Directly on the endpoints, every endpoint that is protected by Threatmatic.
Less than 60MB on disk, 30MB in memory, 0.1% cpu.
Our policy engines are designed to operate from any compute zone: private or public virtual machines, any combination, across your availability zones.
Yes! We support virtually limitless grouping structures, including IoT devices and any endpoint that can be identified with an IP address.
Yes! We support any ID authentication method: AD, Azure AD (Entra), GitHub, Google, AWS, Ping, Octa, Social, etc. We also support hybrid schemes.
Instantly in a matter of milliseconds. ThreatMatic engines direct policy changes in real time, even cloud based deployments achieve sub-second policy enforcement, regardless of the number of endpoints.
Absolutely! You can write policy using a natural language interface against any combination of users, groups, devices, tags, IP addresses, port numbers, time intervals, and much more.
With our HiFi DNS setting, we check every name query against the latest updates from across the globe on malicious site activity.
100%. You can easily govern exactly which updates are allowed to complete, at which time, and with how much bandwidth.
Nearly instantaneously! Our QSChannel technology is shockingly straightforward and simple, and has the latest ciphers and blazing performance. Say goodbye to your VPN.
ThreatMatic policies can control both the time allowed and bandwidth offered, between your on-premises data centers and cloud. Just like with our other policies, you can specify any group of users and applications that are allowed to interact with your cloud subscription.
Govern exactly what app, which user or group, which set of devices, IP addresses or host names, what timeframe, how much bandwidth, is allowed (or denied): precisely across your entire domain, instantaneously within milliseconds.
Control access to your data centers and cloud, connect your users securely with utmost confidentiality and privacy, without VPN.
Deployments are measured in minutes, not days or weeks.
Use our agentic AI assistant with LLM feature to automate posture changes. We integrate with every tool in your cybersecurity environment (CSMA).
Gain deep and meaningful insights into user and application performance, directly from endpoints and blended with metrics your other sources. Our ML models are constantly being updated to integrate with AI and LLM capabilities. Autopilot control of security posture is a desirable use case.