+
+

Related Products

  • CMW Platform
    680 Ratings
    Visit Website
  • NetBrain
    182 Ratings
    Visit Website
  • Site24x7
    835 Ratings
    Visit Website
  • Device42
    172 Ratings
    Visit Website
  • JDisc Discovery
    27 Ratings
    Visit Website
  • Aikido Security
    120 Ratings
    Visit Website
  • Innoslate
    87 Ratings
    Visit Website
  • JetBrains Junie
    2 Ratings
    Visit Website
  • Google Cloud Run
    286 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website

About

Identify application connections, predict code change impacts, and understand complex Java and .NET codebases from API to method to database. Create a complete graph of your app structure in real time with combined binary and runtime scans. Understand the full impact of a code change before it’s deployed and accurately estimate project scope. Identify undetected software usages and references across projects and applications directly from your IDE. Many tools, such as IDEs, only expose project-specific code dependencies. CodeLogic exposes hidden code dependencies within and between applications and databases. Our approach is different; we combine binary scans with runtime profiling to create an accurate, real-time, searchable system of record for code and database dependencies. This intelligence helps application teams see the impact of code and schema changes before they are deployed to production.

About

DevSecOps Next Generation – Securing Your Binaries. Identify security vulnerabilities and license violations early in the development process and block builds with security issues from deployment. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production. Additional functionalities include: - Deep recursive scanning of components drilling down to analyze all artifacts and dependencies and creating a graph of relationships between software components. - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - Impact analysis of how an issue in one component affects all dependent components with a display chain of impacts in a component dependency graph. - JFrog’s vulnerabilities database, continuously updated with new component vulnerability data, includes VulnDB, the industry’s most comprehensive security vulnerability database.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Developers

Audience

Developers, DevOps Engineers, DevSecOps, SRE.

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$100.00/month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CodeLogic
Founded: 2015
United States
codelogic.com

Company Information

JFrog
Founded: 2008
United States
jfrog.com/xray/

Alternatives

Alternatives

Sematext Cloud

Sematext Cloud

Sematext Group
aqua cloud

aqua cloud

aqua cloud GmbH
OpenJDK

OpenJDK

Oracle
Revenera SCA

Revenera SCA

Revenera

Categories

Categories

Application Development Features

Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development

Enterprise Architecture Features

Application Portfolio Management
Architecture Governance
Capability Mapping
Diagramming
Idea Management
Modeling & Simulation
Project Management
Risk Assessment
Transformation Roadmapping
Version Control

Continuous Integration Features

Build Log
Change Management
Configuration Management
Continuous Delivery
Continuous Deployment
Debugging
Permission Management
Quality Assurance Management
Testing Management

DevOps Features

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

.NET
ArmorCode
Boozang
Chainguard
Cider
JFrog Connect
Java
Kondukto
Mend.io
OpsLevel
OpsMx Enterprise for Spinnaker
Phoenix Security
Prometheus
ReleaseIQ
Rezilion
Seeker
Testlemon
Tromzo
Vulcan Cyber

Integrations

.NET
ArmorCode
Boozang
Chainguard
Cider
JFrog Connect
Java
Kondukto
Mend.io
OpsLevel
OpsMx Enterprise for Spinnaker
Phoenix Security
Prometheus
ReleaseIQ
Rezilion
Seeker
Testlemon
Tromzo
Vulcan Cyber
Claim CodeLogic and update features and information
Claim CodeLogic and update features and information
Claim JFrog Xray and update features and information
Claim JFrog Xray and update features and information