Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Protect your APIs by analyzing and protecting them with passive, inline, or API-based integration with any network component, such as an API gateway, proxy or CDN. Predefined policies that are fine-tuned based on threat patterns, which have been used to protect billions of API transactions every day, provide unmatched protection. An API-based architecture and rich user interface allow integration with threat intelligence feeds and other security components. Patented ML based analysis eliminates JavaScript integration pen-alties like slow page loads, extended development cycles, and forced mobile-app upgrade. ML-based analysis generates a unique Behavioral Footprint to identify malicious intent and continuously tracks attackers as they retool.

Description

Integration Eye® is a versatile modular solution designed to optimize system integrations, infrastructure, and business operations. It comprises three distinct modules: the proxy module IPM, the logging module ILM, and the security module ISM, each of which can function independently or work in unison. Built on the secure and widely adopted Java programming language, it operates efficiently on the lightweight integration engine Mule™. With the individual modules of Integration Eye®, users can effectively monitor their APIs and systems, generate statistics, and analyze API calls through the ILM module, while also receiving alerts for any issues like downtime or slow responses from specific APIs and systems. Additionally, the ISM module allows you to enhance security for your APIs and systems through role-based access control, leveraging either the Keycloak SSO we provide or your existing authentication server. The IPM module further enables the extension or proxying of service calls, both internal and external, with features like mutual SSL and customizable headers, while also allowing for the monitoring and analysis of these communications. This comprehensive approach ensures that your business operations are not only streamlined but also secure and resilient against potential disruptions.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon EKS
Amazon Web Services (AWS)
Azure Kubernetes Service (AKS)
Datadog
Elastic Cloud
Envoy
GigaSECURE
Google Kubernetes Engine (GKE)
Hadoop
Helm
Istio
Kibana
Kong Konnect
Mule ESB
NGINX
Oracle Analytics Cloud
RabbitMQ
Splunk Enterprise
Terraform
Tetrate

Integrations

Amazon EKS
Amazon Web Services (AWS)
Azure Kubernetes Service (AKS)
Datadog
Elastic Cloud
Envoy
GigaSECURE
Google Kubernetes Engine (GKE)
Hadoop
Helm
Istio
Kibana
Kong Konnect
Mule ESB
NGINX
Oracle Analytics Cloud
RabbitMQ
Splunk Enterprise
Terraform
Tetrate

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cequence Security

Founded

2014

Country

United States

Website

www.cequence.ai

Vendor Details

Company Name

Integsoft

Country

United States

Website

www.integsoft.com/products.html

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Product Features

Integration

Dashboard
ETL - Extract / Transform / Load
Metadata Management
Multiple Data Sources
Web Services

Alternatives

Alternatives

UltraESB Reviews

UltraESB

AdroitLogic
Resurface Reviews

Resurface

Resurface Labs