Save to My Lists
Unclaimed
Unclaimed

Top Rated IP Defense Alternatives

IP Defense Reviews & Product Details

IP Defense Overview

What is IP Defense?

ThreatSTOP IP Defense is a SaaS cyber security solution that provides inbound network protection with continuous updates from 900+ Threat Intelligence sources. IP Defense sends automated policy updates to existing firewalls, routers and switches, and stops inbound attacks at network edges, before damage is done.

IP Defense Details
Show LessShow More
Product Description

ThreatSTOP IP Defense is a SaaS cyber security solution that provides inbound network protection with continuous updates from 900+ Threat Intelligence sources. IP Defense sends automated policy updates to existing firewalls, routers and switches, and stops inbound attacks at network edges, before damage is done.


Seller Details
HQ Location
Carlsbad, CA
Twitter
@threatstop
901 Twitter followers
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

IP Defense Media

IP Defense Demo - IP Defense Policy Editor
Build security enforcement policies with granular options to block threats and allow good traffic to and from your network.
IP Defense Demo - IP Defense Dashboard
Understand the security status of your network at a glance and see the active threats blocked by ThreatSTOP's IP Defense and the client machines impacted.
IP Defense Demo - IP Defense Reports
Work with advanced web-based reports to visualize the protection delivered by IP Defense, and to prioritize remediation and investigations.
Answer a few questions to help the IP Defense community
Have you used IP Defense before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of IP Defense for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(530)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
2
Check Point Next Generation Firewalls (NGFWs) Logo
Check Point Next Generation Firewalls (NGFWs)
4.5
(408)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
3
Sophos Firewall Logo
Sophos Firewall
4.6
(335)
Ultimate enterprise firewall performance, security, and control.
4
Netgate pfSense Logo
Netgate pfSense
4.8
(320)
The Netgate pfSense project is a powerful open source firewall and routing platform based on @FreeBSD.
5
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
6
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(297)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
7
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
8
WatchGuard Network Security Logo
WatchGuard Network Security
4.7
(261)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
9
ThreatLocker Logo
ThreatLocker
4.8
(272)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
10
Intezer Logo
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
Show More