It's been a long road, with some detours along the way, but we have finally made it! ThreatSTOP release 1.0 is out.

The original tech team took the service back over late last year after  the company that bought ThreatSTOP in 2008 had let it wilt on the vine. We have been heads down updating code and servers, cleaning everything up, getting all the features we wanted finished and all the bugs we knew about fixed. We then went through a second beta period, testing things (and finding some things and fixing them) while we revamped our website and marketing materials.

As a result of feedback from our beta users, we have improved our services and broadened our product options to provide complete protection from known cyber-criminals.

We are continuing to make a lot of improvements to our website and to the service.

One of the really cool (at least we think so), and useful things we've added is the ability to check any log file or IP address against our data.

To keep you up to date on what we are doing, and get your comments on it, we have a company blog (which you are reading now). We hope that you will comment on posts here, as we will use this as our user forum to make sure we are doing what the community needs. The old mailing list also still works.

To give you timely alerts regarding the service, and emerging threats we block, we have a twitter feed

 

What ThreatSTOP Does

ThreatSTOP uses thousands of sensors across the internet to track data thieves, malware distributors and other cyber criminals.

ThreatSTOP blocks your computers from communicating with these criminals. By blocking currently bad IP addresses we provide the most cost effective way to prevent the loss of sensitive data. By making you invisible to the attackers we also protect against the most destructive and resource sapping inbound attacks.

Not only do we stop it, we also log the data so you can fix the problem.

Our dynamic ThreatList auto-updates every couple of hours. Someone on our list of attackers will typically attack you every 5-10 minutes.

Since we use DNS to distribute the ThreatList to our subscribers our DNS servers have been carefully set up to avoid issues such as cache poisoning and other DNS attacks. They are not limited to resolving our own domain but can function as a standard DNS resolver. Using ThreatSTOP as your forwarder provides the anti-poisoning benefits of services such as OpenDNS and Google DNS without NXDomain redirection or ad insertion.

The next two posts discuss some of what we now offer and how we offer it. Please give us your comments, ideas, and feature requests. We're working on the spec for the next release, and want your input.

Thanks for your interest in ThreatSTOP.

Tom Byrnes, CEO and Founder, ThreatSTOP, Inc.