Audience

Companies with external facing web apps

About ThreatX

Block cyber threats in hours with SaaS, on-prem, or Docker native-cloud deployment in your private cloud or provider (AWS, Azure). IP fingerprinting, and application and attack profiling continually combine and correlate to identify, track and assess threat actors. Where other security solutions rely on signatures, static rules and single attacks, ThreatX builds a dynamic profile of every threat actor as they move through the threat lifecycle. ThreatX easily monitors bots and high-risk attackers to predict and prevent layer 7 application attacks, including the top OWASP and zero-day threats, and DDoS attacks.

Pricing

Free Trial:
Free Trial available.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

ThreatX
Founded: 2015
United States
threatx.com

Videos and Screen Captures

You Might Also Like
Business Continuity Solutions | ConnectWise BCDR Icon
Business Continuity Solutions | ConnectWise BCDR

Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.

Product Details

Platforms Supported
SaaS
On-Premises
Training
Documentation
Live Online
Webinars
In Person
Support
Phone Support
24/7 Live Support
Online

ThreatX Frequently Asked Questions

Q: What kinds of users and organization types does ThreatX work with?
Q: What languages does ThreatX support in their product?
Q: What kind of support options does ThreatX offer?
Q: What type of training does ThreatX provide?
Q: Does ThreatX offer a free trial?

ThreatX Product Features

Cloud Security

Application Security
Behavioral Analytics
Threat Intelligence
Vulnerability Management
Antivirus
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Two-Factor Authentication

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Vulnerability Scanning
Whitelisting / Blacklisting
Endpoint Management
IOC Verification
Incident Management
Tokenization

Network Security

Threat Response
VPN
Vulnerability Scanning
Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System