Cequence Security References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (728)
    9+ References
  • 4.7 / 5.0 (3373)
    Premium248+ References
  • 4.7 / 5.0 (2186)
    Verified160+ References

Cequence Security Case Studies

  • Large Mobile Phone Carrier Discovers Thousands of Unmanaged and Insecure APIs

  • Canada’s Largest Pizza Chain Moved from Reactive to Proactive API Protection with Cequence

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References9 total
    About

    StackHawk makes it simple for developers to find, triage, and fix application security bugs. Scan your application for AppSec bugs in the code your team wrote, triage and fix with provided documentation, and automate in your pipeline to prevent future bugs from hitting prod.

  • Reference Rating
    4.7 / 5.0
    Customer References248 total
    About

    Sumo Logic is the next generation log management and analytics company that leverages Big Data for real-time IT insights. Sumo Logic cloud-based service provides customers with real-time interactive analytics at unprecedented petabyte scale. The Sumo Logic service is powered by patent-pending Elastic Log Processing™ and LogReduce™ technologies, and transforms log data into actionable insights for IT operations, application management, and security and compliance teams. Unlike expensive and complex premise-based solutions, the Sumo Logic service has a low TCO, can be deployed instantly, scales elastically and requires zero maintenance. Sumo Logic is based in Silicon Valley and is backed by Greylock Partners and Sutter Hill Ventures.

  • Reference Rating
    4.7 / 5.0
    Customer References160 total
    About

    Vectra is an artificial intelligence company that develops a cybersecurity platform that automates threat hunting. Vectra's product is Cognito, a cybersecurity analyst in software that is the fastest, most efficient way to find and stop attackers inside your network. Cognito uses artificial intelligence to deliver real-time attack visibility and put attack details at your fingertips to empower immediate action. By combining advanced machine learning techniques – including deep learning and neural networks – Cognito quickly finds hidden attackers before they do damage. Cognito eliminates blind spots by analyzing all network traffic and logs from security systems, authentication systems and SaaS apps to provide high-fidelity visibility from cloud/data center workloads to user/IoT devices. Cognito works with firewalls, endpoint security, and NAC to automatically block cyberattacks.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked