Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Threater Alternatives

Threater Reviews & Product Details

Threater Overview

What is Threater?

threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range of solutions to proactively and automatically safeguard organizations against cyber threats. Their patented solution effectively blocks all known threats, enabling the rest of the modern cyber security stack to do its job more efficiently. Your security stack is better with threatER. For more information, find us at www.threater.com.

Threater Details
Show LessShow More
Product Description

Threater is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. Threater offers a wide range of solutions to proactively and automatically safeguard organizations against cyber threats. Their patented solution effectively blocks all known threats, enabling the rest of the modern cyber security stack to do its job more efficiently. Your security stack is better with Threater. For more information, find us at Threater.com.


Seller Details
Seller
Threater
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®

Courtney B.
CB
Overview Provided by:
VP of Marketing at ThreatBlockr

Recent Threater Reviews

James S.
JS
James S.Mid-Market (51-1000 emp.)
5.0 out of 5
"ThreatBlockr Works"
ThreatBlockr works without maintenance; blacklists are updated automatically. ThreatBlockr support is very responsive.
Verified User
U
Verified UserMid-Market (51-1000 emp.)
5.0 out of 5
"Threatblockr Is A Game-Changer In The Cybersecurity Field!"
We've been using Threatblockr for over five years, which has met all our cybersecurity needs. We are incredibly pleased with its performance. The s...
Verified User
A
Verified UserMid-Market (51-1000 emp.)
5.0 out of 5
"ThreatBlockr IP based block list management is quick, easy and reliable protection"
Ease of management and powerful block lists are available, customer support is one of the best I've ever dealt with.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Threater Media

Threater Demo - Threater Enforce Admin
View of Report within the Threater Admin Console
Threater Demo - Threater Enforce Admin (2)
View of Report within the Threater Admin Console
Threater Demo - Threater Collect
View of Collect (free service) within the Threater Admin Console
Answer a few questions to help the Threater community
Have you used Threater before?
Yes

26 Threater Reviews

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
26 Threater Reviews
4.8 out of 5
26 Threater Reviews
4.8 out of 5

Threater Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for ThreaterQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Verified User in Financial Services
UF
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
(Original )Information
What do you like best about Threater?

We've been using Threatblockr for over five years, which has met all our cybersecurity needs. We are incredibly pleased with its performance. The software is easy to use and navigate. It has proven to be very effective in protecting our devices and personal information from potential threats by blocking all non-domestic traffic and all the threat lists we subscribe to. One of the features I appreciate the most is the real-time blocking and the ability to view the logs in real-time. The customer support team has also been very helpful in answering any questions we have had. I highly recommend Threatblockr to anyone looking for reliable and user-friendly cybersecurity solutions to simply block malicious traffic. Review collected by and hosted on G2.com.

What do you dislike about Threater?

A few things that I would recommend is to be able to drill down in more detail on the specific traffic that is being allowed and blocked. It would be nice to have a more interactive dashboard to try and see what IPs are doing with particular features (i.e., Blocked by Reason, Blocked by Category, Blocked by Country, and Blocked by ASN). It would be beneficial to look into this data to identify the traffic without looking at the exported logs. Review collected by and hosted on G2.com.

What problems is Threater solving and how is that benefiting you?

The problems that ThreatBlockr is solving is by blocking all non-domestic traffic that we, as our domestic bank, does not do business with, and with any threat lists that is out there that are indeed malicious to avoid traffic to our network devices (i.e., firewalls, web filtering) Review collected by and hosted on G2.com.

Dane Z.
DZ
Information Security Engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

The ability to ingest, aggregate, and take action based on different threat reputation and open-source feeds using STIX/TAXII and web .txt URLs.

This is something only a combination of SIEM/SOAR/UTM/TIP solutions could do.

Often this combination focuses on enrichment and IOC hunting, but it was difficult to ever take this information and compile it into a meaningful reputation block list that an NGFW could then ingest and take action with. Review collected by and hosted on G2.com.

What do you dislike about Threater?

Centralized logging of the different appliances' web activities such as their blocking behavior requires a SIEM or centralized Syslog server.

It doesn't allow for centralized searching of these logs via the SaaS portal. Review collected by and hosted on G2.com.

What problems is Threater solving and how is that benefiting you?

