{"id":60414,"date":"2026-04-13T16:40:17","date_gmt":"2026-04-13T16:40:17","guid":{"rendered":"https:\/\/www.pax8.com\/en-us\/?post_type=vendors&#038;p=60414"},"modified":"2026-04-13T16:43:00","modified_gmt":"2026-04-13T16:43:00","slug":"threatmate","status":"publish","type":"vendors","link":"https:\/\/www.pax8.com\/en-us\/vendors\/threatmate\/","title":{"rendered":"ThreatMate"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>ThreatMate empowers MSPs with a single platform to monitor, manage and secure every attack surface\u2014external, internal and cloud\u2014all from one powerful dashboard.<\/p>\n","protected":false},"featured_media":60226,"menu_order":0,"template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"categories":[91,302],"class_list":["post-60414","vendors","type-vendors","status-publish","has-post-thumbnail","hentry","category-security","category-vulnerability-management"],"acf":{"vendor_name":"ThreatMate","short_description":"ThreatMate empowers MSPs with a single platform to monitor, manage and secure every attack surface\u2014external, internal and cloud\u2014all from one powerful dashboard. Find and fix security exposures before adversaries do.\r\n&nbsp;\r\nThreatMate offers continuous risk discovery, vulnerability management, automated pen testing, identity and credential monitoring and M365 security hardening in an all-in-one solution.","greyscale_logo":"","colored_logo":"","products":[{"product":"<h4><strong>Security<\/strong><\/h4> \r\n<br>&nbsp;<br> \r\n<h5>Vulnerability management<\/h5> \r\n<br>&nbsp;<br> \r\n<ul> \r\n<li>ThreatMate<\/li> \r\n<\/ul>"}],"resource_url":"https:\/\/www.pax8.com\/en-us\/vendors\/threatmate\/resources\/","vendor_flag":"null"},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/vendors\/60414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/vendors"}],"about":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/types\/vendors"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/media\/60226"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/media?parent=60414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/categories?post=60414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}