It does what it says. It's a great first line of defense for blocking known threats using IP lists that you are subscribed to or created by you. Sometimes sites get added to lists by mistake blocking your legitimate traffic, but setting up your own list to whitelist is incredibly easy and changes take effect almost immediately. The reports were a great way for us to figure out where most of the malicious traffic targeting us comes from. The interface is easy to use and navigate. Probably one of the easiest initial setups we've had. Review collected by and hosted on G2.com.
When legitimate traffic is blocked the user only sees a page failed to load. We then use the logs to search from blocks coming from their IP to sometimes get the correct IP for whitelisting. This is usually only a problem because lists will sometimes add legitimate sites to their lists for what ever reason, so the root cause isn't threater's fault, but it would be nice if it gave the user more information when it was the source of blocking traffic as it isn't always the cause. Review collected by and hosted on G2.com.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through a business email account
This reviewer was offered a nominal incentive as thanks for completing this review.
Invitation from G2 on behalf of a seller or affiliate. This reviewer was offered a nominal incentive as thanks for completing this review.




