The security intelligence company landscape split in two directions in 2024: platform consolidation at the top of the market, where major acquisitions reshaped which companies control enterprise security infrastructure, and specialist expansion at the intelligence layer, where pure-play threat intelligence vendors deepened their AI-driven analytical capabilities. Mastercard acquired Recorded Future — the world’s largest threat intelligence company — for $2.65 billion in December 2024, recognizing that financial institution threat intelligence is core business capability rather than a vendor relationship. Cisco’s $28 billion acquisition of Splunk in March 2024 created the largest security intelligence platform company by revenue. IBM sold QRadar SaaS to Palo Alto Networks, consolidating enterprise SIEM customers toward the three platforms with the deepest AI investment: Palo Alto Cortex XSIAM, Microsoft Sentinel, and Splunk/Cisco. The security intelligence market that these companies serve was valued at $24.72 billion in 2024, growing toward $61.08 billion by 2035 at 8.57% CAGR. The top five vendors — Splunk/Cisco, Microsoft, IBM/Palo Alto, CrowdStrike, and Google — now control approximately 55% of SIEM revenue, a concentration level that didn’t exist five years ago in a market historically defined by hundreds of point solutions. The companies that define security intelligence in 2025–2026 fall into two operating models: platform vendors that unify SIEM, EDR, SOAR, UEBA, and threat intelligence into a single product, and specialist vendors that provide the adversary intelligence that platform-centric programs need but can’t generate internally at scale.
- Major M&A: Mastercard acquired Recorded Future ($2.65B, December 2024); Cisco acquired Splunk ($28B, March 2024); Palo Alto acquired IBM QRadar SaaS
- Recorded Future: world’s largest threat intelligence company, 1,900+ clients across 75 countries, governments of 45 countries, 50%+ of Fortune 100
- CrowdStrike: FY2026 ARR $5.25B (24% YoY growth); processes 2 trillion security events weekly via Threat Graph
- Top 5 SIEM vendors control ~55% of revenue; Splunk 46.98% market share, Microsoft Sentinel 14.99%, IBM QRadar 9.41%
- Two operating models: unified SOC platforms (Splunk, Sentinel, Cortex XSIAM, CrowdStrike) vs. specialist TI vendors (Recorded Future, Mandiant, Flashpoint, Intel 471, Anomali)
Security Intelligence Platform Companies: Splunk, Microsoft, Palo Alto, and CrowdStrike

The Platform Vendors: What Each Company Owns in 2025
Splunk — now operating as Cisco’s security intelligence platform — holds 46.98% of the SIEM market and has been ranked #1 by IDC for five consecutive years. Cisco’s security revenue reached $2.1 billion after integrating Splunk’s log analytics and telemetry with Cisco’s network visibility and SecureX security platform. The combined company’s enterprise SIEM install base — the majority of Splunk Enterprise Security customers have 10,000+ employees — represents the deepest enterprise penetration of any security intelligence platform. Microsoft Sentinel, at 14.99% SIEM market share and 40,000+ enterprise customers, grew Azure security workloads 150% year-over-year in 2025. Microsoft’s security business — spanning Sentinel (SIEM), Defender XDR (endpoint and identity), Copilot for Security (LLM investigation), and MDTI (threat intelligence) — is the largest integrated security intelligence suite by customer count, with Microsoft 365 and Azure ecosystem lock-in making Sentinel the default choice for organizations standardized on Microsoft infrastructure. Palo Alto Networks, with $4.8 billion in next-generation security ARR and 9.7% market share, runs the most aggressive platform unification strategy through Cortex XSIAM — a unified SOC platform combining SIEM, EDR, XDR, SOAR, and UEBA in a single data model. Absorbing IBM QRadar SaaS customers adds approximately 9.41% of the SIEM market’s installed base, with the QRadar correlation rules and analytics being migrated into Cortex’s AI-native detection engine. CrowdStrike’s FY2026 total revenue reached $4.81 billion (22% growth), with ARR growing 24% year-over-year to $5.25 billion as of January 2026. Its Threat Graph processes 2 trillion security events weekly across 97%+ customer retention — the data moat that differentiates CrowdStrike’s intelligence from smaller endpoint vendors. CrowdStrike achieved 100% detection and 100% protection with no false positives in the 2025 MITRE ATT&CK Enterprise Evaluations. Google Chronicle Security Operations completes the major platform tier, operating at Google Cloud’s infrastructure scale and serving cloud-native organizations requiring petabyte-scale security analytics without on-premise infrastructure.
How Platform Companies Are Expanding Into Intelligence Services
The convergence of SIEM platform companies into threat intelligence services reflects recognition that data lakes without adversary context produce alerts without investigation value. Microsoft’s MDTI (Microsoft Defender Threat Intelligence) provides nation-state and criminal threat actor profiles, infrastructure tracking, and dark web monitoring integrated directly into Sentinel analytics — intelligence capabilities that Microsoft acquired through its RiskIQ acquisition in 2021. CrowdStrike Falcon Intelligence provides adversary attribution and campaign tracking to Falcon platform customers, with intelligence derived from CrowdStrike’s incident response investigations and its endpoint telemetry across millions of deployed sensors. Palo Alto Networks Unit 42 threat intelligence research team functions as both an intelligence production unit (publishing threat research) and a revenue-generating incident response service, with Unit 42’s intelligence feeding directly into Cortex XSIAM detection logic. Cisco Talos — the largest commercial threat intelligence team by researcher count with over 250 researchers — provides Splunk Enterprise Security and the Cisco security portfolio with threat intelligence derived from monitoring 215 billion daily security events. The integration of intelligence production capabilities into platform companies represents the competitive moat that pure-play SIEM vendors lack: the ability to produce original adversary intelligence from telemetry at scale, rather than exclusively consuming commercial feeds.
Specialist Threat Intelligence Companies: Recorded Future, Mandiant, Flashpoint, Intel 471

Pure-Play Intelligence Vendors and Their Differentiation
Specialist threat intelligence companies exist because platform vendors — despite their scale — can’t replicate the depth of adversary-specific intelligence that dedicated research organizations produce. Recorded Future, now a Mastercard subsidiary, is the largest pure-play threat intelligence company: 1,900+ clients across 75 countries, including the governments of 45 countries and more than 50% of the Fortune 100. Recorded Future’s intelligence cloud combines open web, dark web, and technical sources across millions of indicators, enriched by AI-driven analysis that scores threats before human analysts review them. Mastercard’s $2.65 billion acquisition reflects strategic recognition that payment network threat intelligence — tracking organized criminal groups targeting card data and financial infrastructure — is core to operating a global payments business, not a vendor service. Mandiant (Google Threat Intelligence) provides adversary attribution and incident response intelligence derived from Mandiant’s consulting team’s direct investigation of nation-state and criminal threat actors across thousands of breach investigations annually. Google’s acquisition integrates Mandiant’s intelligence into Google Chronicle and Google Cloud Security Command Center, extending enterprise customers’ access to nation-state threat actor profiles backed by forensic investigation data. Flashpoint specializes in cybercriminal and physical threat intelligence from deep and dark web sources — criminal forums, closed-access marketplaces, and threat actor communities — providing the underground intelligence layer that open-source collection and platform vendors’ telemetry doesn’t reach. Intel 471 focuses specifically on adversary intelligence from active infiltration of cybercriminal communities, producing finished intelligence on criminal threat actors, malware developers, and initial access brokers with the granularity that indicator feeds don’t provide. Anomali’s ThreatStream platform aggregates 200+ threat intelligence sources — commercial feeds, ISACs, government sharing programs — and provides the integration layer that deploys intelligence to SIEM, SOAR, and endpoint platforms via STIX/TAXII. The Mastercard investor announcement on the Recorded Future acquisition details the strategic rationale and commercial terms. CrowdStrike’s FY2025 financial results document the ARR and revenue figures for the platform tier.
Frequently Asked Questions
Who are the top security intelligence companies?
Top security intelligence companies by segment in 2025–2026: Platform vendors (SIEM/SOC): 1) Splunk (Cisco) — 46.98% SIEM market share, $4B+ ARR, #1 IDC five years; 2) Microsoft (Sentinel) — 14.99% SIEM share, 40,000+ customers; 3) Palo Alto Networks (Cortex XSIAM) — $4.8B next-gen security ARR, 9.7% market share; 4) CrowdStrike — $5.25B ARR (FY2026), 2 trillion events/week; 5) Google (Chronicle). Threat intelligence specialists: Recorded Future (Mastercard, $2.65B acquisition) — world’s largest TI company, 1,900+ clients; Mandiant (Google) — nation-state investigation intelligence; Flashpoint — dark/deep web criminal intelligence; Intel 471 — adversary-specific criminal intelligence; Anomali — 200+ source TIP aggregation. Intelligence research teams within platforms: Cisco Talos (250+ researchers), CrowdStrike Falcon Intelligence, Palo Alto Unit 42, Microsoft MDTI.
What happened to Recorded Future?
Mastercard acquired Recorded Future from Insight Partners for $2.65 billion, completing the acquisition on December 20, 2024. Recorded Future is the world’s largest threat intelligence company — 1,900+ clients across 75 countries, serving the governments of 45 countries and more than 50% of the Fortune 100. Mastercard’s acquisition reflects recognition that threat intelligence is core infrastructure for financial network operations, not a vendor service. Recorded Future continues operating as an independent business unit within Mastercard, maintaining its commercial clients and government relationships while gaining Mastercard’s financial infrastructure and global distribution. Mastercard’s rationale: combining Recorded Future’s AI-driven threat intelligence with Mastercard’s real-time fraud scoring and identity solutions creates a cybersecurity platform covering financial crime across both payments and enterprise security.
What is the difference between a security intelligence platform and a threat intelligence company?
A security intelligence platform (Splunk, Microsoft Sentinel, Palo Alto Cortex XSIAM, CrowdStrike) is primarily an enterprise software product: it collects, processes, and analyzes an organization’s own security telemetry — logs, endpoint data, network flows — and uses external threat intelligence as enrichment context. A threat intelligence company (Recorded Future, Mandiant, Flashpoint, Intel 471) is primarily an intelligence production business: it collects, analyzes, and produces finished intelligence about adversaries, criminal networks, and threats from external sources — dark web monitoring, adversary infrastructure tracking, incident investigation data, criminal community infiltration. Organizations need both: platforms to process internal telemetry and detect anomalies; specialist intelligence companies to provide adversary context that explains what detections mean and predicts what threats are coming. Platform vendors are building intelligence capabilities in-house (Cisco Talos, CrowdStrike Falcon Intelligence, Unit 42) — but specialist TI companies retain depth advantages in specific domains (underground criminal intelligence, nation-state attribution).
How does CrowdStrike compare to other security intelligence companies?
CrowdStrike’s market position in security intelligence is endpoint-first: it builds intelligence from the telemetry of millions of deployed Falcon sensors, making its threat intelligence operationally grounded in observed adversary behavior at scale. FY2026 (ended January 2026): total revenue $4.81 billion (22% growth), ARR $5.25 billion (24% YoY). Threat Graph processes 2 trillion security events weekly. CrowdStrike achieved 100% detection, 100% protection, zero false positives in the 2025 MITRE ATT&CK Enterprise Evaluations. Against Splunk/Cisco: Splunk holds larger SIEM market share (46.98% vs. CrowdStrike’s Next-Gen SIEM position) but CrowdStrike’s endpoint-native intelligence integration gives it an advantage in environments where Falcon is already deployed. Against Microsoft Sentinel: Sentinel has more customers (40,000+) but CrowdStrike’s endpoint telemetry depth produces richer investigative context than Microsoft’s log-focused approach. Against Recorded Future: CrowdStrike produces intelligence from its own endpoint telemetry; Recorded Future produces intelligence from external collection of adversary-facing sources — they’re complementary rather than competing.