Sucuri

Sucuri

(24)
4.5 out of 5 stars

Sucuri is a managed security service provider for websites. Our cloud-based tools provide complete website security, including intrusion prevention, detection, and incident response.

Work for Sucuri?

Learning about Sucuri?

We can help you find the solution that fits you best.

Find the Right Product

Sucuri Features

Content
Static Content Caching

Caching of static content at distributed PoPs for faster load times.

Not enough data available

Dynamic Content Routing

Routing of dynamic content for faster load time of dynamic pages.

Not enough data available

Cache purging

The ability to purge the cache from different edge location PoPs.

Not enough data available

Security
SSL

Shared SSL certificate.

Not enough data available

Custom SSL

SSL certificate that you provide to the CDN software, or is provided for you and is not shared.

Not enough data available

Orchestration
Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies.

Not enough data available

Security Workflow Automation

Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.

Not enough data available

Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.

Not enough data available

Sandboxing

A feature that allows security testing and information gathering to occur in a secure, resource independent environment.

n/a
Management
Dashboard

An easy to read, often single page, real-time user interface, showing a graphical presentation of the current status and historical trends of an organization's Key Performance Indicators (KPIs) to enable instantaneous and informed decisions to be made at a glance.

Not enough data available

Reports

Access pre-built and custom reports.

Not enough data available

Logs

Record of data changes taking place in the software.

Not enough data available

Information
Proactive Alerts

Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.

85%
(Based on 8 reviews)
Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

85%
(Based on 8 reviews)
Intelligence Reports

The ability for users to produce reports outlining detailed and personalized threat information

83%
(Based on 7 reviews)
Integration
API

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data available

CMS Integration

Standard integrations for common CMS tools.

Not enough data available

Personalization
Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data available

Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

79%
(Based on 5 reviews)
Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

Not enough data available