Using ThreatX
Learn how to start using ThreatX’s capabilities and features!
ThreatX Overview Guide
This guide provides a detailed description of the ThreatX platform, its features, and how it interacts with your environment.
ThreatX Administrator Guide
The ThreatX™ Managed API and Application Protection platform is a Protection as a Service offering that protects your APIs and applications from the full breadth of Layer 7 security threats, including traditional OWASP attacks, bots, malicious automation, DDoS, and API-specific attacks. This guide focuses on the administrator tasks. For an overview of the ThreatX platform, […]
ThreatX Analyst Guide
The ThreatX Analyst guide focuses on those areas of the ThreatX™ platform that provide analytical data.
Getting Started
After connecting hostnames to ThreatX, real-time attack information will be displayed via the Attack Dashboard and API Defender in the ThreatX platform. Use the latest available sensor version to see all information populated on the ThreatX platform. ThreatX Attack Dashboard Introduction ThreatX’s Attack Dashboard provides complete visibility into how the solution protects APIs and web […]