Cequence Security develops security solutions that protect Web, Mobile, and API-based applications from a broad range of targeted attacks. These include automated bot attacks focused on business logic abuse (such as credential stuffing, site scraping, fake account creation, and more) as well as attacks designed to exploit both known and unknown application vulnerabilities.
The foundation of the solution is the Cequence Application Security Platform (ASP), a container-based platform easily deployed on premises or in the public or private cloud, across any number of locations.
100 S. Murphy Avenue
Sunnyvale, CA 94086
Larry Link, President and CEO
Ameya Talwalkar, Co-founder and CPO
Shreyans Mehta, Co-founder and CTO
Products and Services
Cequence Application Security Platform (ASP)
Cequence ASP consolidates multiple application security functions within an integrated, container-based platform powered by CQAI. With ASP, advanced security is essentially baked into the critical Web, Mobile, and API-based applications that are potential targets for cyberattacks. No changes are required to any applications and there is no additional latency to impact customer experience.
CQAI is the patented analytics engine that powers the Cequence platform. It performs continuous, multi-dimensional analysis of all Web, mobile, and API-based application transactions using a fast and efficient single-pass architecture. This enables CQAI to detect malicious bot attacks and vulnerability exploits in near real-time.
CQ appFirewall is a security module that runs on Cequence ASP and works in conjunction with CQAI to detect and defend against targeted vulnerability exploits of your Web, mobile, and API-based applications. The module supports basic OWASP and PCI compliance requirements, but also provides a level of intelligence and automation unavailable in legacy WAFs.
CQ botDefense is a security module that runs on Cequence ASP and works in conjunction with CQAI to detect and defend against malicious automated bot attacks. These attacks are difficult (if not impossible) to detect using traditional security tools. But this module detects malicious behavior and intent, then provides multiple options to thwart automated attacks.