Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Threater Alternatives

26 Threater Reviews

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
26 Threater Reviews
4.8 out of 5
26 Threater Reviews
4.8 out of 5

Threater Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for ThreaterQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Verified User in Financial Services
UF
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
(Original )Information
What do you like best about Threater?

We've been using Threatblockr for over five years, which has met all our cybersecurity needs. We are incredibly pleased with its performance. The software is easy to use and navigate. It has proven to be very effective in protecting our devices and personal information from potential threats by blocking all non-domestic traffic and all the threat lists we subscribe to. One of the features I appreciate the most is the real-time blocking and the ability to view the logs in real-time. The customer support team has also been very helpful in answering any questions we have had. I highly recommend Threatblockr to anyone looking for reliable and user-friendly cybersecurity solutions to simply block malicious traffic. Review collected by and hosted on G2.com.

What do you dislike about Threater?

A few things that I would recommend is to be able to drill down in more detail on the specific traffic that is being allowed and blocked. It would be nice to have a more interactive dashboard to try and see what IPs are doing with particular features (i.e., Blocked by Reason, Blocked by Category, Blocked by Country, and Blocked by ASN). It would be beneficial to look into this data to identify the traffic without looking at the exported logs. Review collected by and hosted on G2.com.

Dane Z.
DZ
Information Security Engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

The ability to ingest, aggregate, and take action based on different threat reputation and open-source feeds using STIX/TAXII and web .txt URLs.

This is something only a combination of SIEM/SOAR/UTM/TIP solutions could do.

Often this combination focuses on enrichment and IOC hunting, but it was difficult to ever take this information and compile it into a meaningful reputation block list that an NGFW could then ingest and take action with. Review collected by and hosted on G2.com.

What do you dislike about Threater?

Centralized logging of the different appliances' web activities such as their blocking behavior requires a SIEM or centralized Syslog server.

It doesn't allow for centralized searching of these logs via the SaaS portal. Review collected by and hosted on G2.com.

Verified User in Legal Services
AL
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

Ease of management and powerful block lists are available, customer support is one of the best I've ever dealt with. Review collected by and hosted on G2.com.

What do you dislike about Threater?

Does not support Entra SSO yet, no DNS whitelist feature. Review collected by and hosted on G2.com.

Dalton R.
DR
IT Lead Infrastructure &amp; Security Analyst
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
(Original )Information
What do you like best about Threater?

We've had a ThreatBlockr device ever since I arrived at my organization almost 7 years ago. It was brought in by my now senior manager and I would never deploy another site without one.

This appliance allows such an easy way to do geoblocking, it is incredible, point, click, save. Need to see if the country is blocked? No problem just type it in.

Allows me with pinpoint accuracy to adjust what I want in and out of my network before it even gets to my firewall with simple sliders. I get full control over how much risk I want to take with which ASNs. Need to allow some ASN traffic but want to make sure a slight deviation in the threat score blocks it? No problem, you adjust the slider from 0 to 100 or -100.

Solid insights on threat levels of malicious IPs/Websites.

Whitelist/Blacklisting lists are super simple to use.

Plus ThreatBlockr has a ton of out-of-the-box content lists you can link to.

I've also dabbled in having a dynamic list linked to a Google doc that I can update an IP or Website I want blocked into the Google doc and it transverses to the policy seamlessly.

With the GMC portal I can get single pane of glass review of both my devices across both our ISPs in front of our HA'd firewalls.

Support is top-notch as well, which is great, but I've rarely had to use it.

Updating is a breeze! Review collected by and hosted on G2.com.

What do you dislike about Threater?

My biggest gripe is when the Threatblockr is restricting a site, there is no splash page like OpenDNS/Umbrella. Also if Im Geoblocking a certain country and the website is coming from there and I run a search inside the GMC, it won't tell me if it is in a blocked country or not, kind of slows me down.

Otherwise the interface is rock solid. Review collected by and hosted on G2.com.

