K2 Security Platform

K2 Security Platform

K2 Cyber Security
+
+

Related Products

  • Aikido Security
    148 Ratings
    Visit Website
  • Jscrambler
    38 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • Reflectiz
    15 Ratings
    Visit Website
  • Cloudflare
    1,918 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,505 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,231 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

Complete Protection for Applications and Container Workloads. Real-time Zero Day Attack Prevention. The K2 Security Platform is highly effective at detecting increasingly sophisticated attacks targeting applications that often go undetected by network and end point security solutions such as web application firewall (WAF) and endpoint detection and response (EDR). K2’s easy to deploy non-invasive agent installs in minutes. Using a deterministic technique of optimized control flow integrity (OCFI) the K2 Platform automatically creates a DNA map of each application at runtime which are used to determine the application is executing correctly. This results in extremely accurate attack detection that eliminates almost all false alerts. K2’s Platform can be deployed in cloud, on premise or in hybrid environments and protects web applications, container workloads and Kubernetes. OWASP Top 10 and other sophisticated attack type coverage.

About

Web attack recognition is based on AI+ rules. It is anti-bypass and low in both false negative and false positive rates. Web attack recognition defends effectively against common web attacks including the OWASP top 10 web security threats (SQL injection, unauthorized access, cross-site scripting, cross-site request forgery, web shell trojan upload, etc). Users can cache core web contents to the cloud and publish cached web pages, which act as substitutes and can prevent the negative consequences of web page tampering. Backend data is well protected by pre-event server and application concealing, mid-event attack prevention and post-event sensitive data replacement and concealing. WAF performs nationwide DNS verification of the domain names submitted by the customer to detect and display the hijacking conditions of the protected domain names in various regions, helping avoid data theft and financial losses caused by the hijacking of website users.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Development teams interested in a security platform solution like web application firewall (WAF) and endpoint detection and response (EDR)

Audience

Companies searching for an AI-based web business protection solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

K2 Cyber Security
Founded: 2017
United States
www.k2io.com/cyber-security-platforms/

Company Information

Tencent
Founded: 2013
China
intl.cloud.tencent.com/product/waf

Alternatives

Alternatives

Kona Site Defender

Kona Site Defender

Akamai Technologies
Trusted Knight Protector Web

Trusted Knight Protector Web

Trusted Knight Corporation

Categories

Categories

Integrations

Meeting360
Project360
TeamBeats
Tenable One
Tencent Cloud
VisitStream

Integrations

Meeting360
Project360
TeamBeats
Tenable One
Tencent Cloud
VisitStream
Claim K2 Security Platform and update features and information
Claim K2 Security Platform and update features and information
Claim Tencent Cloud Web Application Firewall and update features and information
Claim Tencent Cloud Web Application Firewall and update features and information