Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure.
Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience.
Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks.
Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities.
Description
Code signing serves as a reliable security measure that safeguards the trustworthiness of software systems and applications. Entities that both develop and utilize software require a robust code signing solution to verify the authenticity of their software products. The primary goal is to ensure that genuine software is not hijacked for malicious purposes, such as ransomware attacks. CodeSign by Aujas offers a scalable and secure platform that seamlessly integrates with DevOps, guaranteeing the integrity of software applications while enabling allow-listing to defend internal infrastructure. It also secures the signing keys, provides automated audit trails, and actively fights against ransomware threats. Available as both a SaaS solution and an on-premise appliance, CodeSign can efficiently scale to accommodate hundreds of millions of file signings annually. Its remarkable flexibility allows it to sign all file types across various platforms, making it an invaluable resource for organizations that rely on a diverse range of software applications to support their daily operations. By implementing such a solution, businesses can bolster their defenses against emerging cyber threats.
API Access
Has API
API Access
Has API
Integrations
A10 Defend Threat Control
Aujas
Axonius
Azure Marketplace
BackBox
Check Point IPS
Check Point Infinity
Datacard Secura
EV Observe
Elastiflow
Integrations
A10 Defend Threat Control
Aujas
Axonius
Azure Marketplace
BackBox
Check Point IPS
Check Point Infinity
Datacard Secura
EV Observe
Elastiflow
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
A10 Networks
Founded
2004
Country
United States
Website
www.a10networks.com/products/thunder-adc/
Vendor Details
Company Name
Aujas
Founded
2008
Country
United States
Website
codesign.aujas.com
Product Features
Application Delivery Controllers (ADC)
CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Firewall
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
Load Balancing
Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers
Web Application Firewalls (WAF)
Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention
Product Features
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation