Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated ThreatX Alternatives

ThreatX Reviews & Product Details

TM
Senior Systems Engineer I
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about ThreatX?

Other solutions rely on threat signatures where ThreatX continues to learn and is effective at stopping malicious traffic as well as bots. Review collected by and hosted on G2.com.

What do you dislike about ThreatX?

Switching between pages you can lose your settings, such as which site you are working on, however, the portal is constantly evolving and ThreatX listens to your feedback. Review collected by and hosted on G2.com.

What problems is ThreatX solving and how is that benefiting you?

ThreatX is helping us to block traffic where the same attacker can be identified from a signature in the traffic, but they are switching through thousands of IP addresses and changing things up. Using a signature, ThreatX allows us to create rules to stop this traffic. Review collected by and hosted on G2.com.

ThreatX Overview

What is ThreatX?

ThreatX is managed API and application protection that lets you secure them with confidence, not complexity. It blocks botnets and advanced attacks in real time, letting enterprises keep attackers at bay without lifting a finger. Trusted by leaders like BMC Software, Epsilon and Reltio, ThreatX profiles attackers and blocks advanced risks to protect APIs and applications 24/7.

ThreatX Details
Languages Supported
English
Show LessShow More
Product Description

ThreatX’s API protection platform and managed services makes the world safer by protecting APIs from all threats, including DDoS attempts, BOT attacks, API abuse, exploitations of known vulnerabilities, and zero-day attacks. Its multi-layered detection capabilities accurately identify malicious actors and dynamically initiate appropriate action. ThreatX applies a combination of artificial intelligence and machine learning to detect even the slightest indicators of suspicious activity. Unlike post-attack API anomaly detection tools that require offline data analysis, ThreatX builds risk profiles of attackers over time, enabling it to identify and stop even the most complex threats in real-time.

How do you position yourself against your competitors?

Risk-based blocking in real time.

Signature-based approaches are no match for today’s multi-vector, long-play attacks. Profiling attackers is the only way to stay ahead of advanced threats. ThreatX keeps your business running smoothly by tracking what attackers are up to and blocking them before they pounce.


Seller Details
Seller
ThreatX
Year Founded
2014
HQ Location
Boston, Massachusetts
Twitter
@threatx_inc
955 Twitter followers
LinkedIn® Page
www.linkedin.com
66 employees on LinkedIn®

ND
Overview Provided by:

Recent ThreatX Reviews

BB
Brad B.Enterprise (> 1000 emp.)
4.0 out of 5
"ThreatX provides advances protection and insight into APIs."
The 24/7 SOC support and the risk based blocking. Also, the insites from the portal provide good detail for reviewing malicious versus legitimate use.
Verified User
U
Verified UserEnterprise (> 1000 emp.)
4.0 out of 5
"Fits the sweet spot for organizations looking for a low maintenace IWAF"
* Set and forget capability, for the most part. I don't have a large team and can't spend time babysitting a product. * Rules can be customized, ...
TM
Thomas M.Small-Business (50 or fewer emp.)
4.5 out of 5
"ThreatX is advanced cyber threat protection to compliment your existing security features"
Other solutions rely on threat signatures where ThreatX continues to learn and is effective at stopping malicious traffic as well as bots.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

ThreatX Media

ThreatX Demo - ThreatX Attack Dashboard - Threat Entities
A 12 hour view of total and blocked traffic requests. The Threat Entities table highlights the riskiest entities across your APIs and web applications, correlating data so you can understand severity of threats as well as what they're targeting.
Answer a few questions to help the ThreatX community
Have you used ThreatX before?
Yes

4 out of 5 Total Reviews for ThreatX

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
4 out of 5 Total Reviews for ThreatX
4.5 out of 5
4 out of 5 Total Reviews for ThreatX
4.5 out of 5
G2 reviews are authentic and verified.
Verified User in Wholesale
UW
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about ThreatX?

* Set and forget capability, for the most part. I don't have a large team and can't spend time babysitting a product.

* Rules can be customized, for the most part.

* Can be deployed within a container or hosted for you.

* Been using it for six months, and no security events have been encountered.

* Customer service responded to tickets/emails extremely fast.

* While probably not forever, bad actors generally have not heard of ThreatX and thus have no knowledge of how to get around it. Review collected by and hosted on G2.com.

What do you dislike about ThreatX?

* Some rules that need customization require customer support intervention. Afterward, you can't manage or sometimes even see what they've changed. There is a way to see them via SSH.

* Dashboard evolution is still in progress.

* Email notification setups aren't very granular in capabilities.

* No visible web logs, at least on the web management tool. I believe limited web logs are downloadable via SSH, but that's too complicated to accomplish regularly without good reason.

* Product is still young, and while it has excellent performance, some of the more granular capabilities of other WAF's aren't yet available in ThreatX. Review collected by and hosted on G2.com.

What problems is ThreatX solving and how is that benefiting you?

ThreatX is addressing our need for an Intelligent Web Application Firewall. We did not want to purchase a physical device and wanted an affordable cloud solution. Review collected by and hosted on G2.com.

BB
Head of Product Security
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about ThreatX?

The 24/7 SOC support and the risk based blocking. Also, the insites from the portal provide good detail for reviewing malicious versus legitimate use. Review collected by and hosted on G2.com.

What do you dislike about ThreatX?

The ThreatX portal could use some enhancements. For example, it would be ideal to white list IPs by site and not globally. This cannot be done in the portal but the SOC can do it if asked. Review collected by and hosted on G2.com.

What problems is ThreatX solving and how is that benefiting you?

ThreatX solves several problems including ones we didn't know we had previously. The risked based blocking was the most important feature. However, the insights provided by ThreatX has revealed how legitimate users are abusing our APIs. Review collected by and hosted on G2.com.

LA
Security Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about ThreatX?

Malicious Threats identified and blocked.

Very good support. Review collected by and hosted on G2.com.

What do you dislike about ThreatX?

Nothing for the moment.

Everything is working as expected Review collected by and hosted on G2.com.

What problems is ThreatX solving and how is that benefiting you?

Protect our websites against potentially malicious attack and exploit Review collected by and hosted on G2.com.

Terence R.
TR
Board Member
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about ThreatX?

The dedicated Security Operation Center. Support responsiveness. Peace of mind. Review collected by and hosted on G2.com.

What do you dislike about ThreatX?

N/A. This is not applicable. NA Not applicable. Review collected by and hosted on G2.com.

What problems is ThreatX solving and how is that benefiting you?

Web application security and API security. Visibility. Metrics. Review collected by and hosted on G2.com.