Do you use Templarbit?
What is Templarbit?
Templarbit prevents attacks on your APIs and Web Applications by leveraging a data driven approach to runtime security
![Templarbit media 1](https://ph-files.imgix.net/6abadeec-5855-41b4-b06f-5719865cd046.jpeg?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=256&h=160&fit=crop)
![Templarbit media 2](https://ph-files.imgix.net/480bc5be-74c8-48e1-bd1b-e5385dcf67d9.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=256&h=160&fit=crop)
![Templarbit media 3](https://ph-files.imgix.net/e4ee6c8e-f2b4-43f6-9234-ab010ecf68ab.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=256&h=160&fit=crop)
Recent launches
Sonar by Templarbit
Blazing fast security monitoring that delivers insights into the availability, performance, and security config of web assets.
![Sonar by Templarbit image](https://ph-files.imgix.net/480bc5be-74c8-48e1-bd1b-e5385dcf67d9.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=150&h=90&fit=crop)
Breachroom
Breachroom is an ongoing collection of cyber attacks and data breaches from data that is publicly available.
![Breachroom image](https://ph-files.imgix.net/541d986e-bd1e-4e7c-869d-0d91c7db7831.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=150&h=90&fit=crop)