Threat Intelligence Collection
We incorporate 900+ threat feeds that are human & machine curated, delivering the broadest coverage in the industry of IP addresses and domains.
Custom Security Policies
Get 600+ fully customizable policies in selectable categories. Tailor your own custom block & allowlists.
Network Device Integrations
Automated policy updates for virtually any NGFW, DNS server, Router, Switch, IDP, WAF, SIEM and more.
Advanced Web-Based Reporting
View & analyze blocked threats. Identify affected client devices. Custom email reports & alerts.
Solutions by industry
Community colleges and universities are up against significant security challenges, including open environments and BYOD. Faculty, staff and students from all over the world converge on the same network storing sensitive data, all which must be protected to comply with HIPAA, FERPA and PCI.
Medical records are cyber's new goldmine. Not many industries can say that cybersecurity is a life-and-death issue, except for healthcare institutions. Equipment that we have come to rely on to diagnose critical illnesses and provide life support are now embedded with computers that can’t easily be modified.
Like every hosting company, Armor needs to protect their customers against botnets, phishing, zero-day and other advanced threats. They also need to provide the security that's required for customers with HIPAA, PCI and other compliance requirements.
Before becoming a ThreatSTOP customer, the global equipment manufacturer had every flashy security product implemented in their network - yet they were still constantly being attacked. With all systems showing zero gaps, and no unpatched areas, the manufacturer needed a solution that would prove effective in reality.
They had about 1,000 visitors (mostly students) use the library’s PCs and, with their laptops and mobile devices, their Wi-Fi network per day. These users were constantly getting infected, while the library was constantly blacklisted by the ISP and its Internet access blocked due to the large number of botted machines and active malware on the network.
For a small company with one location and remote contractors coming in through VPN, Phoenix Energy was reasonably protected, and it had not experienced any major breaches in recent years. But Carol Maffitt, Phoenix Energy’s CIO, wanted an extra layer of protection, for added peace of mind.
The ThreatSTOP platform is a SaaS security platform with modular product offerings for Protective DNS (PDNS), firewall automation, and other Threat Intel use cases. It integrates with physical, virtual, and hosted security stack components including firewalls, DNS servers, IDPS, SIEM and more. The platform automates threat intelligence acquisition, curation, and timely application for threat mitigation and visibility. Modules include:
Using continuous updates from 900+ Threat Intelligence sources, DNS Defense stops dangerous and unwanted DNS traffic before damage is done.
IP Defense sends automated policy updates to existing firewalls, routers and switches, and stops inbound attacks at network edges, before damage is done.
This takes the network DNS Defense Service and delivers it to individual endpoints, providing the same security even when these endpoints are outside the corporate network.
Check IOC is now available as a standalone subscription. We've made it easy to get your hands on tools that give you invaluable data, backed by one of the largest databases that we've been building for over a decade.
The ThreatSTOP Community Account is our way of saying thank you to the security community for everything they do. A Community Account entitles you to run ThreatSTOP on one IP device (firewall, router, etc.) and one DNS device. Community accounts are limited to pre-built policies that include core protections such as the DShield Blocklist and Emergency Handler Blocks.
- DNS Defense CE
- IP Defense CE
- MyDNS CE
- Check IoC Tool
Start a 30-day trial
We're allergic to security bull$#*!. In a noisy industry with high price tags, we bring a high quality, affordable and actionable threat intelligence platform to the table. Here's a quick (we promise) overview of who we are and how we make it all work.