Learn More

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 822 Ratings

Total
ease
features
design
support

Description

NoviFlow's CyberMapper enhances and efficiently scales cybersecurity services along with virtualized network functions to Terabit levels by utilizing an advanced Security Load Balancer, packet filtering, and telemetry capabilities within high-performance programmable network fabrics. This innovative solution achieves remarkable levels of performance, adaptability, and scalability by harnessing the capabilities of programmable match-action pipelines, white-box hardware, and widely accepted interfaces like OpenFlow, gRPC, and P4-runtime. By enabling compatibility with NoviWare™ switches—including NoviFlow’s own NoviSwitches and specific white-box options equipped with the robust Intel/Barefoot Tofino—CyberMapper facilitates seamless load balancing, packet brokering, and telemetry services directly integrated into the network architecture, presenting a compact and scalable alternative that comes at a significantly reduced cost compared to traditional load balancing methods. Furthermore, this approach not only streamlines network operations but also empowers organizations to respond swiftly to evolving cybersecurity challenges.

Description

Today's top edge cloud platform empowers developers, connects with customers, and grows your business. Our edge cloud platform is designed to enhance your existing technology and teams. Our edge cloud platform moves data and applications closer towards your users -- at a network's edge -- to improve the performance of your websites and apps. Fastly's highly-programmable CDN allows you to personalize delivery right at the edge. Your users will be delighted to have the content they need at their fingertips. Our powerful POPs are powered by solid-state drives (SSDs), and are located in well-connected locations around world. They allow us to keep more content in cache for longer periods of time, resulting in fewer trips back to the source. Instant Purge and batch purging using surrogate keys allow you to cache and invalidate dynamic content in a matter of minutes. You can always serve up current headlines, inventory, and weather forecasts.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Akitra Andromeda
Bitmovin
Blackfire
Blotout
Castr
ChaosSearch
Datazoom
Do Status
Fastly Next-Gen WAF
Gatsby
Kasada
Khan Academy
Logit.io
Prerender
Salesfinity
StatusGator
ThreatBlockr
Threater
Upstash
Vantage

Integrations

Akitra Andromeda
Bitmovin
Blackfire
Blotout
Castr
ChaosSearch
Datazoom
Do Status
Fastly Next-Gen WAF
Gatsby
Kasada
Khan Academy
Logit.io
Prerender
Salesfinity
StatusGator
ThreatBlockr
Threater
Upstash
Vantage

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

NoviFlow

Founded

2012

Country

Canada

Website

noviflow.com/cybermapper/

Vendor Details

Company Name

Fastly

Founded

2011

Country

United States

Website

fastly.com

Product Features

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Product Features

CDN

Content Acceleration
DDoS Protection
Load Balancing
Managed CDN
Multi-CDN Switching
Reporting/Analytics
Software Downloads
Transparent Caching
Video Streaming
Web Application Firewalls (WAF)

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Alternatives

Traefik Reviews

Traefik

Traefik Labs

Alternatives

Queue-it Reviews

Queue-it

Queue-it ApS
Riverbed APM Reviews

Riverbed APM

Riverbed