Fonctionnalities
Features
Each solution is accessible and operational in just a few minutes.
Vulnerability Management
Web App Vulnerability
-
Automatic regular analysis
-
Monitoring the attack surface
-
Assessment of the security level
-
Fixing flaws
Next Gen Web App Firewall
AI Protect
-
Administration free
-
Behavioural analysis using AI
-
Automatic security rules
-
Real-time dashboard
Become a partner
-
-
-
MSSP
-
Infografer
-
Host
-
Cyber expert
-
-
Functional synthesis
Functionalities | AI Protect | Web App Vulnerability | Security Pack |
---|---|---|---|
No agents, no deployment and maintenance costs | |||
Protection through Artificial Intelligence | |||
Protection through behavioural analysis | |||
No Human Administration | |||
Protection against malware / ransomware | |||
Protection against data theft | |||
Protection against brute force (password) | |||
Protection contre le DDoS | |||
Visualisation of attacks in real time | |||
Provision of a Let's Encrypt SSL certificate | |||
Hosting a third party certificate | |||
URL and URL Exception Management | |||
Configurable reports: automatic, comparative, etc. | |||
Alerting | |||
HTTP/HTTPS requests per month: 1 million per FQDN | |||
Cumulative query package per number of FQDNs |
Functionalities | AI Protect | Web App Vulnerability | Security Pack |
---|---|---|---|
No agents, no deployment and maintenance costs | |||
Establish a comprehensive inventory of web applications and their versions | |||
Visualization of embedded and hidden technologies, critical components | |||
Measurement of the attack surface | |||
Identification of threats and vulnerabilities (CVE) | |||
Permanent monitoring of the application inventory | |||
Knowledge of its state of exposure to cyber attacks | |||
Checking for the presence of Exploit | |||
Risk management | |||
Acknowledgement of CVE | |||
Verification of the SSL chain | |||
Understanding the weaknesses of the application chain | |||
Automatic / comparative / white label report | |||
Alerting | |||
Identification of risks and scoring by criticality |
Functionalities | AI Protect | Web App Vulnerability | Security Pack |
---|---|---|---|
No agents, no deployment and maintenance costs | |||
Direct availability of patches and access to associated references | |||
Classification of detected threats | |||
Patch management | |||
Risk management | |||
Correlation of patches to detected flaws | |||
Reinforcement of good security practices | |||
Help with remediation | |||
Automatic / comparative / white label report | |||
Alerting | |||
Functionalities | AI Protect | Web App Vulnerability | Security Pack |
---|---|---|---|
Multi-user management and access rights delegation | |||
Visibility of the security level | |||
Classification of applications by security level | |||
Continuous monitoring of safety indicators | |||
Creation of Alert scenarios | |||
Support for the automation of security processes | |||
Assistance in the orchestration of security processes | |||
Managing the web security of several FQDNs | |||
Cyber risk level : scoring | |||
Presentation of the number of vulnerabilities | |||
Checking the SSL chain |
Functionalities | AI Protect | Web App Vulnerability | Security Pack |
---|---|---|---|
Real-Time Attack Tracking | |||
Visualization of embedded technologies, hidden, critical components | |||
Visualization of vulnerabilities evolutions | |||
Security Score Tracking | |||
Web Vulnerability Tracking | |||
Synthetic vision by FQDN | |||
Synthetic detection | |||
Decision view | |||
Trends and Statistics | |||
Cyber risk level | |||
Functionalities | AI Protect | Web App Vulnerability | Security Pack |
---|---|---|---|
Multi-user management and delegation of access rights | |||
Creation of customer sub-accounts |