Introducing G2.ai, the future of software buying.Try now
Intruder
Sponsored
Intruder
Visit Website
Product Avatar Image
Gcore Web application and API protection (WAAP)

By Gcore

4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Gcore Web application and API protection (WAAP)?

Intruder
Sponsored
Intruder
Visit Website
It's been two months since this profile received a new review
Leave a Review

Gcore Web application and API protection (WAAP) Reviews & Product Details

Profile Status

This profile is currently managed by Gcore Web application and API protection (WAAP) but has limited features.

Are you part of the Gcore Web application and API protection (WAAP) team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Gcore Web application and API protection (WAAP) Media

Gcore Web application and API protection (WAAP) Demo -
Product Avatar Image

Have you used Gcore Web application and API protection (WAAP) before?

Answer a few questions to help the Gcore Web application and API protection (WAAP) community

Gcore Web application and API protection (WAAP) Reviews (1)

Reviews

Gcore Web application and API protection (WAAP) Reviews (1)

4.5
1 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
VK
Network Engineer
Small-Business (50 or fewer emp.)
"Gcore Web Application and API Protection short review"
What do you like best about Gcore Web application and API protection (WAAP)?

Gcore Web Application and API Protection (WAAP) solution offers some very interesting features that are quite easy to implement on their platform, for example:

1. Comprehensive protection that allows you to provide reliable protection for both web applications and APIs

2. Advanced threat detection is exactly what I needed to get to know the product for. The functionality is extremely comprehensive, Gcore WAAP uses sophisticated algorithms and machine learning to detect and eliminate evolving threats in real time.

3. Ease of use and integration with existing product. All information is available in the internal dashboard, where you can easily navigate and select a specific product for your task; there is also the possibility of deployment and compatibility with various platforms and technologies Review collected by and hosted on G2.com.

What do you dislike about Gcore Web application and API protection (WAAP)?

I have only recently become acquainted with the product, and have not yet identified any shortcomings in using the product from a technical point of view, except that the issue of cost remains Review collected by and hosted on G2.com.

There are not enough reviews of Gcore Web application and API protection (WAAP) for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(568)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
2
HAProxy Logo
HAProxy
4.7
(668)
HAProxy One helps you manage, secure, and observe all your application traffic — in any environment — with a unified platform. The platform consists of a flexible data plane (HAProxy Enterprise and HAProxy ALOHA) for TCP, UDP, QUIC and HTTP traffic, a scalable control plane (HAProxy Fusion), and a secure edge network (HAProxy Edge), which together enable multi-cloud load balancing as a service (LBaaS), web app and API protection, API/AI gateways, Kubernetes networking, application delivery network (ADN), and end-to-end observability.
3
Postman Logo
Postman
4.6
(1,609)
Postman enables teams to efficiently collaborate at every stage of the API lifecycle while prioritizing quality, performance, and security.
4
Tenable Nessus Logo
Tenable Nessus
4.5
(295)
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Tenable is a 2021 Gartner Representative Vendor in Vulnerability Assessment.
5
apisec.ai Logo
apisec.ai
4.7
(228)
APIsec is an AI-powered API security testing platform designed to continuously identify and address vulnerabilities across all API endpoints. By integrating seamlessly into development pipelines, APIsec automates the detection of complex security issues, including those outlined in the OWASP API Top 10, such as Broken Object Level Authorization (BOLA and broken access control. This proactive approach ensures that APIs remain secure throughout their lifecycle, reducing the risk of exploitation. Key Features and Functionality: - AI-Powered Attack Simulation: Automatically generates and executes thousands of attack scenarios to uncover real vulnerabilities, surpassing the capabilities of traditional scanners. - Continuous Automated Testing: Integrates into CI/CD pipelines to provide ongoing security assessments with every release, ensuring that new code does not introduce vulnerabilities. - Comprehensive Coverage: Tests every endpoint and method, addressing all OWASP API Top 10 vulnerabilities, including complex logic issues like BOLA and broken access control. - Real Exploit Verification: Delivers verified vulnerabilities with detailed remediation guidance, minimizing false positives and providing actionable insights. - Community-Driven Intelligence: Leverages a network of over 100,000 security professionals contributing threat data, tactics, and best practices to keep the platform updated. Primary Value and Problem Solved: APIsec addresses the critical need for robust API security by automating the detection of vulnerabilities that traditional manual testing methods often miss. By providing continuous, comprehensive, and accurate security assessments, APIsec enables organizations to proactively secure their APIs, integrate security seamlessly into their development processes, and reduce the risk of data breaches and unauthorized access. This ensures that APIs, which are increasingly becoming the backbone of modern applications, remain a secure and reliable component of the software ecosystem.
6
Orca Security Logo
Orca Security
4.6
(222)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
7
DataDome Logo
DataDome
4.8
(202)
Real-Time Bot Protection The #1 bot protection solution for e-commerce and classified ads businesses - Deploys in minutes on any web infrastructure - Unmatched bot detection speed and accuracy - Dedicated threat research and SOC teams
8
Intruder Logo
Intruder
4.8
(197)
Intruder is a proactive security monitoring platform for internet-facing systems.
9
HUMAN Sightline Cyberfraud Defense Logo
HUMAN Sightline Cyberfraud Defense
4.5
(198)
Strengthen security. Stop fraud. Build trust. Humans, bots, and AI agents increasingly act on behalf of legitimate consumers and fraudsters alike. The challenge isn’t just blocking certain traffic types; it’s distinguishing between malicious and legitimate activity, regardless of the source, and responding appropriately in each case. HUMAN Sightline combines advanced detection, customizable mitigation, and investigative intelligence to provide that clarity. The solution protects users and accounts from fraud, abuse, and misuse by humans, bots, and AI agents — and seamlessly enables trusted interactions across the customer journey. By providing direct visibility into key business metrics, HUMAN Sightline allows you to understand and showcase the impact of anti-fraud measures on your bottom line, so you can optimize accordingly.
10
Fingerprint Logo
Fingerprint
4.6
(211)
As opposed to top-down, enterprise-focused fraud prevention platforms, FingerprintJS prevents digital fraud by uniquely and accurately identifying users, and empowering technical teams to use that data in a way that works for their applications.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.