While we don't verify specific claims because reviewers' opinions are their own, we may label reviews as "Verified" when we can confirm a business interaction took place. Read more

To protect platform integrity, every review on our platform—verified or not—is screened by our 24/7 automated software. This technology is designed to identify and remove content that breaches our guidelines, including reviews that are not based on a genuine experience. We recognise we may not catch everything, and you can flag anything you think we may have missed. Read more

Company details

  1. Computer Security Service

About Wallarm

Written by the company

Protect any application and API. In any environment. Against any threats. Wallarm is the platform Dev, Sec, and Ops teams choose to build cloud-native applications securely, monitor them for modern threats, and get alerted when threats arise. Whether you protect some of the legacy apps or brand new cloud-native APIs, Wallarm multi-cloud platform provides key components to secure your business against emerging threats.
  • Robust protection for the entire application portfolio
  • Mitigate threats against OWASP Top 10 threats, business logic abuse, bad bots, account takeover (ATO), and more. Get the robust API protection that no other WAF can provide.
  • Quick integrations
  • Setup cross-team workloads via your existing DevOps and security toolchain (SOARs, SIEMs). Setup triggers and noise-free alerts in Slack and other messengers, PagerDuty, and more.
  • Blocking mode and compliance with no hassle
  • Forget issues with false positives. Wallarm’s new libDetection and core signature-less attack detection provide low false positives from day one.
  • Unparalleled visibility into malicious traffic
  • Gain full insights about attacks and attackers in the responsive Wallarm Console. Enjoy the Dashboard, reach search, and reporting capabilities.
  • Automated Incident Response
  • Reduce manual analysis and noise level. Automated Threat Verification can dissect potentially harmful attacks from millions of random scans and report vulnerabilities.
  • Understand Your Attack Surface
  • You can’t protect what you don’t know. Utilize the attack surface and shadow resources to track changes. Identify misconfiguration issues and vulnerable applications and resources.

    Contact info

    2.9

    Average

    TrustScore 3 out of 5

    4 reviews

    5-star
    4-star
    3-star
    2-star
    1-star

    Hasn’t replied to negative reviews

    How this company uses Trustpilot

    See how their reviews and ratings are sourced, scored, and moderated.

    Companies on Trustpilot aren't allowed to offer incentives or pay to hide reviews. Reviews are the opinions of individual users and not of Trustpilot. Read more

    The Trustpilot Experience

    Anyone can write a Trustpilot review. People who write reviews have ownership to edit or delete them at any time, and they’ll be displayed as long as an account is active.

    Companies can ask for reviews via automatic invitations. Labeled Verified, they’re about genuine experiences.

    Learn more about other kinds of reviews.

    We use dedicated people and clever technology to safeguard our platform. Find out how we combat fake reviews.

    Learn about Trustpilot’s review process.

    Here are 8 tips for writing great reviews.

    Verification can help ensure real people are writing the reviews you read on Trustpilot.

    Offering incentives for reviews or asking for them selectively can bias the TrustScore, which goes against our guidelines.

    Take a closer look