ThreatSTOP
Cloud-based threat intelligence platform automating security policy updates

ThreatSTOP
Cloud-based threat intelligence platform automating security policy updates
450+ Data Points Per Product and Company
Track competitive landscapes, evaluate vendor risk for investments, or find the right security stack for your clients.
ThreatSTOP Description
ThreatSTOP is a cloud-based automated threat intelligence platform founded in 2009 that converts threat data into enforcement policies and automatically updates network security devices. The platform addresses protection gaps for both inbound and outbound network traffic by integrating with firewalls, routers, DNS servers, and endpoints to block malicious connections before they result in breaches. The company maintains a comprehensive database of IP addresses, domains, and network infrastructure used in cyberattacks. Their security team curates threat information from more than 50 public and proprietary sources including trust groups and law enforcement, dynamically updating policies as the threat landscape evolves. The platform automates the process of converting threat intelligence feeds into machine-readable enforcement policies and deploying them to network devices. ThreatSTOP offers DNS Defense as a protective DNS solution alongside their threat intelligence platform. The company was created to provide organizations of any size with enterprise-grade cybersecurity protection, particularly targeting companies with limited IT and security staffing resources. Their approach focuses on automation to reduce the manual effort required to maintain current threat defenses across network infrastructure. The company's Chief Scientist is Paul Mockapetris, inventor of the Domain Name System (DNS). The security research team has over 120 years of combined experience and has contributed to identifying business email compromise schemes and participating in botnet takedown efforts including Kelihos and Fluxxy.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox