Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Patchstack Features

What are the features of Patchstack?

Administration

  • Dashboard & Reporting

Risk Analysis

  • Blacklist and Whitelist
  • Vulnerability Assessment
  • Security Auditing

Threat Protection

  • Firewall

Top Rated Patchstack Alternatives

Filter for Features

Administration

Content Delivery

Caching of static or dynamic content at distributed PoPs for faster load times.

Not enough data

Dashboard & Reporting

Reporting and analytics that report on activity and program effectiveness. This feature was mentioned in 10 Patchstack reviews.
97%
(Based on 10 reviews)

Alerting

Identifies and alerts administrators of threats, issues, incidents and requests related to website security.

Not enough data

Risk Analysis

Blacklist and Whitelist

Based on 10 Patchstack reviews. Tracking recipient tagging of domains for blacklists and whitelists.
97%
(Based on 10 reviews)

Vulnerability Assessment

Analyzes your existing website and network to outline access points that can be easily compromised. This feature was mentioned in 10 Patchstack reviews.
95%
(Based on 10 reviews)

Security Auditing

Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. This feature was mentioned in 10 Patchstack reviews.
97%
(Based on 10 reviews)

Threat Protection

Firewall

Protects websites and web applications from a variety of attacks and malware threats. 10 reviewers of Patchstack have provided feedback on this feature.
97%
(Based on 10 reviews)

DDoS Protection

Protects against distributed denial of service (DDoS) attacks.

Not enough data

Malware Detection

Discovers website and web application malware.

Not enough data

Malware Removal

Facilitates the remediation of website and web application malware.

Not enough data

Performance

Issue Tracking

Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.

Not enough data

Detection Rate

The rate at which scans accurately detect all vulnerabilities associated with the target.

Not enough data

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.

Not enough data

Automated Scans

Runs pre-scripted vulnerability scans without requiring manual work.

Not enough data

Network

Compliance Testing

Allows users to scan applications and networks for specific compliance requirements.

Not enough data

Perimeter Scanning

Analyzes network devices, servers and operating systems for vulnerabilities.

Not enough data

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Application

Manual Application Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data

Static Code Analysis

Scans application source code for security flaws without executing it.

Not enough data

Black Box Testing

Scans functional applications externally for vulnerabilities like SQL injection or XSS.

Not enough data