Product Avatar Image

Nets Technology Co., Ltd.

Show rating breakdown
2 reviews
  • 11 profiles
  • 11 categories
Average star rating
4.0
Serving customers since
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Wangsu DDoS Cloud Cleaning

2 reviews

Wangsu DDoS Mitigation Service (DMS for short), is based on the globally distributed CDN resources up to 10Tbps mitigation capacity, and offers proprietary mitigation algorithms combined with the big data enabled intelligence. It detects and mitigates various types of DDoS attacks (such as SYN Flood, ACK Flood, UDP Flood, HTTP Flood, etc.) in real time, and ensures website availability under volumetric DDoS attacks.

Product Avatar Image
Wangsu Web Application Wirewall (WAF)

0 reviews

Forms a network of cloud security enabled by big data analytics against web application attacks. Based on the self-learning protection engine, WAF can detect and counter zero-day attacks timely to protect websites from sensitive info leakage, data tampering, and web defacement to ensure website security.

Product Avatar Image
Wangsu BotGuard

0 reviews

Wangsu BotGuard relies on big data analytics and forms a bot management network. BotGuard detects and analyzes real time traffic, distinguishes traffic from legitimate users, benign bots, and malicious bots. It sets management policies according to different types of bot traffic, and protects customer data against unfair competitive advantages. adopting intelligence database, client-side rate limit, client-side fingerprining, bot trap, machine cognition, and etc.

Product Avatar Image
Wangsu Security Emergency Response

0 reviews

The network security emergency response service is to discover and confirm network security events such as hacking, denial of service attacks, unauthorized network communication, system operation, website page tampering, abnormal traffic attacks, network worm propagation, etc. Respond to disposal to reduce possible risks and losses. The service provides customers with professional technical guidance and resources to improve security, resist attacks and perform security repairs.

Product Avatar Image
Wangsu Penetration Testing

0 reviews

Network-based penetration testing service, which is combined with vulnerability scanning tools, penetration testing tools, network protocol analysis tools, etc. to simulate possible attacks on target systems, and further discover systems and applications based on security vulnerability scanning. , web hidden security vulnerabilities, to prevent hackers from infiltrating the client system and stealing sensitive information. At the same time, repair guidance is provided based on the results of the penetration test.

Product Avatar Image
Wangsu Vulnerability Scanning

0 reviews

The Network Vulnerability Scanning Service uses a self-developed vulnerability scanner to perform comprehensive security vulnerability scanning on specified target systems. The service relies on a powerful vulnerability database and 100,000+ vulnerability detection scripts to drill down into various security vulnerabilities. All kinds of scanning items are strictly tested by security experts, and timely follow up on the newly exposed security vulnerabilities on the network to ensure the accuracy and timeliness of scanning.

Product Avatar Image
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

Sprocket Security

5 reviews

Product Description

Sprocket Security is the Expert-Driven Offensive Security Platform. Sprocket continuously validates businesses’ security postures using a hybrid approach of automation and human penetration testing. We test your attack surfaces year-round and offer unlimited retests. Whether there is a new attack technique, a change in your IT structure or you patch a finding, we will retest, for free. We do this to help businesses improve security and reduce IT risk by prioritizing offensive security. Sprocket's core offerings are Attack Surface Management, Continuous Penetration Testing, and Adversary Simulation.

Profile Name

Star Rating

1
1
0
0
0

Nets Technology Co., Ltd. Reviews

Review Filters
Profile Name
Star Rating
1
1
0
0
0
Anshu T.
AT
Anshu T.
5⭐ Hackerrank(SQL) || 3 ⭐ Codechef ||
08/10/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Protector from DDoS attacks

Wangsu DDoS Cloud Cleaning ensures that our organisation system is running and up. It also provides detailed analysis of the threats. It has a robust detection system for mitigated attacks.
HR
Himani R.
An IT field professional with experience
08/08/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Fabulous cloud DDoS mitigation service

It is most helpful as it is very reliable like you can trust it as it has a nice record from preventing against DDos Attacks even banks and govt use it.It rate limits the server on ip reputation basis. It also has wide network of scrubbing centers. It is also scalable and it's really easy to deploy it. It also has rate

About

Contact

HQ Location:
Shangai. China

Details