Average Ratings 1 Rating
Average Ratings 3 Ratings
Description
REVE Antivirus is a Cyber Security Product for Home Users and Enterprises. The REVE Antivirus product range includes the following products:
REVE Antivirus
REVE Internet Security
REVE Total Security
REVE Windows Sever Security
REVE Antivirus for Mac
REVE Antivirus for Linux
REVE Endpoint Security
The product has been certified by OPSWAT as well as VB 100. It is also Microsoft approved antivirus software.
Description
SuperTokens is the most secure option for user session management. It allows robust detection and prevention of attacks. SuperTokens protects against all types attacks (XSS/MITM, session fixation etc.) and is unique in its ability detect session theft (according to the OAuth 2.0 specifications in RFC 6819). This library solves the problems of scalability and race conditions as well as failure issues that are often associated with this. It can be integrated quickly in a matter of days.
API Access
Has API
API Access
Has API
Integrations
BoxyHQ
Jovu
Pricing Details
$19 per year
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
REVE Antivirus
Founded
2015
Country
Singapore
Website
www.reveantivirus.com/en/
Vendor Details
Company Name
SuperTokens
Founded
2019
Country
India
Website
supertokens.io
Product Features
Anti-Spam
Allow / Block List
Audit Log
Email Archiving
Email Recovery
Email Routing
Encryption
Fraud Detection
Quarantine
Reporting & Statistics
Spam Filter
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting