What is Cerber Security?

Cerber Security provides robust protection for WordPress against various threats including hacking attempts, spam, and malware. Its design is both fast and dependable, utilizing a series of specialized algorithms to analyze incoming requests for patterns indicative of harmful code and unusual traffic behavior. The bot detection system is effective in identifying and countering automated attacks. It helps diminish both code injection attempts and brute force assaults while implementing GEO country rules to limit access. It restricts both REST API and standard user numbers, and access to the REST API and XML-RPC is tightly controlled. Additionally, it employs a worldwide database of IP addresses associated with malicious activities. The technology utilizes both heuristic and content-based methods to identify bots, continuously comparing IP addresses against an up-to-date list linked to spamming, phishing, and other nefarious actions. Furthermore, every file and folder on your site undergoes a rigorous scan for trojans, malware, and viruses, with the capability to automatically eliminate any detected threats. It also keeps a vigilant watch over any suspicious, newly added, or altered files, ensuring comprehensive security for your WordPress site. This proactive approach guarantees a safer environment for website owners and their visitors alike.

Pricing

Free Version:
Free Version available.
Free Trial Offered?:
Yes

Screenshots and Video

Company Facts

Company Name:
Cerber Tech
Date Founded:
2016
Company Location:
United States
Company Website:
wpcerber.com
Edit This Page

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Support
Web-Based Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

Cerber Security Categories and Features

Vulnerability Management Software

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management