Solved holes in NGFW reputation-based blocks and is easier to administrate and troubleshoot activity than most NGFWs.

Allowed us to pull in different paid and open-source STIX/TAXII and URL-based reputation sources and create our own block lists which is much more complex and difficult to achieve when combining SIEM/SOAR/UTM/TIP/NGFW technology stacks.

Geo-Blocking is probably the best on the market and we prefer it heavily over similar NGFW functionality.

If you have worked with some of the leading Cloud WAF Geo-Blocking rulesets and policies; ThreatBlockr is their on-prem equivalent in ease of implementation, effectiveness, and administration. Review collected by and hosted on G2.com.

Verified User in Legal Services
AL
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

Ease of management and powerful block lists are available, customer support is one of the best I've ever dealt with. Review collected by and hosted on G2.com.

What do you dislike about Threater?

Does not support Entra SSO yet, no DNS whitelist feature. Review collected by and hosted on G2.com.

What problems is Threater solving and how is that benefiting you?

We use ThreatBlockr primarily for zero-day IP blocking and geo-blocking. Utilizing the subscriptions lists we have near instant protection without requiring a lot of overhead from our team. Review collected by and hosted on G2.com.

Dalton R.
DR
IT Lead Infrastructure &amp; Security Analyst
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
(Original )Information
What do you like best about Threater?

We've had a ThreatBlockr device ever since I arrived at my organization almost 7 years ago. It was brought in by my now senior manager and I would never deploy another site without one.

This appliance allows such an easy way to do geoblocking, it is incredible, point, click, save. Need to see if the country is blocked? No problem just type it in.

Allows me with pinpoint accuracy to adjust what I want in and out of my network before it even gets to my firewall with simple sliders. I get full control over how much risk I want to take with which ASNs. Need to allow some ASN traffic but want to make sure a slight deviation in the threat score blocks it? No problem, you adjust the slider from 0 to 100 or -100.

Solid insights on threat levels of malicious IPs/Websites.

Whitelist/Blacklisting lists are super simple to use.

Plus ThreatBlockr has a ton of out-of-the-box content lists you can link to.

I've also dabbled in having a dynamic list linked to a Google doc that I can update an IP or Website I want blocked into the Google doc and it transverses to the policy seamlessly.

With the GMC portal I can get single pane of glass review of both my devices across both our ISPs in front of our HA'd firewalls.

Support is top-notch as well, which is great, but I've rarely had to use it.

Updating is a breeze! Review collected by and hosted on G2.com.

What do you dislike about Threater?

My biggest gripe is when the Threatblockr is restricting a site, there is no splash page like OpenDNS/Umbrella. Also if Im Geoblocking a certain country and the website is coming from there and I run a search inside the GMC, it won't tell me if it is in a blocked country or not, kind of slows me down.

Otherwise the interface is rock solid. Review collected by and hosted on G2.com.

What problems is Threater solving and how is that benefiting you?

Geoblocking is such a great 1st line defense. Then the ASN sliders so I can adjust things as I see fit, not how the vendor does or would that I see with other products. Its the perfect appliance for the practicing of defense in depth and Zero Trust. Review collected by and hosted on G2.com.

PD
Director of IT
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

The appliances are effortless to deploy, configure, and maintain. We can quickly look up log data on each device individually when we suspect something may be getting blocked. Their reports clearly illustrate the importance of the service to leadership. Using ThreatBlockr appliances between our UTMs and our WAN connections have allowed us to offload much of the load that our UTMs would have needed to process if they were connected directly to the Internet. Review collected by and hosted on G2.com.

What do you dislike about Threater?

Sometimes, the threat lists block shared webserver IPs, resulting in false positive blocking of legitimate websites. Because of where we position the appliances in our topology, I can't easily see what specific hosts on our internal network are trying to access so we often have to compare ThreatBlockr logs to UTM logs to get the full picture. Review collected by and hosted on G2.com.

What problems is Threater solving and how is that benefiting you?

Adding a very effective 1st layer of defense to our network helps ensure that malicious traffic (both inbound and potentially outbound) is blocked efficiently based on crowdsourced lists. Review collected by and hosted on G2.com.

