Average Ratings 4 Ratings
Average Ratings 0 Ratings
Description
                    Imunify360 provides security solutions for web-hosting servers. Imunify360 is more than antivirus and WAF. It combines an Intrusion Prevention & Detection system with an Application Specific Web Application Firewall, Real time Antivirus protection, and Patch Management components into one security suite. Imunify360 is fully automated and displays all statistics in an intuitive dashboard. 
                
            
        
            Description
                    Palo Alto Networks offers a cloud-native suite of integrated security services designed to safeguard your entire network, regardless of where users or devices connect. Utilizing Precision AI™ and global threat intelligence from over 70,000 customers, these services detect and block a wide range of threats including phishing, malware, ransomware, and command-and-control attacks in real time. Core components include Advanced Threat Prevention for intrusion detection, Advanced WildFire’s extensive malware analysis, and Advanced URL Filtering that stops phishing before it reaches users. The solution also features advanced DNS Security that provides double the threat coverage of competitors and actively prevents DNS hijacking. Their IoT/OT Security enforces zero trust across connected devices, while NG-CASB offers visibility and control over SaaS usage in your environment. AI Access Security further protects generative AI application usage with real-time monitoring and access controls. Backed by Palo Alto’s world-renowned Unit 42 research team, this cloud-delivered platform scales seamlessly to meet the evolving threat landscape. It empowers organizations to stay ahead of attacks with unmatched speed and accuracy.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Screenshots View All
No images available
    
Integrations
            
                
    Dianahost
            
            
        
        
    
        
        
            
                
    GB Network Solutions
            
            
        
        
    
        
        
            
                
    HostBill
            
            
        
        
    
        
        
            
                
    Hostbun
            
            
        
        
    
        
        
            
                
    HosterDaddy
            
            
        
        
    
        
        
            
                
    LucusHost
            
            
        
        
    
        
        
            
                
    NGINX
            
            
        
        
    
        
        
            
                
    Plesk
            
            
        
        
    
        
        
            
                
    Rad Web Hosting
            
            
        
        
    
        
        
            
                
    TezHost
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
                
            Integrations
            
                
    Dianahost
            
            
        
        
    
        
        
            
                
    GB Network Solutions
            
            
        
        
    
        
        
            
                
    HostBill
            
            
        
        
    
        
        
            
                
    Hostbun
            
            
        
        
    
        
        
            
                
    HosterDaddy
            
            
        
        
    
        
        
            
                
    LucusHost
            
            
        
        
    
        
        
            
                
    NGINX
            
            
        
        
    
        
        
            
                
    Plesk
            
            
        
        
    
        
        
            
                
    Rad Web Hosting
            
            
        
        
    
        
        
            
                
    TezHost
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
                
            Pricing Details
        $12
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
CloudLinux, Inc.
Founded
2009
Country
United States
Website
www.imunify360.com
Vendor Details
Company Name
Palo Alto Networks
Founded
2005
Country
United States
Website
www.paloaltonetworks.com
Product Features
Application Security
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Open Source Component Monitoring
                                        
                                    
                                    
                                    
                                        Source Code Analysis
                                        
                                    
                                    
                                    
                                        Third-Party Tools Integration
                                        
                                    
                                    
                                    
                                        Training Resources
                                        
                                    
                                    
                                    
                                        Vulnerability Detection
                                        
                                    
                                    
                                    
                                        Vulnerability Remediation
                                        
                                    
                            
                        Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        Data Security
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Antivirus/Malware Detection
                                        
                                    
                                    
                                    
                                        At-Risk Analysis
                                        
                                    
                                    
                                    
                                        Audits
                                        
                                    
                                    
                                    
                                        Data Center Security
                                        
                                    
                                    
                                    
                                        Data Classification
                                        
                                    
                                    
                                    
                                        Data Discovery
                                        
                                    
                                    
                                    
                                        Data Loss Prevention
                                        
                                    
                                    
                                    
                                        Data Masking
                                        
                                    
                                    
                                    
                                        Data-Centric Security
                                        
                                    
                                    
                                    
                                        Database Security
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Identity / Access Management
                                        
                                    
                                    
                                    
                                        Logging / Reporting
                                        
                                    
                                    
                                    
                                        Mobile Data Security
                                        
                                    
                                    
                                    
                                        Monitor Abnormalities
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Secure Data Transport
                                        
                                    
                                    
                                    
                                        Sensitive Data Compliance
                                        
                                    
                            
                        Firewall
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Application Visibility / Control
                                        
                                    
                                    
                                    
                                        Automated Testing
                                        
                                    
                                    
                                    
                                        Intrusion Prevention
                                        
                                    
                                    
                                    
                                        LDAP Integration
                                        
                                    
                                    
                                    
                                        Physical / Virtual Environment
                                        
                                    
                                    
                                    
                                        Sandbox / Threat Simulation
                                        
                                    
                                    
                                    
                                        Threat Identification
                                        
                                    
                            
                        IT Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Anti Virus
                                        
                                    
                                    
                                    
                                        Email Attachment Protection
                                        
                                    
                                    
                                    
                                        Event Tracking
                                        
                                    
                                    
                                    
                                        IP Protection
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Spyware Removal
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Web Traffic Reporting
                                        
                                    
                            
                        Network Security
                                        Access Control
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Firewalls
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Response
                                        
                                    
                                    
                                    
                                        VPN
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        Server Management
                                        CPU Monitoring
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Database Servers
                                        
                                    
                                    
                                    
                                        Email Monitoring
                                        
                                    
                                    
                                    
                                        Event Logs
                                        
                                    
                                    
                                    
                                        History Tracking
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Scheduling
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                                    
                                    
                                        Virtual Machine Monitoring
                                        
                                    
                            
                        Product Features
Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        Network Security
                                        Access Control
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Firewalls
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Response
                                        
                                    
                                    
                                    
                                        VPN
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                         
         
         
         
        