Learn More

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 7 Ratings

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Active Directory
Akamai Bot Manager
Canopy
CrowdHandler
DataStream
Enso
Haivision Media Platform
Hydrolix
InsurSuite
JetRails
Junos Traffic Vision
Microsoft Entra ID
Netacea Bot Management
New Relic
NuBot Ai
Nuvento
Terraform
Touchstream VirtualNOC
Veriti

Integrations

Active Directory
Akamai Bot Manager
Canopy
CrowdHandler
DataStream
Enso
Haivision Media Platform
Hydrolix
InsurSuite
JetRails
Junos Traffic Vision
Microsoft Entra ID
Netacea Bot Management
New Relic
NuBot Ai
Nuvento
Terraform
Touchstream VirtualNOC
Veriti

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

SaaS
iPhone
iPad
Android
Windows
Mac
Linux

Deployment

SaaS
iPhone
iPad
Android
Windows
Mac
Linux

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Vendor Details

Company Name

Akamai Technologies

Founded

1998

Country

United States

Website

www.akamai.com

Vendor Details

Company Name

Source Defense

Founded

2014

Country

United States, Israel

Website

sourcedefense.com

Product Features

CDN

Content Acceleration
DDoS Protection
Load Balancing
Managed CDN
Multi-CDN Switching
Reporting/Analytics
Software Downloads
Transparent Caching
Video Streaming
Web Application Firewalls (WAF)

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Managed DNS

Anti-Malware
Change Management
DDoS Protection
DNS Failover
DNS Propagation
Disaster Recovery
Global DNS Network
Intelligent Traffic Routing
Load Balancing
Reporting / Analytics
Secondary DNS
Web Application Firewall (WAF)

Performance Testing

API Testing
Benchmarking
Cross Browser Testing
Debugging
Historical Reporting
Load Testing
Mobile Testing
Parallel Testing
Regression Testing
UI Testing
Web Testing

Web Analytics

Campaign Management
Conversion Tracking
Form Analytics
Goal Tracking
Keyword Tracking
Multiple Site Management
Pageview Tracking
Referral Source Tracking
Site Search Tracking
Time on Site Tracking
User Interaction Tracking

Product Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Alternatives

Alternatives

Feroot Reviews

Feroot

Feroot Security