Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Criminal IP Reviews & Ratings
    12 Ratings
    Company Website
  • SpamTitan Reviews & Ratings
    813 Ratings
    Company Website
  • Adaptive Security Reviews & Ratings
    33 Ratings
    Company Website
  • Cisco Umbrella Reviews & Ratings
    1,177 Ratings
    Company Website
  • Control D Reviews & Ratings
    180 Ratings
    Company Website
  • NINJIO Reviews & Ratings
    390 Ratings
    Company Website
  • EasyDMARC Reviews & Ratings
    149 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    374 Ratings
    Company Website
  • Wiz Reviews & Ratings
    1,052 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,052 Ratings
    Company Website

What is Threat Meter?

Continuously assess and enhance the cyberhealth of your entire ecosystem with vigilance. Threat Meter offers a comprehensive external perspective on the security health of your IT infrastructure. It provides insights into how your security measures stack up against various risk categories, depending on the monitoring frequency you select. By utilizing this tool, you can uncover and mitigate external threats by identifying exploitable vulnerabilities, compliance shortcomings, misconfigurations, and open ports among other risks. Furthermore, it enables you to detect and flag impersonating domains, social media accounts, and mobile applications, allowing you to neutralize threats before they can affect your customers or staff. Additionally, you can keep a watchful eye on the surface, dark, and deep web and monitor for any exposed data across online storage solutions, criminal forums, and code repositories. This robust tool ensures you are well-informed about the evolving landscape of phishing threats, helping you locate and eliminate typo-squatting domains and phishing websites effectively. By leveraging Threat Meter, organizations can maintain a proactive stance against potential cyber threats in an ever-changing digital world.

What is Holm Security?

Identify vulnerabilities across your entire attack surface, which includes both technical elements and human resources, all seamlessly integrated within a unified platform. With a single, cohesive risk model and workflow, you can proactively address emerging threats while safeguarding your entire infrastructure, which encompasses cloud services, operational technology, and remote personnel. Our all-encompassing platform offers unparalleled visibility and insight into every asset within your organization, effectively managing both local and public systems, as well as computers, cloud infrastructure, networks, web applications, APIs, and your most valuable asset—your users. By achieving comprehensive awareness and actionable intelligence concerning your most critical misconfigurations, you empower your teams to continuously and proactively enhance your cloud security posture. Ensuring least-privilege access for all cloud workloads, data, and applications allows you to notably reduce risks to your organization. This integrated strategy not only strengthens your security defenses but also promotes a culture of security mindfulness among employees, ultimately creating a more resilient organization. By prioritizing both technology and human factors, you can establish a robust security framework that adapts to ever-evolving threats.

Media

Media

Integrations Supported

Azure Marketplace
Jenkins
Jira
Microsoft Azure
Microsoft Teams
Slack
Splunk Cloud Platform
Zabbix

Integrations Supported

Azure Marketplace
Jenkins
Jira
Microsoft Azure
Microsoft Teams
Slack
Splunk Cloud Platform
Zabbix

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Threat Meter

Company Location

India

Company Website

sumeruthreatmeter.com

Company Facts

Organization Name

Holm Security

Date Founded

2015

Company Location

Sweden

Company Website

www.holmsecurity.com

Categories and Features

Popular Alternatives

PhishLabs Reviews & Ratings

PhishLabs

Fortra

Popular Alternatives

Tenable One Reviews & Ratings

Tenable One

Tenable
CrowdStrike Falcon Reviews & Ratings

CrowdStrike Falcon

CrowdStrike
Criminal IP Reviews & Ratings

Criminal IP

AI SPERA