Related Products
|
||||||
About
Cloud security best practices as a service.
CloudSploit is the leading open source security configuration monitoring tool for cloud infrastructure.
Cloud security experts from around the world collaborate to create a repository of tests for cloud infrastructure such as AWS, Azure, GitHub, and Oracle Cloud.
|
About
Covail’s Vulnerability Management Solution (VMS) is designed with an easy-to-use tool where IT security teams can assess applications and network scans, understand threats on their attack surface, continuously track vulnerabilities, and manage priorities. More than 75% of enterprise systems have at least one security vulnerability. And, attackers aren’t hesitating to take advantage. Our managed security service helps you know where and how to start building a consistent 360-degree view of cybersecurity attacks, risks, and threats. We will enable you to make more informed decisions about threat and vulnerability management. Maintain ongoing situational awareness of threats as they relate to known vulnerabilities through trending threats and CVE® (common vulnerabilities and exposures) lists. Effectively understand your vulnerabilities by asset, by application, and by scan, as well as how they map to frameworks.
|
About
Take DefectDojo for a spin and review the demo of DefectDojo and login with sample credentials. DefectDojo is available on Github and has a setup script for easy installation. A docker container with a pre-built version of DefectDojo is available. Know exactly when new vulnerabilities are introduced in a build or remediated. Tracking when a product is assessed is easily accomplished using DefectDojo's API to track security tests that are run on each build. DefectDojo has the ability to track the build-id, commit hash, branch or tag, orchestration server, source code repo, and build server for every on-demand security test. Various reports are available for tests, engagements, and products. Products can be grouped into critical products to track products that are critical to your organization. Similar findings can be easily merged into one finding to provide developers one finding instead of multiple findings.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
AWS users or administrators interested in security
|
Audience
IT security teams requiring a vulnerability management solution to track vulnerabilities within their applications and manage potential threats
|
Audience
Developers and companies requiring an application vulnerability management solution
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
$7.17/month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationCloudSploit
Founded: 2015
United States
cloudsploit.com
|
Company InformationCovail
Founded: 2014
United States
www.covail.com/vms/
|
Company Information10Security
United States
www.defectdojo.org
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|
||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
Categories |
||||
Cloud Management Features
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
|
||||||
Integrations
Crashtest Security
CycloneDX
Deepinfo
PagerDuty
Probely
Semgrep
Slack
Trivy
ZEST Security
|
Integrations
Crashtest Security
CycloneDX
Deepinfo
PagerDuty
Probely
Semgrep
Slack
Trivy
ZEST Security
|
Integrations
Crashtest Security
CycloneDX
Deepinfo
PagerDuty
Probely
Semgrep
Slack
Trivy
ZEST Security
|
||||
|
|
|
|