Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

Penta Security Inc.

Show rating breakdown
18 reviews
  • 8 profiles
  • 4 categories
Average star rating
4.3
Serving customers since
1997

Featured Products

Profile Filters

All Products & Services

Product Avatar Image
MyDiamo

12 reviews

The Leading Security Solution for Open Source Database

Product Avatar Image
Cloudbric Managed Rules for AWS WAF - OWASP Top 10 Rule Set

2 reviews

Cloudbric Managed Rules for AWS WAF-OWASP Top 10 Rule Set detects abnormal traffic patterns and behaviors by utilizing the logic-based detection engine of Cloudbric WAF+ to protect the websites and web applications from the threats of OWASP Top 10 Web Application Security Risks such as SQL Injections and Cross-Site Scription (XSS). The logic-based detection engine, which was acknowledged by top research firms such as Gartner, Forrester, and Frost & Sullivan is automatically updated to ensure its performance and security against rapidly evolving web threats and vulnerabilities. Created based on the security technology and experience of WAPPLES, a web security product that has protected the web since 2005, Cloudbric Managed Rules for AWS WAF-OWASP Top 10 Rule Set will provide a safer, more secure online environment for its users.

Product Avatar Image
Cloudbric Managed Rules for AWS WAF - Malicious IP Reputation Rule Set

2 reviews

Cloudbric Managed Rules for AWS WAF-Malicious Reputation Rule Set detects and blocks IPs with high threat index using the Malicious IP Reputation list which is based on Penta Security's own Cyber Threat Intelligence (CTI), Cloudbric Labs. Founded on its data encryption technology in 1997, Penta Security is a leading provider of web and data security products, solutions, and services. The Threat DB of Cloudbric Labs, which has gained international recognition by also sharing its intelligence with Cyber Threat Alliance (CTA), collects and analyzes threat intelligence from 900,000 sites in 114 countries to update and save the Malicious IP Reputation list through blockchain technology. Created based on the security technology and experience of WAPPLES, a web security product that has protected the web since 2005, Cloudbric Managed Rules for AWS WAF-Malicious IP Reputation Rule Set will provide a safer, more secure online environment for the users.

Product Avatar Image
Cloudbric Managed Rules for AWS WAF - Bot Protection Rule Set

1 review

Cloudbric Managed Rules for AWS WAF-Bot Protection Rule Set mitigates the repetitive behaviors of bots such as scraper, scanner, and crawlers intended to damage the web application. The security experts of Penta Security collect and analyze the behavioral patterns of the bots to manage and update the rule set which proactively protect the web applications against malicious bots. Created based on the security technology and experience of WAPPLES, a web security product that has protected the web since 2005, Cloudbric Managed Rules for AWS WAF-Bot Protection Rule Set will provide a safer, more secure online environment for the users.

Product Avatar Image
Cloudbric Managed Rules for AWS WAF - Tor IP Detection Rule Set

1 review

Cloudbric Managed Rules for AWS WAF-Tor IP Detection Rule Set detects and blocks IPs that originate from Tor network. The origin of traffic when using the Tor Browser becomes anonymous as the traffic comes through 3 random servers (relays) within the Tor network, making it more difficult to block the traffic, as the IPs of Tor Browsers are difficult to detect using ordinary IP Risk Index. Tor IP Detection Rule Set utilizes a list of malicious Tor IPs, managed and updated regularly by the experts of Cloudbric Labs, to proactively respond to threats originating from any known malicious Tor IPs. Created based on the security technology and experience of WAPPLES, a web security product that has protected the web since 2005, Cloudbric Managed Rules for AWS WAF-Tor IP Detection Rule Set will provide a safer, more secure online environment for the users.

Product Avatar Image
Cloudbric Managed Rules for AWS WAF - Anonymous IP Protection Rule Set

0 reviews

Cloudbric Managed Rules for AWS WAF - Anonymous IP Protection was created to protect the websites and web applications against the threats from Anonymous IPs originating from various sources such as VPNs, Data Centers, DNS Proxies, Tor Networks, Relays, P2P Networks, etc. Anonymous IP Protection utilizes the Anonymous IP List, managed and updated by Cloudbric Labs, to detect and respond to Anonymous IPs that can easily be exploited for malicious purposes and prevent threats such as geo-location based fraud, DDoS or license and copyright infringement caused by hackers. Cloudbric Managed Rules for AWS WAF is created based on the security technologies and expertise of WAPPLES which has protected the web services for enterprises since 2005 and has recently been validated by a third-party testing firm to have a top-tier detection rate. Cloudbric Managed Rules for AWS WAF utilizes Penta Security's own Cyber Threat intelligence (CTI), Cloudbric Labs, to provide a safer online environment.

