Try our new research platform with insights from 80,000+ expert users

GitGuardian Platform vs ThreatBook Threat Intelligence Platform (TIP) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 28, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

GitGuardian Platform
Ranking in Threat Intelligence Platforms (TIP)
5th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
32
Ranking in other categories
Application Security Tools (9th), Static Application Security Testing (SAST) (4th), Data Loss Prevention (DLP) (6th), Software Supply Chain Security (6th), DevSecOps (3rd), Non-Human Identity Management (NHIM) (3rd)
ThreatBook Threat Intellige...
Ranking in Threat Intelligence Platforms (TIP)
15th
Average Rating
9.6
Reviews Sentiment
7.6
Number of Reviews
4
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Ney Roman - PeerSpot reviewer
Facilitates efficient secret management and improves development processes
Regarding the exceptions in GitGuardian Platform, we know that within the platform we have a way to accept a path or a directory from a repository, but it is not that visible at the very beginning. You have to figure out where to search for it, and once you have it, it is really good, but it is not that visible at the beginning. This should be made more exposed. The documentation could be better because it was not that comprehensively documented. When we started working with GitGuardian Platform, it was difficult to find some specific use cases, and we were not aware of that. It might have improved now, but at that time, it was not something we would recommend.
RG
Enhancement in incident response through reduced false positives and contextual intelligence
ThreatBook has positively impacted our organization by allowing us to detect all alerts and threats effectively. In the past, we needed to search logs from various sources, including terminals, DI servers, and firewalls, collecting a lot of logs and searching the internet for contextual information about threat actors. After using ThreatBook TDP, all alerts and contexts are easily displayed on the dashboard, making it very helpful for us. During the incident response scenario, ThreatBook saves us over 80% of the time for each incident. We usually took about one day or two days for attribution and understanding how the attacker attacked us, but after using ThreatBook TDP, we usually take around one or two hours to finish all these tasks. Additionally, their AI techniques save a lot of time, allowing me to ask in natural language for explanations about the meaning and target of the attacker.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"There is quite a lot to like. Its user interface is fantastic, and being able to sort the incidents by whether they are valid or for a certain repository or a certain user has been very beneficial in helping investigate what has been found."
"You can also assign tasks to specific teams or people to complete, such as assigning something to the "blue team" or saying that this person needs to do this, and that person needs to do that. That is a great feature because you can actually manage your team internally in GitGuardian."
"GitGuardian has many features that fit our use cases. We have our internal policies on secret exposure, and our code is hosted on GitLab, so we need to prevent secrets from reaching GitLab because our customers worry that GitLab is exposed. One of the great features is the pre-receive hook. It prevents commits from being pushed to the repository by activating the hook on the remotes, which stops the developers from pushing to the remote. The secrets don't reach GitLab, and it isn't exposed."
"GitGuardian Internal Monitoring has helped increase our secrets detection rate by several orders of magnitude. This is a hard metric to get. For example, if we knew what our secrets were and where they were, we wouldn't need GitGuardian or these types of solutions. There could be a million more secrets that GitGuardian doesn't detect, but it is basically impossible to find them by searching for them."
"Presently, we find the pre-commit hooks more useful."
"GitGuardian has pretty broad detection capabilities. It covers all of the types of secrets that we've been interested in... [Yet] The "detector" concept, which identifies particular categories or types of secrets, allows an organization to tweak and tailor the configuration for things that are specific to its environment. This is highly useful if you're particularly worried about a certain type of secret and it can help focus attention, as part of early remediation efforts."
"A high number of our exposures are remediated by developers before security needs to step in, as the self-healing playbook process engages them automatically. This results in issues being resolved within minutes, saving significant effort from the security team in tracking down or communicating with developers."
"The most valuable feature of GitGuardian is that it finds tokens and passwords. That's why we need this tool. It minimizes the possibility of security violations that we cannot find on our own."
"ThreatBook Threat Intelligence Platform (TIP) has positively impacted our organization by helping us generate the strategic threat focus reports and aiding us in decision-making, leading to improved cybersecurity operation efficiency."
"ThreatBook saves us over 80% of the time for each incident."
"We have not suffered from any attack for the past few months, which has relatively improved our network security."
"ThreatBook saves us over 80% of time for each incident, reducing the usual time taken from one or two days for attribution to just one or two hours, thanks to their AI techniques."
 

Cons

"The analytics in GitGuardian Platform have a significant opportunity to better reflect the value provided to security teams and demonstrate actual activity occurring. While the self-healing capability and proactive developer actions are important features, the analytics do not provide information around this activity."
"It could be easier. They have a CLI tool that engineers can run on their laptops, but getting engineers to install the tool is a manual process. I would like to see them have it integrated into one of those developer tools, e.g., VS Code or JetBrains, so developers don't have to think about it."
"Right now, we are waiting for improvement in the RBAC support for GitGuardian."
"The purchasing process is convoluted compared to Snyk, the other tool we use. It's like night and day because you only need to punch in your credit card, and you're set. With GitGuardian, getting a quote took two or three weeks. We paid for it in December but have not settled that payment yet."
"I would like to see improvement in some of the user interface features... When one secret is leaked in multiple files or multiple repositories, it will appear on the dashboard. But when you click on that secret, all the occurrences will appear on the page. It would be better to have one secret per occurrence, directly, so that we don't have to click to get to the list of all the occurrences."
"Automated Jira tickets would be fantastic. At the moment, I believe we have to go in and click to create a Jira ticket. It would be nice to automate."
"We have encountered occasional difficulties with the Single Sign-On process."
"An area for improvement is the front end for incidents. The user experience in this area could be much better."
"I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good."
"It would be great if ThreatBook could integrate with our ITSM system to streamline the tasks and incident management"
"ThreatBook Threat Intelligence Platform (TIP) could be improved by providing more integrations to support additional platforms."
"We’ve seen strong ROI through reduced incident response times, increased threat visibility, and less time wasted on false positives."
 

Pricing and Cost Advice

"GitGuardian is on the pricier side."
"It's competitively priced compared to others. Overall, the secret detection sector is expensive, but we are very happy with the value we get."
"It's a little bit expensive."
"It could be cheaper. When GitHub secrets monitoring solution goes to general access and general availability, GitGuardian might be in a little bit of trouble from the competition, and maybe then they might lower their prices. The GitGuardian solution is great. I'm just concerned that they're not GitHub."
"I am only aware of the base price. I do not know what happened with our purchasing team in discussions with GitGuardian. I was not privy to the overall contract, but in terms of the base MSRP price, I found it reasonable."
"It's fairly priced, as it performs a lot of analysis and is a valuable tool."
"It's not cheap, but it's not crazy expensive either."
"With GitGuardian, we didn't need any middlemen."
Information not available
report
Use our free recommendation engine to learn which Threat Intelligence Platforms (TIP) solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Government
19%
Computer Software Company
18%
Financial Services Firm
8%
Comms Service Provider
7%
Recreational Facilities/Services Company
45%
Financial Services Firm
16%
Performing Arts
7%
Real Estate/Law Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise9
Large Enterprise13
No data available
 

Questions from the Community

What do you like most about GitGuardian Internal Monitoring ?
It's also worth mentioning that GitGuardian is unique because they have a free tier that we've been using for the first twelve months. It provides full functionality for smaller teams. We're a smal...
What is your experience regarding pricing and costs for GitGuardian Internal Monitoring ?
It's competitively priced compared to others. Overall, the secret detection sector is expensive, but we are happy with the value we get.
What needs improvement with GitGuardian Internal Monitoring ?
GitGuardian Platform does what it is designed to do, but it still generates many false positives. We utilize the automated playbooks from GitGuardian Platform, and we are enhancing them. We will pr...
What is your experience regarding pricing and costs for ThreatBook?
My experience with pricing, setup cost, and licensing is that it is cost-effective and the price is reasonable, with very good overall value and quality.
What needs improvement with ThreatBook?
I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good. I wou...
What is your primary use case for ThreatBook?
We use ThreatBook to have overview visibility of all our assets including if there are any compromised hosts or if there are any incoming attacks from external threats. When we first deployed Threa...
 

Also Known As

GitGuardian Internal Monitoring, GitGuardian Public Monitoring
No data available
 

Overview

 

Sample Customers

Widely adopted by developer communities, GitGuardian is used by over 600 thousand developers and leading companies, including Snowflake, Orange, Iress, Mirantis, Maven Wave, ING, BASF, and Bouygues Telecom.
Information Not Available
Find out what your peers are saying about GitGuardian Platform vs. ThreatBook Threat Intelligence Platform (TIP) and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.