StackHawk References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (2326)
    23+ References
  • 4.7 / 5.0 (2530)
    Premium134+ References
  • 4.7 / 5.0 (2289)
    Verified160+ References

StackHawk Case Studies

  • Customer Data Platform Achieves 95% API Coverage

  • Breathe Life Deploys StackHawk and Snyk for a Dev-Centric Application Security Program

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References23 total
    About

    Akana’s comprehensive suite of API Management, API Security, Integrated SOA Governance, and Cloud Integration solutions helps businesses accelerate digital transformation by securely extending their reach across multiple channels – mobile, cloud and Internet of Things. Akana enables enterprises to share data as APIs, connect and integrate applications, drive partner adoption, monetize their assets, and provide intelligent insights into their business and operations. The world's largest companies including Bank of America, Pfizer, and Verizon use Akana products to harness the power of their technology and transform their businesses.

  • Reference Rating
    4.7 / 5.0
    Customer References134 total
    About

    Fastly Next-Gen WAF Developers change the way the world experiences the web: they drive the next groundbreaking innovation, power the companies that connect us, and create experiences that can transform their lives. And they built Fastly to make sure they always have what they need to make it happen.

  • Reference Rating
    4.7 / 5.0
    Customer References160 total
    About

    Vectra is an artificial intelligence company that develops a cybersecurity platform that automates threat hunting. Vectra's product is Cognito, a cybersecurity analyst in software that is the fastest, most efficient way to find and stop attackers inside your network. Cognito uses artificial intelligence to deliver real-time attack visibility and put attack details at your fingertips to empower immediate action. By combining advanced machine learning techniques – including deep learning and neural networks – Cognito quickly finds hidden attackers before they do damage. Cognito eliminates blind spots by analyzing all network traffic and logs from security systems, authentication systems and SaaS apps to provide high-fidelity visibility from cloud/data center workloads to user/IoT devices. Cognito works with firewalls, endpoint security, and NAC to automatically block cyberattacks.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked