threatER Features
Orchestration (4)
Asset Management
Lets users group and organize their endpoints to gather threat intelligence on specific technologies.
Security Workflow Automation
Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.
Deployment
The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.
Sandboxing
A feature that allows security testing and information gathering to occur in a secure, resource independent environment.
Information (3)
Proactive Alerts
Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Intelligence Reports
The ability for users to produce reports outlining detailed and personalized threat information
Personalization (3)
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Security Validation
The product has a recurring examination process to update your intelligence reports as new threats emerge.
Dynamic/Code Analysis
The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.
Security - Unified Threat Management (6)
Antivirus
Tools to protect a system from viruses by scanning and quarantining any threats.
Whitelists
The ability to green light a specific URL or system to bypass the scanning process.
Antispam Filtering
Tools to prevent spam emails and other spam from entering the network.
Content Filtering
Tools to filter specific content based on the MME type or file extension.
Web Filtering
Tools to block certain websites from being viewed by those in a network.
Firewall
Tools to block off a network or system from outside networks or systems to protect the data within.
Administration (10)
Reports & Analytics
The ability to digest a large amount of data into visual representations and analytics.
Dashboard
The ability to view a large amount of data in one place using customizable widgets.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Administration Console -
As reported in 13 threatER reviews.
Provides a centralized console for administation tasks and unified control.
API / integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Whitelisting
The ability to green light a specific Domain or system to bypass the scanning process.
Policy Enforcement
Abilities to set DNS protection policy control standards including whitelisting, blacklisting, and application access.
Incident Reports
Produces reports detailing suspicious activity and anomalies related to networks and endpoints.
Domain Categorization
Allows administrators to group users and devices based on IP, Endpoint, or role.
Multi-Network Management
Allows centralized administration and control of DNS protection and policies across multiple networks.
Data (3)
Data Protection
Enable users to protect their data from potential outside attacks.
Remote Access
Allow users to control access to their information from a central point.
Network Access
Allow users to implement policies for controlling access to their business's infrastructure.
Network (3)
Security
Secure access to your network for both guests and internal users
Scaling
Scale network visibility to whatever your businesss requires.
Audit
Audit your network's assets.
Logistics (3)
Processes
Enable users to implement various processes.
Blockage
Ability to block unwanted outside access.
IoT
Track all IoT assets.
Prevention (5)
Intrusion Prevention
As reported in 12 threatER reviews.
Enforces security paramaters to prevent unauthorized access.
Firewall
This feature was mentioned in 10 threatER reviews.
Protects servers, data center infrastructure and information from a variety of attacks and malware threats.
Encryption
Provide some level of encryption of information, protecting sensitive data while it exists within the data center.
Security hardening
Facilitates system and network security by identifying and remediating vulnerabilities
Cloud Data Protection
Provides high quality and wide scope of in-cloud and offline data security capabilities.
Detection (3)
Intrusion Detection
Detects unauthorized access and use of privileged systems.
Security Monitoring
As reported in 11 threatER reviews.
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Anti-Malware / Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Network Management (4)
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security (4)
Security Automation
Allows administrative control over automated security tasks.
Application Security
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Identity Management (3)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Protection (6)
Quarantine
Blocks malicious website or destination, redirecting the user to a secure page
Continuous Monitoring
Monitors 24/7 to detect anomalies in functionality, user accessibility, traffic flows, and tampering.
Off-Network Protection
Supports agent-based DNS protection with individual endpoint devices on any network.
Guest Network Protection
Allows DNS filtering and protection for guest WiFi networks.
BYOD Protection
Supports bring-your-own-device (BYOD) users, supporting DNS protection across any device connected to a network or equipped with an agent.
Native DNS over HTTPS (DoH)
“DoH” is a protocol that facilitates DNS resolution via HTTPS. Native DoH functionality facilitates DNS over DoH using local agents to manage DNS requests, extending DoH beyond a single browser or network.
Functionality (3)
DNS Lookups
Associate information from various domains to identify associated parties and threats.
Threat Intelligence
Develops domain reputation by gathering contextual information related to web-based threats.
Advanced Traffic Filtering
Allows DNS routing to resolve requests across HTTP or HTTPs requests and/or covers IPv4 and IPv6 protocols.
Generative AI (7)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
Generate Attack Scenarios
Use AI to propose possible threat actor tactics, techniques, and procedures against specific environments or assets.
Generate Threat Detection Rules
Use AI to automatically create detection rules based on observed patterns.
Generate Threat Summaries
Use AI to produce concise summaries of complex threat reports or alerts.
Agentic AI - Threat Intelligence (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Intrusion Detection and Prevention Systems (IDPS) (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting




