Average Ratings 1 Rating
Average Ratings 0 Ratings
Description
Protect your APIs by analyzing and protecting them with passive, inline, or API-based integration with any network component, such as an API gateway, proxy or CDN. Predefined policies that are fine-tuned based on threat patterns, which have been used to protect billions of API transactions every day, provide unmatched protection. An API-based architecture and rich user interface allow integration with threat intelligence feeds and other security components. Patented ML based analysis eliminates JavaScript integration pen-alties like slow page loads, extended development cycles, and forced mobile-app upgrade. ML-based analysis generates a unique Behavioral Footprint to identify malicious intent and continuously tracks attackers as they retool.
Description
Integration Eye® is a versatile modular solution designed to optimize system integrations, infrastructure, and business operations. It comprises three distinct modules: the proxy module IPM, the logging module ILM, and the security module ISM, each of which can function independently or work in unison. Built on the secure and widely adopted Java programming language, it operates efficiently on the lightweight integration engine Mule™. With the individual modules of Integration Eye®, users can effectively monitor their APIs and systems, generate statistics, and analyze API calls through the ILM module, while also receiving alerts for any issues like downtime or slow responses from specific APIs and systems. Additionally, the ISM module allows you to enhance security for your APIs and systems through role-based access control, leveraging either the Keycloak SSO we provide or your existing authentication server. The IPM module further enables the extension or proxying of service calls, both internal and external, with features like mutual SSL and customizable headers, while also allowing for the monitoring and analysis of these communications. This comprehensive approach ensures that your business operations are not only streamlined but also secure and resilient against potential disruptions.
API Access
Has API
API Access
Has API
Integrations
Amazon EKS
Amazon Web Services (AWS)
Azure Kubernetes Service (AKS)
Datadog
Elastic Cloud
Envoy
GigaSECURE
Google Kubernetes Engine (GKE)
Hadoop
Helm
Integrations
Amazon EKS
Amazon Web Services (AWS)
Azure Kubernetes Service (AKS)
Datadog
Elastic Cloud
Envoy
GigaSECURE
Google Kubernetes Engine (GKE)
Hadoop
Helm
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Cequence Security
Founded
2014
Country
United States
Website
www.cequence.ai
Vendor Details
Company Name
Integsoft
Country
United States
Website
www.integsoft.com/products.html
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Product Features
Integration
Dashboard
ETL - Extract / Transform / Load
Metadata Management
Multiple Data Sources
Web Services