Other
Threater
What it is
Company Info
- Sector: Legal Tech
What We Haven’t Verified
This page was assembled from publicly available information. Feature claims and workflow mappings are based on what the vendor and third-party listings publish — not hands-on testing or practitioner feedback.
Integrations
Platforms Threater integrates with. Depth — where curated — reflects how native the connection is. Uncurated entries render without a depth dot.
- Abuse Feodo/Botnet C&C
- AlienVault OTX
- Anomali
- Basic HTTP
- Basic STIX/TAXII
- CSV File Connector
- E-ISAC
- FS-ISAC
- H-ISAC
- IP2Proxy
- IntSights
- Microsoft
- MS-ISAC
- Proofpoint
- Recorded Future
- Recorded Future Security Control
- ThreatConnect
- ThreatSTOP
- TruSTAR
Deep — bi-directional API Medium — one-way sync / webhook Shallow — middleware / Zapier-class
Community ratings
Upcoming webinars
Alternatives
Other Other vendors in the directory. "Compare" pages are editorial and coming as we build them.