Introducing G2.ai, the future of software buying.Try now
Metadata.io
Sponsored
Metadata.io
Visit Website
Product Avatar Image
Dune Security

By Dune Security

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Dune Security and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
0 out of 5 stars

How would you rate your experience with Dune Security?

Metadata.io
Sponsored
Metadata.io
Visit Website
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Dune Security Reviews & Product Details

Product Avatar Image

Have you used Dune Security before?

Answer a few questions to help the Dune Security community

Dune Security Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Dune Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(572)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
2
Jscrambler Logo
Jscrambler
4.4
(24)
Jscrambler, the power to protect your code
3
Feroot Security Logo
Feroot Security
4.9
(21)
Feroot AI agents to automate complex security and compliance processes, replacing manual work, human errors, and overhead costs with continuous, real-time automation. While traditional tools, Feroot’s AI-driven approach provides: • One-Click Compliance and Security: Achieve compliance with over 50 global laws and standards—including PCI DSS 4.0.1, HIPAA, CCPA/CPRA, GDPR, and CIPA—in just 45 seconds. What once took teams months, Feroot streamlines into a single, effortless action. • Proactive Protection: Feroot’s AI doesn’t just detect threats—it prevents them. By automating the monitoring and securing of web assets, Feroot stops hidden risks like Magecart, formjacking, and unauthorized data collection in real time. • Cost and Efficiency Gains: Automation eliminates labor-intensive tasks, reducing operational costs and ensuring consistent, error-free results.
4
Evervault Logo
Evervault
4.4
(17)
Evervault eliminates the security and compliance burden of handling sensitive user data, by equipping developers with easy-to-use tools to encrypt, process, and share that data, without touching it in plaintext. *How Evervault Works* 1. *Encrypt data*. Evervault acts as an invisible encryption proxy which automatically intercepts and encrypts any sensitive fields before they touch your infrastructure. 2. *Use encrypted data*. Once your data is encrypted on the Evervault platform, you have power to use that data in any way you need. You can easily: - Easily perform operations, like validation or data manipulation, on fully encrypted data in a secure environment. - Instantly send data to trusted third party servers, like Stripe or Twillio, automatically decrypting fields on the way.
5
Reflectiz Logo
Reflectiz
4.7
(13)
Reflectiz helps companies to unleash the power of their web 3rd-party Applications and keeps online businesses safe by mitigating security and privacy risks resulting from next generation third-party threats on your website, without adding a single line of code.
6
cside Logo
cside
4.9
(10)
cside protects organizations from advanced client-side threats such as script injection, data skimming, and browser-based attacks, risks often overlooked by traditional security measures. It also addresses the growing challenge of web supply chain risk, ensuring real-time visibility and control over third-party scripts running in user environments. c/side provides proactive, proxy-based protection that helps organizations meet compliance requirements like PCI DSS 4.0.1, DORA, GDPR, safeguard sensitive data, and uphold user privacy, all without compromising performance.
7
Imperva Client-Side Protection Logo
Imperva Client-Side Protection
4.5
(1)
Prevent supply chain fraud from client-side attacks like formjacking, digital skimming, and Magecart.
8
BlueClosure Logo
BlueClosure
3.5
(1)
The latest Minded Security Labs project regards JavaScript Security. We have released a tool called BlueClosure which helps security testers to analyze and discover Client Side security issues.
9
otto Logo
otto
5.0
(1)
otto-js automates the Visibility, Protection and Control over all your 3rd & Nth-party scripts. 5 minute setup. 1 line of code. 6 layers of security. Client-side security at runtime means 24/7 monitoring, detection and mitigation. otto-js takes the pain out of new PCI DSS v4 requirements , keeping your scripts secure & compliant by default. otto-js saves WebOps team time and money while protecting your website from malware, magecart, phishing attacks, data skimming, leaky forms and vulnerable libraries,
10
Radware Client-Side Protection Logo
Radware Client-Side Protection
(0)
Client-Side Protection Secure end users from attacks embedded in your application supply chain.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Dune Security
View Alternatives