Castle vs. InAuth

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Castle
Score 10.0 out of 10
N/A
Castle is a solution for protecting customers in web and mobile apps. The vendor says their simple developer-friendly APIs lets users send activity from web and mobile apps. Castle builds behavior models over what's normal for the user’s site and each user account. When there is a potential account takeover, the customer is notified and can resolve the incident without involving the site administrator. Additionally, the vendor says the security analytics dashboard offers complete visibility into…
$33
per month (per 10,000 good events)
InAuth
Score 9.0 out of 10
N/A
InAuth is a fraud detection solution from the Boston-based company of the same name.N/A
Pricing
CastleInAuth
Editions & Modules
Professional
$33
per month (per 10,000 good events)
Enterprise
$2,800
per month (per 1,000,000 good events)
No answers on this topic
Offerings
Pricing Offerings
CastleInAuth
Free Trial
YesNo
Free/Freemium Version
YesNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Best Alternatives
CastleInAuth
Small Businesses
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.1 out of 10

No answers on this topic

Medium-sized Companies
WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.1 out of 10
F5 Distributed Cloud Bot Defense
F5 Distributed Cloud Bot Defense
Score 8.5 out of 10
Enterprises
Cisco Duo
Cisco Duo
Score 9.4 out of 10
F5 Distributed Cloud Bot Defense
F5 Distributed Cloud Bot Defense
Score 8.5 out of 10
All AlternativesView all alternativesView all alternatives
User Testimonials
CastleInAuth
ScreenShots

Castle Screenshots

Screenshot of See which devices and locations that are part of a users normal behaviorScreenshot of Approve and Flag Threats from the dashboard, or let your users take action through the self-service login notification emailsScreenshot of Build custom Threat Segments to highlight users with specific properties such as Tor IPs or high authentication risk