Castle logo

Castle

Track security events or any unstructured data from your web backend or mobile app, and Castle will look for anomalies
27
28
+ 1
0

What is Castle?

Castle looks for suspicious login patterns without bothering the legitimate user nor the site administrator. The fully-automated anti-hijack engine identifies potential account compromises based on where the user logs in from and how they navigate the site.
Castle is a tool in the Security category of a tech stack.

Who uses Castle?

Companies
6 companies reportedly use Castle in their tech stacks, including Castle, Cityzen Data, and Nuxeo.

Developers
21 developers on StackShare have stated that they use Castle.

Why developers like Castle?

Here’s a list of reasons why companies and developers use Castle
Top Reasons
Be the first to leave a pro

Castle's Features

  • Security Analytics
  • Threat Alerts
  • Login Notification Emails
  • Threat Segments
  • Adaptive Authentication

Castle Alternatives & Comparisons

What are some alternatives to Castle?
OpenSSL
It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
Let's Encrypt
It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
Ensighten
The leading cybersecurity solution providing client-side protection against data loss, journey hijacking and intrusion while enhancing website performance. Assess and monitor privacy risk to protect against malicious JavaScript attacks.
Spring Security
It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements.
Sqreen
Sqreen is a security platform that helps engineering team protect their web applications, API and micro-services in real-time. The solution installs with a simple application library and doesn't require engineering resources to operate. Security anomalies triggered are reported with technical context to help engineers fix the code. Ops team can assess the impact of attacks and monitor suspicious user accounts involved.
See all alternatives

Castle's Followers
28 developers follow Castle to keep up with related blogs and decisions.
Arni Westh Hansen
Mesam Haider
Mohamma76685757
Chris Ostrowski
DiaryofaMadeMan
psyyz10
Doug Bromley
Mehdi Lefebvre
Alexey Gerro
Romain Douineau