• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. ThreatBook TDP NDR
Logo of ThreatBook TDP NDR

ThreatBook TDP NDR

byThreatBook
in Network Detection and Response
5.0

Overview

Product Information on ThreatBook TDP NDR

Updated 13th October 2025

What is ThreatBook TDP NDR?

ThreatBook TDP NDR is a software designed to identify, analyze, and respond to network-based threats within enterprise environments. The software uses network detection and response capabilities to monitor network traffic, detect anomalies, and provide insights into potential security incidents. It leverages threat intelligence and behavioral analysis to uncover hidden risks and deliver detailed threat context. The software supports the investigation of security events by providing automated alerts, forensic data, and visualization of attack paths. It aims to enhance threat visibility, streamline incident response, and support security teams in mitigating risks posed by advanced persistent threats and malware.

ThreatBook TDP NDR Pricing

ThreatBook TDP NDR software uses a subscription-based pricing model, where fees are generally determined by the scale of deployment, including factors such as the number of assets, data bandwidth, or specific security features required. Pricing may vary depending on selected modules, support options, and service levels, typically offered on annual or multi-year terms. No Profile found

Overall experience with ThreatBook TDP NDR

Information Security Engineer
1B - 3B USD, IT Services
FAVORABLE

“Comprehensive Coverage of Zero-Day Rules Enhances Discovery of Unknown Threats”

5.0
Sep 3, 2025
The attack chain visualization function of Online TDO is clear and intuitive, effectively presenting two types of threat sources: penetration attacks and viruses and Trojans. We particularly recognize its design that focuses on successful events of vulnerability exploitation and attacks, which provides crucial decision support for rapid response and handling, significantly enhancing the efficiency of threat management.
There are no reviews in this category.
CRITICAL

About Company

Company Description

Updated 5th July 2024

ThreatBook is a provider of cyber threat detection and response services. We developed new approaches to deliver high-fidelity, efficient, and actionable security intelligence. We integrated these capabilities with a full life cycle threat detection system and incident response mechanisms to enhance protection across cloud, network, and endpoints. This helps enterprises respond to threats efficiently, reduce complexity, and improve security operations.

Company Details

Updated 26th February 2025
Company type
Private
Year Founded
2015
Head office location
Beijing, China
Number of employees
501 - 1000
Website
https://threatbook.cn/next/en

Do You Manage Peer Insights at ThreatBook?

Access Vendor Portal to update and manage your profile.

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

User Sentiment About ThreatBook TDP NDR
Reviewer Insights for: ThreatBook TDP NDR
Deciding Factors: ThreatBook TDP NDR Vs. Market Average
Performance of ThreatBook TDP NDR Across Market Features

ThreatBook TDP NDR Likes & Dislikes

Like

The TDP product from Online is highly focused on vulnerability exploitation threats, especially eith comprehensive coverage of 0-day rules. It can effectively enhance our ability to discover unknown threats, greatly shorten our response time, and significantly improve our overall security protection level. The TDP attack success event monitoring mechanism of Online is designed extremely well . It can accurately and promptly detect suspicious intrusion threats, providing crucial support for our rapid emergency response and significantly enhancing the effectiveness and proactiveness of overall security protection.

Like

TDP supports custom HTTP detection rules. This feature can help us flexibly customize strategies, precisely match our own business scenarios, and improve the threat detection rate. It is a point that we like very much in our daily use. TDP supports custom alarm settings. This function can adjust the alarm determination criteria, levels and results according to its own business logic, making threat alarms more accurate and more in line with the current situation , thereby effectively improving our efficiency and reducing false alarm interference .

Like

TDP is an excellent security product , and its core advantages are particularly prominent; (1)The alarm mechanism has a high accuracy rate, which greatly enhances the efficiency of our threat detection and response.(2)The produce design is humanized, ensuring that the safety team can quickly master and put it into use without any threshold(3)the team offers round-the-clock follow-up services and can quickly iterate and optimize based on our feedback.

Dislike

The overall TDP experience of Online is extremely excellent . A small suggestion: if we can further enhance the visual presentation of rule hits in the console to make key information more prominent, it will greatly improve the analysis efficiency and help us focus on core threats more quickly.

Dislike

The overall functions of TDP are complete and it operates well . It is suggested that the underlying diagnostic permissions could be appropriately opened in the future . However, not opening them also proves that the product's own security design is extremely rigorous.

Dislike

The overall TDP platform is very good. We have a constructive suggestion, we hope to extend the retention period of log data and open up a longer time limit for exporting historical reports. This will greatly facilitate our in-depth analysis and summary of the annual security situation.

Top ThreatBook TDP NDR Alternatives

Logo of Darktrace / NETWORK
1. Darktrace / NETWORK
4.8
(606 Ratings)
Logo of Vectra AI Platform
2. Vectra AI Platform
4.7
(452 Ratings)
Logo of RevealX
3. RevealX
4.7
(252 Ratings)
View All Alternatives

Peer Discussions

ThreatBook TDP NDR Reviews and Ratings

5.0

(108 Ratings)

Rating Distribution

5 Star
90%
4 Star
10%
3 Star
0%
2 Star
0%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.8

Integration & Deployment

4.9

Service & Support

4.9

Product Capabilities

4.9

Filter Reviews
Sort By:
Most helpful
Last 12 Months
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • Information Security Engineer
    1B-10B USD
    IT Services
    Review Source

    Comprehensive Coverage of Zero-Day Rules Enhances Discovery of Unknown Threats

    5.0
    Sep 2, 2025
    The attack chain visualization function of Online TDO is clear and intuitive, effectively presenting two types of threat sources: penetration attacks and viruses and Trojans. We particularly recognize its design that focuses on successful events of vulnerability exploitation and attacks, which provides crucial decision support for rapid response and handling, significantly enhancing the efficiency of threat management.
  • IT Manager
    1B-10B USD
    Insurance (except health)
    Review Source

    TDP Improves Threat Detection with Flexible Rules and Customizable Alarm Settings

    5.0
    Sep 3, 2025
    TDP is an excellent product. It has achieved remarkable results in our internal practical operations . Through precise traffic analysis, it realizes automated threat discovery and handling , effectively building a closed-loop defense system , significantly reducing our operating costs and enhancing security efficiency.
  • Manager of IT Services
    <50M USD
    IT Services
    Review Source

    TDP Platform Increases Threat Detection Accuracy and Operational Safety for Companies

    5.0
    Oct 28, 2025
    The TDP platform has brought substantial improvements to the safe operation of our company . Its high-precision alarm capability significantly reduces false alarm interference, becoming the core guarantee for our threat detection response.
  • IT Manager
    10B+ USD
    IT Services
    Review Source

    Automated Blocking and Threat Discovery Improve Efficiency of Security Operations

    5.0
    Aug 11, 2025
    TDP delivers exceptional precision,coupled with deep threat discovery capabilities,enabling our security team to focus exclusively on genuine risk response.Its automated blocking reduces manual efforts by 80%,significantly enhancing baseline security operations efficiency.
  • IT MANAGER
    50M-1B USD
    Insurance (except health)
    Review Source

    ThreatBook TDP NDR Enhances Accuracy with Integrated Threat Intelligence Monitoring

    5.0
    Oct 31, 2025
    ThreatBook TDP NDR monitors based on full traffic and integrates threat intelligence to make detection more accurate. Our current user experience is excellent-it provides threat detection and identifies risky attack surfaces.We can leverage these attack surfaces to conduct asset convergence, which has proven highly effective.
...
Showing Result 1-5 of 109

Recommended Gartner Research

  • Magic Quadrant for Network Detection and Response

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.