List of the Top 4 Threat Intelligence Platforms for OpenText Content Management (Extended ECM) in 2026

Reviews and comparisons of the top Threat Intelligence platforms with an OpenText Content Management (Extended ECM) integration


Below is a list of Threat Intelligence platforms that integrates with OpenText Content Management (Extended ECM). Use the filters above to refine your search for Threat Intelligence platforms that is compatible with OpenText Content Management (Extended ECM). The list below displays Threat Intelligence platforms products that have a native integration with OpenText Content Management (Extended ECM).
  • 1
    SOCRadar Extended Threat Intelligence Reviews & Ratings

    SOCRadar Extended Threat Intelligence

    SOCRadar

    Real-time visibility into vulnerabilities,leaked data,threat actor activity targeting your companies
    More Information
    Company Website
    Company Website
    SOCRadar Extended Threat Intelligence is an all-encompassing platform built to proactively identify and evaluate cyber threats, offering actionable insights that are contextually relevant. As organizations strive for improved visibility into their publicly available assets and the vulnerabilities linked to them, relying only on External Attack Surface Management (EASM) solutions proves insufficient for effectively managing cyber risks; these technologies should be integrated within a broader enterprise vulnerability management strategy. Businesses are increasingly focused on safeguarding their digital assets from every conceivable risk factor. The traditional emphasis on monitoring social media and the dark web is no longer adequate, as threat actors continually adapt and innovate their attack strategies. Thus, comprehensive monitoring across various environments, including cloud storage and the dark web, is vital for empowering security teams to respond effectively. Furthermore, a robust approach to Digital Risk Protection necessitates the inclusion of services such as site takedown and automated remediation processes. By adopting this multifaceted approach, organizations can significantly enhance their resilience in the face of an ever-evolving cyber threat landscape, ensuring they can respond proactively to emerging risks. This continuous adaptation is crucial for maintaining a strong security posture in today's digital environment.
  • 2
    SafeGuard Cyber Reviews & Ratings

    SafeGuard Cyber

    SafeGuard Cyber

    Empower your organization with comprehensive, seamless communication security.
    SafeGuard Cyber offers a cloud-based security solution tailored for essential communication applications that organizations increasingly depend on, such as Microsoft Teams, Slack, Zoom, Salesforce, and various social media platforms. As these tools gain popularity, a significant vulnerability emerges for security operations, heightening the risks associated with ransomware, business compromises, and leaks of sensitive information. Traditional email security measures often fall short, lacking the capacity to provide visibility beyond emails while primarily focusing on defending against harmful files and links. Additionally, CASB and SASE solutions can be challenging to implement and manage, often leaving control measures overly permissive to avoid hindering business productivity. Our platform features an agentless architecture that establishes a flexible security layer across all communication channels, irrespective of the device or network used. By managing risks associated with everyday business communication that extends beyond email, organizations can effectively safeguard themselves against the human attack vector posed by sophisticated social engineering tactics and targeted threats. This comprehensive approach empowers businesses to operate securely in an increasingly interconnected digital landscape.
  • 3
    SD Elements Reviews & Ratings

    SD Elements

    Security Compass

    Enable scalable security enforcement and full traceability for audit and compliance.
    SD Elements helps AppSec programs manage the pressure of supporting many fast-moving development teams by identifying the security controls a project should adopt before heavy design or coding takes place. The platform applies Security by Design principles by evaluating system architecture, technical patterns, data sensitivity, and compliance expectations upfront. This early insight helps capture risks at the point where fixes are simple and inexpensive, and many organizations see assessment and review timelines shrink by 30–50% as a result. By resolving uncertainty early, development groups encounter fewer delays late in the release cycle. Instead of depending on scattered spreadsheets, tribal knowledge, or manually curated checklists, SD Elements produces a set of project-specific security requirements tied to commonly used frameworks like NIST, OWASP, PCI, and ISO. Each requirement is paired with developer-focused guidance, examples, and optional learning material that help teams understand how to apply the control correctly. This makes it possible for smaller AppSec groups to guide and support security across portfolios of well over 100 applications without expanding staff. It also ensures that security expectations remain consistent across teams, technologies, and products, reducing variation in how security is implemented. The platform integrates with Jira, CI/CD pipelines, and other tooling used by engineering teams, allowing security tasks and requirements to appear directly within existing planning and delivery processes. This avoids creating a second workflow for security and keeps implementation tightly aligned with everyday development activities. A defining capability of SD Elements is its comprehensive traceability. Each requirement is linked to the risk it addresses, the associated regulatory or industry standard, and the evidence captured during implementation. AppSec leaders gain an aggregated, portfolio-level view of requirement coverage,
  • 4
    PassiveTotal Reviews & Ratings

    PassiveTotal

    RiskIQ

    Empowering organizations with comprehensive threat intelligence and insights.
    RiskIQ PassiveTotal aggregates vast amounts of data from the internet to provide intelligence that helps in recognizing threats and the underlying infrastructure exploited by cybercriminals, leveraging machine learning to boost the efficiency of threat detection and response efforts. This innovative platform offers crucial context regarding adversaries, shedding light on their tools, systems, and potential indicators of compromise that may extend beyond the protective barriers of an organization's firewall, whether these sources are internal or from external entities. The speed at which investigations can be conducted is greatly accelerated, enabling users to swiftly find answers by tapping into a repository of over 4,000 OSINT articles and artifacts. With over ten years of expertise in internet mapping, RiskIQ offers unmatched security intelligence that is both comprehensive and detailed. It gathers a diverse range of web data, including Passive DNS, WHOIS information, SSL details, host pairs, cookies, exposed services, ports, components, and source code. By merging curated OSINT with exclusive security insights, users gain a holistic view of their digital attack landscape from various angles. This comprehensive approach empowers organizations to take charge of their online presence and effectively defend against threats. Furthermore, RiskIQ PassiveTotal not only enhances cybersecurity measures but also aids in the proactive identification and mitigation of potential risks, ensuring businesses are better prepared for the evolving threat landscape.
  • Previous
  • You're on page 1
  • Next