ThreatSTOP Benefits

Icon Lock
"Calls Home" to Command and Control Computers Blocked
  • Prevents outbound connections with command and control hosts.
  • Blocks traffic based on the destination of outbound traffic, regardless of protocol, application or content.
Prevents Zero-day Attacks
  • Once ThreatSTOP detects and confirms that a new IP is acting badly and warrants blocking, it is sent to your firewall in the next update cycle, offering immediate protection for your network.
Improve Network Performance and Reduce Bandwidth Utilization
  • For every incoming packet, a firewall using the ThreatSTOP service looks at only the source address, which means that using ThreatSTOP requires less than 10% of the data required by deep packet inspection to make a decision, creating greater efficiency and capacity savings.
"Make Your Network Disappear", Reduce Spam and Risk of Attack
  • Incoming packets from a bad IP address are rejected immediately, without even acknowledging the first syn packet. This in effect tells the sender that "there is no one here" or "this is the wrong address", allowing your network to effectively "disappear" from the Internet from the cybercriminals' perspective, and they will move on.
Prevent Data Exfiltration and Ensure Compliance
  • Since our default mode is to block the suspected traffic first, and provide you with log data to enable remediation of the breached machines, each failed attempt to breach is not a reportable event under the various compliance regimes.