threatER Collect

One free centralized SaaS solution to aggregate all of your threat intelligence

Video Thumbnail

Why Collect?

Gain a better understanding of the risks facing your organization

Unique Cloud Attackers List

Access to best-in-class cyber intelligence feeds and threat lists

Access to Open Source Data

Compile and utilize up-to-the-minute intelligence for all your tools and technologies.

Export Lists to your Firewall

Feed your firewall the intelligence it needs

Additional Features

One central place to manage your cyber intelligence, including your own lists, feeds, and intelligence sources.

Graphic showing an admin area

Leverage all your managed cyber intelligence by integrating your lists into other security tools and technologies.

Graphic showing a dropdown for a threat blocker

Easily create lists within the Collect platform to manage your organization’s cyber intelligence.

Graphic showing creating a list

Integrate your tools and technologies into the Collect platform to give them an unparalleled, up-to-the-minute view of the threat landscape

Graphic showing an external IP block list

Leverage best-in-class cyber intelligence to automatically block known threats at the line speed when you upgrade to Enforce.

Graphic comparing threatER Collect and Enforce

One central place to manage your cyber intelligence, including your own lists, feeds, and intelligence sources.

Graphic showing an admin area

Leverage all your managed cyber intelligence by integrating your lists into other security tools and technologies.

Graphic showing a dropdown for a threat blocker

Easily create lists within the Collect platform to manage your organization’s cyber intelligence.

Graphic showing creating a list

Integrate your tools and technologies into the Collect platform to give them an unparalleled, up-to-the-minute view of the threat landscape

Graphic showing an external IP block list

Leverage best-in-class cyber intelligence to automatically block known threats at the line speed when you upgrade to Enforce.

Graphic comparing threatER Collect and Enforce
threatER Cyber Intelligence Sources

Don’t rely on one vendor’s view of the threat landscape for your cyber intelligence

  1. Source on near-unlimited cyber intelligence data by focusing on known threat actors

  2. Aggregate cyber intelligence from the entire community, including government agencies, open source organizations,
and private companies dedicated to gathering, analyzing,
and disseminating information about cyber threats, vulnerabilities, and activities.

Upgrade to Enforce

Free Data Sources with Enforce Subscription

Webroot

Millions of well-vetted malicious indicators of compromise (IOCs)

DomainTools

Millions of malicious domains and associated IP addresses

Greynoise

Known-good data (including Akamai, Amazon Cloudfront, Cisco Webex, Cloudflare, and more)

Utilize the threatER Marketplace

With one click, you can add cyber intelligence feeds and Enforce them in your network

Graphic with various cyber services spelled out

Cyber Services

Learn how threatER can help manage and resolve threats in your network.

Graphic with various cyber sources

Cyber Sources

Add more cyber intelligence feeds and lists to your intelligence platform, including industry-specific subscriptions.

Looking for more?

Think of something that should be added to our Collect subscription? Let us know here!