image

ThreatKey

thumbs_up

thumbs_down

ThreatKey provides cloud security posture management, ensuring continuous compliance and protection for cloud resources.

Cloud Security
icon

Market Share of ThreatKey

Current Customer(s)

2

Market Share (Est.)

0.00%

Ranking

#170

Top Competitors and Alternatives of ThreatKey

The top three of ThreatKey’s competitors in the Cloud Security category are Cloudflare with 98.27%, OneLogin with 0.43%, Ghostery with 0.21% market share.

TechnologyDomainsMarket Share (Est.)Versus page
Cloudflare639904198.27%ThreatKey vs Cloudflare
OneLogin278300.43%ThreatKey vs OneLogin
Ghostery136700.21%ThreatKey vs Ghostery
Perimeter 81105130.16%ThreatKey vs Perimeter 81
Sift Science66780.10%ThreatKey vs Sift Science
Loggly56520.09%ThreatKey vs Loggly
Tenable45460.07%ThreatKey vs Tenable
Microsoft Defender for Endpoint36350.06%ThreatKey vs Microsoft Defender for Endpoint
IDENTIKEY23890.04%ThreatKey vs IDENTIKEY
Sumo Logic23030.04%ThreatKey vs Sumo Logic
AWS Security, Identity, & Compliance19750.03%ThreatKey vs AWS Security, Identity, & Compliance
Prisma Cloud18980.03%ThreatKey vs Prisma Cloud
ManageEngine ADAudit Plus18200.03%ThreatKey vs ManageEngine ADAudit Plus
Avigilon15860.02%ThreatKey vs Avigilon
Workato15830.02%ThreatKey vs Workato
AWS Artifact15660.02%ThreatKey vs AWS Artifact
Secure Privacy15160.02%ThreatKey vs Secure Privacy
Symantec Solutions For Small Business14590.02%ThreatKey vs Symantec Solutions For Small Business
Netskope12610.02%ThreatKey vs Netskope
LastPass11240.02%ThreatKey vs LastPass
image

Popular Comparisons

Top Competitors and Alternatives of ThreatKey

The top three of ThreatKey’s competitors in the Cloud Security category are Cloudflare with 98.27%, OneLogin with 0.43%, Ghostery with 0.21% market share.

ThreatKey vs Cloudflare

arrow_icon

ThreatKey vs OneLogin

arrow_icon

ThreatKey vs Ghostery

arrow_icon

ThreatKey vs Perimeter 81

arrow_icon

ThreatKey vs Sift Science

arrow_icon

ThreatKey vs Loggly

arrow_icon

ThreatKey vs Tenable

arrow_icon

ThreatKey vs Microsoft Defender for Endpoint

arrow_icon

Customers of ThreatKey

Around the world in 2026, over 2 companies have started using ThreatKey as Cloud Security tool.

CustomersEmployee RangeCityRegionCountrySocial Links
Lightspeed Venture Partners100 - 249Menlo ParkCaliforniaUnited States
social_iconsocial_iconsocial_iconsocial_icon
ThreatKey20 - 49New York CityNew YorkUnited States
social_iconsocial_iconsocial_iconsocial_icon

Uncover hidden demand and identify accounts ready to buy with 6sense Intent Data.

Get a demoKnow More
Company Logo

ThreatKey Customers by Products and Services

The top three products and services offering customers that use ThreatKey for Cloud Security are Cloud Computing (1), Infrastructure (1), Big Data (1).

Customers

Download the 6sense Chrome Extension to get verified contact data of ThreatKey employees

Install Now
Company Logo

ThreatKey Customers by Employee Size

The majority of ThreatKey's customers for the cloud-security category fall in the company size of 100 - 249 employees (1 companies), 20 - 49 employees (1 companies).

Employee Size

ThreatKey Customers by Geography

The top three geographies of ThreatKey for cloud-security are the United States with 2(100.00%) customers respectively.

Customers

Employees of ThreatKey

image

Also see other Products/Services by ThreatKey in:

Cloud Security

FAQ

Find answers to the most often asked questions by users.

Who are the top ThreatKey competitors?

ThreatKey’s Top competitors in the cloud-security category are Cloudflare, OneLogin, Ghostery. You can view a full list of ThreatKey competitors here. 6sense uses advanced data mining and AI algorithms to track customers and competitors of ThreatKey and 40,000 other technologies on the internet. You can also compare ThreatKey and its feature with top competitors here : ThreatKey vs Cloudflare ThreatKey vs OneLogin ThreatKey vs Ghostery.

faq icon

What is ThreatKey customer distribution based on company size?

faq icon

What is ThreatKey market share in the cloud-security?

faq icon

What are the top countries that use ThreatKey?

faq icon

What are the top industries that use ThreatKey?

faq icon

Get everything in one place

Close deals faster by understanding your clients well. Know their technology stack, contract renewal date, top decision-makers, hiring trends, and top company news in one place.

Get a demo

Get instant access to B2B contact data across the web

Sign Up Today
6sense Logo
social iconssocial iconssocial iconssocial icons
MarketingAccount IdentificationIntent DataData Enrichment & ManagementPredictive AnalyticsOrchestrations & WorkflowsAudience BuildingAdvertisingConversational EmailPipeline IntelligenceIntegrations
SolutionsBusiness ServicesFinancial ServicesTransportation & LogisticsManufacturingTechnologyCustomersMeet Our CustomersCustomer StoriesCustomer ReviewsRevCityKnowledge Base

Company

AboutLeadership TeamCareersNewsroomCommunity

Browse 6sense Data

TechnographicsComparing TechnologiesCompany SearchPeople Search
TermsPrivacy PolicyPrivacy CenterDo Not Sell or Share My Personal Information

© 2026 6sense