Learn about our current resellers as well as how to add another profitable line to your business.

OptivVMracksBayside Solutions
OrixcomArmor Logo 


OEM/Integration Partners

Learn about our full OEM integration partners.

Juniper Networkinfobloxcoma10


Malware Monitors

Read about our threat intelligence sources.


DShieldFarsight SecurityDShield


Technology / Research Partners

Read about our technology / research partners. 


ThreatSTOP's work is supported in part by the Department of Homeland Security's Small Business Innovation Research grant program under Contract Number D11PC20011 for the creation of a Distributed, Closed-loop, anonymized, dynamic collaborative defense against network threats.

ThreatSTOP's web site, documentation, official and unofficial communications, and services do not necessarily reflect the position and policy of the Government, and no official endorsement of ThreatSTOP by the Government should be inferred.



We offer a solution that can be used by any organization with a firewall, router or switch–in other words, any network, which means a huge market and revenue opportunity. We are actively looking for value–added resellers, integrators, ISPs and MSSPs in the information security and networking markets. In particular, we are looking for resellers of major firewall vendors such as Juniper, Checkpoint, Cisco, Vyatta and any IP–Tables based firewalls. Our value proposition to you is significant:

  • Incremental annuity revenue stream
  • Professional services revenue upsell potential
  • Protect and enhance your installed base
  • Add value to your customers

We offer a flexible program and customer–friendly approach to business. Call us and see how we can add another profitable line to your business.

For inquiries, please contact us at:
U.S.: 1-855-95T-STOP

Some of our resellers:



OEM/Integration Partners

ThreatSTOP is a cloud threat mitigation service that can add significant value to any firewall, router/switch, IDS/IPS, SEM/SIM, web content management or security service because it is designed to enhance their functionality by working together. We are flexible in how to implement a joint solution and the partnership, from a co–marketed value–add service to full OEM integration. Our value proposition to you is:

  • Add value to your product
  • Protect and grow your installed base
  • Incremental annuity revenue stream
  • More service revenue upsell potential

Current Partners:

Juniper Networkinfobloxcoma10


Malware Monitors

In addition to running its own honeypots and using user submitted log data to detect attackers; ThreatSTOP aggregates and optimizes threat intelligence from a number of sources on the Internet, turning that information into enforceable policy lists which are uploaded into network firewalls.

The current sources for our threat intelligence include: / Internet Storm Center


InternetStormCenterdsshield / Internet Storm Center (ISC) relies on an all-volunteer effort to detect problems, analyze threats, and disseminate both technical as well as procedural information to the general public. Thousands of sensors that work with most firewalls, intrusion detection systems, home broadband devices, and nearly all operating systems are constantly collecting information about unwanted traffic arriving from the Internet. These devices feed the DShield database where human volunteers as well as machines pore through the data looking for abnormal trends and behavior. The resulting analysis is posted to the ISC's main web page where it can be automatically retrieved or can be viewed in near real time by any Internet user. DShield is usually among the first to detect new network based attacks on the Internet, as the seed systems scanning for the vulnerabilities rapidly rise to the top of the list of connections to closed ports.




ISC SIE is a trusted, private framework for information sharing in the Internet Security field. Participants can operate real time sensors that upload and/or inject live data to SIE, and other participants can subscribe to this data either in real time, or by query access, or by limited and anonymized download.


Participants are network operators (including ISPs, enterprise, academic, and research), law enforcement (internationally), security companies (including anti-virus, intrusion detection, &etc), and research (including academic, Internet do-gooder, government, and commercial). All access and use, either commercial or noncommercial, must be in the public interest.




The Shadowserver Foundation gathers intelligence on the darker side of the internet. Comprised of volunteer security professionals from around the world, their mission is to understand and help put a stop to high stakes cybercrime in the information age.





PhishTank is a collaborative clearing house for data and information about phishing on the Internet.