Related Products
|
||||||
About
BotDetect™ CAPTCHA generator is a non-stalking form-security solution that uses a mix of measures, that are easy for humans but hard for bots, to prevent automated form posting. BotDetect also provides an audio Captcha alternative to keep websites accessible to people with impaired vision, enabling you to make WCAG and Section 508 compliant websites. The years of Google’s relentless abuses of their organic and paid search monopolies, and the years of their equally relentless campaign of disinformation and FUD about captchas, took a toll among our former competitors there are only two viable players left. During its first decade, BotDetect was unique among Captcha generators in offering many different Captcha image and sound algos. While each of them was easily comprehensible to humans, the random use of multiple Captcha generation algos made the generated captchas extremely difficult to pass automatically.
|
About
Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.
|
About
Protect your websites, mobile applications, and APIs from automated attacks without affecting the flow of business-critical traffic. Bad bots affect your business by committing online fraud through account takeover or competitive price scraping. Reduce the adverse business impact and remove bad bot traffic with Imperva’s Advanced Bot Protection. Transform your online business performance with Advanced Bot Protection. Flexible deployment options meet your specific business needs. Use Imperva’s Cloud Application Security platform or a Connector to popular technology stacks. Advanced Bot Protection gives visibility and control over human, good bot, and bad bot traffic without imposing friction on legitimate users.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Captcha and audio Captcha solution to help companies against bot attacks
|
Audience
IT teams in need of an API security solution
|
Audience
Companies interested in a bot protection platform
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationCaptcha
Founded: 2004
United States
captcha.com
|
Company InformationCequence Security
Founded: 2014
United States
www.cequence.ai
|
Company InformationImperva
Founded: 2002
United States
www.imperva.com/products/advanced-bot-protection-management/
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
Categories |
||||
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
|
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
|
|||||
Integrations
AT&T Alien Labs Open Threat Exchange
Amazon Elastic Container Service (Amazon ECS)
Amazon Web Services (AWS)
Azure Kubernetes Service (AKS)
Datadog
Docker
Envoy
Google Kubernetes Engine (GKE)
Helm
Istio
|
Integrations
AT&T Alien Labs Open Threat Exchange
Amazon Elastic Container Service (Amazon ECS)
Amazon Web Services (AWS)
Azure Kubernetes Service (AKS)
Datadog
Docker
Envoy
Google Kubernetes Engine (GKE)
Helm
Istio
|
Integrations
AT&T Alien Labs Open Threat Exchange
Amazon Elastic Container Service (Amazon ECS)
Amazon Web Services (AWS)
Azure Kubernetes Service (AKS)
Datadog
Docker
Envoy
Google Kubernetes Engine (GKE)
Helm
Istio
|
||||
|
|
|
|