Introducing G2.ai, the future of software buying.Try now
cside
Sponsored
cside
Visit Website
Product Avatar Image
PreEmptive

By Idera, Inc.

4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with PreEmptive?

cside
Sponsored
cside
Visit Website
It's been two months since this profile received a new review
Leave a Review

PreEmptive Reviews & Product Details

Profile Status

This profile is currently managed by PreEmptive but has limited features.

Are you part of the PreEmptive team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used PreEmptive before?

Answer a few questions to help the PreEmptive community

PreEmptive Reviews (1)

Reviews

PreEmptive Reviews (1)

4.0
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Bikash P.
BP
Penetration Tester/InfoSec Consultant
Small-Business (50 or fewer emp.)
"PreEmptive Protection"
What do you like best about PreEmptive?

PreEmptive Protection helps and provide Protection from being spam or form being ripped Review collected by and hosted on G2.com.

What do you dislike about PreEmptive?

UI of PreEmptive Protection is that they have to work on it

It's not easy to find something sometimes Review collected by and hosted on G2.com.

There are not enough reviews of PreEmptive for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(572)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
2
Appdome Logo
Appdome
4.8
(63)
AI-Native Platform to automate mobile app protection. 400+ defenses Certified Secure™ for mobile app security, fraud prevention, anti-malware, anti-bot, anti-ATO, and anti-cheat. Full lifecycle automated build, test, monitor, detect, respond, support. All Android & iOS apps.
3
DoveRunner Logo
DoveRunner
4.7
(51)
DoveRunner is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
4
Codacy Logo
Codacy
4.6
(28)
Codacy is an automated code review tool that allows developers to improve code quality and monitor technical debt.
5
Jscrambler Logo
Jscrambler
4.4
(24)
Jscrambler, the power to protect your code
6
Zimperium Mobile Application Protection Suite (MAPS) Logo
Zimperium Mobile Application Protection Suite (MAPS)
4.0
(21)
Zimperium’s Mobile Application Protection Suite (MAPS) enables enterprises to secure mobile apps from development through runtime—ensuring both compliance and protection in production environments. MAPS includes four core components: zScan: Identifies compliance, privacy, and security risks in the development process before apps are released. zShield: Protects source code, IP, and app data from reverse engineering and tampering. zKeyBox: Secures encryption keys and secrets using white-box cryptography to prevent extraction or misuse. zDefend: An embedded SDK that provides on-device detection and defense against device, network, phishing, and malware threats. Together, these capabilities deliver comprehensive in-app protection with centralized threat visibility—trusted by enterprises in regulated and high-risk industries.
7
LIAPP Logo
LIAPP
4.8
(20)
LIAPP, the powerful mobile app protector, integrated in a minute.
8
Feroot Security Logo
Feroot Security
4.9
(21)
Feroot AI agents to automate complex security and compliance processes, replacing manual work, human errors, and overhead costs with continuous, real-time automation. While traditional tools, Feroot’s AI-driven approach provides: • One-Click Compliance and Security: Achieve compliance with over 50 global laws and standards—including PCI DSS 4.0.1, HIPAA, CCPA/CPRA, GDPR, and CIPA—in just 45 seconds. What once took teams months, Feroot streamlines into a single, effortless action. • Proactive Protection: Feroot’s AI doesn’t just detect threats—it prevents them. By automating the monitoring and securing of web assets, Feroot stops hidden risks like Magecart, formjacking, and unauthorized data collection in real time. • Cost and Efficiency Gains: Automation eliminates labor-intensive tasks, reducing operational costs and ensuring consistent, error-free results.
9
cside Logo
cside
4.9
(10)
cside protects organizations from advanced client-side threats such as script injection, data skimming, and browser-based attacks, risks often overlooked by traditional security measures. It also addresses the growing challenge of web supply chain risk, ensuring real-time visibility and control over third-party scripts running in user environments. c/side provides proactive, proxy-based protection that helps organizations meet compliance requirements like PCI DSS 4.0.1, DORA, GDPR, safeguard sensitive data, and uphold user privacy, all without compromising performance.
10
RedShield Logo
RedShield
3.9
(5)
RedShield is the web application shielding-with-a-service cybersecurity company.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
PreEmptive
View Alternatives