News

Threater & UbiStor Partner to Offer Proactive Network Security

12.07.2022
Colored Threater and UbiStor logos

Tysons, VA & Schaumburg, IL – November 30, 2022 –  Threater, a cybersecurity company that provides unmatched network edge defense, and UbiStor, a managed service provider (MSP) that specializes in data protection and disaster recovery, have announced a partnership to bring the Threater platform to UbiStor partners and their customers.

Keith Lukes, VP of Channel Solutions for UbiStor noted, “for the last 20 years, UbiStor has helped its customers prepare and recover from events. SafeStor™ Edge Protection powered by Threater adds a layer of prevention to our SafeStor™ portfolio of services making for a strong combination of proactive threat blocking and managed recovery.”

“The addition of Threater to our Data Protection and DR-as-a-Service offerings enhances our ability to protect our customers. In addition, we realized improvements to our own security profile firsthand when we implemented this technology. In the first two weeks of our use, Threater blocked over 3 million threats and lowered the CPU utilization on our firewalls from 65% to 2%, along with eliminating noise from our other security tools,” added Dan Hill, CEO for UbiStor.

As the threat landscape is constantly shifting and cybercriminals grow more sophisticated in their attacks, more and more companies are looking to MSPs to manage their cybersecurity needs. UbiStor found Threater’s autonomous active defense solution to be a natural fit not only for their clients but their own security stack as well, providing instantaneous protection from known threat actors. By leveraging threat intelligence from public and private feeds and blocking threats before they can access the network, UbiStor customers will benefit from unparalleled protection at scale.“UbiStor customers will immediately find value in Threater’s active defense technology,” said Brian McMahon, CEO of Threater.

“As a leader in data backup and disaster recovery, UbiStor understands the importance of protecting their customers’ data. Threater’s proactive security solution is easy to deploy, blocks known threat actors from ever reaching customers’ network assets, and fits seamlessly into any existing security stack. This is why we are an essential solution in any MSP’s security portfolio.”

Organizations are persistently facing issues with scalability due to record-breaking data growth, comprehensive network protection, and recovery times. Information must be kept secure and in line with compliance regulations and solutions must have the ability to scale quickly. UbiStor’s SafeStor™ Edge Protection powered by Threater offers a simple and affordable way to protect businesses from the ever-evolving threats to their critical data. Learn more about Threater’s partnership with UbiStor here.

About UbiStor

In an age where efficiency is key, utilizing a top-tier Managed Service Provider such as UbiStor can streamline workflows, mitigate risk, and offer improved flexibility. In today’s business landscape, your company must respond quickly to cyber threats, disasters, employee error and hardware failure. Outsourcing the management of your data protection and disaster recovery strategy can save your IT team countless hours, allowing them to focus on more business-critical initiatives and ensure you are protected when disaster strikes. Learn more at ubistor.com. Since 2001, UbiStor has been developing bulletproof data protection and disaster recovery strategies for their customers. With a consultative approach, UbiStor can cultivate strong relationships and perfectly constructed solutions for their customers, ensuring they are set up for success. Learn more at ubistor.com

About Threater

Threater is the only active defense cybersecurity platform that fully automates the enforcement, deployment, and analysis of cyber intelligence at a massive scale. As the foundational layer of an active defense strategy, Threater’s patented solution blocks known threats from ever reaching customers’ networks. Threater utilizes immense volumes of cyber intelligence from over 50 renowned security vendors to provide unparalleled visibility over the threat landscape resulting in a more efficient and effective security posture. Security teams at companies of all sizes use Threater to deploy active security, gain real-time network visibility into threats and policy violations, ensure their network is protected, and reduce manual work. Block. Every. Threat. at threater.com.