PT Application Firewall vs. Wallarm

PT Application Firewall is ranked 35th in Web Application Security vs Wallarm which is ranked 6th in Web Application Security with 5 reviews. The top reviewer of Wallarm writes "Active threat detection and adaptive rules are the most valuable for us". PT Application Firewall is most compared with Imperva SecureSphere Web Application Firewall, Fortinet FortiWeb and Checkmarx. Wallarm is most compared with Cloudflare, Imperva Incapsula and Imperva SecureSphere Web Application Firewall.
Cancel
You must select at least 2 products to compare!
PT Application Firewall Logo
267 views|121 comparisons
Wallarm Logo
1,164 views|380 comparisons
Most Helpful Review
Use PT Application Firewall? Share your opinion.
Find out what your peers are saying about F5, Checkmarx, Incapsula and others in Web Application Security.
310,271 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
​Pricing must be cheaper than the competition and the licensing must be good.​

Read more »

report
Use our free recommendation engine to learn which Web Application Security solutions are best for your needs.
310,271 professionals have used our research since 2012.
Ranking
35th
Views
267
Comparisons
121
Reviews
0
Followers
25
Avg. Rating
N/A
6th
Views
1,164
Comparisons
380
Reviews
5
Followers
73
Avg. Rating
8.6
Top Comparisons
Compared 15% of the time.
Compared 30% of the time.
Compared 27% of the time.
Learn
Positive Technologies
Video Not Available
Wallarm
Overview

The application security experts at Positive Technologies have spent over a decade analyzing thousands of unique network, Web, mobile, ERP and ICS/SCADA applications, discovering more than 150 zero-day vulnerabilities each year and securing the IT networks of leading banks, global telecommunications providers and industrial conglomerates. Positive Technologies is helping companies like yours meet their application security challenges head-on with:

  • Vulnerability Assessment (VA) and Security Configuration Assessment (SCA) for OS, DB, Web-server, Frameworks and ERP in white and black box modes
  • SAST, DAST and IAST analysis of deployed applications and source code
  • PT Application Firewall protection of Web and mobile applications and ERP systems
  • Deep inspection of client-server, Web, ERP and mobile applications and embedded systems
  • Secure Software Development Lifecycle (SSDL) consulting

Next Gen Web Application Firewall with real-time Threat Verification

Founded in 2013, Wallarm provides its award-winning application security solution to hundreds of enterprises and SaaS providers worldwide. Wallarm's hybrid architecture makes it uniquely suited for cloud applications, companies following CI / CD practices and micro-services. Unlike legacy WAF solutions which require signatures and manual configuration of security rules, Wallarm uses machine learning to analyzes traffic and create adaptive security rules to protect both applications and APIs. To help make security more manageable, Wallarm supplements passive protection with active verification of vulnerabilities to distinguish exploitable incidents from noise.

Offer
Learn more about PT Application Firewall
Learn more about Wallarm
Sample Customers
Sberbank NPF, Svyaznoy, MegaFon, Ural Federal University, VGTRKAcronis: enterpise backup solutions; SEMrush: SEO services; QIWI: NASDAQ-listed payment system; Xsolla: in-games payment system; WarGaming: huge online gaming company; BPC: Banking Technologies
Find out what your peers are saying about F5, Checkmarx, Incapsula and others in Web Application Security.
310,271 professionals have used our research since 2012.
We monitor all Web Application Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email