AI Buyer Insights:

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Michelin, an e2open customer evaluated Oracle Transportation Management

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Michelin, an e2open customer evaluated Oracle Transportation Management

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

List of ThreatMate Customers

loading spinner icon



Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Acumen Technology Professional Services 45 $10M United States ThreatMate ThreatMate Endpoint Detection and Response (EDR) 2024 n/a
In 2024, Acumen Technology implemented ThreatMate, an Endpoint Detection and Response (EDR) application, and lists ThreatMate on its corporate website. The deployment is oriented to a 45 employee professional services firm in the United States, positioning ThreatMate to cover corporate endpoints across the small office footprint rather than an enterprise campus deployment. ThreatMate implementation follows core Endpoint Detection and Response (EDR) patterns, with an agent-based footprint on user laptops and any on-premises servers, a centralized management console for alerting and policy administration, and telemetry aggregation for behavioral analytics and threat detection. Configuration signals indicate standard EDR capabilities were provisioned, including continuous endpoint monitoring, alert triage workflows, and remediation or containment controls driven from the central console. Operational governance is structured for a small IT security function, with phased agent enrollment, policy baseline standardization, and integration into existing incident response and change control processes. Rollout and operational ownership appear scoped to internal IT and security operations, aligning ThreatMate with endpoint protection, detection, and response workflows across the company.
Alliance Beverage Distributing Distribution 550 $100M United States ThreatMate ThreatMate Endpoint Detection and Response (EDR) 2025 n/a
In 2025, Alliance Beverage Distributing implemented ThreatMate as an Endpoint Detection and Response (EDR) control. The deployment is visibly surfaced on their public website and also extends typical EDR coverage to corporate endpoints to consolidate telemetry for security operations. ThreatMate was configured to provide agent-based telemetry, real-time detection and alerting, centralized investigation through a management console, policy-driven remediation, and threat hunting workflows consistent with Endpoint Detection and Response (EDR) capabilities. Configuration work emphasized rule tuning and alert triage to align detection logic with distribution industry operational profiles. Operational ownership for the ThreatMate deployment sits with IT security and web operations, covering the corporate network, user devices, and the company web presence. Detection feeds and investigation artifacts are routed into existing incident response and monitoring workflows to support coordinated triage and escalation across teams. Rollout followed a staged approach with iterative configuration and rule refinement to reduce noise, while governance updated alert handling and escalation processes to align IT helpdesk and security analyst responsibilities. The ThreatMate Endpoint Detection and Response (EDR) implementation standardized detection and response workflows across web-facing assets and internal endpoints.
Call the Car Healthcare 160 $22M United States ThreatMate ThreatMate Endpoint Detection and Response (EDR) 2024 n/a
In 2024, Call the Car deployed ThreatMate, an Endpoint Detection and Response (EDR) application. ThreatMate is observable on the company website and is implemented to provide EDR coverage for Call the Car, a United States based healthcare firm with approximately 160 employees. The ThreatMate deployment leverages core Endpoint Detection and Response (EDR) capabilities, including agent-based endpoint telemetry, continuous threat detection and alerting, and endpoint containment and forensic data capture for incident investigation. Configuration work focused on endpoint policy enforcement, alert thresholds, and telemetry retention settings consistent with standard EDR operational practices. Operational scope includes monitoring corporate endpoints that support the organization, with primary operational ownership by IT and security functions responsible for agent rollout and incident triage. The presence of ThreatMate on the public website indicates a web-facing component in addition to endpoint agents, with the implementation intended to centralize threat visibility across the environment. Governance for the implementation established policy-driven agent configuration and staged rollout procedures, with formalized workflows for alert escalation and remediation owned by security operations. The narrative emphasizes ThreatMate, Endpoint Detection and Response (EDR), and the relationship Call the Car ThreatMate Endpoint Detection and Response (EDR) security function without asserting specific measured outcomes.
cloudIT Professional Services 80 $8M United States ThreatMate ThreatMate Endpoint Detection and Response (EDR) 2024 n/a
In 2024, cloudIT implemented ThreatMate as its Endpoint Detection and Response (EDR) application, and the vendor is referenced on the company public website indicating live usage. The deployment is positioned to support security operations and endpoint protection for cloudIT, an 80 person professional services firm based in the United States, and the narrative explicitly ties ThreatMate to Endpoint Detection and Response (EDR) for endpoint monitoring and incident handling. The implementation uses a typical EDR architecture, with endpoint agents deployed to user laptops and corporate endpoints, and a centralized cloud management console for policy configuration, telemetry aggregation, and alert triage. Functional modules in use include continuous endpoint monitoring, behavioral detection, forensic data capture, policy enforcement, and automated containment workflows, aligned with standard Endpoint Detection and Response (EDR) capabilities. Operational coverage is described as company wide, managed by internal IT and security staff who administer role based access to the central console and tune detection policies. The rollout approach follows a phased pattern, beginning with pilot groups, inventorying endpoint estate, and progressively expanding agent coverage while calibrating alerts and response playbooks. Governance changes center on formalizing incident handling and endpoint policy ownership within the existing IT and security functions, with documented procedures for alert escalation and forensic data review. The text refrains from claiming specific outcomes, focusing instead on the structural deployment of ThreatMate as the Endpoint Detection and Response (EDR) solution for cloudIT.
CyFlare Professional Services 50 $8M United States ThreatMate ThreatMate Endpoint Detection and Response (EDR) 2025 n/a
In 2025, CyFlare implemented ThreatMate on its public website and as a protective control across its employee estate. CyFlare positioned ThreatMate as its Endpoint Detection and Response (EDR) platform to support security operations and IT incident response. The ThreatMate deployment centers on agent-based endpoint telemetry collection, a centralized management console for alerting and investigation, signature and behavioral detection engines, and policy-driven containment capabilities. Configuration activities included tuning detection rules, establishing role-based access controls in the ThreatMate console, and instrumenting website-hosted assets for telemetry capture to extend visibility beyond traditional laptops and servers. Operational coverage targets CyFlare security operations and IT functions for a 50 employee professional services firm operating in the United States. Governance was structured around standardized alert triage workflows, change-controlled policy updates, and a phased agent rollout and web instrumentation approach to limit disruption during adoption.
Banking and Financial Services 300 $50M United States ThreatMate ThreatMate Endpoint Detection and Response (EDR) 2025 n/a
Professional Services 16 $2M United States ThreatMate ThreatMate Endpoint Detection and Response (EDR) 2024 n/a
Professional Services 20 $2M United States ThreatMate ThreatMate Endpoint Detection and Response (EDR) 2024 n/a
Professional Services 20 $2M United States ThreatMate ThreatMate Endpoint Detection and Response (EDR) 2024 n/a
Insurance 138 $20M United States ThreatMate ThreatMate Endpoint Detection and Response (EDR) 2025 n/a
Showing 1 to 10 of 10 entries

Buyer Intent: Companies Evaluating ThreatMate

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating ThreatMate. Gain ongoing access to real-time prospects and uncover hidden opportunities.

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD ThreatMate Coverage

ThreatMate is a Endpoint Detection and Response (EDR) solution from ThreatMate.

Companies worldwide use ThreatMate, from small firms to large enterprises across 21+ industries.

Organizations such as Alliance Beverage Distributing, Economic Group Pension Services (EGPS), Call the Car, Virtus and Acumen Technology are recorded users of ThreatMate for Endpoint Detection and Response (EDR).

Companies using ThreatMate are most concentrated in Distribution, Banking and Financial Services and Healthcare, with adoption spanning over 21 industries.

Companies using ThreatMate are most concentrated in United States, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of ThreatMate across Americas, EMEA, and APAC.

Companies using ThreatMate range from small businesses with 0-100 employees - 60%, to mid-sized firms with 101-1,000 employees - 40%, large organizations with 1,001-10,000 employees - 0%, and global enterprises with 10,000+ employees - 0%.

Customers of ThreatMate include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified ThreatMate customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Endpoint Detection and Response (EDR).