Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed

ThreatMon Reviews & Product Details - Page 2

ThreatMon Overview

What is ThreatMon?

Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cutting-edge solution combines Threat Intelligence, External Attack Surface Management, and Digital Risk Protection to identify vulnerabilities and provide personalized security solutions for maximum security. Threatmon identifies the distinctive nature of each business and provides bespoke solutions that cater to its specific needs. With real-time monitoring, risk scoring, and reporting, Threatmon's Attack Surface Mapping feature helps businesses make informed decisions about their security. Threatmon's big data processing technology identifies potential long-term threats and provides timely preventive measures to protect companies from future attacks. With nine different modules, Threatmon uses advanced technologies and the expertise of cybersecurity professionals to help companies shift from a reactive to a proactive approach. Join the growing number of organizations that trust Threatmon to protect their digital assets and safeguard their future.

ThreatMon Details
Product Website
Languages Supported
English, Turkish
Show LessShow More
Product Description

Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cutting-edge solution combines Threat Intelligence, External Attack Surface Management, and Digital Risk Protection to identify vulnerabilities and provide personalized security solutions for maximum security. Threatmon identifies the distinctive nature of each business and provides bespoke solutions that cater to its specific needs. With real-time monitoring, risk scoring, and reporting, Threatmon's Attack Surface Mapping feature helps businesses make informed decisions about their security. Threatmon's big data processing technology identifies potential long-term threats and provides timely preventive measures to protect companies from future attacks. With nine different modules, Threatmon uses advanced technologies and the expertise of cybersecurity professionals to help companies shift from a reactive to a proactive approach. Join the growing number of organizations that trust Threatmon to protect their digital assets and safeguard their future.


Seller Details
Seller
ThreatMon
Company Website
Year Founded
2018
HQ Location
Sterling VA
Twitter
@MonThreat
12,381 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
Description

Threatmon delivers the intelligence-driven cybersecurity solution ThreatMon. Founded in 2018, the company is dedicated to protecting digital assets from external threats. ThreatMon's cutting-edge cybersecurity solution is designed by experienced professionals and combines Threat Intelligence, External Attack Surface Management, and Digital Risk Protection to identify vulnerabilities and offer customized security solutions.


SS
Overview Provided by:

Recent ThreatMon Reviews

Clint C.
CC
Clint C.Enterprise (> 1000 emp.)
5.0 out of 5
"Great solution just way to difficult to get pricing"
The granular reporting. I like the dashboard and the ease of use
EA
Evren A.Mid-Market (51-1000 emp.)
5.0 out of 5
"Comprehensive and Easy-to-Use Cybersecurity Tool"
The platform itself is easy to use and the dark web monitoring gives us another layer of protection.
Kamal V.
KV
Kamal V.Mid-Market (51-1000 emp.)
5.0 out of 5
"Advanced Threat Intelligence and Comprehensive Dark Web Monitoring"
ThreatMon provides us with actionable insights into ongoing threats, particularly from hacker discussions on the dark web. This has allowed us to s...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

ThreatMon Media

ThreatMon Demo - ThreatMon Attack Surface Management
External Attack Surface Management (EASM) detects the external digital assets of the organization after active and passive scans on the entire internet and performs continuous monitoring on the discovered external attack surface. Our External Attack Surface Management (EASM) service, combined wit...
ThreatMon Demo - ThreatMon Digital Risk Protection
ThreatMon provides a robust and all-encompassing Digital Risk Protection service to safeguard your organization's online presence. With our cutting-edge technology and proactive monitoring capabilities, we offer a wide range of services to mitigate digital risks and protect your valuable assets. ...
ThreatMon Demo - ThreatMon Cyber Threat Intelligence
ThreatMon proactively monitors the online presence of organizations in the deep/dark web in both manual and automated ways. We offer a wide range of Cyber Threat Intelligence services to protect your organization and brand by providing information about possible attacks with our latest technology...
ThreatMon Demo - Dark Web Intelligence
View the activities of threat actors on the dark web
ThreatMon Demo - ThreatMon Risk Card
The Cyber Risk Score evaluates an organization's security posture by analyzing vulnerabilities, external threats, and potential attack surfaces. It provides a quantifiable metric that helps organizations identify weaknesses, prioritize mitigation efforts, and strengthen their overall cybersecurit...

