ThreatX Overview

ThreatX is a cybersecurity software solution designed to provide real-time threat detection, protection, and incident response. With its advanced AI-driven algorithms, ThreatX identifies potential risks, mitigates cyberattacks, and protects sensitive data against intrusions. The software continuously monitors network traffic, ensuring rapid response to emerging threats. ThreatX’s detailed reporting provides insights into security vulnerabilities, helping businesses strengthen their defenses. Ideal for organizations needing robust cybersecurity measures, ThreatX delivers a comprehensive solution for safeguarding digital assets and maintaining data integrity.

Read More

ThreatX Screenshot & Video

Contact Details

  • Vendor Name ThreatX
  • Founded 2015
  • Location United States

Support

  • 24x7 Support 24x7 Support
  • Chat Chat

Training

  • In-person In-person
  • Live Online Live Online
  • Webinar Webinar
  • Documentation Documentation

Licensing & Deployment

  • Proprietary Proprietary
  • Cloud Hosted Cloud Hosted
  • Web-Based Web-Based

Typical Customers

  • Self-Employed Self-Employed
  • Small-Business Small-Business
  • Midsize-Business Midsize-Business

Languages Supported

English


Industries

Computer & Network Security, Computer Software, Financial Services, Information Technology & Services

You May Also Like

Acunetix

Acunetix

Contact Vendor

Cloudflare WAF

Cloudflare WAF

Contact Vendor

LifeLock

LifeLock

Contact Vendor

Malwarebytes for Business

Malwarebytes for Business

Contact Vendor

ThreatX Features

  • Arrow Icon Whitelisting/Blacklisting
  • Arrow Icon Compliance Management
  • Arrow Icon Policy Management
  • Arrow Icon Audit Trail
  • Arrow Icon Real Time Reporting
  • Arrow Icon Single Sign On
  • Arrow Icon Secure Data Storage
  • Arrow Icon Behavior Tracking
  • Arrow Icon Incident Management
  • Arrow Icon Activity Tracking
  • Arrow Icon SSL Security
  • Arrow Icon Patch Management
  • Arrow Icon Endpoint Protection
  • Arrow Icon Risk Alerts
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Security Auditing
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Event Logs
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Server Monitoring
  • Arrow Icon Anti Virus
  • Arrow Icon Authentication
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Two-Factor Authentication
  • Arrow Icon Threat Response
  • Arrow Icon Data Security
  • Arrow Icon Firewalls
  • Arrow Icon Threat Intelligence
  • Arrow Icon Dashboard
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Fraud Detection
  • Arrow Icon AI/Machine Learning
  • Arrow Icon Anomaly/Malware Detection
  • Arrow Icon Event Logs
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Real-time Alerts
  • Arrow Icon Threat Intelligence
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Vulnerability Protection
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Compliance Management
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon Incident Management
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Endpoint Management
  • Arrow Icon Cloud Encryption
  • Arrow Icon Web Traffic Monitoring
  • Arrow Icon IT Incident Management
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Server Monitoring
  • Arrow Icon Threat Intelligence
  • Arrow Icon Dashboard
  • Arrow Icon Policy Management
  • Arrow Icon Third-Party Integrations
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Network Monitoring
  • Arrow Icon Hardware Integration
  • Arrow Icon Intrusion Prevention System
  • Arrow Icon VPN
  • Arrow Icon Policy Management
  • Arrow Icon Log Access
  • Arrow Icon Access Management
  • Arrow Icon Next-Generation Firewall
  • Arrow Icon AI/Machine Learning
  • Arrow Icon Content Filtering
  • Arrow Icon Intrusion Detection System
  • Arrow Icon Policy Management
  • Arrow Icon Threat Response
  • Arrow Icon Event Logs
  • Arrow Icon VPN
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Activity Monitoring
  • Arrow Icon Audit Trail
  • Arrow Icon Patch Management
  • Arrow Icon Compliance Management
  • Arrow Icon Firewalls
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon Risk Alerts
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Intrusion Detection System
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Anti Virus

ThreatX Pricing

Pricing Type

  • Pricing Type Per User

Preferred Currency

  • USD ($) USD ($)

Free Trial

  • Free Trial Available

Free Version

  • NA

Payment Frequency

  • Annual Subscription Annual Subscription

Plans & Packages

Basic

$60000 Per User

ThreatX FAQs

ThreatX is a cybersecurity software solution designed to provide real-time threat detection, protection, and incident response. With its advanced AI-driven algorithms, ThreatX identifies potential risks, mitigates cyberattacks, and protects sensitive data against intrusions. The software continuously monitors network traffic, ensuring rapid response to emerging threats. ThreatX’s detailed reporting provides insights into security vulnerabilities, helping businesses strengthen their defenses. Ideal for organizations needing robust cybersecurity measures, ThreatX delivers a comprehensive solution for safeguarding digital assets and maintaining data integrity.

  • No, ThreatX does not offer a free version.

  • Yes, ThreatX offers a free trial.

  • No, Credit Card details are not required for the ThreatX trial.

  • ThreatX offers the following pricing plans & packages:

    Basic

    $60000 Per User

  • ThreatX supports the following payment frequencies:

    • Annual Subscription

  • No, ThreatX does not offer an API.

  • ThreatX offers support with the following options:
    • 24x7 Support , Chat

  • ThreatX offers training with the following options:
    • In-person , Live Online , Webinar , Documentation

  • ThreatX supports the following languages:
    • English

  • Following are the typical users of the ThreatX:
    • Self-Employed , Small-Business , Midsize-Business

  • ThreatX supports the following deployment:
    • Cloud Hosted

  • ThreatX supports the following devices and operating systems:
    • Web-Based