PT Application Firewall vs. Wallarm

PT Application Firewall is ranked 35th in Web Application Security vs Wallarm which is ranked 6th in Web Application Security with 5 reviews. The top reviewer of Wallarm writes "Active threat detection and adaptive rules are the most valuable for us". PT Application Firewall is most compared with Imperva SecureSphere Web Application Firewall, Fortinet FortiWeb and Checkmarx. Wallarm is most compared with Imperva Incapsula, Cloudflare and Imperva SecureSphere Web Application Firewall.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Use PT Application Firewall? Share your opinion.
Find out what your peers are saying about F5, Checkmarx, Incapsula and others in Web Application Security.
295,322 professionals have used our research since 2012.

Quotes From Members Comparing PT Application Firewall vs. Wallarm

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
​Pricing must be cheaper than the competition and the licensing must be good.​

Read more »

report
Use our free recommendation engine to learn which Web Application Security solutions are best for your needs.
295,322 professionals have used our research since 2012.
Ranking
RANKING
Views
240
Comparisons
141
Reviews
0
Followers
30
Avg. Rating
N/A
Views
953
Comparisons
295
Reviews
5
Followers
71
Avg. Rating
8.6
Top Comparisons
Top Comparisons
Compared 14% of the time.
See more PT Application Firewall competitors »
Compared 28% of the time.
Compared 16% of the time.
See more Wallarm competitors »
Website/Video
Website/VideoPositive Technologies
Wallarm
Overview
Overview

The application security experts at Positive Technologies have spent over a decade analyzing thousands of unique network, Web, mobile, ERP and ICS/SCADA applications, discovering more than 150 zero-day vulnerabilities each year and securing the IT networks of leading banks, global telecommunications providers and industrial conglomerates. Positive Technologies is helping companies like yours meet their application security challenges head-on with:

  • Vulnerability Assessment (VA) and Security Configuration Assessment (SCA) for OS, DB, Web-server, Frameworks and ERP in white and black box modes
  • SAST, DAST and IAST analysis of deployed applications and source code
  • PT Application Firewall protection of Web and mobile applications and ERP systems
  • Deep inspection of client-server, Web, ERP and mobile applications and embedded systems
  • Secure Software Development Lifecycle (SSDL) consulting

Next Gen Web Application Firewall with real-time Threat Verification

Founded in 2013, Wallarm provides its award-winning application security solution to hundreds of enterprises and SaaS providers worldwide. Wallarm's hybrid architecture makes it uniquely suited for cloud applications, companies following CI / CD practices and micro-services. Unlike legacy WAF solutions which require signatures and manual configuration of security rules, Wallarm uses machine learning to analyzes traffic and create adaptive security rules to protect both applications and APIs. To help make security more manageable, Wallarm supplements passive protection with active verification of vulnerabilities to distinguish exploitable incidents from noise.

OFFER
Learn more about PT Application Firewall
Learn more about Wallarm
Sample Customers
Sample Customers
Information Not Available
Acronis: enterpise backup solutions; SEMrush: SEO services; QIWI: NASDAQ-listed payment system; Xsolla: in-games payment system; WarGaming: huge online gaming company; BPC: Banking Technologies
Find out what your peers are saying about F5, Checkmarx, Incapsula and others in Web Application Security.
Download now
295,322 professionals have used our research since 2012.
We monitor all Web Application Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email