AuthSafe References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1186)
    20+ References
  • 4.7 / 5.0 (3554)
    Premium319+ References
  • 4.8 / 5.0 (914)
    10+ References

AuthSafe Case Studies

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References20 total
    About

    Cequence Security is a venture-backed cybersecurity software company founded in 2015 and based in Sunnyvale, CA. Its mission is to transform application security by consolidating multiple security functions into an open, AI-powered software platform that protects customers’ APIs and web-based applications from automated bot attacks and vulnerability exploits.

  • Reference Rating
    4.7 / 5.0
    Customer References319 total
    About

    CrowdStrike is a leading provider of next-generation endpoint protection, threat intelligence, and pre and post incident response services. CrowdStrike Falcon is the first true Software-as-a- Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage – even malware-free intrusions. Falcon’s patented lightweight endpoint sensor can be deployed to over 100,000 endpoints in hours providing visibility into billions of events in real-time. CrowdStrike operates on a highly scalable subscription-based business model that allows customers the flexibility to use CrowdStrike-as-a-Service to multiply their security team’s effectiveness and expertise with 24/7 endpoint visibility, monitoring, and response.

  • Reference Rating
    4.7 / 5.0
    Customer References10 total
    About

    GeeTest protects your websites, mobile apps and APIs from bad bot attacks with zero user friction. Its self-learning defense model based on GCN and massive volumes of biometric data collected in the past years since 2012, allows GeeTest to identify and mitigate bad bots across all GeeTest-protected sites. GeeTest dynamic defense model provides its clients with a broader and deeper understanding of bot activities while its superior technology constantly learns and adjusts itself for any emerging threats.