Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Threater Alternatives

26 Threater Reviews

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
26 Threater Reviews
4.8 out of 5
26 Threater Reviews
4.8 out of 5

Threater Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for ThreaterQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Michael M.
MM
CIO
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

While your SIEM may alert you of threats, Threatblockr allows you to retrieve threat intel from TAXII/STIX feeds and blocks it. Most firewalls do not work with threat feeds unless they are URL-based. Threatblockr is one of the few devices that will pull in feeds so that you can block near real-time threats. They also include a premium threat feed from Webroot at no additional cost. Review collected by and hosted on G2.com.

What do you dislike about Threater?

There are two managment interfaces, a local one and a cloud-based site. Initially, it gets a little confusing on which site handles configuration and interface changes. Reporting needs work. There isn't a way to run on-demand reports. You have to schedule reports in advance (monthly will run on the 1st of every month, weekly runs at midnight on Sunday, etc.) . Sometimes, you just want to run a report for a specified date range, which isn't currently possible. Review collected by and hosted on G2.com.

Jasey D.
JD
Security Consultant
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

ThreatBlockr supports integration with open source IP and domain block lists, but also supports premium feeds. This allows us to leverage integrations with other soltuions we are already using for other purposes. Review collected by and hosted on G2.com.

What do you dislike about Threater?

The blocking is IP based. For today's Internet, where a single IP my host 500 websites, or where CDNs means that IPs can change in an instant, this is a big weakness. But, due to how the technology works and how it fits into the network, it may be something that can never be "fixed". Review collected by and hosted on G2.com.

GK
Chief Information Officer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

ThreatBlockr sits in front of our primary control points to scrape off off the known junk, thereby reducing the load on our remaining control points. Review collected by and hosted on G2.com.

What do you dislike about Threater?

We have not found any downsides to using ThreatBlockr Review collected by and hosted on G2.com.

RB
Lead Support Engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
(Original )Information
What do you like best about Threater?

The Help in setup and ongoing support for the product has been amazing. They are genuinely interested in every false positive or niggle we have had and explain the reasoning behind everything on the playtform Review collected by and hosted on G2.com.

What do you dislike about Threater?

If I had to call one thing I don't like about the product it's the lack of storage for logging, we get around this by exporting the external logs and troubleshooting that way. Review collected by and hosted on G2.com.

JW
V
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Threater?

This product drops malicious traffic with great accuracy and allows the firewalls to spend more of their resources doing what they do best. It also does an excellent job allowing the devices at each endpoint to communicate with each other to protect all endpoints when the first sees something malicious. It also accepts live feeds from multiple sources of your choice to allow the system to make the best decisions on traffic flow. The support staff is superb! Review collected by and hosted on G2.com.

What do you dislike about Threater?

I only wish this technology were my own creation. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

I appreciate the additional email alerts to make sure our Bandura device is fully patched, and the other emails showing the protection stats. Review collected by and hosted on G2.com.

What do you dislike about Threater?

I don't have a specific item to dislike. Review collected by and hosted on G2.com.

AK
Information Security Analyst
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

1.The interface is very user friendly.

2. Easy to whitelist / blacklist IPs and domains.

3. Great responsive support.

4. Great logging.

5. Provides various ways to block or allow an IP or domain.

This seems to have been made by somebody who had to work with firewalls since it just makes sense. Review collected by and hosted on G2.com.

What do you dislike about Threater?

A block on a domain blacklist can only be overridden by a whitelist on the domain whitelist. For example, if you blacklist google.com and whitelist 8.8.8.8, the domain will be allowed. You have to whitelist domain blocks at the domain level and same for the IPs.

Not horrible, but something to keep in mind. Review collected by and hosted on G2.com.

Loris M.
LM
Founder and CEO
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
Business partner of the seller or seller's competitor, not included in G2 scores.
What do you like best about Threater?

Simple to use, vendor-agnostic, and effective at reducing exposure against known sources of cyber attacks.

Elastic search.

It scales much better than its competitors. Review collected by and hosted on G2.com.

What do you dislike about Threater?

There is nothing I dislike about ThreatBlockr.

Yes, everything works as expected.

It could include integration with additional commercial threat feed providers. Review collected by and hosted on G2.com.

James S.
JS
IT Manager
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite on behalf of seller
Incentivized Review
(Original )Information
What do you like best about Threater?

ThreatBlockr works without maintenance; blacklists are updated automatically. ThreatBlockr support is very responsive. Review collected by and hosted on G2.com.

What do you dislike about Threater?

I dont have anything that i dont like about ThreatBlockr Review collected by and hosted on G2.com.

Verified User in Government Administration
AG
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

Easy to configure, automatic updates. Geo and service blocking to significantly reduce load on edge devices. Review collected by and hosted on G2.com.

What do you dislike about Threater?

Logs do need to be set up on a separate host. The rolling log is only a few hours long, so you will not be able to see much unless you export them somewhere else. Review collected by and hosted on G2.com.