15 years helping Irish businesses
choose better software
Website Security Software
Website Security software allows businesses to protect their websites and web-based applications from cyber threats such as malware, DDoS, phishing, password, and cross-site scripting attacks.
Filter Results (70)
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
Ireland
Pricing Options
70 results
GlitchSecure is real-time continuous security testing platform that you helps identify and remediate software vulnerabilities.
Learn more about GlitchSecure
GlitchSecure is a real-time continuous security testing platform that helps you find and remediate software vulnerabilities and prevent breaches through year round security testing, expert driven insights, and verified reports to eliminate false positives.
Go beyond a point in time pentesting and get a real-time assessment of your security posture while continually monitoring your assets for vulnerabilities.
Learn more about GlitchSecure
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Netacea provides a revolutionary agentless bot management solution that protects websites, mobile apps and APIs from malicious bots.
Learn more about Netacea Bot Management
Netacea’s advanced bot management solution provides industry leading real time bot protection & mitigation against the most sophisticated automated attacks. Ranked #1 for Bot Detection, our AI-powered technology analyzes all website, app and API traffic with a single agentless deployment, revealing malicious intent and autonomously preventing impact to your business without impacting the flow of genuine human traffic.
Learn more about Netacea Bot Management
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control.
Learn more about ESET Endpoint Security
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Learn more about Cloudflare
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Easy to use, fast and reliable web hosting services for everyone who wants to start their online journey.
Start your online journey with fast and secure web hosting that enables you to take the Internet by storm.
At Hostinger, you can choose from various web hosting-related services that include Domain Registration, Cloud Hosting, Email Hosting, SSL Certificate, and LiteSpeed Servers.
Learn more about Hostinger
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Datadog is a service that helps increase uptime and maximize the performance of services through centralized monitoring and alerting.
Datadog is a SaaS-based monitoring, security, and analytics platform for cloud-scale infrastructure, applications, logs, and more. The platform assists organizations in improving agility, increasing efficiency and providing end-to-end visibility across dynamic or high-scale infrastructures. By collecting metrics and events from 400+ out of the box services and technologies, Datadog enables Dev, Sec, and Ops teams to ensure application uptime and accelerate go-to-market efforts.
Learn more about Datadog
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Malwarebytes for Teams protects against malware, ransomware, viruses, hackers, and other established and emerging cyberthreats.
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage. (Ransomware attacks on businesses went up 365 percent in 2019.) Stop resource hogging threats from slowing down your devices so you can work faster and get more done, every day. One convenient and practical cybersecurity solution for all your office devices: Windows, Mac, Chromebook, and Android.
Learn more about Malwarebytes for Teams
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review.
We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments.
Learn more about DNSFilter
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Kount's Identity Trust Global Network delivers fraud prevention and personalized customer experiences for over 9,000 leading brands.
Powered by its Identity Trust Global Network , Kount, An Equifax Company, links billions of trust and fraud signals to protect every interaction from account creation and login to payments and disputes.
Businesses use Kount to increase approval rates, reduce chargebacks, stop bot attacks, prevent account takeover, and manage disputes all within a single platform. With Kount, businesses get both hands-free automation and flexible controls for more accurate decisions.
Learn more about Kount
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents.
Orca Security is the industry-leading agentless Cloud Security Platform for AWS, Azure, Google Cloud and Kubernetes that identifies, prioritizes, and remediates risks. Orca saves your time by connecting to your environment in minutes with patent-pending Sidescanning technology to provide complete coverage across vulnerabilities, malware, misconfigurations, lateral movement risks, weak and leaked passwords, and overly-permissive identities.
Learn more about Orca Security
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Protects your websites, mobile apps, and APIs from bad bot attacks with zero user friction.
GeeTest, a CAPTCHA and bot management provider, protects websites, mobile apps, and APIs from automated bot-driven attacks, like ATO, credential stuffing, web scalping, etc.
GeeTest has been developing human-bot verification technology since 2012. Now it processes 2.9 billion CAPTCHA requests daily and serves 320,000+ companies in sectors like blockchain, online games, e-commerce, etc. GeeTest CAPTCHA has been recognized by Gartner and Forrester in market reports for the third year since 2020.
Learn more about GeeTest CAPTCHA
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact.
The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase.
Learn more about Beagle Security
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
Learn more about ConnectWise SIEM
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
We make it easy to secure your cloud transformation. Get fast, secure, and direct access to apps without appliances.
Built in the cloud, The Zscaler Zero Trust Exchange is an integrated platform of services that secures all user-to-app, app-to-app, and machine-to-machine communications—over any network and any location.
Learn more about Zscaler
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications.
With Acunetix, security teams can:
- Save time and resources by automating manual security processes
- Work more seamlessly with developers, or embrace DevSecOps by integrating directly in
Learn more about Acunetix
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Protect your equipment from digital threats. Complete security for small and medium businesses.
This cybersecurity solution includes:
Online identity protection, antivirus and antispyware, antispam, protection against public networks, remote administration, web access control, USB device control, corporate mobile management and more.
It allows combining protection from 5 to 25 computers + 5 smartphones + 1 or 2 file servers; all options include the remote administration tool.
Learn more about ESET Home Office Security Pack
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Designed to adapt — secure network access solutions tailored to evolving business needs.
Focusing on the corporate network, employee & device protection, it is easy to forget the importance of website security. Not secured properly, an exposed website can lead to hacks and reputational damage due to leaked customer data and compromised online company presence. Companies can use NordLayer prevention measures by establishing a dedicated IP to hide the company website from hostile actors to avoid the impact of a taken offline website, malicious code injection, or fraud.
Learn more about NordLayer
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Dark Web ID monitors the dark web and instantly alerts you when compromised business or personal credentials are found.
Dark Web ID helps MSPs and internal IT teams protect their organizations and customers from cybersecurity breaches by monitoring the dark web 24/7/365 and issuing alerts when any sensitive company or employee data or passwords are found up on the dark web.
Learn more about Dark Web ID
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Premium Application Hosting, Database Hosting, and Managed WordPress Hosting powered by Google Cloud Platform.
At Kinsta, we make running projects of all sizes quick and seamless, with our Application Hosting, Database Hosting, and Managed WordPress Hosting. Our hosting is for all types of projects, from small blogs to Fortune 500 customers, and we serve 55,000+ users from 128 countries around the globe through our 35 data centers.
Learn more about Kinsta
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.
Learn more about Wordfence
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Comprehensive website security from AppTrana protects your site from malicious attacks and 0-day exploits while ensuring always-on site
AppTrana provides the best website security solution in the industry – an automated security scan to identify all the threats, a WAF to block harmful attacks and bots before it reaches your site, and a secure CDN to accelerate your site speed. With multi-layered security solutions that combine threat intelligence, behavioral analysis, and experts’ penetration testing, it delivers far more comprehensive protection to go beyond the OWASP top 10 with zero false positives.
Learn more about AppTrana
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
Learn more about SiteLock
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Hackrate is a bug bounty platform that helps companies reduce cybersecurity risks by using the power of the global hacker community.
Hackrate Bug Bounty platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company.
A bug bounty is about using the power of crowdsourced security to secure your business. During a bug bounty program, a company offers rewards to ethical hackers for reporting vulnerabilities.
Learn more about Hackrate Bug Bounty Platform
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Cloud-based solution that helps businesses secure websites and track their performance.
Cloud-based solution that helps businesses secure websites and track their performance.
Learn more about Jetpack
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Invicti, formerly Netsparker, is a comprehensive automated web vulnerability scanning solution.
Invicti, formerly Netsparker, is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Invicti allows organizations with complicated environments to automate their web security with confidence.
Learn more about Invicti
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
DataDome’s award-winning bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise.
DataDome’s bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. Our machine learning solution analyzes 3 trillion signals per day to adapt to new threats in real time. Our 24/7 SOC experts protect hundreds of high-profile brands worldwide, including Reddit, Patreon, and Angelist. A force multiplier for IT and security teams, DataDome is fully transparent, easy to deploy, and frictionless for consumers.
Learn more about DataDome
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Continuous protection for your evolving IT environment, multiplatform cyber risk management and 24/7 ESET expertise on call.
ESET's MDR service represents the most densely multilayered and effective cybersecurity approach in the world. The MDR service takes ESET's cutting-edge technology and augments it with hands-on expertise, delivered 24/7/365, ensuring antimalware technology and strategy are perfectly aligned. With full XDR capabilities thanks to ESET Inspect, the XDR-enabling component, this is the optimal approach to securing your enterprise.
Learn more about ESET PROTECT MDR
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
We make the most complete hosting with great tools, fanatical support, and fast servers on AWS.
We make the most complete hosting with great tools, fanatical support, and fast servers on AWS.
In just a few clicks you can create an incredible website, install your own WordPress or set up several highly available Cloud VPS to take your site to unlimited levels of growth.
All our services includes free domain, optimized PHP, SSL certificate, S3 backups, NodeJS, Cloudflare Enterprise CDN and premium features, managed via cPanel and mobile App.
Learn more about WNPower
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
INLYSE Malware.AI is an AI-based security platform that quickly detects malware and cyber-attacks.
INLYSE Malware.AI is a visual AI-based malware detection solution that uses cutting-edge technology to convert files into graphical representations and detect even unknown malware before it can harm your device. Our self-learning algorithms and deep neural networks are capable of recognizing even the most advanced malware, cyber-attacks, zero-day exploits, and APT attacks within seconds. We offer a range of plugins to suit your specific needs, all starting at $2.50 per user per month.
Learn more about INLYSE Malware.AI
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Website security solution that offers malware scanning, annual site cleanup and remediation, firewall, SSL certificate, and more.
Website security solution that offers malware scanning, annual site cleanup and remediation, firewall, SSL certificate, and more.
Learn more about GoDaddy Website Security
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Our aim is to make cybersecurity understandable, affordable and manageable for everyone.
Your users and visitors depend on you to keep their information safe.
If you want to be sure of your website security, Security for Everyone is the tool for you.
With S4E, you will have:
1- Manual Vulnerability Scanning
2- Automated Vulnerability Scanning
3- Vulnerability Scanning API
Additionally, you can check your website security regularly with our web application penetration testing service performed by our highly trained cybersecurity experts who have 35+ years of experience collectively.
Learn more about Security for Everyone
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence.
Learn more about Netskope Active Platform
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Radware® (NASDAQ: RDWR), a leading provider of cybersecurity and application delivery solutions, acquired ShieldSquare in March 2019.
Radware Bot Manager (formerly ShieldSquare) is a non-intrusive API-based Bot Management solution to detect, eliminate, and manage bot traffic from websites, mobile apps, and APIs in real-time. Our solution leverages Intent-based Deep Behavior Analysis, device fingerprinting, and domain-specific detection technologies to identify and eliminate invalid traffic with zero false positives. We protect against automated attacks such as account takeover, application DDoS, API abuse, card fraud, content
Learn more about Radware Bot Manager
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Astra’s cloud-based hacker-style Pentest covers all aspects of pentesting for web apps, mobile apps, APIs, and cloud infrastructure.
Astra Pentest is comprehensive platform featuring an automated vulnerability scanner, manual pentest capabilities, and an all-purpose vulnerability management dashboard that helps you streamline every step of the pentest process, from detection and prioritization of vulnerabilities to collaborative remediation. Our Pentest platform emulates hackers behavior to find critical vulnerabilities in your app. Astra Integrates with GitLab, GitHub, Bitbucket, Slack & Jira to superpower your tech stack.
Learn more about Astra Pentest
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Software that provides a unified view of service delivery, availability, performance and security of IT applications.
ServicePilot monitoring software enables faster resolution of IT incidents. This intelligent observability platform collects and analyzes metrics, traces and logs to improve application performance and prevent IT failures. It also unifies monitoring and breaks down silos to ensure continuity of services and IT infrastructure.
Learn more about ServicePilot
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
CleanCloud Score is a CSPM, multi-cloud product with +400 checks based on industry standards such as ISO 27001, PCI, Bacen, and LGPD.
CleanCloud Score is a CSPM (Cloud Security Posture Management) product integrated with AWS, Azure, and Google Cloud, with +400 security and compliance checks based on the main industry standards and regulations, including ISO 27001, PCI, Bacen and data protection laws - CCPA, GDPR, LGPD.
With a read-only integration, the product provides a multi-cloud and high-level, executive view for the CISO and a technical deep dive, even a step by step remediation for each vulnerability, for the DevSecOps.
Learn more about CleanCloud by SEK
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Firewall that provides businesses with tools to protect applications against web threats.
Firewall that provides businesses with tools to protect applications against web threats.
Learn more about AWS WAF
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Phish threat assessment tool used by IT administrators worldwide to test employees’ readiness for phishing campaigns.
Part of the Sophos Central security software suite, Sophos Phish Threat is a tool that enables IT and network administrators to simulate phishing attacks to train corporate professionals to protect themselves against real ones. It comes with 60 training modules in 10 languages, each with customizable templates and tools to create convincing lookalikes from scratch. They can be used to create emails, identity harvesting forms, password harvesters, and other realistic-looking devices. Administrators can then import or sync employee contact lists to distribute these mock-ups across the company, monitoring their response reports to determine their vulnerability to real-world phishing campaigns in real-time.
Learn more about Sophos Phish Threat
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Detectify is the only automated EASM solution powered by a hacker community. Continuously secure the growing attack surface and detect
Detectify is the only fully automated External Attack Surface Management solution powered by a world-leading ethical hacker community. By leveraging hacker insights, security teams using Detectify can map out their entire attack surface to find anomalies and detect the latest business critical vulnerabilities in time – especially in third-party software. The only way to secure your attack surface is to hack it but it doesn’t have to be complicated. With Detectify, continuous security starts with
Learn more about Detectify
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
The smart Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.
The German technology manufacturer Myra offers a secure and certified Security-as-a-Service platform for protecting digital business processes. The platform protects your digital business processes against a wide range of risks such as DDoS attacks, bot networks and attacks on databases.
Myra technology is certified by the German Federal Office for Information Security (BSI) according to the ISO 27001 standard based on IT-Grundschutz (Basic IT protection).
Learn more about Myra Web Application Security
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
The quickest, most affordable solution to get compliant and secure all of your assets, giving you year around peace of mind.
Red Sentry is the industry leader in fast and affordable penetration testing.
Our unique value comes in combining our fast pentests with our automated platform, keeping customers protected 24/7/365.
Learn more about Red Sentry
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Web Application Firewall (WAF) helps users minimize potential vulnerabilities and downtimes caused by cyberattacks.
Web Application Firewall (WAF) helps users minimize potential vulnerabilities and downtimes caused by cyberattacks. The solution offers features such as web-app security, real-time analytics, traffic alerts and more.
Learn more about Web Application Firewall (WAF)
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Protegent's Total Security Antivirus is an antivirus solution that protects against viruses, spyware, rootkits other web threats.
Protegent's Total Security Antivirus is an antivirus solution that protects against viruses, spyware, rootkits other web threats.
Learn more about Protegent's Total Security
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Extends OSSEC with a management console, advanced file integrity management, compliance auditing and reporting, and expert support.
Atomic OSSEC provides a comprehensive FIM at a fraction of the cost of traditional solutions. It meets all your file integrity monitoring requirements, works in any cloud, server or hybrid environment and integrates easily where you need it. Based on OSSECs solid open source foundation, it expands the capabilites to what businesses need. With advanced SIEM log filtering that reduces the noise for security op centers & a light footprint that doesnt break the bank on SOC costs.
Learn more about Atomicorp OSSEC
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
State of the art application firewall (WAF) acting as your first line of defence against threats and malicious actors
NO-COMPROMISE FEATURES FOR ROBUST SECURITY:
With Modsecurity and OWASP Core ruleset at its heart, Modshield SB makes it simple and efficient to protect web and mobile applications from OWASP Top 10 application risks.
Protect unlimited domains and applications using a single instance at no additional cost.
Active threat intelligence for real-time protection.
Denial of Service (DoS) protection helps safeguard the application from random repetitive attacks.
Bot, Crawlers Protection
Learn more about Modshield SB
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Full WordPress Management From A Single Easy Dashboard.
Full WordPress Management From A Single Easy Dashboard.
Learn more about WPBlazer
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
cyberscan.io® - a portal designed for security measures, combining functions of vulnerability scanner, penetration tool and OSINT.
cyberscan.io® is a portal designed for security measures, combining functions of vulnerability scanner, penetration tool and open source intelligence tool. In just a few steps you get a comprehensive vulnerability view of your systems.
All IP addresses and sub-domains of a domain are identified and searched for vulnerabilities.
The results, including risk classification, are clearly displayed in our dashboard and can be archived as a report for further processing.
Learn more about cyberscan.io
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Cloud security solution that helps businesses monitor threats, manage access rights, track vulnerabilities, and more.
Cloud security solution that helps businesses monitor threats, manage access rights, track vulnerabilities, and more.
Learn more about Prisma Cloud
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Stop bot attacks. Defend against SMS toll fraud, account takeover, fake account creation, scraping, card testing. $1 million warranty.
Arkose Labs stops bot attacks, preserves customer trust, and provides effective account security by undermining the economic incentive behind today’s attacks. The ML-powered platform combines defense-in-depth detection with dynamic attack response, complemented by a dedicated 24×7 Security Operations Center (SOC) and service team. Attack vectors defended against include SMS toll fraud, account takeover, fake account registration, scraping, inventory hoarding. An industry-leading warranty reimbu
Learn more about Arkose Labs
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API
Transcending bot management by countering the human minds behind automated threats.
Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them. The Kasada platform overcomes the shortcomings of traditional bot management to provide immediate and enduring protection. Its invisible, dynamic defenses provide a seamless user experience and eliminate the need for ineffective, annoying CAPTCHAs. Our team handles the bots so clients have freedom to focus on growing their businesses, not defending it.
Learn more about Kasada
...
Read more
Features
- Vulnerability Scanning
- Firewalls
- Log Management
- Endpoint Protection Software
- API