Audience

IT Professionals

About ThreatARMOR

Next-gen firewalls are great at DPI and threat detection, but they are not optimized for blocking malicious, hijacked, and untrusted IP addresses at massive scale. Even if they can import a threat intelligence feed, trying to block the tens of millions of IP addresses in a threat database isn't possible without significant latency and performance impact. ThreatARMOR complements next-gen firewalls by offloading massive-scale blocking so that they can allocate more resources to content inspection, user policies, VPN termination, and other features while generating fewer security alerts.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Keysight Technologies
Founded: 1997
United States
www.keysight.com/mx/en/products/network-security/breach-defense/threat-armor.html

Videos and Screen Captures

Other Useful Business Software
MongoDB Atlas runs apps anywhere Icon
MongoDB Atlas runs apps anywhere

Deploy in 115+ regions with the modern database for every enterprise.

MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free

Product Details

Training
Documentation
Support
Phone Support

ThreatARMOR Frequently Asked Questions

Q: What kinds of users and organization types does ThreatARMOR work with?
Q: What languages does ThreatARMOR support in their product?
Q: What kind of support options does ThreatARMOR offer?
Q: What type of training does ThreatARMOR provide?

ThreatARMOR Product Features

Web Content Filtering

Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting