Indusface WAS Reviews & Product Details

Indusface WAS Overview

What is Indusface WAS?

Indusface web application scanning helps detect web application vulnerabilities, malware, and logical flaws with daily or on-demand comprehensive scanning. Managed by certified security experts, Indusface web application scanning helps organizations find a greater business impact of logical flaws with detailed demonstrations through proof-of-concept.

Indusface WAS Details
Languages Supported
English
Product Description

Indusface web application scanning helps detect web application vulnerabilities, malware, and logical flaws with daily or on-demand comprehensive scanning. Managed by certified security experts, Indusface WAS helps organizations find a greater business impact of logical flaws with detailed demonstrations through proof-of-concept.


Seller Details
Seller
Indusface
Company Website
HQ Location
San Bruno, Ca
Twitter
@Indusface
853 Twitter followers

Overview Provided by:
Show More

Indusface WAS Screenshots

Answer a few questions to help the Indusface WAS community
Have you used Indusface WAS before?
Yes

Indusface WAS Reviews

Write a Review
Filter reviews
LinkedIn®
Connections
Showing 1 Indusface WAS review
Showing 1 review
Filter Reviews
Filter Reviews
Sort by
Ratings
Company Size
User Role
For Category
All Industries
Region
Already have Indusface WAS?
Write a Review
Technical Architect
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Invitation from G2
What do you like best?

CDN: The best part is it comes with Content Delivery Network which helps to serve content from the nearest location to our clients. It drastically improved our web response time from different locations.

Upload of SSL Certificates: It supports the Upload of custom SSL certificates through its portal only which just gets implemented after the upload.

Manual penetration testing: Apart from Automated vulnerability scans, it provides us On Demand request of manual penetration testing where their security analyst analyses the server and then lists out of the vulnerabilities along with their detailed solution.

Quick Support: Another great part is their support team which is ready to help any time and easily understands our concerns. Review collected by and hosted on G2.com.

What do you dislike?

GUI: They need to do a lot of work to make an appealing good graphical user interface.

Not all the features works: There are some features which like enabling CDN which does not work most of the time until get requested to Support Team. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

Go for it if you looking for all-in-one web application security solution which would give you benefits like Content Delivery Network, Vulnerability scanner, Penetration testing for your web app. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Preventing web attacks: When it comes to secure us from SQL injections, Bot Attacks, DDoS Mitigation, blocking access to any specific country, it does its job pretty well.

Vulnerability management/scanning: It scans our server for a large set of vulnerabilities in a timely manner and shares those with us over a detailed report.

Penetration testing: We use to get penetration testing of our web applications by requesting from their portal very efficiently. Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of Indusface WAS for G2 to provide buying insight. Below are some alternatives with more reviews:

1
IBM Security QRadar Logo
IBM Security QRadar
4.3
(191)
IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solution then uniquely connects the end-to-end chain of activity associated with a single potential incident, and provides prioritized alerts based on severity, helping quickly uncover critical threats while reducing false positives.
2
Nessus Logo
Nessus
4.4
(161)
Nessus is a vulnerability management solution.
3
AlienVault USM (from AT&T Cybersecurity) Logo
AlienVault USM (from AT&T Cybersecurity)
4.4
(107)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
4
Nginx Logo
Nginx
4.6
(87)
free, open-source, high-performance HTTP server and reverse proxy
5
SaltStack Logo
SaltStack
4.3
(81)
Systems and configuration management software
6
Acunetix Vulnerability Scanner Logo
Acunetix Vulnerability Scanner
4.2
(79)
Acunetix Vulnerability Scanner automatically crawls and scans off-the-shelf and custom-built websites and web applications for SQL Injection, XSS, XXE, SSRF, Host Header Attacks & over 3000 other web vulnerabilities. It also provides a wide variety of reports to help developers and business owners alike to quickly identify a web application’s threat surface, detect what needs to be fixed, and ensure conformance with several compliance standards.
7
BurpSuite Logo
BurpSuite
4.7
(78)
Burp Suite is a toolkit for web application security testing.
8
Imperva Cloud Application Security Logo
Imperva Cloud Application Security
4.1
(78)
Incapsula is a cloud-based security and acceleration service that makes websites safer, faster, and more reliable.
9
Qualys Cloud Platform. Logo
Qualys Cloud Platform.
4.1
(58)
Vulnerability Management
10
InsightVM (Nexpose) Logo
InsightVM (Nexpose)
4.4
(42)
Continuously identify and assess risk across your cloud, virtual, remote, local, and containerized infrastructure. Leverage unparalleled attacker analytics to prioritize vulns more precisely with a Real Risk score that goes beyond just CVSS. Break down the silos between IT, security, and development to streamline and automate remediation efforts.
Show More