- About Us
- Security Center
Using ThreatSTOP, we were able to set and enforce custom policies and immediately begin blocking unwanted traffic—spam and DDoS attacks—with little or no false positives. This also eliminated threat actors’ attempts to gather information via scanning. Overall network traffic was reduced by 25 percent, which freed up our other security devices to work on more elusive threats. In addition, ThreatSTOP helped us to control threats brought onto the network via BYOD devices.
- Todd Wolfe Site Director, Meta Solutions--Athens