Top Rated Threater Alternatives
26 Threater Reviews
Overall Review Sentiment for Threater
Log in to view review sentiment.

While your SIEM may alert you of threats, Threatblockr allows you to retrieve threat intel from TAXII/STIX feeds and blocks it. Most firewalls do not work with threat feeds unless they are URL-based. Threatblockr is one of the few devices that will pull in feeds so that you can block near real-time threats. They also include a premium threat feed from Webroot at no additional cost. Review collected by and hosted on G2.com.
There are two managment interfaces, a local one and a cloud-based site. Initially, it gets a little confusing on which site handles configuration and interface changes. Reporting needs work. There isn't a way to run on-demand reports. You have to schedule reports in advance (monthly will run on the 1st of every month, weekly runs at midnight on Sunday, etc.) . Sometimes, you just want to run a report for a specified date range, which isn't currently possible. Review collected by and hosted on G2.com.

ThreatBlockr supports integration with open source IP and domain block lists, but also supports premium feeds. This allows us to leverage integrations with other soltuions we are already using for other purposes. Review collected by and hosted on G2.com.
The blocking is IP based. For today's Internet, where a single IP my host 500 websites, or where CDNs means that IPs can change in an instant, this is a big weakness. But, due to how the technology works and how it fits into the network, it may be something that can never be "fixed". Review collected by and hosted on G2.com.
ThreatBlockr sits in front of our primary control points to scrape off off the known junk, thereby reducing the load on our remaining control points. Review collected by and hosted on G2.com.
We have not found any downsides to using ThreatBlockr Review collected by and hosted on G2.com.
The Help in setup and ongoing support for the product has been amazing. They are genuinely interested in every false positive or niggle we have had and explain the reasoning behind everything on the playtform Review collected by and hosted on G2.com.
If I had to call one thing I don't like about the product it's the lack of storage for logging, we get around this by exporting the external logs and troubleshooting that way. Review collected by and hosted on G2.com.
This product drops malicious traffic with great accuracy and allows the firewalls to spend more of their resources doing what they do best. It also does an excellent job allowing the devices at each endpoint to communicate with each other to protect all endpoints when the first sees something malicious. It also accepts live feeds from multiple sources of your choice to allow the system to make the best decisions on traffic flow. The support staff is superb! Review collected by and hosted on G2.com.
I only wish this technology were my own creation. Review collected by and hosted on G2.com.
I appreciate the additional email alerts to make sure our Bandura device is fully patched, and the other emails showing the protection stats. Review collected by and hosted on G2.com.
I don't have a specific item to dislike. Review collected by and hosted on G2.com.
1.The interface is very user friendly.
2. Easy to whitelist / blacklist IPs and domains.
3. Great responsive support.
4. Great logging.
5. Provides various ways to block or allow an IP or domain.
This seems to have been made by somebody who had to work with firewalls since it just makes sense. Review collected by and hosted on G2.com.
A block on a domain blacklist can only be overridden by a whitelist on the domain whitelist. For example, if you blacklist google.com and whitelist 8.8.8.8, the domain will be allowed. You have to whitelist domain blocks at the domain level and same for the IPs.
Not horrible, but something to keep in mind. Review collected by and hosted on G2.com.

Simple to use, vendor-agnostic, and effective at reducing exposure against known sources of cyber attacks.
Elastic search.
It scales much better than its competitors. Review collected by and hosted on G2.com.
There is nothing I dislike about ThreatBlockr.
Yes, everything works as expected.
It could include integration with additional commercial threat feed providers. Review collected by and hosted on G2.com.

ThreatBlockr works without maintenance; blacklists are updated automatically. ThreatBlockr support is very responsive. Review collected by and hosted on G2.com.
I dont have anything that i dont like about ThreatBlockr Review collected by and hosted on G2.com.
Easy to configure, automatic updates. Geo and service blocking to significantly reduce load on edge devices. Review collected by and hosted on G2.com.
Logs do need to be set up on a separate host. The rolling log is only a few hours long, so you will not be able to see much unless you export them somewhere else. Review collected by and hosted on G2.com.