Official Downloads

Answer a few questions to help the ThreatMon community
Have you used ThreatMon before?
Yes

21 ThreatMon Reviews

4.9 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
21 ThreatMon Reviews
4.9 out of 5
21 ThreatMon Reviews
4.9 out of 5

ThreatMon Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for ThreatMonQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Verified User in Computer & Network Security
IC
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about ThreatMon?

ThreatMon provides reliable threat intelligence and its Deep/Dark Web Finding module is an effective tool to identify hidden threats and compromised data. Review collected by and hosted on G2.com.

What do you dislike about ThreatMon?

I would like to see more flexibility in reporting features to better meet our unique need. Review collected by and hosted on G2.com.

What problems is ThreatMon solving and how is that benefiting you?

ThreatMon helps us track cyber threats that target our brand, allowing us to respond swiftly. Review collected by and hosted on G2.com.

EP
Marketting Manager
Mid-Market(51-1000 emp.)
Validated Reviewer
Review source: Organic
What do you like best about ThreatMon?

The Fraud Intelligence module is outstanding, offering valuable insights and advanced detection capabilities that significantly enhance our ability to identify and mitigate fraudulent activities. Review collected by and hosted on G2.com.

What do you dislike about ThreatMon?

Report customisation may be good to better meet more specific needs. Review collected by and hosted on G2.com.

What problems is ThreatMon solving and how is that benefiting you?

It helps us constantly analyze external threats and stay updated on the latest vulnerabilities, ensuring better protection. Review collected by and hosted on G2.com.

Verified User in Higher Education
UH
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: Organic
What do you like best about ThreatMon?

Its real-time threat intelligence and continuous monitoring ensure we stay ahead of emerging cyber threats. The platform’s user-friendly interface and seamless integration with existing security tools streamline our cybersecurity operations. Review collected by and hosted on G2.com.

What do you dislike about ThreatMon?

One area where ThreatMon could further evolve is in expanding its integration capabilities with third-party platforms. While the current offerings are robust and effective, increasing interoperability with more tools and ecosystems could be really nice. Review collected by and hosted on G2.com.

What problems is ThreatMon solving and how is that benefiting you?

ThreatMon delivers real-time insights into emerging cyber threats, enabling organizations to proactively identify and mitigate potential risks before they impact operations. Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
AC
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about ThreatMon?

Its ease of use and up-to-date intelligence. Review collected by and hosted on G2.com.

What do you dislike about ThreatMon?

Nothing,there is nothing I don't like. Review collected by and hosted on G2.com.

What problems is ThreatMon solving and how is that benefiting you?

I use ThreatMon to detect threats, manage attack surfaces, monitor the Dark Web, facilitate security, and assist with compliance. Review collected by and hosted on G2.com.

AY
Advisor
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: Organic Review from User Profile
What do you like best about ThreatMon?

It provides comprehensive visibility and real-time insights into our digital footprint, helping us proactively manage vulnerabilities and threats. Review collected by and hosted on G2.com.

What do you dislike about ThreatMon?

Comprehensive product, it can initially be overwhelming to manage Review collected by and hosted on G2.com.

What problems is ThreatMon solving and how is that benefiting you?

Our Problem is difficult manage extensive number of assets but we can now efficiently monitor and secure all our assets with ThreatMon Review collected by and hosted on G2.com.

Verified User in Aviation & Aerospace
TA
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: Organic
What do you like best about ThreatMon?

ThreatMon’s constant monitoring of threats and notifying it very quickly allows us to

always be up to date at our cyber security posture. Review collected by and hosted on G2.com.

What do you dislike about ThreatMon?

I think Cyber Resilience Scorecard can be more user –friendly. Review collected by and hosted on G2.com.

What problems is ThreatMon solving and how is that benefiting you?

With ThreatMon, we can continuously monitor vulnerabilities and receive push

notifications, which improves our incident response. Review collected by and hosted on G2.com.

KY
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about ThreatMon?

I like that ThreatMon provides organizations with a comprehensive view of external threats. ThreatMon helps organizations to stay ahead of cyber threats by providing them with early warning and contextual insights into potential threats.

MSSP panel usage for ThreatMon allows managed security service providers to provide their customers with a comprehensive view of external threats. Review collected by and hosted on G2.com.

What do you dislike about ThreatMon?

I haven't discovered something that I dislike now. Review collected by and hosted on G2.com.

What problems is ThreatMon solving and how is that benefiting you?

ThreatMon is a cyber threat intelligence (CTI) platform that helps organizations to stay ahead of cyber threats. The platform uses a combination of cyber intelligence and attack surface discovery to deliver early warning and contextual insights into potential risks. ThreatMon is a cloud-based solution that can be accessed from anywhere, allowing organizations to stay ahead of threats and protect their assets.

ThreatMon solves several problems for organizations, including:

*Increased visibility: ThreatMon provides organizations with a comprehensive view of external threats, including information about the motivations and capabilities of threat actors, the severity of the threat, and the steps that can be taken to mitigate the risk. This increased visibility helps organizations make informed decisions about responding to threats.

*Early warning: ThreatMon uses various techniques to identify potential threats early on. This includes monitoring for indicators of compromise (IOCs), tracking threat actors' activities, and analyzing cyber activity trends. ThreatMon's early warning capabilities help organizations respond quickly and effectively.

*Contextual insights: ThreatMon provides contextual insights into potential threats. This includes information about the motivations and capabilities of threat actors, the severity of the danger, and the steps that can be taken to mitigate the risk. ThreatMon's contextual insights help organizations to make informed decisions about how to respond to threats. Review collected by and hosted on G2.com.

SY
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about ThreatMon?

Our institution, which has a voice in the world, has many outsourced services. It is very difficult to manage, monitor and control our outsourced services. Thanks to Threatmon, these activities are routinely carried out, the vulnerabilities of our systems are investigated, threats to our brand are detected and reported, and most importantly, it presents it to us in a user-friendly way. Review collected by and hosted on G2.com.

What do you dislike about ThreatMon?

I did not encounter any negative situation. Every job done so far has been at almost exactly the right rate. Sometimes similar but unrelated places can be detected only in the brand follow-up of the institution. They sort it out afterwards. Review collected by and hosted on G2.com.

What problems is ThreatMon solving and how is that benefiting you?

Because we have a large network and system structure, external threats can be difficult to manage. Personnel follow-up and maintenance may be insufficient in this case. Threatmon offers us both visibility and warning against all external threats. Review collected by and hosted on G2.com.

HK
System Administrator
Security and Investigations
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about ThreatMon?

It constantly analyzes and quickly reports to me the attack surfaces of our organization by external threats. With the cloud-based platform they provide, we can quickly access and track data. Review collected by and hosted on G2.com.

What do you dislike about ThreatMon?

I haven't seen a bad side at the moment, it just needs to be worked together for a while to verify the data related to the institution. The purpose of this is to prevent the occurrence of false-positive situations. Review collected by and hosted on G2.com.

What problems is ThreatMon solving and how is that benefiting you?

It allows us to constantly analyze our external threats. If we have a vulnerability in an unknown area and we experience a data leak, Threatmon will find it and let me know. If there are fake data or domains for similar practices or phishing attacks on my brand's reputation, it will also notify me. It gives me visibility in many situations like these. Review collected by and hosted on G2.com.

Verified User in Telecommunications
AT
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Organic
(Original )Information
What do you like best about ThreatMon?

I really like the platform broadened with digital risk protection and attack surface management. The platform is easy to use, install, and manage, and real-time dashboards with threat actors monitoring were perfect

Easy XDR and SIEM integrations and detecting vulnerabilities in our assets and getting notifications immediately via Vulnerability tracking was plus as well Review collected by and hosted on G2.com.

What do you dislike about ThreatMon?

I haven't discovered something that I dislike now, but POC and onboarding would be faster Review collected by and hosted on G2.com.

What problems is ThreatMon solving and how is that benefiting you?

with Threatmon gathering data about cyber threats, threat actors made easy and we were able to connect our XDR solutions to empower our analyst. we really like the asset tracking with comprehensive stats Review collected by and hosted on G2.com.