Top Rated Threater Alternatives
26 Threater Reviews
Overall Review Sentiment for Threater
Log in to view review sentiment.
We've been using Threatblockr for over five years, which has met all our cybersecurity needs. We are incredibly pleased with its performance. The software is easy to use and navigate. It has proven to be very effective in protecting our devices and personal information from potential threats by blocking all non-domestic traffic and all the threat lists we subscribe to. One of the features I appreciate the most is the real-time blocking and the ability to view the logs in real-time. The customer support team has also been very helpful in answering any questions we have had. I highly recommend Threatblockr to anyone looking for reliable and user-friendly cybersecurity solutions to simply block malicious traffic. Review collected by and hosted on G2.com.
A few things that I would recommend is to be able to drill down in more detail on the specific traffic that is being allowed and blocked. It would be nice to have a more interactive dashboard to try and see what IPs are doing with particular features (i.e., Blocked by Reason, Blocked by Category, Blocked by Country, and Blocked by ASN). It would be beneficial to look into this data to identify the traffic without looking at the exported logs. Review collected by and hosted on G2.com.

The ability to ingest, aggregate, and take action based on different threat reputation and open-source feeds using STIX/TAXII and web .txt URLs.
This is something only a combination of SIEM/SOAR/UTM/TIP solutions could do.
Often this combination focuses on enrichment and IOC hunting, but it was difficult to ever take this information and compile it into a meaningful reputation block list that an NGFW could then ingest and take action with. Review collected by and hosted on G2.com.
Centralized logging of the different appliances' web activities such as their blocking behavior requires a SIEM or centralized Syslog server.
It doesn't allow for centralized searching of these logs via the SaaS portal. Review collected by and hosted on G2.com.
Ease of management and powerful block lists are available, customer support is one of the best I've ever dealt with. Review collected by and hosted on G2.com.
Does not support Entra SSO yet, no DNS whitelist feature. Review collected by and hosted on G2.com.

We've had a ThreatBlockr device ever since I arrived at my organization almost 7 years ago. It was brought in by my now senior manager and I would never deploy another site without one.
This appliance allows such an easy way to do geoblocking, it is incredible, point, click, save. Need to see if the country is blocked? No problem just type it in.
Allows me with pinpoint accuracy to adjust what I want in and out of my network before it even gets to my firewall with simple sliders. I get full control over how much risk I want to take with which ASNs. Need to allow some ASN traffic but want to make sure a slight deviation in the threat score blocks it? No problem, you adjust the slider from 0 to 100 or -100.
Solid insights on threat levels of malicious IPs/Websites.
Whitelist/Blacklisting lists are super simple to use.
Plus ThreatBlockr has a ton of out-of-the-box content lists you can link to.
I've also dabbled in having a dynamic list linked to a Google doc that I can update an IP or Website I want blocked into the Google doc and it transverses to the policy seamlessly.
With the GMC portal I can get single pane of glass review of both my devices across both our ISPs in front of our HA'd firewalls.
Support is top-notch as well, which is great, but I've rarely had to use it.
Updating is a breeze! Review collected by and hosted on G2.com.
My biggest gripe is when the Threatblockr is restricting a site, there is no splash page like OpenDNS/Umbrella. Also if Im Geoblocking a certain country and the website is coming from there and I run a search inside the GMC, it won't tell me if it is in a blocked country or not, kind of slows me down.
Otherwise the interface is rock solid. Review collected by and hosted on G2.com.
The appliances are effortless to deploy, configure, and maintain. We can quickly look up log data on each device individually when we suspect something may be getting blocked. Their reports clearly illustrate the importance of the service to leadership. Using ThreatBlockr appliances between our UTMs and our WAN connections have allowed us to offload much of the load that our UTMs would have needed to process if they were connected directly to the Internet. Review collected by and hosted on G2.com.
Sometimes, the threat lists block shared webserver IPs, resulting in false positive blocking of legitimate websites. Because of where we position the appliances in our topology, I can't easily see what specific hosts on our internal network are trying to access so we often have to compare ThreatBlockr logs to UTM logs to get the full picture. Review collected by and hosted on G2.com.
The easy configuration and setup. Support is responsive and knowledgeable. Does not slow down internet connection and protects both inbound and outbound traffic separately. Review collected by and hosted on G2.com.
The logging tab is helpful but requires a page refresh when editing the query or wanting to update the list. Review collected by and hosted on G2.com.
ThreatBlockr is a great product capable of numerous use cases and handling millions of packets. Review collected by and hosted on G2.com.
I can't think of anything negative it does its job well. Review collected by and hosted on G2.com.
ThreatBlockr is very easy to administer and gives us peace of mind that malicious sites and actors are being blocked. Review collected by and hosted on G2.com.
The biggest issue is with some of the curated lists blocking legit sites at times. Review collected by and hosted on G2.com.
Ease of use, provided dynamic threat lists are constantly updated, simple geo blocking. We 've done extensive geo blocking and malicious traffic at our edge probably dropped by 90% Review collected by and hosted on G2.com.
Sometimes the threat lists can be overzealous blocking legitimate IPs. Would like to see improved handling of domain allow/block lists. It's a multi-step process to do a DNS lookup on a domain then add the IPs to a block/allow list. Review collected by and hosted on G2.com.