+
+

Related Products

  • Cloudflare
    1,903 Ratings
    Visit Website
  • cside
    23 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • Orca Security
    492 Ratings
    Visit Website
  • Safetica
    394 Ratings
    Visit Website
  • Graylog
    383 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • SpamTitan
    814 Ratings
    Visit Website
  • Guardz
    103 Ratings
    Visit Website
  • KrakenD
    71 Ratings
    Visit Website

About

Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.

About

Protect applications from malicious and unwanted internet traffic with a cloud-based, PCI-compliant, global web application firewall service. By combining threat intelligence with consistent rule enforcement, Oracle Cloud Infrastructure Web Application Firewall strengthens defenses and protects internet-facing application servers. Adopt an edge security strategy with a web application firewall that aggregates threat intelligence from multiple sources including WebRoot BrightCloud® and more than 250 predefined OWASP, application, and compliance-specific rules. Protect applications deployed in Oracle Cloud Infrastructure, on-premises, and in multicloud environments with access controls based on geolocation data, whitelisted and blacklisted IP addresses, HTTP URL, and HTTP header. Identify and block malicious bot traffic with an advanced set of verification methods, including JavaScript, CAPTCHA, device fingerprinting, and human interaction algorithms.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams in need of an API security solution

Audience

Organizations that need a cloud-based web application firewall

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cequence Security
Founded: 2014
United States
www.cequence.ai

Company Information

Oracle
Founded: 1977
United States
www.oracle.com/security/cloud-security/web-application-firewall/

Alternatives

Resurface

Resurface

Resurface Labs

Alternatives

Imperva WAF

Imperva WAF

Imperva

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Integrations

Amazon EKS
Amazon Elastic Container Service (Amazon ECS)
Amazon Web Services (AWS)
Azure Kubernetes Service (AKS)
Datadog
Docker
Envoy
GigaSECURE
Google Kubernetes Engine (GKE)
Helm
Istio
Kong Konnect
Mule ESB
NGINX
Splunk Enterprise
Terraform
Tetrate

Integrations

Amazon EKS
Amazon Elastic Container Service (Amazon ECS)
Amazon Web Services (AWS)
Azure Kubernetes Service (AKS)
Datadog
Docker
Envoy
GigaSECURE
Google Kubernetes Engine (GKE)
Helm
Istio
Kong Konnect
Mule ESB
NGINX
Splunk Enterprise
Terraform
Tetrate
Claim Cequence Security and update features and information
Claim Cequence Security and update features and information
Claim Oracle Web Application Firewall and update features and information
Claim Oracle Web Application Firewall and update features and information