Patchstack Features
What are the features of Patchstack?
Administration
- Dashboard & Reporting
Risk Analysis
- Blacklist and Whitelist
- Vulnerability Assessment
- Security Auditing
Threat Protection
- Firewall
Top Rated Patchstack Alternatives
(132)
4.5 out of 5
Visit Website
Sponsored
Patchstack Categories on G2
Filter for Features
Administration
Content Delivery | Caching of static or dynamic content at distributed PoPs for faster load times. | Not enough data | |
Dashboard & Reporting | Reporting and analytics that report on activity and program effectiveness. This feature was mentioned in 10 Patchstack reviews. | 97% (Based on 10 reviews) | |
Alerting | Identifies and alerts administrators of threats, issues, incidents and requests related to website security. | Not enough data |
Risk Analysis
Blacklist and Whitelist | Based on 10 Patchstack reviews. Tracking recipient tagging of domains for blacklists and whitelists. | 97% (Based on 10 reviews) | |
Vulnerability Assessment | Analyzes your existing website and network to outline access points that can be easily compromised. This feature was mentioned in 10 Patchstack reviews. | 95% (Based on 10 reviews) | |
Security Auditing | Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. This feature was mentioned in 10 Patchstack reviews. | 97% (Based on 10 reviews) |
Threat Protection
Firewall | Protects websites and web applications from a variety of attacks and malware threats. 10 reviewers of Patchstack have provided feedback on this feature. | 97% (Based on 10 reviews) | |
DDoS Protection | Protects against distributed denial of service (DDoS) attacks. | Not enough data | |
Malware Detection | Discovers website and web application malware. | Not enough data | |
Malware Removal | Facilitates the remediation of website and web application malware. | Not enough data |
Performance
Issue Tracking | Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | Not enough data | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. | Not enough data | |
False Positives | The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | Not enough data | |
Automated Scans | Runs pre-scripted vulnerability scans without requiring manual work. | Not enough data |
Network
Compliance Testing | Allows users to scan applications and networks for specific compliance requirements. | Not enough data | |
Perimeter Scanning | Analyzes network devices, servers and operating systems for vulnerabilities. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data |
Application
Manual Application Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Static Code Analysis | Scans application source code for security flaws without executing it. | Not enough data | |
Black Box Testing | Scans functional applications externally for vulnerabilities like SQL injection or XSS. | Not enough data |