Feroot Description

Feroot believes businesses and their customers deserve to be able engage in a secure and safe online experience. Feroot's mission is to secure web applications on the client side so that users are able to engage in online environments safely, whether it's using an ecommerce website for purchasing, or accessing internet-based health services, or transferring money between financial accounts. Our products help companies uncover supply chain risk and protect their client side attack surface. Feroot Inspector allows businesses to scan, monitor and enforce security controls in order to prevent data loss incidents caused by JavaScript, third-parties and configuration weaknesses. Our data protection capabilities reduce the time and labor intensive code reviews and threats analysis, and remove ambiguity related to client-side security detection and response.

Pricing

Free Version:
Yes

Integrations

API:
Yes, Feroot has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Feroot Security
Year Founded:
2017
Headquarters:
Canada
Website:
www.feroot.com
Update This Listing

Media

Feroot Screenshot 1
Recommended Products
MongoDB Atlas | Run databases anywhere Icon
MongoDB Atlas | Run databases anywhere

Ensure the availability of your data with coverage across AWS, Azure, and GCP on MongoDB Atlas—the multi-cloud database for every enterprise.

MongoDB Atlas allows you to build and run modern applications across 125+ cloud regions, spanning AWS, Azure, and Google Cloud. Its multi-cloud clusters enable seamless data distribution and automated failover between cloud providers, ensuring high availability and flexibility without added complexity.
Learn More

Product Details

Platforms
Web-Based
Types of Training
Training Docs
Live Training (Online)
Customer Support
Online Support

Feroot Features and Options

Data Security Software

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

GDPR Compliance Software

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Application Security Software

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Feroot User Reviews

Write a Review
  • Previous
  • Next