Audience

telcos (CSP, mobile operators, broadband providers), ISPs, and corporations

About Whalebone

Whalebone is a zero disruption cybersecurity product for telcos, ISPs, and corporations that provides millions of everyday internet users unyielding protection from malware, phishing schemes, ransomware, and other malicious digital attacks without the need for them to download anything. Whalebone’s mission is to bring cybersecurity to 1 billion everyday people. Whalebone has repeatedly proven its potential by enabling important CEE telcos to properly protect their customers, while significantly raising their revenue. At this point, Whalebone has 200+ customers in telecommunications and corporate sectors around the globe.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Whalebone
Founded: 2016
Czech Republic, EU
www.whalebone.io

Videos and Screen Captures

Other Useful Business Software
MongoDB Atlas runs apps anywhere Icon
MongoDB Atlas runs apps anywhere

Deploy in 115+ regions with the modern database for every enterprise.

MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free

Product Details

Platforms Supported
Cloud
Windows
iPhone
Android
Training
Documentation
Live Online
Support
Phone Support
Online

Whalebone Frequently Asked Questions

Q: What kinds of users and organization types does Whalebone work with?
Q: What languages does Whalebone support in their product?
Q: What kind of support options does Whalebone offer?
Q: Does Whalebone have a mobile app?
Q: What type of training does Whalebone provide?

Whalebone Product Features

Cybersecurity

AI / Machine Learning
Endpoint Management
Incident Management
Whitelisting / Blacklisting
Behavioral Analytics
IOC Verification
Tokenization
Vulnerability Scanning