Suggested Categories:

Attack Surface Management Platforms
Attack surface management (ASM) platforms enables organizations to monitor and manage their attack surface risk. Attack surface management software allows companies to view cyber risks and attack vectors related to external digital assets outside of their firewall. These platforms continuously scan and assess an organization’s digital infrastructure, including networks, systems, applications, and endpoints, to detect vulnerabilities, misconfigurations, and exposed assets that could be exploited by attackers.
Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
Web Servers
Web servers, also known as HTTP servers, are servers that host websites and web applications. Web servers are the backbone of all sites and web apps on the internet. Many popular web servers are open source. Different web servers have advantages and disadvantages when compared to one another, and selecting the right one depends on use case, deployment, operating system, and more.
Web Design Software
Web design software enables users to create, design, and publish websites without needing extensive coding knowledge. These tools offer visual editors, templates, and drag-and-drop functionality to build attractive and responsive web pages quickly. Many platforms include features like SEO optimization, multimedia integration, and e-commerce support to enhance site performance and user engagement. Web design software often integrates with content management systems to facilitate easy updates and content publishing. Ultimately, it empowers individuals and businesses to establish a professional online presence with less technical effort.
Bot Detection and Mitigation Software
Bot detection and mitigation software is designed to help organizations detect and protect against malicious bots or automated computer programs. The software uses sophisticated algorithms to monitor network traffic and identify suspicious activity, alerting administrators when a potential threat is detected. Once bot activity has been identified it provides the user with options to deal with the threat, including blocking access, tracking down the source of malicious activity, or quarantining infected files. Bot detection and mitigation software can also provide protection from data theft, distributed denial-of-service attacks (DDoS) and other online threats. With its ever-evolving capabilities, this type of software can be an invaluable tool in securing organizational systems and networks.
Web Conferencing Software
Web conferencing software allows remote users to connect with each other via real-time audio and video. It is usually used to share documents, audio or video chat, or present slideshows during the meeting. Web conferencing software can be used to facilitate remote meetings, training sessions, webinars, and other online collaborations.
Web to Print Software
Web-to-print software allows businesses and individuals to design, customize, and order printed materials online, streamlining the print procurement process. These platforms provide an interface for customers to upload designs, choose templates, and customize various print products, such as business cards, brochures, banners, and promotional materials. Web-to-print software often integrates with e-commerce platforms, enabling businesses to offer a seamless online ordering experience. It also includes features for managing print jobs, proofing, payment processing, and fulfillment tracking. By using web-to-print software, printing companies can improve workflow efficiency, reduce production errors, and offer a more convenient service to their customers.
Web Browsers
Web browsers are software applications that enable users to access and interact with websites and other content on the internet. These platforms retrieve, display, and render web pages, allowing users to view text, images, videos, and other multimedia elements. Web browsers typically include features like tabs for managing multiple pages, bookmarking for quick access to favorite sites, browsing history, and privacy options to enhance security. They may also support extensions and plugins to add additional functionality, such as ad-blocking, enhanced security, or content management.
Web Analytics Software
Web analytics software is a type of software that enables businesses track, measure, and analyze the behavior of visitors on their websites. These platforms provide insights into key metrics such as page views, traffic sources, user demographics, conversion rates, and bounce rates. Web analytics software allows organizations to optimize their websites by identifying areas for improvement, understanding user preferences, and measuring the effectiveness of marketing campaigns. It also helps businesses make data-driven decisions to improve user experience, increase website performance, and drive more conversions.
Fraud Detection Software
Fraud detection software provides companies with the tools to evaluate and identify fraudulent activity and fraudulent transactions in order to prevent fraudulent access or financial fraud.
Web Hosting Providers
Web hosting providers are companies that provide online services and technologies necessary to host websites. They offer a wide variety of packages tailored to the needs of different types of customers, from small businesses to large enterprises. These services generally include server maintenance, software updates, customer support, and uptime monitoring.
Dark Web Monitoring Tools
Dark web monitoring tools are software tools that enable cybersecurity professionals and organizations to monitor and manage data and threats on the dark web. Dark web monitoring tools, also known as dark web intelligence software, can scan the dark web to detect sensitive data such as compromised logins and credentials, as well as threats.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Web Content Filtering Software
Web content filtering software allows companies to filter specific content and restrict website access to their network users.
Gun Detection Systems
Gun detection systems, also known as weapon detection systems, are systems that are designed to detect the presence of firearms. They often use AI, soundwave, video analytics, and radar technology to pinpoint the location of a firearm on a person or in a given area. Gun detection systems can be used in public spaces like schools, shopping malls, and other places with high foot traffic.
Anomaly Detection Software
Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights.
Disinformation Detection Tools
Disinformation detection tools are specific applications designed to help identify and mitigate false information. These tools use advanced algorithms to analyze digital content, such as text, images, and videos. They can also be used to detect potential manipulation of online activity and websites. In some cases, these tools are integrated into media platforms so that malicious actors cannot spread misinformation or disinformation.
Deepfake Detection Software
Deepfake detection software is an advanced technology that enables users to detect and analyze deepfake images, videos, and other AI-generated content. It leverages sophisticated machine learning models to identify manipulations of original media content. This software can detect subtle changes in facial expressions, voice patterns, and other visual elements such as blurriness or color discrepancies. It also employs image-processing techniques such as pixel analysis to discover when parts of a video have been tampered with. Deepfake detection software is becoming increasingly important for ensuring the authenticity of digital media content.
Liveness Detection Software
Liveness detection software is used to identify a person who is present at the time of an authentication process. This type of software uses biometric data to determine whether the individual being authenticated is alive or not. It can provide additional security for access control, financial transactions, and other digital activities where identity verification is required. Liveness detection works by using either facial recognition, fingerprint scanning, or other types of biometric measurements to confirm an individual's presence in real-time. The accuracy and reliability of the liveness detection process depend on using high-quality cameras and sensors that are sophisticated enough to detect subtle changes in body temperature, image quality, and motion.
Clash Detection Software
Clash detection software is used in construction and engineering to identify and resolve conflicts within 3D models, such as overlaps between structural, mechanical, or electrical elements. By analyzing Building Information Models (BIM), this software highlights design clashes early, reducing the risk of errors during construction. It provides visual reports and detailed information on each clash, allowing project teams to address issues before they become costly in the field. Integrated with other BIM tools, clash detection software improves collaboration by streamlining communication around detected conflicts. Ultimately, it helps save time, control project costs, and ensure a smoother construction process.
View more categories (20) for "web attacks detection"

27 Products for "web attacks detection" with 1 filter applied:

  • 1
    UltraAPI

    UltraAPI

    Vercara

    API protection for fraud, data loss, and business disruption across web and mobile applications. UltraAPI is a comprehensive API security solution designed to secure your entire API landscape, including external APIs. As a unified solution, UltraAPI protects against malicious bots and fraudulent activity while ensuring regulatory compliance. Understand your external API attack surface with our cloud API security solutions, providing an attacker’s view of your APIs, regardless of their location. ...
  • 2
    Resurface

    Resurface

    Resurface Labs

    ...Resurface is self-hosted, all data is first-party, installed with a single Helm command. Resurface is the only API security solution engineered for deep inspection at scale. Handling millions of API calls, Resurface detects and alerts on active attacks. Machine learning models indicate anomalies and identify low-and-slow attack patterns.
    Starting Price: $9K/node/year
  • 3
    Pynt

    Pynt

    Pynt

    Pynt is an innovative API Security Testing platform exposing verified API threats through simulated attacks. We help hundreds of companies such as Telefonica, Sage, Halodoc, and more, to continuously monitor, classify and attack poorly secured APIs, before hackers do. Pynt's leverages an integrated shift-left approach, and unique hack technology using home-grown attack scenarios, to detect real threats, discover APIs, suggest fixes to verified vulnerabilities, thereby eliminating the API attack surface risk. ...
    Starting Price: $1888/month
  • 4
    Imvision

    Imvision

    Imvision

    ...Uncover endpoints, usage patterns, expected flows, and sensitive data exposure through full API payload data analysis. By analyzing the full API data, Imvision allows you to go beyond predefined rules in order to discover unknown vulnerabilities, prevent functional attacks, and automatically shift-left to outsmart attackers. Natural Language Processing (NLP) allows us to achieve high detection accuracy at scale while providing detailed explainability. It can effectively detect ‘Meaningful Anomalies’ when analyzing API data as language. Uncover the API functionality using NLP-based AI to model the complex data relations. ...
  • 5
    Fortinet FortiWeb Web Application Firewall
    Unprotected web applications and APIs are the easiest point of entry for hackers and vulnerable to a number of attack types. FortiWeb's AI-enhanced and multi-layered approach protects your web apps from the OWASP Top 10 and more. FortiWeb ML customizes the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions.
    Starting Price: $30/mo for 1 app on SaaS
  • 6
    CloudGuard AppSec

    CloudGuard AppSec

    Check Point Software Technologies

    Automate your application security and API protection with AppSec powered by contextual AI. Stop attacks against your web applications with a fully automated, cloud-native application security solution. Eliminate the need to manually tune rules and write exceptions every time you make an update to your web application or APIs. Modern applications demand modern security solutions. Protect your web applications and APIs, eliminate false positives and stop automated attacks against your business. ...
  • 7
    Cloudflare

    Cloudflare

    Cloudflare

    Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and...
    Leader badge
    Starting Price: $20 per website
  • 8
    Noname Security

    Noname Security

    Noname Security

    ...Automatically discover APIs, domains, and issues. Build a robust API inventory and easily find exploitable intelligence, such as leaked information, to understand the attack paths available to adversaries. Understand every API in your organization’s ecosystem with full business context. Uncover vulnerabilities, protect sensitive data, and proactively monitor changes to de-risk your APIs and reduce your API attack surface. with automated machine learning-based detection to identify the broadest set of API vulnerabilities, including data leakage, data tampering, misconfigurations, data policy violations, suspicious behavior, and API security attacks.
  • 9
    Wallarm API Security Platform
    Built by security practitioners for practitioners, Wallarm's API security platform provides robust protection for APIs, web apps, microservices, and serverless workloads in cloud-native, multi-cloud, Kubernetes, and on-premises environments. It delivers coverage against OWASP API Top-10 risks and advanced threats, ensuring visibility and rapid vulnerability remediation. The Wallarm platform is a best-in-class API security solution that supports multiple deployment options.
  • 10
    Orca Security

    Orca Security

    Orca Security

    Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment. Instead of layering multiple siloed tools together or deploying cumbersome agents, Orca combines two revolutionary approaches - SideScanning, that...
  • 11
    Vorlon

    Vorlon

    Vorlon

    Continuous near real-time detection and identification of your data in motion between third-party apps with remediation capabilities. By not continuously monitoring third-party APIs, you inadvertently grant attackers an average of seven months to act before you detect and remediate an issue. Vorlon continuously monitors your third-party applications and detects abnormal behavior in near real-time, processing your data every hour.
  • 12
    Aiculus

    Aiculus

    Aiculus

    ...It screens each call to determine anomalous patterns and threat indicators, and detect API credential theft, compromised accounts and authentication bypass attacks. API Protector inspects every API call for misuse. It uses AI techniques such as machine learning and deep learning to perform behavioral analytics, and provide adaptive risk assessments in real-time. If the risk is too high, the request is denied, and your systems stay secure.
  • 13
    Astra API Security Platform
    Astra is a powerful API security platform designed to discover, test, and protect every API across your infrastructure. It continuously scans for over 10,000 vulnerabilities, including the OWASP API Top 10, data leaks, and authorization flaws. With Astra, teams can detect Shadow, Zombie, and Orphan APIs, identify sensitive data exposures, and fix vulnerabilities before attackers exploit them. The platform combines automated scanning with manual penetration testing from certified experts to deliver enterprise-grade protection. Seamless integrations with AWS, GCP, Postman, and CI/CD tools make security part of your DevOps workflow. ...
    Starting Price: $499/month
  • 14
    Salt

    Salt

    Salt Security

    The Salt Security API Security Platform protects APIs across their full lifecycle – build, deploy and runtime phases. Only Salt can capture and baseline all API traffic -- all calls and responses -- over days, weeks, even months. Salt uses this rich context to detect the reconnaissance activity of bad actors and block them before they can reach their objective. The Salt API Context Engine (ACE) architecture discovers all APIs, pinpoints and stops API attackers, and provides remediation insights learned during runtime to harden APIs. Only Salt applies cloud-scale big data to address API security challenges. ...
  • 15
    Upwind

    Upwind

    Upwind Security

    ...Stay ahead of emerging threats & stop cloud-based attacks with Upwind's dynamic, behavior-based CDR.
  • 16
    open-appsec

    open-appsec

    open-appsec

    automatic web application & API security using machine learning open-appsec is an open-source initiative that builds on machine learning to provide pre-emptive web app & API threat protection against OWASP-Top-10 and zero-day attacks. It can be deployed as add-on to Kubernetes Ingress, NGINX, Envoy and API Gateways. open-oppsec simplifies maintenance as there is no threat signature upkeep and exception handling, like common in many WAF solutions.
  • 17
    AppSecure Security

    AppSecure Security

    AppSecure Security

    Anticipate and prevent system attacks from the most sophisticated adversaries with AppSecure’s offensive security stance. Discover critical exploitable vulnerabilities and continuously patch them with our advanced security solutions. Continuously fortify your security posture and uncover concealed vulnerabilities from a hacker’s perspective. Evaluate the efficacy of your security team’s readiness posture, detection, and response measures to tenacious hacker attacks on your network’s susceptible pathways. ...
  • 18
    Equixly

    Equixly

    Equixly

    Equixly aims to help developers and organizations create secure applications, increase their security posture, and spread knowledge of new vulnerabilities. Equixly makes available a SaaS platform that allows integrating the API security testing within the software development lifecycle (SLDC) to detect flaws, reduce bug-fixing costs and exponentially scale penetration testing upon every new functionality released. The platform can automatically perform several API attacks leveraging a novel machine learning (ML) algorithm trained over thousands of security tests. Then, Equixly returns near-real-time results and a predictive remediation plan that developers may use to fix their application issues autonomously. ...
  • 19
    Traceable

    Traceable

    Traceable

    Meet the Industry’s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. If you’re planning on improving the data security posture...
    Starting Price: $0
  • 20
    ImmuniWeb

    ImmuniWeb

    ImmuniWeb

    ImmuniWeb SA is a global application security company operating in over 50 countries, headquartered in Geneva, Switzerland. Most of ImmuniWeb customers come from regulated industries, such as banking, healthcare, and e-commerce. ImmuniWeb® AI Platform leverages award-winning AI and Machine Learning technology for acceleration and intelligent automation of Attack Surface Management and Dark Web Monitoring.
    Starting Price: $499/month
  • 21
    Cequence Security

    Cequence Security

    Cequence Security

    Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and...
  • 22
    Signal Sciences

    Signal Sciences

    Signal Sciences

    The leading hybrid and multi-cloud platform that provides next-gen WAF, API Security, RASP, Advanced Rate Limiting, Bot Protection, and DDoS purpose built to eliminate the challenges of legacy WAF. Legacy WAFs weren’t designed for today’s web apps that are distributed across cloud, on-premise or hybrid environments. Our next-gen web application firewall (NGWAF) and runtime application self protection (RASP) increase security and maintain reliability without sacrificing velocity, all at...
  • 23
    Reblaze

    Reblaze

    Reblaze

    ...Unprecedented real time traffic visibility as well as highly granular policies enables full control of your web traffic. Machine learning provides accurate, adaptive threat detection, while dedicated VPC deployment ensures maximum privacy, performance and protection while minimizing overhead costs. Reblaze customers include Fortune 500 companies and innovative organizations across the globe.
  • 24
    NetScaler

    NetScaler

    Cloud Software Group

    Application delivery at scale can be complex. Make it simpler with NetScaler. Firmly on-prem. All-in on cloud. Good with hybrid. Whichever you choose, NetScaler works the same across them all. NetScaler is built with a single code base using a software-based architecture, so no matter which ADC form factor you choose — hardware, virtual machine, bare metal, or container — the behavior will be the same. Whether you are delivering applications to hundreds of millions of consumers, hundreds...
  • 25
    AppTrana

    AppTrana

    Indusface

    Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees.
    Starting Price: $99/month
  • 26
    Fastly

    Fastly

    Fastly

    Empower your developers, connect with your customers, and grow your business with today’s leading edge cloud platform. Deliver the best online experiences possible with our edge cloud platform, built to strengthen your current teams and technology. We move data and applications closer to your users — at the edge of the network — to help your websites and apps perform faster, safer, and at global scale. Fastly's highly programmable CDN gives you the freedom to customize delivery right at the...
  • 27
    Ambassador

    Ambassador

    Ambassador Labs

    ...Edge Stack makes securing microservices easy with a comprehensive set of security functionality, including automatic TLS, authentication, rate limiting, WAF integration, and fine-grained access control. The API Gateway contains a modern Kubernetes ingress controller that supports a broad range of protocols including gRPC and gRPC-Web, supports TLS termination, and provides traffic management controls for resource availability. Why use Ambassador Edge Stack API Gateway? - Accelerate Scalability: Manage high traffic volumes and distribute incoming requests across multiple backend services, ensuring reliable application performance. - Enhanced Security: Protect your APIs from unauthorized access and malicious attacks with robust security features...
  • Previous
  • You're on page 1
  • Next