Best IT Security Software for Escape

Find and compare the best IT Security software for Escape in 2024

Use the comparison tool below to compare the top IT Security software for Escape on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Datadog Reviews
    Top Pick

    Datadog

    Datadog

    $15.00/host/month
    7 Ratings
    Datadog is the cloud-age monitoring, security, and analytics platform for developers, IT operation teams, security engineers, and business users. Our SaaS platform integrates monitoring of infrastructure, application performance monitoring, and log management to provide unified and real-time monitoring of all our customers' technology stacks. Datadog is used by companies of all sizes and in many industries to enable digital transformation, cloud migration, collaboration among development, operations and security teams, accelerate time-to-market for applications, reduce the time it takes to solve problems, secure applications and infrastructure and understand user behavior to track key business metrics.
  • 2
    F5 BIG-IP DDoS Hybrid Defender Reviews
    Comprehensive DDoS protection at the application layer and network level. Flexible and scaleable for hybrid, out-of-band and inline deployments. Traditional DDoS solutions are limited to a narrow range. They are only partially effective because they black-hole or limit the rate at which legitimate users can connect to them in network layer (or flood attack) attacks. They are blind to SSL traffic and dependent upon their placement in the network during application layer attacks. When the Internet bandwidth is cut off, all on-premise defenses are rendered ineffective. F5 BIG-IP DDoS Hybrid Defender offers a deeper level of protection. It is the only multi-layered defense that protects against sophisticated application attacks and blended network attacks. It also enables full SSL encryption, anti-bot capabilities and advanced detection methods all in one appliance.
  • 3
    OAuth Reviews

    OAuth

    OAuth.io

    $19 per month
    You can focus on your core app to get to market faster. OAuth.io handles all aspects of identity infrastructure, maintenance, security overhead, so your team doesn’t have to. OAuth.io makes identity easy. You can choose from a variety of identity providers, add custom attributes and customize your login page. Or, you can use our widget to integrate with your app. Identity solved in minutes. Our easy-to-use dashboard allows you to manage your users. You can find and manage users, reset passwords and enforce two-factor authentication. You can also add permissions and memberships through OAuth.io’s user management. Full-featured, highly secure user authentication with tokens or passwords. OAuth.io can handle all aspects of user authorization modeling, from multi-tenant to complex permissions. Our popular integrations can be used to force a second factor for user authentication.
  • 4
    OWASP Threat Dragon Reviews
    OWASP Threat Dragon is a modeling program that creates threat model diagrams as part a secure development cycle. Threat Dragon adheres to the principles and values of the threat modeling manifesto. It can be used to identify possible threats and determine their mitigations. It also provides visual information about the threat model components as well as threat surfaces. Threat Dragon can be used as a web or desktop application. The Open Web Application Security Project is a non-profit foundation that works to improve software security. Anyone interested in improving the security of applications can access all our tools, documents, forums and chapters at no cost.
  • Previous
  • You're on page 1
  • Next