Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities.

Description

Code signing serves as a reliable security measure that safeguards the trustworthiness of software systems and applications. Entities that both develop and utilize software require a robust code signing solution to verify the authenticity of their software products. The primary goal is to ensure that genuine software is not hijacked for malicious purposes, such as ransomware attacks. CodeSign by Aujas offers a scalable and secure platform that seamlessly integrates with DevOps, guaranteeing the integrity of software applications while enabling allow-listing to defend internal infrastructure. It also secures the signing keys, provides automated audit trails, and actively fights against ransomware threats. Available as both a SaaS solution and an on-premise appliance, CodeSign can efficiently scale to accommodate hundreds of millions of file signings annually. Its remarkable flexibility allows it to sign all file types across various platforms, making it an invaluable resource for organizations that rely on a diverse range of software applications to support their daily operations. By implementing such a solution, businesses can bolster their defenses against emerging cyber threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

A10 Defend Threat Control
Aujas
Axonius
Azure Marketplace
BackBox
Check Point IPS
Check Point Infinity
Datacard Secura
EV Observe
Elastiflow
Entrust Certificate Hub
Netreo
Pliant
SIRP
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM

Integrations

A10 Defend Threat Control
Aujas
Axonius
Azure Marketplace
BackBox
Check Point IPS
Check Point Infinity
Datacard Secura
EV Observe
Elastiflow
Entrust Certificate Hub
Netreo
Pliant
SIRP
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

A10 Networks

Founded

2004

Country

United States

Website

www.a10networks.com/products/thunder-adc/

Vendor Details

Company Name

Aujas

Founded

2008

Country

United States

Website

codesign.aujas.com

Product Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Alternatives

Alternatives

CodeSign Secure Reviews

CodeSign Secure

Encryption Consulting LLC