Introducing G2.ai, the future of software buying.Try now
Controlio
Sponsored
Controlio
Visit Website
Product Avatar Image
Noname Security

By Noname Security

3.2 out of 5 stars
4 star
0%
3 star
0%
2 star
0%

How would you rate your experience with Noname Security?

Controlio
Sponsored
Controlio
Visit Website
It's been two months since this profile received a new review
Leave a Review

Noname Security Reviews & Product Details

Profile Status

This profile is currently managed by Noname Security but has limited features.

Are you part of the Noname Security team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Noname Security before?

Answer a few questions to help the Noname Security community

Noname Security Reviews (3)

Reviews

Noname Security Reviews (3)

3.2
3 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Aman K.
AK
Cyber Defense Intern
Small-Business (50 or fewer emp.)
"Perfect API Security Tool"
What do you like best about Noname Security?

The automatic detection and blocking of attacks in real-time is perfect for medium businesses like ours. Noname detects anomaly attacks and blocks them without any supervision which really helped us focus on strengthening the network. The setup was fairly easy and the noname security team was very helpful. Review collected by and hosted on G2.com.

What do you dislike about Noname Security?

For medium businesses I would say the price is a little expensive. As far as the reliability of noname is, it is perfectly worth the price. Review collected by and hosted on G2.com.

Anshul M.
AM
Security Analyst
Small-Business (50 or fewer emp.)
"One-of-a-kind API Security Platform"
What do you like best about Noname Security?

Noname security is an all-in-one tool for API security which makes it easier for companies to protect their API endpoints against cyber attacks. It has a lot of useful features which give users a complete overview of their API endpoints. Review collected by and hosted on G2.com.

What do you dislike about Noname Security?

My experience with the tool has been pretty good. Review collected by and hosted on G2.com.

Verified User in Airlines/Aviation
UA
Mid-Market (51-1000 emp.)
"Very unstable."
What do you like best about Noname Security?

Support people were nice but to no avail. Review collected by and hosted on G2.com.

What do you dislike about Noname Security?

The product was not stable. Each time needed to reinstall the server. Review collected by and hosted on G2.com.

There are not enough reviews of Noname Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(568)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
2
Postman Logo
Postman
4.6
(1,609)
Postman enables teams to efficiently collaborate at every stage of the API lifecycle while prioritizing quality, performance, and security.
3
Tenable Nessus Logo
Tenable Nessus
4.5
(295)
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Tenable is a 2021 Gartner Representative Vendor in Vulnerability Assessment.
4
apisec.ai Logo
apisec.ai
4.7
(228)
APIsec is an AI-powered API security testing platform designed to continuously identify and address vulnerabilities across all API endpoints. By integrating seamlessly into development pipelines, APIsec automates the detection of complex security issues, including those outlined in the OWASP API Top 10, such as Broken Object Level Authorization (BOLA and broken access control. This proactive approach ensures that APIs remain secure throughout their lifecycle, reducing the risk of exploitation. Key Features and Functionality: - AI-Powered Attack Simulation: Automatically generates and executes thousands of attack scenarios to uncover real vulnerabilities, surpassing the capabilities of traditional scanners. - Continuous Automated Testing: Integrates into CI/CD pipelines to provide ongoing security assessments with every release, ensuring that new code does not introduce vulnerabilities. - Comprehensive Coverage: Tests every endpoint and method, addressing all OWASP API Top 10 vulnerabilities, including complex logic issues like BOLA and broken access control. - Real Exploit Verification: Delivers verified vulnerabilities with detailed remediation guidance, minimizing false positives and providing actionable insights. - Community-Driven Intelligence: Leverages a network of over 100,000 security professionals contributing threat data, tactics, and best practices to keep the platform updated. Primary Value and Problem Solved: APIsec addresses the critical need for robust API security by automating the detection of vulnerabilities that traditional manual testing methods often miss. By providing continuous, comprehensive, and accurate security assessments, APIsec enables organizations to proactively secure their APIs, integrate security seamlessly into their development processes, and reduce the risk of data breaches and unauthorized access. This ensures that APIs, which are increasingly becoming the backbone of modern applications, remain a secure and reliable component of the software ecosystem.
5
Orca Security Logo
Orca Security
4.6
(222)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
6
Salt Security Logo
Salt Security
4.7
(12)
Protect Your SaaS, Web and Mobile Applications From API Attacks
7
Intruder Logo
Intruder
4.8
(197)
Intruder is a proactive security monitoring platform for internet-facing systems.
8
Astra Pentest Logo
Astra Pentest
4.6
(161)
Astra security is a cybersecurity company that provides multiple features of protecting your website or company online. The comprehensive suite efficiently helps uncover vulnerabilities in thousands of apps & networks. Preventing data breaches and network compromise. 🧑‍💻 It offers Vulnerability Assessment and Penetration Testing (VAPT) for Website/Web App, Mobile App, SaaS, APIs, Cloud Infrastructure (AWS/Azure/GCP), Network Devices (Firewall, Router, Server, Switch, Printer, Camera, etc), Blockchain/Smart Contract, and more. ✨ Key highlighted features of Astra Pentest Suite: - A shiny bright dashboard that displays managed automated & manual pentesting - More than 2500+ security tests - Detailed Vulnerability Scanning & Reporting - Easy Vulnerability Management - Industry Recognized Verifiable VAPT Certificate ⚡️ Other features: - OWASP, SANS 25 standard testing - One-click actions for report download, email & more - CXO & developer-friendly dashboard - Contextual bug fix collaboration between your developers & security team
9
Wallarm API Security Platform Logo
Wallarm API Security Platform
4.7
(95)
Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and block API attacks. Customers choose Wallarm because it delivers a complete inventory of their APIs, AI apps, and agentic AI, along with patented AI/ML API abuse detection, real-time blocking on day zero, and an API SOC-as-a-service. Whether you protect legacy or brand new cloud-native APIs, Wallarm’s multi-cloud platform delivers the capabilities to secure your business against emerging threats.
10
Cortex Cloud Logo
Cortex Cloud
4.1
(110)
Cloud to SOC security to protect cloud applications, data, and AI models across multicloud and hybrid environments by leveraging unified data and full-lifecycle context for real-time detection and response.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Noname Security Comparisons
Product Avatar Image
Salt Security
Compare Now