K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks including OWASP Top 10 and memo
K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks including OWASP Top 10 and memo
Rating
4.5 / 5.0
Pricing
Contact vendor
Deployment
SaaS / Cloud
Category
Threat Intelligence Platforms
Product Description
K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks including OWASP Top 10 and memory-based attacks, and provides additional vulnerability detection.
K2’s Platform is deployed on production servers for runtime protection of applications and on pen-testing/pre-production servers to identify the location of the vulnerable code in real-time. K2’s solution generates no false alerts, eliminates breaches due to zero-day attacks, detects attacks missed by traditional security tools including Web Application Firewalls, and dramatically reduces security cost.
K2 Cyber Security was acquired by New Relic in 2022.
Contact Vendor
Interested in K2 Cyber Security? Get in touch with the vendor.
arrow_upwardPOPULAR
ICT Misr
ICT Misr is a technology consulting and system integration firm based in Egypt. It provides IT services and solutions across hardware infrastructure, cloud and virtualization, business continuity, sec
Abilene Advisors Supplier Shield
Abilene Advisors Supplier Shield on SecurityListing: End-to-end TPRM platform with advisory, managed services, and cloud tools
Analyst1 Orchestrated Threat Intelligence Platform
Analyst1 Orchestrated Threat Intelligence Platform on SecurityListing: Orchestrated threat intelligence platform for CTI and SOC teams
IGRC Square
IGRC Square provides cybersecurity solutions for organizations, focusing on governance, risk management, and compliance to safeguard data, devices, and employees. The company emphasizes state-of-the-a