StackHawk References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (774)
    7+ References
  • 4.7 / 5.0 (4419)
    Verified378+ References
  • 4.7 / 5.0 (2342)
    Verified160+ References

StackHawk Testimonials

  • “We are convinced that StackHawk is the best tool and aligns with our needs.”

  • "Having used other tools to do application scanning, we excited to watch Stackhawk democratize the process, making scan setup and execution easier for devs, QA, and DevOps folks."

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References7 total
    About

    42Crunch is working on the next generation of API threat protection platforms. 42 Crunch builds the security platform which automatically generates the appropriate security policies for enterprises APIs and their hosting infrastructure, thanks to an innovative risk assessment tooling. The 42 Crunch platform empowers security teams and enables close collaboration with development and operations teams, an approach known as DevSecOps.

  • Reference Rating
    4.7 / 5.0
    Customer References378 total
    About

    Fastly is the only content delivery network that gives businesses complete control over how they serve content, unprecedented access to real-time performance analytics, and the ability to cache frequently changing content at the edge. Fastly's secure, global network allows enterprises to increase revenue and improve customer experiences across their websites and mobile applications while maintaining fast, consistent, and reliable performance. Fastly is funded by August Capital, Battery Ventures, O’Reilly AlphaTech Ventures, Amplify Partners, and IDG Ventures.

  • Reference Rating
    4.7 / 5.0
    Customer References160 total
    About

    Vectra is an artificial intelligence company that develops a cybersecurity platform that automates threat hunting. Vectra's product is Cognito, a cybersecurity analyst in software that is the fastest, most efficient way to find and stop attackers inside your network. Cognito uses artificial intelligence to deliver real-time attack visibility and put attack details at your fingertips to empower immediate action. By combining advanced machine learning techniques – including deep learning and neural networks – Cognito quickly finds hidden attackers before they do damage. Cognito eliminates blind spots by analyzing all network traffic and logs from security systems, authentication systems and SaaS apps to provide high-fidelity visibility from cloud/data center workloads to user/IoT devices. Cognito works with firewalls, endpoint security, and NAC to automatically block cyberattacks.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked