+
+

Related Products

  • Cloudflare
    1,918 Ratings
    Visit Website
  • Orca Security
    495 Ratings
    Visit Website
  • Graylog
    402 Ratings
    Visit Website
  • cside
    24 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • Retool
    566 Ratings
    Visit Website
  • Wiz
    1,106 Ratings
    Visit Website

About

Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.

About

At Netacea we understand bot behaviour better than anyone else, thanks to a pioneering server-side approach to detection and mitigation. Our approach guarantees quick and easy implementation of our technology and enables us to support a wide range of integrations. This ensures comprehensive coverage against malicious bots across your website, mobile apps and APIs, without detriment to your website infrastructure, reliance on hardware or disruptive code changes. We quickly distinguish automated bots from humans to prioritize genuine users, with our team of experts and revolutionary, machine learning powered Intent Analytics™ engine at the heart of the solution. Netacea works hand-in-hand with your in-house security functions from implementation, through to providing accurate detection and empowering you with actionable threat intelligence.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams in need of an API security solution

Audience

Medium to enterprise businesses looking to mitigate automated threats

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cequence Security
Founded: 2014
United States
www.cequence.ai

Company Information

Netacea
Founded: 2018
United Kingdom
www.netacea.com

Alternatives

Resurface

Resurface

Resurface Labs

Alternatives

CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

NGINX
Akamai
Amazon CloudFront
Amazon EKS
Amazon Elastic Container Service (Amazon ECS)
Amazon Web Services (AWS)
Cloudflare
Datadog
Docker
Envoy
Fastly
Google Kubernetes Engine (GKE)
Helm
Istio
Kong Konnect
Okta
Splunk Cloud Platform
Splunk Enterprise
Terraform

Integrations

NGINX
Akamai
Amazon CloudFront
Amazon EKS
Amazon Elastic Container Service (Amazon ECS)
Amazon Web Services (AWS)
Cloudflare
Datadog
Docker
Envoy
Fastly
Google Kubernetes Engine (GKE)
Helm
Istio
Kong Konnect
Okta
Splunk Cloud Platform
Splunk Enterprise
Terraform
Claim Cequence Security and update features and information
Claim Cequence Security and update features and information
Claim Netacea Bot Management and update features and information
Claim Netacea Bot Management and update features and information