Welcome to the ThreatSTOP Documentation Hub!
This hub contains all documentation related to the installation and configuration of ThreatSTOP on your network.
Information specific to the Website interface can be found in the Portal menu above. Content in this menu deals with:
This is the area that most first time users will generally want to start reading through.
The TSCM menu covers the ThreatSTOP Centralized Manager setups including individual device deployments.
Configuration information for each individual device can be located in the Device menu, which also doubles as our supported devices list.
What is ThreatSTOP?
ThreatSTOP is a new system for handling an old problem. Firewall security has been around for many years, but without constant monitoring by talented systems administrators it was inadequate and systems could become compromised.
ThreatSTOP's Shield services monitor hostile systems attached to the Internet and distributes lists of known malicious attackers to your firewall in near-real time. This allows for constant threat monitoring and mitigation at a fraction of the cost required for network restructuring.