Why Allowlisting is Critical for Network Security

An Ongoing Blog Series Highlighting Threater’s Best-In-Class Threat Intelligence
This morning, we were alerted that IP addresses for Google and Microsoft were added to one of our Threat Lists. With any threat intelligence data, there is the occasional risk of false positives. This is even truer when you use threat intelligence at the scale we do at Threater.
While using threat intelligence at scale to block bad traffic is a key component of our value proposition, an equally important component is our ability to make it easy to allow known good traffic at scale. To that end, over the last several months, we’ve significantly expanded our “out of the box” Automated Allowed Lists. The lists allow you to easily allow known good traffic from sources like Google, Microsoft, DocuSign, and Zoom to name a few.
Today’s events provide a great illustration of the significant value our Automated Allowed Lists provide. Like all of our threat intel sources, Allowed Lists are automatically updated by Threater. making it easy to manage your security posture.
For Threater customers, Automated Allowed Lists can be easily enabled via Allowed Lists in our cloud-based management portal. Here is how:
To learn more about the significant value provided by our Allowed Lists check out our recent blog: Automated Allowed Lists: Allowing the Trusted, While Blocking the Bad.
Stay Tuned!
In our coming blogs, we will highlight more of our TIP integrations and partners.
As always: