What is Feroot?

Feroot is committed to ensuring that both businesses and their customers can participate in a secure and protected online environment. The company's objective focuses on safeguarding web applications from the client side, enabling users to navigate online platforms safely, whether they are shopping on an e-commerce site, utilizing digital health services, or managing financial transactions. Their innovative solutions assist organizations in identifying supply chain vulnerabilities and fortifying their client-side defenses against potential attacks. One of their key offerings, Feroot Inspector, empowers companies to conduct thorough scans, maintain constant monitoring, and implement security measures to mitigate the risks of data breaches caused by JavaScript vulnerabilities, third-party integrations, and configuration flaws. Additionally, their data protection features streamline the often labor-intensive processes of code reviews and threat assessments, while clarifying uncertainties related to client-side security monitoring and response. Ultimately, Feroot strives to foster a trusted digital landscape where online interactions are inherently safer for everyone involved.

Pricing

Free Version:
Free Version available.

Integrations

Offers API?:
Yes, Feroot provides an API

Screenshots and Video

Feroot Screenshot 1

Company Facts

Company Name:
Feroot Security
Date Founded:
2017
Company Location:
Canada
Company Website:
www.feroot.com
Edit This Page

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Online Training
Support
Web-Based Support

Product Details

Target Company Sizes
501-1000
1001-5000
5001-10000
Target Organization Types
Mid Size Business
Enterprise
Nonprofit
Government
Supported Languages
English

Feroot Categories and Features

GDPR Compliance Software

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Data Security Software

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Application Security Software

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation