Audience

telcos (CSP, mobile operators, broadband providers), ISPs, and corporations

About Whalebone

Whalebone is a zero disruption cybersecurity product for telcos, ISPs, and corporations that provides millions of everyday internet users unyielding protection from malware, phishing schemes, ransomware, and other malicious digital attacks without the need for them to download anything. Whalebone’s mission is to bring cybersecurity to 1 billion everyday people. Whalebone has repeatedly proven its potential by enabling important CEE telcos to properly protect their customers, while significantly raising their revenue. At this point, Whalebone has 200+ customers in telecommunications and corporate sectors around the globe.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Whalebone
Founded: 2016
Czech Republic, EU
www.whalebone.io

Videos and Screen Captures

Other Useful Business Software
Auth0 for AI Agents now in GA Icon
Auth0 for AI Agents now in GA

Ready to implement AI with confidence (without sacrificing security)?

Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
Start building today

Product Details

Platforms Supported
Cloud
Windows
iPhone
Android
Training
Documentation
Live Online
Support
Phone Support
Online

Whalebone Frequently Asked Questions

Q: What kinds of users and organization types does Whalebone work with?
Q: What languages does Whalebone support in their product?
Q: What kind of support options does Whalebone offer?
Q: Does Whalebone have a mobile app?
Q: What type of training does Whalebone provide?

Whalebone Product Features

Cybersecurity

AI / Machine Learning
Endpoint Management
Incident Management
Whitelisting / Blacklisting
Behavioral Analytics
IOC Verification
Tokenization
Vulnerability Scanning