Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • SKUDONET Reviews & Ratings
    6 Ratings
    Company Website
  • Fastly Reviews & Ratings
    793 Ratings
    Company Website
  • Google Cloud Run Reviews & Ratings
    255 Ratings
    Company Website
  • KrakenD Reviews & Ratings
    66 Ratings
    Company Website
  • groundcover Reviews & Ratings
    32 Ratings
    Company Website
  • enforza Reviews & Ratings
    1 Rating
    Company Website
  • Google Cloud BigQuery Reviews & Ratings
    1,730 Ratings
    Company Website
  • Astra Pentest Reviews & Ratings
    173 Ratings
    Company Website
  • QuantaStor Reviews & Ratings
    6 Ratings
    Company Website
  • Action1 Reviews & Ratings
    455 Ratings
    Company Website

What is Wallarm API Security Platform?

Wallarm delivers automated, real-time defense for web applications, microservices, and APIs through its sophisticated WAF, API protection, automated incident management, and asset discovery features. This solution successfully shields digital assets from the OWASP Top 10 vulnerabilities, bot threats, and misuse of applications without the need for manual rule configurations, all while achieving an impressively low false positive rate. The platform is crafted for easy deployment across leading cloud services such as AWS, GCP, and Azure, as well as within hybrid cloud infrastructures. Furthermore, it is natively compatible with Kubernetes and service mesh frameworks, enhancing its adaptability in various environments. Wallarm also incorporates dynamic rules to mitigate account takeover (ATO) and credential stuffing risks, making it an ideal option for DevSecOps teams focused on secure cloud-native application development. Additionally, Wallarm’s API security features are designed to integrate smoothly with top API gateway solutions, facilitating straightforward installation regardless of a company's existing setup. Importantly, the extensive functionalities offered by Wallarm guarantee that security is integrated into the development process right from the outset, thereby reinforcing the overall integrity of applications.

What is ConfigOS?

ConfigOS has been implemented in both classified and unclassified environments, spanning tactical and weapon system applications, isolated research labs, and commercial cloud settings. This cutting-edge solution functions without requiring client software, thus removing the necessity for software agent installation. ConfigOS rapidly scans endpoint systems and can address hundreds of STIG controls in under 90 seconds. It also provides automated rollback options during remediation, as well as comprehensive compliance reports and outputs from the STIG Viewer Checklist. Built for efficiency, ConfigOS can strengthen every CAT 1/2/3 STIG control based on a specific application baseline in around 60 minutes, which drastically shortens the time required for RMF accreditation, reducing it from the usual weeks or months. The platform is compatible with various Microsoft Windows workstation and server operating systems, along with SQL Server, IIS, Internet Explorer, Chrome, and all Microsoft Office components. In addition, it supports Red Hat versions 5, 6, and 7, as well as SUSE, Ubuntu, and Oracle Linux. With a rich library of over 10,000 STIG and CIS controls, ConfigOS guarantees extensive coverage across a multitude of platforms. Moreover, the recent updates to the Command Center introduce a patent-pending technology that significantly enhances its operational capabilities, making it a versatile tool for compliance management. This positions ConfigOS as a leading solution in the ever-evolving landscape of cybersecurity.

Media

Media

Integrations Supported

AWS Marketplace
Alibaba Cloud
Amazon Web Services (AWS)
Ansible
Envoy
Google Cloud Platform
IBM Cloud
KonnectzIT
Kubernetes
Maverix
Microsoft Azure
Microsoft Teams
Opsgenie
PagerDuty
Puppet Enterprise
Slack
Splunk APM
Sumo Logic
Terraform
Tyk

Integrations Supported

AWS Marketplace
Alibaba Cloud
Amazon Web Services (AWS)
Ansible
Envoy
Google Cloud Platform
IBM Cloud
KonnectzIT
Kubernetes
Maverix
Microsoft Azure
Microsoft Teams
Opsgenie
PagerDuty
Puppet Enterprise
Slack
Splunk APM
Sumo Logic
Terraform
Tyk

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Wallarm

Date Founded

2013

Company Location

United States

Company Website

www.wallarm.com/product/api-security-overview

Company Facts

Organization Name

SteelCloud

Date Founded

1987

Company Location

United States

Company Website

www.steelcloud.com

Categories and Features

Categories and Features

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Popular Alternatives

Resurface Reviews & Ratings

Resurface

Resurface Labs

Popular Alternatives

SanerNow Reviews & Ratings

SanerNow

SecPod Technologies
Tyk Reviews & Ratings

Tyk

Tyk Technologies
Trend Vision One Reviews & Ratings

Trend Vision One

Trend Micro