Learn More

Average Ratings 1 Rating

Total
ease
features
design
support
Read all reviews

Average Ratings 791 Ratings

Total
ease
features
design
support
Read all reviews

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Blackfire
Blotout
Compyl
Datadog
Do Status
Envoy
GigaSECURE
Google Kubernetes Engine (GKE)
Helm
Indent
JupiterOne
Mule ESB
NGINX
Quickwork
Resmo
Stackreaction
ThreatBlockr
Upstash
Vantage
Xata

Integrations

Blackfire
Blotout
Compyl
Datadog
Do Status
Envoy
GigaSECURE
Google Kubernetes Engine (GKE)
Helm
Indent
JupiterOne
Mule ESB
NGINX
Quickwork
Resmo
Stackreaction
ThreatBlockr
Upstash
Vantage
Xata

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

SaaS
iPhone
iPad
Android
Windows
Mac
Linux

Deployment

SaaS
iPhone
iPad
Android
Windows
Mac
Linux

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Vendor Details

Company Name

Cequence Security

Founded

2014

Country

United States

Website

www.cequence.ai

Vendor Details

Company Name

Fastly

Founded

2011

Country

United States

Website

fastly.com

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Product Features

CDN

Content Acceleration
DDoS Protection
Load Balancing
Managed CDN
Multi-CDN Switching
Reporting/Analytics
Software Downloads
Transparent Caching
Video Streaming
Web Application Firewalls (WAF)

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Alternatives

Resurface Reviews

Resurface

Resurface Labs
Queue-it Reviews

Queue-it

Queue-it ApS