ProductDocsPricingAboutContactLog InStart for Free

Frequently Asked Questions

We officially support the following platforms:
A detailed capabilities matrix can be found here
We currently support the following programming languages:
  • Java
  • Microsoft .NET
  • Node.js
  • Python
  • Ruby
A detailed capabilities matrix can be found here


Work is underway on Go, Rust, Deno, and PHP... stay tuned! 📺
Yes! This is currently in preview and more details can be found here
No.

As we roll out more advanced features, some of them may require inspection, tracking, etc. Such features will always be configurable and participation will be at your sole discretion.

For each new feature, we will detail how it interacts with your serverless function in order for your security team to make an informed decision as to whether or not the feature should be allowed per your compliance policies and procedures.

NOTE: For non-enterprise plans, your serverless function will make an HTTPS request during cold start to load its security policy that you configure. No other communication or data transfers are required unless you elect to opt into a feature that necessitates it.
Yes! Offline support is only available to Enterprise customers. Please contact us to learn more.

NOTE: Offline means your serverless function cannot communicate with our APIs. Hence, your function's security policies are loaded via either a configuration file or code (vs. a HTTPS request)
  1. Threat detection: Detect and respond to threats in real-time, reducing the risk of a security breach and ensuring the confidentiality, integrity, and availability of sensitive information.

  2. Compliance monitoring: Monitor application activity in real-time, providing visibility into any changes or deviations from compliance standards, and helping to ensure that your SOC 2 requirements are met.

  3. Automated remediation: Automatically remediate threats and vulnerabilities, reducing the time it takes to resolve security incidents and improving the overall security posture of your organization.

  4. Improved visibility: Provide increased visibility into your application environment, enabling you to quickly identify and respond to security incidents, reducing the risk of a security breach and improving overall security.

Real-Time Application Protection Made Easy

  • Product
  • Overview
    Pricing
    FAQ