Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
                    Reblaze is a cloud-native, fully managed security platform for websites and web applications. Reblaze’s all-in-one solution supports flexible deployment options (cloud, multi-cloud, hybrid, DC), deployed in minutes and includes state-of-the-art Bot Management, API Security, next-gen WAF, DDoS protection, advanced rate limiting, session profiling, and more. Unprecedented real time traffic visibility as well as highly granular policies enables full control of your web traffic.  
                
            
        
            Description
                    The premier hybrid and multi-cloud platform offers an advanced suite of security features including next-gen WAF, API Security, RASP, Enhanced Rate Limiting, Bot Defense, and DDoS protection, specifically engineered to address the limitations of outdated WAF systems. Traditional WAF solutions were not built to handle the complexities of modern web applications that operate in cloud, on-premise, or hybrid settings. Our cutting-edge web application firewall (NGWAF) and runtime application self-protection (RASP) solutions enhance security measures while ensuring reliability and maintaining high performance, all with the most competitive total cost of ownership (TCO) in the market. This innovative approach not only meets the demands of today's digital landscape but also prepares organizations for future challenges in web application security.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    Enso
            
            
        
        
    
        
        
            
                
    Expel
            
            
        
        
    
        
        
            
                
    Indent
            
            
        
        
    
        
        
            
                
    JupiterOne
            
            
        
        
    
                
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Reblaze
Founded
2011
Country
United States
Website
www.reblaze.com
Vendor Details
Company Name
Signal Sciences
Founded
2014
Country
United States
Website
www.signalsciences.com
Product Features
Application Security
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Open Source Component Monitoring
                                        
                                    
                                    
                                    
                                        Source Code Analysis
                                        
                                    
                                    
                                    
                                        Third-Party Tools Integration
                                        
                                    
                                    
                                    
                                        Training Resources
                                        
                                    
                                    
                                    
                                        Vulnerability Detection
                                        
                                    
                                    
                                    
                                        Vulnerability Remediation
                                        
                                    
                            
                        Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        Container Security
                                        Access Roles / Permissions
                                        
                                    
                                    
                                    
                                        Application Performance Tracking
                                        
                                    
                                    
                                    
                                        Centralized Policy Management
                                        
                                    
                                    
                                    
                                        Container Stack Scanning
                                        
                                    
                                    
                                    
                                        Image Vulnerability Detection
                                        
                                    
                                    
                                    
                                        Reporting
                                        
                                    
                                    
                                    
                                        Testing
                                        
                                    
                                    
                                    
                                        View Container Metadata
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        DDoS Protection
                                        DNS Amplification Protection
                                        
                                    
                                    
                                    
                                        DNS Reflection Protection
                                        
                                    
                                    
                                    
                                        High Network Capacity
                                        
                                    
                                    
                                    
                                        Illegitimate Traffic Recognition
                                        
                                    
                                    
                                    
                                        Infrastructure Protection (Layer 3/Layer 4)
                                        
                                    
                                    
                                    
                                        Post Attack Analysis
                                        
                                    
                                    
                                    
                                        Traffic Monitoring
                                        
                                    
                                    
                                    
                                        Website Protection (Layer 7)
                                        
                                    
                            
                        Load Balancing
                                        Authentication
                                        
                                    
                                    
                                    
                                        Automatic Configuration
                                        
                                    
                                    
                                    
                                        Content Caching
                                        
                                    
                                    
                                    
                                        Content Routing
                                        
                                    
                                    
                                    
                                        Data Compression
                                        
                                    
                                    
                                    
                                        Health Monitoring
                                        
                                    
                                    
                                    
                                        Predefined Protocols
                                        
                                    
                                    
                                    
                                        Redundancy Checking
                                        
                                    
                                    
                                    
                                        Reverse Proxy
                                        
                                    
                                    
                                    
                                        SSL Offload
                                        
                                    
                                    
                                    
                                        Schedulers
                                        
                                    
                            
                        Log Management
                                        Archiving
                                        
                                    
                                    
                                    
                                        Audit Trails
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Consolidation
                                        
                                    
                                    
                                    
                                        Data Visualization
                                        
                                    
                                    
                                    
                                        Event Logs
                                        
                                    
                                    
                                    
                                        Network Logs
                                        
                                    
                                    
                                    
                                        Remediation
                                        
                                    
                                    
                                    
                                        Syslogs
                                        
                                    
                                    
                                    
                                        Thresholds
                                        
                                    
                                    
                                    
                                        Web Logs
                                        
                                    
                            
                        Network Traffic Analysis (NTA)
                                        Anomalous Behavior Detection
                                        
                                    
                                    
                                    
                                        High Bandwidth Usage Monitoring
                                        
                                    
                                    
                                    
                                        Historical Behavior Data
                                        
                                    
                                    
                                    
                                        Identify High Network Traffic Sources
                                        
                                    
                                    
                                    
                                        Network Transaction Visibility
                                        
                                    
                                    
                                    
                                        Stream Data to IDR or Data Lake
                                        
                                    
                                    
                                    
                                        Traffic Decryption
                                        
                                    
                            
                        Web Application Firewalls (WAF)
                                        Access Control / Permissions
                                        
                                    
                                    
                                    
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Automate and Orchestrate Security
                                        
                                    
                                    
                                    
                                        Automated Attack Detection
                                        
                                    
                                    
                                    
                                        DDoS Protection
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        IP Reputation Checking
                                        
                                    
                                    
                                    
                                        Managed Rules
                                        
                                    
                                    
                                    
                                        OWASP Protection
                                        
                                    
                                    
                                    
                                        Reporting / Analytics
                                        
                                    
                                    
                                    
                                        Secure App Delivery
                                        
                                    
                                    
                                    
                                        Server Cloaking
                                        
                                    
                                    
                                    
                                        Virtual Patching
                                        
                                    
                                    
                                    
                                        Zero-Day Attack Prevention
                                        
                                    
                            
                        Product Features
Application Security
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Open Source Component Monitoring
                                        
                                    
                                    
                                    
                                        Source Code Analysis
                                        
                                    
                                    
                                    
                                        Third-Party Tools Integration
                                        
                                    
                                    
                                    
                                        Training Resources
                                        
                                    
                                    
                                    
                                        Vulnerability Detection
                                        
                                    
                                    
                                    
                                        Vulnerability Remediation
                                        
                                    
                            
                        Firewall
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Application Visibility / Control
                                        
                                    
                                    
                                    
                                        Automated Testing
                                        
                                    
                                    
                                    
                                        Intrusion Prevention
                                        
                                    
                                    
                                    
                                        LDAP Integration
                                        
                                    
                                    
                                    
                                        Physical / Virtual Environment
                                        
                                    
                                    
                                    
                                        Sandbox / Threat Simulation
                                        
                                    
                                    
                                    
                                        Threat Identification
                                        
                                    
                            
                        Network Security
                                        Access Control
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Firewalls
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Response
                                        
                                    
                                    
                                    
                                        VPN
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        Web Application Firewalls (WAF)
                                        Access Control / Permissions
                                        
                                    
                                    
                                    
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Automate and Orchestrate Security
                                        
                                    
                                    
                                    
                                        Automated Attack Detection
                                        
                                    
                                    
                                    
                                        DDoS Protection
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        IP Reputation Checking
                                        
                                    
                                    
                                    
                                        Managed Rules
                                        
                                    
                                    
                                    
                                        OWASP Protection
                                        
                                    
                                    
                                    
                                        Reporting / Analytics
                                        
                                    
                                    
                                    
                                        Secure App Delivery
                                        
                                    
                                    
                                    
                                        Server Cloaking
                                        
                                    
                                    
                                    
                                        Virtual Patching
                                        
                                    
                                    
                                    
                                        Zero-Day Attack Prevention
                                        
                                    
                            
                         
         
        