Best PT AF Alternatives in 2024

Find the top alternatives to PT AF currently available. Compare ratings, reviews, pricing, and features of PT AF alternatives in 2024. Slashdot lists the best PT AF alternatives on the market that offer competing products that are similar to PT AF. Sort through PT AF alternatives below to make the best choice for your needs

  • 1
    Cloudflare Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Cloudflare is the foundation of your infrastructure, applications, teams, and software. Cloudflare protects and ensures the reliability and security of your external-facing resources like websites, APIs, applications, and other web services. It protects your internal resources, such as behind-the firewall applications, teams, devices, and devices. It is also your platform to develop globally scalable applications. Your website, APIs, applications, and other channels are key to doing business with customers and suppliers. It is essential that these resources are reliable, secure, and performant as the world shifts online. Cloudflare for Infrastructure provides a complete solution that enables this for everything connected to the Internet. Your internal teams can rely on behind-the-firewall apps and devices to support their work. Remote work is increasing rapidly and is putting a strain on many organizations' VPNs and other hardware solutions.
  • 2
    AppTrana Reviews
    AppTrana, a fully managed Web app firewall, includes Web application scanning to identify application-layer vulnerabilities, instant and managed Risk-based Protection with its WAF and Managed DDOS, and Bot Mitigation service. Web site acceleration can also be provided with a bundled CDN, or can integrate with an existing CDN. All this is backed by a 24x7 managed security expert service that provides policy updates and custom rules with zero false positive guarantee. Only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report.
  • 3
    Alert Logic Reviews
    Alert Logic is the only managed detection and response (MDR) provider that delivers comprehensive coverage for public clouds, SaaS, on-premises, and hybrid environments. Our cloud-native technology and white-glove team of security experts protect your organization 24/7 and ensure you have the most effective response to resolve whatever threats may come.
  • 4
    Fortinet Reviews
    Fortinet, a global leader of cybersecurity solutions, is known for its integrated and comprehensive approach to safeguarding digital devices, networks, and applications. Fortinet was founded in 2000 and offers a variety of products and solutions, including firewalls and endpoint protection systems, intrusion prevention and secure access. Fortinet Security Fabric is at the core of the company's offerings. It is a unified platform which seamlessly integrates security tools in order to deliver visibility, automate, and real-time intelligence about threats across the network. Fortinet is trusted by businesses, governments and service providers around the world. It emphasizes innovation, performance and scalability to ensure robust defense against evolving cyber-threats while supporting digital transformation.
  • 5
    Fortinet FortiWeb Web Application Firewall Reviews
    FortiWeb WAF protects web applications and APIs from the OWASP Top 10, zero-day threats, and other application-layer attacks. It also includes robust features such as API discovery and protection, bot mitigation, threat analytics, and advanced reporting.
  • 6
    R&S Web Application Firewall Reviews
    R&S(r.Web Application Firewall) (WAF), when combined with a network firewall, significantly increases your company's security. This allows you to keep up-to-date with the demands of an IT infrastructure that is resilient and modern. Our web application firewall solution is a result of decades of experience and development. It effectively protects your corporate network from widespread attacks like SQL injections, zero-day exploits, cross-site scripting, Distributed Denial Of Service (DDoS), attacks at the application level, and SQL injections. Our web application firewall protects critical enterprise applications, including legacy apps, from complex attacks and also considers data protection regulations.
  • 7
    Barracuda Web Application Firewall Reviews
    Security for applications is becoming more complex. Barracuda makes it easy. Barracuda Web Application Firewall, a part Barracuda Cloud Application Protection is an integrated platform that brings together a wide range of interoperable capabilities and solutions to ensure application security. Barracuda's Web Application Firewall protects mobile apps, APIs and backends from a variety attacks, including zero-day threats, data loss, and application-layer DoS attacks. Barracuda Web Application Firewall is able to defeat the most sophisticated attacks on your web applications by combining signature-based policies, positive security, and robust anomaly-detection abilities. Barracuda Active DDoS Prevention is an add-on service to the Barracuda Web Application Firewall that filters out volumetric DDoS attacks before any reach your network and damage your apps.
  • 8
    AWS WAF Reviews
    AWS WAF is a web app firewall that protects your web applications and APIs from common web exploits that can affect availability, compromise security, consume excessive resources, or cause disruptions to the system. AWS WAF allows you to control how traffic is accessed your applications. You can create security rules that block common attack patterns such as SQL injection and cross-site scripting or rules that filter out specific traffic patterns. Managed Rules for AWSWAF is a pre-configured set that AWS or AWS Marketplace sellers can manage. They are easy to use and allow you to get started quickly. The Managed Rules of WAF address security issues such as the OWASP Top 10. These rules are updated regularly as new issues arise. AWS WAF comes with a fully-featured API that allows you to automate the creation, deployment and maintenance of security policies. AWS WAF is a service that allows you to pay only for the services you use. Pricing is determined by how many rules you deploy and the number of web requests your application receives.
  • 9
    Baidu AI Cloud Web Application Firewall (WAF) Reviews
    The Web Application Firewall, a web security product offered by AI cloud, can protect users against web attacks and help them customize access rules. It also improves the security of websites, businesses, and other online services. You can deploy WAF instances on individual web business entries using the original WAF framework. It protects the original site from hacker attacks, by bypassing the agent in the traditional cloud WAF Framework. The WAF can also be more convenient and effective in helping customers improve the security and availability of their websites by integrating cloud security big data. AI cloud security experts and operators can now get zero-day information on vulnerabilities for the first time. They can also update the web application fire wall rules library in a timely manner and mitigate the impact of zero-day vulnerabilities.
  • 10
    Barracuda CloudGen Firewall Reviews
    You can get comprehensive protection for both on-premises and multicloud deployments with the firewall built in or for the cloud. Advanced Threat Protection, which is cloud-hosted, detects and blocks advanced threats including zero-day attacks and ransomware attacks. With the help of a global threat network that is fed by millions data collection points, you can quickly protect yourself against the latest threats. Modern cyber threats like ransomware, advanced persistent threats, targeted attack, and zero-day threat require sophisticated defense techniques that combine accurate threat detection with quick response times. Barracuda CloudGen Firewall provides a comprehensive suite of next-generation firewall technologies that provide real-time protection against a wide range of network threats, vulnerabilities and exploits. This includes SQL injections and cross-site scripting, denial-of-service attacks, trojans and viruses, worms and spyware.
  • 11
    Modshield SB Reviews

    Modshield SB

    StrongBox IT

    $0.58 per hour
    Modshield SB Web Application Firewall, (WAF), Powered by Modsecurity & OWASP CRS is tailored to meet all your application security requirements. Modshield SB comes packed with security features that provide 360-degree protection for your hosting infrastructure and applications. Modshield SB is powered by the OWASP Core Ruleset and provides optimal protection against OWASP Top 10 threats vectors, automation protection, and protection against credential-stuffing attacks. Why Modshield SB Web Application firewall Modshield SB allows you to make commitments to your business users. It helps you to ensure Confidentiality, Integrity, and Availability of business apps. It's easier than ever to implement an enterprise-grade first line of defense for your applications. Modshield SB is powered by the OWASP Core Ruleset and protects all of your applications from the OWASP Top 10 threats. There is no need to maintain a separate Load Balancer. Modshield SB has a built-in load balancedr.
  • 12
    F5 BIG-IP Advanced WAF Reviews
    Advanced Web Application Firewalls (WAF) can protect your apps through behavioral analytics, proactive Bot Defense, and application layer encryption of sensitive data. F5 and Forrester have created an ROI Estimator to help you determine how Advanced WAF will improve your security posture while saving you money. The F5 F5 Big-IP Advanced WAF offers a powerful set security features to protect your Web Applications from attack. The F5 Advanced WAF offers a powerful set of security features that will keep your Web Applications safe from attack. These include Anti Bot Mobile SDKs, Credential Stuffing Threat Feeds, Proactive Bot Defense and Datasafe, to name a couple. Protect your APIs, apps, and data from the most common attacks including zero-day vulnerabilities and app-layer DoS, threat campaigns, application takesover, and bots.
  • 13
    Lumen Web Application Firewall Reviews
    Lumen(sm), Web Application Firewall protects data, employees, and customers with seamless security that deters hackers. LumenSM Web App Firewall provides critical web and application protection. It helps to prevent attacks and reduce downtime and costs by combining multiple defenses that pinpoint and prevent attacks without blocking customers. This adds an important layer of protection to your perimeter firewall infrastructure. It provides 24x7 monitoring that allows you to respond quickly and efficiently to new threats. By inspecting encrypted traffic and blocking malicious requests, it can identify leaks of sensitive data such as social security numbers and credit cardholder information. Analyze your current web applications to identify vulnerabilities. Also, perform an application security review to analyze your website to find potential flaws that could cause downtime.
  • 14
    WAPPLES SA Reviews

    WAPPLES SA

    Penta Security Systems, Inc.

    WAPPLES SA (software appliances) is a virtual web app firewall (WAF), that can be seamlessly integrated into cloud systems and other virtual environments. It is ideal for enterprises such as hosting providers and data centers, as well as SMBs such managed security service providers or private cloud business infrastructures. WAPPLES SA supports popular hypervisors such as XenServer and KVM.
  • 15
    NSFOCUS WAF Reviews
    Our WAF is a flexible component of defense-in depth security. It can be deployed as a stand-alone solution, integrated seamlessly with our ADS Series for enhanced protection or cloud-based for unmatched flexibility. Protect APIs against a variety of attacks. Detect and stop bots from accessing web applications. Analyze user behavior to identify and block malicious activity. Cloud-based deployment is easier to scale and manage. Virtually patch web application vulnerabilities without the need to update the application. Our cutting-edge WAF is designed to protect your applications from evolving threats. Our solution uses semantic analysis, intelligence analytics, threat information, and smart patches to identify and neutralize a wide range of web attacks including all OWASP Top 10 attacks, DDoS, etc.
  • 16
    open-appsec Reviews
    open-appsec is an open-source initiative that builds on machine learning to provide pre-emptive web app & API threat protection against OWASP-Top-10 and zero-day attacks. It can be deployed as add-on to Kubernetes Ingress, NGINX, Envoy and API Gateways. The open-appsec engine learns how users normally interact with your web application. It then uses this information to automatically detect requests that fall outside of normal operations, and sends those requests for further analysis to decide whether the request is malicious or not. open-appsec uses two machine learning models: 1. A supervised model that was trained offline based on millions of requests, both malicious and benign. 2. An unsupervised model that is being built in real time in the protected environment. This model uses traffic patterns specific to the environment. open-oppsec simplifies maintenance as there is no threat signature upkeep and exception handling, like common in many WAF solutions.
  • 17
    Oracle Web Application Firewall Reviews
    Protect your applications from unwanted and malicious internet traffic using a cloud-based, PCI compliant, global web application firewall service. Oracle Cloud Infrastructure Web Application Firewall combines threat intelligence with consistent rule enforcement to strengthen defenses and protect internet-facing applications servers. A web application firewall is a tool that combines threat intelligence from multiple sources, including WebRoot BrightCloud®, and more than 250 predefined OWASP and application rules. This allows you to adopt an edge security strategy. Access controls based on geolocation, whitelisted and blacklisted IP addresses as well as HTTP URL and HTTP header, protect Oracle Cloud Infrastructure applications on-premises and in multicloud environments. You can identify and block malicious bot traffic using an advanced set verification methods, such as JavaScript, CAPTCHA and device fingerprinting.
  • 18
    Imperva WAF Reviews
    Web application attacks can prevent sensitive data being stolen and prevent transactions from being made. Imperva Web Application Firewall analyzes traffic to your application to stop these attacks and ensure uninterrupted operations. You must choose whether to block legitimate traffic or manually limit attacks that your WAF allows through. Imperva Research Labs guarantee accuracy for WAF customers when the threat landscape changes. Your security teams can use third-party code with no risk and speedy rule propagation to create policies. Imperva WAF is an integral part of a comprehensive Web Application Protection (WAAP), stack that protects from edge to databank. This ensures that you only receive the traffic you need. We offer the best website protection in industry - PCI compliant, automated security that integrates analysis to go beyond OWASP Top 10 coverage and reduces third-party code.
  • 19
    UltraWAF Reviews
    Vercara UltraWAF, a cloud-based service for web application protection, protects against threats at the application layer. UltraWAF, a cloud-based WAF, protects applications against data breaches, defacements and malicious bots. UltraWAF simplifies operations by allowing you to configure rules consistently, regardless of where your applications are hosted. There are no restrictions on hardware or providers. UltraWAF provides your company with the adaptable security features it needs to counteract network and application-layer threats such as SQL injection, XSS and DDoS. Its cloud-based scalability and always-on security posture ensure comprehensive protection against the OWASP Top 10, advanced bot management and vulnerability scanning.
  • 20
    Tencent Cloud Web Application Firewall Reviews
    AI+ rules are used to recognize web attacks. It is anti-bypass, low in false negative and false positiv rates, and it is also anti-bypass. It protects against common web attacks such as cross-site request forgery and SQL injection. Users can save core web content to the cloud and publish cached pages. This can be used as a substitute and prevents the negative consequences of page tampering. Pre-event server concealing and application prevention, mid-event attack protection and post-event sensitive information replacement and concealment ensure that backend data is protected. WAF conducts a nationwide DNS verification of domain names submitted to it by customers to detect and display the hijacking conditions for protected domain names in different regions. This helps avoid data theft and financial loss due to website users being hijacked.
  • 21
    Kona Site Defender Reviews
    Protect your APIs and apps from the most sophisticated and advanced attacks with a web application firewall. Kona Site Defender provides application security right at the edge. It is closer to attackers, but further away from your applications. Akamai has unmatched visibility into attacks and delivers highly targeted WAF protections that keep pace with the latest threats. Flexible protections allow you to protect your entire application footprint and adapt to changing business requirements. Kona Site Defender uses a proprietary anomaly detection engine to ensure the best accuracy. Application security must be customizable to meet your needs and those of the organizations you serve.
  • 22
    AppWall Reviews
    AppWall – Radware's Web Application Firewall, (WAF), ensures secure and reliable delivery of mission-critical Web apps and APIs to corporate networks and the cloud. AppWall is a PCI compliant, NSS-recommended, ICSA Labs-certified and PCI compliant WAF. It combines positive security models with negative security models to provide complete protection against access violations, web application attacks, attacks disguised behind CDNs and API manipulations, advanced HTTP attack (slowloris, dynamic floodings), brute force attacks of login pages, and many other threats. AppWall, Radware's web and API protection solution suite, is a patent-protected technology that creates and optimizes security policies in real time for maximum security coverage. It requires minimal operational effort and has the lowest false positives. Radware's Web-based security technology offers a variety deployment options.
  • 23
    K2 Security Platform Reviews
    Protection for applications and container workloads. Real-time Zero Day Attack Prevention. K2 Security Platform is highly efficient in detecting sophisticated attacks against applications that are often not detected by endpoint security solutions like endpoint detection and reaction (EDR) or web application firewall (WAF). K2's non-invasive, easy-to-use agent is quick and easy to install. K2 Platform uses a deterministic technique called optimized control flow integrity (OCFI). The platform automatically creates a DNA mapping of each application at runtime. This is used to determine if the application is running correctly. This allows for extremely accurate attack detection, eliminating almost all false alarms. K2's Platform is available in cloud, on-premise, hybrid environments, and protects web applications as well as container workloads and Kubernetes. OWASP Top 10, and other sophisticated attack types coverage.
  • 24
    Huawei WAF Reviews

    Huawei WAF

    Huawei Cloud

    $615 per month
    Web Application Firewall (WAF), protects your web applications. WAF is powered by Huawei's deep machine-learning technology. It detects malicious traffic and blocks attacks, strengthening your network's defense in depth. You can set up a variety of rules to protect your web applications from threats. To protect your web applications, you can anonymize sensitive data and set the minimum TLS version. WAF can protect your web applications from the latest zero-day exploits. You will have 24/7 monitoring by professional security teams. WAF complies fully with the PCI DSS requirements. You can apply for and receive PCI DSS certification by using WAF as part of your defense strategy. WAF can be configured to detect malicious code being injected into web servers, and to ensure secure visits to web sites.
  • 25
    Alibaba Cloud WAF Reviews
    Web Application Firewall (WAF), protects your website servers from intrusions. Our service blocks malicious traffic to your websites and applications. WAF protects your core business data, and prevents server malfunctions due to malicious activities or attacks. Alibaba Cloud WAF is an application firewall that monitors and filters HTTP traffic between web applications. Alibaba Cloud WAF is built on the huge data resources of Alibaba Cloud Security and helps to protect against common web attacks like SQL injections, Cross site scripting (XSS), Trojan, and unauthorized entry. It also filters out large HTTP flood requests. It protects web resources and ensures website availability and security. This video will show you how to set up and use Web Application Firewall. We will demonstrate WAF in action and how WAF can be used to protect websites.
  • 26
    F5 BIG-IP Next WAF Reviews
    BIG-IP Next WAF is a containerized environment that provides continuous protection for web apps. It simplifies management and ensures superior security. Advanced capabilities make it simple to identify and mitigate threats. Save time by reducing the initial tuning phase and completing configuration workflows. You can also quickly enter blocking mode. With actionable dashboards for incidents across multiple policies, you can simplify detection and response to threats. Maintain consistent app-security policies across environments – whether in the datacenter, at the edge or on the public cloud. To increase security coverage, you can purchase additional licenses through a simple platform mechanism. Defend against known vulnerabilities and common attack vectors. F5's expert threat researchers can automatically mitigate active attack campaigns by deploying intelligent updates. Deliver contextual awareness to your users by blocking and identifying known bad IP addresses.
  • 27
    Cloudbric Reviews
    Our cloud SWAP has been vetted as one of the best solutions to threats such as cross site scripting (XSS), SQL injections, and Distributed Denial of Service. Cloudbric's logic-based SWAP, which includes pattern matching, semantic, heuristic analysis, and core rulesets, is fully automated and simple to use. This means that there is no need to update security policies or sign signatures often. Private WAF deployments can also be customized with customization options. Our service ensures your website. Your website will remain online and be protected from distributed denial-of-service attacks (DDoS). Cloudbric actively blocks layers 3, 4 and 7 DDoS attacks that can scale up to 20Tbps*
  • 28
    Cisco Secure DDoS Protection Reviews
    Take a look at our award-winning service and flexible deployment options. Your online business must be accessible 24x7x365 to customers and partners in today's digital economy. With the lowest false positive rate in industry, adaptive algorithms based on behavioral principles block attacks that have never been seen before. It accurately distinguishes legitimate traffic from malicious traffic, which allows for advanced SLA and increases service availability. Comprehensive protection prevents abnormal flows from consuming network resources and affecting application availability. Hybrid, always-on, and on-demand? We offer organizations the most comprehensive security protection against today's DDoS attacks. There are many options available, including WAF, threat intelligence and advanced analytics, SSL traffic inspection and cloud signaling, hybrid DDoS protection, and SSL traffic inspection. Cisco Firepower 4100 Series appliances and 9300 appliances are equipped with Virtual DefensePro (vDP) for enterprise-grade DDoS mitigation capabilities.
  • 29
    Fastly Next-Gen WAF Reviews
    Fastly Next-Gen provides advanced protection to your applications, APIs and microservices from a single, unified solution. Reporting and feedback loops give you Layer 7 visibility of your entire API footprint and app. Integrations with DevOps toolchains and security tools encourage data sharing and correlation, and simplify automation. This reduces security risks while speeding up CI/CD. SmartParse is a highly accurate detection technique that allows our Next-Gen WAF to evaluate context and execution of each request to determine if it contains malicious or anomalous payloads. SmartParse allows for near-zero tuning, and the ability to detect threats immediately. Block account takeover attacks (ATO) by inspecting web request and correlating anomalous behavior with malicious intent.
  • 30
    Trustwave Managed Web Application Firewall Reviews
    Your security team may require additional assistance to stop cybercriminals from exploiting attack surfaces. Trustwave's Managed Web Application Firewall service expands your security team with the assistance of security specialists in our worldwide Security Operation Centers. These experts provide local coverage across a variety of security disciplines. Your web applications will be protected 24/7 by transferring complex, labor-intensive security operations from one point of contact. A managed web application firewall will protect your mission-critical web applications. It will prevent vulnerabilities being exploited, and allow you to focus on your core business. You can now outsource the labor-intensive security operations to one point of contact with industry experts and keep your web apps secure.
  • 31
    MONITORAPP AIWAF Reviews
    Web Application Firewall (WAF) AIWAF. Security breaches are most common on the internet. To protect against web attacks, a dedicated firewall system is necessary. AIWAF strongly defends against various web attacks. Web security is not an option. It's essential. The web is vulnerable. Many attacks can be carried out through the web because the HTTP/HTTPS ports need to be open in order to display the Web to clients. MONITORAPP's web app firewall, AIWAF, is specialized in traffic-based detection and control of server access. Web attacks are constantly evolving, causing malicious traffic and falsifying request information. Only WAF can do the right things if it does not stop development to address new types of web attack. AIWAF in MONITORAPP is the answer. Protect web attacks with our patented adaptive profiling technology.
  • 32
    Wallarm WAF Reviews

