Cerber Security

Cerber Security

Cerber Tech
+
+

Related Products

  • Reflectiz
    29 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,936 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • cside
    33 Ratings
    Visit Website
  • Source Defense
    7 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,305 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Feroot
    30 Ratings
    Visit Website
  • Cloudflare
    2,002 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website

About

Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design. A set of specialized request inspection algorithms screen incoming requests for malicious code patterns and traffic anomalies. Bot detection engine identifies and mitigates automated attacks. Mitigates brute force and code injection attacks. Restricts access with GEO country rules. Prevents both REST API and ordinary user enumerations. Restricts access to REST API and XML-RPC. Uses a global list of IP addresses known for malicious activity. Detects bots by using heuristic and content-based algorithms. Checks IP against a real-time database of IP addresses known for disseminating spam, phishing attacks and other forms of malicious activity. Thoroughly scans every file and folder on your website for malware, trojans, and viruses. Automatically removes malware and viruses. Monitors new, changed, and suspicious files.

About

Detecting malware from behind the scenes – You will not feel it is installed on your computer Mac – easy on the resources. That combines behavioral heuristic analysis with powerful signatures database – the CyberByte™ Real-Time Malware Detection Engine will detect if you had installed a malicious application. Your time is precious, but also so is your digital life – CyberByte™ delivers fast scanning saving both time and your valuable data. With ransomware cyber terrorists – keep your Mac safe and don’t ever end up paying for what is already yours. The Malware Scan Engine(ClamAV) not only detects MacOS malware but it also detects Windows malware to help you not to infect other devices. Don’t let strangers use your resources – more than 80% of the attacks are crypto mining driven. We, at CyberByte™, besides our security consultancy expertise, we study the malware evolution and we had observed that there has been a 120% increase in Mac malware.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies with WordPress sites that want to defend against attacks

Audience

Antivirus software for anyone wanting to detect malware

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$24.99 per year
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cerber Tech
Founded: 2016
United States
wpcerber.com

Company Information

CyberByte
cyberbyte.org/index-4/

Alternatives

Alternatives

Reveelium

Reveelium

ITrust.fr
SpyHunter

SpyHunter

EnigmaSoft
FortiProxy

FortiProxy

Fortinet

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

WordPress

Integrations

WordPress
Claim Cerber Security and update features and information
Claim Cerber Security and update features and information
Claim CyberByte Antivirus and update features and information
Claim CyberByte Antivirus and update features and information