Lastline References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (4723)
    Verified931+ References
  • 4.7 / 5.0 (7051)
    Premium793+ References
  • 4.8 / 5.0 (338)
    Premium1+ References

Lastline Testimonials

  • "Today’s cyber criminals have already figured out how to get past traditional sandboxing and Lastline’s full-emulation technology is clearly the best-of-breed solution in the market."

  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References931 total
    About

    Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products. Palo Alto Networks security platform safely enables business operations and delivers protection based on what matters most in today's dynamic computing environments: applications, users, and content.

  • Reference Rating
    4.7 / 5.0
    Customer References793 total
    About

    Check Point Software Technologies Ltd. is the largest pure-play security vendor globally, provides industry-leading solutions and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending the entire enterprise, from networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.

  • Reference Rating
    4.7 / 5.0
    Customer References1 total
    About

    Bit9 and Carbon Black have joined together to offer the industry’s most complete solution for advanced threat protection for endpoints and servers. The merged company helps organizations protect themselves from advanced threats in two critical ways: by reducing their attack surface through new signature-less forms of prevention, and rapidly detecting and responding to threats. We do this by combining Carbon Black’s lightweight endpoint sensor, which can be rapidly deployed with no configuration to deliver "incident response in seconds," and Bit9’s industry-leading prevention technologies to continuously monitor and record all activity on endpoints and servers and stop cyber threats that evade traditional security defenses.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked