Cisco Talos Alternatives (September 2025)

Cisco Talos, a proven threat intelligence team of researchers, analysts, and incident responders, provides leading security research and response globally.

4.4/5

1,061+ reviews

Reviewed on:

G2
Gartner
1.
Cisco: Software, Network, and Cybersecurity Solutions - Cisco
https://meraki.cisc
.com/

Cisco is a worldwide technology leader. Our purpose is to power an inclusive future for all through software, networking, security, computing, and more solutions.

2.
Cisco: Software, Network, and Cybersecurity Solutions - Cisco
https://umbrella.cisc
.com/

Cisco is a worldwide technology leader. Our purpose is to power an inclusive future for all through software, networking, security, computing, and more solutions.

3.
Cisco: Software, Network, and Cybersecurity Solutions - Cisco
https://www.cisc
.com/

Cisco is a worldwide technology leader. Our purpose is to power an inclusive future for all through software, networking, security, computing, and more solutions.

4.
Cisco: Software, Network, and Cybersecurity Solutions - Cisco
https://spaces.cisc
.com/

Cisco is a worldwide technology leader. Our purpose is to power an inclusive future for all through software, networking, security, computing, and more solutions.

5.
Cisco Secure Network Analytics - Cisco
https://www.cisc
.com/site/us/en/products/security/security-analytics/secure-network-analytics/index.html/

Cisco Secure Network Analytics provides pervasive network visibility and security analytics for advanced protection across the extended network and cloud.

6.
Cisco Security Products and Solutions - Cisco
https://www.cisc
.com/site/us/en/products/security/index.html/

Security solutions for networking, data center, cloud, and collaboration, powered by a unified platform with easy integration for third-party apps and solutions.

7.
Cisco Next-Generation Intrusion Prevention System (NGIPS) - Cisco
https://www.cisc
.com/c/en_ca/products/security/ngips/index.html/

Cisco Secure IPS (NGIPS) provides contextual awareness, security intelligence, and advanced threat protection against attacks and malware.

8.
Cisco Identity Services Engine (ISE) - Cisco
https://www.cisc
.com/site/us/en/products/security/identity-services-engine/index.html/

ISE is a next-generation NAC solution used to manage endpoint, user, and device access to network resources within a zero-trust architecture.

9.
Cisco ACI - Application Centric Infrastructure - Cisco
https://www.cisc
.com/site/us/en/products/networking/cloud-networking/application-centric-infrastructure/index.html/

Easily optimize your multicloud network with Cisco ACI. Use a secure, automated software defined network (SDN) solution to accelerate your network deployments.

11.
Cisco Secure Workload, Formerly Tetration - Cisco
https://www.cisc
.com/c/en_sg/products/security/tetration/index.html/

Secure your workload anywhere with Cisco Secure Workload (Tetration). Automate micro-segmentation, simplify security for SDN and migration to cloud.

13.
Cisco UCS C–Series Rack Servers - Cisco
https://www.cisc
.com/site/us/en/products/computing/servers-unified-computing-systems/ucs-c-series-rack-servers/index.html/

Rack server products in the Cisco UCS C–Series family deliver Cisco Unified Computing, reduce total cost of ownership, and increase business agility.

15.
All Routers Products - Cisco
https://www.cisc
.com/c/en/us/products/routers/product-listing.html/

Cisco routers can help you create a more intelligent, responsive, and integrated network, based on adaptive and agile technologies.

17.
Cisco AnyConnect Secure Mobility Client - Cisco
https://www.cisc
.com/c/en_sg/products/security/anyconnect-secure-mobility-client/index.html/

Get much more than industry-leading VPN client connectivity. Cisco AnyConnect protects your enterprise resources through a single agent. See how.

18.
Cisco Edge Intelligence - Edge to Multi-Cloud IoT Data Flow - Cisco
https://www.cisc
.com/c/en/us/solutions/internet-of-things/edge-intelligence.html/

Simplify IoT Edge to multi-cloud data flow, securely extract and share IoT data to applications and unlock business intelligence with Cisco Edge Intelligence.

19.
Security X-Force | IBM
https://www.ib
.com/x-force/

IBM X-Force provides deep security research expertise and global threat intelligence for enhanced security solutions.

20.
Cisco Catalyst SD-WAN Manager (formerly vManage) - Cisco
https://www.cisc
.com/site/us/en/products/networking/wan/vmanage/index.html/

Cisco Catalyst SD-WAN Manager (formerly vManage) is a highly customizable dashboard that simplifies and automates the deployment, configuration, management, and operation for Cisco SD-WAN.

21.
Cisco Catalyst SD-WAN (Software-Defined WAN) - Cisco
https://www.cisc
.com/site/us/en/solutions/networking/sdwan/index.html/

Cisco Catalyst SD-WAN works with your existing infrastructure to let you connect any user to any application, anywhere in the world.

22.
Cisco Identity Services Engine (ISE) - Cisco
https://www.cisc
.com/c/en_sg/products/security/identity-services-engine/index.html/

ISE gives you a next-generation NAC solution that offers guest access, profiling, and BYOD. They are enforced by role-based software-defined segmentation.

23.
Cisco Defense Orchestrator - Cisco
https://www.cisc
.com/site/us/en/products/security/defense-orchestrator/index.html/

Cisco Defense Orchestrator is a cloud-based security policy manager that simplifies and unifies policy across your Cisco firewalls and IOS devices.

24.
WildFire - Palo Alto Networks
https://www.paloaltonetwork
.com/network-security/wildfire/

WildFire leverages a suite of cloud-based malware detection techniques and inline ML to identify and protect against unknown file-based threats.

25.
Industrial IoT Security - Palo Alto Networks
https://www.paloaltonetwork
.com/network-security/industrial-ot-security/

Ensure uninterrupted operation of production facilities with a Zero Trust approach to industrial OT protection that lets you focus on continued modernization.

26.
Leader in Cybersecurity Protection & Software for the Modern Enterprises - Palo Alto Networks
https://www.paloaltonetwork
.com/

Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Cybersecurity Services & Education for CISO’s, Head of Infrastructure, Network Security Engineers, Cloud Architects & SOC Managers

27.
Cisco Vulnerability Management (formerly Kenna.VM) - Cisco
https://www.cisc
.com/site/us/en/products/security/vulnerability-management/index.html/

Cisco Vulnerability Management (formerly Kenna Security) delivers risk-based prioritization that predicts exploits, drives down risk, and optimizes resources.

28.
A SASE Leader - Netskope
https://www.netskop
.com/

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data.

29.
DomainTools - The first place to go when you need to know.
https://www.domaintool
.com/

DomainTools is the global leader in Internet intelligence. Learn how our products and data are fundamental to best-in-class security programs.

30.
Recorded Future: Threat Intelligence Cloud
https://www.recordedfutur
.com/

Recorded Future is the most comprehensive and independent threat intelligence platform. Identify and mitigate threats across cyber, supply-chain, physical and fraud domains.

31.
Advanced URL Filtering - Palo Alto Networks
https://www.paloaltonetwork
.com/network-security/advanced-url-filtering/

Advanced URL Filtering provides best-in-class security, including the industry’s first real-time web protection engine and comprehensive phishing protection.

32.
Cisco Security Manager - Cisco
https://www.cisc
.com/c/en/us/products/security/security-manager/index.html/

Cisco Security Manager is an enterprise solution that helps organizations scale efficiently and manage a wide range of Cisco security devices.

33.
Network Security Products & Solutions | Juniper Networks US
https://www.junipe
.net/us/en/security.html/

Safeguard your users and applications with Juniper Connected Security that extends security to every point of connection, from client to cloud, across the network.

34.
OT/ICS and IoT cybersecurity company | Sectrio
https://sectri
.com/

Sectrio secures converged networks through better asset visibility, reduced attack surfaces & early detection of latent threats. | IoT, OT, IT and 5G Security

35.
Cisco Adaptive Security Virtual Appliance (ASAv) Data Sheet - Cisco
https://www.cisc
.com/c/en/us/products/collateral/security/adaptive-security-virtual-appliance-asav/adapt-security-virtual-appliance-ds.html/

This data sheet describes the benefits, specifications, and ordering information for the Cisco Secure Firewall ASA Virtual (formerly Adaptive Security Appliance virtual (ASAv)) Data Sheet.

36.
Cisco ASA 5500-X Series Firewalls - Cisco
https://www.cisc
.com/c/en_ca/products/security/asa-5500-series-next-generation-firewalls/index.html/

Cisco ASA 5500 Series Next-Generation Firewalls scale to meet a wide range of needs while providing highly secure, high-performance connectivity.

37.
Zscaler SASE: Architecture for a Cloud and Mobile
https://www.zscale
.com/products-and-solutions/secure-access-service-edge-sase/

Gartner’s SASE security model addresses the specific security concerns of organizations. Zscaler SASE platform is built for both performance and scalability

38.
What is SASE? | Secure Access Service Edge | VMware
https://www.vmwar
.com/products/software-defined-edge/secure-access-service-edge-sase/

SASE is the convergence of cloud networking and cloud security for simplicity, scalability, flexibility, and pervasive security. Learn more.

39.
ExtraHop: Cloud-Native Network Detection and Response
https://www.extraho
.com/

ExtraHop provides cloud-native cybersecurity solutions to help enterprises detect and respond to advanced threats—before they compromise your business.

40.
Red Canary: Find and stop cyber threats anywhere
http://redcanar
.com/

Get actionable threat intelligence across cloud, identity, and endpoint. Anywhere you run your business, we got you.

41.
Versa Networks: Explore Our Range of Products
https://versa-network
.com/products/

Explore Versa Networks' comprehensive range of cutting-edge networking products. Elevate your infrastructure with our best solutions for businesses!

43.
Cisco Duo - Cisco
https://www.cisc
.com/c/en/us/products/security/duo/index.html/

Cisco Duo is a user-centric zero-trust security platform with two-factor authentication to protect access to sensitive data for all users, devices, and applications.

44.
Zscaler Internet Access for Secure Internet & SaaS Access
https://www.zscale
.com/products-and-solutions/zscaler-internet-access/

Experience Zscaler Internet Access (ZIA) - the ultimate solution for secure internet and SaaS access with AI-powered protection for all users and devices.

45.
Network Threat Detection & Cyber Security | NetWitness
https://www.netwitnes
.com/

Professional network threat detection & cyber security monitoring services are offered by NetWitness. Accelerate threat detection and cyber attack response for your organization's SOC with unparalleled visibility, analytics and automation. Contact us today!

46.
Cybersecurity Services - Rapid7
https://www.rapid
.com/services/

Learn how our experts can make your security program relevant, actionable, and sustainable with a combination of cybersecurity services.

47.
Home | Lumen
https://www.lume
.com/

Welcome to Lumen. Enterprise IT solutions for Networking, Security, Edge Cloud, Collaboration, SASE, DDoS and Managed Services.

48.
Network Detection and Response (NDR) | Verizon
https://www.verizo
.com/business/products/security/threat-detection/network-detection-response/

With Verizon's Network Detection & Response (NDR), gain advanced threat intelligence and expert support to protect your business from suspicious activities and cyber attacks.

49.
50.
Cato Networks: World’s Leading Single-Vendor SASE Platform
https://www.catonetwork
.com/

Cato SASE Cloud converges SD-WAN, security, global backbone, and remote access into a global cloud-native service. WE ARE SASE™

51.
Network Security - Huawei Enterprise
https://e.huawe
.com/en/solutions/enterprise-network/security/

Intelligent threat detection, threat response, and security O&M improve the threat prevention capabilities of enterprise networks and telecom infrastructure, increasing security O&M efficiency and reducing O&M costs.

52.
Cybersecurity as a Service Delivered | Sophos
https://www.sopho
.com/

From Endpoint, Cloud, and Network Protection to Fully Managed Cybersecurity Services, We Have You Covered. Sophos Delivers Better Security Outcomes.

53.
Arista NDR - Arista
https://www.arist
.com/en/products/network-detection-and-response/

Delivering Unified Zero Trust Secure Networks Today, a zero trust networking approach to security is paramount for organizations looking to build a robust cybersecurity program. Irrespective of which device, application, or user is accessing an

54.
Appgate | Leading Zero Trust Network Access, Fraud Solutions and…
https://www.appgat
.com/

Appgate offers innovative cybersecurity solutions and advisory services including leading Zero Trust Network Access (ZTNA), fraud prevention tools and…

55.
FortiGuard AI-powered Security Services
https://www.fortine
.com/solutions/enterprise-midsize-business/security-as-a-service/fortiguard-subscriptions/

FortiGuard AI-powered Security Services counter threats in real-time with AI-powered, coordinated protection across your entire attack surface.

56.
Cisco 5900 Series Embedded Services Routers - Cisco
https://www.cisc
.com/c/en/us/products/routers/5900-series-embedded-services-routers/index.html/

These small, rugged, high-performance routers for mobile and embedded systems offer highly secure data, voice, and video communications.

57.
Network Security Products - Huawei Enterprise
https://e.huawe
.com/en/products/security/

With AI-based threat response, Software-Defined Networking (SDN)-based security defense, and intelligent security policy optimization, Huawei network security helps mitigate risks as customers go digital.

59.
Trend Micro (FI) | Industry-Leading Cyber Security Platform
https://cleanerone.trendmicr
.com/

Enterprise cybersecurity platform powered by AI & global threat intelligence. Attack surface management, XDR, cloud security, network security, managed services

60.
Cisco Catalyst Digital Building Series Switches - Cisco
https://www.cisc
.com/c/en/us/products/switches/catalyst-digital-building-series-switches/index.html/

Catalyst Digital Building Series switches are optimized to securely power and connect your smart building systems - light, HVAC, AV, and more on one network.

61.
URL Filtering - Check Point Software
https://www.checkpoin
.com/quantum/url-filtering/

URL filtering controls access to millions of web sites by category to protect users from malicious sites and enable safe use of the Internet.

62.
External Cybersecurity Platform | ZeroFox
https://www.zerofo
.com/platform/

The unified ZeroFox External Cybersecurity Platform exposes, disrupts, and responds to threats outside the perimeter.

63.
Cyberint - Threat Intelligence & Digital Risk Protection
https://cyberin
.com/

Continuously expose and mitigate your most relevant known and unknown risks with threat intelligence, tailored to your attack surface.

64.
#1 Crowdsourced Cybersecurity Platform | Bugcrowd
https://www.bugcrow
.com/

Bugcrowd teams with elite security researchers to reduce risk & improve security ROI through our bug bounty, pen testing, & vulnerability disclosure programs.

65.
Flashpoint | Cyber Threat Intelligence Platform & Professional Services
https://flashpoin
.io/

Flashpoint is a data and intelligence company that empowers our customers to take rapid, decisive action to stop threats and reduce risk

66.
Small Business Wireless Access Points - Cisco
https://www.cisc
.com/c/en/us/solutions/small-business/networking/wireless.html/

Improve productivity with scalable, easy-to-manage small business wireless access points and mesh extenders with Cisco Designed

67.
Security Service Edge SSE Solution - Skyhigh Security
https://www.skyhighsecurit
.com/products/security-service-edge.html/

Industry-leading cloud-native Security Service Edge (SSE) solution enables your workforce and protects your data across web, cloud, email, & private apps.

68.
Elevate Your Access Security with SSE | Axis Security
https://www.axissecurit
.com/

Axis Security uses SSE to elevate access security and ensure that your connectivity is always in-sync with your business. Get your workforce connected now.

69.
Home - SOCRadar® Cyber Intelligence Inc.
https://socrada
.io/

SOCRadar Extended Threat Intelligence is a natively single platform that proactively identifies and analyzes threats with contextual intelligence.

70.
Cisco Cloud Services Router 1000v - Cisco
https://www.cisc
.com/c/en/us/support/routers/cloud-services-router-1000v/model.html/

Cloud Services Router 1000V: Access product specifications, documents, downloads, Visio stencils, product images, and community content.

71.
CrowdSec | Curated Threat Intelligence Powered by the Crowd
https://crowdse
.net/

We turn crowd-powered intelligence into tactical intelligence with actionable blocklists to maximize your SOC efficiency and reduce your costs.

72.
Microsoft Defender Threat Intelligence | Microsoft Security
https://www.microsof
.com/en-us/security/business/siem-and-xdr/microsoft-defender-threat-intelligence/

Microsoft Defender Threat Intelligence is a dynamic threat intelligence solution that helps protect your organization from modern cyberthreats and exposure.

73.
VM-Series Virtual Next-Generation Firewall - Palo Alto Networks
https://www.paloaltonetwork
.com/network-security/vm-series-virtual-next-generation-firewall/

Best-in-class VM-Series Virtual Firewalls flexibly scale to secure public clouds, private clouds, enterprise virtual branches and more

74.
Security Service Edge (SSE) Platform | Forcepoint ONE
https://www.forcepoin
.com/product/forcepoint-one/

Protect data everywhere and secure access anywhere with the all-in-one, cloud-native security platform - Forcepoint ONE. Explore its features.

75.
Security Operations Platform Powered by AI I Anomali
https://www.anomal
.com/

Anomali is a security operations platform harnessing the power of AI to deliver breakthrough threat detection, visibility and cyber exposure management.

76.
Halo Security | Security testing for the modern attack surface.
https://www.halosecurit
.com/

Discover the risks across your attack surface with Halo Security's complete attack surface management platform.

77.
Real-time Intelligence | Zignal Labs
https://zignallab
.com/

Zignal Labs’ real-time intelligence technology helps the world’s largest organizations protect their people, places, and position.

78.
Cloud NGFW for AWS - Network Security - Palo Alto Networks
https://www.paloaltonetwork
.com/network-security/cloud-ngfw/

Cloud NGFW combines best-in-class network security with cloud native ease of use and delivers ML-Powered NGFW protection as a managed cloud native service on AWS.

79.
Network Switches | Juniper Networks US
https://www.junipe
.net/us/en/products/switches.html/

Explore switching solutions from Juniper Networks. Improve the economics of networking with carrier-class, high-density switches that reduce data center expenses.

80.
Cyber Threat Intelligence Platform Overview | Webroot
https://www.webroo
.com/gb/en/business/threat-intelligence/

BrightCloud® Threat Intelligence Services allow you to overcome the pace of malware creation. Find out why cybersecurity threats can't hide from BrightCloud®.

81.
Observability Platform | Cloud Monitoring | Free Trial | AppDynamics
https://www.appdynamic
.com/

Shape the future of apps with AppDynamics cloud monitoring and Cisco Secure Application. Start your 15-day free trial today

82.
Intezer - Autonomous Security Operations
https://inteze
.com/

Streamline time-consuming alert triage & incident response tasks with Intezer’s platform automatically investigating every alert and escalating serious threats.

83.
Cymulate - Exposure Management & Security Validation Platform
https://cymulat
.com/

Challenge, assess, and optimize your enterprise's cybersecurity posture with the number one Exposure Management & Security Validation platform.

84.
Deployment Services for Prisma Access - Palo Alto Networks
https://www.paloaltonetwork
.com/resources/datasheets/deployment-services-for-prisma-access/

Palo Alto Networks®Deployment Services for Prisma™ Access (formerly GlobalProtect™ cloud service) to fast-track your implementation and align it with best practices.