Product Avatar Image
Cloudbric WAF Managed Service (WMS) for AWS WAF

0 reviews

To protect their services from various web threats, Cloud Service Providers (CSPs) such as AWS provide a Web Application Firewall (WAF), allowing the users to create and manage security rules that fit their needs. These user-centered self-service WAFs can block web attacks such as SQL Injections and Cross Site Scripting (XSS) and filter specific IP addresses or regions. However, as AWS WAF requires the users to create, configure, and manage the rules for AWS WAF on their own, the users are burdened with complicated rules and maintenance responsibilities, which can be difficult for a user without expert knowledge. Cloudbric’s WAF Managed Service (WMS) is an intelligence-based security rule operation and management service that provides systematic support for users under the supervision of security experts with over 20 years of experience in the field and accumulated know-how to protect from various security threats. WMS provides Rule Sets and intelligence-based threat detection technologies according to the user’s environment to maintain a stable level of security while minimizing the burden of operation and management for the users. With the logic-based detection engine with the leading market share in the APAC region, WMS accurately detects abnormal patterns and behaviors from millions of logs. With threat IP information collected and processed from over 700,000 sites in 95 countries, WMS can analyze the reputation of the threat IPs and promptly respond to any advanced cyberattacks. To further improve the service quality, Cloudbric has joined the Cyber Threat Analysis & Sharing (C-TAS) and Cyber Threat Alliance (CTA) to link with their systems to advance the Threat DB. Through 24/7 support channels and technical support provided in Korean, English, and Japanese, users can maintain an advanced security level through Cloudbric’s WMS, even without security experts onboard.

Product Avatar Image
WAPPLES

0 reviews

WAPPLES is capable of combating the newest threats, including attacks often utilized in Advanced Persistent Threats (APT) launched by malicious agents to obtain data assets of governments and enterprises or for terrorism or political gains.

Profile Name

Star Rating

12
4
2
0
0

Penta Security Inc. Reviews

Review Filters
Profile Name
Star Rating
12
4
2
0
0
TB
Tony B.
04/15/2025
Validated Reviewer
Review source: Organic

Simple, strong, well performing

I’ve been using one of their rule sets already, and decided to give this one a try as part of a test run before potentially migrating, based on an offer I received. Just like the others, it was simple to set up, smoothly integrated, and packed with all the essentials—especially key protections aligned with OWASP standards. What really stood out, though, was the support team—quick to respond, incredibly helpful, and genuinely considerate. I really value that kind of human touch and attention to detail. It’s rare, and it makes a difference. At this point, I’m seriously leaning toward accepting their offer and migrating permanently. Very satisfying overall. Kudos to them!
Alice G.
AG
Alice G.
04/03/2025
Validated Reviewer
Review source: Organic

great add-on for your aws waf

I like how easily it can be implemented into AWS WAF. Knowing that these settings are pre-defined by experts gives me reassurance that my website is doubly protected.
Maya C.
MC
Maya C.
04/03/2025
Validated Reviewer
Review source: Organic

Easy to implement, high detection rate.

I was looking for a managed rule group to use for my AWS WAF, and Cloudbric Managed Rules - OWASP Top 10 rule set showed the best detection rate. It was very easy to implement, as it only required me to subscribe to the product and associate it with the web ACL. It seems to be covering most of the criteria of OWASP Top 10 web vulnerabilities, and it seems to be working well. When I had a question about the rules, the customer support responded quickly and provided me with thorough information.

About

Contact

HQ Location:
Seoul

Social

What is Penta Security Inc.?

Penta Security Inc. is an information technology security firm headquartered in the dynamic, innovative city of Seoul, Korea. Offering web application security, database security, and public key infrastructure (PKI) solutions, Penta Security Inc. is a major provider of core cybersecurity technology in the Asia-Pacific region. Founded in 1997, Penta Security now has more than 4,000 installed customers in government, enterprises, SMBs, education, and finance. Penta Security Inc. strives to meet the IT security needs and requirements of organizations and businesses on a global scale for a society in which people can communicate with trust. Learn more by visiting our homepage at www.pentasecurity.com/ or contact us at info@pentasecurity.com.

Details

Year Founded
1997