Best Website Security Software - Page 4

Lauren Worth
LW
Researched and written by Lauren Worth

Website security software is designed to protect business websites from a number of internet-based threats. These tools combine features of distributed denial of service (DDoS) protection software, content delivery networks (CDN), and web application firewalls (WAF) to create an all-encompassing website protection solution. Companies use these tools to reduce their risk of attack and data theft while ensuring their site is available to the public. The tools also provide application-level antivirus software, malware prevention, and removal tools to reduce the risk of infection.

These website-specific tools share many features with the aforementioned software categories, but must provide some combination of the three to qualify. Website security software’s dynamic approach to cybersecurity is tailored specifically to the website medium.

To qualify for inclusion in the Website Security category, a product must:

Combine content delivery with application security features
Secure against DDoS and other similar web-based threats
Facilitate the remediation of website and application-level malware

Best Website Security Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
97 Listings in Website Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The latest Minded Security Labs project regards JavaScript Security. We have released a tool called BlueClosure which helps security testers to analyze and discover Client Side security issues.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlueClosure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Security
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlueClosure features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Security Auditing
    Average: 8.8
    10.0
    Vulnerability Assessment
    Average: 8.6
    6.7
    Firewall
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @mindedsecurity
    923 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

The latest Minded Security Labs project regards JavaScript Security. We have released a tool called BlueClosure which helps security testers to analyze and discover Client Side security issues.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
BlueClosure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Security
1
Cons
Expensive
1
BlueClosure features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
10.0
Security Auditing
Average: 8.8
10.0
Vulnerability Assessment
Average: 8.6
6.7
Firewall
Average: 8.4
Seller Details
Twitter
@mindedsecurity
923 Twitter followers
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Every red light is not the same. Nor is every business opportunity. Blue Triangle gives you unified tracking of technical, security, business and marketing KPIs like broken links, out of stock, bounce

    Users
    No information available
    Industries
    • Retail
    Market Segment
    • 64% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blue Triangle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    1
    Insights
    1
    Integrations
    1
    Metrics Analysis
    1
    Useful
    1
    Cons
    Inadequate Analytics
    1
    Lack of Information
    1
    Limitations
    1
    Limited Features
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blue Triangle features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Mechanicsville, VA
    Twitter
    @_BlueTriangle
    305 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    45 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Every red light is not the same. Nor is every business opportunity. Blue Triangle gives you unified tracking of technical, security, business and marketing KPIs like broken links, out of stock, bounce

Users
No information available
Industries
  • Retail
Market Segment
  • 64% Enterprise
  • 29% Mid-Market
Blue Triangle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
1
Insights
1
Integrations
1
Metrics Analysis
1
Useful
1
Cons
Inadequate Analytics
1
Lack of Information
1
Limitations
1
Limited Features
1
Missing Features
1
Blue Triangle features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2011
HQ Location
Mechanicsville, VA
Twitter
@_BlueTriangle
305 Twitter followers
LinkedIn® Page
www.linkedin.com
45 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dark Atlas is an AI-powered eXtended Cyber Intelligence (XCI) Platform that combines intelligence-driven products, including: 1- Dark Web Monitoring (DWM). 2- Digital Risk Protection (DRP) 3- Cyber Th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dark Atlas features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Buguard
    Year Founded
    2021
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dark Atlas is an AI-powered eXtended Cyber Intelligence (XCI) Platform that combines intelligence-driven products, including: 1- Dark Web Monitoring (DWM). 2- Digital Risk Protection (DRP) 3- Cyber Th

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Dark Atlas features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Buguard
Year Founded
2021
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Like anti-virus for your website, DreamShield automatically monitors and cleanses your website of compromises. DreamShield features include - - Weekly Scans - Software Update Notices - Automated C

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DreamShield features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DreamHost
    Year Founded
    1997
    HQ Location
    Brea, California
    Twitter
    @DreamHost
    31,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    263 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Like anti-virus for your website, DreamShield automatically monitors and cleanses your website of compromises. DreamShield features include - - Weekly Scans - Software Update Notices - Automated C

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
DreamShield features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
DreamHost
Year Founded
1997
HQ Location
Brea, California
Twitter
@DreamHost
31,387 Twitter followers
LinkedIn® Page
www.linkedin.com
263 employees on LinkedIn®
(1)4.0 out of 5
View top Consulting Services for Google Cloud Web Risk API
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Web Risk API features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,553,933 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Google Cloud Web Risk API features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,553,933 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    As businesses rely on increasingly complex websites powered by third-party JavaScript, they expose themselves to a new breed of cyber threats that target users directly in their browsers. Imperva Clie

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Imperva Client-Side Protection features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Security Auditing
    Average: 8.8
    6.7
    Vulnerability Assessment
    Average: 8.6
    10.0
    Firewall
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Imperva
    Year Founded
    2002
    HQ Location
    Redwood Shores, CA
    Twitter
    @Imperva
    85,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,697 employees on LinkedIn®
    Ownership
    NASDAQ: IMPV
Product Description
How are these determined?Information
This description is provided by the seller.

As businesses rely on increasingly complex websites powered by third-party JavaScript, they expose themselves to a new breed of cyber threats that target users directly in their browsers. Imperva Clie

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Imperva Client-Side Protection features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Security Auditing
Average: 8.8
6.7
Vulnerability Assessment
Average: 8.6
10.0
Firewall
Average: 8.4
Seller Details
Seller
Imperva
Year Founded
2002
HQ Location
Redwood Shores, CA
Twitter
@Imperva
85,816 Twitter followers
LinkedIn® Page
www.linkedin.com
1,697 employees on LinkedIn®
Ownership
NASDAQ: IMPV
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable and easy to deploy solution for all sites to prop

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lockr features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Security Auditing
    Average: 8.8
    10.0
    Vulnerability Assessment
    Average: 8.6
    10.0
    Firewall
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @KeyLockr
    477 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable and easy to deploy solution for all sites to prop

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Lockr features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Security Auditing
Average: 8.8
10.0
Vulnerability Assessment
Average: 8.6
10.0
Firewall
Average: 8.4
Seller Details
Twitter
@KeyLockr
477 Twitter followers
(1)5.0 out of 5
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    otto-js defends your live WebApp against attacks at runtime while continuously monitoring for new risks, vulnerabilities, and out-of-compliant scripts. otto-js is an end-to-end script security & c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • otto features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    otto-js
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

otto-js defends your live WebApp against attacks at runtime while continuously monitoring for new risks, vulnerabilities, and out-of-compliant scripts. otto-js is an end-to-end script security & c

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
otto features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
otto-js
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Web Security services protect against advanced threats as your users browse the web. It provides you with advanced security on a highly scalable cloud-based architecture. And it delivers th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Web Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Security Auditing
    Average: 8.8
    10.0
    Vulnerability Assessment
    Average: 8.6
    10.0
    Firewall
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,855 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,697 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Web Security services protect against advanced threats as your users browse the web. It provides you with advanced security on a highly scalable cloud-based architecture. And it delivers th

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Proofpoint Web Security features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Security Auditing
Average: 8.8
10.0
Vulnerability Assessment
Average: 8.6
10.0
Firewall
Average: 8.4
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,855 Twitter followers
LinkedIn® Page
www.linkedin.com
4,697 employees on LinkedIn®
Ownership
NASDAQ: PFPT
Entry Level Price:$44.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentryPage has been built to monitor defacement activity on our web pages, especially for our homepage. This defacement monitoring tool provides higher sensitivity to detect even a tiny amount of defa

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentryPage features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Singapore, Singapore
    Twitter
    @XtremaxSG
    31 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

SentryPage has been built to monitor defacement activity on our web pages, especially for our homepage. This defacement monitoring tool provides higher sensitivity to detect even a tiny amount of defa

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
SentryPage features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Singapore, Singapore
Twitter
@XtremaxSG
31 Twitter followers
Entry Level Price:$75.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Shovl provides simple website security for small businesses. The cloud based security service helps prevent DDoS attacks, abusive bots and hackers from compromising your website. Offering a battle tes

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Shovl Website Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Shovl
Product Description
How are these determined?Information
This description is provided by the seller.

Shovl provides simple website security for small businesses. The cloud based security service helps prevent DDoS attacks, abusive bots and hackers from compromising your website. Offering a battle tes

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Shovl Website Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Shovl
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sn1per Professional is an all-in-one offensive security platform that provides a comprehensive view of your internal and external attack surface and offers an asset risk scoring system to prioritize,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sn1per Professional features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Sn1per Professional is an all-in-one offensive security platform that provides a comprehensive view of your internal and external attack surface and offers an asset risk scoring system to prioritize,

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Sn1per Professional features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blazing fast security monitoring that delivers insights into the availability, performance, and security config of web assets.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Templarbit Sonar features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Toronto, CA
    LinkedIn® Page
    www.linkedin.com
    54 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blazing fast security monitoring that delivers insights into the availability, performance, and security config of web assets.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Templarbit Sonar features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Toronto, CA
LinkedIn® Page
www.linkedin.com
54 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Assertible provides a defense against web service failures by providing assertions to test and monitor APIs and websites.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Assertible features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Assertible provides a defense against web service failures by providing assertions to test and monitor APIs and websites.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Assertible features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With today’s sophisticated hackers, a cyber breach has become a matter of when, not if. Hackers can get inside your IT infrastructure despite the best defenses. It becomes essential to monitor for

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Automated UEBA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

With today’s sophisticated hackers, a cyber breach has become a matter of when, not if. Hackers can get inside your IT infrastructure despite the best defenses. It becomes essential to monitor for

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Automated UEBA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details