Data Theorem References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1870)
    49+ References
  • 4.8 / 5.0 (1958)
    Premium93+ References
  • 4.8 / 5.0 (1127)
    24+ References

Data Theorem Case Studies

  • Securing the Mobile and API Connected Work Space

  • Modern AppSec for the Entertainment and DevOps Leader

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References49 total
    About

    Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development to operations, to production.

  • Reference Rating
    4.7 / 5.0
    Customer References93 total
    About

    Orca Security was founded on the belief that cloud security visibility solutions need to provide full-stack visibility into all organizational assets, including the cloud infrastructure level, operating systems, applications, and data, with no risk or per-asset integration cost. The Orca Cloud Visibility Platform utilizes its unique SideScanning technology to seamlessly deliver "deep cloud inspection"​ comprehensive full-stack visibility into all of your entire cloud infrastructure and assets in a fraction of the time and cost of alternative approaches.

  • Reference Rating
    4.7 / 5.0
    Customer References24 total
    About

    Salt Security delivers an API Threat Protection solution focused on securing the ubiquitous APIs connecting everything from web and mobile applications to microservices and IoT devices. These are the APIs that you develop and own and are at the core of connecting your applications and data.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked