• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. ThreatBook Advanced Threat Intelligence
Logo of ThreatBook Advanced Threat Intelligence

ThreatBook Advanced Threat Intelligence

byThreatBook
in Security Threat Intelligence Products and Services (Transitioning to Cyber Threat Intelligence Technologies)
5.0

Overview

Product Information on ThreatBook Advanced Threat Intelligence

Updated 13th October 2025

What is ThreatBook Advanced Threat Intelligence?

ThreatBook Threat Intelligence Platform - NGTIP is a software designed to provide organizations with insights and analysis on cyber threats by aggregating, correlating, and contextualizing threat intelligence data from multiple sources. The software offers automated threat detection, situational awareness, and risk assessment capabilities to help users identify and respond to security incidents. It integrates with security infrastructure, delivers timely intelligence feeds, and supports investigation processes by providing threat indicators, contextual data, and analysis tools. The software aims to enhance cybersecurity operations by enabling proactive threat identification and supporting decision-making for security teams in complex digital environments.

ThreatBook Advanced Threat Intelligence Pricing

The ThreatBook Threat Intelligence Platform NGTIP software uses a subscription-based pricing model, typically structured around different service tiers that offer varying levels of features and data volume. Pricing may be influenced by the number of users, the scope of threat intelligence feeds accessed, and integration capabilities with other systems. Custom pricing options may be available for enterprises with specific requirements.

Overall experience with ThreatBook Advanced Threat Intelligence

Manager, IT Security and Risk Management
500M - 1B USD, Banking
FAVORABLE

“Expanding the coverage dimensions of threat intelligence”

5.0
Jul 23, 2025
1、High intelligence accuracy:Boasting a unique production and quality control mechanism,ThreatBook ensures over 95% high-quality self-developed intelligence,with99.99% accuracy in detecting enhances attack purpose judgment,improving alarm analysis effciency and accuracy,and reducing attack IP alarm noise by over 85% 2、Advanced analytical capabilities:Tip features advanced correlation algorithms to uncover hidden threats.INtegrated with SOC platforms,it prioritizes alarm events via threat intelligence,enabling enterprises to focus on real threats and boosting handling efficiency. 3、Strong ecologIcal openness:TIP integrates multi-source intelligence (commercial,open-sourece,self-produced,custom) and seamlessly connects with mainstream security and data platforms, compatible with major border defense devices,empowering intelligence sharing and utilization scenarios
There are no reviews in this category.
CRITICAL

About Company

Company Description

Updated 5th July 2024

ThreatBook is a provider of cyber threat detection and response services. We developed new approaches to deliver high-fidelity, efficient, and actionable security intelligence. We integrated these capabilities with a full life cycle threat detection system and incident response mechanisms to enhance protection across cloud, network, and endpoints. This helps enterprises respond to threats efficiently, reduce complexity, and improve security operations.

Company Details

Updated 26th February 2025
Company type
Private
Year Founded
2015
Head office location
Beijing, China
Number of employees
501 - 1000
Website
https://threatbook.cn/next/en

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

Reviewer Insights for: ThreatBook Advanced Threat Intelligence
Deciding Factors: ThreatBook Advanced Threat Intelligence Vs. Market Average
Performance of ThreatBook Advanced Threat Intelligence Across Market Features

ThreatBook Advanced Threat Intelligence Likes & Dislikes

Like

1Its intuitive user interface simplifies threat intelligence management,allowing even non-technical users to navigate and utilize critical data effortlessly. 2The real-time threat detection and analysis capabilities ensure proactive identification of potential riskssignificantly enhancing an oragnization's security posture 3 The seamlessintegration with various existing security tools and systems eliminates silos creating a unified and effcient threat response ecosystem

Read Full Review
Like

1. Precision Noise Reduction: Integrates multi-source threat intelligence to filter out over 80% false positives, enabling security teams to focus on real threats. 2. Second-Level Response: High-concurrency API integration with firewalls, SOC and other systems enables automated blocking, significantly improving response efficiency. 3. Network-Wide Protection: Supports private intelligence production and sharing, achieving single-point detection, full-network defense for high-security sectors like finance and government.

Read Full Review
Like

I really like many features of this product, for example ,it provides a vast amount of incident information from both domestic and international sources,which helps me learn a lot .it also automatically generates weekly reports for me,which serves as documentation of my work achievements,lastly,it offers real-time alerts about network threats i am facing,which is incredibly reliable.

Read Full Review
Dislike

1The initial setup process can be overly complexrequiring extensive technical expertise and prolonged configuration timewhich may hinder uqick deployment for some teams 2The picing structure lacks sufficent transparency,with additional costs for advanced features often emerging unexpectedly,making budget planning challenging.

Read Full Review
Dislike

1. Faster response needed: Feedback processing takes too long, need to speed it up. 2. Unified feedback channel: Current reporting methods are too scattered - should consolidate into one place. 3. Better progress updates: Want to know if our suggestions get implemented - please keep us informed.

Read Full Review
Dislike

However, the product does have some areas for improvement. For instance, when security incidents occur, it cannot proactively remove duplicates. Second, the weekly reports it generates do not support custom data dimensions, which means I have to manually adjust them, a process that can be tedious. Finally, the permission system lacks granularity, making making it difficult to precisely manage user access rights

Read Full Review

Top ThreatBook Advanced Threat Intelligence Alternatives

Logo of Cyble Vision
1. Cyble Vision
4.8
(334 Ratings)
Logo of CloudSEK XVigil
2. CloudSEK XVigil
4.8
(276 Ratings)
Logo of ReliaQuest GreyMatter
3. ReliaQuest GreyMatter
4.7
(257 Ratings)
View All Alternatives

Peer Discussions

ThreatBook Advanced Threat Intelligence Reviews and Ratings

5.0

(63 Ratings)

Rating Distribution

5 Star
98%
4 Star
2%
3 Star
0%
2 Star
0%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.9

Planning & Transition

4.9

Delivery & Execution

5.0

Integration & Deployment

5.0

Service & Support

5.0

Service Capabilities

5.0

Last 12 Months
Filter Reviews
Sort By:
Most helpful
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • Manager, IT Security and Risk Management
    50M-1B USD
    Banking
    Review Source

    Expanding the coverage dimensions of threat intelligence

    5.0
    Jul 23, 2025
    1、High intelligence accuracy:Boasting a unique production and quality control mechanism,ThreatBook ensures over 95% high-quality self-developed intelligence,with99.99% accuracy in detecting enhances attack purpose judgment,improving alarm analysis effciency and accuracy,and reducing attack IP alarm noise by over 85% 2、Advanced analytical capabilities:Tip features advanced correlation algorithms to uncover hidden threats.INtegrated with SOC platforms,it prioritizes alarm events via threat intelligence,enabling enterprises to focus on real threats and boosting handling efficiency. 3、Strong ecologIcal openness:TIP integrates multi-source intelligence (commercial,open-sourece,self-produced,custom) and seamlessly connects with mainstream security and data platforms, compatible with major border defense devices,empowering intelligence sharing and utilization scenarios
  • IT Associate
    50M-1B USD
    IT Services
    Review Source

    Threat Intelligence Platform Enhances Noise Reduction but Needs Better Feedback Processing

    5.0
    Jul 23, 2025
    From a user perspective, the core experience of Threat Intelligence Platform (TIP) by ThreatBook lies in “efficient noise reduction” and “automated response”. The platform integrates multi-source threat intelligence (commercial/open-source/self-produced) to significantly reduce false positives, while enabling real-time collaboration with firewalls, SOC and other security systems through high-concurrency APIs for automatic malicious IP blocking with second-level response speed. Its private intelligence generation capability transforms internal alerts into proprietary threat intelligence, achieving "single-point detection, network-wide defense" - particularly suitable for financial, government and other sectors requiring rapid response to advanced threats.
  • DATA AND ANALYTICS MANAGER
    <50M USD
    Hardware
    Review Source

    Automatic Reports and Real-Time Alerts Highlight Everyday Work Achievements and Threats

    5.0
    Oct 29, 2025
    I really like this product. Its recently launched feature, situational intelligence, constantly provides me with security incidents from various industries and countries. This enhances my knowledge of security issues and allows me to demonstrate my expertise in front of my leaders,reinforcing their confidence in my capabilities.
  • Information Security Engineer
    1B-10B USD
    IT Services
    Review Source

    Threat Intelligence Hub: Access, Intelligence Integration

    5.0
    Sep 2, 2025
    The TIP platform is committed to driving security operations with intelligence. It transforms that intelligence into specific action guidelines through integrated query, production and management capabilities, directly empowering our security team, significantly enhancing the efficiency of threat detection and response, and giving us the upper hand in confrontation.
  • IT Manager
    50M-1B USD
    Banking
    Review Source

    Detailed Threat Remediation Guidance Enhances Network Security Management Effectiveness

    5.0
    Oct 22, 2025
    We highly recommend this knowledge-based tool.ti is incredibly powerful and easy to use, playing a key role in our efforts to fortify our company’s network security.it has become an invaluable asset to our team.
...
Showing Result 1-5 of 64

Recommended Gartner Research

  • Market Guide for Security Threat Intelligence Products and Services (Transitioning to Cyber Threat Intelligence Technologies)

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.