AppTrana

by Indusface

Who Uses AppTrana?

AppTrana provides businesses with an instant protection against vulnerabilities identified & ensures round the clock protection against DDOS, Bots & emerging security threats and is best for growing.

What Is AppTrana?

AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection with its WAF, Managed DDOS and Bot Mitigation service, and Web site acceleration with a bundled CDN or can integrate with existing CDN. All of this backed with a 24x7 Managed Security Expert service to provide custom rules and policy updates with zero false positive guarantee and promise.

AppTrana Details

Indusface

https://www.indusface.com/

Founded 2012

AppTrana Software - The dashboard provides de
AppTrana Software - Provides details on the t
AppTrana Software - The protection status of
AppTrana Software - Monitor summary displays
AppTrana video
Play
AppTrana Software - The dashboard provides de - thumbnail
AppTrana Software - Provides details on the t - thumbnail
AppTrana Software - The protection status of - thumbnail
AppTrana Software - Monitor summary displays - thumbnail

Compare AppTrana with similar products

Starting price

US$99.00/month
N/A
US$5.00/year
N/A

Free Version

Free Version Yes
Free Version No
Free Version Yes
Free Version No

Free Trial

Free Trial Yes
Free Trial Yes
Free Trial Yes
Free Trial Yes

AppTrana deployment and support

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Deployment

  • Cloud, SaaS, Web-based

Training

  • Live Online
  • Webinars
  • Documentation
  • Videos

AppTrana Features

  • AI/Machine Learning
  • Anomaly/Malware Detection
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Dashboard
  • Event Logs
  • Fraud Detection
  • Real-time Alerts
  • Threat Intelligence
  • Vulnerability Scanning
  • Web Traffic Monitoring

View full list of Bot Detection and Mitigation

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavior Tracking
  • Behavioral Analytics
  • Collaboration Tools
  • Compliance Management
  • DDoS Protection
  • Data Security
  • Data Visualization
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Firewalls
  • HIPAA Compliant
  • IOC Verification
  • Incident Management
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Cybersecurity

  • Alerts/Notifications
  • Dashboard
  • IT Incident Management
  • Policy Management
  • Reporting/Analytics
  • Server Monitoring
  • Third Party Integrations
  • Threat Intelligence
  • Web Traffic Monitoring

View full list of DDoS Protection

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Behavior Tracking
  • Compliance Management
  • Content Filtering
  • Customizable Reports
  • Dashboard Creation
  • Event Logs
  • Filtering
  • Hardware Integration
  • IP Filtering
  • Incident Management
  • Intrusion Detection System
  • Intrusion Prevention System
  • Log Access
  • Monitoring
  • Multi-Location
  • Network Monitoring
  • Next-Generation Firewall
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Role-Based Permissions
  • SSL Security
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Summary Reports
  • Two-Factor Authentication
  • Uptime Reporting
  • VPN Software
  • Visual Analytics
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Firewall

  • API
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Approval Process Control
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Business Process Control
  • Compliance Management
  • Configurable Workflow
  • Corrective and Preventive Actions (CAPA)
  • Customizable Reports
  • Customizable Templates
  • Dashboard
  • Dashboard Creation
  • Data Visualization
  • Document Management
  • Document Storage
  • Exceptions Management
  • Forms Management
  • IT Risk Management
  • Incident Management
  • Internal Controls Management
  • Legal Risk Management
  • Mobile Access
  • Monitoring
  • Operational Risk Management
  • Policy Management
  • Predictive Analytics
  • Real Time Monitoring
  • Real Time Reporting
  • Reminders
  • Reporting & Statistics
  • Reporting/Analytics
  • Reputational Risk Management
  • Response Management
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Reporting
  • Risk Scoring
  • Security Auditing
  • Task Management
  • Third Party Integrations
  • Training Management
  • Vendor Management
  • Version Control
  • Workflow Management

View full list of Risk Management

  • API
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavior Analytics
  • Cloud Backup
  • Customizable Reports
  • Data Visualization
  • Event Analysis
  • Event Logs
  • IT Reporting
  • Incident Reporting
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Prioritization
  • Profiling
  • Real Time Analytics
  • Real Time Data
  • Real Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Server Monitoring
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Web-Application Security

View full list of Threat Intelligence

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Asset Discovery
  • Asset Tagging
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Customizable Reports
  • Data Visualization
  • Email Alerts
  • Event Logs
  • Event Tracking
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Network Scanning
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • Search/Filter
  • Security Auditing
  • Server Monitoring
  • Status Tracking
  • Third Party Integrations
  • Two-Factor Authentication
  • User Management
  • Vulnerability Assessment
  • Vulnerability Scanning
  • Web Scanning

View full list of Vulnerability Management

  • API
  • Access Controls/Permissions
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Asset Discovery
  • Network Scanning
  • Network Security Software
  • Password Protection
  • Real Time Analytics
  • Reporting/Analytics
  • Risk Analytics
  • Runtime Container Security
  • SQL Injections
  • SSL Security
  • Source-Code Scanning
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Vulnerability / Threat Prioritization
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Scanning
  • Web-Application Security
  • Website Crawling