    Wallarm WAF

    Wallarm

    $50,000 per year
    Wallarm Advanced WAF protects websites and APIs from OWASP Top 10 bots and application abuse. There is no need to configure rules and there are very few false positives. Protect against all types of threats. XSS, XXE and SQL Injections. RCE and other OWASP Top 10 Threats. Brute-force attacks, Dirbusting, and Account Takeover (ATO) are all possible. Application abuse, logic bombs, and bots. 88% of customers use Wallarm Advanced Cloud Native WAF in blocking mode. Automatically created rules that are not signed and tailored for each application. High-quality, reliable, and highly available filtering nodes. You can deploy in any cloud. Modern tech stack support: Docker, Kubernetes, websockets. DevOps toolchain manages and scales it.
  • 33
    Azure Web Application Firewall Reviews

    Azure Web Application Firewall

    Microsoft

    $0.443 per gateway per hour
    Azure Web Application Firewall, a cloud-native solution, protects web applications from common web hacking techniques like SQL injection and security flaws such as cross-site-scripting. The service can be deployed in minutes and will give you complete visibility of your environment. Protect your web applications with the latest preconfigured and managed rule sets in only a few moments. Azure Web Application Firewall's detection engine, combined with updated rules, increases security, reduces the number of false positives and improves performance. Azure Policy can be used to enforce organizational standards, and assess compliance for Web Application Firewall resource at scale. Get an aggregated overview of your environment.
  • 34
    Smoothwall Firewall Reviews
    Smoothwall Firewall provides anti-malware protection, HTTPS inspection and anonymous proxy detection & blockage, as well as intrusion detection and prevention. Smoothwall Filter can be combined with Smoothwall Firewall to provide an all-in-one protection package. You can purchase them separately or combine them to create a unified threat management system. Combining Layer 7 application control, perimeter firewall, and stateful packet inspection to provide Next Generation firewall functionality. Smoothwall is a Category 2 E-Rate eligible firewall service provider. Combines with Smoothwall filter - the only fully-content-aware web filter in US education. You can choose which Filter deployment method is best for you. Our US-based customer service team is education specialists and available whenever you need them.
  • 35
    Qualys WAF Reviews
    Qualys Web App Firewall (WAF), a virtual appliance-based service, reduces operational costs and simplifies application security. It uses a unified platform to continuously detect and patch web application vulnerabilities using inhouse inspection rulesets and logics. Its simple, adaptable, and adaptable approach allows you to quickly block web app attacks, prevent disclosure of sensitive data, and control where and when your applications are accessed. Qualys WAF is available as a standalone tool or in combination with Qualys Web Application Scanning. They make it easy to identify. You can easily mitigate web application risks, no matter how many apps you have. Qualys WAS scans your web applications and deploys virtual patches in a click for identified vulnerabilities in WAF. All this is done from a central cloud-based portal. Qualys WAF is easy to deploy and supports SSL/TLS.
  • 36
    Bekchy Reviews

    Bekchy

    Bekchy

    $9.99 per month
    Protects websites. Works in front of web application server servers. Creates firewalls and blocks incoming attack. Protect Your Website. 7/24 offers protection against SQL Injection and XSS, File Uploads, JS Injection, Tamper Data, and many other attack methods. Easy Management and Instant Reporting. Access BEKCHY Panel from your smartphone, tablet or computer. You can also check the current status of your website. All input fields (login, password forgotten etc.) are protected Smart Brute Force will protect all the information you need. Protect against single-use email, blacklisted IPs and fake redirects. There are 67 different antivirus programs (readymade codes, JavaScripts etc. Bekchy can detect bad codes that have been injected into your website. Protection against any type of penetration that aims to deceive your website visitors or search engine bots. Access BEKCHY Panel is easy to access from your smartphone, tablet, or computer.
  • 37
    Airlock Reviews
    Airlock's Secure Access Hub protects apps, APIs, and data from identity theft. Airlock combines security and convenience. It offers customers a seamless customer journey with single sign-on, social login, comprehensive user self service, consent management, and comprehensive user self-services. Reacting quickly is key to being in tune with the market. The Airlock Secure Access hub provides all necessary security functions, including registration, authentication, and self-services. You can focus all your IT resources on your business processes so you can use your IT resources more effectively. The Airlock Secure Access hub helps you meet all international compliance standards, including GDPR, PSD2, PCI–DSS and OWASP. The compliance of regulations is made easier by the inclusion of access policies onto applications and services.
  • 38
    A10 Thunder ADC Reviews
    Advanced load balancing solution for high-performance applications that ensures your applications are highly available, accelerated, secure, and reliable. Ensure reliable and efficient application delivery across multiple datacenters. Reduce latency and downtime and improve the end-user experience Advanced SSL/TLS offload, single-sign-on (SSO), DDoS protection, and Web Application Firewall capabilities increase application security. Integrate the Harmony™, Controller to gain per-application visibility and complete controls for secure application delivery across public, private, and hybrid clouds. Full-proxy Layer 4 and Layer 7 loadbalers with flexible aFleX® scripting, customizable server health checks and customizable server monitoring. High-performance SSL Offload with the most current SSL/TLS encryption enables secure and optimized application service. Global Server Load Balance (GSLB), extends load balancing to a global level.
  • 39
    VMware Avi Load Balancer Reviews
    Software-defined load balancers and container ingress services simplify application delivery for any application, in any datacenter and cloud. Simplify administration by implementing centralized policies that ensure operational consistency in hybrid clouds and on-premises datacenters, including VMware Cloud, AWS, Azure and Google Cloud. Self-service enables DevOps to free infrastructure teams from manual tasks. The toolkits for application delivery automation include Python SDKs, RESTful APIs and Terraform and Ansible integrations. With real-time monitoring of application performance, closed-loop analysis and deep machine-learning, you can gain unprecedented insights into network, end-users and security.
  • 40
    ThreatSign Website Anti Malware Reviews
    Real-Time Monitoring: Our system continuously scans your web assets for any suspicious activity. We monitor incoming traffic, detect anomalies, and respond swiftly to potential threats. Advanced Threat Detection: ThreatSign employs cutting-edge algorithms to identify various cyber threats, including SQL injection attacks, cross-site scripting (XSS), and more. Our intelligent system learns from patterns and adapts to new threats. Incident Response: In the event of an attack, our team of experts jumps into action. We analyze the situation, mitigate the impact, and restore normalcy. You can rest assured that your business is in capable hands. Customized Solutions: We understand that every business has unique security needs. Our services are tailored to fit your specific requirements. Whether you’re a small e-commerce site or a large enterprise, we’ve got you covered. 24/7 Support: Need assistance? Our support team is available round-the-clock. Reach out to us anytime, and we’ll address your concerns promptly.
  • 41
    F5 Distributed Cloud WAF Reviews
    Our SaaS-delivered WAF can mitigate web app attacks and vulnerabilities by providing comprehensive security controls, uniform policy, and observability. It is quick to deploy and manage and scales across any environment. Simplify app protection by integrating core security functionality into the development process. This is done with centralized orchestration and oversight. F5 Distributed Cloud Waf reduces the complexity and burden of consistently securing applications across clouds, on premises, and edge locations. SecOps and DevOps can work together to deliver the programmability and oversight that SecOps demands, enabling faster and more secure application release cycles. Improve visibility and insight into all security events, including WAF signatures, DoS events and automated and persistent threats. Also, all other client interactions, app performance and intuitive drill-down capabilities.
  • 42
    WebARX Reviews
    Protect websites from plugin vulnerabilities. WebARX is more than a security plugin. Our lightweight web application firewall blocks malicious traffic. WebARX firewall engine allows you to create your own firewall rules. Monitor your websites for security vulnerabilities and issues. WebARX is constantly updated and helps you to adapt the most recent security practices. You can generate weekly security reports and be alerted if anything is urgent.
  • 43
    Reblaze Reviews
    Reblaze is a cloud-native, fully managed security platform for websites and web applications. Reblaze’s all-in-one solution supports flexible deployment options (cloud, multi-cloud, hybrid, DC), deployed in minutes and includes state-of-the-art Bot Management, API Security, next-gen WAF, DDoS protection, advanced rate limiting, session profiling, and more. Unprecedented real time traffic visibility as well as highly granular policies enables full control of your web traffic.
  • 44
    Myra Security Reviews

    Myra Security

    Myra Security

    1500 €/month
    The German technology manufacturer Myra offers a secure, certified Security-as-a-Service platform for protecting digital business processes. Our highly certified Security-as-a-Service platform protects your digital business processes against a wide range of risks such as DDoS attacks, bot networks and attacks on databases. We are experts in protecting critical infrastructures, particularly in the financial, insurance, healthcare, and public sectors. Myra technology has been certified by the German Federal Office for Information Security according to ISO 27001 standards based on IT Grundschutz (Basic IT Protection).
  • 45
    Symantec WAF Reviews
    Symantec Web Application Firewall and Reverse Proxy are built on the industry-leading ProxySG platform. They secure and accelerate web and mobile applications. Mobile and web applications are used in almost every aspect of business operations and are trusted environments for mission-critical business apps. Web server infrastructures are now facing more complex threats than Intrusion Prevention Systems (Load Balancers) and Next-Generation Firewalls (NGF). Symantec Web Application Firewall and Reverse Proxy address these new threats head-on. They provide robust security, next-generation content detection engines, high-performance content delivery, and operational simplicity. Our solutions are built on secure proxy architecture and allow organizations to accelerate and secure their web mobile apps to end users, customers and employees.
  • 46
    dotDefender Reviews
    dotDefender Web Application Security. dotDefender is the leading software Web Application Firewall (WAF) on the market. dotDefender offers enterprise-class security, advanced integration capabilities and low total cost ownership (TCO). dotDefender is the best choice to protect your website and web applications. Application and Infrastructure Independent dotDefender is available wherever your business requires it. No matter what web application your business uses, Windows or Linux-based, whether you use dedicated servers, virtual machines or cloud services, dotDefender Web app security can protect your business today. Applicure, or one of our global partners, can provide a perpetual or an annual license for dotDefender. Software as a Service is also available through our global hosting and managed service partners.
  • 47
    Haltdos  Reviews
    Haltdos ensures the 100% high availability of your website/web services by providing intelligent Web Application Firewall and application DDoS mitigation, Bot Protection, SSL offloading, Load Balancing solution over the public and private cloud that monitors, detects, and automatically mitigates a wide range of cyber-attacks including OWASP top 10 and Zero-day attacks, without requiring any human intervention.
  • 48
    BunkerWeb Reviews
    BunkerWeb, a Web Application Firewall of the next generation and open source (WAF), is a powerful tool. It is a full-featured server that uses NGINX as its backend. This will make your web services "secure by default". BunkerWeb integrates seamlessly with your existing environments, including Linux, Docker Swarm, Kubernetes ...), and is fully configurable. BunkerWeb makes cybersecurity a breeze. BunkerWeb includes primary security features in its core, but can be easily expanded with additional ones using a plugin system).
  • 49
    Atomic ModSecurity Rules Reviews
    Atomic ModSecurity Rules are a comprehensive WAF set that includes hundreds of ModSecurity WAF Rules to protect applications from web attacks. They are fully supported by expert support. WAF Rules to Strengthen ModSecurity against: - SQL injection - Cross-site scripting Cross-site request forgery - Coding abuse - Protocol abuse Unicode and UTF-8 Attacks - HTTP smuggling - Path recursion Web spam Shells - And many more * Atomicorp is the creator of the first ModSecurity rules set. They also maintain the largest number active WAF rules that support all server types, from Tomcat and Nginx through IIS, LightSpeed, Apache and IIS. * Atomic ModSecurity Rules, the most comprehensive WAF rules set in the industry and have the highest quality. Expert support is available. ****** More info: https://www.atomicorp.com/atomic-modsecurity-rules/ *******
  • 50
    Azure Front Door Reviews
    Secure and scalable entry point for rapid delivery of global applications. You can easily join your distributed microservices architectures into one global application by using HTTP load balancing, path-based routing rules, and path-based routing. Automate scaling out and turning up new regions with API-driven global actions. You can also have independent fault tolerance to your back end microservices anywhere in Azure. A "battle-tested service" built on the Microsoft Global Network infrastructure will deliver and protect your global app to your users. Edge load balancing and application acceleration will ensure that your traffic is always on the best path to your app. This will help you increase your service scale, reduce latency and increase throughput for global users. One global dashboard allows you to manage domain mapping and traffic to microservice backends.