The thing I like about Cequence Security is that it identifies legitimate complex user behaviors and automated abuse without causing friction to our real students. An example of this is that it can distinguish a student who can jump in and quickly access various course modules and a bot combing through to gather content. It also provides us with some truly fine-grained details of how attackers are probing our less well known public APIs, enabling us to pre-emptively harden them before they become the route of a successful vulnerability. Review collected by and hosted on G2.com.
It took more practical time than we had anticipated to carry out the initial fine tuning in order to differentiate between legitimate power users and advanced automated activity which is specific to our education platform. These also include being sometimes difficult to explain some of the more granular event information in a manner that can make sense of it to non technical team members who may need context when the logs are technical in nature. Review collected by and hosted on G2.com.
Validated through a business email account
This reviewer was offered a nominal incentive as thanks for completing this review.
Invitation from G2 on behalf of a seller or affiliate. This reviewer was offered a nominal incentive as thanks for completing this review.