PD
Director of IT
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

The appliances are effortless to deploy, configure, and maintain. We can quickly look up log data on each device individually when we suspect something may be getting blocked. Their reports clearly illustrate the importance of the service to leadership. Using ThreatBlockr appliances between our UTMs and our WAN connections have allowed us to offload much of the load that our UTMs would have needed to process if they were connected directly to the Internet. Review collected by and hosted on G2.com.

What do you dislike about Threater?

Sometimes, the threat lists block shared webserver IPs, resulting in false positive blocking of legitimate websites. Because of where we position the appliances in our topology, I can't easily see what specific hosts on our internal network are trying to access so we often have to compare ThreatBlockr logs to UTM logs to get the full picture. Review collected by and hosted on G2.com.

Response from Courtney Brady of Threater

Thank you for your honest review! We very much agree that depending on where ThreatBlockr is deployed, especially when deployed outside your next generation firewall or UTM element (i.e., closest to the Internet), we can only see the NAT'd IP on the protected side. You're absolutely right that the only recourse to determine which protected side resource is involved is to cross check against your other security elements (i.e., the initial NAT'ing point). We find the best way for customers to handle that when they can do so is to leverage our built-in Syslog Export capability, sending our detailed logs to a SIEM or SIEM-like system of our customers' choosing, where they'd also have their UTM or equivalent logs present, and then do the correlation there.

You're also correct in stating that false positives can (and do!) occur. It's a challenge when you can block millions of IPs in real time like our platform allows - we know of no other platform in the world that can ingest so much third party data and never adversely impact performance. Since so many of our data intelligence partners leverage advanced detection schemes including leveraging AI systems, false positives are bound to happen. We're always looking at ways to improve false positive mitigation (we like to call them unexpected blocks), and one great way to do it is to leverage our Allowed Lists, which are easy to update in manual fashion and/or via API if you have the wherewithal to do so. Unlike many other platforms, there's NO limit to the amount of allowed list data that you can ingest, create, and use. On that note, our Customer Success team is always ready and willing to assist you in any way with this - please never hesitate to reach out to them!

And again, thank you for your honest review!

FC
Network Systems Analyst
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

The easy configuration and setup. Support is responsive and knowledgeable. Does not slow down internet connection and protects both inbound and outbound traffic separately. Review collected by and hosted on G2.com.

What do you dislike about Threater?

The logging tab is helpful but requires a page refresh when editing the query or wanting to update the list. Review collected by and hosted on G2.com.

AW
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

ThreatBlockr is a great product capable of numerous use cases and handling millions of packets. Review collected by and hosted on G2.com.

What do you dislike about Threater?

I can't think of anything negative it does its job well. Review collected by and hosted on G2.com.

Verified User in Utilities
AU
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

ThreatBlockr is very easy to administer and gives us peace of mind that malicious sites and actors are being blocked. Review collected by and hosted on G2.com.

What do you dislike about Threater?

The biggest issue is with some of the curated lists blocking legit sites at times. Review collected by and hosted on G2.com.

Response from Courtney Brady of Threater

Thank you for the review and we appreciate the feedback.

We are aware of unintended blocks occurring and know it almost always happens in the cloud where a specific website shares an IP with thousands of others. We do our best to mitigate and quickly respond with additional threat intel so that it doesn't happen with that site again.

Here is some additional information if that happens again: https://support.threatblockr.com/hc/en-us/articles/4407480803092.

Thank you again for being a trusted ThreatBlockr customer!

See how Threater improved
BH
Sr Infrastructure Engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

Ease of use, provided dynamic threat lists are constantly updated, simple geo blocking. We 've done extensive geo blocking and malicious traffic at our edge probably dropped by 90% Review collected by and hosted on G2.com.

What do you dislike about Threater?

Sometimes the threat lists can be overzealous blocking legitimate IPs. Would like to see improved handling of domain allow/block lists. It's a multi-step process to do a DNS lookup on a domain then add the IPs to a block/allow list. Review collected by and hosted on G2.com.

Verified User in Legal Services
AL
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Threater?

the number of sources integrated in the solution Review collected by and hosted on G2.com.

What do you dislike about Threater?

The resolution of support ticket. They don't provide all the details from the beginning Review collected by and hosted on G2.com.