85.
Internet of Things (IoT) Control Center - Cisco
https://www.cisc
.com/c/en/us/solutions/internet-of-things/iot-control-center.html/

Cisco IoT Control Center is a comprehensive solution empowering businesses to manage and monetize their Internet of Things (IoT) devices efficiently.

86.
Edge Secure Web Gateway
https://www.broadco
.com/products/cybersecurity/network/web-protection/proxy-sg-and-advanced-secure-gateway/

High performance on-premises appliances that protect organizations across the web, social media, applications and mobile networks.

87.
Cloud Computing, Security, Content Delivery (CDN) | Akamai
https://www.akama
.com/

Akamai Connected Cloud is a massively distributed edge and cloud platform that keeps experiences closer to users — and threats farther away.

88.
Industrial Ethernet Switches - Cisco
https://www.cisc
.com/site/us/en/products/networking/industrial-switches/index.html/

Cisco Industrial Ethernet switches are purpose-built for the stringent demands of industrial operations yet are as easy to manage and secure as enterprise switches.

89.
Corelight: Evidence-Based NDR and Threat Hunting Platform
https://coreligh
.com/

Disrupt future attacks with complete network visibility, next-level analytics, faster investigations, and expert threat hunting.

90.
Cisco UCS Fabric Interconnects and Fabric Extenders - Cisco
https://www.cisc
.com/c/en/us/products/servers-unified-computing/fabric-interconnects.html/

Designed exclusively for Cisco UCS, Fabric Interconnects and Extenders provide management and LAN/SAN networking for UCS B-Series, C-Series, and S-Series servers.

91.
Malware Patrol | Cyber Threat Intelligence
https://www.malwarepatro
.net/

Malware Patrol provides real-time cyber threat intelligence that protects companies against malware, ransomware, phishing and more.

92.
Cisco Router, Cisco Switch, New Used Cisco Prices Comparison
https://www.router-switc
.com/

Professional Cisco Supplier - Buy and sell Cisco router, Cisco switch, Cisco firewall. New used Cisco prices comparison, check Cisco equipment data sheet. 18,000+ buyers, fast ship to worldwide.

93.
Strobes PTaaS- Pentesting as a Service
https://strobe
.co/solutions/pentesting-as-a-service/

Strobes Pentesting as a Service (PTaaS) offers a personalized, cost-effective, and offense-driven approach to safeguarding your digital assets

94.
Ontic
https://onti
.co/

Modern security software, purpose-built to manage threats, mitigate risks, and make businesses stronger. That’s Connected Intelligence from Ontic.

95.
GoodAccess: Secure access for work-from-anywhere businesses
https://www.goodacces
.com/

GoodAccess is a go-to cybersecurity platform for work-from-anywhere businesses. Hardware-free. Easy to use. Rapid to deploy. Free plan available.

96.
Cortex XSOAR: Security Orchestration and Automation - Palo Alto Networks
https://www.paloaltonetwork
.com/cortex/cortex-xsoar/

Cortex XSOAR is the industry's most comprehensive security orchestration automation and response (SOAR) platform. Explore Cortex XSOAR.

97.
Traceable: Intelligent API Security at Enterprise Scale
https://www.traceabl
.ai/

Traceable's API security discovers all APIs, and evaluates API risk posture, stops API attacks that lead to data exfiltration, and provides analytics for threat hunting.

98.
Leading Managed Detection and Response | Trustwave
https://www.trustwav
.com/en-us/

Trustwave is a leading cybersecurity and managed security services provider focused on managed detection and response.

99.
Cyber Triage - Digital Forensics Specialized For Incident Response
https://www.cybertriag
.com/

Cyber Triage is automated Digital Forensics and Incident Response (DFIR) software that allows cybersecurity professionals like you to quickly answer intrusion questions related to malware, ransomware, and account takeover.