Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • SKUDONET Reviews & Ratings
    6 Ratings
    Company Website
  • Fastly Reviews & Ratings
    793 Ratings
    Company Website
  • Google Cloud Run Reviews & Ratings
    255 Ratings
    Company Website
  • KrakenD Reviews & Ratings
    66 Ratings
    Company Website
  • groundcover Reviews & Ratings
    32 Ratings
    Company Website
  • enforza Reviews & Ratings
    1 Rating
    Company Website
  • Google Cloud BigQuery Reviews & Ratings
    1,730 Ratings
    Company Website
  • Astra Pentest Reviews & Ratings
    173 Ratings
    Company Website
  • QuantaStor Reviews & Ratings
    6 Ratings
    Company Website
  • Action1 Reviews & Ratings
    455 Ratings
    Company Website

What is Wallarm API Security Platform?

Wallarm delivers automated, real-time defense for web applications, microservices, and APIs through its sophisticated WAF, API protection, automated incident management, and asset discovery features. This solution successfully shields digital assets from the OWASP Top 10 vulnerabilities, bot threats, and misuse of applications without the need for manual rule configurations, all while achieving an impressively low false positive rate. The platform is crafted for easy deployment across leading cloud services such as AWS, GCP, and Azure, as well as within hybrid cloud infrastructures. Furthermore, it is natively compatible with Kubernetes and service mesh frameworks, enhancing its adaptability in various environments. Wallarm also incorporates dynamic rules to mitigate account takeover (ATO) and credential stuffing risks, making it an ideal option for DevSecOps teams focused on secure cloud-native application development. Additionally, Wallarm’s API security features are designed to integrate smoothly with top API gateway solutions, facilitating straightforward installation regardless of a company's existing setup. Importantly, the extensive functionalities offered by Wallarm guarantee that security is integrated into the development process right from the outset, thereby reinforcing the overall integrity of applications.

What is Dark Web ID?

Boost your sales and optimize your expenses while setting your MSP apart from the competition. By leveraging ID Agent, your MSP can stand out through its provision of immediate dark-web search results that instill a sense of urgency among clients. Additionally, ID Agent offers a wealth of resources and coaching tailored for sales and marketing, promising profitability within just 30 days. Many of your clients primarily worry about their network passwords being compromised, often overlooking the risks associated with their usernames and passwords being exposed on external sites and applications. With a team that includes three former CEOs of MSPs, ID Agent is well-equipped to deliver impactful cybersecurity threat intelligence to Managed Service Providers globally. Our hands-on experience allows us to understand the unique challenges you encounter and equip you with effective strategies for overcoming them. Embracing ID Agent not only enhances your service offerings but also positions your MSP as a proactive guardian of client security.

Media

Media

Integrations Supported

Alibaba Cloud
Amazon Web Services (AWS)
Ansible
Google Cloud Platform
IBM Cloud
Istio
Kong Konnect
KonnectzIT
Kubernetes
Microsoft Azure
Microsoft Teams
MyGlue
NGINX
Network Glue
Puppet Enterprise
Sumo Logic
Telegram
Terraform
ThreatAware
Tyk

Integrations Supported

Alibaba Cloud
Amazon Web Services (AWS)
Ansible
Google Cloud Platform
IBM Cloud
Istio
Kong Konnect
KonnectzIT
Kubernetes
Microsoft Azure
Microsoft Teams
MyGlue
NGINX
Network Glue
Puppet Enterprise
Sumo Logic
Telegram
Terraform
ThreatAware
Tyk

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$300 per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Wallarm

Date Founded

2013

Company Location

United States

Company Website

www.wallarm.com/product/api-security-overview

Company Facts

Organization Name

IDAgent, a Kaseya company

Date Founded

2016

Company Location

United States

Company Website

www.idagent.com

Categories and Features

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Email Security

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

MSP

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Popular Alternatives

Resurface Reviews & Ratings

Resurface

Resurface Labs

Popular Alternatives

Trend Vision One Reviews & Ratings

Trend Vision One

Trend Micro
Tyk Reviews & Ratings

Tyk

Tyk Technologies
Alert Logic Reviews & Ratings

Alert Logic

Fortra