD
DNIF HYPERCLOUD on SecurityListing: SIEM platform with user analytics and automation for threat detection
Threat Hunting4.2★(3 reviews)
chevron_rightD3 Smart SOAR
D3 Smart SOAR on SecurityListing: SOAR platform with automated threat hunting and investigation capabilities
Threat Hunting4.2★(3 reviews)
chevron_rightGoogle Search Operators: The Complete List (44 Advanced Operators)
Google Search Operators: The Complete List (44 Advanced Operators) on SecurityListing: A reference guide listing 44 advanced Google search operators for enhanced search filtering and precision in information gathering activities.
Threat Hunting3.8★(1 reviews)
chevron_rightQuorum Cyber Clarity Extend
Quorum Cyber Clarity Extend on SecurityListing: Managed detection and response service with 24/7 SOC monitoring
Threat Hunting3.8★(1 reviews)
chevron_rightFiligran OpenCTI
Filigran OpenCTI on SecurityListing: Open-source threat intelligence platform for organizing and operationalizing CTI
Threat Hunting3.8★(1 reviews)
chevron_rightLogpoint NDR
Logpoint NDR on SecurityListing: A network detection and response solution that uses AI and machine learning to monitor network traffic, identify malicious behavior, and connect related security events to reveal attack patterns without requiring endpoint agents.
Threat Hunting3.8★(1 reviews)
chevron_rightAttackRuleMap
AttackRuleMap on SecurityListing: A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.
Threat Hunting3.8★(1 reviews)
chevron_rightIntezer
Intezer on SecurityListing: Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
Threat Hunting3.8★(1 reviews)
chevron_rightFiligran eXtended Threat Management (XTM)
Filigran eXtended Threat Management (XTM) on SecurityListing: XTM portfolio for threat intel, attack surface visibility & adversary simulation
Threat Hunting3.8★(1 reviews)
chevron_rightHYAS Insight
HYAS Insight on SecurityListing: Infrastructure intelligence platform for threat hunting and investigation
Threat Hunting3.8★(1 reviews)
chevron_rightHunters SOC Platform
Hunters SOC Platform on SecurityListing: Next-gen SIEM with AI-powered alert investigation and automated response
Threat Hunting3.8★(1 reviews)
chevron_rightINE Security
INE Security on SecurityListing: INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
Threat Hunting3.8★(1 reviews)
chevron_rightNon Human Identity Threat Center
Non Human Identity Threat Center on SecurityListing: A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.
Threat Hunting3.8★(1 reviews)
chevron_rightCTIChef.com Detection Feeds
CTIChef.com Detection Feeds on SecurityListing: A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
Threat Hunting3.8★(1 reviews)
chevron_rightIronNet IronDefense
IronNet IronDefense on SecurityListing: Network detection and response platform for threat detection and visibility
Threat Hunting3.8★(1 reviews)
chevron_rightLinux Detection Engineering - A primer on persistence mechanisms
Linux Detection Engineering - A primer on persistence mechanisms on SecurityListing: A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
Threat Hunting3.8★(1 reviews)
chevron_rightGradient Cyber MXDR
Gradient Cyber MXDR on SecurityListing: Managed XDR service with 24/7 SOC for mid-market threat detection & response
Threat Hunting
chevron_rightD3 Security Morpheus AI
D3 Security Morpheus AI on SecurityListing: AI-powered autonomous SOC platform for alert triage and investigation automation
Threat Hunting
chevron_rightTeam Cymru Pure Signal™ Scout
Team Cymru Pure Signal™ Scout on SecurityListing: Real-time threat intelligence platform for external threat visibility and IoC analysis
Threat Hunting
chevron_rightSOAR
SOAR on SecurityListing: A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.
Threat Hunting
chevron_rightSenseon Intelligence Cloud
Senseon Intelligence Cloud on SecurityListing: AI-driven SIEM alternative with managed SOC for threat detection and response
Threat Hunting
chevron_rightHuntress Managed SIEM
Huntress Managed SIEM on SecurityListing: Managed SIEM with 24/7 AI-assisted SOC for threat detection and compliance
Threat Hunting
chevron_rightRadiant Agentic AI
Radiant Agentic AI on SecurityListing: AI-powered SOC platform for automated alert triage, incident response & logging
Threat Hunting
chevron_rightCompany Chat Widget
Company Chat Widget on SecurityListing: Managed Detection and Response service provider
Threat Hunting
chevron_rightSimbian AI Threat Hunt Agent
Simbian AI Threat Hunt Agent on SecurityListing: AI agent that autonomously validates threat hunt hypotheses across enterprise data
Threat Hunting
chevron_rightAfterGlow
AfterGlow on SecurityListing: Visualize and analyze network relationships with AfterGlow
Threat Hunting
FAQ
- Are these “official” vendor pairings?
- No—alternatives are category peers for discovery, not paid placements. Vendors can still claim profiles and respond to reviews on their product pages.
- Why is my favorite tool missing?
- Only ACTIVE listings in the same primary category appear. Multi-category products may move when their primary category is updated.