Logo of Threater

Threater

Website LinkedIn

Last updated on

Ratings

G2
4.8/5
(26)

Threater description

Threater is a cybersecurity platform designed for businesses of all sizes. It offers a range of solutions focused on threat intelligence, network access control, and intrusion detection and prevention. Threater aims to proactively block known cyber threats, allowing your existing security tools to work more efficiently. It boasts a large number of integrations with popular security products and provides insights into threats blocked on your network.


Who is Threater best for

Threater is a cybersecurity platform ideal for mid-sized businesses seeking proactive threat intelligence and network access control. Users praise its ease of use, real-time blocking, and excellent customer support. However, some find the separate management of domain and IP whitelists tedious. Threater integrates seamlessly with existing security tools, boosting overall cybersecurity posture.

  • Best fit for medium-sized businesses.

  • Suitable for various industries seeking enhanced cybersecurity.


Threater features

Type in the name of the feature or in your own words tell us what you need
Supported

Threater Collect aggregates threat intelligence in the cloud from various sources, including a proprietary Cloud Attackers dataset.

Supported

Threater Enforce blocks known threat actors by leveraging aggregated cyber intelligence data, preventing their entry and exit from your network.

Supported

Threater Enforce offers threat source attribution on every network connection, giving insights into blocked threats.

Supported

Threater Marketplace facilitates the acquisition and deployment of various third-party cyber intelligence and threat services.

Supported

Threater has 50+ integrations with popular apps and common connectors, allowing for data sharing across your security stack.

Supported

Threater offers rapid analysis of security logs to demonstrate the effectiveness of its threat blocking capabilities.

Qualities

We evaluate the sentiment that users express about non-functional aspects of the software

Customer Service

Strongly positive
+1

Ease of Use

Strongly positive
+1

Reliability and Performance

Strongly positive
+1

Threater reviews

We've summarised 26 Threater reviews (Threater G2 reviews) and summarised the main points below.

Pros of Threater
  • Easy to deploy, manage, and upgrade.
  • Real-time blocking and logging.
  • Excellent customer support.
  • Comprehensive threat intelligence feeds and integrations.
  • Effective geo-blocking and ASN control.
Cons of Threater
  • Lack of a splash page when a site is restricted.
  • Limited logging storage, requiring external export.
  • Domain and IP whitelists must be managed separately.
  • Tedious to adjust multiple threat thresholds simultaneously.
  • No on-demand reporting, only scheduled reports.

Threater alternatives

  • Logo of ThreatWarrior
    ThreatWarrior
    Better fit for smaller companies. Focuses on real-time threat detection and response. A Threater alternative and competitor, but has less momentum.
    Read more
  • Logo of ThreatConnect Threat Intelligence Ops Platform
    ThreatConnect Threat Intelligence Ops Platform
    Better for larger organizations. Focuses on threat intelligence operations and ROI justification. Has growing momentum.
    Read more
  • Logo of ThreatLocker
    ThreatLocker
    Better for IT and software companies. A strong ThreatLocker alternative for those seeking application control and allowlisting. Known for excellent customer support.
    Read more
  • Logo of Microsoft Defender for Cloud
    Microsoft Defender for Cloud
    Better suited for larger enterprises and organizations using diverse cloud platforms like AWS and GCP. Broader security coverage including cloud infrastructure scanning, posture management, and workload protection. However, it has a more complex pricing structure and can be challenging to set up initially.
    Read more
  • Logo of UnderDefense MAXI
    UnderDefense MAXI
    Better suited for smaller or mid-sized businesses. Offers 24/7 threat detection, response, and compliance automation. Provides access to security experts.
    Read more
  • Logo of Cisco Umbrella
    Cisco Umbrella
    Better for finance, banking, insurance, ecommerce, consumer goods, and professional services. More widely adopted, with more reviews. Easier to use, but has some reported reliability issues and negative pricing sentiment. A strong Cisco Umbrella competitor.
    Read more

Threater FAQ

  • What is Threater and what does Threater do?

    Threater is a cybersecurity platform offering threat intelligence, network access control, and intrusion detection and prevention. It proactively blocks cyber threats, integrates with popular security products, and provides insights into blocked threats. It's praised for ease of use, real-time blocking, and excellent customer support.

  • How does Threater integrate with other tools?

    Threater integrates with existing security tools and incorporates threat intelligence from multiple sources, including a proprietary Cloud Attackers dataset and open-source IOCs. This enhances threat detection and blocking capabilities.

  • What the main competitors of Threater?

    Top alternatives to Threater include ThreatWarrior, ThreatLocker, and Cisco Umbrella. These cybersecurity platforms offer similar functionalities such as threat intelligence, network access control, and intrusion detection and prevention, catering to businesses seeking enhanced online security.

  • Is Threater legit?

    Threater appears to be a legitimate cybersecurity platform. User reviews praise its ease of use, effective threat blocking, and excellent customer support. However, potential users should be aware of limitations regarding logging storage and whitelist management.

  • How much does Threater cost?

    Threater's pricing is not publicly available. Contact Threater directly to determine if the product and its potential value align with your budget.

  • Is Threater customer service good?

    Customers consistently praise Threater's responsive and knowledgeable support team. They appreciate the helpfulness and quick resolution of issues. While some users mention initial responses lacking detail, the overall sentiment towards customer service is positive.


Reviewed by

MK
Michal Kaczor
CEO at Gralio

Michal has worked at startups for many years and writes about topics relating to software selection and IT management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs of any business and find solutions to its problems.

TT
Tymon Terlikiewicz
CTO at Gralio

Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX, HR, Payroll, Marketing automation and various developer tools.