Threater Now Runs More Efficiently and Across a Wider Range of Deployment Options, Allowing Managed Service Providers and MSSPs To Deploy Into Their Existing Security Stacks
TYSONS, VA / ACCESSWIRE / May 12, 2022 / Today, Threater announced that the latest update to their active defense cybersecurity platform reduces resource requirements and enables easy deployment in nearly any scenario. The product update reduces system resources for improved system efficiency and increases the ability to deploy Threater Edge software in the cloud, virtually or on-premise. With this update, managed service providers and managed security service providers can easily incorporate Threater into their existing security stacks via virtual and cloud environments as well as on already-deployed hardware.
System resource reduction impacts users by improving efficiency on all systems, whether on-premise or in the cloud. Reduced requirements also means significantly lower end-customer cost. It also simplifies the ability for customers to deploy the way they want to, which is important today given how the ongoing COVID-19 pandemic has disrupted global supply chains.
Pat McGarry on Near-Universal Deployment of Defense Platform
“We strive to make our active defense platform both secure and efficient, as we enable our customers to automatically block known threats at unparalleled scale before they even reach networks,” said Pat McGarry, Chief Technology Officer of Threater. “We’re not just creating a product that functions well, but also one that users find easy to use and can easily deploy anywhere. We always put the needs of our customers first, and we strive to make sure that by deploying Threater, our customers receive the most cost-effective and performant security solution on the planet.”
The Threater platform leverages cyber intelligence from over 50 renowned security vendors, with the goal of blocking every threat from every inbound and outbound path in a network. Within minutes, the patented platform seamlessly integrates into their customers’ existing cyber defense security stacks, providing instant protection, eliminating malicious traffic without adversely impacting network performance. Threater provides a level of unparalleled, instant network protection without requiring users to drastically re-engineer their existing security stacks. To learn more, or to receive a free threat risk assessment to quickly identify how Threater can augment your existing security stack, visit Threater.com.
About Threater
Threater is the only active defense cybersecurity platform that fully automates the enforcement, deployment and analysis of cyber intelligence at a massive scale. As the foundational layer of an active defense strategy, Threater’s patented solution blocks known threats from ever reaching customers’ networks. Threater utilizes immense volumes of cyber intelligence from over 50 renowned security vendors to provide unparalleled visibility over the threat landscape resulting in a more efficient and effective security posture. Security teams at companies of all sizes use Threater to deploy active security, gain real-time network visibility into threats and policy violations, ensure their network is protected and reduce manual work. Block. Every. Threat. at threater.com.