- Flexible deployment modes
- Custom policy creation
- Complex vision of web apps
- DB security
- Intuitive logs
We have seen our security risk decreased due to customization and meeting all the security needs for every application.
I would like to see more parameters configurable for the kernel reverse proxy.
I have used this product for eight years, on both sides; from deployment to customers and administration of the existing infrastructure.
The stabillity issues we encountered were fluently fixed.
We did not encounter any scalability issues.
Technical support was very professional and elastic.
We used to deploy a different solution. We switched due to the valuable features mentioned.
Initial setup was straighforward.
It is a good idea to invest in threat detection licenses.
For DAM, I recommend that you invest proper resources in the business part of the project. It is very important to set expectations properly.