Threat Research & Intelligence Solutions and Services | Fortra

Threat Research & Intelligence

Stay ahead of organized cybercrime with products and services fueled by a world-class Threat Intelligence team.

Threat Research & Intelligence Capabilities

The cyberthreat landscape changes every minute of the day. Today’s threat actors are bold, clever, and often financially motivated or backed by rogue political groups with deep pockets and destructive agendas. Our customers look to us to empower them with products and services fueled by the in-depth knowledge our Threat Intelligence experts generate every day to stay ahead of organized cybercrime. Understanding the trends and threat lifecycles of this shifting landscape helps us develop effective tools and best practices that enable our customers to manage risk through targeted prevention, detection, and response.

The Fortra offering is unique because it brings together a variety of offensive and defensive solutions and services in one place to help ensure nothing goes unnoticed. We offer extensive coverage across MITRE ATT&CK Kill Chain, CIS Controls, and the most prevalent threat vectors, including email, web applications, ransomware, phishing, account takeovers, cloud compromises, and SaaS application attacks. From mitigating the risk of a newly discovered breach or zero-day threat to using red teaming to conduct exploit development, we’ve got you covered.


Trusted Managed Security Services

In addition to infusing our software with threat intelligence, we also offer managed security services to enhance your SOC team’s efforts. In fact, Digital Guardian, PhishLabs, and Alert Logic do just that. 

Learn more >

Our Team of Threat Intelligence Experts 

Evaluating threats from all angles to reduce risk

The Threat Intelligence team includes more than 350 experts who analyze evolving threats from different angles to produce world-class threat intelligence every day. This multi-faceted team includes vulnerability researchers, red and blue team experts, data scientists, security researchers, security analysts, security engineers, malware researchers, and security automation engineers. These experts share a common goal of breaking down emerging threats to better understand how the threat landscape is changing while preventing and responding to attacks using the latest offensive and defensive solutions.

Threat Intelligence Research

Agari Cyber Intelligence Division (ACID)

Agari’s counterintelligence team, ACID, is dedicated to worldwide business email compromise (BEC), spearphishing investigation, and cybercrime abatement.

View Research

Alert Logic

The Alert Logic blog goes deep on the latest threat activity and recommendations for enhancing security.

View Research

Beyond Security

Beyond Security’s repository of instructions for finding and fixing vulnerabilities addresses threats to widely used technology and applications.

View Research


These Clearswift resources review hot data security topics including the latest compliance requirements and how to protect sensitive assets.

View Research

Cobalt Strike Red Team Testing Tool

The Cobalt Strike blog keeps the red teaming community updated on the latest advancements in this powerful offensive security tool.

View Research

CoreLabs Research

CoreLabs, the research center of Core Security, is charged with researching and understanding security trends as well as anticipating the future requirements of information security technologies.  

View Research

Digital Defense Vulnerability Research Team (VRT)

Discover the latest news and helpful information from the Digital Defense Vulnerability Research Team (VRT).

View Research

Digital Guardian

Digital Guardian’s blog, Data Insider, looks at the latest malware and ransomware threat research. 

View Research


The Outflank blog discusses red teaming, attack simulation, and other IT security stories from the trenches.

View Research


PhishLabs blogs and webinars discuss the latest best practices for keeping emails, brands, and data safe from sophisticated phishing attacks, insider threats, and accidental data loss.

View Research
Browse Webinars

Get Started

Let’s talk to determine the best solution for your organization