View full list of Vulnerability Scanner

  • API
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • DDoS Protection
  • Endpoint Protection Software
  • Firewalls
  • Load Balancing Tools
  • Log Management
  • SQL Injections
  • Threat Response
  • Vulnerability Scanning
  • Web-Application Security

View full list of Website Security

AppTrana Alternatives

More AppTrana alternatives

AppTrana Reviews

Read all 19 reviews

Average score

Overall
4.6
Ease of Use
4.5
Customer Service
4.8
Features
4.4
Value for Money
4.5

Reviews by score

5
12
4
7

Reviews by company size (employees)

  • <50
  • 51-200
  • 201-1,000
  • >1,001
Anoop P.
Anoop P.
Lead , AWS support
Information Technology & Services, 51-200 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    9/10
  • Reviewer Source 
  • Reviewed on 06/03/2020

"Effective and affordable solution for web application protection"

Comments: Good product and got betters results. Its a value for money product.

Pros: Simple configuration with most of required features like, protection from DDoS , SQl injection, Bot attack , Geo - location filtering etc. at a very affordable cost.

Cons: custom rules in the firewall can have more features.

Vendor Response

by Indusface on 25/03/2020

We are a completely managed solution and through custom rules, we cover all the cases that come under WAF preview. There are multiple ways you can request for a custom rule, for vulnerabilities that are not protected throughout of box rule set, you will see the protection status in the portal and our users can request for the custom rule where our security experts would write rules to protect those vulnerabilities. Apart from that, customers can also reach out to support any specific custom requirement they have, and on understanding the need our team will write the specific rule. We request you to reach out to [email protected] with your specific requirement and we would be happy to help.

We appreciate your valuable review...!!!

  • Reviewer Source 
  • Reviewed on 06/03/2020
Dipesh G.
Manager
Insurance, 5,001-10,000 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    8/10
  • Reviewer Source 
  • Reviewed on 29/06/2021

"Good product and support"

Pros: Customer support response to any identified issues. Alerts and notifications sent by the tool on periodic basis. Protection provided by the too for onboard Ed applications.

Cons: License model should be improved to include uat, pre-prod, and prod URL at the same cost. Predictive analytical should be included in the dashboard to highlight configuration tweaks that need to be done to improve WAF protection.

  • Reviewer Source 
  • Reviewed on 29/06/2021
Rohan P.
DevOps Engineer
Information Technology & Services, 51-200 Employees
Used the Software for: 6-12 months
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    8/10
  • Reviewer Source 
  • Reviewed on 13/03/2020

"Does its job nicely"

Comments: Good enough experience. Helped us run our application properly and adhere to the performance and availability promises. Custom requirements have been catered to almost always.

Pros: It is good at preventing attacks. The dashboard gives a precise update about the security/events. With the CDN and location in Mumbai, it has helped us reduce latency times and increase performance. Negligible downtime. Great service and customer support.

Cons: Setup doesn't provide an IP but a FQDN because our application and business model works well with an IP. Not much free b/w is provided. Available only at a few locations globally.

Vendor Response

by Indusface on 31/03/2020

Thanks for your review. We have data centers in multiple Geolocation and with integrated CDN where CDN POPS are available all over the world, we ensure that there is minimal latency for our users. FQDN model is required because we provide an integrated offering of Web Application Scanning and Web Application Firewall. We are happy that you have had a good experience using our product and we were able to meet all your custom needs.

  • Reviewer Source 
  • Reviewed on 13/03/2020
Rohit K.
Manager - IT
Banking, 501-1,000 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    8/10
  • Reviewer Source 
  • Reviewed on 26/10/2020

"Apptrana Review"

Comments: satisfactory

Pros: Portal has most of the required controls, virtual patching option of vulnerabilities & Prompt Customer support

Cons: More transparency on data flow on the portal itself would be of immense help as it will reduce dependency on the support team.

Vendor Response

by Indusface on 01/02/2021

Thanks for the review.

  • Reviewer Source 
  • Reviewed on 26/10/2020
Nikunj M.
Information Security Manager
Transportation/Trucking/Railroad, 1,001-5,000 Employees
Used the Software for: 6-12 months
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    8/10
  • Reviewer Source 
  • Reviewed on 29/01/2021

"A fully integrated offering with managed services included as part of 24x7 with the product."

Comments: Loaded with features and managed service included as part of the support services is a must have for Cloud WAF offering

Pros: Apptrana is a solid product plus service that includes following bundled in one offering and consumption based pricing model
Cloud based Web application firewallApplication vulnerability AssessmentManaged Rules and Virtual Patching24x7 support and Managed servicesManaged DDOS and Bot mitigationCDN with distributed caching bundled with the product

Cons: No major cons that effect the services.

Vendor Response

by Indusface on 01/02/2021

Thanks for the review. We strive to provide a complete solution and it is great to see that the same is resonating well and are happy with the value our customers get from the product. It motivates us to keep improving and serving our customers better.

  • Reviewer Source 
  • Reviewed on 29/01/2021