| A-ISAC |
| ActiveResponse |
| AlienVault |
| Anomali (Formerly ThreatStream) |
| Anomali STIX/TAXII |
| Anubis |
| Area1Security |
| BambenekConsulting |
| BlueLiv |
| CarbonBlack |
| Central Ops |
| Collective Intelligence Framework (CIF) |
| Combine |
| CRITS |
| CrowdStrike |
| CVEs Common Vulnerabilities and Exposures |
| Cybereason |
| CybOX |
| Cymmetria MazeRunner |
| Damballa |
| Darktrace |
| Deteque |
| DigitalShadows |
| DomainBigData |
| DomainTools |
| E-ISAC |
| EclecticIQ |
| Facebook Threat Exchange |
| FIRST |
| FlashPoint |
| Forcepoint (Used to be WebSense) |
| Fox-IT |
| FS-ISAC |
| Gartner |
| Group IB |
| HackMon |
| Hail A TAXII |
| Health-ISAC |
| Hexadite |
| IBM X-Force Exchange |
| IMPACT |
| InfoBlox ActiveTrust |
| Intel 471 |
| IntelMQ |
| IntelMQ Manager |
| IntSights |
| Invincea |
| iSIGHT |
| JigsawSecurity |
| JigsawSecurity |
| Kaspersky |
| KernelMode |
| Kolide |
| LogicHub |
| LookingGlass |
| MAEC |
| MAEC |
| Maltego |
| Malware URL |
| Malwares |
| MANTIS |
| Microsoft Interflow |
| MineMeld |
| MozDef |
| Mozilla MIG |
| National Vulnerability Database |
| Oasis |
| Open Vulnerability and Assessment Language |
| OSquery |
| Packet Ninjas |
| Palantir |
| PassiveTotal |
| Polarity |
| ProofPoint |
| PulseDive |
| QRadar |
| QRadar |
| RecordedFuture |
| Red Canary |
| RedSeal |
| REN-ISAC |
| Risk Fabric |
| Shadow Dragon |
| Splunk |
| Steve Borden |
| Suricata |
| Tanium |
| TAXII |
| The Hive |
| Threat Analytics Search |
| ThreatConnect |
| ThreatCrowd |
| ThreatGrid (Now owned by Cisco) |
| ThreatMiner |
| ThreatPinch |
| ThreatQuotient |
| ThreatStack |
| ThreatStop |
| ThreatTrack |
| Vectra |
| Veramine |
| VERIS |
| YETI - Your Everyday Threat Intelligence |
| Zscaler |