Response from Courtney Brady of Threater

Thank you for your honest review! We very much agree that depending on where ThreatBlockr is deployed, especially when deployed outside your next generation firewall or UTM element (i.e., closest to the Internet), we can only see the NAT'd IP on the protected side. You're absolutely right that the only recourse to determine which protected side resource is involved is to cross check against your other security elements (i.e., the initial NAT'ing point). We find the best way for customers to handle that when they can do so is to leverage our built-in Syslog Export capability, sending our detailed logs to a SIEM or SIEM-like system of our customers' choosing, where they'd also have their UTM or equivalent logs present, and then do the correlation there.

You're also correct in stating that false positives can (and do!) occur. It's a challenge when you can block millions of IPs in real time like our platform allows - we know of no other platform in the world that can ingest so much third party data and never adversely impact performance. Since so many of our data intelligence partners leverage advanced detection schemes including leveraging AI systems, false positives are bound to happen. We're always looking at ways to improve false positive mitigation (we like to call them unexpected blocks), and one great way to do it is to leverage our Allowed Lists, which are easy to update in manual fashion and/or via API if you have the wherewithal to do so. Unlike many other platforms, there's NO limit to the amount of allowed list data that you can ingest, create, and use. On that note, our Customer Success team is always ready and willing to assist you in any way with this - please never hesitate to reach out to them!

And again, thank you for your honest review!

FC
Network Systems Analyst
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

The easy configuration and setup. Support is responsive and knowledgeable. Does not slow down internet connection and protects both inbound and outbound traffic separately. Review collected by and hosted on G2.com.

What do you dislike about Threater?

The logging tab is helpful but requires a page refresh when editing the query or wanting to update the list. Review collected by and hosted on G2.com.

What problems is Threater solving and how is that benefiting you?

We no longer have to wonder who is trying to access or even succeeding at accessing our network. An extra layer of security that alleviates and supports our firewall. Review collected by and hosted on G2.com.

AW
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

ThreatBlockr is a great product capable of numerous use cases and handling millions of packets. Review collected by and hosted on G2.com.

What do you dislike about Threater?

I can't think of anything negative it does its job well. Review collected by and hosted on G2.com.

What problems is Threater solving and how is that benefiting you?

Blocking unwanted traffic on the perimeter from countries and ASN's Review collected by and hosted on G2.com.

Verified User in Utilities
AU
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

ThreatBlockr is very easy to administer and gives us peace of mind that malicious sites and actors are being blocked. Review collected by and hosted on G2.com.

What do you dislike about Threater?

The biggest issue is with some of the curated lists blocking legit sites at times. Review collected by and hosted on G2.com.

What problems is Threater solving and how is that benefiting you?

ThreatBlockr allows us to automatically block connections to and from countries where we typically do not have users or businesses in. Also, the curated lists automatically protect our network and users from malicious activities. Review collected by and hosted on G2.com.

Response from Courtney Brady of Threater

Thank you for the review and we appreciate the feedback.

We are aware of unintended blocks occurring and know it almost always happens in the cloud where a specific website shares an IP with thousands of others. We do our best to mitigate and quickly respond with additional threat intel so that it doesn't happen with that site again.

Here is some additional information if that happens again: https://support.threatblockr.com/hc/en-us/articles/4407480803092.

Thank you again for being a trusted ThreatBlockr customer!

See how Threater improved
BH
Sr Infrastructure Engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

Ease of use, provided dynamic threat lists are constantly updated, simple geo blocking. We 've done extensive geo blocking and malicious traffic at our edge probably dropped by 90% Review collected by and hosted on G2.com.

What do you dislike about Threater?

Sometimes the threat lists can be overzealous blocking legitimate IPs. Would like to see improved handling of domain allow/block lists. It's a multi-step process to do a DNS lookup on a domain then add the IPs to a block/allow list. Review collected by and hosted on G2.com.

What problems is Threater solving and how is that benefiting you?

ThreatBlockr has greatly reduced the malicious traffic to our network edge. It filters out a lot of noise and makes monitoring for threats easier. Review collected by and hosted on G2.com.

Verified User in Legal Services
AL
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

the number of sources integrated in the solution Review collected by and hosted on G2.com.

What do you dislike about Threater?

The resolution of support ticket. They don't provide all the details from the beginning Review collected by and hosted on G2.com.

What problems is Threater solving and how is that benefiting you?

the number of sources included in the solution. Improve our detection. Review collected by and hosted on G2.com.