Web application security report from it central station 2017 10 14 thumbnail
Find out what your peers are saying about Incapsula, Checkmarx, F5 and others in Web Application Security.
233,024 professionals have used our research on 5,881 solutions.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product (and the bar length) is based on a weighted aggregate ranking. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The product with the highest count in each area gets the highest available score of 17.5 points. Every other product gets assigned points based on its total in proportion to the #1 product in the category. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score and bar length for reviews would be 17.5% (weighting factor) * 80% = 14.
In the final section, Average Rating, there are 30 points available to each product independent of the other products.
Reviews and ratings that are more than 24 months old, as well as those by resellers, are excluded
Most Views
From IT Central Station visitors
Most Reviews
Within the last 24 months
Most Followed
By IT Central Station users
Most Compared
From IT Central Station visitors

Web Application Security Reviews

Read reviews of Web Application Security that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Web application security report from it central station 2017 10 14 thumbnail
Find out what your peers are saying about Incapsula, Checkmarx, F5 and others in Web Application Security.
233,024 professionals have used our research on 5,881 solutions.
Web application security report from it central station 2017 10 14 thumbnail
Find out what your peers are saying about Incapsula, Checkmarx, F5 and others in Web Application Security.
233,024 professionals have used our research on 5,881 solutions.

Web Application Security Questions

4a9464d2 daef 4573 a88c a841540cd4ae avatar
Sujit Sharma
Real User
Information Security Engineer at a tech services company with 1,001-5,000 employees
Oct 12 2017
Anonymous avatar x30
Hamid Karimi[Disclosure: I work for Beyond Security]. Some companies rebrand technologies... more »
Anonymous avatar x30
reviewer371583[Disclosure: I work for Beyond Security]. Some companies rebrand technologies... more »
Anonymous avatar x30
Chris KennonWhile Cloudflare and AWS offer similar solutions, they do not have the scale,... more »
Project Manager with 1,001-5,000 employees
Product Manager ( HP EG Enterprise ) at Ingram Micro
Faf40d88 d740 43bf b9b3 88cc6c016316 avatar
Kushar PereraReally depends on your requirement, budget and IT resources you have. If you... more »
Anonymous avatar x30
David MacleanTo prevent OWASP TOP 10 (SQL Injection, XSS, XSFR...etc) attacks, stop L7... more »
Anonymous avatar x30
Clyde JohnThey're both great products that provides WAF services at the top of their... more »
Ddp 8148
Ariel Lindenfeld
Community Mgr
Sr. Director of Community
IT Central Station
Oct 16 2017
9ee35dca 1f8f 4de7 9f55 50b2e2222f25 avatar
Stas Goshtein [Lion]A company, that can provide you good protection controls and its service SLA... more »
Fd9c97a9 9790 4563 96dd 4c2a6308d2e5 avatar?1448230363
Arthur SolesA competent team to find and solve problems that will arise. more »

Web Application Security Articles

A2677e73 3c95 4db0 9a5b 56d28884f396 avatar
105
Senior Information Security Consultant
Expertise in developing Web Based Application, Database Applications and Desktop Applications Working experience in distributed environment and distributed applications Expertise in ISA Configuration, Network Security include:· Penetration Testing· Stress... more>>
Ioannis syrigos avatar 1434074141?1434074139
2,127

3
IT Consultant, Business Owner, Lecturer
Dr Ioannis Syrigos is a Computer and Electrical Engineer, an Entrepreneur, co-owner and Managing Director of Stella Novus LTD, an IT consulting company running several individual online projects (Ancient-Origins.net, Members.Ancient-Origins.net, Evolving-Science.com, EnglishWithJo.com and... more>>
Dfd39ddf 9827 4e9c 8b51 6f3816d97c09 avatar
350
WordPress Developer & Consultant
Think of a person who understands the role of technology in the business, power of publishing in marketing & branding, knows how to build a website, market it and also scale it! Well, that's me. Hi, I'm Mayank Gupta and I'm your one stop for all the web/digital business requirements. In... more>>
Omar sanchez mr tech avatar 1434666108?1434666106
5,802

2
TOP 10POPULAR
Information Security Advisor, CISO & CIO, Docutek Services
About my business: Docutek is a leading business and technology consulting company specializing in the development and implementation of healthcare technology since 2008. We deliver Consulting, Integration, Support and Training. We also provide clients with security assessment. network... more>>
Arshad khan li?1424931700
21
Security Consultant
Security Consultant (Team lead) in Accenture Leveraged service delivery (Wipro) Worked for Bank client .(HP) Worked on Government Tax dept.(Tulip telecom) • Firewall (Check point, Cisco, Palo Alto, Fortinet, Juniper) • IPS/IDS (Cisco, Checkpoint, IBM, McAfee) • Proxy (Bluecoat,... more>>
Anonymous avatar x100
62
TOP 10
o SIEM (QRadar, AlienVault, LogStorm) o Enterprise virtualization (ESXi 5.5/6.0) o Imperva SecureSphere o MS SQL Server o MySQL o Oracle o Sybase o FileMaker; • Workshops on various technologies of SQL Server, including: o Asynchronous multi-threaded request processing o Scaling out reporting... more>>
Reviewed Imperva SecureSphere Web Application Firewall: Scan policies allow us to group multiple targets and...
727de22b cd27 47a0 8358 df1d598f70ba avatar
28
Tech Arch Consulting Senior Analyst Digital Interactive
Cd983eea d0be 445c b846 6d1fe6f38e18 avatar
159
TOP 20
Innovation Consultant (Security Analyst)
8a9a3eb0 bb8e 4d54 a440 8586caccd2b7 avatar
228
TOP 20
SAP FIORI / HCP Consultant
Anonymous avatar x100
24
Network Security Consultant
Anonymous avatar x100
185
Linux/Cisco/Microsoft Infraestructure Manager
Working towards CCIP certification CCNP certified Interested in WMI/SNMP monitoring, Cisco technologies, open source software in Linux platforms Online gaming software

Sign Up with Email