Lastline References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (4544)
    Verified931+ References
  • 4.7 / 5.0 (6895)
    Premium768+ References
  • 4.8 / 5.0 (1556)
    21+ References

Lastline Case Studies

  • Agile Defense Protects High-Profile Department of Defense Agency with Lastline Defender Suite

  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References931 total
    About

    Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products. Palo Alto Networks security platform safely enables business operations and delivers protection based on what matters most in today's dynamic computing environments: applications, users, and content.

  • Reference Rating
    4.7 / 5.0
    Customer References768 total
    About

    Check Point Software Technologies Ltd. is the largest pure-play security vendor globally, provides industry-leading solutions and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending the entire enterprise, from networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.

  • Reference Rating
    4.7 / 5.0
    Customer References21 total
    About

    Attivo Networks, the leader in deception technology, provides an active defense for early detection, forensics, and automated incident response to in-network cyberattacks. The Attivo ThreatDefend™ Deception Platform provides a comprehensive and customer-proven platform for proactive security and accurate threat detection within user networks, data centers, clouds, and a wide variety of specialized attack surfaces. The portfolio includes expansive network, endpoint, application, and data deceptions designed to efficiently misdirect and reveal attacks from all threat vectors. Advanced machine-learning makes preparation, deployment, and operations fast and simple to operate for organizations of all sizes. Comprehensive attack analysis and forensics provide actionable alerts, and native integrations automate the blocking, quarantine, and threat hunting of attacks for accelerated incident response. The company has won over 50 awards for its technology innovation and leadership.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked