Ratings and Reviews 899 Ratings
Ratings and Reviews 1 Rating
What is Fastly?
                The leading edge cloud platform available today empowers developers, fosters customer connections, and facilitates business growth. Our innovative solution is crafted to enhance both your existing technology and your teams' capabilities. By moving data and applications closer to users at the network's edge, our platform significantly boosts the performance of your websites and applications. Fastly's highly customizable CDN enables you to tailor content delivery right where it's needed most. Users will appreciate having immediate access to the information they seek. Our robust Points of Presence (POPs), equipped with solid-state drives (SSDs), are strategically positioned in well-connected areas across the globe. This setup allows for extended caching periods, minimizing the need to retrieve data from the original source. Instant Purge and batch purging through surrogate keys enable rapid caching and invalidation of dynamic content, ensuring that you can always deliver up-to-date news, inventory levels, and weather updates. With such capabilities, your platform is not only efficient but also adaptable to ever-evolving user demands.
            
        
            What is AppTrana?
                AppTrana offers a comprehensive, fully managed web application firewall that features web application scanning to pinpoint vulnerabilities at the application layer, alongside immediate and managed risk-based protection through its WAF, Managed DDoS, and Bot Mitigation services. Additionally, it can enhance website performance with a bundled CDN or work seamlessly with an existing CDN. This robust service is supported by a 24/7 team of security experts who ensure policy updates and tailor custom rules, all while guaranteeing zero false positives. Impressively, AppTrana stands out as the only vendor recognized as Customers’ Choice for WAAP across all seven segments in the Gartner VoC 2022 Report, highlighting its commitment to excellence in web application security. The combination of these features not only enhances security but also optimizes the overall performance of web applications for businesses.
            
        
            Integrations Supported
            
                
    Akitra Andromeda
            
            
        
        
    
        
        
            
                
    Blackfire
            
            
        
        
    
        
        
            
                
    Castr
            
            
        
        
    
        
        
            
                
    ChaosSearch
            
            
        
        
    
        
        
            
                
    CloudZero
            
            
        
        
    
        
        
            
                
    Coralogix
            
            
        
        
    
        
        
            
                
    DataDome
            
            
        
        
    
        
        
            
                
    Datazoom
            
            
        
        
    
        
        
            
                
    Fastly Next-Gen WAF
            
            
        
        
    
        
        
            
                
    Indent
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Integrations Supported
            
                
    Akitra Andromeda
            
            
        
        
    
        
        
            
                
    Blackfire
            
            
        
        
    
        
        
            
                
    Castr
            
            
        
        
    
        
        
            
                
    ChaosSearch
            
            
        
        
    
        
        
            
                
    CloudZero
            
            
        
        
    
        
        
            
                
    Coralogix
            
            
        
        
    
        
        
            
                
    DataDome
            
            
        
        
    
        
        
            
                
    Datazoom
            
            
        
        
    
        
        
            
                
    Fastly Next-Gen WAF
            
            
        
        
    
        
        
            
                
    Indent
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            API Availability
            
                Has API
            
            
        
        
    
                API Availability
            
                Has API
            
            
        
        
    
                Pricing Information
        Pricing not provided.
        
        
    
    
    
        
        
            
                Free Trial Offered?
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Information
        $99/month
        
    
    
    
        
        
            
                Free Trial Offered?
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Supported Platforms
            
                SaaS
            
            
        
        
    
        
        
            
                Android
            
            
        
        
    
        
        
            
                iPhone
            
            
        
        
    
        
        
            
                iPad
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                On-Prem
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
                Supported Platforms
            
                SaaS
            
            
        
        
    
        
        
            
                Android
            
            
        
        
    
        
        
            
                iPhone
            
            
        
        
    
        
        
            
                iPad
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                On-Prem
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
                Customer Service / Support
            
                Standard Support
            
            
        
        
    
        
        
            
                24 Hour Support
            
            
        
        
    
        
        
            
                Web-Based Support
            
            
        
        
    
                Customer Service / Support
            
                Standard Support
            
            
        
        
    
        
        
            
                24 Hour Support
            
            
        
        
    
        
        
            
                Web-Based Support
            
            
        
        
    
                Training Options
            
                Documentation Hub
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Online Training
            
            
        
        
    
        
        
            
                On-Site Training
            
            
        
        
    
                Training Options
            
                Documentation Hub
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Online Training
            
            
        
        
    
        
        
            
                On-Site Training
            
            
        
        
    
                Company Facts
Organization Name
Fastly
Date Founded
2011
Company Location
United States
Company Website
fastly.com
Company Facts
Organization Name
Indusface
Date Founded
2012
Company Location
India
Company Website
www.indusface.com/web-application-firewall.php
Categories and Features
CDN
                                        Content Acceleration
                                        
                                    
                                    
                                    
                                        DDoS Protection
                                        
                                    
                                    
                                    
                                        Load Balancing
                                        
                                    
                                    
                                    
                                        Managed CDN
                                        
                                    
                                    
                                    
                                        Multi-CDN Switching
                                        
                                    
                                    
                                    
                                        Reporting/Analytics
                                        
                                    
                                    
                                    
                                        Software Downloads
                                        
                                    
                                    
                                    
                                        Transparent Caching
                                        
                                    
                                    
                                    
                                        Video Streaming
                                        
                                    
                                    
                                    
                                        Web Application Firewalls (WAF)
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        DDoS Protection
                                        DNS Amplification Protection
                                        
                                    
                                    
                                    
                                        DNS Reflection Protection
                                        
                                    
                                    
                                    
                                        High Network Capacity
                                        
                                    
                                    
                                    
                                        Illegitimate Traffic Recognition
                                        
                                    
                                    
                                    
                                        Infrastructure Protection (Layer 3/Layer 4)
                                        
                                    
                                    
                                    
                                        Post Attack Analysis
                                        
                                    
                                    
                                    
                                        Traffic Monitoring
                                        
                                    
                                    
                                    
                                        Website Protection (Layer 7)
                                        
                                    
                            
                        Firewall
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Application Visibility / Control
                                        
                                    
                                    
                                    
                                        Automated Testing
                                        
                                    
                                    
                                    
                                        Intrusion Prevention
                                        
                                    
                                    
                                    
                                        LDAP Integration
                                        
                                    
                                    
                                    
                                        Physical / Virtual Environment
                                        
                                    
                                    
                                    
                                        Sandbox / Threat Simulation
                                        
                                    
                                    
                                    
                                        Threat Identification
                                        
                                    
                            
                        IT Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Anti Virus
                                        
                                    
                                    
                                    
                                        Email Attachment Protection
                                        
                                    
                                    
                                    
                                        Event Tracking
                                        
                                    
                                    
                                    
                                        IP Protection
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Spyware Removal
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Web Traffic Reporting
                                        
                                    
                            
                        Load Balancing
                                        Authentication
                                        
                                    
                                    
                                    
                                        Automatic Configuration
                                        
                                    
                                    
                                    
                                        Content Caching
                                        
                                    
                                    
                                    
                                        Content Routing
                                        
                                    
                                    
                                    
                                        Data Compression
                                        
                                    
                                    
                                    
                                        Health Monitoring
                                        
                                    
                                    
                                    
                                        Predefined Protocols
                                        
                                    
                                    
                                    
                                        Redundancy Checking
                                        
                                    
                                    
                                    
                                        Reverse Proxy
                                        
                                    
                                    
                                    
                                        SSL Offload
                                        
                                    
                                    
                                    
                                        Schedulers
                                        
                                    
                            
                        Log Management
                                        Archiving
                                        
                                    
                                    
                                    
                                        Audit Trails
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Consolidation
                                        
                                    
                                    
                                    
                                        Data Visualization
                                        
                                    
                                    
                                    
                                        Event Logs
                                        
                                    
                                    
                                    
                                        Network Logs
                                        
                                    
                                    
                                    
                                        Remediation
                                        
                                    
                                    
                                    
                                        Syslogs
                                        
                                    
                                    
                                    
                                        Thresholds
                                        
                                    
                                    
                                    
                                        Web Logs
                                        
                                    
                            
                        Web Application Firewalls (WAF)
                                        Access Control / Permissions
                                        
                                    
                                    
                                    
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Automate and Orchestrate Security
                                        
                                    
                                    
                                    
                                        Automated Attack Detection
                                        
                                    
                                    
                                    
                                        DDoS Protection
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        IP Reputation Checking
                                        
                                    
                                    
                                    
                                        Managed Rules
                                        
                                    
                                    
                                    
                                        OWASP Protection
                                        
                                    
                                    
                                    
                                        Reporting / Analytics
                                        
                                    
                                    
                                    
                                        Secure App Delivery
                                        
                                    
                                    
                                    
                                        Server Cloaking
                                        
                                    
                                    
                                    
                                        Virtual Patching
                                        
                                    
                                    
                                    
                                        Zero-Day Attack Prevention
                                        
                                    
                            
                        Categories and Features
Application Security
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Open Source Component Monitoring
                                        
                                    
                                    
                                    
                                        Source Code Analysis
                                        
                                    
                                    
                                    
                                        Third-Party Tools Integration
                                        
                                    
                                    
                                    
                                        Training Resources
                                        
                                    
                                    
                                    
                                        Vulnerability Detection
                                        
                                    
                                    
                                    
                                        Vulnerability Remediation
                                        
                                    
                            
                        CDN
                                        Content Acceleration
                                        
                                    
                                    
                                    
                                        DDoS Protection
                                        
                                    
                                    
                                    
                                        Load Balancing
                                        
                                    
                                    
                                    
                                        Managed CDN
                                        
                                    
                                    
                                    
                                        Multi-CDN Switching
                                        
                                    
                                    
                                    
                                        Reporting/Analytics
                                        
                                    
                                    
                                    
                                        Software Downloads
                                        
                                    
                                    
                                    
                                        Transparent Caching
                                        
                                    
                                    
                                    
                                        Video Streaming
                                        
                                    
                                    
                                    
                                        Web Application Firewalls (WAF)
                                        
                                    
                            
                        Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        DDoS Protection
                                        DNS Amplification Protection
                                        
                                    
                                    
                                    
                                        DNS Reflection Protection
                                        
                                    
                                    
                                    
                                        High Network Capacity
                                        
                                    
                                    
                                    
                                        Illegitimate Traffic Recognition
                                        
                                    
                                    
                                    
                                        Infrastructure Protection (Layer 3/Layer 4)
                                        
                                    
                                    
                                    
                                        Post Attack Analysis
                                        
                                    
                                    
                                    
                                        Traffic Monitoring
                                        
                                    
                                    
                                    
                                        Website Protection (Layer 7)
                                        
                                    
                            
                        Vulnerability Management
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Asset Tagging
                                        
                                    
                                    
                                    
                                        Network Scanning
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vulnerability Assessment
                                        
                                    
                                    
                                    
                                        Web Scanning
                                        
                                    
                            
                        Web Application Firewalls (WAF)
                                        Access Control / Permissions
                                        
                                    
                                    
                                    
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Automate and Orchestrate Security
                                        
                                    
                                    
                                    
                                        Automated Attack Detection
                                        
                                    
                                    
                                    
                                        DDoS Protection
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        IP Reputation Checking
                                        
                                    
                                    
                                    
                                        Managed Rules
                                        
                                    
                                    
                                    
                                        OWASP Protection
                                        
                                    
                                    
                                    
                                        Reporting / Analytics
                                        
                                    
                                    
                                    
                                        Secure App Delivery
                                        
                                    
                                    
                                    
                                        Server Cloaking
                                        
                                    
                                    
                                    
                                        Virtual Patching
                                        
                                    
                                    
                                    
                                        Zero-Day Attack Prevention
                                        
                                    
                            
                         
         
         
         
         
        